Technology – Radio Free https://www.radiofree.org Independent Media for People, Not Profits. Thu, 31 Jul 2025 02:37:32 +0000 en-US hourly 1 https://www.radiofree.org/wp-content/uploads/2019/12/cropped-Radio-Free-Social-Icon-2-32x32.png Technology – Radio Free https://www.radiofree.org 32 32 141331581 The Paranoia of Officialdom: Age Verification and Using the Internet in Australia https://www.radiofree.org/2025/07/31/the-paranoia-of-officialdom-age-verification-and-using-the-internet-in-australia/ https://www.radiofree.org/2025/07/31/the-paranoia-of-officialdom-age-verification-and-using-the-internet-in-australia/#respond Thu, 31 Jul 2025 02:37:32 +0000 https://dissidentvoice.org/?p=160352 Australia, in keeping with its penal history, has a long record of paranoid officialdom and paternalistic wowsers. Be it perceived threats to morality, the tendency of the populace to be corrupted, and a general, gnawing fear about what knowledge might do, Australia’s governing authorities have prized censorship. This recent trend is most conspicuous in an […]

The post The Paranoia of Officialdom: Age Verification and Using the Internet in Australia first appeared on Dissident Voice.]]>
Australia, in keeping with its penal history, has a long record of paranoid officialdom and paternalistic wowsers. Be it perceived threats to morality, the tendency of the populace to be corrupted, and a general, gnawing fear about what knowledge might do, Australia’s governing authorities have prized censorship.

This recent trend is most conspicuous in an ongoing regulatory war being waged against the Internet and the corporate citizens that inhabit it. Terrified that Australia’s tender children will suffer ruination at the hands of online platforms, the entire population of the country will be subjected to age verification checks. Preparations are already underway in the country to impose a social media ban for users under the age of 16, ostensibly to protect the mental health and wellbeing of children. The Online Safety Amendment (Social Media Minimum Age) Bill 2024 was passed in November last year to amend the Online Safety Act 2021, requiring “age-restricted social media platforms” to observe a “minimum age obligation” to prevent Australians under the age of 16 from having accounts. It also vests that ghastly office of the eSafety Commissioner and the Information Commissioner with powers to seek information regarding relevant compliance by the platforms, along with the power to issue and publish notices of non-compliance.

While the press were falling over to note the significance of such changes, little debate has accompanied the last month’s registration of a new industry code by the eSafety Commissioner, Julie Inman Grant. In fact, Inman Grant is proving most busy, having already registered three such codes, with a further six to be registered by the end of this year. All serve to target the behaviour of internet service companies in Australia. Not all have been subject to parliamentary debate, let alone broader public consultation.

Inman Grant has been less than forthcoming about the implications of these codes, most notably on the issue of mandatory age-assurance limits. That said, some crumbs have been left for those paying attention to her innate obsession with hiving off the Internet from Australian users. In her address to the National Press Club in Canberra on June 24, she did give some clue about where the country is heading: “Today, I am […] announcing that through the Online Safety Act’s codes and standards framework, we will be moving to register three industry-prepared codes designed to limit children’s access to high impact, harmful material like pornography, violent content, themes of suicide, self-harm and disordered eating.”  (Is there no limit to this commissar’s fears?) Under such codes, companies would “agree to apply safety measures up and down the technology stack – including age assurance protections.”

With messianic fervour, Inman Grant explained that the codes would “serve as a bulwark and operate in concern with the new social media age limits, distributing more responsibility and accountability across eight sectors of the tech industry.” These would also not be limited in scope, applicable to enterprise hosting services, internet carriage services, and various “access providers and search engines. I have concluded that each of these codes provides appropriate community safeguards.”

From December 27, such technology giants as Google and Microsoft will have to use age-assurance technology for account holders when they sign in and “apply tools and/or settings, like ‘safe search’ functionality, at the highest safety setting by default for an account holders its age verification systems indicate is likely to be an Australian child, designed to protect and prevent Australian children from accessing or being exposed to online pornography and high impact violence material in search results.” This is pursuant to Schedule 3 – Internet Search Engine Services Online Safety Code (Class 1C and Class 2 Material).

How this will be undertaken has not, as yet, been clarified by Google or Microsoft. The companies have, however, been in the business of trialling a number of technologies. These include Zero-Knowledge Proof (ZKP) cryptography, which permits people to prove that an aspect of themselves is true without surrendering any other data; using large language models (LLMs) to discern an account holder’s age based on browsing history; or the use of selfie verification and government ID tools.

Specialists in the field of information technology have been left baffled and worried. “I have not seen anything like this anywhere else in the world,” remarks IT researcher Lisa Given. This had “kind of popped out, seemingly out of the blue.” Digital Rights Watch chair, Lizzie O’Shea, is of the view that “the public deserves more of a say in how to balance these important human rights issues” while Justin Warren, founder of the tech analysis company PivotNine, sees it as “a massive overreaction after years of police inaction to curtail the power of a handful of large foreign technology companies.”

Then comes the issue of efficacy. Using the safety of children as a reason for censoring content and restricting technology is a government favourite. Whether the regulations actually protect children is quite another matter. John Pane, chair of Electronic Frontiers Australia (EFA), was less than impressed by the results from a recent age-assurance technology trial conducted to examine the effect of the teen social media ban. And all of this cannot ignore the innovative guile of young users, ever ready to circumvent any imposed restrictions.

Inman Grant, in her attempts to limit the use of the Internet and infantilise the population, sees these age-restricting measures as “building a culture of online safety, using multiple interventions – just as we have done so successfully on our beaches.” This nonsensical analogy excludes the central theme of her policies, common to all censors in history: The people are not to be trusted, and paternalistic governors and regulators know better.

The post The Paranoia of Officialdom: Age Verification and Using the Internet in Australia first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2025/07/31/the-paranoia-of-officialdom-age-verification-and-using-the-internet-in-australia/feed/ 0 546948
Border Patrol Wants To See Through Your Walls. Really. #politics #trump #technology https://www.radiofree.org/2025/07/25/border-patrol-wants-to-see-through-your-walls-really-politics-trump-technology/ https://www.radiofree.org/2025/07/25/border-patrol-wants-to-see-through-your-walls-really-politics-trump-technology/#respond Fri, 25 Jul 2025 17:27:47 +0000 http://www.radiofree.org/?guid=f872f681dfd95dda8a46850e76731942
This content originally appeared on The Intercept and was authored by The Intercept.

]]>
https://www.radiofree.org/2025/07/25/border-patrol-wants-to-see-through-your-walls-really-politics-trump-technology/feed/ 0 546221
Microsoft Used China-Based Support for Multiple U.S. Agencies, Potentially Exposing Sensitive Data https://www.radiofree.org/2025/07/25/microsoft-used-china-based-support-for-multiple-u-s-agencies-potentially-exposing-sensitive-data/ https://www.radiofree.org/2025/07/25/microsoft-used-china-based-support-for-multiple-u-s-agencies-potentially-exposing-sensitive-data/#respond Fri, 25 Jul 2025 16:05:00 +0000 https://www.propublica.org/article/microsoft-tech-support-government-cybersecurity-china-doj-treasury by Renee Dudley, with research by Doris Burke

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Last week, Microsoft announced that it would no longer use China-based engineering teams to support the Defense Department’s cloud computing systems, following ProPublica’s investigation of the practice, which cybersecurity experts said could expose the government to hacking and espionage.

But it turns out the Pentagon was not the only part of the government facing such a threat. For years, Microsoft has also used its global workforce, including China-based personnel, to maintain the cloud systems of other federal departments, including parts of Justice, Treasury and Commerce, ProPublica has found.

This work has taken place in what’s known as the Government Community Cloud, which is intended for information that is not classified but is nonetheless sensitive. The Federal Risk and Authorization Management Program, the U.S. government’s cloud accreditation organization, has approved GCC to handle “moderate” impact information “where the loss of confidentiality, integrity, and availability would result in serious adverse effect on an agency’s operations, assets, or individuals.”

The Justice Department’s Antitrust Division has used GCC to support its criminal and civil investigation and litigation functions, according to a 2022 report. Parts of the Environmental Protection Agency and the Department of Education have also used GCC.

Microsoft says its foreign engineers working in GCC have been overseen by U.S.-based personnel known as “digital escorts,” similar to the system it had in place at the Defense Department.

Nevertheless, cybersecurity experts told ProPublica that foreign support for GCC presents an opportunity for spying and sabotage. “There’s a misconception that, if government data isn’t classified, no harm can come of its distribution,” said Rex Booth, a former federal cybersecurity official who now is chief information security officer of the tech company SailPoint.

“With so much data stored in cloud services — and the power of AI to analyze it quickly — even unclassified data can reveal insights that could harm U.S. interests,” he said.

Harry Coker, who was a senior executive at the CIA and the National Security Agency, said foreign intelligence agencies could leverage information gleaned from GCC systems to “swim upstream” to more sensitive or even classified ones. “It is an opportunity that I can’t imagine an intelligence service not pursuing,” he said.

The Office of the Director of National Intelligence has deemed China the “most active and persistent cyber threat to U.S. Government, private-sector, and critical infrastructure networks.” Laws there grant the country’s officials broad authority to collect data, and experts say it is difficult for any Chinese citizen or company to meaningfully resist a direct request from security forces or law enforcement.

Microsoft declined interview requests for this story. In response to questions, the tech giant issued a statement that suggested it would be discontinuing its use of China-based support for GCC, as it recently did for the Defense Department’s cloud systems.

“Microsoft took steps last week to enhance the security of our DoD Government cloud offerings. Going forward, we are taking similar steps for all our government customers who use Government Community Cloud to further ensure the security of their data,” the statement said. A spokesperson declined to elaborate on what those steps are.

The company also said that over the next month it “will conduct a review to assess whether additional measures are needed.”

The federal departments and agencies that ProPublica found to be using GCC did not respond to requests for comment.

The latest revelations about Microsoft’s use of its Chinese workforce to service the U.S. government — and the company’s swift response — are likely to fuel a rapidly developing firestorm in Washington, where federal lawmakers and the Trump administration are questioning the tech giant’s cybersecurity practices and trying to contain any potential national security fallout. “Foreign engineers — from any country, including of course China — should NEVER be allowed to maintain or access DoD systems,” Defense Secretary Pete Hegseth wrote in a post on X last Friday.

Last week, ProPublica revealed that Microsoft has for a decade relied on foreign workers — including those based in China — to maintain the Defense Department’s computer systems, with oversight coming from U.S.-based digital escorts. But those escorts, we found, often don’t have the advanced technical expertise to police foreign counterparts with far more advanced skills, leaving highly sensitive information vulnerable. In response to the reporting, Hegseth launched a review of the practice.

ProPublica found that Microsoft developed the escort arrangement to satisfy Defense Department officials who were concerned about the company’s foreign employees, given the department’s citizenship requirements for people handling sensitive data. Microsoft went on to win federal cloud computing business and has said in earnings reports that it receives “substantial revenue from government contracts.”

While Microsoft has said it will stop using China-based tech support for the Defense Department, it declined to answer questions about what would replace it, including whether cloud support would come from engineers based outside the U.S. The company also declined to say whether it would continue to use digital escorts.

Microsoft confirmed to ProPublica this week that a similar escorting arrangement had been used in GCC — a dynamic that surprised some former government officials and cybersecurity experts. “In an increasingly complex digital world, consumers of cloud products deserve to know how their data is handled and by whom,” Booth said. “The cybersecurity industry depends on clarity.”

Microsoft said it disclosed details of the GCC escort arrangement in documentation submitted to the federal government as part of the FedRAMP cloud accreditation process. The company declined to provide the documents to ProPublica, citing the potential security risk of publicly disclosing them, and also declined to say whether the China-based location of its support personnel was specifically mentioned in them.

ProPublica contacted other major cloud services providers to the federal government to ask whether they use China-based support. A spokesperson for Amazon Web Services said in a statement that “AWS does not use personnel in China to support federal contracts.” A Google spokesperson said in a statement that “Google Public Sector does not have a Digital Escort program. Instead, its sensitive systems are supported by fully trained personnel who meet the U.S. government’s location, citizenship and security clearance requirements.” Oracle said it “does not use any Chinese support for U.S. federal customers.”


This content originally appeared on ProPublica and was authored by by Renee Dudley, with research by Doris Burke.

]]>
https://www.radiofree.org/2025/07/25/microsoft-used-china-based-support-for-multiple-u-s-agencies-potentially-exposing-sensitive-data/feed/ 0 546192
Prospects for the Continuation of Life on Earth and of the Human Species https://www.radiofree.org/2025/07/25/prospects-for-the-continuation-of-life-on-earth-and-of-the-human-species/ https://www.radiofree.org/2025/07/25/prospects-for-the-continuation-of-life-on-earth-and-of-the-human-species/#respond Fri, 25 Jul 2025 15:11:50 +0000 https://dissidentvoice.org/?p=160190 In the July 12, 2024 issue of the scientific journal Nature, an article was published by nineteen co-authors, entitled, “The nature of the last universal common ancestor and its impact on the early Earth system.” The article describes the current status of research into the origin of life on Earth, and the latest available evidence, […]

The post Prospects for the Continuation of Life on Earth and of the Human Species first appeared on Dissident Voice.]]>

In the July 12, 2024 issue of the scientific journal Nature, an article was published by nineteen co-authors, entitled, “The nature of the last universal common ancestor and its impact on the early Earth system.” The article describes the current status of research into the origin of life on Earth, and the latest available evidence, based upon DNA data, the fossil record and isotope tracing. It demonstrates the remarkable, and even astonishing accomplishments of current state-of-the-art scientific inquiry into the origins of life on Earth.

The evidence discussed in the article points to a single Last Universal Common Ancestor (LUCA) as the original organism from which all life existing on earth today is descended and the appearance of this ancestor roughly 4.2 billion years ago. That ancestor appears to have been what is called a “prokaryote-grade anaerobic acetogen,” in other words, a very simple single-celled organism, neither male nor female and not requiring oxygen to survive. It procreates simply by creating copies of itself. Such cells continue to exist today, and our bodies contain large numbers of them.

As astonishing and significant as this statement is, it is important to recognize what it does not say. First, it does not say that other life forms did not precede LUCA. In fact, these even more primitive life forms (or pre-life chemistry) are presumed to have existed and evolved into LUCA, but we have no traces of them.

Second, LUCA is not presumed to have been the only existing life form at the time, but rather the only one that survived and evolved into all earthly life forms that exist today. To put this into perspective, let’s remember that our entire pre-human population of 900,000 years ago fell to only 1280 individuals, and remained that size until 117,000 years later, before starting to increase again. Furthermore, the entire human race today can trace its ancestry to a single woman, who existed around 200,000 years ago. Every human being alive today shares her DNA.

Both of these examples illustrate the fact that not all of the branches of a family tree ultimately bear fruit, so that even if the family is large, many individual members will themselves have no descendants. The continuation of my line, for example, depends entirely upon my two grandsons, who may or may not have children. That’s not unusual. Every family can ultimately trace its line to a single ancestor. In the case of LUCA, therefore, the common ancestor of all life on Earth is simply the one that survived. Others surely existed, but left no offspring that exist today.

The evolution of LUCA and the laws of evolution

Obviously, LUCA did not remain unchanged. It evolved into many other species and forms of life, through the processes first described by Charles Darwin. In fact, as the Nature article sets forth, it evolved into all other forms of life living today on Earth. How did it do that? Simply by following the laws of evolution. These laws have been described by many naturalists and biologists. The most famous of these laws with respect to evolution, is the law of natural selection, first articulated by Charles Darwin in his book, The Origin of Species. With some editing on my part to allow for the more recent discovery of DNA and its role in what Darwin called heredity, it can be stated as follows:

Evolutionary Law #1: Natural selection is the process by which an individual member of a species passes along traits encoded in its DNA to its offspring. To the extent that these traits contribute to the survival of the offspring, they propagate themselves (and therefore the species).

Natural selection operates over generations to select for the traits that help a species to survive, and to select out the traits that do not. This is often called “survival of the fittest,” with “fittest” being a relative term, depending on changes in the environment in which the species lives. In some cases, the entire species dies out, which we call extinction, when, for example a change in habitat is too great or too abrupt for natural selection to save the species. Some examples of extinct species are the trilobite, the Irish elk, and the Hawaii Chaff Flower. In other cases, one species can evolve into more than one, when populations of a species are isolated from each other for a long time in habitats that alter them in different ways. A common example is the donkey or burro and the horse.

The factors at play in evolution and extinction are many. Some examples are:

  • climate change
  • cataclysmic events
  • loss of habitat
  • invasive competing species
  • loss of food source
  • physical isolation of a species, or a population with the species

By the same token, some of the traits by which species propagate themselves in order to adapt to these changes are:

  • strength
  • speed
  • rapid maturation
  • defensive mechanisms
  • access to prey or nourishment
  • aerial flight
  • prolific distribution of seed or offspring
  • ability to store nutrients
  • access to sexual propagation
  • ability to survive hardship and deprivation

All of these are fairly obvious, but it is their common thread that can be consequential in ways that are well-known but not yet fully explored. That common thread is competition. All organisms compete with each other – both within and between species – for resources and sustenance, including food, shelter, mates/procreation, protection, etc. This is true for fungi and single-celled organisms as much as for higher species. It is a well-known, universally accepted statement (or law, if you prefer). It permeates the behavior of all life forms, including (obviously) the human species. It can also be stated as a second Law of Evolution:

Evolutionary Law #2: All living things compete for their existence with all other living things.

The role of cooperation

But does natural selection operate by competition alone? What about cooperation, such as symbiosis and other mutually beneficial relationships between organisms of both the same and different species?

There’s no doubt that cooperation is a factor, but what is its role? We can begin this line of inquiry by examining what eventually happened with LUCA. For well over a billion years, LUCA and its descendants remained prokaryotes. Evolution was not static during this time, but it was exceedingly slow, and dependent to a vastly greater extent upon chance mutations and interactions other than mating, which did not yet exist.

Nevertheless, prokaryotes eventually graduated to eukaryotes – single cells with a nucleus housing the DNA – sometime between 2.7 and 1.8 billion years ago. This means that for a minimum of 1.5 billion years, LUCA did not to evolve beyond simple anaerobic single-celled organisms with no nucleus. This is not to say that prokaryotes did not evolve at all during that time, only that before the appearance of eukaryotes, the potential of natural selection was not apparent. This all changed with eukaryotes – a fundamentally new form of life, containing a nucleus housing the DNA.

Eukaryotes were capable of combining with each other to form offspring that were a combination of two parent cells, and not merely copies of a single parent. As a result, the offspring would have combinations of the DNA from the two parents, and thus be different from either of them. This drove faster evolution, and eventually developed into male and female types, as well as a categorical distinction between plants, animals and fungi, starting as early as 1.5 billion years ago, with plants consuming carbon dioxide and expelling oxygen, and animals and fungi consuming oxygen and expelling carbon dioxide. Even more significant, eukaryote cells began to cluster in ways where some could specialize in certain functions – such as digestion and protection – that served other members of the cluster, and vice versa. These colonies of cells with specialized functions exist today in organisms like the Portuguese man o’war, and bear some resemblance to colonies of insects like ants, termites or bees. In any case, these clusters of eukaryotes can be considered early examples of cooperation, and these first cooperative groups of eukaryotes eventually evolved into the first multi-celled organisms, both plants and animals.

Competition vs. cooperation

There is no question that both competition and cooperation are inherent in all life forms on Earth, and that the origin of cooperation may be said to begin with the transition from prokaryotes to eukaryotes, some 2 billion years ago. It is no wonder that they are both part of our DNA, so to speak.

But I would argue that competition is in fact the only driving force in evolution. Why? Let me begin with a reductionist argument. Let us suppose that an organism exists that does not compete for its existence against organisms that do compete? With no motivation to defend itself against other organisms, how fast would it simply cease to exist?

But if that is self-evident, how can cooperation exist at all? The answer is that cooperation confers an advantage to the organisms that engage in it. It was true for the early eukaryotes, and it is true for social alliances today, from wolf packs to human nations and bee hives.

But what is the nature of the advantage that cooperation confers upon the organisms that engage in it? The simple answer is that it enhances the ability to compete. In French they say, “l’union fait la force.” Unity makes strength. Strength for what purpose? To compete.

Ungulates form herds. Why? For protection. Nations form alliances for the same reasons. Criminals form gangs. Wolves form packs. Fish form schools. Bees form hives. Eukaryotes form colonies and eventually multi-celled organisms. But the purpose is always the same: to compete more effectively, to survive and to pass one’s genes to one’s offspring. Cooperation is a means of competition, not an alternative to it, as far as natural selection is concerned. Life does not compete in order to cooperate; it cooperates in order to compete. This may be stated as:

Evolutionary Law #3: All living things cooperate in varying degrees with each other for mutual advantage over other living things.

Obviously, none of this is directly relevant to questions of morality, ethics, justice or religion. Right and wrong, as well as good and bad, are questions which must be answered in a different type of discussion. The analysis that is presented here is devoted to what is or is not, with respect to evolution and where it is leading the human species, life on Earth, and potentially life throughout the universe. I am not addressing the question of what should or should not be. But it always helps to start with what we know, in order to look at the effects and consequences.

The emergence of technological species

We come now to the question of the human species and its evolution. We know that evolution has led life in many different directions during its long history on Earth. It began in the sea, migrated onto land, and eventually into the air, as well. It has developed life forms that generate poison and perfume, change color at will, grow horns, fangs and armor and many other means and strategies for defending themselves, gaining advantage over other organisms, and propagating themselves. Evolution can be a very powerful process.

We are, nevertheless, at a particularly momentous juncture in the history of evolution. I refer not so much to the development of the human species per se as to the development of technology in the hands of the human species. Humans are of course the primary and almost exclusive agent of technology on Earth, and they are exceptional in its natural history. We tend to think of intelligence as the primary reason for the ascendance of the human species. But we know that other species possess intelligence as well, including cetaceans, corvids, elephants and cephalopods. And we can’t be sure about the power of their intelligence, their linguistic abilities, and their abilities to function in organized groups. Their intelligence and communication skills, as well as their social organization and life cycles may be so different that it can be hard to gauge their capabilities.

But the octopus is the only other intelligent organism that possesses anything like our hands, and cephalopods are handicapped by a very short lifetime and a lack of social structure. Our ability to fashion, with our hands, new and artificial objects and machines and to harness energy, i.e. technology, is unique. We are clearly the first technological species on this planet. This is why I prefer to emphasize the contribution of technology, rather than brain development or intelligence per se toward the age in which we find ourselves. Let us remember that our brains are essentially the same as they were tens of thousands of years ago. The last major change was the development of human language, which required some rewiring of the brain, but not a lot, because it had already proceeded in that direction, as it has in other species. Current estimates are that the capacity for modern language in Homo sapiens evolved prior to 135,000 years ago, but actual modern language may not be much older than 100,000 years. On the other hand, tool making is millions of years old. Neither tool making nor intelligence nor language nor even hands are unique to the human species, but the convergence of them is. And clearly, these capabilities have fed off each other in a systematic way, even if none of them has resulted in major physical changes in our species.

Some of this can be inferred from the growth and spread of human population, especially during the last 60,000 years or so. Equally astonishing has been the parallel and roughly simultaneous development of agriculture, urban architecture, and written languages, even in the Americas, which could not have known what was happening on the other side of the world. The reasons for this are not likely to be organic changes, since we are essentially the same organism everywhere on Earth. The process and the convergence appear to be largely self-driving, once all the elements are in place, perhaps when human settlements reach a critical size that creates a level of interaction that is in some ways exponential. No other species achieved these breakthroughs.

The process has now brought about the Age of Technology, which is accelerating at breakneck speed, challenging our efforts to keep up with and adapt to it, and potentially relegating our participation to that of mere cogs in a system controlled by algorithms, technical managers and organizations like Cambridge Analytica, who discovered that humans could be controlled to a significant degree through their electronic devices. The onset of the age may have begun with the first stone tool kits of hominids, millions of years ago, but today it has progressed to where technology increasingly drives itself, with humans as the pollinators of developments such as AI, artificial life forms and exploration of both the farthest and innermost reaches of the universe. We are often unprepared for the consequences. Most of us try to keep up, but it requires increasing vigilance to stay ahead of the forces arrayed to manipulate us and turn us into mere fuel for the vast machinery that is technology today. Think about your interaction with your smartphone. Who is controlling whom?

Perhaps most of this is the inevitable result of the convergence of forces that formed our species and its societal dynamics. Nevertheless, it is in our interest to try to understand what is happening to our species and our planet – and beyond – to the best of our abilities. This is a unique time in the history of life on earth, and it is due to the evolution of our species and its capabilities. Intelligent species existed in the distant past, especially among dinosaurs, but while we have found their remains, we have never found any signs of civilizations or technologies produced by them. And we surely would have, if they existed. Apparently, the convergence of developments that resulted in a species capable of creating a technological society has never existed on Earth until now.

Similarly, we have no confirmed signs of technology from other worlds, either on our planet or on the others that we have investigated thus far. At most, we have speculation about unexplained phenomena that remain unexplained, which has been true since the beginning of time. But we have no objects on Earth that could not have been produced on Earth, whereas we have transported earth-made artifacts to several other bodies in our solar system, which could not have been produced on those bodies. Where is the space junk from extraterrestrial civilizations?

A similar question was famously asked by nuclear physicist Enrico Fermi in 1950 at a gathering of his fellow scientists. After some debate about life on other planets, they concluded that it must exist, because there is nothing particularly unique about Earth. Planets with life may be rare, but there are so many planets in the universe that ours cannot be the only one to produce life. Even one in a million allows for a vast number. Furthermore, even though it took Earth more than 4 billion years to create its first technological species capable of interplanetary – and potentially interstellar – travel, there is no reason to think that we are necessarily the first in the entire universe, much less the only one. In fact, the odds are hugely against this being the case. This is the point at which Fermi asked his famous question, known as the Fermi Paradox, “Then where are they?”

This is more than an idle question. It is a troubling mystery and refers to an uncomfortable fact that deserves an answer. Why is there no evidence of any contact with extraterrestrial civilizations? Why would such civilizations not have left their traces during the billions of years of our planet’s existence? If we can find one-celled organisms from the earliest times, how much easier is it to find alien space junk? Even if aliens found our planet not worth very much of their time, how much more interesting are the moon and Mars, where we left our space junk? It is simply inconceivable that Earth would not have been visited, nor that we are the very first technological species to exist in all the universe.

The answer to Fermi’s question may help give us an idea about where we are headed as a technological species, and I believe it is possible to at least partially provide such an answer using the facts and analysis already discussed thus far. I apologize in advance if the answer is not to your liking; it is not to mine, either.

The evolutionary ceiling

What worries me is that there may be a law of evolution that has the effect of blocking technological species from developing beyond a certain point – that a technological species hits a ceiling above which it cannot rise, and that this law is the same everywhere in the universe, because the laws of evolution operate the same throughout the universe, as do the laws of physics. If we could pass that point, we would make contact with other technological species from other planets. But the available evidence points to the conclusion that no species anywhere in the universe develops beyond that point. Why?

Does it have anything to do with competition being the prime mechanism behind natural selection and cooperation secondary? I don’t know, but the idea that human nature is fundamentally different from the nature of all other life seems flawed and unrealistic to me. We’re not that different. The laws of the universe are universal.

Hollywood is full of films, like Dr. Strangelove and Don’t Look Up, about apocalyptic and post-apocalyptic visions of the world. We all agree that they have a plausible basis, because we know the power of existing weaponry and the potential to use it, as well as the weakness of human will. Our species is entirely capable of wreaking terrible destruction on our planet, and destroying many of its species, including our own. In fact, a significant number of species already trace their extinction to human activity. Did technological species on other planets and star systems meet the same fate? Is there a law of nature and evolution that dictates that when a technological species reaches a certain point of development, it destroys itself or sets itself so far back in development that it requires a long, arduous crawl to recover, at which time it once again hits its evolutionary ceiling? Perhaps we should take Hollywood more seriously.

We certainly have the means to accomplish such an apocalyptic outcome: nuclear war, climate change, biological warfare (such as experimental disease strains), chemical warfare, even artificial intelligence. If extraterrestrial civilizations have the same experience, this would certainly explain the absence of contact from or with them. But is it a law of evolution?

I believe that a strong case can be made that it is, that it is built into the nature of life and the primary mechanism of natural selection, as a corollary to Evolutionary Law #2, that all living things compete for their existence with all other living things. I therefore propose Evolutionary Law #4 as follows:

Evolutionary Law #4: When a technological species achieves the capability of self-destruction, its primary competitive drive sooner or later causes the exercise of this capability.

Is an evolutionary ceiling hanging over our heads like a sword of Damocles? Do natural laws of evolution dictate that sooner or later we will bring catastrophe upon ourselves? If so, how close are we to that point? In the last 2 million years, have we ever invented a weapon that we have not used? The answer is no, we haven’t.

The spectacular and unprecedented changes through which we are now living appear to be accelerating geometrically and perhaps exponentially. Compared to the period of the existence of life on Earth, the Age of Technology is no more than a split second, but its acceleration seems without constraint. My analysis is a modest attempt to suggest that there may in fact be a limit – an unplanned direction in which we may be headed, and which may be directed by universal laws that we as yet understand poorly.

Let me ask six questions for which I do not have answers but which may illustrate the problem.

  1. How likely is it that we will stop inventing new means of destroying ourselves, either in part or in whole, whether deliberately or not?
  2. How likely is it that all the nations of the world will agree to destroy all technology that endangers our entire species?
  3. How likely is it that we will live with the tools of our own destruction for the indefinite future without using them, either by accident or on purpose?
  4. If we agree to measures that will make us safe, how long will all the nations of the world abide by them, with no “Samson option” that destroys everyone?
  5. If we achieve the previous objectives, how likely is it that we will manage to keep the means of destruction out of the hands of actors that are not party to the agreements?
  6. If we manage to adhere to all of these control measures for ten years, how much longer will we be able to do so? Another 10 years? Another 50 years? Another 100 years? Another 1000? 10,000? 100,000? Will we really keep all of these weapons under control indefinitely?

We have no previous experience with this point in our evolutionary history. Nothing to compare it to. If or when we hit the Evolutionary Ceiling, what will it look like? Will we destroy all life on Earth? Will we destroy all human life plus some other species? Will we destroy ourselves only to the point of leaving behind enough population remnants to rebuild slowly, in the absence of the technological tools to which we will have become accustomed? If we succeed in rebuilding, will we find ourselves hitting the same Evolutionary Ceiling as before? In that case, will the result be as bad or better or worse than the first time, or is it totally unpredictable?

As I said, we have nothing to guide us. For us this is the first time in our planet’s history (and possibly the last) to face this situation. We also have no guidance from the rest of our galaxy or universe, at least not yet.

I don’t know about you, but I would find it very comforting to receive visitors from other planets telling and showing us that there is another option and explanation for Fermi’s Paradox.

  • Image credit: NASA.
The post Prospects for the Continuation of Life on Earth and of the Human Species first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Paul Larudee.

]]>
https://www.radiofree.org/2025/07/25/prospects-for-the-continuation-of-life-on-earth-and-of-the-human-species/feed/ 0 546148
Silicon Valley Sociocide https://www.radiofree.org/2025/07/23/silicon-valley-sociocide/ https://www.radiofree.org/2025/07/23/silicon-valley-sociocide/#respond Wed, 23 Jul 2025 15:00:26 +0000 https://dissidentvoice.org/?p=160125 The rise of modern capitalism created and reflected the industrial technological revolution. The technology of the steam engine, coal, oil, and gas energy grids, and machinery, the railroads, automotive technology, and the telegram and telephone were all essential technological changes enabling the creation of the factory and industrial mass production. The new industrial technology shaped […]

The post Silicon Valley Sociocide first appeared on Dissident Voice.]]>
The rise of modern capitalism created and reflected the industrial technological revolution. The technology of the steam engine, coal, oil, and gas energy grids, and machinery, the railroads, automotive technology, and the telegram and telephone were all essential technological changes enabling the creation of the factory and industrial mass production. The new industrial technology shaped the nature of productive relations in the machine age, making possible both industrial production itself in the factory and the distribution of supplies and goods that sustained productive and market relations. Vast concentrations of capital and corporate power crystallized in the Robber Baron era of the late 19th century. This was an era of sociopathic accumulation that dehumanized and exploited workers, while creating gaping inequality. The labor unions that arose in its wake created a powerful corrective that also nurtured class solidarity and a sense of the common good.

The shift to post-industrialism was associated with the rise of a powerful new set of capitalist elites and new corporate centers of production, finance, and communication. In the 21st century, Silicon Valley became the symbol of the new post-industrial high-tech world. It would become the showcase of the new high-tech companies, such as Microsoft, Amazon, and Apple, which were becoming the first trillion-dollar companies, led by tycoons such as Bill Gates, Jeff Bezos, Steve Jobs, Tim Cook, Mark Zuckerberg, Elon Musk, Sam Altman, and Peter Thiel, all fabulously wealthy members of the Big Tech power elite. Silicon Valley introduced itself as a modern miracle, bringing unprecedented new productivity and prosperity that would benefit both owners and workers, and contribute to the betterment of the general population with magical new products such as the personal computer, the iPhone, and the new internet-based world of online culture and communication on social media. This new world revolutionized the economic and social spheres, while also having major uses and implications for politics and the military. Because billions of people globally now have iPhones or personal computers, with access to the new online universe of the internet and social media, Silicon Valley seemed to open up not only a transformative new economy for entrepreneurs and knowledge workers but a transformed, newly connected world of online social communication and relationships.

This is not entirely an illusion. The online world does open up new social connections and political connections, with social media being a powerful new tool for the younger generation to build new friendships, communities, and politics. But Silicon Valley’s fantastic new array of electronic communications and online connections may also prove to be a gateway to weak social relations and ultimately the end of strong face-to-face social relationships, as well as democracy itself. We face a sociocidal transformation fueled by high tech, with Silicon Valley also proffering its own politics of authoritarianism. Sociocide is the process by which human connection is largely severed, and individuals are only concerned for themselves. A sociocidal society is one in which solidarity is nonexistent and meaningful human relationships are destroyed.

Several sociocidal forces emerge directly from the economic restructuring created by huge Big Tech firms, especially the “Magnificent Seven,” whose individual worth now reaches into the trillions:  Microsoft, Apple, NVIDIA, Amazon, Alphabet (Google), Meta (Facebook), and Tesla. One is the interest of these corporate high-tech elites, much like their corporate counterparts in other spheres, in eroding the face-to-face workplace and social ties that can challenge their power. In the workplace, that translates into the intensified attack on secure employment, unionism, and a collective physical workplace. The intent is to weaken the social relations of workers in the workplace – and more broadly, to subvert the solidarity and face-to-face connections of people throughout society that can challenge authoritarianism in both work and politics.

Focusing first on the workplace, the Magnificent Seven play a special role here by creating and developing the technology – including the personal computer, iPhone, internet apps, AI, robots, and social media — that allows corporate elites to create a precariat of dispersed and contingent workers, increasingly separated from each other, while also replacing millions of workers and transferring their jobs to robots and other AI inventions.

The most rapid replacement of workers by robots and AI is in high-skill jobs. Matt Sigelman, president of the Human Resources Institute, summarized his Institute’s widely circulated report on AI, saying, “There’s no question the workers who will be most impacted are those with college degrees, and those are the people who always thought they were safe.” He indicates that: “Companies in finance, including Goldman Sachs, JPMorgan Chase and Morgan Stanley, have some of the highest percentages of their payrolls likely to be disrupted by generative A.I. Not far behind are tech giants like Google, Microsoft and Meta.”

Tech workers, talented and highly trained, are developing the tools allowing their companies to eliminate many of their own jobs. Meanwhile, employers are also using robots to replace low-skill workers. The sociocidal tech impulse of Silicon Valley, as in other sectors, is embraced because of its profit-saving capacity. And the fastest way to increase profit is to reduce wages, usually by weakening relations among employees or busting unions.

The Magnificent Seven have used their overwhelming economic power to directly undermine unions, the most effective form of worker social relations and organization. In January 2024, Elon Musk, now legendary for his anti-union and broader right-wing views, filed a lawsuit in federal courts to declare unconstitutional the National Labor Relations Board, which protects and regulates workers’ right to organize. In August 2024, just before his re-election, Trump joked with Musk about firing workers, complimenting Musk during a two-hour conversation on X for firing Tesla workers who wanted to strike. “They go on strike,” Trump said to Musk, “and you say, ‘That’s OK, you’re all gone.’” Trump then added, “You’re the Greatest!” The UAW filed labor charges against both Trump and Musk for the unfair labor practices that the two had celebrated; Musk’s Tesla had clashed with union activists for years, and the NLRB in 2021 had found that the non-union Tesla violated labor laws when it fired a union organizer.

One of Musk’s Magnificent Seven compatriots, Jeff Bezos, CEO of Amazon, quickly joined in Trump and Musk’s union-busting party, filing a copycat suit to make the NLRB and unions unconstitutional. Here, we see the world’s two richest men, leaders of the High-Tech Robber Barons, exploiting economic size to reap the fruit of their technology’s economic power. They are seeking a revolutionary breakdown of workplace social relations, moving from the sociopathy of the first Gilded Age to the sociocide of today’s Gilded Age.

The Magnificent Seven’s power undercuts workplace social relations and fiercely attacks union solidarity in the name of free-spirited libertarianism running rampant in Silicon Valley. The broader corporate success in drastically weakening unions is key to sociocide in the entire US labor force and has been achieved not only by the anti-union fervor of corporations since the New Deal but also by the zeal of the Republican Party from Reagan through Trump to make the destruction of labor solidarity and unions a top political priority.

_________________________________________

The above is an excerpt from Charles Derber’s most recent book, Bonfire: American Sociocide, Broken Relations, and the Quest for Democracy.

The post Silicon Valley Sociocide first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Charles Derber.

]]>
https://www.radiofree.org/2025/07/23/silicon-valley-sociocide/feed/ 0 545795
Trump and the energy industry are eager to power AI with fossil fuels https://grist.org/energy/trump-and-the-energy-industry-are-eager-to-power-ai-with-fossil-fuels/ https://grist.org/energy/trump-and-the-energy-industry-are-eager-to-power-ai-with-fossil-fuels/#respond Sun, 20 Jul 2025 13:00:00 +0000 https://grist.org/?p=670492 AI is “not my thing,” President Donald Trump admitted during a speech in Pittsburgh on Tuesday. However, the president said during his remarks at the Energy and Innovation Summit, his advisers had told him just how important energy was to the future of AI.

“You need double the electric of what we have right now, and maybe even more than that,” Trump said, recalling a conversation with “David”—most likely White House AI czar David Sacks, a panelist at the summit. “I said, what, are you kidding? That’s double the electric that we have. Take everything we have and double it.”

At the high-profile summit on Tuesday—where, in addition to Sacks, panelists and attendees included Anthropic CEO Dario Amodei, Google president and chief investment officer Ruth Porat, and ExxonMobil CEO Darren Woods—companies announced $92 billion in investments across various energy and AI-related ventures. These are just the latest in recent breakneck rollouts in investment around AI and energy infrastructure. A day before the Pittsburgh meeting, Mark Zuckerberg shared on Threads that Meta would be building “titan clusters” of data centers to supercharge its AI efforts. The one closest to coming online, dubbed Prometheus, is located in Ohio and will be powered by onsite gas generation, SemiAnalysis reported last week.

For an administration committed to advancing the future of fossil fuels, the location of the event was significant. Pennsylvania sits on the Marcellus and Utica shale formations, which supercharged Pennsylvania’s fracking boom in the late 2000s and early 2010s. The state is still the country’s second-most prolific natural gas producer. Pennsylvania-based natural gas had a big role at the summit: The CEO of Pittsburgh-based natural gas company EQT, Toby Rice—who dubs himself the “people’s champion of natural gas”—moderated one of the panels and sat onstage with the president during his speech.

All this new demand from AI is welcome news for the natural gas industry in the US, the world’s top producer and exporter of liquefied natural gas. Global gas markets have been facing a mounting supply glut for years. Following a warm winter last year, Morgan Stanley predicted gas supply could reach “multi-decade highs” over the next few years. A jolt of new demand—like the demand represented by massive data centers—could revitalize the industry and help drive prices back up.

Natural gas from Pennsylvania and the Appalachian region, in particular, has faced market challenges both from ultra-cheap natural gas from the Permian Basin in Texas and New Mexico as well as a lack of infrastructure to carry supply out of the region. These economic headwinds are “why the industry is doing their best to sort of create this drumbeat or this narrative around the need for AI data centers,” says Clark Williams-Derry, an energy finance analyst at the Institute for Energy Economics and Financial Analysis. It appears to be working. Pipeline companies are already pitching new projects to truck gas from the northeast—responding, they say, to data center demand.

The industry is finding a willing partner in the Trump administration. Since taking office, Trump has used AI as a lever to open up opportunities for fossil fuels, including a well-publicized effort to resuscitate coal in the name of more computing power. The summit, which was organized by Republican senator (and former hedge fund CEO) Dave McCormick, clearly reflected the administration’s priorities in this regard: No representatives from any wind or solar companies were present on any of the public panels.

Tech companies, which have expressed an interest in using any and all cheap power available for AI and have quietly pushed back against some of the administration’s anti-renewables positions, aren’t necessarily on the same page as the Trump administration. Among the announcements made at the summit was a $3 billion investment in hydropower from Google.

This demand isn’t necessarily driven by a big concern for the climate—many tech giants have walked back their climate commitments in recent years as their focus on AI has sharpened—but rather pure economics. Financial analyst Lazard said last month that installing utility-scale solar panels and batteries is still cheaper than building out natural gas plants, even without tax incentives. Gas infrastructure is also facing a global shortage that makes the timescales for setting up power generation vastly different.

“The waiting list for a new turbine is five years,” Williams-Derry says. “If you want a new solar plant, you call China, you say, ‘I want more solar.’”

Given the ideological split at the summit, things occasionally got a little awkward. On one panel, Secretary of Energy Chris Wright, who headed up a fracking company before coming to the federal government, talked at length about how the Obama and Biden administrations were on an “energy crazy train,” scoffing at those administrations’ support for wind and solar. Speaking directly after Wright, BlackRock CEO Larry Fink admitted that solar would likely support dispatchable gas in powering AI. Incredibly, fellow panel member Woods, the ExxonMobil CEO, later paid some of the only lip service to the idea of drawing down emissions heard during the entire event. (Woods was touting the oil giant’s carbon capture and storage business.)

Still, the hype train, for the most part, moved smoothly, with everyone agreeing on one thing: We’re going to need a lot of power, and soon. Blackstone CEO Jonathan Gray said that AI could help drive “40 or 50 percent more power usage over the next decade,” while Porat, of Google, mentioned some economists’ projections that AI could add $4 trillion to the US economy by 2030.

It’s easy to find any variety of headlines or reports—often based on projections produced by private companies—projecting massive growth numbers for AI. “I view all of these projections with great skepticism,” says Jonathan Koomey, a computing researcher and consultant who has contributed to research around AI and power. “I don’t think anyone has any idea, even a few years hence, how much electricity data centers are gonna use.”

In February, Koomey coauthored a report for the Bipartisan Policy Center cautioning that improvements in AI efficiency and other developments in the technology make data center power load hard to predict. But there’s “a bunch of self-interested actors,” Koomey says, involved in the hype cycle around AI and power, including energy executives, utilities, consultants and AI companies.

Koomey remembers the last time there was a hype bubble around electricity, fossil fuels, and technology. In the late 1990s, a variety of sources, including investment banks, trade publications, and experts testifying in front of Congress began to spread hype around the growth of the internet, claiming that the internet could soon consume as much as half of US electricity. More coal-fired power, many of these sources argued, would be needed to support this massive expansion. (“Dig More Coal—The PCs Are Coming” was the headline of a 1999 Forbes article that Koomey cites as being particularly influential to shaping the hype.) The prediction never came to pass, as efficiency gains in tech helped drive down the internet’s energy needs; the initial projections were also based, Koomey says, on a variety of faulty calculations.

Koomey says that he sees parallels between the late 1990s and the current craze around AI and energy. “People just need to understand the history and not fall for these self-interested narratives,” he says. There’s some signs that the AI-energy bubble may not be inflating as much as Big Tech thinks: in March, Microsoft quietly backed out of 2GW of data center leases, citing a decision to not support some training workloads from OpenAI.

“It can both be true that there’s growth in electricity use and there’s a whole bunch of people hyping it way beyond what it’s likely to happen,” Koomey says.

This story was originally published by Grist with the headline Trump and the energy industry are eager to power AI with fossil fuels on Jul 20, 2025.


This content originally appeared on Grist and was authored by Molly Taft, WIRED.

]]>
https://grist.org/energy/trump-and-the-energy-industry-are-eager-to-power-ai-with-fossil-fuels/feed/ 0 545311
Microsoft Says It Has Stopped Using China-Based Engineers to Support Defense Department Computer Systems https://www.radiofree.org/2025/07/18/microsoft-says-it-has-stopped-using-china-based-engineers-to-support-defense-department-computer-systems/ https://www.radiofree.org/2025/07/18/microsoft-says-it-has-stopped-using-china-based-engineers-to-support-defense-department-computer-systems/#respond Fri, 18 Jul 2025 21:35:00 +0000 https://www.propublica.org/article/defense-department-pentagon-microsoft-digital-escort-china by Renee Dudley

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Microsoft says it has stopped using China-based engineers to support Defense Department cloud computing systems after ProPublica revealed the practice in an investigation this week.

“In response to concerns raised earlier this week about US-supervised foreign engineers, Microsoft has made changes to our support for US Government customers to assure that no China-based engineering teams are providing technical assistance for DoD Government cloud and related services,” the company’s chief communications officer, Frank Shaw, announced on X Friday afternoon.

Microsoft’s announcement came hours after Defense Secretary Pete Hegseth said his agency would look into Microsoft’s use of foreign-based engineers to help maintain the highly sensitive cloud systems.

“Foreign engineers — from any country, including of course China — should NEVER be allowed to maintain or access DoD systems,” Hegseth wrote in a post on X Friday.

In its investigation, ProPublica detailed how Microsoft uses engineers in China to help maintain the Defense Department’s computer systems — with minimal supervision by U.S. personnel — leaving some of the nation’s most sensitive data vulnerable to hacking or spying from its leading cyber adversary. The arrangement, which was critical to Microsoft winning the federal government’s cloud computing business a decade ago, relies on U.S. citizens with security clearances to oversee the work and serve as a barrier against espionage and sabotage.

But these workers, known as “digital escorts,” often lack the technical expertise to police the work of foreign engineers with far more advanced skills, ProPublica found.

Earlier Friday, Republican Sen. Tom Cotton of Arkansas, chair of the Select Committee on Intelligence, cited ProPublica in a letter to Hegseth asking for details about which DOD contractors use Chinese personnel to maintain the department’s information and computing systems.

China poses “one of the most aggressive and dangerous threats to the United States, as evidenced by its infiltrations of our critical infrastructure, telecommunications networks and supply chains,” Cotton wrote in the letter, which he posted on X. “DOD must guard against all potential threats within its supply chain, including those from subcontractors.”

Since 2011, cloud computing companies like Microsoft that wanted to sell their services to the U.S. government had to establish how they would ensure that personnel working with federal data would have the requisite “access authorizations” and background screenings. Additionally, the Defense Department requires that people handling sensitive data be U.S. citizens or permanent residents.

This presented an issue for Microsoft, which relies on a vast global workforce with significant operations in India, China and the European Union.

So the tech giant enlisted staffing companies to hire U.S.-based digital escorts, who had security clearances that authorized them to access sensitive information, to take direction from the overseas experts. An engineer might briefly describe the job to be completed — for instance, updating a firewall, installing an update to fix a bug or reviewing logs to troubleshoot a problem. Then, with little review, an escort would copy and paste the engineer’s commands into the federal cloud.

“We’re trusting that what they’re doing isn’t malicious, but we really can’t tell,” one escort told ProPublica.

In an earlier statement in response to ProPublica’s investigation, Microsoft said that its personnel and contractors operate in a manner “consistent with US Government requirements and processes.”

The company’s global workers “have no direct access to customer data or customer systems,” the statement said. Escorts “with the appropriate clearances and training provide direct support. These personnel are provided specific training on protecting sensitive data, preventing harm, and use of the specific commands/controls within the environment.”

In addition, Microsoft said it has an internal review process known as “Lockbox” to “make sure the request is deemed safe or has any cause for concern.”

Insight Global — a contractor that provides digital escorts to Microsoft — said it “evaluates the technical capabilities of each resource throughout the interview process to ensure they possess the technical skills required” for the job and provides training.

Doris Burke contributed research.


This content originally appeared on ProPublica and was authored by by Renee Dudley.

]]>
https://www.radiofree.org/2025/07/18/microsoft-says-it-has-stopped-using-china-based-engineers-to-support-defense-department-computer-systems/feed/ 0 545127
Claim that India has invented a ‘self-sustaining’ generator that runs for 700 years without power/ fuel is fabricated https://www.radiofree.org/2025/07/18/claim-that-india-has-invented-a-self-sustaining-generator-that-runs-for-700-years-without-power-fuel-is-fabricated/ https://www.radiofree.org/2025/07/18/claim-that-india-has-invented-a-self-sustaining-generator-that-runs-for-700-years-without-power-fuel-is-fabricated/#respond Fri, 18 Jul 2025 09:01:56 +0000 https://www.altnews.in/?p=302182 On social media as well as messaging platform WhatsApp, many shared a video of a ‘self-sustaining’ magnetic power generator with claims that it can run for 700 years without any...

The post Claim that India has invented a ‘self-sustaining’ generator that runs for 700 years without power/ fuel is fabricated appeared first on Alt News.

]]>
On social media as well as messaging platform WhatsApp, many shared a video of a ‘self-sustaining’ magnetic power generator with claims that it can run for 700 years without any power supply or fuel. Hailing this as one of the biggest achievements of the Narendra Modi-led BJP government, those sharing this claim also said that the invention has thrown global superpowers, such as the US, China, and Russia, into disarray.

X user @mRupeshVerma posted the video with the viral claim on July 8, 2025, highlighting remarkable inventions under Modi’s tenure as Prime Minister. (Archive)

The video was also viral on Facebook with similar claims. Screenshots below:

Click to view slideshow.

Alt News also received multiple requests on its WhatsApp helpline (+91 76000 11160) to verify the video and the claims.

Click to view slideshow.

 

Fact Check

To check the authenticity of the claims, we ran a keyword search to look for any verified media reports on the invention, but found none.

Thereafter, we ran a reverse image search on one of the key frames from the viral video, which led us to this YouTube video, uploaded in March 2007.

 

According to the caption, the video demonstrates the ‘Searl effect’.

Taking cue from this, we ran a relevant keyword search and found that the device seen in the video, developed by John Searl, is a Searl Effect Generator (SEG). It uses rotating magnets arranged in a ring to generate energy by harnessing electrostatic charges from the atmosphere. This was developed in the 1940s.

Notably, this invention was critiqued for its use of ‘fraudulent science’. Many allege that the SEG’s magnetic phenomenon has not been constructively demonstrated or tested.

Thus, claims that India invented a magnetic generator under the Modi government are baseless and fabricated. No credible media outlets have reported this. Besides, the device shown in the video shared with the viral claim is a Searl Effect Generator (SEG), a controversial invention by John Searl in the mid-20th century.

The post Claim that India has invented a ‘self-sustaining’ generator that runs for 700 years without power/ fuel is fabricated appeared first on Alt News.


This content originally appeared on Alt News and was authored by Prantik Ali.

]]>
https://www.radiofree.org/2025/07/18/claim-that-india-has-invented-a-self-sustaining-generator-that-runs-for-700-years-without-power-fuel-is-fabricated/feed/ 0 544983
Microsoft’s “Digital Escort” Program Could Leave Sensitive Government Info Vulnerable to Espionage. Here’s What to Know. https://www.radiofree.org/2025/07/15/microsofts-digital-escort-program-could-leave-sensitive-government-info-vulnerable-to-espionage-heres-what-to-know/ https://www.radiofree.org/2025/07/15/microsofts-digital-escort-program-could-leave-sensitive-government-info-vulnerable-to-espionage-heres-what-to-know/#respond Tue, 15 Jul 2025 21:30:00 +0000 https://www.propublica.org/article/microsoft-digital-escort-china-government-data-takeaways by ProPublica

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

For nearly a decade, Microsoft has used engineers in China to help maintain highly sensitive Defense Department computer systems. ProPublica’s investigation reveals how a model that relies on “digital escorts” to oversee foreign tech support could leave some of the nation’s most sensitive data vulnerable to hacking from its leading cyber adversary.

Here are the key takeaways from that report:

Only U.S. citizens with security clearances are permitted to access the Defense Department’s most sensitive data.

Since 2011, cloud computing companies that wanted to sell their services to the U.S. government had to establish how they would ensure that personnel working with federal data would have the requisite “access authorizations” and background screenings. Additionally, the Defense Department requires that people handling sensitive data be U.S. citizens or permanent residents.

This presented an issue for Microsoft, which relies on a vast global workforce with significant operations in India, China and the European Union.

Microsoft established its low-profile “digital escort” program to get around this prohibition.

Microsoft’s foreign workforce is not permitted to access sensitive cloud systems directly, so the tech giant hired U.S.-based “digital escorts,” who had security clearances that authorized them to access sensitive information, to take direction from the overseas experts. The engineers might briefly describe the job to be completed — for instance, updating a firewall, installing an update to fix a bug or reviewing logs to troubleshoot a problem. Then the escort copies and pastes the engineer’s commands into the federal cloud.

The problem, ProPublica found, is that digital escorts don’t necessarily have the advanced technical expertise needed to spot problems.

“We’re trusting that what they’re doing isn’t malicious, but we really can’t tell,” said one current escort.

The escorts handle data that, if leaked, would have “catastrophic” effects.

Microsoft uses the escort system to handle the government’s most sensitive information that falls below “classified.” According to the government, this includes “data that involves the protection of life and financial ruin.” The “loss of confidentiality, integrity, or availability” of this information “could be expected to have a severe or catastrophic adverse effect” on operations, assets and individuals, the government has said.

Defense Department data in this category includes materials that directly support military operations.

The program could expose Pentagon data to cyberattacks.

Because the U.S.-based escorts are taking direction from foreign engineers, including those based in China, the nation’s greatest cyber adversary, it is possible that an escort could unwittingly insert malicious code into the Defense Department’s computer systems.

A former Microsoft engineer who worked on the system acknowledged this possibility. “If someone ran a script called ‘fix_servers.sh’ but it actually did something malicious, then [escorts] would have no idea,” the engineer, Matthew Erickson, told ProPublica.

Pradeep Nair, a former Microsoft vice president who said he helped develop the concept from the start, said a variety of safeguards including audit logs, the digital trail of system activity, could alert Microsoft or the government to potential problems. “Because these controls are stringent, residual risk is minimal,” Nair said.

Digital escorts present a natural opportunity for spies, experts say.

“If I were an operative, I would look at that as an avenue for extremely valuable access. We need to be very concerned about that,” said Harry Coker, who was a senior executive at the CIA and the National Security Agency. Coker, who also was national cyber director during the Biden administration, added that he and his former intelligence colleagues “would love to have had access like that.”

Chinese laws allow government officials there to collect data “as long as they’re doing something that they’ve deemed legitimate,” said Jeremy Daum, senior research fellow at the Paul Tsai China Center at Yale Law School. Microsoft’s China-based tech support for the U.S. government presents an opening for Chinese espionage, “whether it be putting someone who’s already an intelligence professional into one of those jobs, or going to the people who are in the jobs and pumping them for information,” Daum said. “It would be difficult for any Chinese citizen or company to meaningfully resist a direct request from security forces or law enforcement.”

Microsoft says the program is government-approved.

In a statement, Microsoft said that its personnel and contractors operate in a manner “consistent with US Government requirements and processes.”

The company’s global workers “have no direct access to customer data or customer systems,” the statement said. Escorts “with the appropriate clearances and training provide direct support. These personnel are provided specific training on protecting sensitive data, preventing harm, and use of the specific commands/controls within the environment.”

Insight Global — a contractor that provides digital escorts to Microsoft — said it “evaluates the technical capabilities of each resource throughout the interview process to ensure they possess the technical skills required” for the job and provides training.

Microsoft says it disclosed details of the escort program to the government. Former Pentagon officials said they’d never heard of it.

Microsoft told ProPublica that it described the escort model in documents submitted to the government as part of cloud vendor authorization processes. Former defense and intelligence officials said in interviews that they had never heard of digital escorts. Even the Defense Department’s IT agency didn’t know about it until reached for comment by ProPublica.

“I probably should have known about this,” said John Sherman, who was chief information officer for the Defense Department during the Biden administration. He said the system is a major security risk for the department and called for a “thorough review by [the Defense Information Systems Agency], Cyber Command and other stakeholders that are involved in this.”

DISA said, “Experts under escort supervision have no direct, hands-on access to government systems; but rather offer guidance and recommendations to authorized administrators who perform tasks.”

There were warnings early on about the risks.

Multiple people raised concerns about the escort strategy over the years, including while it was still in development. A former Microsoft employee, who was involved in the company’s cybersecurity strategy, told an executive they opposed the concept, viewing it as too risky from a security perspective.

Around 2016, Microsoft engaged contacts from Lockheed Martin to hire escorts. The project manager says they told their counterpart at Microsoft they were concerned the escorts would not have the “right eyes” for the job given the relatively low pay.

Microsoft did not respond to questions about these points.

Other cloud providers wouldn’t say if they also use escorts.

It’s unclear whether other major cloud service providers to the federal government also use digital escorts in tech support. Amazon Web Services and Google Cloud declined to comment on the record for this article. Oracle did not respond to requests for comment.


This content originally appeared on ProPublica and was authored by by ProPublica.

]]>
https://www.radiofree.org/2025/07/15/microsofts-digital-escort-program-could-leave-sensitive-government-info-vulnerable-to-espionage-heres-what-to-know/feed/ 0 544580
A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers https://www.radiofree.org/2025/07/15/a-little-known-microsoft-program-could-expose-the-defense-department-to-chinese-hackers/ https://www.radiofree.org/2025/07/15/a-little-known-microsoft-program-could-expose-the-defense-department-to-chinese-hackers/#respond Tue, 15 Jul 2025 09:00:00 +0000 https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers by Renee Dudley, with research by Doris Burke

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Microsoft is using engineers in China to help maintain the Defense Department’s computer systems — with minimal supervision by U.S. personnel — leaving some of the nation’s most sensitive data vulnerable to hacking from its leading cyber adversary, a ProPublica investigation has found.

The arrangement, which was critical to Microsoft winning the federal government’s cloud computing business a decade ago, relies on U.S. citizens with security clearances to oversee the work and serve as a barrier against espionage and sabotage.

But these workers, known as “digital escorts,” often lack the technical expertise to police foreign engineers with far more advanced skills, ProPublica found. Some are former military personnel with little coding experience who are paid barely more than minimum wage for the work.

“We’re trusting that what they’re doing isn’t malicious, but we really can’t tell,” said one current escort who agreed to speak on condition of anonymity, fearing professional repercussions.

The system has been in place for nearly a decade, though its existence is being reported publicly here for the first time.

Microsoft told ProPublica that it has disclosed details about the escort model to the federal government. But former government officials said in interviews that they had never heard of digital escorts. The program appears to be so low-profile that even the Defense Department’s IT agency had difficulty finding someone familiar with it. “Literally no one seems to know anything about this, so I don’t know where to go from here,” said Deven King, spokesperson for the Defense Information Systems Agency.

National security and cybersecurity experts contacted by ProPublica were also surprised to learn that such an arrangement was in place, especially at a time when the U.S. intelligence community and leading members of Congress and the Trump administration view China’s digital prowess as a top threat to the country.

The Office of the Director of National Intelligence has called China the “most active and persistent cyber threat to U.S. Government, private-sector, and critical infrastructure networks.” One of the most prominent examples of that threat came in 2023, when Chinese hackers infiltrated the cloud-based mailboxes of senior U.S. government officials, stealing data and emails from the commerce secretary, the U.S. ambassador to China and others working on national security matters. The intruders downloaded about 60,000 emails from the State Department alone.

With President Donald Trump and his allies concerned about spying, the State Department announced plans in May to “aggressively revoke visas for Chinese students” — a pledge that the president seems to have walked back. The administration is also trying to arrange the sale of the popular social media platform TikTok, which is owned by a Chinese company that some lawmakers believe could hand over sensitive U.S. user data to Beijing and fuel misinformation with its content recommendations. But experts told ProPublica that digital escorting poses a far greater threat to national security than either of those issues and is a natural opportunity for spies.

“If I were an operative, I would look at that as an avenue for extremely valuable access. We need to be very concerned about that,” said Harry Coker, who was a senior executive at the CIA and the National Security Agency. Coker, who also was national cyber director during the Biden administration, added that he and his former intelligence community colleagues “would love to have had access like that.”

It is difficult to know whether engineers overseen by digital escorts have ever carried out a cyberattack against the U.S. government. But Coker wondered whether it “could be part of an explanation for a lot of the challenges we have faced over the years.”

Microsoft uses the escort system to handle the government’s most sensitive information that falls below “classified.” According to the government, this “high impact level” category includes “data that involves the protection of life and financial ruin.” The “loss of confidentiality, integrity, or availability” of this information “could be expected to have a severe or catastrophic adverse effect” on operations, assets and individuals, the government has said. In the Defense Department, the data is categorized as “Impact Level” 4 and 5 and includes materials that directly support military operations.

John Sherman, who was chief information officer for the Department of Defense during the Biden administration, said he was surprised and concerned to learn of ProPublica’s findings. “I probably should have known about this,” he said. He told the news organization that the situation warrants a “thorough review by DISA, Cyber Command and other stakeholders that are involved in this.”

In an emailed statement, the Defense Information Systems Agency said that cloud service providers “are required to establish and maintain controls for vetting and using qualified specialists,” but the agency did not respond to ProPublica’s questions regarding the digital escorts’ qualifications.

It’s unclear whether other cloud providers to the federal government use digital escorts as part of their tech support. Amazon Web Services and Google Cloud declined to comment on the record for this article. Oracle did not respond to requests for comment.

Microsoft declined to make executives available for interviews for this article. In response to emailed questions, the company provided a statement saying its personnel and contractors operate in a manner “consistent with US Government requirements and processes.”

Global workers “have no direct access to customer data or customer systems,” the statement said. Escorts “with the appropriate clearances and training provide direct support. These personnel are provided specific training on protecting sensitive data, preventing harm, and use of the specific commands/controls within the environment.” In addition, Microsoft said it has an internal review process known as “Lockbox” to “make sure the request is deemed safe or has any cause for concern.” A company spokesperson declined to provide specifics about how it works but said it’s built into the system and involves review by a Microsoft employee in the U.S.

Over the years, various people involved in the work, including a Microsoft cybersecurity leader, warned the company that the arrangement is inherently risky, those people told ProPublica. Despite the presence of an escort, foreign engineers are privy to granular details about the federal cloud — the kind of information hackers could exploit. Moreover, the U.S. escorts overseeing these workers are ill equipped to spot suspicious activity, two of the people said.

Even those who helped develop the escort system acknowledge the people doing the work may not be able to detect problems.

“If someone ran a script called ‘fix_servers.sh’ but it actually did something malicious then [escorts] would have no idea,” Matthew Erickson, a former Microsoft engineer who worked on the escort system, told ProPublica in an email. That said, he maintained that the “scope of systems they could disrupt” is limited.

The Defense Department requires anyone working with its most sensitive data to be a U.S. citizen, U.S. national or permanent resident. “No Foreign persons may have such access,” according to the department’s cloud security requirements. Microsoft, however, has a global workforce, so it created the digital escort system as a work-around. Here’s an example of how it works and the risk it poses:

Tech support is needed on a Microsoft cloud product.

A Microsoft engineer in China files an online “ticket” to take on the work.

A U.S.-based escort picks up the ticket.

The engineer and the escort meet on the Microsoft Teams conferencing platform.

The engineer sends computer commands to the U.S. escort, presenting an opportunity to insert malicious code.

The escort, who may not have advanced technical expertise, inputs the commands into the federal cloud system.

Illustrations for ProPublica

A Microsoft contractor called Insight Global posted an ad in January seeking an escort to bring engineers without security clearances “into the secured environment” of the federal government and to “protect confidential and secure information from spillage,” an industry term for a data leak. The pay started at $18 an hour.

While the ad said that specific technical skills were “highly preferred” and “nice to have,” the main prerequisite was possessing a valid “secret” level clearance issued by the Defense Department.

“People are getting these jobs because they are cleared, not because they’re software engineers,” said the escort who agreed to speak anonymously and who works for Insight Global.

Each month, the company’s roughly 50-person escort team fields hundreds of interactions with Microsoft’s China-based engineers and developers, inputting those workers’ commands into federal networks, the employee said.

In a statement to ProPublica, Insight Global said it “evaluates the technical capabilities of each resource throughout the interview process to ensure they possess the technical skills required” for the job, and provides training. The company noted that escorts also receive additional cyber and “insider threat awareness” training as part of the government security clearance process.

“While a security clearance may be required for the role, it is but one piece of the puzzle,” the company said.

Microsoft did not respond to questions about Insight Global.

“The Path of Least Resistance”

When modern cloud technology emerged in the 2000s, offering on-demand computing power and data storage via the internet, it ushered in fundamental changes to federal government operations.

For decades, federal departments used computer servers owned and operated by the government itself to house data and power networks. Shifting to the cloud meant moving that work to massive off-site data centers managed by tech companies.

Federal officials believed that the cloud would provide greater power, efficiency and cost savings. But the transition also meant that the government would cede some control over who maintained and accessed its information to companies like Microsoft, whose employees would take over tasks previously handled by federal IT workers.

To address the risks of this revolution, the government started the Federal Risk and Authorization Management Program, known as FedRAMP, in 2011. Under the program, companies that wanted to sell their cloud services to the government had to establish how they would ensure that personnel working with sensitive federal data would have the requisite “access authorizations” and background screenings. On top of that, the Defense Department had its own cloud guidelines, requiring that people handling sensitive data be U.S. citizens or permanent residents.

This presented an issue for Microsoft, given its reliance on a vast global workforce, with significant operations in India, China and the European Union. So the company tapped a senior program manager named Indy Crowley to put federal officials at ease. Known for his familiarity with the rules and his ability to converse in the government’s acronym-heavy lingo, colleagues dubbed him the “FedRAMP whisperer.”

In an interview, Crowley told ProPublica that he appealed directly to FedRAMP leadership, arguing that the relative risk from Microsoft’s global workforce was minimal. To make his point, he said he once grilled a FedRAMP official on the provenance of code in products supplied by other government vendors such as IBM. The official couldn’t say with certainty that only U.S. citizens had worked on the product in question, he said. The cloud, Crowley argued, should not be treated any differently.

Crowley said he also met with prospective customers across the government and told ProPublica that the Defense Department was the “one making the most demands.” Concerned about the company’s global workforce, officials there asked him who from Microsoft would be “behind the curtain” working on the cloud. Given the department’s citizenship requirements, the officials raised the possibility of Microsoft “hiring a bunch of U.S. citizens to maintain the federal cloud” directly, Crowley told ProPublica. For Microsoft, the suggestion was a nonstarter, Crowley said, because the increased labor costs of implementing it broadly would make a cloud transition prohibitively expensive for the government.

“It’s always a balance between cost and level of effort and expertise,” he told ProPublica. “So you find what’s good enough.” Hiring virtual escorts to supervise Microsoft’s foreign workforce emerged as “the path of least resistance,” Crowley said.

Microsoft did not respond to ProPublica’s questions about Crowley’s account.

When he brought the concept back to Microsoft, colleagues had mixed reactions. Tom Keane, then the corporate vice president for Microsoft’s cloud platform, Azure, embraced the idea, according to a former employee involved in the discussions, as it would allow the company to scale up. But that former employee, who was involved in cybersecurity strategy, told ProPublica they opposed the concept, viewing it as too risky from a security perspective. Both Keane and Crowley dismissed the concerns, said the former employee, who left the company before the escort concept was deployed.

“People who got in the way of scaling up did not stay,” the former employee told ProPublica.

Crowley said he did not recall the discussion. Keane did not respond to requests for comment.

On its march to becoming one of the world’s most valuable companies, Microsoft has repeatedly prioritized corporate profit over customer security, ProPublica has found. Last year, the news organization reported that the tech giant ignored one of its own engineers when he repeatedly warned that a product flaw left the U.S. government exposed; state-sponsored Russian hackers later exploited that weakness in one of the largest cyberattacks in history. Microsoft has defended its decision not to address the flaw, saying that it received “multiple reviews” and that the company weighs a variety of factors when making security decisions.

A Skills Gap From the Start

The idea of an escort wasn’t novel. The National Institute of Standards and Technology, which serves as the federal government’s standards-setting body, had established recommendations on how IT maintenance should be performed on-site, such as in a restricted government office. “Maintenance personnel that lack appropriate security clearances or are not U.S. citizens” must be escorted and supervised by “approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified,” the guidelines state.

The government at the time specified the intent of the recommendation: to deny “individuals who lack appropriate security clearances ... or who are not U.S. citizens, visual and electronic access to” sensitive government information.

But escorts in the cloud wouldn’t necessarily be able to meet that goal, given the gap in technical expertise between them and the Microsoft counterparts they would be taking direction from.

That imbalance, though, was baked into the escorting model.

Erickson, the former Microsoft engineer who worked on the model, told ProPublica that escorts are “somewhat technically proficient,” but mainly are “just there to make sure the employees don’t accidentally or intentionally view” passwords, customer data or personally identifiable information. “If there are problems with the underlying” cloud services, “then only the people who work on those services at Microsoft would have the requisite knowledge to fix it,” he said.

Advanced threats from foreign adversaries weren’t on the radar for Erickson, who said he didn’t “have any reason to suspect someone more just based on their country of origin.”

“I don’t think there is any extra threat from Microsoft employees based in other countries,” he said.

(Illustration by Andrea Wise/ProPublica. Source images: Bevan Goldswain/Getty Images, kontekbrothers/Getty Images, amgun/Getty Images.)

Pradeep Nair, a former Microsoft vice president who said he helped develop the concept from the start, said that the digital escort strategy allowed the company to “go to market faster,” positioning it to win major federal cloud contracts. He said that escorts “complete role-specific training before touching any production system” and that a variety of safeguards including audit logs, the digital trail of system activity, could alert Microsoft or the government to potential problems.

“Because these controls are stringent, residual risk is minimal,” Nair said.

But legal and cybersecurity experts say such assumptions ignored the massive cyber threat from China in particular. Around the time that Microsoft was developing its escort strategy, an attack attributed to Chinese state-sponsored hackers resulted in the largest breach of U.S. government data up to that point. The theft initially targeted a government contractor and eventually compromised the personal information of more than 22 million people, most of them applicants for federal security clearances.

Chinese laws allow government officials there to collect data “as long as they’re doing something that they’ve deemed legitimate,” said Jeremy Daum, senior research fellow at the Paul Tsai China Center at Yale Law School. Microsoft’s China-based tech support for the U.S. government presents an opening for espionage, “whether it be putting someone who’s already an intelligence professional into one of those jobs, or going to the people who are in the jobs and pumping them for information,” Daum said. “It would be difficult for any Chinese citizen or company to meaningfully resist a direct request from security forces or law enforcement.”

Erickson acknowledged that having an escort doesn’t prevent foreign developers “from doing ‘bad’ things. It just allows for there to be a recording and a witness.” He said if an escort suspects malicious activity, they will end the session and file an incident report to investigate further.

How much of this information federal officials understood is unclear.

A Microsoft spokesperson said the company described the digital escort model in the documents submitted to the government as part of cloud vendor authorization processes. However, it declined to provide those records or to tell ProPublica the exact language it used in them to describe the escort arrangement, citing the potential security risk of publicly disclosing it.

In addition to a third-party auditor, Microsoft’s documentation theoretically would have been reviewed by multiple parties in the government, including FedRAMP and DISA. DISA said the materials are “not releasable to the public.” The General Services Administration, which houses FedRAMP, did not respond to requests for comment.

The “Right Eyes” for the Job?

In June 2016, Microsoft announced that it had received FedRAMP authorization to work with some of the government’s most sensitive data. Matt Goodrich, then FedRAMP director, said at the time that the accreditation was “a testament to Microsoft’s ability to meet the government’s rigorous security requirements.”

Around the same time, Microsoft put the escort concept into practice, engaging contacts from defense giant Lockheed Martin to hire cloud escorts, two people involved in the contract told ProPublica.

A project manager, who asked for anonymity to describe confidential discussions, told ProPublica that they were skeptical of the escort arrangement from the start and voiced those feelings to their Microsoft counterpart. The manager was especially concerned that the new hires would not have the “right eyes” for the job given the relatively low pay set by Microsoft, but the system went ahead anyway.

Lockheed Martin referred questions to Leidos, a company that took over Lockheed’s IT business following a merger in 2016. Leidos declined to comment.

As Microsoft captured more of the government’s business, the company turned to additional subcontractors, typically staffing companies, to hire more digital escorts.

Analyzing profiles on LinkedIn, ProPublica identified at least two such firms: Insight Global and ASM Research, whose parent company is consulting giant Accenture. While the scope of each firm’s business with Microsoft is unclear, ProPublica found more workers identifying themselves as digital escorts at Insight Global, many of them former military personnel, than at ASM. ASM and Accenture did not respond to requests for comment

Concerns About China

Some Insight Global workers recognized the same problem as the former Lockheed manager: a mismatch in skills between the U.S.-based escorts and the Microsoft engineers they are supervising. The engineers might briefly describe the job to be completed — for instance, updating a firewall, installing an update to fix a bug or reviewing logs to troubleshoot a problem. Then, with limited inspection, the escort copies and pastes the engineer’s commands into the federal cloud.

“They’re telling nontechnical people very technical directions,” the current Insight Global escort said, adding that the arrangement presents untold opportunities for hacking. As an example, they said the engineer could install an update allowing an outsider to access the network.

“Will that get caught? Absolutely,” the escort told ProPublica. “Will that get caught before damage is done? No idea.”

The escort was particularly concerned about the dozens of tickets a week filed by workers based in China. The attack targeting federal officials in 2023 — in which Chinese hackers stole 60,000 emails — underscored that fear.

The federal Cyber Safety Review Board, which investigated the attack, blamed Microsoft for security lapses that gave hackers their opening. Its published report did not mention digital escorts, either as playing a role in the attack or as a risk to be mitigated. Sherman, the former chief information officer for the Defense Department, and Coker, the former intelligence official, who both also served as members of the CSRB, told ProPublica that they did not recall the board ever discussing digital escorting, which they said they now consider a major threat. The Trump administration has since disbanded the CSRB.

In its statement, Microsoft said it expects escorts “to perform a variety of technical tasks,” which are outlined in its contracts with vendors. Insight Global said it evaluates prospective hires to ensure they have those skills and trains new employees on “all applicable security and compliance policies provided by Microsoft.”

But the Insight Global employee told ProPublica the training regimen doesn’t come close to bridging the knowledge gap. In addition, it is challenging for escorts to gain expertise on the job because the type of work they oversee varies widely. “It’s not possible to get as trained up as you need to be on the wide array of things you need to look at,” they said.

The escort said they repeatedly raised concerns about the knowledge gap to Microsoft, over several years and as recently as April, and to Insight Global’s own attorneys. They said the digital escorts’ relative inexperience — combined with Chinese laws that grant the country’s officials broad authority to collect data — left U.S. government networks overly exposed. Microsoft repeatedly thanked the escort for raising the issues while Insight Global said it would take them under advisement, the escort said. It is unclear whether Microsoft or Insight Global took any steps to address them; neither company answered questions about the escort’s account.

In its statement, Microsoft said it meets regularly with its contractors “to discuss operations and surface questions or concerns.” The company also noted that it has additional layers of “security and monitoring controls” including “automated code reviews to quickly detect and prevent the introduction of vulnerabilities.”

“Microsoft assumes anyone that has access to production systems, regardless of location or role, can pose a risk to the system, whether intentionally or unintentionally,” the company said in its statement.

Another Warning, a Growing Risk

Last year, about three months after government investigators released their report on the 2023 hack into U.S. officials’ emails, a former Insight Global contractor named Tom Schiller contacted a Defense Department hotline and wrote to several federal lawmakers to warn them about digital escorting. He had become familiar with the system while briefly working for the company as a software developer. By last July, Schiller’s complaints wound their way to the Defense Information Systems Agency Office of the Inspector General. Schiller told ProPublica that the office conducted a sworn interview with him, and separately with three others connected to Insight Global. In August, the inspector general wrote to Schiller to say it had closed the case.

“We conducted a preliminary analysis into the complaint and determined this matter is not within the avenue of redress by DISA IG and is best addressed by the appropriate DISA management,” the assistant inspector general for investigations said in the letter. “We have referred the information you provided to management.”

A spokesperson for the inspector general — whose office is supposed to operate independently in order to investigate potential waste, fraud and abuse — told ProPublica they were not authorized to speak about the issue and directed questions to DISA public affairs.

“If the public information office contacts me and wants to collaborate to formulate a response through their office, I’ll be more than happy to do that,” the spokesperson said. “But I will not be responding to any kind of media request concerning OIG business without speaking with the public information office.”

DISA public affairs did not answer questions about the matter. After a spokesperson initially said that he couldn’t find anyone who had heard of the escort concept, the agency later acknowledged in a statement to ProPublica that escorts are used “in select unclassified environments” at the Defense Department for “advanced problem diagnosis and resolution from industry subject matter experts.” Echoing Microsoft’s statement, it continued, “Experts under escort supervision have no direct, hands-on access to government systems; but rather offer guidance and recommendations to authorized administrators who perform tasks.”

It is unclear what, if any, discussions have taken place among Microsoft, Insight Global and DISA, or any other government agency, regarding digital escorts.

But David Mihelcic, DISA’s former chief technology officer, said any visibility into the Defense Department’s network poses a “huge risk.”

“Here you have one person you really don’t trust because they’re probably in the Chinese intelligence service, and the other person is not really capable,” he said.

The risk may be getting more serious by the day, as U.S.-China relations worsen amid a simmering trade war — the type of conflict that experts say could result in Chinese cyber retaliation.

In testimony to a Senate committee in May, Microsoft President Brad Smith said the company is continually “pushing Chinese out of agencies.” He did not elaborate on how they got in, and Microsoft did not respond to follow-up questions on the remark.


This content originally appeared on ProPublica and was authored by by Renee Dudley, with research by Doris Burke.

]]>
https://www.radiofree.org/2025/07/15/a-little-known-microsoft-program-could-expose-the-defense-department-to-chinese-hackers/feed/ 0 544436
How live TV technology changes have opened up remote areas of Fiji https://www.radiofree.org/2025/07/08/how-live-tv-technology-changes-have-opened-up-remote-areas-of-fiji/ https://www.radiofree.org/2025/07/08/how-live-tv-technology-changes-have-opened-up-remote-areas-of-fiji/#respond Tue, 08 Jul 2025 06:57:22 +0000 https://asiapacificreport.nz/?p=117154 By Anish Chand in Suva

How Pacific live media communications have changed in the past 21 years.

In May 2004, the live broadcast of Ratu Sir Kamisese Mara’s funeral from Lau required a complex and resource-intensive setup.

Fiji TV relied on assistance from TVNZ, deploying a portable satellite installation to transmit signals from Lau to a satellite up in the sky, then to Auckland, back to another satellite, and finally down to Suva.

This set-up required approval from FINTEL.

This intricate process underscored the technological limitations of the time, where live coverage from remote Fiji areas demanded significant logistical coordination and international support.

Fast forward to 2025, 21 years later, and the communication and media landscape in Fiji has undergone a remarkable transformation.

Today, I see video production houses, TV stations, radio stations, and newspaper media outlets delivering live coverage directly from Lau.

This shows how high-speed internet, mobile networks, and portable streaming devices like Starlink has eliminated the need for cumbersome satellite relays. No approval from any authority.

Where once international partnerships were essential, today’s media teams in Fiji can operate independently, delivering seamless live coverage of cultural, political, and social events from even the most isolated areas.

Republished from Fiji Times managing digital editor Anish Chand’s social media post with permission. He is a former Fiji TV news operations manager.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2025/07/08/how-live-tv-technology-changes-have-opened-up-remote-areas-of-fiji/feed/ 0 543381
Guam nuclear radiation survivors ‘heartbroken’ over exclusion from compensation bill https://www.radiofree.org/2025/07/04/guam-nuclear-radiation-survivors-heartbroken-over-exclusion-from-compensation-bill/ https://www.radiofree.org/2025/07/04/guam-nuclear-radiation-survivors-heartbroken-over-exclusion-from-compensation-bill/#respond Fri, 04 Jul 2025 06:58:38 +0000 https://asiapacificreport.nz/?p=117022 By Caleb Fotheringham, RNZ Pacific journalist

People on Guam are “disappointed” and “heartbroken” that radiation exposure compensation is not being extended to them, says the president of the Pacific Association for Radiation Survivors (PARS), Robert Celestial.

He said they were disappointed for many reasons.

“Congress seems to not understand that we are no different than any state,” he told RNZ Pacific.

“We are human beings, we are affected in the same way they are. We are suffering the same way, we are greatly disappointed, heartbroken,” Celestial said.

The extension to the United States Radiation Exposure Compensation Act (RECA) was part of Trump’s “big, beautiful bill” passed by Congress on Friday (Thursday, Washington time).

Downwind compensation eligibility would extend to the entire states of Utah, Idaho and New Mexico, but Guam – which was included in an earlier version of the bill – was excluded.

All claimants are eligible for US$100,000.

Attempt at amendment
Guam Republican congressman James Moylan attempted to make an amendment to include Guam before the bill reached the House floor earlier in the week.

“Guam has become a forgotten casualty of the nuclear era,” Moylan told the House Rules Committee.

“Federal agencies have confirmed that our island received measurable radiation exposure as a result of US nuclear testing in the Pacific and yet, despite this clear evidence, Guam remains excluded from RECA, a program that was designed specifically to address the harm caused by our nation’s own policies.

“Guam is not asking for special treatment we are asking to be treated with dignity equal to the same recognition afforded to other downwind communities across our nation.”

Moylan said his constituents are dying from cancers linked to radiation exposure.

From 1946 to 1962, 67 nuclear bombs were detonated in the Marshall Islands, just under 2000 kilometres from Guam.

New Mexico Democratic congresswoman Teresa Leger Fernández supported Moylan, who said it was “sad Guam and other communities were not included”.

Colorado, Montana excluded
The RECA extension also excluded Colorado and Montana; Idaho was also for a time but this was amended.

Pacific Association for Radiation Survivors (PARS) members at a gathering. Founder/Atomic Veteran Robert Celestial(holding book)
Pacific Association for Radiation Survivors (PARS) members at a gathering . . . “heartbroken” that radiation exposure compensation is not being extended to them. Image: RNZ Pacific/Eleisha Foon

Celestial said he had heard different rumours about why Guam was not included but nothing concrete.

“A lot of excuses were saying that it’s going to cost too much. You know, Guam is going to put a burden on finances.”

But Celestial said the cost estimate from the Congressional Budget Office for Guam to be included was US$560 million while Idaho was $1.4 billion.

“[Money] can’t be the reason that Guam got kicked out because we’re the lowest on the totem pole for the amount of money it’s going to cost to get us through in the bill.”

Certain zip codes
The bill also extends to communities in certain zip codes in Missouri, Tennessee, Kentucky, and Alaska, who were exposed to nuclear waste.

Celestial said it’s taken those states 30 years to be recognised and expects Guam to be eventually paid.

He said Moylan would likely now submit a standalone bill with the other states that were not included.

If that fails, he said Guam could be included in nuclear compensation through the National Defense Authorization Act in December, which is for military financial support.

The RECA extension includes uranium workers employed from 1 January 1942 to 31 December 1990.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/07/04/guam-nuclear-radiation-survivors-heartbroken-over-exclusion-from-compensation-bill/feed/ 0 542848
Tonga cybersecurity attack wake-up call for Pacific, warns expert https://www.radiofree.org/2025/07/02/tonga-cybersecurity-attack-wake-up-call-for-pacific-warns-expert/ https://www.radiofree.org/2025/07/02/tonga-cybersecurity-attack-wake-up-call-for-pacific-warns-expert/#respond Wed, 02 Jul 2025 05:32:46 +0000 https://asiapacificreport.nz/?p=116903 By Teuila Fuatai, RNZ Pacific senior journalist

A Tongan cybersecurity expert says the country’s health data hack is a “wake-up call” for the whole region.

Siosaia Vaipuna, a former director of Tonga’s cybersecurity agency, spoke to RNZ Pacific in the wake of the June 15 cyberattack on the country’s Health Ministry.

Vaipuna said Tonga and other Pacific nations were vulnerable to data breaches due to the lack of awareness and cybersecurity systems in the region.

“There’s increasing digital connectivity in the region, and we’re sort of . . . the newcomers to the internet,” he said.

“I think the connectivity is moving faster than the online safety awareness activity [and] that makes not just Tonga, but the Pacific more vulnerable and targeted.”

Since the data breach, the Tongan government has said “a small amount” of information from the attack was published online. This included confidential information, it said in a statement.

Reporting on the attack has also attributed the breach to the group Inc Ransomware.

Vaipuna said the group was well-known and had previously focused on targeting organisations in Europe and the US.

New Zealand attack
However, earlier this month, it targeted the Waiwhetū health organisation in Aotearoa New Zealand. That attack reportedly included the theft of patient consent forms and education and training data.

“This type of criminal group usually employs a double-extortion tactic,” Vaipuna said.

It could encrypt data and then demand money to decrypt, he said.

“The other ransom is where they are demanding payment so that they don’t release the information that they hold to the public or sell it on to other cybercriminals.”

In the current Tonga cyberattack, media reports say that Inc Ransomware wanted a ransom of US$1 million for the information it accessed. The Tongan government has said it has not paid anything.

Vaipuna said more needed to be done to raise awareness in the region around cybersecurity and online safety systems, particularly among government departments.

“I think this is a wake-up call. The cyberattacks are not just happening in movies or on the news or somewhere else, they are actually happening right on our doorstep and impacting on our people.

Extra vigilance warning
“And the right attention and resources should rightfully be allocated to the organisations and to teams that are tasked with dealing with cybersecurity matters.”

The Tongan government has also warned people to be extra vigilant when online.

It said more information accessed in the cyberattack may be published online, and that may include patient information and medical records.

“Our biggest concern is for vulnerable groups of people who are most acutely impacted by information breaches of this kind,” the government said.

It said that it would contact these people directly.

The country’s ongoing response was also being aided by experts from Australia’s special cyberattack team.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/07/02/tonga-cybersecurity-attack-wake-up-call-for-pacific-warns-expert/feed/ 0 542358
Insufficient Press Coverage of Big Data Surveillance https://www.radiofree.org/2025/06/26/insufficient-press-coverage-of-big-data-surveillance/ https://www.radiofree.org/2025/06/26/insufficient-press-coverage-of-big-data-surveillance/#respond Thu, 26 Jun 2025 20:13:35 +0000 https://dissidentvoice.org/?p=159467 As the second Trump administration is dispatching its minions to stalk US streets, smashing citizens’ First Amendment rights, in partnership with unregulated Big Tech, it also surveils online, helping itself to citizens’ personal identifiable information (PII). In the age of surveillance capitalism, information is a hot commodity for corporations and governments, precipitating a multi-billion-dollar industry […]

The post Insufficient Press Coverage of Big Data Surveillance first appeared on Dissident Voice.]]>
As the second Trump administration is dispatching its minions to stalk US streets, smashing citizens’ First Amendment rights, in partnership with unregulated Big Tech, it also surveils online, helping itself to citizens’ personal identifiable information (PII).

In the age of surveillance capitalism, information is a hot commodity for corporations and governments, precipitating a multi-billion-dollar industry that not only profits from the collection and commodification of citizens’ PII, but also puts individuals, businesses, organizations, and governments at risk for cyberattacks and data theft.

Social security numbers, location details, health information, student loan and financial data, purchasing habits, library borrowing and internet browsing history, and political and religious affiliations are just some of the personal information that data brokers buy and sell to advertisers, banks, insurance companies, mortgage brokers, law enforcement and government agencies, foreign agents, and even spammers, scammers, and stalkers. Over time, that information often ends up changing hands again and again.

As an example, and to the alarm of civil liberties experts, the Airlines Reporting Corporation (ARC), “a shady data broker” owned by at least eight US-based commercial airlines, including Delta, American, and United, has been collecting US travelers’ domestic flight records and selling them to Customs and Border Protection, and the Department of Homeland Security; and as part of the deal, government officials are forbidden to reveal how ARC sourced the flight data.

Online users should know that many data brokers camp out on Facebook and at Google’s advertising exchange, drawing from such sources as credit card transactions, frequent shopper loyalty programs, bankruptcy filings, vehicle registration records, employment records, military service, and social media posting and web tracking data harvested from websites, apps, and mobile and wearable biometric devices to “craft customized lists of potential targets.” Even when gathered data is de-identified, privacy experts warn that this is not an irreversible process, and the risk of re-identifying individuals is both real and underestimated.

Government’s misuse and abuse of citizens’ privacy

Many Americans do not realize that the United States is one of the few advanced economies without a federal data protection agency. If the current administration continues on its path of eroding citizen privacy, the scant statutory protections the United States does have may prove meaningless.

The Fair Credit Reporting Act (FCRA) of 1970 was enacted to protect consumers from government overreach into personal identifiable data, and has been promoted as the primary consumer privacy protection. However, in 2023, attorney and internet privacy advocate Lauren Harriman warned how data brokers circumvent the FCRA, for instance, “pay[ing] handsome sums to your utility company for your name and address.” Data brokers then repackage those names and addresses with other data, without conducting any type of accuracy analysis on the newly formed dataset, before then selling that new dataset to the highest third-party bidder.

Invasion of the data snatchers

Though the “gut-the-government bromance” between the president and Elon Musk appears to be on the rocks just six months into Trump 2.0, the Department of Government Efficiency’s unfettered access to data is concerning, especially after the June 6, 2025, Supreme Court ruling that gave the Musk-led DOGE complete access to confidential Social Security information irrespective of the privacy rights once upheld by the Social Security Act of 1935. The act prohibits the disclosure of any tax return in whole or in part by officers or employees of the Social Security Administration and the Department of Health and Human Services.

Nevertheless, DOGE has commandeered the Social Security Administration (SSA) and Department of Health and Human Services systems and those of at least fifteen other federal agencies containing Americans’ personal identifiable information without disclosing “what data has been accessed, who has that access, how it will be used or transferred, or what safeguards are in place for its use.”

Since DOGE infiltrated the Social Security Administration, the agency’s website has crashed numerous times, creating interruptions for beneficiaries. In June, Senators Elizabeth Warren and Ron Wyden issued a letter to the SSA’s commissioner, detailing their concerns about DOGE’s use of PII. Warren told Wired that “DOGE staffers hacking away Social Security’s backend tech with no safeguards is a recipe for disaster…[and] risks people’s private data, creates security gaps, and could result in catastrophic cuts to all benefits.”

Likewise, the Internal Revenue Code of 1939 (updated in 1986) was enacted to ensure data protection, prohibiting—with rare exceptions—the release of taxpayer information by Internal Revenue Service employees. According to the national legal organization Democracy Forward, “Changes to IRS data practices—at the behest of DOGE—throw into question those assurances and the confidentiality of data held by the government collected from hundreds of millions of Americans.”

Equally troubling is that Opexus, a private equity-owned federal contractor, maintains the IRS database. Worse still is that two Opexus employees—twin brothers and skilled hackers with prison records for stealing and selling PII on the dark web—Suhaib and Muneeb Akhter, had access to the IRS data, as well as to that of the Department of Energy, Defense Department, and the Department of Homeland Security’s Office of Inspector General.

In February 2025, approximately one year into their Opexus employment, the twins were summoned to a virtual meeting with human resources and fired. During that meeting, Muneeb Akhter, who still had clearance to use the servers, accessed an IRS database from his company-issued laptop and blocked others from connecting to it. While still in the meeting, Akhter deleted thirty-three other databases, and about an hour later, “inserted a USB drive into his laptop and removed 1,805 files of data related to a ‘custom project’ for a government agency,” causing service disruptions.

That investigations by the FBI and other federal law enforcement agencies are underway does little to quell concerns about the insecurity of personal identifiable information and sensitive national security data. And although the Privacy Act of 1974, the Fourth Amendment, the Fifth Amendment, and the Computer Fraud and Abuse Act of 1986 were all established to protect PII, the June Supreme Court ruling granting DOGE carte blanche data access dashes all confidence that laws will be upheld.

Americans don’t know what they don’t know

Perhaps most disconcerting in this whole scenario is that too few citizens realize just how far their online footprints travel and how vulnerable their private information actually is. According to internet culture reporter Kate Lindsay, citizen ignorance comes not only from a lack of reporting on how tech elites pull government strings to their own advantage, but also from fewer corporate news outlets covering people living with the consequences of those power moves. Internet culture and tech, once intertwined topics for the establishment press, are now more separately focused on either AI or the Big Tech power players, but not on holding them to account.

The Tech Policy Press argues that the government’s self-proclaimed need for expediency and efficiency cannot justify flouting data privacy policies and laws, and that the corporate media is largely failing their audiences by not publicizing the specifics of how the government and its corporate tech partners are obliterating citizens’ privacy rights. “To make matters worse, Congress has been asleep at the switch while the federal government has expanded the security state and private companies have run amok in storing and selling our data,” stated the senator from Silicon Valley, Ro Khanna.

A 2023 Pew Research Center survey of Americans’ views on data privacy found that approximately six in ten Americans do not bother to read website and application policies. When online, most users click “agree” without reading the relevant terms and conditions they accept by doing so. According to the survey, Americans of all political stripes are equally distrustful of government and corporations when it comes to  how third parties use their PII. Respondents with some higher education reported taking more online privacy precautions than those who never attended college. The latter reported a stronger belief that government and corporations would “do the right thing” with their data. The least knowledgeable respondents were also the least skeptical, pointing to an urgent need for critical information literacy and digital hygiene skills.

Exploitation of personal identifiable information

After Musk’s call to “delete” the Consumer Financial Protection Bureau (CFPB), approximately 1,400 staff members were fired in April, emptying out the agency that was once capable of policing Wall Street and Big Tech. Now, with the combined forces of government and Big Tech, and their sharing of database resources, the government can conduct intrusive surveillance on almost anyone, without court oversight or public debate. The Project on Government Oversight has argued that the US Constitution was meant to protect the population from authoritarian-style government monitoring, warning that these maneuvers are incompatible with a free society.

On May 15, 2025, the CFPB, against the better judgment of the ​​Committee on Oversight and Government Reform and wider public, quietly withdrew a rule, proposed in 2024, that would have imposed limits on US-based data brokers who buy and sell Americans’ private information. Had the rule been enacted, it would have expanded the Fair Credit Reporting Act (FCRA) data protections for citizens. However, in February, Russell Vought, the self-professed White nationalist and Trump 2.0 acting director of the Office of Management and Budget and the CFPB, demanded its withdrawal, alleging the ruling would have infringed on financial institutions’ capabilities to detect and prevent fraud. Vought also instructed employees to cease all public communications, pending investigations, and proposed or previously implemented rules, including the proposal titled “Protecting Americans from Harmful Data Broker Practices.”

The now-gutted CFPB lacks both the resources and authority needed to police the widespread exploitation of consumers’ personal information, says the Electronic Privacy Information Center, the privacy rights advocacy agency.

Double standards for data privacy

Although the government’s collection of PII has always been a double-edged sword, with Big Tech on the side of Trump 2.0, data surveillance of law-abiding citizens has soared to worrying heights. Across every presidency since 9/11, government surveillance has become increasingly more extensive and elaborate. Moreover, Big Tech is all too willing to pledge allegiance to whichever party happens to be in power. According to investigative journalist Dell Cameron, the US Defense Intelligence Agency, Defense Counterintelligence and Security Agency, and Customs and Border Protection are among the largest “federal agencies known to purchase Americans’ private data, including that which law enforcement agencies would normally require probable cause to obtain.”

Meanwhile, it’s a Big Tech and data broker free-for-all. DOGE’s and the feds’ activities are shrouded in secrecy, often facilitated by the Big Tech lobbying money that seeks to replace legitimate privacy laws with “fake industry alternatives.” Banks, credit agencies, and tech companies must adhere to consumer privacy laws. “Yet DOGE has been granted sweeping access across federal agencies—with no equivalent restrictions,” said business reporter Susie Stulz.

Know your risks

Interpol has warned that scams known as “pig butchering” and “business email compromise” and those used for human trafficking are on the rise due to an increase in the use of new technologies, including apps, AI deepfakes, and cryptocurrencies. Hacking agents, humans, and bots are becoming more sophisticated, while any semblance of data privacy guardrails for citizens has been removed.

Individual choices matter. At minimum, when using technology, consider if a website or app’s services are so badly needed or wanted that you are willing to give up your personal identifiable information. Standard advice to delete and block phishing and spam emails and texts remains apropos, but only scratches the surface of online protection.

Privacy advocates assert that DOGE’s access to personal identifiable information escalates the risk of exposure to hackers and foreign adversaries as well as to widespread domestic surveillance. Trump’s latest contract with tech giant Palantir to create a national database of Americans’ private information raises a big red flag for civil rights organizations, “that this could be the precursor to surveillance of Americans on a mass scale.” Palantir’s involvement in government portends to be the last step “in transforming America from a constitutional republic into a digital dictatorship armed with algorithms and powered by unaccountable, all-seeing artificial intelligence,” wrote constitutional law and human rights attorney John W. Whitehead.

A longtime J.D. Vance financial backer, Palantir’s Peter Thiel, the South African, White nationalist billionaire and right-wing donor, is credited with catapulting Vance’s political career. Unsurprisingly, the Free Thought Project reported that since Trump’s return to the White House, “Palantir has racked up over $100 million in government contracts, and is slated to strike a nearly $800 million deal with the Pentagon.” Palantir, incidentally, is also contracted with the Israeli government, as is Google.

Know your rights

The right to privacy is enshrined in Article 12 of the 1948 Universal Declaration of Human Rights. “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.” Article 17 of the 1966 International Covenant on Civil and Political Rights asserts the same, and in 1992, the United States ratified the treaty, thereby consenting to its binding terms.

But is privacy actually a protected civil right in the United States? According to legal scholars Anita Allen and Christopher Muhawe, the history of US civil rights law shows limited support for conceptualizing privacy and data protection as a civil right. Nonetheless, civil rights law is a dynamic moral, political, and legal concept, and if privacy is interpreted as a civil right, privacy protection becomes a fundamental requirement of justice and good government.

Protection from surveillance needs to be top-down through legal and policy limits on data collection, and bottom-up by putting technological control of personal data into the hands of consumers, i.e., the targets of surveillance.

As long as the public is uninformed and the corporate press remains all but silent, the more likely it is that these unconstitutional practices will not only continue but will become normalized. Until the United States is actually governed by and for the people, we the people can start practicing surveillance self-defense now. Although constitutional lawyers are typically considered the first responders to assaults on the Constitution and privacy rights, a constellation of efforts over time is required to, as much as possible, keep private data private.

Ultimately, though, the safeguarding of data cannot be left to the government or corporations, or even the lawyers. For that reason, the Electronic Frontier Foundation’s tips and tools for customizing individualized digital security plans are made available to everyone. By implementing such plans and possessing strong critical media and digital literacy skills, civil society will be better informed and more empowered in the defense of privacy rights.

The post Insufficient Press Coverage of Big Data Surveillance first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Mischa Geracoulis.

]]>
https://www.radiofree.org/2025/06/26/insufficient-press-coverage-of-big-data-surveillance/feed/ 0 541354
Insufficient Press Coverage of Big Data Surveillance https://www.radiofree.org/2025/06/26/insufficient-press-coverage-of-big-data-surveillance-2/ https://www.radiofree.org/2025/06/26/insufficient-press-coverage-of-big-data-surveillance-2/#respond Thu, 26 Jun 2025 20:13:35 +0000 https://dissidentvoice.org/?p=159467 As the second Trump administration is dispatching its minions to stalk US streets, smashing citizens’ First Amendment rights, in partnership with unregulated Big Tech, it also surveils online, helping itself to citizens’ personal identifiable information (PII). In the age of surveillance capitalism, information is a hot commodity for corporations and governments, precipitating a multi-billion-dollar industry […]

The post Insufficient Press Coverage of Big Data Surveillance first appeared on Dissident Voice.]]>
As the second Trump administration is dispatching its minions to stalk US streets, smashing citizens’ First Amendment rights, in partnership with unregulated Big Tech, it also surveils online, helping itself to citizens’ personal identifiable information (PII).

In the age of surveillance capitalism, information is a hot commodity for corporations and governments, precipitating a multi-billion-dollar industry that not only profits from the collection and commodification of citizens’ PII, but also puts individuals, businesses, organizations, and governments at risk for cyberattacks and data theft.

Social security numbers, location details, health information, student loan and financial data, purchasing habits, library borrowing and internet browsing history, and political and religious affiliations are just some of the personal information that data brokers buy and sell to advertisers, banks, insurance companies, mortgage brokers, law enforcement and government agencies, foreign agents, and even spammers, scammers, and stalkers. Over time, that information often ends up changing hands again and again.

As an example, and to the alarm of civil liberties experts, the Airlines Reporting Corporation (ARC), “a shady data broker” owned by at least eight US-based commercial airlines, including Delta, American, and United, has been collecting US travelers’ domestic flight records and selling them to Customs and Border Protection, and the Department of Homeland Security; and as part of the deal, government officials are forbidden to reveal how ARC sourced the flight data.

Online users should know that many data brokers camp out on Facebook and at Google’s advertising exchange, drawing from such sources as credit card transactions, frequent shopper loyalty programs, bankruptcy filings, vehicle registration records, employment records, military service, and social media posting and web tracking data harvested from websites, apps, and mobile and wearable biometric devices to “craft customized lists of potential targets.” Even when gathered data is de-identified, privacy experts warn that this is not an irreversible process, and the risk of re-identifying individuals is both real and underestimated.

Government’s misuse and abuse of citizens’ privacy

Many Americans do not realize that the United States is one of the few advanced economies without a federal data protection agency. If the current administration continues on its path of eroding citizen privacy, the scant statutory protections the United States does have may prove meaningless.

The Fair Credit Reporting Act (FCRA) of 1970 was enacted to protect consumers from government overreach into personal identifiable data, and has been promoted as the primary consumer privacy protection. However, in 2023, attorney and internet privacy advocate Lauren Harriman warned how data brokers circumvent the FCRA, for instance, “pay[ing] handsome sums to your utility company for your name and address.” Data brokers then repackage those names and addresses with other data, without conducting any type of accuracy analysis on the newly formed dataset, before then selling that new dataset to the highest third-party bidder.

Invasion of the data snatchers

Though the “gut-the-government bromance” between the president and Elon Musk appears to be on the rocks just six months into Trump 2.0, the Department of Government Efficiency’s unfettered access to data is concerning, especially after the June 6, 2025, Supreme Court ruling that gave the Musk-led DOGE complete access to confidential Social Security information irrespective of the privacy rights once upheld by the Social Security Act of 1935. The act prohibits the disclosure of any tax return in whole or in part by officers or employees of the Social Security Administration and the Department of Health and Human Services.

Nevertheless, DOGE has commandeered the Social Security Administration (SSA) and Department of Health and Human Services systems and those of at least fifteen other federal agencies containing Americans’ personal identifiable information without disclosing “what data has been accessed, who has that access, how it will be used or transferred, or what safeguards are in place for its use.”

Since DOGE infiltrated the Social Security Administration, the agency’s website has crashed numerous times, creating interruptions for beneficiaries. In June, Senators Elizabeth Warren and Ron Wyden issued a letter to the SSA’s commissioner, detailing their concerns about DOGE’s use of PII. Warren told Wired that “DOGE staffers hacking away Social Security’s backend tech with no safeguards is a recipe for disaster…[and] risks people’s private data, creates security gaps, and could result in catastrophic cuts to all benefits.”

Likewise, the Internal Revenue Code of 1939 (updated in 1986) was enacted to ensure data protection, prohibiting—with rare exceptions—the release of taxpayer information by Internal Revenue Service employees. According to the national legal organization Democracy Forward, “Changes to IRS data practices—at the behest of DOGE—throw into question those assurances and the confidentiality of data held by the government collected from hundreds of millions of Americans.”

Equally troubling is that Opexus, a private equity-owned federal contractor, maintains the IRS database. Worse still is that two Opexus employees—twin brothers and skilled hackers with prison records for stealing and selling PII on the dark web—Suhaib and Muneeb Akhter, had access to the IRS data, as well as to that of the Department of Energy, Defense Department, and the Department of Homeland Security’s Office of Inspector General.

In February 2025, approximately one year into their Opexus employment, the twins were summoned to a virtual meeting with human resources and fired. During that meeting, Muneeb Akhter, who still had clearance to use the servers, accessed an IRS database from his company-issued laptop and blocked others from connecting to it. While still in the meeting, Akhter deleted thirty-three other databases, and about an hour later, “inserted a USB drive into his laptop and removed 1,805 files of data related to a ‘custom project’ for a government agency,” causing service disruptions.

That investigations by the FBI and other federal law enforcement agencies are underway does little to quell concerns about the insecurity of personal identifiable information and sensitive national security data. And although the Privacy Act of 1974, the Fourth Amendment, the Fifth Amendment, and the Computer Fraud and Abuse Act of 1986 were all established to protect PII, the June Supreme Court ruling granting DOGE carte blanche data access dashes all confidence that laws will be upheld.

Americans don’t know what they don’t know

Perhaps most disconcerting in this whole scenario is that too few citizens realize just how far their online footprints travel and how vulnerable their private information actually is. According to internet culture reporter Kate Lindsay, citizen ignorance comes not only from a lack of reporting on how tech elites pull government strings to their own advantage, but also from fewer corporate news outlets covering people living with the consequences of those power moves. Internet culture and tech, once intertwined topics for the establishment press, are now more separately focused on either AI or the Big Tech power players, but not on holding them to account.

The Tech Policy Press argues that the government’s self-proclaimed need for expediency and efficiency cannot justify flouting data privacy policies and laws, and that the corporate media is largely failing their audiences by not publicizing the specifics of how the government and its corporate tech partners are obliterating citizens’ privacy rights. “To make matters worse, Congress has been asleep at the switch while the federal government has expanded the security state and private companies have run amok in storing and selling our data,” stated the senator from Silicon Valley, Ro Khanna.

A 2023 Pew Research Center survey of Americans’ views on data privacy found that approximately six in ten Americans do not bother to read website and application policies. When online, most users click “agree” without reading the relevant terms and conditions they accept by doing so. According to the survey, Americans of all political stripes are equally distrustful of government and corporations when it comes to  how third parties use their PII. Respondents with some higher education reported taking more online privacy precautions than those who never attended college. The latter reported a stronger belief that government and corporations would “do the right thing” with their data. The least knowledgeable respondents were also the least skeptical, pointing to an urgent need for critical information literacy and digital hygiene skills.

Exploitation of personal identifiable information

After Musk’s call to “delete” the Consumer Financial Protection Bureau (CFPB), approximately 1,400 staff members were fired in April, emptying out the agency that was once capable of policing Wall Street and Big Tech. Now, with the combined forces of government and Big Tech, and their sharing of database resources, the government can conduct intrusive surveillance on almost anyone, without court oversight or public debate. The Project on Government Oversight has argued that the US Constitution was meant to protect the population from authoritarian-style government monitoring, warning that these maneuvers are incompatible with a free society.

On May 15, 2025, the CFPB, against the better judgment of the ​​Committee on Oversight and Government Reform and wider public, quietly withdrew a rule, proposed in 2024, that would have imposed limits on US-based data brokers who buy and sell Americans’ private information. Had the rule been enacted, it would have expanded the Fair Credit Reporting Act (FCRA) data protections for citizens. However, in February, Russell Vought, the self-professed White nationalist and Trump 2.0 acting director of the Office of Management and Budget and the CFPB, demanded its withdrawal, alleging the ruling would have infringed on financial institutions’ capabilities to detect and prevent fraud. Vought also instructed employees to cease all public communications, pending investigations, and proposed or previously implemented rules, including the proposal titled “Protecting Americans from Harmful Data Broker Practices.”

The now-gutted CFPB lacks both the resources and authority needed to police the widespread exploitation of consumers’ personal information, says the Electronic Privacy Information Center, the privacy rights advocacy agency.

Double standards for data privacy

Although the government’s collection of PII has always been a double-edged sword, with Big Tech on the side of Trump 2.0, data surveillance of law-abiding citizens has soared to worrying heights. Across every presidency since 9/11, government surveillance has become increasingly more extensive and elaborate. Moreover, Big Tech is all too willing to pledge allegiance to whichever party happens to be in power. According to investigative journalist Dell Cameron, the US Defense Intelligence Agency, Defense Counterintelligence and Security Agency, and Customs and Border Protection are among the largest “federal agencies known to purchase Americans’ private data, including that which law enforcement agencies would normally require probable cause to obtain.”

Meanwhile, it’s a Big Tech and data broker free-for-all. DOGE’s and the feds’ activities are shrouded in secrecy, often facilitated by the Big Tech lobbying money that seeks to replace legitimate privacy laws with “fake industry alternatives.” Banks, credit agencies, and tech companies must adhere to consumer privacy laws. “Yet DOGE has been granted sweeping access across federal agencies—with no equivalent restrictions,” said business reporter Susie Stulz.

Know your risks

Interpol has warned that scams known as “pig butchering” and “business email compromise” and those used for human trafficking are on the rise due to an increase in the use of new technologies, including apps, AI deepfakes, and cryptocurrencies. Hacking agents, humans, and bots are becoming more sophisticated, while any semblance of data privacy guardrails for citizens has been removed.

Individual choices matter. At minimum, when using technology, consider if a website or app’s services are so badly needed or wanted that you are willing to give up your personal identifiable information. Standard advice to delete and block phishing and spam emails and texts remains apropos, but only scratches the surface of online protection.

Privacy advocates assert that DOGE’s access to personal identifiable information escalates the risk of exposure to hackers and foreign adversaries as well as to widespread domestic surveillance. Trump’s latest contract with tech giant Palantir to create a national database of Americans’ private information raises a big red flag for civil rights organizations, “that this could be the precursor to surveillance of Americans on a mass scale.” Palantir’s involvement in government portends to be the last step “in transforming America from a constitutional republic into a digital dictatorship armed with algorithms and powered by unaccountable, all-seeing artificial intelligence,” wrote constitutional law and human rights attorney John W. Whitehead.

A longtime J.D. Vance financial backer, Palantir’s Peter Thiel, the South African, White nationalist billionaire and right-wing donor, is credited with catapulting Vance’s political career. Unsurprisingly, the Free Thought Project reported that since Trump’s return to the White House, “Palantir has racked up over $100 million in government contracts, and is slated to strike a nearly $800 million deal with the Pentagon.” Palantir, incidentally, is also contracted with the Israeli government, as is Google.

Know your rights

The right to privacy is enshrined in Article 12 of the 1948 Universal Declaration of Human Rights. “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.” Article 17 of the 1966 International Covenant on Civil and Political Rights asserts the same, and in 1992, the United States ratified the treaty, thereby consenting to its binding terms.

But is privacy actually a protected civil right in the United States? According to legal scholars Anita Allen and Christopher Muhawe, the history of US civil rights law shows limited support for conceptualizing privacy and data protection as a civil right. Nonetheless, civil rights law is a dynamic moral, political, and legal concept, and if privacy is interpreted as a civil right, privacy protection becomes a fundamental requirement of justice and good government.

Protection from surveillance needs to be top-down through legal and policy limits on data collection, and bottom-up by putting technological control of personal data into the hands of consumers, i.e., the targets of surveillance.

As long as the public is uninformed and the corporate press remains all but silent, the more likely it is that these unconstitutional practices will not only continue but will become normalized. Until the United States is actually governed by and for the people, we the people can start practicing surveillance self-defense now. Although constitutional lawyers are typically considered the first responders to assaults on the Constitution and privacy rights, a constellation of efforts over time is required to, as much as possible, keep private data private.

Ultimately, though, the safeguarding of data cannot be left to the government or corporations, or even the lawyers. For that reason, the Electronic Frontier Foundation’s tips and tools for customizing individualized digital security plans are made available to everyone. By implementing such plans and possessing strong critical media and digital literacy skills, civil society will be better informed and more empowered in the defense of privacy rights.

The post Insufficient Press Coverage of Big Data Surveillance first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Mischa Geracoulis.

]]>
https://www.radiofree.org/2025/06/26/insufficient-press-coverage-of-big-data-surveillance-2/feed/ 0 541355
How Foreign Scammers Use U.S. Banks to Fleece Americans https://www.radiofree.org/2025/06/25/how-foreign-scammers-use-u-s-banks-to-fleece-americans/ https://www.radiofree.org/2025/06/25/how-foreign-scammers-use-u-s-banks-to-fleece-americans/#respond Wed, 25 Jun 2025 09:00:00 +0000 https://www.propublica.org/article/pig-butchering-scam-cybercrime-us-banks-money-laundering by Cezary Podkul

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Brian Maloney Jr. was flummoxed when he was served with a lawsuit against his family’s business, Middlesex Truck and Coach, in January. Maloney and his father, also named Brian, run the operation, located in Boston, which boasts that it can repair anything “from two axles to ten.” A burly man in his mid-50s who wears short-sleeved polo shirts emblazoned with the company name, Maloney Jr. has been around his dad’s shop since he was 8. The garage briefly surfaced in the media in 2012 when then-presidential candidate Mitt Romney made a campaign stop there and the Boston Herald featured Maloney Sr. talking about how he had built the business from nothing in a neighborhood he described as having been a “war zone.”

Now Middlesex was being sued by a New Jersey man who claimed he had been defrauded of $133,565 in a cryptocurrency scheme. The suit claimed Middlesex “controlled and maintained” a bank account at Chase that had been used to collect the fraudulent payment. The purported victim wanted his money back.

None of this made any sense to Maloney Jr. His company did not have an account at Chase, and he barely knew what crypto was. “For God’s sake, we fix trucks and still have AOL,” he would later say.

It was only after Maloney went to Chase to investigate that he was able to piece together at least part of the explanation. It turned out that Chase had allowed an unknown individual, who applied online with no identification, to open an account under Middlesex’s name, according to information Chase provided to Maloney. The account was then used to solicit hundreds of thousands of dollars from fraud victims, including the $133,565 from the man who was now trying to reclaim his funds.

Middlesex’s experience, as bizarre as it seems, is part of a global problem that plagues the banking industry. The account falsely opened in Middlesex’s name, and many others like it, are way stations in a sophisticated multistep money laundering process that transports cash from U.S. scam victims to crime syndicate bosses in Asia.

There’s been an explosion in international online fraud in recent years. Particularly widespread are “pig-butchering” schemes, as ProPublica reported in 2022. The macabre name derives from the process of methodically “fattening” victims by getting them to contribute more and more money to an investment scheme that seems to be succeeding, before eventually “butchering” them by taking all their deposits. Often operated by Chinese gangs out of prison-like compounds in Cambodia, Laos and Myanmar, pig-butchering in that region has reached a staggering $44 billion per year, according to a report by the United States Institute of Peace, and it likely involves millions of victims worldwide. The report called the Southeast Asian scam syndicates the “most powerful criminal network of the modern era.”

A huge portion of such fraud is transacted in cryptocurrency. But given that the typical consumer doesn’t own crypto, many scams unfold with a victim tapping a traditional bank account to wire dollars to swindlers, who receive the funds in their own accounts, then convert them into crypto to move across borders. Later in the process, the scammers will typically transfer their crypto back into standard currency.

Bank accounts are so crucial to this process that a thriving international black market has developed to rent accounts for fraud. That, it seems, is how a Chase account in the name of Middlesex ended up as a repository for the proceeds of pig-butchering.

The huge demand for accounts used for misbehavior gives banks a crucial, and not always welcome, role as gatekeepers — a responsibility required by U.S. law — to prevent criminals from opening accounts or engaging in money laundering. Yet from the U.S. to Singapore, Australia and Hong Kong, banks have consistently failed at that responsibility, according to experts who have investigated money laundering, as well as reviews of fraudulent account details shared by victims and court cases reviewed by ProPublica. The list of financial institutions whose accounts pig-butchering scammers have made use of includes global behemoths like Bank of America, Chase, Citibank, HSBC and Wells Fargo and many other U.S. and foreign lenders.

The banks said in statements to ProPublica that they make extensive efforts to fight fraud by investing in systems to detect suspicious activity and to report it to authorities (read the banks’ statements here). The American Bankers Association, which represents the industry, acknowledged that “with more than 140 million bank accounts opened every year bad actors can sometimes get through despite determined and ongoing efforts to stop them.” But the group said other industries like telecommunications providers and social media platforms need to do more to fight fraud because there’s only so much that financial institutions can do.

Pig-butchering scams present some unique challenges for banks. Among other things, a customer in thrall to a fraudster will sometimes foil their own bank’s attempts to prevent them from sending money to a criminal. And foreign-based scammers have become adept at finding middlemen in the U.S. to exploit the banking system. “Cyber-enabled fraud operations in Southeast Asia have taken on industrial proportions,” according to an October report by the United Nations Office on Drugs and Crime. John Wojcik, one of the authors of the report, told ProPublica, “Banks have never been targeted at this scale, in these ways.”

It doesn’t help that there are “no real standards as to what a bank has to do for detecting fraud or money laundering,” said Lester Joseph, a financial compliance consultant who used to oversee money laundering cases at the Department of Justice and later worked at Wells Fargo. The main law governing U.S. compliance regimes, the Bank Secrecy Act, requires financial institutions to maintain programs to know their customers and to detect and report suspicious activity to the government. That might mean noticing, say, that a newly opened account is suddenly receiving and sending hundreds of thousands of dollars of wire payments each month.

But it is up to banks to design those programs. The regulations don’t even require that the programs be effective. That gives banks wide flexibility on how much due diligence and monitoring to do — or not do. More scrutiny upfront means slowing down business and adding costs. Many banks don’t ask questions until it’s too late.

If you’re a criminal looking to obtain a bank account with no pesky formalities, it’ll take you only minutes to find one on the messaging app Telegram. Chinese forums there feature ads for “cars” or “fleets” — bank accounts or other online payment platforms that can be used to collect stolen funds. (The vehicle metaphor stems from the fact that in Chinese slang, money laundering operations are known as “motorcades.”) One Telegram ad offered accounts at PNC, Chase, Citi and Bank of America and boasted of “firsthand” control of the accounts: “People can go to the bank to transfer money,” the ad said.

An ad on Telegram, since taken down, offered bank accounts for “precision chat” — slang for pig-butchering — at Bank of America, Chase, Citibank and PNC. Under “advantages,” the ad listed “firsthand [control], people can go to the bank to transfer money … not a virtual account.” (Screenshot by Cezary Podkul)

Another Telegram channel listed various flavors of pig-butchering scams for which it provided bank accounts. The group, named KG Pay, boasted of accepting wire transfers, making withdrawals from U.S. banks and converting deposits into crypto to transfer them to scammers. KG offered to handle deposits of up to $1 million in accounts that imitate “normal business transactions.” To avoid suspicion, KG said, it sliced big amounts into smaller batches. If banks grew suspicious and froze one of its accounts, KG said, it had agents ready to call customer service to persuade them to lift the freeze. For smaller transfers, a video tutorial inside the channel showed how easy it was to send cash using the Chase app. (Telegram deleted the KG Pay channel after ProPublica asked about it. In a statement, Telegram said it “expressly forbids money laundering, scams and fraud and such content is immediately removed whenever discovered. Every month, over 10 million accounts, groups and channels are removed for breaching Telegram’s terms of service — including rules that prohibit money laundering and fraud.”)

Demand for money laundering is huge in Sihanoukville, a seedy gambling hub in Cambodia notorious for hosting massive scam operations. In some hotels above casinos there, blocks of guest rooms have been converted into offices where workers help fraudsters find motorcades to move illicit funds, according to a 2024 report by a doctoral anthropology student.

A walled complex in Sihanoukville, Cambodia, known to have housed scamming operations (Cindy Liu for ProPublica)

Inside those offices, the tap of keyboards and buzz of Telegram notifications suggested a trading floor at a stock exchange. But the work of the people interviewed by Yanyu Chen, the doctoral student, was very different. The workers, all Chinese and speaking on the condition of anonymity, were candid. They said they were tasked with matching cyberscam gangs with providers who could supply them with bank accounts to collect and move proceeds from fraud victims. In Telegram chat groups, the workers could see bank account suppliers and swindlers in need of accounts and would match the two and keep track of trades and commissions.

The business has become so mainstream that even one of Cambodia’s most prominent financial services firms, Huione Group, runs an online marketplace that allegedly facilitates such transactions. Its Telegram channels, including the one that included the aforementioned ad offering “firsthand” control of U.S. bank accounts, have helped launder funds for pig-butchering scams as well as heists linked to North Korea, according to the U.S. Treasury’s Financial Crimes Enforcement Network. (Huione said in a statement that it is working to prevent abuse of its services and is “fully committed to collaborating with the U.S. Treasury Department to address expeditiously any and all concerns.”)

The workers interviewed by Chen were unperturbed about enabling fraud. One described the work as boring, little more than copying and pasting bank account info between scammers and motorcades. Another worker told her that he viewed himself as “solving a very old problem of getting into the banking system people who have long been shut out of it.”

The fraud that ensnared Middlesex Truck and Coach as a tangential victim covered thousands of miles via electronic byways. By all appearances, it emanated from Cambodia, then reached New Jersey, where a mark was persuaded to wire a total of $716,000 to accounts tied to purported businesses in Boston, New York, California, Hong Kong and elsewhere. All but a few appeared to have been incorporated by Chinese individuals, sometimes just days before their accounts started accepting large sums.

The fleecing of Kevin, who ProPublica agreed to identify by first name only, was a textbook example of pig butchering. Kevin had reached the stage in life when he wanted to ease his workload after a varied career as a financial planner, small-business owner and fitness instructor. Just before Christmas 2022, someone purporting to be a San Diego woman named Viktoria Zara friended Kevin on Facebook. She soon introduced him to a sleek crypto trading website called 3A on which she claimed to have made $700,000 on bitcoin futures. (Facebook deactivated Zara’s profile after ProPublica inquired about it, and a spokesperson said the social media company has “detected and disrupted over seven million accounts associated with scam centers” in Asia and the Middle East since the start of 2024.)

Kevin acknowledges he was seduced by the thrall of easy money. “Something came over me,” he said. Kevin accepted Zara’s offer to teach him how to trade and, within a few weeks, he was routinely wiring tens of thousands of dollars to various bank accounts to fund his trading.

The accounts were not registered to 3A. They were listed under a variety of companies he’d never heard of, such as Guangda Logistics and Danco Global.

Kevin found this odd. But Zara, his supposed friend, told him that was just how 3A operated, and Kevin felt safe wiring funds to accounts at Chase because of its size and reputation. Every time he did so, the sum showed up in his online 3A portal, making him think the transactions were real. Better yet, his investments had apparently soared; his account balance now read $1.4 million.

An excerpt from Kevin’s chat log with the purported 3A trading site shows how the scammers, claiming to be customer service reps, directed him to wire funds to companies other than 3A with accounts at Chase. (Courtesy of Kevin. Redacted by ProPublica.)

Like many a pig-butchering victim, Kevin realized something was off only when he went to withdraw his profits and 3A demanded that he first pay a “tax” of almost $134,000. Kevin knew from his financial planning days that wasn’t how things worked. But he set aside his doubts and went to his bank late one afternoon in April 2023 to wire the tax payment. He’d been given a fresh Chase account to send funds to and pressured to wire money within two hours.

This time, his money was addressed to Middlesex Truck and Coach. Kevin was so under the sway of his scammers at that point that he did not question the money’s destination. Nor did the teller at the TD Bank branch he went to. (TD declined to comment on Kevin’s case but said it trains employees to challenge customers when transactions seem suspicious and to warn them never to wire funds to people they do not know.)

As soon as Kevin got home, panic set in: 3A told him the Chase account to which he’d just wired $134,000 was frozen and that his tax payment would not go through. He would need to send another $134,000 to a different account. Confused, Kevin went back to TD first thing the next day and asked the teller to reverse the wire. Over the next two weeks, Kevin said, his bankers at TD called Chase three times but never got a response. (Chase did not answer ProPublica’s questions about Kevin’s efforts to recall his wire but said the wire recall process is challenging and rarely succeeds.)

It is possible to reverse a wire transfer if customers inform their banks quickly, before the transaction has been completed, according to lawyers and experts. But banks have no obligation to reverse a transfer even when a customer reports potential fraud. “It’s really up to the receiving institution if they release the funds and how they go after the customer on their end,” said Saskia Parnell, a banking industry veteran who now volunteers for an anti-scam group called Operation Shamrock.

As Kevin agonized, the 3A customer service reps dangled a solution: Just wire the funds again and unlock your $1.4 million. He feared TD wouldn’t let him send the wire again, so he switched to PNC Bank and sent a fresh $134,000 wire to another recipient at Cathay Bank in California. That yielded yet another tale about a purported government roadblock and the demand for yet another payment.

Kevin wasn’t thinking clearly. His son, who had struggled with substance abuse, had suddenly died of a fentanyl overdose. Kevin was overwhelmed with grief. He agreed to make another payment.

By June 2023, even a call from PNC’s fraud department declining his outgoing wire could not dissuade him. It was the only instance, out of the 11 times he attempted to wire money to scammers, that a bank stopped the transaction, according to Kevin, who did not have a history of making wire payments before. (PNC said in a statement that “we believe we took appropriate action.”)

It made no difference. Kevin’s mind was so clouded that he instead opened a new account at Wells Fargo. The switch illustrated another challenge: Even if one bank succeeds in preventing fraud, criminals can still win if another bank isn’t as diligent. (Wells Fargo said it invests hundreds of millions of dollars a year to fight scams).

After wiring $150,000 from Wells Fargo to two Chinese entities listed at a Singaporean bank, Kevin waited to receive his trading proceeds. But when all that resulted was another request that he wire money — $40,000 this time — Kevin finally grasped reality. He was now without a son, and his finances lay in ruins. “The whole world was coming to an end,” he recalled.

Kevin had preserved enough savings to hire a private investigator, John Powers of Hudson Intelligence, to follow the financial trail. Powers found a litany of red flags among the entities that had gotten bank accounts and received Kevin’s funds. Some of the businesses gave phony addresses, such as a vacant home. Another was registered to a one-bedroom apartment in Los Angeles that was also listed as the headquarters of a dozen other businesses set up since 2022 by different Chinese individuals. Contact info was scarce; official emails for two companies included the temporary email domain “netsmail.us,” which doesn’t connect to a functioning website. All of these ersatz businesses had accounts at Chase, Cathay or Singapore’s DBS Bank.

Chase said that it has policies to identify and verify the identities of its customers, and that it continually evaluates and enhances them. Cathay said it also reviews its systems and policies to detect and prevent fraudulent activity. DBS did not respond to requests for comment.

Another clue indicated that the banks had been doing business with a larger criminal enterprise. Two of the companies Kevin sent funds to, Guangda Logistics (which lists no contact information) and Danco Global (which did not respond to ProPublica’s request for comment), showed up on a list of more than six dozen shell entities that had been used to defraud Americans of nearly $60 million. The information was uncovered in an investigation by the U.S. Secret Service into KG Pay, one of the money laundering groups that was on Telegram.

Kevin acknowledges he was seduced by the thrall of easy money. “Something came over me,” he said. Kevin ultimately wired a total of $716,000 to scammers’ accounts at Chase and other banks. (Christopher López for ProPublica)

The case of the man behind KG Pay sheds further light on how motorcades use U.S. banks. Daren Li, a Chinese national in his early 40s, went by the alias KG Perfect. Based in Cambodia, he directed the movement of large sums of pig-butchering proceeds from the U.S. to overseas. Li, who was arrested in April 2024 at the airport in Atlanta, pleaded guilty in November to conspiracy to commit money laundering. He admitted that at least $73.6 million of victim funds were deposited into bank accounts he and his co-conspirators controlled. Li, who is in federal detention awaiting sentencing, could not be reached for comment through his lawyer. Seven other people have pleaded guilty to conspiring with Li.

KG exploited a weakness in the U.S. banking system: Banks are reluctant to share account information, even after they’ve identified suspicious activity. A law enacted in the wake of the Sept. 11, 2001, attacks gave banks a reprieve from secrecy rules if they alert one another to potential terrorism or money laundering activities. But the information sharing is voluntary and “banks are not communicating with each other,” according to Matt O’Neill, who led many money laundering investigations for the U.S. Secret Service during his 25 years there. “Fraudsters know it and fraudsters are clearly making hundreds of millions or billions of dollars off of this glaring gap in the system,” said O’Neill, who now runs 5OH Consulting.

One of the most prolific cogs in Li’s motorcade, according to civil and criminal cases, was a Chinese national named Hailong Zhu. He entered the U.S. on a tourist visa around 2019 and then stayed, working odd jobs in construction and at a restaurant. In 2022, Zhu was recruited to help Li’s other operatives set up businesses and bank accounts near Los Angeles in exchange for $70,000.

Zhu turned the assignment into a full-time job, eventually juggling seven accounts at Bank of America, Chase, East West Bank and Wells Fargo tied to two entities set up in his name: Sea Dragon Trading and Sea Dragon Remodel. When Bank of America restricted Zhu’s Sea Dragon Trading account due to suspected fraud on Oct. 19, 2022, Zhu got another account at Bank of America the next day using Sea Dragon Remodel. By Nov. 1, 2022, he had secured four more accounts at Chase, Wells Fargo and East West Bank. Except for varying his address and email, investigators found that Zhu provided largely the same info when opening accounts for the two shell entities.

Zhu’s account opening spree happened just a few months after federal prosecutors blamed “the corruption of BofA bankers” for a scheme in which a handful of employees opened 754 accounts at Bank of America registered to 13 false addresses in the Los Angeles suburbs. In that case, shadowy middlemen dispensed bribes of $200 to $250 per account to Bank of America employees who overrode internal compliance systems to open accounts for overseas Chinese citizens who weren’t physically present at the branch to open the accounts, in violation of the bank’s rules. Even when the bankers registered 176 customers to one small home, the accounts were still opened. (Two of the bankers later pleaded guilty to making false entries in bank records; Bank of America said in a statement that it “uncovered illegal activity using its monitoring systems, terminated the employees, and cooperated with law enforcement, who successfully prosecuted those involved. This is how our anti-money laundering program is designed to work.”)

With banks always one step behind, Zhu’s accounts kept receiving hundreds of thousands of dollars from victims across the U.S. Zhu would bundle the proceeds and transfer them abroad. During one week in November 2022, for example, he received six wires totaling almost $52,000 into one of his accounts and wired out one lump sum of $53,000. The destination was a bank account in the Bahamas controlled by Li and others, who converted the funds into cryptocurrency for their journey to scam centers located overseas, including in Sihanoukville. Investigators discovered a crypto wallet address they believed Li controlled. Data from cryptocurrency analytics firm Crystal Intelligence shows the wallet address sent and received about $341 million of crypto across 16,800 transactions between April 2021 and April 2024.

Zhu was arrested in March 2023 and charged with bank fraud. His lawyers acknowledged at trial that their client opened bank accounts and moved funds but said that Zhu did not know his bosses were using them for criminal purposes. Zhu was acquitted after the attorneys persuaded the trial judge that using false information to obtain a bank account does not constitute a scheme to defraud a bank. Only months after the acquittal, Zhu was charged again, this time with money laundering offenses, in an indictment filed in December 2023. Zhu, who couldn’t be reached for comment, did not enter a plea and was listed as a fugitive as of March 2025.

In January 2024, Kevin, desperate to get his money back, sued the 10 companies to which he had wired money at the scammers’ behest, including Middlesex Truck and Coach. None replied to his lawsuit — most were shell entities, after all — until January 2025, when Kevin’s lawyer got an email from Brian Maloney Jr.

Maloney confessed that his staff had ignored the lawsuit when it was initially served because it looked like a scam. He said he’d never banked with Chase and had no idea about any account that had been used to defraud Kevin. Maloney agreed to go to the local Chase branch to investigate and try to help Kevin get his money back.

“I went to the bank and said, ‘What the hell is going on?’” Maloney told ProPublica. After spending nearly two hours with the local Chase branch manager, Maloney realized that he, too, was a victim of the bank’s lax procedures: He said the branch manager told him that Chase had allowed someone to obtain an account online in his company’s name in March 2023 with nothing more than a digital signature and an employer identification number, but no personal identification. That account had then accepted hundreds of thousands of dollars of wire transfers. And now Maloney’s family business — not Chase — was the defendant in a lawsuit. “How is this legal?” he wondered. (Colin Schmitt, a retired FBI agent, said Chase could have mitigated the fraud by at least pausing incoming wire transfers to the fake Middlesex account and asking its owner to justify the transactions. “If you’re just using an account just for wires, that’s a big red flag,” Schmitt said.)

Still, there was a silver lining: The funds remained in the account. Not only Kevin’s $134,000, but almost $100,000 more from several other victims sat frozen inside since spring 2023.

Kevin was glad the money was still there, but he wondered why it took a lawsuit to unearth the info. “It does not seem like the system is tailored to give any deference to the victim,” he said. “That’s what frustrates me.” His lawyers advised him to seek an order from a federal judge to get his funds back and filed such a petition in March. After ProPublica asked Chase about Kevin’s funds in April, the bank agreed to return the money to him without a court order.

The $134,000 landed back in Kevin’s bank account in mid-May. Finally, he felt a sense of relief. (He has now dropped the suit against Middlesex.) But Kevin also wondered what would happen to the other people whose money got siphoned up by the fake Middlesex account. Would Chase wait for them to file lawsuits too?

Banks are starting to face lawsuits by pig-butchering victims who allege laxness in opening accounts. In December, a California man who was defrauded of nearly $1 million sued DBS and two other banks for alleged failures to comply with know-your-customer and anti-money-laundering laws. A college professor from Iowa who lost $700,000 filed a lawsuit in January against Hang Seng Bank in Hong Kong for failing to do proper due diligence on the people who opened accounts used to defraud him. Hang Seng reached an agreement with the Iowa professor to dismiss the suit and declined to comment further. DBS did not reply to requests for comment on the California case, but the bank asserted that the lawsuit contains “fatal flaws,” according to a filing in the suit.

Such cases are long shots, according to Carla Sanchez-Adams, senior attorney at the National Consumer Law Center. The suits typically fail because it’s hard to show that financial institutions knew or should have known about potential fraud.

Still, banks are well aware that fraud is on the rise. Nearly 1 in 3 Americans say they have been the victim of online fraud or cybercrime, according to a 2023 poll commissioned by Wells Fargo. “The scale of fraud taking place every day is a massive burden for our country and for the millions of hard-working women and men whose lives are affected by it,” Rob Nichols, president of the American Bankers Association, said in an October speech.

Nichols contends that “consumers credit the banking industry with doing more than other industries to protect them from fraud and keep their information safe.” He cited an initiative by the ABA to create a database of fraud contacts to help banks figure out who to call when there’s a problem. And he urged the Trump administration to develop a national fraud prevention strategy.

Other countries are taking more aggressive steps. In October, the U.K. began requiring banks to reimburse scam victims up to £85,000, or about $116,000, per claim when they make a fraudulent payment on behalf of their customers, even if the customers authorized the transfer. Australia recently enacted a law that will require banks to share suspect account info with one another. Thailand has gone even further, creating a Central Fraud Register intended to compel banks to identify and close accounts used for money laundering.

The U.S. lacks such rules. O’Neill, the former Secret Service agent, thinks that updating the Patriot Act, the post-9/11 law meant to encourage banks to share intel, would be a good place to start. But Congress has not moved in that direction and the Trump administration has shown no sign that it plans to prioritize this issue. (Asked what steps the administration is taking, a spokesperson told ProPublica to Google the administration’s sanctions related to pig-butchering scams.)

For now, bank accounts remain easy for fraudsters to obtain. A sleek-looking brokerage akin to 3A has been online for months, soliciting deposits for what a researcher at the Global Anti-Scam Organization identified as a pig-butchering scheme. Anyone wishing to “invest,” the brokerage said, can wire money to a shifting array of banks, including Chase.

Doris Burke contributed research.


This content originally appeared on ProPublica and was authored by by Cezary Podkul.

]]>
https://www.radiofree.org/2025/06/25/how-foreign-scammers-use-u-s-banks-to-fleece-americans/feed/ 0 540973
A war on diplomacy itself – Israel’s unprovoked attack on Iran https://www.radiofree.org/2025/06/19/a-war-on-diplomacy-itself-israels-unprovoked-attack-on-iran/ https://www.radiofree.org/2025/06/19/a-war-on-diplomacy-itself-israels-unprovoked-attack-on-iran/#respond Thu, 19 Jun 2025 11:01:34 +0000 https://asiapacificreport.nz/?p=116399 ANALYSIS: By Joe Hendren

Had Israel not launched its unprovoked attack on Iran on Friday night, in direct violation of the UN Charter, Iran would now be taking part in the sixth round of negotiations concerning the future of its nuclear programme, meeting with representatives from the United States in Muscat, the capital of Oman.

Israel’s Prime Minister, Benjamin Netanyahu claimed he acted to prevent Iran from building a nuclear bomb, saying Iran had the capacity to build nine nuclear weapons. Israel provided no evidence to back up its claims.

On 25 March 2025, Trump’s own National Director of Intelligence, Tulsi Gabbard, said: 

“The IC [Intelligence Community] continues to assess that Iran is not building a nuclear weapon and Supreme Leader Khamenei has not authorised the nuclear weapons programme he suspended in 2003. The IC is monitoring if Tehran decides to reauthorise its nuclear weapons programme”

Even if Iran had the capability to build a bomb, it is quite another thing to have the will to do so.

Any such bomb would need to be tested first, and any such test would be quickly detected by a series of satellites on the lookout for nuclear detonations anywhere on the planet.

It is more likely that Israel launched its attack to stop US and Iranian negotiators from meeting on Sunday.

Only a month ago, Iran’s lead negotiator in the nuclear talks, Ali Shamkhani, told US television that Iran was ready to do a deal. NBC journalist Richard Engel reports:

“Shamkhani said Iran is willing to commit to never having a nuclear weapon, to get rid of its stockpiles of highly enriched uranium, to only enrich to a level needed for civilian use and to allow inspectors in to oversee it all, in exchange for lifting all sanctions immediately. He said Iran would accept that deal tonight.”


Inside Iran as Trump presses for nuclear deal.   Video: NBC News

Shamkhani died on Saturday, following injuries he suffered during Israel’s attack on Friday night. It appears that Israel not only opposed a diplomatic solution to the Iran nuclear impasse: Israel killed it directly.

A spokesperson for the Iranian Foreign Ministry, Esmaeil Baghaei, told a news conference in Tehran the talks would be suspended until Israel halts its attacks:

“It is obvious that in such circumstances and until the Zionist regime’s aggression against the Iranian nation stops, it would be meaningless to participate with the party that is the biggest supporter and accomplice of the aggressor.”

On 1 April 2024, Israel launched an airstrike on Iran’s embassy in Syria, killing 16 people, including a woman and her son. The attack violated international norms regarding the protection of diplomatic premises under the Vienna Convention.

Yet the UK, USA and France blocked a United Nations Security Council statement condemning Israel’s actions.

It is worth noting how the The New York Times described the occupation of the US Embassy in November 1979:

“But it is the Ayatollah himself who is doing the devil’s work by inciting and condoning the student invasion of the American and British Embassies in Tehran. This is not just a diplomatic affront; it is a declaration of war on diplomacy itself, on usages and traditions honoured by all nations, however old and new, whatever belief.

“The immunities given a ruler’s emissaries were respected by the kings of Persia during wars with Greece and by the Ayatollah’s spiritual ancestors during the Crusades.”

Now it is Israel conducting a “war on diplomacy itself”, first with the attack on the embassy, followed by Friday’s surprise attack on Iran. Scuppering a diplomatic resolution to the nuclear issue appears to be the aim. To make matters worse, Israel’s recklessness could yet cause a major war.

Trump: Inconsistent and ineffective
In an interview with Time magazine on 22 April 2025, Trump denied he had stopped Israel from attacking Iran’s nuclear sites.

“No, it’s not right. I didn’t stop them. But I didn’t make it comfortable for them, because I think we can make a deal without the attack. I hope we can. It’s possible we’ll have to attack because Iran will not have a nuclear weapon.

“But I didn’t make it comfortable for them, but I didn’t say no. Ultimately I was going to leave that choice to them, but I said I would much prefer a deal than bombs being dropped.”

— US President Donald Trump

In the same interview Trump boasted “I think we’re going to make a deal with Iran. Nobody else could do that.” Except, someone else had already done that — only for Trump to abandon the deal in his first term as president.

In July 2015 Iran signed the Joint Comprehensive Plan of Action (JCPOA) alongside the five permanent members of the United Nations Security Council and the European Union. Iran pledged to curb its nuclear programme for 10-15 years in exchange for the removal of some economic sanctions. The International Atomic Energy Agency (IAEA) also gained access and verification powers.

Iran also agreed to limit uranium enrichment to 3.67 per cent U-235, allowing it to maintain its nuclear power reactors.

Despite clear signs the nuclear deal was working, Donald Trump withdrew from the JCPOA and reinstated sanctions on Iran in November 2018. Despite the unilateral American action, Iran kept to the deal for a time, but in January 2020 Iran declared it would no longer abide by the limitations included in JCPOA but would continue to work with the IAEA.

By pulling out of the deal and reinstating sanctions, the US and Israel effectively created a strong incentive for Iran to resume enriching uranium to higher levels, not for the sake of making a bomb, but as the most obvious means of creating leverage to remove the sanctions.

As a signatory to the Nuclear Non-Proliferation Treaty (NPT) Iran is allowed to enrich uranium for civilian fuel programmes.

Iran’s nuclear programme began in the 1960s with US assistance. Prior to the Islamic Revolution of 1979, Iran was ruled by the brutal dictatorship of the Shah, Mohammad Reza Pahavi.

American corporations saw Iran as a potential market for expansion. During the 1970s the US suggested to the Shah he needed not one but several nuclear reactors to meet Iran’s future electricity needs. In June 1974, the Shah declared that Iran would have nuclear weapons, “without a doubt and sooner than one would think”.

In 2007, I wrote an article for Peace Researcher where I examined US claims that Iran does not need nuclear power because it is sitting on one of the largest gas supplies in the world. One of the most interesting things I discovered while researching the article was the relevance of air pollution, a critical public health concern in Iran.

In 2024, health officials estimated that air pollution is responsible for 40,000 deaths a year in Iran. Deputy Health Minister Alireza Raisi said the “majority of these deaths were due to cardiovascular diseases, strokes, respiratory issues, and cancers”.

Sahimi describes levels of air pollution in Tehran and other major Iranian cities as “catastrophic”, with elementary schools having to close on some days as a result. There was little media coverage of the air pollution issue in relation to Iran’s energy mix then, and I have seen hardly any since.

An energy research project, Advanced Energy Technologies provides a useful summary of electricity production in Iran as it stood in 2023.

Iranian electricity production in 2023. Source: Advanced Energy Technologies

With around 94.6 percent of electricity generation dependent on fossil fuels, there are serious environmental reasons why Iran should not be encouraged to depend on oil and gas for its electricity needs — not to mention the prospect of climate change.

One could also question the safety of nuclear power in one of the most seismically active countries in the world, however it would be fair to ask the same question of countries like Japan, which aims to increase its use of nuclear power to about 20 percent of the country’s total electricity generation by 2040, despite the 2011 Fukushima disaster.

Iranian Foreign Minister Abbas Araghchi stated that Iran’s uranium enrichment programme “must continue”, but the “scope and level may change”. Prior to the talks in Oman, Araghchi highlighted the “constant change” in US positions as a problem.

Trump’s rhetoric on uranium enrichment has shifted repeatedly.

He told Meet the Press on May 4 that “total dismantlement” of the nuclear program is “all I would accept.” He suggested that Iran does not need nuclear energy because of its oil reserves. But on May 7, when asked specifically about allowing Iran to retain a limited enrichment program, Trump said “we haven’t made that decision yet.”

Ali Shamkhani, an adviser to Iranian Supreme Leader Ayatollah Ali Khamenei, said in a May 14 interview with NBC that Iran is ready to sign a deal with the United States and reiterated that Iran is willing to limit uranium enrichment to low levels. He previously suggested in a May 7 post on X that any deal should include a “recognition of Iran’s right to industrial enrichment.”

That recognition, plus the removal of U.S. and international sanctions, “can guarantee a deal,” Shamkhani said.

So with Iran seemingly willing to accept reasonable conditions, why was a deal not reached last month? It appears the US changed its position, and demanded Iran cease all enrichment of uranium, including what Iran needs for its power stations.

One wonders if Zionist lobby groups like AIPAC (American Israel Public Affairs Committee) influenced this decision. One could recall what happened during Benjamin Netanyahu’s first stint as Israel’s Prime Minister (1996-1999) to illustrate the point.

In April 1995 AIPAC published a report titled ‘Comprehensive US Sanctions Against Iran: A Plan for Action’. In 1997 Mohammad Khatami was elected as President of Iran. The following year Khatami expressed regret for the takeover of the US embassy in Tehran in 1979 and denounced terrorism against Israelis, while noting that “supporting peoples who fight for their liberation of their land is not, in my opinion, supporting terrorism”.

The threat of improved relations between Iran and the US sent the Israeli government led by Netanyahu into a panic. The Israeli newspaper Ha’aretz reported that “Israel has expressed concern to Washington of an impending change of policy by the United States towards Iran” adding that Netanyahu “asked AIPAC . . . to act vigorously in Congress to prevent such a policy shift.”

Twenty years ago the Israeli lobby were claiming an Iranian nuclear bomb was imminent. It didn’t happen.


Netanyahu’s Iran nuclear warnings.   Video: Al Jazeera

The misguided efforts of Israel and the United States to contain Iran’s use of nuclear technology are not only counterproductive — they risk being a catastrophic failure. If one was going to design a policy to convince Iran nuclear weapons may be needed for its own defence, it is hard to imagine a policy more effective than the one Israel has pursued for the past 30 years.My 2007 Peace Researcher article asked a simple question: ‘Why does Iran want nuclear weapons?’ My introduction could have been written yesterday.

“With all the talk about Iran and the intentions of its nuclear programme it is a shame the West continues to undermine its own position with selective morality and obvious hypocrisy. It seems amazing there can be so much written about this issue, yet so little addresses the obvious question – ‘for what reasons could Iran want nuclear weapons?’.

“As Simon Jenkins (2006) points out, the answer is as simple as looking at a map. ‘I would sleep happier if there were no Iranian bomb but a swamp of hypocrisy separates me from overly protesting it. Iran is a proud country that sits between nuclear Pakistan and India to its east, a nuclear Russia to its north and a nuclear Israel to its west. Adjacent Afghanistan and Iraq are occupied at will by a nuclear America, which backed Saddam Hussein in his 1980 invasion of Iran. How can we say such a country has no right’ to nuclear defence?'”

This week the German Foreign Office reached new heights in hypocrisy with this absurd tweet.

Image

Iran has no nuclear weapons. Israel does. Iran is a signatory to the NPT. Israel is not. Iran allows IAEA inspections. Israel does not.

Starting another war will not make us forget, nor forgive what Israel is doing in Gaza.

From the river to the sea, credibility requires consistency.

I write about New Zealand and international politics, with particular interests in political economy, history, philosophy, transport, and workers’ rights. I don’t like war very much.

Joe Hendren writes about New Zealand and international politics, with particular interests in political economy, history, philosophy, transport, and workers’ rights. Republished with his permission. Read this original article on his Substack account with full references.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/06/19/a-war-on-diplomacy-itself-israels-unprovoked-attack-on-iran/feed/ 0 539874
Viral video of Israeli soldier pleading Iran for mercy is AI-generated https://www.radiofree.org/2025/06/19/viral-video-of-israeli-soldier-pleading-iran-for-mercy-is-ai-generated/ https://www.radiofree.org/2025/06/19/viral-video-of-israeli-soldier-pleading-iran-for-mercy-is-ai-generated/#respond Thu, 19 Jun 2025 05:40:13 +0000 https://www.altnews.in/?p=300750 With tensions escalating in the Iran-Israel conflict, which has claimed many civilian lives since it began on June 13, a video of an Israeli soldier in tears, begging for mercy,...

The post Viral video of Israeli soldier pleading Iran for mercy is AI-generated appeared first on Alt News.

]]>
With tensions escalating in the Iran-Israel conflict, which has claimed many civilian lives since it began on June 13, a video of an Israeli soldier in tears, begging for mercy, has gone viral. In the video, the soldier looks at the camera and urges the Iranian army to stop the destruction, while injured soldiers are seen lying in the rubble of destroyed buildings in the background. “Iran, we beg you. Please stop the attacks. Half of Israel is gone. We surrender. Just stop this destruction,” he says.

The conflict between the two, which is threatening to turn into an all-out war, started with Israel attacking nuclear and military sites in Iran on June 13. Israeli Prime Minister Benjamin Netanyahu called the attack ‘Operation Rising Lion‘ – supposedly launched to disconcert Iran’s nuclear program. However, the strikes resulted in the deaths of many ordinary citizens, after which Iran, too, resorted to retaliatory missile strikes.

X user (@Skylar_Soul_) posted the viral video on June 16. When this article was written, the post had accumulated more than 100,000 views and was reshared over 1,000 times. (Archive

Another X user, @dpsingh1313, posted the same video, which was viewed over 160,000 times at the time this article was written. (Archive)

The viral video was also shared by several other X users, including @Deb_livnletliv, @SanjeevCrime, @Ayesha786Majid, @armanofficial00 and @hammehaiindia62(Archived links: 1, 2, 3, 4, 5)

Click to view slideshow.

The same video was viral on Facebook with similar claims.

Click to view slideshow.

Fact Check

A reverse image search on one of the key frames from the clip led us to the same video on YouTube posted around the same time, but with better resolution.

 

We noticed that the YouTube version had a clear watermark ‘Veo’ on the bottom right corner. The same watermark can be seen in the viral video as well, but owing to lower resolution, it is faint and not very apparent.

Veo is an artificial intelligence-based video generation tool, launched by Google this year. It allows users to create 8-second-long realistic videos without anatomical abnormalities.

Note that the viral video is precisely 8 seconds long. Moreover, what makes Veo stand out from other video generation models is its ability to integrate audio and dialogue without distortions, which is evident in the viral video.

To be sure, we also ran the video through HIVE’s AI detection tool. According to this, there is an 88% likelihood that the viral video was AI-generated.

Based on these findings, we were able to conclude that the viral video showing an Israeli soldier crying and pleading with Iran to stop the retaliatory strikes against Israel is artificially generated through Google Veo, and not real.

The post Viral video of Israeli soldier pleading Iran for mercy is AI-generated appeared first on Alt News.


This content originally appeared on Alt News and was authored by Prantik Ali.

]]>
https://www.radiofree.org/2025/06/19/viral-video-of-israeli-soldier-pleading-iran-for-mercy-is-ai-generated/feed/ 0 539817
‘Be brave’ warning to nations against deepsea mining from UNOC https://www.radiofree.org/2025/06/16/be-brave-warning-to-nations-against-deepsea-mining-from-unoc/ https://www.radiofree.org/2025/06/16/be-brave-warning-to-nations-against-deepsea-mining-from-unoc/#respond Mon, 16 Jun 2025 11:57:56 +0000 https://asiapacificreport.nz/?p=116223

By Laura Bergamo in Nice, France

The UN Ocean Conference (UNOC) concluded today with significant progress made towards the ratification of the High Seas Treaty and a strong statement on a new plastics treaty signed by 95 governments.

Once ratified, it will be the only legal tool that can create protected areas in international waters, making it fundamental to protecting 30 percent of the world’s oceans by 2030.

Fifty countries, plus the European Union, have now ratified the Treaty.

New Zealand has signed but is yet to ratify.

Deep sea mining rose up the agenda in the conference debates, demonstrating the urgency of opposing this industry.

The expectation from civil society and a large group of states, including both co-hosts of UNOC, was that governments would make progress towards stopping deep sea mining in Nice.

UN Secretary-General Guterres said the deep sea should not become the “wild west“.

Four new pledges
French President Emmanuel Macron said a deep sea mining moratorium is an international necessity. Four new countries pledged their support for a moratorium at UNOC, bringing the total to 37.

Attention now turns to what actions governments will take in July to stop this industry from starting.

Megan Randles, Greenpeace head of delegation regarding the High Seas Treaty and progress towards stopping deep sea mining, said: “High Seas Treaty ratification is within touching distance, but the progress made here in Nice feels hollow as this UN Ocean Conference ends without more tangible commitments to stopping deep sea mining.

“We’ve heard lots of fine words here in Nice, but these need to turn into tangible action.

“Countries must be brave, stand up for global cooperation and make history by stopping deep sea mining this year.

“They can do this by committing to a moratorium on deep sea mining at next month’s International Seabed Authority meeting.

“We applaud those who have already taken a stand, and urge all others to be on the right side of history by stopping deep sea mining.”

Attention on ISA meeting
Following this UNOC, attention now turns to the International Seabed Authority (ISA) meetings in July. In the face of The Metals Company teaming up with US President Donald Trump to mine the global oceans, the upcoming ISA provides a space where governments can come together to defend the deep ocean by adopting a moratorium to stop this destructive industry.

Negotiations on a Global Plastics Treaty resume in August.

John Hocevar, oceans campaign director, Greenpeace USA said: “The majority of countries have spoken when they signed on to the Nice Call for an Ambitious Plastics Treaty that they want an agreement that will reduce plastic production. Now, as we end the UN Ocean Conference and head on to the Global Plastics Treaty negotiations in Geneva this August, they must act.

“The world cannot afford a weak treaty dictated by oil-soaked obstructionists.

“The ambitious majority must rise to this moment, firmly hold the line and ensure that we will have a Global Plastic Treaty that cuts plastic production, protects human health, and delivers justice for Indigenous Peoples and communities on the frontlines.

“Governments need to show that multilateralism still works for people and the planet, not the profits of a greedy few.”

Driving ecological collapse
Nichanan Thantanwit, project leader, Ocean Justice Project, said: “Coastal and Indigenous communities, including small-scale fishers, have protected the ocean for generations. Now they are being pushed aside by industries driving ecological collapse and human rights violations.

“As the UN Ocean Conference ends, governments must recognise small-scale fishers and Indigenous Peoples as rights-holders, secure their access and role in marine governance, and stop destructive practices such as bottom trawling and harmful aquaculture.

“There is no ocean protection without the people who have protected it all along.”

The anticipated Nice Ocean Action Plan, which consists of a political declaration and a series of voluntary commitments, will be announced later today at the end of the conference.

None will be legally binding, so governments need to act strongly during the next ISA meeting in July and at plastic treaty negotiations in August.

Republished from Greenpeace Aotearoa with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/06/16/be-brave-warning-to-nations-against-deepsea-mining-from-unoc/feed/ 0 539086
MARKETING MARS https://www.radiofree.org/2025/06/11/marketing-mars-2/ https://www.radiofree.org/2025/06/11/marketing-mars-2/#respond Wed, 11 Jun 2025 17:00:27 +0000 https://dissidentvoice.org/?p=158977 If Mars Is the Answer, What Was the Question? Mars is 140 million miles away, but it has never been closer. Whether it’s Elon Musk’s relentless cheerleading, the competing plans of various nation states, or the unending cycle of popular culture, Mars is having a serious moment. Composite image of Earth and Mars Earthlings have […]

The post MARKETING MARS first appeared on Dissident Voice.]]>
If Mars Is the Answer, What Was the Question?

Mars is 140 million miles away, but it has never been closer. Whether it’s Elon Musk’s relentless cheerleading, the competing plans of various nation states, or the unending cycle of popular culture, Mars is having a serious moment.

Mars slowly taking over Earth imagery

Composite image of Earth and Mars

Earthlings have been projecting hopes and fears onto Mars for a very long time. For millennia, humans have observed and ascribed meanings to the unsettling, rust-colored, wandering light in the sky. More than a century of popular storytelling and literary speculation, along with decades of scientific exploration, have produced myriad representations of our alluring neighbor. The most explored planet in the solar system after Earth, a slew of landers, robotic rovers, and flyby missions have revealed neither Edgar Rice Burrough’s multi-limbed alien warriors nor a civilization based on irrigation canals. Instead, they have shown that our sibling planet is a freezing, irradiated, desolate desert world that has been in stasis for billions of years.

Longtime science fiction about humans on Mars is striving to become science fact. A new generation of aspiring colonial explorers is hyping the 2030s as the decade of first human landings and even initial settlement. We are increasingly being bombarded with the message that humanity can and should become multiplanetary by expanding to Mars. As our home planet’s ecological crises intensify in frequency and severity, this extreme vision is marketed as necessary, desirable, and inevitable.

For the first time since the Apollo program, which took the first humans to the Moon in 1969, momentum to get “boots on the ground” is underway. NASA, the European Space Agency, China, and the United Arab Emirates are all pouring money into Mars missions. Space is no longer just the realm of nation-state rivalries. Billionaires infatuated with dreams of corporate expansion beyond Earth’s atmosphere are pushing the fantasy that humanity’s future is in space, from tourism in low orbit luxury hotels and the untold riches of asteroid mining, to sustained human presence on the Moon and the grand prize: Mars itself. The “dawning of the new space age” is here.

The view of Earth from space, captured by the Apollo 17 crew in the iconic “Blue Marble” photograph, helped inspire a modern environmental movement that framed humanity as sharing a common fate on this miraculous oasis. How are images of Mars being wielded in our consciousness today? The cultural lenses projected onto Mars as a destination are as much about how we view our history, ourselves, and the commitment to Planet A in the face of looming Planet B. Whose imaginations are we inhabiting?

The age of astro-colonialism is upon us, but for all the fanfare and bravado, there is a lack of public discussion about the implications of what we might call our current interplanetary moment. Are the dreams of the Red Planet meant to divert and distract from the nightmares on the blue one?

In a time of accelerating extraterrestrial ambition and terrestrial catastrophe, it is vital to question how human relationships with the Red Planet are being actively shaped and sold. When we take the time to unpack the dominant narrative frames shaping US discourse about Mars, we find familiar mythologies geared up in space suits.

Frame #1 SPECIES SURVIVAL: PLANET B

I believe that the long term future of the human race must be space and that it represents an important life insurance for our future survival, as it could prevent the disappearance of humanity by colonising other planets.

—physicist STEPHEN HAWKING

A common slogan seen on signs at climate protests around the world is: “There Is No Planet B.” This may seem self-evident to the millions concerned about mounting ecological threats, but it is the exact opposite of the dominant Mars narrative. To many of its advocates, Mars’s biggest selling point is that it IS Planet B. For true believers, long-term, self-sustaining human settlement on Mars is not only possible within our lifetimes, it is an existential necessity for species survival.

This frame is echoed by pro-Mars advocacy groups, space and planetary science circles, and by commercial interests with a stake in surveying Mars. The prevailing narrative is that colonizing Mars is imperative; that the best chance for guaranteeing human survival is to cease being a “single planetary civilization.” In this framing, Earth is an unstable, imminent death trap, a ticking time bomb that (select) members of our species must escape. As early science fiction author Robert A. Heinlein warned, “The Earth is just too small and fragile a basket for the human race to keep all its eggs in.”

To be fair, the list of oft-cited extinction-level threats is long and terrifying. Obliteration by an asteroid, suffocating under the dust from a supervolcano eruption, and the usual panoply of human-engineered self-destruction: from runaway climate change to raging pandemics to that enduring 20th-century obsession, nuclear war.

With all these gathering horsemen of the apocalypse, we must prioritize safeguarding the “light of consciousness” off-world. This frame is infused with urgency, anxiety, and an aura of inevitability. Not if but when.

The most famous (and influential, thanks to his massive wealth) evangelist for the Planet B frame is, of course, Elon Musk. As he recently said on Joe Rogan’s popular podcast, “I think this is really a race against time. Can we make Mars self-sufficient before civilization has some sort of future fork in the road?” He described his “plans” for transporting a million humans and millions of tons of cargo to Mars over the coming decades. Science fiction author Cory Doctorow recently confessed, “Whenever I think about Musk, I feel some personal responsibility because there is a kind of cadre of tech billionaires who’ve read our dystopias and mistaken them for business plans.” Nevertheless, Musk’s capacity to manifest dystopian nonfiction is firmly established. Creative trolling examples abound, such as Activista’s Mars Sucks billboard outside of SpaceX for Earth Day, and a recent social media reply to Musk’s post declaring “Time to go to Mars” by Star Wars actor Mark Hamill: “You first.”

Central to this vision of Mars as a replacement for Earth is the concept of terraforming. A sci-fi staple, terraforming refers to the spectacular acts of planetary engineering that would transform Mars’s severely inhospitable environment to support human needs. Mars boosters tend to pull heavily from science fiction when describing highly speculative ideas, such as heating the planet’s surface with giant orbital solar reflectors, genetically engineering microbes that will create an atmosphere by converting CO2 to O2, or, as Musk often suggests, nuking the ice caps.

Needless to say, this confidence in the possibility of bending Mars to our will is not shared by many outside the proponents of Mars as Earth 2.0. Astronomer Lucianne Walkowicz has been an outspoken critic of the hubris of treating Mars as a backup planet. She points out that, “While we might debate the possibility of transforming the habitability of Mars, we have a demonstrated track record of unintentionally changing a planet to be less hospitable to humanity, and no practicable idea of how to do the reverse.”

Frame #2 WILD WEST FRONTIER 

I think it is every bit as vast and promising a frontier as the New World was some centuries ago.

—Sen. TED CRUZ, at “Destination Mars—Putting American Boots on the Surface of the Red Planet” hearing of the Subcommittee on Space, Science, and Competitiveness

By now, the image is commonplace: a space industry billionaire advertising his company’s latest achievement while popping champagne in low Earth orbit. The billionaires in question—Richard Branson (Virgin Galactic), Elon Musk (SpaceX), and Jeff Bezos (Blue Origin)—are somewhat interchangeable, particularly since they all wear the same cowboy hat. The choice of headgear by these “billionauts”—the term of art for billionaires with the personal wealth and ambition to publicly moonlight as astronauts—reinforces the core framing of Mars as the new Wild West horizon, a frontier that requires space cowboys to explore and conquer.

Mars colonization pitches imagine this new home, or “spome” (space home, a term coined by prolific “Golden Age” sci-fi writer Isaac Asimov), as a prospector’s paradise in the making and recreation of nostalgic versions of American frontier life. Settler colonial tropes are projected onto the screen of Mars as a terra nullius. Untrammeled, uncorrupted, and untamed, a pristine virgin wilderness that invites rapacious extraction, a red blank slate to reboot civilization.

The dominant scientific narrative in the United States space program parallels the American cultural narrative: what Linda Billings, NASA space communicator and space policy analyst, calls “frontier pioneering, continual progress, manifest destiny, free enterprise, rugged individualism, and a right to life without limits.” Amnesiac praise functions as if westward expansion was an uncomplicated narrative, not marked by tremendous violence, subjugation, and dispossession.

An enduring thread of space-settlement fantasy views Earth as needing the influence of a space frontier civilization to show us a tougher, freer, better way. Robert Zubrin, head of the Mars Society, declares in his manifesto, “The Significance of the Martian Frontier,” that humanity needs Mars because this new frontier will provide the next great stage of human development. A clean juxtaposition of alien Mars with the familiar frontier.

The promises made by multi-billionaires for space outposts are steeped in centuries-old Eurocentric mythology, which envisions progress by moving to new lands and putting them to their proper use, celebrating expansion into a landscape allegedly devoid of humans, enabling a wildly creative frontier civilization, or providing huge economic advantages to whoever makes the first move.

In his second inaugural speech, Trump vowed to “pursue our Manifest Destiny into the stars, launching American astronauts to plant the stars and stripes on the planet Mars.” The unselfconscious language of settler colonialism justified as divine expansion is infecting outer space.

Asteroid mining has been touted for years as the “Gold Rush” of the millennium. Mining the Moon, Mars, and asteroids for precious metals and minerals is the astro-capitalist fantasy of limitless, unregulated wealth to be earned in space.

Arthur C. Clarke, sci fi author of 2001: A Space Odysseyasked of the drive to propel us up and out, “Will moral advances accompany the technologies that make spaceflight possible and allow us to escape our past, or will the future be characterized by the same opportunism and exploitation that defined European and American expansion?”

Frame #3 SPACE RACE 

The space race playing out among billionaires like Branson, Bezos and Musk has little to do with science—it’s a PR-driven spectacle designed to distract us from the disasters capitalism is causing here on Earth.

—PARIS MARX, author and tech critic

It is impossible to discuss humanity’s efforts to expand into space without the lens of national competition. With Sputnik serving as the permanent cultural reminder, dominating space has long been a proxy for geopolitical power. Our first robotic and human expeditions beyond Earth were ignited by Cold War rivalry, which unleashed a massive mobilization of government resources in the service of what was openly called “The Space Race.”

Although the Soviet Union is long gone, the Space Race frame continues to shape both public understanding and national policies. Trump’s nominee to lead NASA, billionaire pilot Jared Isaacman, who was the first private citizen to complete a space walk, has made this context explicit. After his nomination hearing, Isaacman posted on X, “I can promise you this: We will never again lose our ability to journey to the stars and never settle for second place.”

Meanwhile, China’s Mars plan, the Tianwen-3 mission, is a two-part Mars sample return mission scheduled for launch in late 2028, with return to Earth expected around 2031. Both NASA and China aim to build lunar bases with continuous human presence at the South Pole of the Moon in the 2030s. Tension over who will be first is intensifying.

This latest iteration of the Space Race is not the simple binary tale of Cold War rivalry; in fact, it is the private space industry, the latest player to join the fray, which is best poised to take people to Mars. This “new” space race is largely led by venture capitalist entrepreneurs, private companies, and start-ups, catalyzing and controlling much of the mass momentum, with the oversized figures of Bezos, Musk, and Branson dominating the competition to fund and popularize space exploration and tourism.

The second astronaut to walk on the Moon, Buzz Aldrin, has urged the need to get past the “flags and footprints” blip. Touring the globe wearing a t-shirt saying “Get your ass to Mars”, he wants permanent habitation by 2039.

Cosmologist Aparna Venkatesan has called this phenomenon the “manufactured urgency” of space colonization, where the actions of state and private global interests are “driven by a perpetual anxiety to not be the last to arrive.”

Frame #4 EXPLORATION AND DISCOVERY 

Nothing seems to pique a spirit of wonder, curiosity, ambition and humility quite like space exploration and discovery. 

—MATTHEW SHINDELL, Smithsonian National Air and Space Museum curator

Uncritical references to the New World, Age of Discovery, and Columbus thread through promotion of the social good of space exploration, of ships crossing the starry sea. The Mariner and Viking missions evoked historical voyages of discovery that brought Europeans to the shores of unknown worlds. As the long-awaited inaugural Mars landing takes place in the fictional For All Mankind TV series, an intercom voice announces, “In 1620, a ship called the Mayflower traveled across the Atlantic Ocean in search of a new world. Some came to escape their past, others to follow their dreams.”

NASA “Mars Explorers Wanted” poster series

NASA “Mars Explorers Wanted” poster series

Alongside a series of hip vintage style recruitment posters, NASA exclaims on its website: “Be A Martian! Mars needs YOU! In the future, Mars will need all kinds of explorers, farmers, surveyors, teachers . . . but most of all YOU! Join us on the Journey to Mars as we explore with robots and send humans there one day. Be an explorer!”

Fifty-five years after the legendary Apollo generation, named for the Greek god riding his chariot across the sun, NASA has branded its next “Moon to Mars” era as “The Artemis Generation,” the lunar goddess and twin sister to Apollo. Setting up the first long-term human presence on the Moon as a stepping stone to Mars promises the ability to find water and fuel, to expand the logistics supply chain to enable resupply and refueling of deep space outposts.

In the promotional video “Why the Moon,” narrator Drew Barrymore (who not coincidentally had her screen debut in the 1982 movie E.T.) and NASA team members explain why returning to the Moon is the natural next step, and how the lessons learned from Artemis will pave the way to Mars and beyond, infused with a tone of upbeat certainty and excitement. “We are going.” “Science fiction turned reality.” “Our success will change the world.” “We are preparing for Mars.”

At the root of much of the Mars narrative are assumptions that equate exploration with progress and unquestioned good. A belief that the fundamental urge to explore is a defining, inherent human trait and innate drive.

Historically, the “Age of Discovery” inaugurated centuries of violent colonial exploitation of human life, labor, and the more-than-human world. Ferrying millions of tons of cargo may be an easier feat than reckoning with the weight of supremacist cultural baggage.

Mars is the only planet we know that is entirely inhabited by robots. Scientific motivators for sending humans to Mars in the near future assert that researchers on the planet will be more adaptable and efficient than rovers, capable of accomplishing more in less time. The Martian surface is “all past” as its time stands still, without plate tectonics or large-scale recycling of rocks. Planetary science professor Sarah Stewart Johnson describes, “The place we are visiting with spacecraft is almost the same world as it was 3 billion years ago … Perhaps echoes of the beginning of life, entombed deep in the planet’s ancient rocks.”

Mars has been an obsession for celestial cartographers for more than 150 years, starting as a tool to argue that Mars was inhabited. Famously, Percival Lowell’s maps bolstered a theory of intelligent life with a complex irrigation canal system and vegetation. Whereas the first maps assumed an existing populace, the newest generation of maps invite a populace. Anthropologist Lisa Messeri, in her study of “Mapping Mars in Silicon Valley,” notes, “The goal for today’s maps is not about alien habitation but to establish Mars as inviting to human explorers … to establish Mars as a destination, the ‘awaiting Red Planet.’”

Frame #5 TRANSCENDENCE

Not even the sky is a limit.

—TikTok star KELLIE GERARDI on the Virgin livestream during the 2021 Virgin Galactic and Blue Origin space launches

A 2015 Newsweek article posed the question, “Is Mars the escape hatch for the 1%?” A decade later, the fact that billonauts are among our loudest advocates for Mars suggests the answer is yes.

The fourth planet from the Sun is represented as a destination of freedom: from regulations, societal and terrestrial constraints, and the biological limits of the Earth itself. For years, critics have voiced concerns that billionaires’ space investments enable an escape from the climate chaos that the economic system, which enriched them, continues to fuel here.

Protest sign that says "Deport Broligarchs to Mars"

Protest sign created by Lily Sloane for April 5th, 2025, “Hands Off” nationwide protest.

Many of the most persistent voices for Mars colonization are philosophically libertarian. Earth is too bureaucratic, too rule-bound and oppressive, with its laws of gravity and government—an insult to the lofty evolutionary heights that necessitate pulling up anchor. There is nothing holding tech titans back on Mars, except for the issue that space is constantly trying to kill you, necessitating every type of technologically assisted tether to keep you alive.

Space colonization, like its parallel ascension fantasy, the Christian Rapture, has long involved a tension between the liberation of a chosen vanguard and the imminent destruction of the Earth, viewed as undesirable or doomed. Journalist Naomi Klein draws attention to ways that the blaring space dreams of the wealthiest men on Earth function as secularized Bible stories: “The most powerful people in the world are preparing for the end of the world, an end they themselves are frenetically accelerating.”

This framing of Mars aligns it with a broader cultural narrative of salvation through technology. Colonizing Mars fits neatly alongside transhumanist visions of transcending the limitations of human bodies, of “hacking death” through cryopreservation immortality, and “longtermist” views of a future when humans become digital intelligence that colonize the universe, thus preserving existence for billions of years. Journalist Gil Duran distilled this emergent Silicon Valley cult religion on a recent episode of his The Nerd Reich podcast as, “Replace the soul with code, heaven with Mars, and Jesus with billionaire saviors.”

What Is Outside The Frame

The old science-fiction dreams … are just a moral hazard that creates the illusion we can wreck Earth and still be okay. It’s totally not true.

—KIM STANLEY ROBINSON, author of the Mars trilogy

Taking these five frames together, we see the overlapping collage of the Mars sales pitch. A multiplanetary future for humanity is presented as necessary not only for our survival but as the vision that will innovate our industries, rekindle our adventurous pioneer spirit, and ultimately liberate (some of) us from being Earth-bound.

What is rendered obscure, marginal, or invisible by these visions? What inconvenient facts left outside the frame might subvert the overly convenient narrative contained within?

Much of the framing outlined above has left out a very significant factor: reality.

Dynamic duo Kelly and Zach Weinersmith, in their new popular science opus A City on Mars: Can We Settle Space, Should We Settle Space, and Have We Really Thought This Through?, delve into well-researched, sobering detail about every aspect of life in space, including what they describe as the profound “suckitude” of space for human physiology. There is no systematic, generational research on how space impacts medical conditions or the viability of reproduction. Just one example of the incompatibility of space for our Earth-evolved bodies is the stunning rate at which astronauts lose bone density. Dying in novel ways is also outside the frame.

Outside the frame is the perennial question of funding these expeditions, from the time of Rev. Abernathy’s critiques of the Apollo moon landing expenditure, which found expression in Gil Scott-Heron’s iconic song, “Whitey on the Moon.” What is the moral calculus that justifies prioritizing a multi-trillion-dollar otherworldly project in the name of abstract “human progress,” in the face of immeasurable human suffering?

Assume enough people do make it to Mars to begin the terraforming that Occupy Mars folks love to conjure. Among the wave of scientific revelations about Mars is the discovery that the Martian surface is covered with perchlorate, a poisonous, corrosive dust that is lethal to humans to breathe in the parts per billion range.

No less a Mars zeitgeist-shaper than Kim Stanley Robinson, author of the seminal 1990s sci-fi Mars trilogy, which provided a foundational terraforming template, admits that the perchlorate discovery massively increases the difficulty of any hypothetical future. More fundamentally, Robinson raises the question of whether pursuing such unlikely outcomes as making Mars habitable is worth the effort when Earth civilization is currently destroying its own homeworld’s biosphere. Unlike the Planet B crowd, he strongly believes that Mars is “irrelevant” if Earth is doomed.

Which brings us to, perhaps, the most all-encompassing absence from the Mars sales pitch: Earth itself. Outside the frame is our profound interdependence with our terrestrial home and the astounding wild diversity of life forms who, like us, have been born in the embrace of our gravitational field. Space colonies will not save the millions of species at risk of extinction. The threat to biodiversity is one of the ecocidal consequences of an economic system driven by limitless growth. This ideology is exactly what has given us the very billionaires who seek to expand this worldview, unaltered, into space. Why would we believe it is possible to build resource-intensive life support systems on Mars when we haven’t been able to stop the rapid decline of life support systems on Earth?

As Carl Sagan poignantly expressed, “What shall we do with Mars? There are so many examples of human misuse of the Earth that even phrasing this question chills me.”

Touch Grass

Humanity needed a moon landing to realise that the much more exciting thing is the earth itself—but landing on it is not so easy.

—BRUNO LATOUR, philosopher and anthropologist of science and technology

Grass by the Home” is a 1980s song beloved by Russian cosmonauts, which became famous when it was performed by the band Zemlyane (translated to “Earthlings”). Elevated to the status of official anthem by the Russian Space Agency Roscosmos, the lyrics sing: “We dream not about the roar of the spaceport/Not about this icy blue space/We dream of grass, grass by the home/Green, green grass.” “Touch grass” as a current meme implies that someone needs to reconnect with reality, get offline, and venture into the world outside.

The song’s sentiment was shared by some members of both Soviet and American crews, as Apollo astronaut Bill Anders reflected, “Here we came all this way to the Moon, and yet the most significant thing we’re seeing is our own home planet, the Earth.” Similarly, exoplanet researchers, who have catalogued thousands of planets searching for those in the habitable “Goldilocks Zone,” express a common refrain that “home is the most interesting thing.” As author Jaime Green describes, “The more you look for planets like Earth, the more you appreciate our own planet itself.”

Indeed, many who have traveled to space have had transformative experiences of awe, of looking back and being struck by the view of the Earth, a phenomenon known as the “Overview Effect.” Ninety-year-old William Shatner, known to millions as Captain Kirk from Star Trek, had an Overview Effect experience during his 2021 Blue Origin trip, gazing at Earth from the starry beyond. As he beheld the staggering biodiversity that took billions of years to evolve being destroyed, the fragility of our life-containing atmosphere, the nurturing warmth of our home in the “vicious coldness of space,” he was overcome with immense grief: “My trip to space was supposed to be a celebration; instead it felt like a funeral.”

Here is revealed the true sleight of hand of the Mars pitch at this moment in history. We are encouraged to believe that human ingenuity and industry can turn uninhabitable Mars into a habitable Earth. This fantasy serves as a distraction from the reality that Earth is being rapidly turned into Mars.

This article originally appeared in https://www.projectcensored.org/marketing-mars/?doing_wp_cron=1749613476.6134579181671142578125.

The post MARKETING MARS first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Zara Zimbardo.

]]>
https://www.radiofree.org/2025/06/11/marketing-mars-2/feed/ 0 538074
Cellphone Correlates https://www.radiofree.org/2025/06/10/cellphone-correlates/ https://www.radiofree.org/2025/06/10/cellphone-correlates/#respond Tue, 10 Jun 2025 15:00:08 +0000 https://dissidentvoice.org/?p=158944 First considerations about cellphones.

The post Cellphone Correlates first appeared on Dissident Voice.]]>

The post Cellphone Correlates first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2025/06/10/cellphone-correlates/feed/ 0 537748
Trump’s second term is creating ‘a limbo moment’ for US battery recyclers https://grist.org/technology/trump-battery-recycling-lithium-grants-funding-tariffs-ira-tax-credits/ https://grist.org/technology/trump-battery-recycling-lithium-grants-funding-tariffs-ira-tax-credits/#respond Tue, 10 Jun 2025 08:30:00 +0000 https://grist.org/?p=667863 In a recycling facility in Covington, Georgia, workers grind up dead batteries into a fine, dark powder. In the past, the factory shipped that powder, known in the battery recycling industry as black mass, overseas to refineries that extracted valuable metals like cobalt and nickel. But now it keeps the black mass on site and processes it to produce lithium carbonate, a critical ingredient for making new batteries to power electric vehicles and store energy on the grid.

From Nevada to Arkansas, companies are racing to dig more lithium out of the ground to meet the clean energy sector’s surging appetite. But this battery recycling facility, owned by Massachusetts-based Ascend Elements, is the first new lithium carbonate producer in the nation in years — and the only source of recycled lithium carbonate in North America. The company is finalizing upgrades to its Covington facility that will allow it to produce up to 3,000 metric tons of lithium carbonate per year beginning later this month. Right now, the only other domestic source of lithium carbonate is a small mine in Silver Peak, Nevada.

Since January, President Donald Trump has taken a sledgehammer to the Biden administration’s efforts to grow America’s clean energy industry. The Trump administration has frozen grants and loans, hollowed out key agencies, and used executive action to stall renewable energy projects and reverse climate policies — often in legally dubious ways. At the same time, citing economic and national security reasons, Trump has sought to advance efforts to produce more critical minerals like lithium in the United States. That is exactly what the emerging lithium-ion battery recycling industry seeks to do, which is why some industry insiders are optimistic about their future under Trump. 

Nevertheless, U.S. battery recyclers face uncertainty due to fast-changing tariff policies, the prospect that Biden-era tax credits could be repealed by Congress as it seeks to slash federal spending, and signs that the clean energy manufacturing boom is fading.

Battery recyclers are in “a limbo moment,” said Beatrice Browning, a recycling expert at Benchmark Mineral Intelligence, which conducts market research for companies in the lithium-ion battery supply chain. They’re “waiting to see what the next steps are.”


To transition off fossil fuels, the world needs a lot more big batteries that can power EVs and store renewable energy for use when the wind isn’t blowing or the sun isn’t shining. That need is already causing demand for the metals inside batteries to surge. Recycling end-of-life batteries — from electric cars, e-bikes, cell phones, and more — can provide metals to help meet this demand while reducing the need for destructive mining. It’s already happening on a large scale in China, where most of the world’s lithium-ion battery manufacturing takes place and where recyclers benefit from supportive government policies and a steady stream of manufacturing scrap. 

A wide shot of an industrial space where red trucks are parked next to a pit containing huge piles of greenish-gray batteries
Waste batteries are pooled for recycling at a technology park in Jieshou, China. Liu Junxi / Xinhua via Getty Images

When the Biden administration attempted to onshore clean energy manufacturing, U.S. battery recyclers announced major expansion plans, propelled by government financing and other incentives. Under former president Joe Biden, the U.S. Department of Energy, or DOE, launched research and development initiatives to support battery recycling and awarded hundreds of millions of dollars in funding to firms seeking to expand operations. The DOE’s Loan Program’s Office also offered to lend nearly $2.5 billion to two battery recycling companies.

The industry also benefited from tax credits established or enhanced by the 2022 Inflation Reduction Act, the centerpiece of Biden’s climate agenda. In particular, the 45X advanced manufacturing production credit subsidizes domestic production of critical minerals, including those produced from recycled materials. For battery recyclers, the incentive “has a direct bottom-line impact,” according to Roger Lin, VP of government affairs at Ascend Elements.

The DOE didn’t respond to Grist’s request for comment on the status of Biden-era grants and loans for battery recycling. But recyclers report that at least some federal support is continuing under Trump. 

In 2022, Ascend Elements was awarded a $316 million DOE grant to help it construct a second battery recycling plant in Hopkinsville, Kentucky. That grant, which will go toward building capacity to make battery cathode precursor materials from recycled metals, “is still active and still being executed on,” Lin told Grist, with minimal impact from the change in administration. Ascend Elements expects the plant to come online in late 2026.

American Battery Technology Company, a Reno, Nevada-based battery materials firm, told a similar story. In December, the company finalized a $144 million DOE contract to support the construction of its second battery recycling facility, which will extract and refine battery-grade metals from manufacturing scrap and end-of-life batteries. That grant remains active with “no changes” since Trump’s inauguration, CEO Ryan Melsert told Grist. 

Yet another battery recycler, Cirba Solutions, recently learned that a $200 million DOE grant to help it construct a new battery recycling plant in Columbia, South Carolina, is moving forward. At full capacity, this facility is expected to produce enough battery-grade metals to supply half a million EVs a year. Cirba Solutions is also still spending funds from two earlier DOE grants, including a $75 million grant to expand a battery processing plant in Lancaster, Ohio. 

An aerial view of a large industrial space containing neatly arranged barrels, boxes, and storage bins
Barrels containing used batteries are stored in a Li-Cycle facility in Germany. Klaus-Dietmar Gabbert / picture alliance via Getty Images

“I think that we aligned very much to the priorities of the administration,” Danielle Spalding, VP of communications and public affairs at Cirba Solutions, told Grist. 

Those priorities include establishing the U.S. as “the leading producer and processor of non-fuel minerals,” and taking steps to “facilitate domestic mineral production to the maximum possible extent,” according to executive orders signed by Trump in January and March. Because critical minerals are used in many high-tech devices, including military weapons, the Trump administration appears to believe America’s national security depends on controlling their supply chains. As battery recyclers were quick to note following Trump’s inauguration, their industry can help.

“Critical minerals are central to creating a resilient energy economy in the U.S., and resource recovery and recycling companies will continue to play an important role in providing another domestic source of these materials,” Ajay Kochhar, CEO of the battery recycling firm Li-Cycle, wrote in a blog post reacting to one of Trump’s executive orders on energy. 

Li-Cycle, which closed a $475 million loan with the DOE’s Loan Programs Office in November but is now facing possible bankruptcy, didn’t respond to Grist’s request for comment.


While Biden’s approach to onshoring critical mineral production was rooted in various financial incentives, Trump has pursued the same goal using tariffs — and by attempting to fast-track new mines. Although economists have criticized Trump’s indiscriminate and unpredictable application of tariffs, some battery recyclers are cautiously optimistic they will benefit from increased trade restrictions. In particular, recyclers see the escalating trade war with China — including recent limits on exports of various critical minerals to the U.S. — as further evidence that new domestic sources of these resources are needed. (China is the world’s leading producer of most key battery metals.)

“There is a chance that limiting the amount that is being imported from China … could really strengthen” mineral production in other regions, including the U.S., Browning said.

Trade restrictions between the U.S. and key partners outside of China could be more harmful. Today, Browning says, U.S. recyclers often sell the black mass they produce to refiners in South Korea, which don’t produce enough domestically to meet their processing capacity and are paying a premium to secure material from abroad. Trump imposed 25 percent tariffs on Korean imports in April, before placing them on a 90-day pause. If South Korea were to implement retaliatory tariffs in response, it could cut off a key revenue stream for the U.S. industry. However, recycling companies Grist spoke noted that there are currently no export bans or tariffs affecting their black mass, and emphasized their plans to build up local refining capacity. 

Two hands wearing turquoise latex gloves hold a glass lab dish that contains a dark powder
A scientific employee holds a glass dish that contains black mass from dead batteries. Robert Michael / picture alliance via Getty Images

“The short answer is that we see the tariffs as an opportunity to focus on domestic manufacturing,” Spalding of Cirba Solutions said. 

While battery recyclers seem to align with Trump on critical minerals policy, and to some extent on trade, their interests diverge when it comes to energy policy. Without a clean energy manufacturing boom in the U.S., there would be far less need for battery recycling.

Today, nearly 40 percent of the material available to battery recyclers in the U.S. is production scrap from battery gigafactories, according to data from Benchmark. Another 15 percent consists of used EV batteries that have reached the end of their lives or been recalled, while grid storage and micromobility batteries (such as e-bike batteries) account for 14 percent. The remaining third of the material available for processing is portable batteries, like those in consumer electronics.

In the future, as more EVs reach the end of their lives, an even greater fraction of battery scrap will come from the clean energy sector. If a large number of planned battery and EV manufacturing facilities are canceled in the coming years — due to a repeal of Inflation Reduction Act tax incentives, a loss of federal funding, rising project costs, or perhaps all three — the recycling industry may have to scale back its ambitions, too. 

The budget bill that passed the House in May would undo a number of key Inflation Reduction Act provisions. Some clean energy tax credits, like the consumer EV tax credit, would be eliminated at the end of this year. The legislation was kinder to the 45X manufacturing credit, scheduling it to end in 2031 rather than the current phase-out date of 2032. But the bill could face significant changes in the Senate before heading to Trump’s desk, possibly by July 4. 

Despite uncertainty over the fate of IRA tax credits, Trump’s actions have already put a damper on U.S. manufacturing: Since January, firms have abandoned or delayed plans for $14 billion worth of U.S. clean energy projects, according to the clean tech advocacy group E2.

While the battery recyclers Grist spoke with are putting on a brave face under Trump’s second term, some are also looking to hedge their bets. As Ascend Elements ramps up lithium production in Georgia, it has lined up at least one buyer outside the battery supply chain. The battery industry accounts for nearly 90 percent of lithium demand globally, but the metal is also used in various industrial applications, including ceramics and glass making.

Integrating into the EV battery supply chain remains “the ultimate goal,” Lin told Grist. “But we are looking at other plans to ensure … the economic viability of the operation continues.”

This story was originally published by Grist with the headline Trump’s second term is creating ‘a limbo moment’ for US battery recyclers on Jun 10, 2025.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/technology/trump-battery-recycling-lithium-grants-funding-tariffs-ira-tax-credits/feed/ 0 537690
The Pragmatic-Demolition of  Techno-Feudalism https://www.radiofree.org/2025/06/09/the-pragmatic-demolition-of-techno-feudalism/ https://www.radiofree.org/2025/06/09/the-pragmatic-demolition-of-techno-feudalism/#respond Mon, 09 Jun 2025 14:50:34 +0000 https://dissidentvoice.org/?p=158917 One of the greatest tricks capitalism ever played on the global intelligentsia was convincing some of them that it no longer exists, that it is dead and gone, having vanished in plain sight from the face of the earth. And in the last few years, a branch of political economy has risen arguing exactly this, whereby […]

The post The Pragmatic-Demolition of  Techno-Feudalism first appeared on Dissident Voice.]]>
One of the greatest tricks capitalism ever played on the global intelligentsia was convincing some of them that it no longer exists, that it is dead and gone, having vanished in plain sight from the face of the earth. And in the last few years, a branch of political economy has risen arguing exactly this, whereby capitalism has unraveled and devolved into techno-feudalism. That is, that capitalism has exited the stage of world history, or has started to do so, only to be replaced by techno-feudalism, i.e., a socio-economic formation, where markets have been usurped and/or abolished in favor of highly-organized and highly-controlled internet platforms, who are owned and operated by one-person, or a select few, that control every aspect of their digital fiefdoms. Techno-feudalism is the idea that capitalism has receded, along with profits and the profit-imperative, in favor of central-bank money, i.e., fiat money, now taking the place of all profit-making. For these theoreticians of techno-feudalism, capitalism is dead. And like an old battle weary baby boomer, gently easing him or herself into a warm tub, filled with Epsom salt, capitalism as well, has gently eased itself into the hot tub of techno-feudalism and dissolved itself into a new post-capitalist socio-economic regime, without kicking up a fuss.

Ultimately, this is false. It is false, in the sense that: 1) the world economy is, on most counts, functioning and operating according to the logic of capitalism, namely, that 99.9999% of the world economy continues to be all about the maximization of profit, which also includes these internet fiefdoms. In the sense that the maximization of profit by any means necessary, for share-holders, continues to be the driving force of the system. Granted, in certain instances, profits may be derived from the central-banks through quantitative easing practices, i.e., the soaking up of easy money by giant corporations, who buy back their own shares, rather than by selling commodities to consumers. Notwithstanding, from the share-holders’ perspective, this is still profit, regardless where the capital surplus comes from. Subsequently, nowadays, profits can come from anywhere in all sorts of forms, whether it is from quantitative easing, accumulation by dispossession, rent, war, and/or from interest payments etc. Wherever it comes from, it is profit through and through, a surplus, which is then classified under the category of profit or revenue, regardless of its source. Hence, if it is a surplus, it is a profit, a revenue of some kind. In the sense that, in the age of techno-capitalist-feudalism, whatever an entity or entities can get away with in the marketplace and/or the sphere of production is ultimately valid, legitimate, and normal.

Therefore, despite what some academics’ argue, profit is still the central-operating-code of all these so-called internet fiefdoms, whether they are conscious of this fact or not. True, these digital platforms are about the cultivation and harvesting of personal information, but all this information-gathering is fundamentally about amassing profit, namely, super-profits in an anonymous and indirect manner. These digital platforms convert personal data into profit, whether by selling these data-sets to advertisers, or by improving their own technology to better stimulate individual customer purchases and services on their own specific platforms. As always, the point is capitalist revenue, i.e., profit-making by any means necessary, at the lowest financial cost, as soon as possible.

And finally, 2) whatever its make-up, the newly-risen, neo-feudal tech-aristocracy continues to subscribe heart and soul to the logic of capitalism. In the sense that its origins lie in the logic of capitalism, or more specifically, the logic of capitalism super-charged to its utmost neoliberal extremes. This new aristocracy is capitalist to the core. It seeks to capitalize on resources and people, by any means, in order to amass capital for itself at the expense of the workforce/population, as it always has throughout its history. And rent is a method of amassing capital. Consequently, this new aristocracy is not a technological aristocracy per se, it is a capitalist aristocracy, first and foremost. It is an aristocracy that uses the tools of machine-technology as a means to amass power, profit, and capital, for itself. That is, this aristocracy uses the tools of machine-technology to better align itself with the dictates of the logic of capitalism. For this aristocracy, technology is not an end-in-itself, but, a means to amass more power, profit, and capital, nothing more and nothing less. Thus, capital accumulation is still the end-game of all the financial maneuvers, all the algorithmic innovations, all the rent-extractions, and all the power-plays that these internet fiefdoms engage-in. The highest possible return on capital investment continues to be the bottom-line, regardless of where this return comes from, or what the theoreticians of techno-feudalism claim. Lest we forget that these internet fiefdoms do invest massively in research and development, more so than at any other time in history.

Subsequently, the software of the system encoded upon everything and everyone is still the logic of capitalism, while the hardware of the system is continually changing and mutating into all sorts of monstrous forms. And, naturally, the theoreticians of techno-feudalism want you to solely focus on the constantly mutating hardware of the capitalist-system, forgoing the hidden immutable software of the system, namely, the software driving the whole system. In the sense that it is only in this manner that the techno-feudal argument holds any water. Forget the software, only concentrate on the hardware, and ye shall believe, believe as an enchanted zealot in the opulence of the techno-feudal sci-fi fantasy and hypothesis.

Specifically, the economic theoreticians of techno-feudalism are those individuals who would look-upon the first generation terminator model, i.e., the T-800, from the first terminator film as the only authentic cyborg worthy of being called, a terminator. While, the second generation terminator model, i.e., the T-1000, from the second installment of the terminator films would not be a terminator in their eyes, but, something totally different, something that has completely transcended the definition of what a terminator is and what it constitutes. The T-1000 is not a terminator, if you follow the logic of techno-feudalism, because it does not behave, or look, as the original terminator does. The T-1000 is made of liquid metal, while the first generation T-800 is made of living tissue, covering its stainless steel skeleton. Thereby, they are two totally different incompatible entities. Indeed, the T-1000 is not a terminator, but an entity that is totally new and different, unrecognizable as a terminator in relation to the T-800.

And, indeed, the whole set of arguments about the validity of techno-feudalism revolve around such theoretical tricks and sleights of hand. That capitalism is no longer capitalism because it does not function and operate as capitalism once did in its distant past. Capitalism has evolved into something completely different, as the initial terminator, i.e., the T-800, has evolved into something completely different, the T-1000. What the theoreticians of techno-feudalism do not notice, or simply fail to mention, is that all the multi-varied versions of capitalism, as well as the multi-varied versions of terminators, share the same immutable software. They share the same central-operating-code, which is their defining immutable characteristic. Due to the fact that the T-800 and the T-1000 were algorithmically programmed to achieve the same end, to kill John Conner by any means necessary. This is what defined these cyborg-machines as terminators, not their make-up, their radically different hardware. Just as the old form of capitalism and its newer model, i.e., techno-capitalist-feudalism, share the same end, the same code, i.e., the maximization of profit, by any means necessary, at the lowest financial cost, as soon as possible. Despite the fact that both function and operate in radically different manners and have radically different hardware.

Ultimately, to achieve and maximize capital is the algorithmic thread that unites all prior forms of capitalism with all its newest model versions, since, surplus value from the central banks, or surplus value from the exploitation of laborers, or surplus value from rent, or wherever else, amounts to the same thing, profiteering at the expense of another, regardless how that profiteering is made, or where that profiteering comes from. As a matter of fact, the tired and antiquated feudal mechanism of rent extraction was appropriated by emerging capitalism, where it was upgraded, supercharged, and welded-tight to industrial capital, as its own.

In short, capitalist rent is a type of profiteering; capitalist profit is a type of profiteering. Rent is stolen unpaid work, i.e., surplus value; profit is stolen unpaid work, i.e., surplus value. And both rent and profit are fundamental types of capitalist revenue, namely, they are two sides of the same capital coin. And both are the embodiment of magnitudes of force and influence, capable of bending existence to the will of a capitalist entity. Finally, rent and profit are methods by which to accumulate capital, in the sense that profit and rent are both capital, as well as specific modes of capital accumulation. And both have been present in and across the system since the dawn of capitalism and even before that.

Notwithstanding, the theoreticians of techno-feudalism do not acknowledge this fact. For them, profit is profit only when 1) it is private, i.e., it is strictly made by private enterprises; and 2) it comes strictly from the sphere of commodity-production, i.e., the exploitation of workers in the production sphere. While, rent is rent when it is a fee commanded and paid for, pertaining to the use of a piece of private property, whatever that property is. Specifically, for these theoreticians, rent and profit do not intermingle and they do not embody the same substance, i.e., force and influence. For them, rent and profit are different because their modes of capital accumulation are different. As a result, the theoreticians of techno-feudalism skip over many fundamental economic facts, concerning the certainty that rent and profit are capital, and that rent and profit comprise their own individual methods of capital accumulation. That is, that the end-game of both profit and rent is the same, i.e., to accumulate as much capital as force and influence will allow. Like the T-800 and the T-1000, rent and profit have the same fundamental objective, the same central-operating-code, namely, to accrue the maximum amount of capital by any means necessary, as soon as possible! In the sense that both methods of capital accumulation have been subsumed and integrated into the accumulation processes of totalitarian-capitalism. Whereby, today, profit-making and rent-extraction function and operate in tandem at the behest of the logic of capitalism and the 1 percent.

And more importantly, the whole techno-feudalist theoretical framework and argument hinges on profit and rent being radically dissimilar and distinctly separated; when, in reality, they are in principle the same. They are both surplus value, forms of power, and profiteering modes of capital accumulation, modes by which to absorb and extract value from another, gratis. Rent is paid out of newly created surplus value; and profit is paid out of newly-created surplus value. All the same, the theoreticians of techno-feudalism pass over these fundamental economic facts in silence, concealing their inherent similarities and their primary importance as capitalist gain.

Above all, the theoreticians of techno-feudalism do not give credence to Mark Fisher’s notion that capitalism is “a monstrous, infinitely plastic entity, capable of metabolizing and absorbing anything with which it comes into contact”, akin to the T-1000 terminator.1 The theoreticians of techno-feudalism do not acknowledge that capitalism can change its hardware in an infinity of forms, gothic, gruesome, and sadistic, whatever it needs to do; all the while still adhering to its immutable uncompromising software demanding endless capital accumulation. These techno-feudal theorists never mention the immutable software of capitalism, its central-operating-code, the same for the last 250 years. And just like the T-1000 terminator, capitalism will end and disappear only when its software, its central-operating-code, ends and disappears in the hellish crucible of molten metal, that is, the anarchist revolution.

For example, under the old form of capitalism we had yachts, but now, under the new form of capitalism, i.e., totalitarian-capitalism, or more importantly, techno-capitalist-feudalism, we have super-yachts. Similarly, under the old form of capitalism we had privately-owned backyard air-fields, but now, under the new form of capitalism, we have privately-owned backyard space launch centers. Of course, the theoreticians of techno-feudalism would have you believe that super-yachts, or privately-owned backyard space launch centers, are the product of a wholly different system that has abandoned the logic of capitalism. However, one can clearly see and comprehend that super-yachts and backyard space launch centers are just a logical progression of the logic of capitalism, supercharged to the Nth degree. One develops out of the other, thanks to a new fanatical form of neoliberalism, neoliberalism on methamphetamine, manically driving backwards towards feudalism redux, that is, FEUDALISM 2.0.

Indeed, even the billionaire caste is a grotesque abomination of the logic of capitalism, out of control and out of whack. In the sense that thousands must be rendered destitute and homeless in order to manufacture a single billionaire. And being Frankenstein monsters, these grotesque billionaire mutants of totalitarian-capitalism unhinged, will eventually have to be hunted down with pitchforks and blowtorches, if the multitude of peasant-workers are to overcome and abolish the horrors of techno-capitalist serfdom, once and for all.

As a result, capitalism is not dead, but, has only amplified itself to its utmost logical extreme. It has become totalitarian and super-exploitative. In the sense that the logic of capitalism still powers all the newly-risen fiefdoms of the era of techno-capitalist-feudalism. And just like the old form of capitalism, the new form of capitalism has a ruling caste, which, in most instances, is still ironically the same ruling caste that was in power during the reign of the old form of capitalism. And just like the old form of capitalism, the members of this new form of capitalism, comprising its so-called new ruling caste, continue to be the sole owners of the means and forces of production, while, the workforce/population continues to be dominated by a capitalist wage-system, like in the old days, when the old antiquated form of powdered-wig capitalism ruled supreme.

Today, just like in the past era of run-of-the-mill traditional-capitalism, peasant-workers only have their labor-power, or creative-power, to sell to the owner or owners of the means and forces of production. The only difference in-between the old form of capitalism and the new form of capitalism, i.e., the age of monopoly-capitalism and the age of super-monopoly, or techno-capitalist-feudalism,  is that today peasant-workers can be paid below subsistence levels, whereas before, they were not. In fact, workers now have to work multiple jobs and more hours to make ends meet, since they have no benefits and are paid largely below subsistence levels. Therefore, the logic or software of capitalism has not disappeared. And to say that it has is a gross exaggeration. In other words, the age of monopoly has simply given way to the age of super-monopoly, namely, the dark age of techno-capitalist-feudalism. Wherein, the logic of capitalism continues to thrive and multiply, ad nauseam. Because capitalism has always been dead, dead and congealed, namely, a congealed set of power-relations, which vampire-like live the more, the more creativity they suck, from all their unsuspecting, living peasant-workers.2

In sum, the specter of capitalism haunts techno-feudalism as software, as its hidden code lodged deep within its radically incompatible ever-mutating hardware. Thereby, the specter of capitalism haunts all the theoretical machinations and the minutia of techno-feudalism, since, techno-feudalism, or more accurately, techno-capitalist-feudalism, is the result of the capital/labor relationship at its most lopsided, oppressive, and technologically dominating. The capital/labor relationship continues to hold; it continues to hold at the center of techno-feudalism, or more accurately, techno-capitalist-feudalism. In the sense that the logic of capitalism pervades, envelops, infects, and poisons, all aspects of society and techno-feudalism, since, the logic of capitalism continues to be the foundation and the fundamental under-girder of society and techno-feudalism, a foundation that techno-feudalism refuses to acknowledge or even address, adequately. (Let us not forget that, like its predecessors, techno-feudalism continues the long history of the critique of capitalism by talking once again about the central concept of capitalism, i.e., CAPITAL, whether this is monopoly-capital, rentier-capital, digital-capital, communicative-capital, surveillance-capital, and/or the new all-terrifying poltergeist of cloud-capital). In short, techno-feudalism distorts the aberrant monstrosity of techno-capitalist-feudalism, the horror-show that is the despotic age of totalitarian-capitalism, whereby, super-monopoly and super-profits are multi-varied, ruthless, and fundamentally undisciplined.

As it happens, in the dark age of techno-capitalist-feudalism, super-exploitation is 24/7. Whereupon, there is no escape or chance of relief, as the newly-minted post-industrial serfs, i.e., the 99 percent, are forever bound in all sorts of insidious Malthusian traps, financial Catch-22s, crippling debt etc., which have them all going around in circles in and across a hopeless set of bureaucratic labyrinths, all designed to keep them stationary and subservient upon the lower-stratums of the system. As a result, the ruminations of techno-feudalism are scientifically disingenuous. They skew the facts and the true reality of the billions of peasant-workers, toiling under the jackboot of capitalist exploitation, capitalist debt, capitalist rent, and a capitalist wage-system of piecemeal slavery. Subsequently, techno-feudalism is a disservice to workers. To drop the term “capitalist” from techno-capitalist-feudalism, only muddies the clear blue waters of the terminal stage of capitalist development, namely, the new dawning epoch of totalitarian-capitalism, that is, the new dystopian age of techno-capitalist-feudalism, run-amok.

Just because the old capitalist bourgeoisie has embraced digital algorithms and invasive surveillance technologies as its own, and has abstracted itself at a higher-level of socio-economic existence, away from the workforce/population, whereby, it now appears invisible and increasingly distant from the everyday lives of workers, does not mean the old capitalist bourgeoisie has melted away into thin air, or has been usurped by a new, strictly technological aristocracy. What has happened is that the old capitalist bourgeoisie has become a techno-capitalist-feudal-aristocracy, since, the logic of capitalism, capitalist profit, capitalist rent, and capitalist technological innovations, continue to inform and motivate this authoritarian feudo-capitalist aristocracy.

In the end, economic supremacy resides with the capitalists, since, they control the repressive-state-apparatuses, while the tech-lords do not. Therefore, these feudo-capitalist lords only exist by virtue of and by the good grace of traditional capitalists, who control the repressive-state-apparatuses. The tech-lords do not have their own repressive-state-apparatus, thereby, they will always remain secondary, merely a small part of the overall feudo-capitalist aristocracy, forever at the mercy of those who control the military, namely, all those blood thirsty repressive-state-apparatuses of the state-finance-corporate-aristocracy, the 1%.

In view of these damning facts, techno-feudalism is a bust, a wrong turn, a wrong-brained play on words, leading to a theoretical dead-end that only empowers capitalist supremacy at the expense of    workers’ liberation and self-management. It must be jettisoned. The fact of the matter is that the logic of capitalism continues to rule, because the peasant-workers, i.e., the anarcho-proletarians, the punks have yet to overthrow the capitalist mode of production, consumption, and distribution, from the active theater of world history. Thus, within the so-called evolutionary whimper of techno-feudalism, the logic of capitalism is thriving, laughing all the way to the bank. It will never go quietly and orderly into that good night. Capitalism will only go out with a bang, a loud resounding cataclysmic bang. As capitalism came into this world soaked in blood from head to toe; and it will only leave this world gushing blood, allover the globe.3 Because, devoid of the epic blast of rampant anarchist revolution, capitalism invariably marches-on as, and in the form of, techno-capitalist-feudalism. Ergo, in the dark age of TCF:

Resistance is feudal and the guillotine is forever!

ENDNOTES:

1 Mark Fisher, Capitalist Realism (United Kingdom: Zero Books, 2009), p. 6.

2 Karl Marx, Capital (Volume One), Trans. Ben Fowkes, (London, Eng.: Penguin, 1990), p. 342.

3 Karl Marx, Capital (Volume One), p. 926.

The post The Pragmatic-Demolition of  Techno-Feudalism first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Michel Luc Bellemare.

]]>
https://www.radiofree.org/2025/06/09/the-pragmatic-demolition-of-techno-feudalism/feed/ 0 537482
Trump’s Palantir-Powered Surveillance Is Turning America Into a Digital Prison https://www.radiofree.org/2025/06/04/trumps-palantir-powered-surveillance-is-turning-america-into-a-digital-prison/ https://www.radiofree.org/2025/06/04/trumps-palantir-powered-surveillance-is-turning-america-into-a-digital-prison/#respond Wed, 04 Jun 2025 15:00:09 +0000 https://dissidentvoice.org/?p=158825 Call it what it is: a panopticon presidency. President Trump’s plan to fuse government power with private surveillance tech to build a centralized, national citizen database is the final step in transforming America from a constitutional republic into a digital dictatorship armed with algorithms and powered by unaccountable, all-seeing artificial intelligence. This isn’t about national security. It’s about control. […]

The post Trump’s Palantir-Powered Surveillance Is Turning America Into a Digital Prison first appeared on Dissident Voice.]]>
Call it what it is: a panopticon presidency.

President Trump’s plan to fuse government power with private surveillance tech to build a centralized, national citizen database is the final step in transforming America from a constitutional republic into a digital dictatorship armed with algorithms and powered by unaccountable, all-seeing artificial intelligence.

This isn’t about national security. It’s about control.

According to news reports, the Trump administration is quietly collaborating with Palantir Technologies—the data-mining behemoth co-founded by billionaire Peter Thiel—to construct a centralized, government-wide surveillance system that would consolidate biometric, behavioral, and geolocation data into a single, weaponized database of Americans’ private information.

This isn’t about protecting freedom. It’s about rendering freedom obsolete.

What we’re witnessing is the transformation of America into a digital prison—one where the inmates are told we’re free while every move, every word, every thought is monitored, recorded, and used to assign a “threat score” that determines our place in the new hierarchy of obedience.

The tools enabling this all-seeing surveillance regime are not new, but under Trump’s direction, they are being fused together in unprecedented ways, with Palantir at the center of this digital dragnet.

Palantir, long criticized for its role in powering ICE (Immigration and Customs Enforcement) raids and predictive policing, is now poised to become the brain of Trump’s surveillance regime.

Under the guise of “data integration” and “public safety,” this public-private partnership would deploy AI-enhanced systems to comb through everything from facial recognition feeds and license plate readers to social media posts and cellphone metadata, cross-referencing it all to assess a person’s risk to the state.

This isn’t speculative. It’s already happening.

Palantir’s Gotham platform, used by law enforcement and military agencies, has long been the backbone of real-time tracking and predictive analysis. Now, with Trump’s backing, it threatens to become the central nervous system of a digitally enforced authoritarianism.

As Palantir itself admits, its mission is to “augment human decision-making.” In practice, that means replacing probable cause with probability scores, courtrooms with code, and due process with data pipelines.

In this new regime, your innocence will be irrelevant. The algorithm will decide who you are.

To understand the full danger of this moment, we must trace the long arc of government surveillance—from secret intelligence programs like COINTELPRO and the USA PATRIOT Act to today’s AI-driven digital dragnet embodied by data fusion centers.

Building on this foundation of historical abuse, the government has evolved its tactics, replacing human informants with algorithms and wiretaps with metadata, ushering in an age where pre-crime prediction is treated as prosecution.

Every smartphone ping, GPS coordinate, facial scan, online purchase, and social media like becomes part of your “digital exhaust”—a breadcrumb trail of metadata that the government now uses to build behavioral profiles. The FBI calls it “open-source intelligence.” But make no mistake: this is dragnet surveillance, and it is fundamentally unconstitutional.

Already, government agencies are mining this data to generate “pattern of life” analyses, flag “radicalized” individuals, and preemptively investigate those who merely share anti-government views.

This is not law enforcement. This is thought-policing by machine, the logical outcome of a system that criminalizes dissent and deputizes algorithms to do the targeting.

Nor is this entirely new.

For decades, the federal government has reportedly maintained a highly classified database known as Main Core, designed to collect and store information on Americans deemed potential threats to national security.

As Tim Shorrock reported for Salon, “One former intelligence official described Main Core as ‘an emergency internal security database system’ designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law.”

Trump’s embrace of Palantir, and its unparalleled ability to fuse surveillance feeds, social media metadata, public records, and AI-driven predictions, marks a dangerous evolution: a modern-day resurrection of Main Core, digitized, centralized, and fully automated.

What was once covert contingency planning is now becoming active policy.

What has emerged is a surveillance model more vast than anything dreamed up by past regimes—a digital panopticon in which every citizen is watched constantly, and every move is logged in a government database—not by humans, but by machines without conscience, without compassion, and without constitutional limits.

This is not science fiction. This is America—now.

As this technological tyranny expands, the foundational safeguards of the Constitution—those supposed bulwarks against arbitrary power—are quietly being nullified and its protections rendered meaningless.

What does the Fourth Amendment mean in a world where your entire life can be searched, sorted, and scored without a warrant? What does the First Amendment mean when expressing dissent gets you flagged as an extremist? What does the presumption of innocence mean when algorithms determine guilt?

The Constitution was written for humans, not for machine rule. It cannot compete with predictive analytics trained to bypass rights, sidestep accountability, and automate tyranny.

And that is the endgame: the automation of authoritarianism. An unblinking, AI-powered surveillance regime that renders due process obsolete and dissent fatal.

Still, it is not too late to resist—but doing so requires awareness, courage, and a willingness to confront the machinery of our own captivity.

Make no mistake: the government is not your friend in this. Neither are the corporations building this digital prison. They thrive on your data, your fear, and your silence.

To resist, we must first understand the weaponized AI tools being used against us.

We must demand transparency, enforce limits on data collection, ban predictive profiling, and dismantle the fusion centers feeding this machine.

We must treat AI surveillance with the same suspicion we once reserved for secret police. Because that is what AI-powered governance has become—secret police, only smarter, faster, and less accountable.

We don’t have much time.

Trump’s alliance with Palantir is a warning sign—not just of where we are, but of where we’re headed. A place where freedom is conditional, rights are revocable, and justice is decided by code.

The question is no longer whether we’re being watched—that is now a given—but whether we will meekly accept it. Will we dismantle this electronic concentration camp, or will we continue building the infrastructure of our own enslavement?

As I point out in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, if we trade liberty for convenience and privacy for security, we will find ourselves locked in a prison we helped build, and the bars won’t be made of steel. They will be made of data.

The post Trump’s Palantir-Powered Surveillance Is Turning America Into a Digital Prison first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2025/06/04/trumps-palantir-powered-surveillance-is-turning-america-into-a-digital-prison/feed/ 0 536563
Fiji coup culture and political meddling in media education gets airing https://www.radiofree.org/2025/06/03/fiji-coup-culture-and-political-meddling-in-media-education-gets-airing/ https://www.radiofree.org/2025/06/03/fiji-coup-culture-and-political-meddling-in-media-education-gets-airing/#respond Tue, 03 Jun 2025 12:59:49 +0000 https://asiapacificreport.nz/?p=115565 Pacific Media Watch

Taieri MP Ingrid Leary reflected on her years in Fiji as a television journalist and media educator at a Fiji Centre function in Auckland celebrating Fourth Estate values and independence at the weekend.

It was a reunion with former journalism professor David Robie — they had worked together as a team at the University of the South Pacific amid media and political controversy leading up to the George Speight coup in May 2000.

Leary was the guest speaker at a gathering of human rights activists, development advocates, academics and journalists hosted at the Whānau Community Centre and Hub, the umbrella base for the Fiji Centre and Asia Pacific Media Network.

She said she was delighted to meet “special people in David’s life” and to be speaking to a diverse group sharing “similar values of courage, freedom of expression, truth and tino rangatiratanga”.

“I want to start this talanoa on Friday, 19 May 2000 — 13 years almost to the day of the first recognised military coup in Fiji in 1987 — when failed businessman George Speight tore off his balaclava to reveal his identity.

She pointed out that there had actually been another “coup” 100 years earlier by Ratu Cakobau.

“Speight had seized Parliament holding the elected government at gunpoint, including the politician mother, Lavinia Padarath, of one of my best friends — Anna Padarath.

Hostage-taking report
“Within minutes, the news of the hostage-taking was flashed on Radio Fiji’s 10 am bulletin by a student journalist on secondment there — Tamani Nair. He was a student of David Robie’s.”

Nair had been dispatched to Parliament to find out what was happening and reported from a cassava patch.

“Fiji TV was trashed . . . and transmission pulled for 48 hours.

“The university shut down — including the student radio facilities, and journalism programme website — to avoid a similar fate, but the journalism school was able to keep broadcasting and publishing via a parallel website set up at the University of Technology Sydney.

“The pictures were harrowing, showing street protests turning violent and the barbaric behaviour of Speight’s henchmen towards dissenters.

“Thus began three months of heroic journalism by David’s student team — including through a period of martial law that began 10 days later and saw some of the most restrictive levels of censorship ever experienced in the South Pacific.”

Leary paid tribute to some some of the “brave satire” produced by senior Fiji Times reporters filling paper with “non-news” (such as haircuts, drinking kava) as act of defiance.

“My friend Anna Padarath returned from doing her masters in law in Australia on a scholarship to be closer to her Mum, whose hostage days within Parliament Grounds stretched into weeks and then months.

Whanau Community Centre and Hub co-founder Nik Naidu
Whanau Community Centre and Hub co-founder Nik Naidu speaking at the Asia Pacific Media Network event at the weekend. Image: Khairiah A. Rahman/APMN

Invisible consequences
“Anna would never return to her studies — one of the many invisible consequences of this profoundly destructive era in Fiji’s complex history.

“Happily, she did go on to carve an incredible career as a women’s rights advocate.”

“Meanwhile David’s so-called ‘barefoot student journalists’ — who snuck into Parliament the back way by bushtrack — were having their stories read and broadcast globally.

“And those too shaken to even put their hands to keyboards on Day 1 emerged as journalism leaders who would go on to win prizes for their coverage.”

Speight was sentenced to life in prison, but was pardoned in 2024.

Taeri MP Ingrid Leary speaking
Taeri MP Ingrid Leary speaking at the Whānau Community Centre and Hub. Image: Nik Naidu/APMN

Leary said that was just one chapter in the remarkable career of David Robie who had been an editor, news director, foreign news editor and freelance writer with a number of different agencies and news organisations — including Agence France-Presse, Rand Daily Mail, The Auckland Star, Insight Magazine, and New Outlook Magazine — “a family member to some, friend to many, mentor to most”.

Reflecting on working with Dr Robie at USP, which she joined as television lecturer from Fiji Television, she said:

“At the time, being a younger person, I thought he was a little but crazy, because he was communicating with people all around the world when digital media was in its infancy in Fiji, always on email, always getting up on online platforms, and I didn’t appreciate the power of online media at the time.

“And it was incredible to watch.”

Ahead of his time
She said he was an innovator and ahead of his time.

Dr Robie viewed journalism as a tool for empowerment, aiming to provide communities with the information they needed to make informed decisions.

“We all know that David has been a champion of social justice and for decolonisation, and for the values of an independent Fourth Estate.”

She said she appreciated the freedom to develop independent media as an educator, adding that one of her highlights was producing the groundbreaking documentary Maire about Maire Bopp Du Pont, who was a student journalist at USP and advocate for the Pacific community living with HIV/AIDs community.

She later became a nuclear-free Pacific parliamentarian in Pape’ete.

Leary presented Dr Robie with a “speaking stick” carved from an apricot tree branch by the husband of a Labour stalwart based in Cromwell — the event doubled as his 80th birthday.

In response, Dr Robie said the occasion was a “golden opportunity” to thank many people who had encouraged and supported him over many years.

Massive upheaval
“We must have done something right,” he said about USP, “because in 2000, the year of George Speight’s coup, our students covered the massive upheaval which made headlines around the world when Mahendra Chaudhry’s Labour-led coalition government was held at gunpoint for 56 days.

“The students courageously covered the coup with their website Pacific Journalism Online and their newspaper Wansolwara — “One Ocean”.  They won six Ossie Awards – unprecedented for a single university — in Australia that year and a standing ovation.”

He said there was a video on YouTube of their exploits called Frontline Reporters and one of the students, Christine Gounder, wrote an article for a Commonwealth Press Union magazine entitled, “From trainees to professionals. And all it took was a coup”.

Dr Robie said this Fiji experience was still one of the most standout experiences he had had as a journalist and educator.

Along with similar coverage of the 1997 Sandline mercenary crisis by his students at the University of Papua New Guinea.

He made some comments about the 1985 Rainbow Warrior voyage to Rongelap in the Marshall islands and the subsequent bombing by French secret agents in Auckland.

But he added “you can read all about this adventure in my new book” being published in a few weeks.

Taieri MP Ingrid Leary (right) with Dr David Robie and his wife Del Abcede
Taieri MP Ingrid Leary (right) with Dr David Robie and his wife Del Abcede at the Fiji Centre function. Image: Camille Nakhid

Biggest 21st century crisis
Dr Robie said the profession of journalism, truth telling and holding power to account, was vitally important to a healthy democracy.

Although media did not succeed in telling people what to think, it did play a vital role in what to think about. However, the media world was undergoing massive change and fragmentation.

“And public trust is declining in the face of fake news and disinformation,” he said

“I think we are at a crossroads in society, both locally and globally. Both journalism and democracy are under an unprecedented threat in my lifetime.

“When more than 230 journalists can be killed in 19 months in Gaza and there is barely a bleep from the global community, there is something savagely wrong.

“The Gazan journalists won the UNESCO/Guillermo Cano World Press Freedom Prize collectively last year with the judges saying, “As humanity, we have a huge debt to their courage and commitment to freedom of expression.”

“The carnage and genocide in Gaza is deeply disturbing, especially the failure of the world to act decisively to stop it. The fact that Israel can kill with impunity at least 54,000 people, mostly women and children, destroy hospitals and starve people to death and crush a people’s right to live is deeply shocking.

“This is the biggest crisis of the 21st century. We see this relentless slaughter go on livestreamed day after day and yet our media and politicians behave as if this is just ‘normal’. It is shameful, horrendous. Have we lost our humanity?

“Gaza has been our test. And we have failed.”

Other speakers included Whānau Hub co-founder Nik Naidu, one of the anti-coup Coalition for Democracy in Fiji (CDF) stalwarts; the Heritage New Zealand’s Antony Phillips; and Multimedia Investments and Evening Report director Selwyn Manning.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2025/06/03/fiji-coup-culture-and-political-meddling-in-media-education-gets-airing/feed/ 0 536296
What’s likely to survive from Biden’s climate law? The controversial stuff. https://grist.org/climate-energy/budget-biden-climate-ccs-tax-credit/ https://grist.org/climate-energy/budget-biden-climate-ccs-tax-credit/#respond Fri, 30 May 2025 21:13:00 +0000 https://grist.org/?p=667411
Dig down about a mile or two in parts of the United States and you’ll start to see the remains of an ancient ocean. The shells of long dead sea creatures are compressed into white limestone, surrounding brine aquifers with a higher salt content than the Atlantic Ocean. 

Last summer, ExxonMobil sponsored week-long camps to teach grade school students from Texas, Louisiana, and Mississippi about the virtues of these aquifers, specifically their ability to serve as carbon capture and sequestration wells, where oil, gas, and heavy industry can bury harmful emissions deep underground. In one exercise, students were given 20 minutes to build a model reservoir out of vegetable oil, Play-Doh, pasta, and uncooked beans. Whoever could keep the most vegetable oil (meant to represent liquified carbon dioxide) in their aquifer, won. 

This kind of down-home carbon capture boosterism is a relatively new development for the oil and gas giant. Over recent years, ExxonMobil and other fossil fuel companies have spent millions lobbying for government support of what they see as industry-friendly green technology, most prominently carbon capture and storage, which many scientists and environmental activists have argued is ineffective and distracts from eliminating fossil fuel operations in the first place. According to Exxon’s website, it’s evidence that they are leading “the biggest energy transition in history.” 

Now that Congress has turned its attention to rolling back government spending on renewable energy, it appears that most of the climate “solutions” being left off the chopping block are the ones favored by carbon-intensive companies like Exxon. Corporate tax breaks for carbon capture and storage, for instance, were one of the few things left untouched when House Republicans passed a budget bill on May 22 that effectively gutted the Inflation Reduction Act, or IRA, the Biden administration’s signature climate legislation. What remained of the IRA’s clean energy tax credits were incentives for nuclear, so-called clean fuels like ethanol, and carbon capture. When the IRA was passed in 2022, there was immediate backlash against the provisions for carbon capture. 

“Essentially, we, the taxpayers, are subsidizing a private sewer system for oil and gas,” said Sandra Steingraber, a senior scientist at the nonprofit Science and Environmental Health Network.

The tax credits for nuclear power plants, which produce energy without emitting greenhouse gases, are meant to spur what President Donald Trump hopes will be an “energy renaissance,” bolstered by a flurry of pro-nuclear executive orders he issued a day after the budget bill cleared the House. Projects will be able to use the tax credits if they begin construction by 2031; wind and solar companies, however, will lose access to tax credits unless they begin construction within 60 days of Trump signing the bill, and are fully up and running by 2028.

That the carbon capture tax credit was never in danger of being revoked is a testament to its importance to the oil and gas industry, said Jim Walsh, the policy director at the nonprofit Food and Water Watch. “The major beneficiaries of these tax credits are oil and gas companies and big agricultural interests.” 

The carbon capture tax credit was first established in 2008, but the subsidies were more than doubled when it was tacked on to the IRA in order to get former Senator Joe Manchin of West Virginia’s vote. Companies now receive $60 for every ton of CO2 captured and used to drive oil out of the ground (a process known as “enhanced oil recovery”) and up to $85 for a ton of CO2 that is permanently stored. As roughly 60 percent of captured C02 in the United States is used for enhanced oil recovery, detractors see the tax credit as something of a devil’s bargain, a provision that props up an industry at taxpayer expense. 

oil refinery emitting smoke in front of a beautiful pink sunset
An oil refinery in Los Angeles Mario Tama/Getty Images

How much carbon is actually captured by these projects is also a matter of debate. The tax credit requires companies that claim it to self-report how much CO2 they inject to the Internal Revenue Service. The Environmental Protection Agency, meanwhile, is in charge of tracking leaks. There are tax penalties if captured carbon ends up leaking, but those penalties only apply if the leaks occur in the first 3 years after injection. Holding companies accountable is made more complicated by the fact that tax returns are confidential, and Walsh cautions that there is very little communication between the EPA and the IRS. Oversight is “very, very minimal,” added Anika Juhn, an energy data analyst at the Institute for Energy Economics and Financial Analysis, a research firm.

“You can keep some really played out oil fields going for a long time, and you can get the public to pay for it,” said Carolyn Raffensberger, the executive director of the Science and Environmental Health Network, explaining the potential impact of the budget bill. “So the argument is, ‘This is a win for the climate, it’s a win for energy dominance.’ [But] it’s really a budget buster with no guardrails at all.” 

Existing carbon-capture facilities have been plagued by technical and financial issues. The country’s first commercial carbon capture plant in Decatur, Illinois, sprung two leaks last year directly under Lake Decatur, which is the town’s main source of drinking water. When concentrated CO2 hits water it turns into carbonic acid, which then leaches heavy metals from rocks within the aquifer and poisons the water. Although a certain level of public health concerns come with many emerging technologies, critics point out that all of this risk is being taken for a technology that has not been proven to work at scale, and may actually increase emissions by incentivizing more oil and gas production. It could also strain the existing electrical grid — outfitting a natural gas or coal plant with carbon capture equipment can suck up about 15 to 25 percent of the plant’s power. 

The tax credits exist “to pollute and confuse people,” said Mark Jacobsen, a professor of civil and environmental engineering at Stanford University, who has argued that there is essentially no reasonable use for carbon capture. They “increase people’s [energy] costs and do nothing for the climate.”

But the technology does have its defenders among scientists. The 2022 report from the Intergovernmental Panel on Climate Change called an increase in carbon capture technology “unavoidable” if countries  want to reach net-zero emissions. Jessie Stolark, the executive director of the Carbon Capture Coalition, an umbrella organization of fossil fuel companies, unions, and environmental groups, contends that arguments like Jacobsen’s unnecessarily set the technology against renewables. “We need all the solutions in the toolkit,” she said. “We’re not saying don’t deploy these other technologies. We see this very much as a complementary and supportive piece in the broader decarbonization toolkit.” 

Stolark said that carbon capture didn’t make it out of the budget process entirely unscathed, as the bill specified that companies could no longer sell carbon capture tax credits. So-called “transferability” — the ability to sell these tax credits on the open market — has been invaluable to small energy startups that have struggled to secure financing in their early stages, according to Stolark. The Carbon Capture Coalition is urging lawmakers to restore transferability now that the bill has moved from the House to the Senate.

Still, the kinds of companies likely to claim carbon capture tax credits — often major players in oil and gas, ammonia, steel, and other heavy industries — are less likely to rely on transferability than more modest companies (often providers of renewable energy), whose smaller tax bills makes it harder for them to realize the value of their respective tax credits. 

“A lot of the factories, the power plants, the industrial facilities deploying within the next ten years or so, are expected to be these really big [facilities] with the big tax burdens,” said Dan O’Brien, a senior modeling analyst at Energy Innovations, a clean energy think tank based in San Francisco. “They’re not the type of smaller producers — like small solar companies — that are reliant on transferability in order to monetize the tax credit.” 

To some observers, keeping the carbon capture credit looks like a flagrant giveaway to the oil and gas industry. Juhn estimated that the credit could end up costing taxpayers more than $800 billion by 2040. Given the House bill’s aggressive cuts to social programs like Medicaid and the Supplemental Nutrition Assistance Program, Juhn finds the carbon capture credit offensive. “When we look at these other programs, where we’re nickel and diming benefits to folks that could really use them, what does that mean? It’s gross.” 

This story was originally published by Grist with the headline What’s likely to survive from Biden’s climate law? The controversial stuff. on May 30, 2025.


This content originally appeared on Grist and was authored by Rebecca Egan McCarthy.

]]>
https://grist.org/climate-energy/budget-biden-climate-ccs-tax-credit/feed/ 0 535788
How AI and the Deep State Are Digitizing Tyranny https://www.radiofree.org/2025/05/29/how-ai-and-the-deep-state-are-digitizing-tyranny/ https://www.radiofree.org/2025/05/29/how-ai-and-the-deep-state-are-digitizing-tyranny/#respond Thu, 29 May 2025 17:42:45 +0000 https://dissidentvoice.org/?p=158682 If one company or small group of people manages to develop godlike digital superintelligence, they could take over the world. At least when there’s an evil dictator, that human is going to die. But for an AI, there would be no death. It would live forever. And then you’d have an immortal dictator from which […]

The post How AI and the Deep State Are Digitizing Tyranny first appeared on Dissident Voice.]]>

If one company or small group of people manages to develop godlike digital superintelligence, they could take over the world. At least when there’s an evil dictator, that human is going to die. But for an AI, there would be no death. It would live forever. And then you’d have an immortal dictator from which we can never escape.

—Elon Musk

The Deep State is not going away. It’s just being replaced.

Replaced not by a charismatic autocrat or even a shadowy bureaucracy, but by artificial intelligence (AI)—unfeeling, unaccountable, and immortal.

As we stand on the brink of a new technological order, the machinery of power is quietly shifting into the hands of algorithms.

Under Donald Trump’s watch, that shift is being locked in for at least a generation.

Trump’s latest legislative initiative—a 10-year ban on AI regulation buried within the “One Big Beautiful Bill”—strips state and local governments of the ability to impose any guardrails on artificial intelligence until 2035.

Despite bipartisan warnings from 40 state attorneys general, the bill passed the House and awaits Senate approval. It is nothing less than a federal green light for AI to operate without oversight in every sphere of life, from law enforcement and employment to healthcare, education, and digital surveillance.

This is not innovation.

This is institutionalized automation of tyranny.

This is how, within a state of algorithmic governance, code quickly replaces constitutional law as the mechanism for control.

We are rapidly moving from a society ruled by laws and due process to one ruled by software.

Algorithmic governance refers to the use of machine learning and automated decision-making systems to carry out functions once reserved for human beings: policing, welfare eligibility, immigration vetting, job recruitment, credit scoring, and judicial risk assessments.

In this regime, the law is no longer interpreted. It is executed. Automatically. Mechanically. Without room for appeal, discretion, or human mercy.

These AI systems rely on historical data—data riddled with systemic bias and human error—to make predictions and trigger decisions. Predictive policing algorithms tell officers where to patrol and whom to stop. Facial recognition technology flags “suspects” based on photos scraped from social media. Risk assessment software assigns threat scores to citizens with no explanation, no oversight, and no redress.

These algorithms operate in black boxes, shielded by trade secrets and protected by national security exemptions. The public cannot inspect them. Courts cannot challenge them. Citizens cannot escape them.

The result? A population sorted, scored, and surveilled by machinery.

This is the practical result of the Trump administration’s deregulation agenda: AI systems given carte blanche to surveil, categorize, and criminalize the public without transparency or recourse.

And these aren’t theoretical dangers—they’re already happening.

Examples of unchecked AI and predictive policing show that precrime is already here.

Once you are scored and flagged by a machine, the outcome can be life-altering—as it was for Michael Williams, a 65-year-old man who spent nearly a year in jail for a crime he didn’t commit. Williams was behind the wheel when a passing car fired at his vehicle, killing his 25-year-old passenger, who had hitched a ride.

Despite no motive, no weapon, and no eyewitnesses, police charged Williams based on an AI-powered gunshot detection program called ShotSpotter. The system picked up a loud bang near the area and triangulated it to Williams’ vehicle. The charge was ultimately dropped for lack of evidence.

This is precrime in action. A prediction, not proof. An algorithm, not an eyewitness.

Programs like ShotSpotter are notorious for misclassifying noises like fireworks and construction as gunfire. Employees have even manually altered data to fit police narratives. And yet these systems are being combined with predictive policing software to generate risk maps, target individuals, and justify surveillance—all without transparency or accountability.

It doesn’t stop there.

AI is now flagging families for potential child neglect based on predictive models that pull data from Medicaid, mental health, jail, and housing records. These models disproportionately target poor and minority families. The algorithm assigns risk scores from 1 to 20. Families and their attorneys are never told what the scores are, or that they were used.

Imagine losing your child to the foster system because a secret algorithm said you might be a risk.

This is how AI redefines guilt.

The Trump administration’s approach to AI regulation reveals a deeper plan to deregulate democracy itself.

Rather than curbing these abuses, the Trump administration is accelerating them.

An executive order titled “Removing Barriers to American Leadership in Artificial Intelligence,” signed by President Trump in early 2025, revoked prior AI safeguards, eliminated bias audits, and instructed agencies to prioritize “innovation” over ethics. The order encourages every federal agency to adopt AI quickly, especially in areas like policing and surveillance.

Under the guise of “efficiency,” constitutional protections are being erased.

Trump’s 10-year moratorium on AI regulation is the logical next step. It dismantles the last line of defense—state-level resistance—and ensures a uniform national policy of algorithmic dominance.

The result is a system in which government no longer governs. It processes.

The federal government’s AI expansion is building a surveillance state that no human authority can restrain.

Welcome to Surveillance State 2.0, the Immortal Machine.

Over 1700 uses of AI have already been reported across federal agencies, with hundreds directly impacting safety and rights. Many agencies, including the Departments of Homeland Security, Veterans Affairs, and Health and Human Services, are deploying AI for decision-making without public input or oversight.

This is what the technocrats call an “algocracy”—rule by algorithm.

In an algocracy, unelected developers and corporate contractors hold more power over your life than elected officials.

Your health, freedom, mobility, and privacy are subject to automated scoring systems you can’t see and can’t appeal.

And unlike even the most entrenched human dictators, these systems do not die. They do not forget. They are not swayed by mercy or reason. They do not stand for re-election.

They persist.

When AI governs by prediction, due process disappears in a haze of machine logic.

The most chilling effect of this digital regime is the death of due process.

What court can you appeal to when an algorithm has labeled you a danger? What lawyer can cross-examine a predictive model? What jury can weigh the reasoning of a neural net trained on flawed data?

You are guilty because the machine says so. And the machine is never wrong.

When due process dissolves into data processing, the burden of proof flips. The presumption of innocence evaporates. Citizens are forced to prove they are not threats, not risks, not enemies.

And most of the time, they don’t even know they’ve been flagged.

This erosion of due process is not just a legal failure—it is a philosophical one, reducing individuals to data points in systems that no longer recognize their humanity.

Writer and visionary Rod Serling warned of this very outcome more than half a century ago: a world where technology, masquerading as progress under the guise of order and logic, becomes the instrument of tyranny.

That future is no longer fiction. What Serling imagined is now reality.

The time to resist is now, before freedom becomes obsolete.

To those who call the shots in the halls of government, “we the people” are merely the means to an end.

“We the people”—who think, who reason, who take a stand, who resist, who demand to be treated with dignity and care, who believe in freedom and justice for all—have become obsolete, undervalued citizens of a totalitarian state that, in the words of Serling, “has patterned itself after every dictator who has ever planted the ripping imprint of a boot on the pages of history since the beginning of time. It has refinements, technological advances, and a more sophisticated approach to the destruction of human freedom.”

In this sense, we are all Romney Wordsworth, the condemned man in Serling’s Twilight Zone episode “The Obsolete Man.”

The Obsolete Man,” a story arc about the erasure of individual worth by a mechanized state, underscores the danger of rendering humans irrelevant in a system of cold automation and speaks to the dangers of a government that views people as expendable once they have outgrown their usefulness to the State. Yet—and here’s the kicker—this is where the government through its monstrous inhumanity also becomes obsolete.

As Serling noted in his original script for “The Obsolete Man,” “Any state, any entity, any ideology which fails to recognize the worth, the dignity, the rights of Man…that state is obsolete.

Like Serling’s totalitarian state, our future will be defined by whether we conform to a dehumanizing machine order—or fight back before the immortal dictator becomes absolute.

We now face a fork in the road: resist the rise of the immortal dictator or submit to the reign of the machine.

This is not a battle against technology, but a battle against the unchecked, unregulated, and undemocratic use of technology to control people.

We must demand algorithmic transparency, data ownership rights, and legal recourse against automated decisions. We need a Digital Bill of Rights that guarantees:

  • The right to know how algorithms affect us.
  • The right to challenge and appeal automated decisions.
  • The right to privacy and data security.
  • The right to be free from automated surveillance and predictive policing.
  • The right to be forgotten.

Otherwise, AI becomes the ultimate enforcer of a surveillance state from which there is no escape.

As Eric Schmidt, former CEO of Google, warned: “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about. Your digital identity will live forever… because there’s no delete button.

An immortal dictator, indeed.

Let us be clear: the threat is not just to our privacy, but to democracy itself.

As I point out in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, the time to fight back is now—before the code becomes law, and freedom becomes a memory.

The post How AI and the Deep State Are Digitizing Tyranny first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2025/05/29/how-ai-and-the-deep-state-are-digitizing-tyranny/feed/ 0 535508
Follow the Money? The Algorithm Follows Us to Make the Money https://www.radiofree.org/2025/05/28/follow-the-money-the-algorithm-follows-us-to-make-the-money/ https://www.radiofree.org/2025/05/28/follow-the-money-the-algorithm-follows-us-to-make-the-money/#respond Wed, 28 May 2025 14:16:50 +0000 https://dissidentvoice.org/?p=158593 …Those who control the food, control the (fill in the blank, but hint hint, ‘world’) …Those who control the water, control the (fill in the blank, but hint hint, ‘world’) …Those who control the money, control the (fill in the blank, but hint hint, ‘world’) …Those who control the media, control the (fill in the […]

The post Follow the Money? The Algorithm Follows Us to Make the Money first appeared on Dissident Voice.]]>
…Those who control the food, control the (fill in the blank, but hint hint, ‘world’)

…Those who control the water, control the (fill in the blank, but hint hint, ‘world’)

…Those who control the money, control the (fill in the blank, but hint hint, ‘world’)

…Those who control the media, control the (fill in the blank, but hint hint, ‘world’)

…Those who control outer space, control the (fill in the blank, but hint hint, ‘world’)

…Those who control the data, control the (fill in the blank, but hint hint, ‘world’)

Throwing in that “Big data” fishnet just a decade ago was the big new addition to the scientific method: Try to find even the most vague or minimally-recognized studies, and then let the computer develop the patterns.

Ahh, was it David Quammen or some of the other thousands of sources I have utilized over a 45 year period that exposed me to that rare but highly interesting factoid that a woman’s daily diary entrees while living in Costa Rica allowed science to research why the birthrate had fallen and the survival rate had plummented for the golden toad.

She catalogued the changing cloud and mist and fog cover in her homeland, and over a thirty year period, she meticulously recorded all number of tidbits of observation, including that reduction in the clouds hitting the treeline.

Do the Google AI search, and nothing pops up.

It’s pure lies, these AI generated responses: Quoting below.

While the story of a woman’s diary specifically detailing the golden toad’s decline and its link to reduced mist in Costa Rica might be fictional or anecdotal, the core issue of the golden toad’s extinction and its relation to changing cloud forest conditions is well-documented.

Here’s a breakdown of how changes in mist and fog likely contributed to the golden toad’s disappearance:

1. Golden Toads and Their Cloud Forest Habitat:

  • The golden toad was endemic to a small, high-altitude region within the Monteverde Cloud Forest in Costa Rica, an environment known for its constant mist, high humidity, and a rainy season.
  • These specific conditions were crucial for the golden toad’s breeding cycle and survival.

2. Climate Change and Reduced Mist:

  • Climate change has altered weather patterns globally, and the Monteverde Cloud Forest was not spared.
  • Researchers have observed a decrease in mist and moisture levels in the cloud forest, potentially due to rising temperatures and shifting cloud patterns.
  • This reduction in mist could have made the environment drier, impacting the golden toad’s delicate skin and potentially leading to dehydration.

3. Impact on Breeding:

  • Golden toads relied on rainwater pools for breeding.
  • Reduced mist and rainfall likely led to the drying up of these crucial breeding pools, hindering the toad’s ability to reproduce successfully.

4. The Chytrid Fungus:

  • Changes in climate, including drier conditions, could have created a more favorable environment for the chytrid fungus, a deadly pathogen that affects amphibians.
  • This fungus attacks the skin of frogs and toads, disrupting their ability to absorb water and electrolytes, ultimately leading to death.

In Summary:

While a diary account remains unsubstantiated, the scientific consensus points towards climate change, leading to a reduction in mist and rainfall, as a significant factor in the golden toad’s extinction. These altered environmental conditions likely impacted the toad’s ability to breed and may have increased its vulnerability to the deadly chytrid fungus.

*****

So, my own Substacks (I have three under pseudonyms) have varying levels of so-called rant and railing and deep deep disregard for most authorities. A few hundred subscribers, and very few are paid ones.

Because I do these “news” headline “essays,” my own news feeds have been corrupted with many times the opposite sort of sources I would go to for reliable information — Israeli rags, USA mainstream, European mainstream, defense/offensive professional journals, Bloomberg and Fortune, et al.

What happens, though, is a reverse osmosis sort of play on the hourly news that gets fed to me via Bing, Yahoo, AP, UPI, CNN, and the list goes on.

It’s not exactly a deep and sophisticated exercise that might end up on Dissident Voice, but I’ll attempt one now:

1. Forgone conclusions, and this is the techno-fascist world controlling the narrative and that narrative is controlled by the oligarchs and the virus of a shifting baseline disorder and rampant disregard for a precautionary principle and the value of looking at intended and unintended (rare) negative effects of these titans of capital and their Brave Banal Evil Doers, the scientists, engineers, fabricators, technologists, et al.

Exhibit A (infinity is really that number):

Looks and sounds like a geek, such a nice sweet looking banal sort of fellow?

  • Google DeepMind CEO Demis Hassabis says in the next 5-10 years, AI will disturb more jobs
  • He urged teens to become code ninjas to deal with the AI-driven world
  • He also said that the youngest generation, Gen Alpha, must start experimenting with AI as soon as possible

As the world dashes into an AI-driven future, Google DeepMind CEO Demis Hassabis has a clear message for teens: learn now or be left behind. Hassabis leads Google DeepMind, the advanced research lab behind the company’s most high-end AI developments, including the Gemini chatbot. The lab is also spearheading Google’s efforts toward achieving artificial general intelligence (AGI) — a yet-unrealised form of AI capable of human-level reasoning. At the recent Google I/O developer conference, Hassabis said DeepMind is likely less than a decade away from building AGI. As he works in such an environment, he certainly knows what form AI will take in the near future. (India Today, of all rags I get in my feeds)

There are many many paywalls now, so anything from the NYT, well, I have to do end-arounds sometimes to read the entire pieces, but headlines and sub-headlines do the trick:

At Amazon, Some Coders Say Their Jobs Have Begun to Resemble Warehouse Work

Pushed to use artificial intelligence, software developers at the e-commerce giant say they must work faster and have less time to think. Others welcome the shift.

Go to Reddit on this one headline and you get all sorts of opinions and personal experiences with codes.

I’ve written much about Amazon, and I even organized with SEIU against Amazon’s warehouse unsafe warehouse conditions and their anti-union stance.

But the geeks and all those soccer moms and geek dads want their children not to marry cowboys but to marry coders and software engineers, or drone impresarios: A “17-year-old designed a cheaper, more efficient drone. The Department of Defense just awarded him $23,000 for it.”

Dual Use, man, dual use which is always Capitalist Abuse and Military Murder Hardware: Cooper Taylor, 17, aims to revolutionize the drone industry with a new design.

Taylor designed a motor-tilting mechanism to lower manufacturing cost and increase efficiency.

Taylor has spent the last year optimizing a type of drone that’s being used more and more in agriculture, disaster relief, wildlife conservation, search-and-rescue efforts, and medical deliveries.

All drone technology is for murdering, in the end.

And what fuels these death machines, these genocide facilitators? Geeks in high school robotics Olympics.

A breathtaking flyover of nearly every United States Air Force fighter and bomber jet soared during a Florida air show Saturday, stunning footage of the historic aerial display showed.

Seven of the top military aircraft, called the “Freedom Flyover,” united as “one unstoppable force” for thousands of people to take in over Memorial Day weekend at the Hyundai Air and Sea Show in Miami Beach.

*****

Somehow it ALWAYS comes down for me from these feeds back to the Jewish State of Murdering Raping Starving Polluting Poisoning Occupied Palestine:

As thousands of Israeli nationalists and religious Jews on Monday marked Jerusalem Day, which celebrates Israel’s 1967 capture of east Jerusalem, some chanted “Death to Arabs” while marching through Muslim neighborhoods. Protesters, including an Israeli member of parliament, also reportedly stormed a compound belonging to the UN agency for Palestinian refugees.

[Oh, you can call these Jews in Israel Right-wing Nationalists, or pro-settler extermists, but they are in the Jewish State of Israel, and they are Jewish. Calling them Jewish is not anti-semitic, and leaving out the term “zionist” is not an error of omission.]

Last year’s procession, which came during the first year of the war in Gaza, saw ultranationalist Israelis attack a Palestinian journalist in the Old City and call for violence against Palestinians. Four years ago, the march helped set off an 11-day war in Gaza.

Tour buses carrying young ultranationalist Jews lined up near entrances to the Old City, bringing hundreds from outside Jerusalem, including settlements in the Israeli-occupied West Bank.

Police said they had detained a number of individuals, without specifying, and “acted swiftly to prevent violence, confrontations, and provocations.”

*****

And, the IOF, Israeli Occupation Forces, well, they do teach many US police departments on “crowd suppression,” pressure point holds, subbing peaceful protestors, and strong-arming old ladies and teens.

And, as always, NBC, or whichever mainstream and corporate media outfit, will always suppress the reality — Some fear excessive use of force will rise as the DOJ drops oversight of police departments.

George Floyd, Michael Brown?

No photo description available.

“It is important to not overstate what consent decrees do,” said Jin Hee Lee with the Legal Defense Fund, referring to the power of federal courts to enforce orders. “They are very important and oftentimes necessary to force police departments to change their policies, to change their practices,” she added. “But consent decrees were never the end all, be all.”

*****

Then you get this Jewish Fervor, and who the hell wants to defend the Poison Ivy School, but you have to under the Rapist in Chief Trump and his henchman, Stephen Miller:

At the Harvard Kennedy School, the Trump administration’s attempt to revoke Harvard’s eligibility to enroll international students — temporarily blocked in court — could eliminate nearly 60 percent of the student body.

*****

Until the last half-decade, the majestic lesser flamingo had four African breeding sites: two salt pans in Botswana and Namibia, a soda lake in Tanzania, and an artificial dam outside South Africa’s historic diamond-mining town of Kimberley.

Now it only has three.

And then, I get tons of wildlife and climate news: “Lesser flamingos lose one of their only four African breeding sites to sewage.” Emblematic at how messed up the polluting Homo consumopethicus is. Sewage. Shit.

This sort of stuff, all these headlines, all these stories, seemingly disconnected, unrelated in theme, well, the common theme is clear — Capitalism is a Cancer Supported by Economic Wars and Genocide and a Mafia that is Global in Its Reach. Is that a good enough connecting headline?

*****

Thank goodness that I have writers for Substack who put it all into perspective, how this world is up shit creek illustrated by the War on People in Palestine.

The Poem “Nine,” from Palestine Will Be Free Substack:

I tended my garden with great care —
Olives, thyme, dates, sage, and rosemary there.
Well before fajr and long after isha’s call,
No effort was spared in looking after them all.

From tiny seeds to flowers in full bloom,
I watched them glow in sun’s majestic light.
And as the first buds of the olives came to life,
Every glance, every day was an endless delight.

Wearied days would vanish at their sight
Each bloom I touched made my mornings bright
I would count my blessings: one, two, three, four…
Up to ten — then countless more.

Then came the fire that scorched it all —
Thyme, dates, sage, and rosemary gone.
One gnarly olive barely hangs by a thread;
My waking moments are soaked in tears, eyes red.

Now with every breath, a prayer escapes:
Protect my olive — please keep it safe.
It’s the last remnant of a heart so full, a life well lived,
In service of my garden, my people, and God the Esteemed.

You blessed Yaqub with a garden vast,
Only to separate him from Yusuf, the rose of his heart.
Yaqub complained, yearned, and wept till blindness veiled his eyes
You, the Merciful, answered his prayers and restored old ties.

So bless me, as You did Yaqub in the end —
Restore the coolness of my eyes, O Ibrahim’s Friend.
“For I too have the gift of song which gives me courage to complain,
But ah! ‘tis none but God Himself whom I, in sorrow, must arraign!”

Your infinite wisdom is beyond my grasp,
So, to Your rope of hope I must clasp.
“The lessons of patience I teach my heart,
As though to night’s separation I show a false part.”

*****

Thank goodness for International 360, with a whole lot of stories aggregated-curated: Only Total Collapse Will Rouse Humanity from Its Suicidal Sleepwalk

From BettMedia:

Only Total Collapse Will Rouse Humanity from Its Suicidal Sleepwalk

Editorial Comment:

I have been issuing warnings since the genocide began and every nation and institution failed to stop it. Not one invoked the appropriate legal mechanisms designed for such a crisis that would have ended abuse of veto, ousted Israel from the United Nations and imposed sanctions on the genocidal entity. I am pleased to see more activists understanding the extent of manipulation and deception we have all been subjected to.

Previously I said,

  • There is no hope for the world to be found in any government, institution or movement that can normalize ties with or fail to stop a genocidal oppressor.
  • There can be no faith in leaders that place interests above moral principles.
  • There is no salvation to be found standing with those too cowardly to act in the face of murderous criminality.
  • The hope of humanity rests solely on the shoulders of each awakening individual and on movements in the grassroots bases who have never lost touch with reality and are willing to defend life at all costs.

Karim has brilliantly and succinctly presented the many facets of our present dilemma in the article below.

Once we abandon fantasy and begin with these truths, realistic solutions and avenues of dissent, resistance and revolution can constellate and finally manifest.

A.V.


BettBeat Media

As Gaza’s children burn while the world watches, it becomes clear: only climate catastrophe, nuclear armageddon, or World War III may force humanity to abandon Western capitalism’s suicidal path.

The brutal death march of global capitalism does not pause for our lamentations. It grinds forward with mechanistic certainty, reducing human bodies to raw material and human aspirations to market commodities. We stand now at the precipice of a darkness so profound that our collective imagination fails to grasp its dimensions.

Gaza Exposed the Multipolar Fantasy

Let us dispense with comforting illusions. The mythologies we have constructed about saviors – whether BRICS nations, ‘multipolar world orders’, institutions of international law, or benevolent statesmen – have disintegrated before our eyes.

As Gaza burns and its children scream under collapsing concrete, we witness Russia making backroom deals with the architects of genocide. As Palestinian bodies pile in makeshift morgues, China issues empty declarations at the United Nations while its trade with the genocidal regime continues uninterrupted.

These are not the actions of counterweights to empire. They are the maneuvers of players within the same global system, differing perhaps in position but not in fundamental nature. They have shown themselves to be integral components of the very machinery we hoped they would dismantle.

We have watched, with desperate hope, the Palestinians stand against overwhelming military force, the Lebanese resisting occupation, Ibrahim Traore challenging neocolonial structures, Syrians and Yemenis enduring apocalyptic bombardment.

We projected onto them our desperate yearning for liberation from the imperialist hellscape spreading like wildfire across our planet. But they cannot do it alone, and our delegation of hope to others is itself a form of moral abdication.

The Frightening Truth is: It Really Comes Down to Us

The terrible truth we must confront is this: the responsibility is ours. The revolution required is not national but global, because the capitalist system has metastasized globally.

It has burrowed deep into the institutional structures of every society, captured the regulatory mechanisms that might constrain it, corrupted the informational systems that might expose it, and weaponized the technological systems that might liberate us.

Consider the grotesque spectacle of our current moment: we watch genocide in real-time on social media platforms owned by billionaires who fund that same genocide, we march in permitted protests that change nothing, we sign petitions that disappear into administrative voids. Meanwhile, the machinery of death continues unabated, and the architects of suffering retire to coastal mansions and mountain retreats after receiving fifty standing ovations for speeches that are nothing more than celebrations of mass murder.

The ruling classes have constructed a system of control so comprehensive, so technologically sophisticated, and so psychologically insidious that most cannot even perceive the depth of their enslavement. The surveillance apparatus tracks our movements and predicts our thoughts. The military-industrial complex develops weapons of terrifying precision to eliminate those who resist too effectively. The propaganda system manufactures consent with algorithmic efficiency.

All Wish to Sit at the Blood-Soaked Table of Imperialism

As vanessa beeley and Fiorella Isabel so meticulously lay out for us, Putin, for all his anti-Western rhetoric, demonstrates through his actions that he seeks merely better terms within the imperial arrangement, not its dissolution. His government works in tacit coordination with Israel while claiming to stand against Western hegemony. This is not resistance; it is negotiation for a better position at the blood-soaked table of imperialism.

And what of China? Does it dream of global equality? Let’s rephrase, do ruling elites anywhere envision a future where they stand shoulder-to-shoulder with the peasants in the villages they dominate? History speaks to us with terrible clarity. The powerful do not relinquish power voluntarily. Systems of exploitation do not reform themselves out of existence. The capitalist machine — whether neoliberal or state capitalism — will not decommission itself out of ethical awakening.

We have already weathered global catastrophes that should have taught us these lessons. World War I reduced a generation of young men to shredded flesh in muddy trenches, yet we learned nothing. World War II revealed the industrial-scale horror humans could inflict upon one another, yet we learned nothing. The grinding machinery reassembled itself, adapted, and continued its relentless accumulation.

“Humanity appears incapable of changing direction without first experiencing the catastrophic consequences of its current trajectory. We seem determined to learn only through suffering, to change only when continuation becomes impossible”

World War III

The terrifying conclusion becomes unavoidable: only the total breakdown of global society will create the conditions for fundamental transformation. This is not a wish but a recognition of historical pattern. The entrenchment is too deep, the control too complete, the psychological captivity too thorough for anything less than systemic collapse to break the spell.

What form will this breakdown take? Perhaps nuclear winter that eliminates most of humanity. Perhaps the collapse of ecological systems that sustain human life. Perhaps the return of fascistic brutality in World War III as soldiers march through our streets, rounding up our women and children to violate their dignity and take away their innocence while the men disappear into torture camps. The specific manifestation matters less than the certainty of its arrival if our course remains unchanged.

This is the darkness we must stare into without flinching. Humanity appears incapable of changing direction without first experiencing the catastrophic consequences of its current trajectory. Even high-definition genocide—burning children and prisoner rapes streamed directly to our iPhones—fails to move us to effective action. We seem determined to learn only through even more extreme suffering, to change only when our current path becomes literally impossible to continue.

Resistance

Yet within this terrible recognition lies a seed of possibility. If we understand the machinery of our destruction with unflinching clarity, if we abandon the comfortable myths that absolve us of responsibility, if we recognize that no external force will save us from ourselves – perhaps then we might begin the work of genuine resistance.

Not the performative — flag-waving, song-singing, tweet-sharing — resistance that leaves power structures intact, but the fundamental reimagining of human society. Not the delegation of hope to distant leaders, but the reclamation of our collective agency. Not the comfortable protest that returns home for dinner, but the sustained commitment to dismantling systems of death.

The machinery of global capitalism does not pause for our lamentations, but neither is it invulnerable to our determined opposition. The question remains whether we will summon the courage to oppose it before the breakdown comes, or whether we will continue sleepwalking until we awaken amid the ruins.

– Karim

The post Follow the Money? The Algorithm Follows Us to Make the Money first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Paul Haeder.

]]>
https://www.radiofree.org/2025/05/28/follow-the-money-the-algorithm-follows-us-to-make-the-money/feed/ 0 535226
Papua New Guinea seeks ‘fast track’ advice on resurrecting shortwave radio https://www.radiofree.org/2025/05/28/papua-new-guinea-seeks-fast-track-advice-on-resurrecting-shortwave-radio/ https://www.radiofree.org/2025/05/28/papua-new-guinea-seeks-fast-track-advice-on-resurrecting-shortwave-radio/#respond Wed, 28 May 2025 06:06:26 +0000 https://asiapacificreport.nz/?p=115381 By Don Wiseman, RNZ Pacific senior journalist

Papua New Guinea’s state broadcaster NBC wants shortwave radio reintroduced to achieve the government’s goal of 100 percent broadcast coverage by 2030.

Last week, the broadcaster hosted a workshop on the reintroduction of shortwave radio transmission, bringing together key government agencies and other stakeholders.

NBC had previously a shortwave signal, but due to poor maintenance and other factors, the system failed.

The NBC's 50-year logo to coincide with Papua New Guinea's half century independence anniversary
The NBC’s 50-year logo to coincide with Papua New Guinea’s half century independence anniversary celebrations. Image: NBC

Its managing director Kora Nou spoke with RNZ Pacific about the merits of a return to shortwave.

Kora Nou: We had shortwave at NBC about 20 or so years ago, and it reached almost the length and breadth of the country.

So fast forward 20, we are going to celebrate our 50th anniversary. Our network has a lot more room for improvement at the moment, that’s why there’s the thinking to revisit shortwave again after all this time.

Don Wiseman: It’s a pretty cheap medium, as we here at RNZ Pacific know, but not too many people are involved with shortwave anymore. In terms of the anniversary in September, you’re not going to have things up and running by then, are you?

KN: It’s still early days. We haven’t fully committed, but we are actively pursuing it to see the viability of it.

We’ve visited one or two manufacturers that are still doing it. We’ve seen some that are still on, still been manufactured, and also issues surrounding receivers. So there’s still hard thinking behind it.

We still have to do our homework as well. So still early days and we’ve got the minister who’s asked us to explore this and then give him the pros and cons of it.

DW: Who would you get backing from? You’d need backing from international donors, wouldn’t you?

KN: We will put a business case into it, and then see where we go from there, including where the funding comes from — from government or we talk to our development partners.

There’s a lot of thinking and work still involved before we get there, but we’ve been asked to fast track the advice that we can give to government.

DW: How important do you think it is for everyone in the country to be able to hear the national broadcaster?

KN: It’s important, not only being the national broadcaster, but [with] the service it provides to our people.

We’ve got FM, which is good with good quality sound. But the question is, how many does it reach? It’s pretty critical in terms of broadcasting services to our people, and 50 years on, where are we? It’s that kind of consideration.

I think the bigger contention is to reintroduce software transmission. But how does it compare or how can we enhance it through the improved technology that we have nowadays as well? That’s where we are right now.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2025/05/28/papua-new-guinea-seeks-fast-track-advice-on-resurrecting-shortwave-radio/feed/ 0 535148
[Robert McChesney] Capitalism in the Age of Digital Technology https://www.radiofree.org/2025/05/08/robert-mcchesney-capitalism-in-the-age-of-digital-technology/ https://www.radiofree.org/2025/05/08/robert-mcchesney-capitalism-in-the-age-of-digital-technology/#respond Thu, 08 May 2025 21:00:31 +0000 https://www.alternativeradio.org/products/mccr011/
This content originally appeared on AlternativeRadio and was authored by info@alternativeradio.org.

]]>
https://www.radiofree.org/2025/05/08/robert-mcchesney-capitalism-in-the-age-of-digital-technology/feed/ 0 531935
Cook Islands environment group calls on govt to condemn Trump’s seabed mining order https://www.radiofree.org/2025/05/06/cook-islands-environment-group-calls-on-govt-to-condemn-trumps-seabed-mining-order/ https://www.radiofree.org/2025/05/06/cook-islands-environment-group-calls-on-govt-to-condemn-trumps-seabed-mining-order/#respond Tue, 06 May 2025 02:26:33 +0000 https://asiapacificreport.nz/?p=114164 By Losirene Lacanivalu, of the Cook Islands News

A leading Cook Islands environmental lobby group is hoping that the Cook Islands government will speak out against the recent executive order from US President Donald Trump aimed at fast-tracking seabed mining.

Te Ipukarea Society (TIS) says the arrogance of US president Trump to think that he could break international law by authorising deep seabed mining in international waters was “astounding”, and an action of a “bully”.

Trump signed the America’s Offshore Critical Minerals and Resources order late last month, directing the National Oceanic and Atmospheric Administration (NOAA) to allow deep sea mining permits.

The order states: “It is the policy of the US to advance United States leadership in seabed mineral development.”

NOAA has been directed to, within 60 days, “expedite the process for reviewing and issuing seabed mineral exploration licenses and commercial recovery permits in areas beyond national jurisdiction under the Deep Seabed Hard Mineral Resources Act.”

It directs the US science and environmental agency to expedite permits for companies to mine the ocean floor in the US and international waters.

In addition, a Canadian mining company — The Metals Company — has indicated that they have applied for a permit from Trump’s administration to start commercially mining in international waters.

The mining company had been unsuccessful in gaining a commercial mining licence through the International Seabed Authority (ISA).

‘Arrogance of Trump’
Te Ipukarea Society’s technical director Kelvin Passfield told Cook Islands News: “The arrogance of Donald Trump to think that he can break international law by authorising deep seabed mining in international waters is astounding.

“The United States cannot pick and choose which aspects of the United Nations Law of the Sea it will follow, and which ones it will ignore. This is the action of a bully,” he said.

“It is reckless and completely dismissive of the international rule of law. At the moment we have 169 countries, plus the European Union, all recognising international law under the International Seabed Authority.

“For one country to start making new international rules for themselves is a dangerous notion, especially if it leads to other States thinking they too can also breach international law with no consequences,” he said.

TIS president June Hosking said the fact that a part of the Pacific (CCZ) was carved up and shared between nations all over the world was yet another example of “blatantly disregarding or overriding indigenous rights”.

“I can understand why something had to be done to protect the high seas from rogues having a ‘free for all’, but it should have been Pacific indigenous and first nations groups, within and bordering the Pacific, who decided what happened to the high seas.

“That’s the first nations groups, not for example, the USA as it is today.”

South American countries worried
Hosking highlighted that at the March International Seabed Authority (ISA) assembly she attended it was obvious that South American countries were worried.

“Many have called for a moratorium. Portugal rightly pointed out that we were all there, at great cost, just for a commercial activity. The delegate said, ‘We must ask ourselves how does this really benefit all of humankind?’

Looking at The Metals Company’s interests to commercially mine in international waters, Hosking said, “I couldn’t help being annoyed that all this talk assumes mining will happen.

“ISA was formed at a time when things were assumed about the deep sea e.g. it’s just a desert down there, nothing was known for sure, we didn’t speak of climate crisis, waste crisis and other crises now evident.

“The ISA mandate is ‘to ensure the effective protection of the marine environment from the harmful effects that may arise from deep seabed related activities.

“We know much more (but still not enough) to consider that effective protection of the marine environment may require it to be declared a ‘no go zone’, to be left untouched for the good of humankind,” she added.

Meanwhile, technical director Passfield also added, “The audacity of The Metals Company (TMC) to think they can flaunt international law in order to get an illegal mining licence from the United States to start seabed mining in international waters is a sad reflection of the morality of Gerard Barron and others in charge of TMC.

‘What stops other countries?’
“If the USA is allowed to authorise mining in international waters under a domestic US law, what is stopping any other country in the world from enacting legislation and doing the same?”

He said that while the Metals Company may be frustrated at the amount of time that the International Seabed Authority is taking to finalise mining rules for deep seabed mining, “we are sure they fully understand that this is for good reason. The potentially disastrous impacts of mining our deep ocean seabed need to be better understood, and this takes time.”

He said that technology and infrastructure to mine is not in place yet.

“We need to take as much time as we need to ensure that if mining proceeds, it does not cause serious damage to our ocean. Their attempts to rush the process are selfish, greedy, and driven purely by a desire to profit at any cost to the environment.

“We hope that the Cook Islands Government speaks out against this abuse of international law by the United States.” Cook Islands News has reached out to the Office of the Prime Minister and Seabed Minerals Authority (SBMA) for comment.

Republished from the Cook Islands News with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/05/06/cook-islands-environment-group-calls-on-govt-to-condemn-trumps-seabed-mining-order/feed/ 0 531243
50 years after the ‘fall’ of Saigon – from triumph to Trump https://www.radiofree.org/2025/04/29/50-years-after-the-fall-of-saigon-from-triumph-to-trump/ https://www.radiofree.org/2025/04/29/50-years-after-the-fall-of-saigon-from-triumph-to-trump/#respond Tue, 29 Apr 2025 13:59:50 +0000 https://asiapacificreport.nz/?p=113803 Part Three of a three-part Solidarity series

COMMENTARY: By Eugene Doyle

 


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/04/29/50-years-after-the-fall-of-saigon-from-triumph-to-trump/feed/ 0 530108
Trump signs ‘deeply dangerous’ order to fast-track deep sea mining https://www.radiofree.org/2025/04/25/trump-signs-deeply-dangerous-order-to-fast-track-deep-sea-mining/ https://www.radiofree.org/2025/04/25/trump-signs-deeply-dangerous-order-to-fast-track-deep-sea-mining/#respond Fri, 25 Apr 2025 09:38:41 +0000 https://asiapacificreport.nz/?p=113624

An ocean conservation non-profit has condemned the United States President’s latest executive order aimed at boosting the deep sea mining industry.

President Donald Trump issued the “Unleashing America’s offshore critical minerals and resources” order on Thursday, directing the National Oceanic and Atmospheric Administration (NOAA) to allow deep sea mining.

The order states: “It is the policy of the US to advance United States leadership in seabed mineral development.”

NOAA has been directed to, within 60 days, “expedite the process for reviewing and issuing seabed mineral exploration licenses and commercial recovery permits in areas beyond national jurisdiction under the Deep Seabed Hard Mineral Resources Act.”

Ocean Conservancy said the executive order is a result of deep sea mining frontrunner, The Metals Company, requesting US approval for mining in international waters, bypassing the authority of the International Seabed Authority (ISA).

US not ISA member
The ISA is the United Nations agency responsible for coming up with a set of regulations for deep sea mining across the world. The US is not a member of the ISA because it has not ratified UN Convention on the Law of the Sea (UNCLOS).

“This executive order flies in the face of NOAA’s mission,” Ocean Conservancy’s vice-president for external affairs Jeff Watters said.

“NOAA is charged with protecting, not imperiling, the ocean and its economic benefits, including fishing and tourism; and scientists agree that deep-sea mining is a deeply dangerous endeavor for our ocean and all of us who depend on it,” he said.

He said areas of the US seafloor where test mining took place more than 50 years ago still had not fully recovered.

“The harm caused by deep sea mining isn’t restricted to the ocean floor: it will impact the entire water column, top to bottom, and everyone and everything relying on it.”

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/04/25/trump-signs-deeply-dangerous-order-to-fast-track-deep-sea-mining/feed/ 0 529421
Iron Dome Technology: Elon Musk’s License to Steal Taxpayers’ Dollars https://www.radiofree.org/2025/04/23/iron-dome-technology-elon-musks-license-to-steal-taxpayers-dollars/ https://www.radiofree.org/2025/04/23/iron-dome-technology-elon-musks-license-to-steal-taxpayers-dollars/#respond Wed, 23 Apr 2025 05:54:18 +0000 https://www.counterpunch.org/?p=361511 Donald Trump and Elon Musk are making corruption and graft the main business of the US government. They have fired all the cops who might try to rein them in and attacked any of the judges, politicians, or reporters who object to them stealing everything in sight. In this vein, it was entertaining to see reports that More

The post Iron Dome Technology: Elon Musk’s License to Steal Taxpayers’ Dollars appeared first on CounterPunch.org.

]]>

Photo Source: Office of Speaker Mike Johnson – Public Domain

Donald Trump and Elon Musk are making corruption and graft the main business of the US government. They have fired all the cops who might try to rein them in and attacked any of the judges, politicians, or reporters who object to them stealing everything in sight.

In this vein, it was entertaining to see reports that Elon Musk has plans to bid on, and presumably get, the contract for building Donald Trump’s “Iron Dome” system for the United States. Before discussing Elon Musk’s latest scheme for getting richer, it is worth noting that there is no obvious need for an Iron Dome-type system in the United States.

Donald Trump may not have noticed, but we have not had a problem of missiles raining down on the United States from other countries. But that’s okay in Donald Trump’s MAGAland. We also didn’t have a problem of pet-eating migrants in Springfield, Ohio, but that didn’t stop Trump and Vance from putting this “crisis” at the center of their campaign.

Donald Trump’s solutions don’t have to bear any relationship to real world problems. He assumes that his supporters will be just fine with spending hundreds of billions of dollars on a weapon system we don’t need, and at least for Republican members of Congress, he is probably right. Needless to say, the “Department of Government Efficiency” won’t be bothered by this waste.

But the potential waste here is even more than it first appears. In Musk’s scheme he won’t be selling the US government the Iron Dome system, he will be “licensing” it. That would mean that Musk maintains ownership of the system, allowing him to sell it to others, and just charges us an annual fee for its use.

There are obvious political issues with this scheme. For example, will Musk shut it down if we have a government that is not sufficiently far-right for his tastes? Suppose the government decides to let trans athletes compete in high school sports; will Musk take away its missile defense system?

But the issues go beyond just political considerations. There is a serious economic issue at stake. There is not currently a mass market for continent-wide anti-missile systems. If Trump decides to pay for the development of one, it will give it developer access to a potentially very valuable technology. It is hard to see how anyone with any business sense at all would hand that asset over to Elon Musk or anyone else.

There are actually some precedents for this sort of transfer of valuable ownership rights. The most famous is when IBM contracted with Bill Gates to design an operating system for its computers in 1981.

At that time IBM was by far the world’s leader in producing personal computers and the computer industry more generally. Microsoft was still a relatively small start-up. But because IBM allowed Gates to maintain ownership of the operating system, Microsoft quickly catapulted past IBM in profitability and market value. It is unlikely Microsoft ever would have become one of the largest companies in the world, if IBM had made ownership of the system a condition of its deal with Microsoft.

To take a more recent example, after the COVID pandemic hit the United States, the government initiated “Operation Warp Speed” to develop vaccines and treatments for the disease. One of the first deals arranged by the program was with Moderna to develop a mRNA vaccine to protect against COVID. Under the contract, the government paid for the research needed to develop the vaccine; it then paid for the clinical trials needed to establish its safety and effectiveness.

However, despite paying the bulk of its development and testing costs, the government handed control over the vaccine to Moderna, which subsequently made tens of billions of dollars selling it in the United States and elsewhere in the world. Instead of making the vaccine a generic that would likely sell for around $5 a shot, Moderna was charging up to $130 a shot for its boosters. Yeah, that deal was signed by Donald Trump.

So, paying for the development of technology, and then giving it away, is not something new for Trump, but the sums involved are likely to be at least an order of magnitude higher for the missile defense system designed by Musk’s team. The economy and financial markets have looked very shaky lately with Donald Trump’s stop/go tariffs, as well as his mass firings and cancellations of government contracts. But there is still at least one investment that is secure in MAGA America: a payment to Donald Trump.

This first appeared on Dean Baker’s Beat the Press blog.

The post Iron Dome Technology: Elon Musk’s License to Steal Taxpayers’ Dollars appeared first on CounterPunch.org.


This content originally appeared on CounterPunch.org and was authored by Dean Baker.

]]>
https://www.radiofree.org/2025/04/23/iron-dome-technology-elon-musks-license-to-steal-taxpayers-dollars/feed/ 0 528870
The environmental policy backed by free-market Republicans https://grist.org/politics/right-to-repair-ohio-missouri-texas-red-states-republican-conservative/ https://grist.org/politics/right-to-repair-ohio-missouri-texas-red-states-republican-conservative/#respond Fri, 18 Apr 2025 08:45:00 +0000 https://grist.org/?p=663510 Several years ago, Louis Blessing’s wife asked for his help replacing the battery in her laptop. An electrical engineer by training, Blessing figured it would be a quick fix. But after swapping out the old battery for a new one and plugging the laptop in, he discovered it wouldn’t charge.

It quickly dawned on Blessing that the laptop recognized he had installed a battery made by a third party, and rejected it. It’s a classic example of a practice known as parts pairing, where manufacturers use software to control how — and with whose parts — their devices are fixed.

“To me, that is a garbage business practice,” Blessing told Grist. “Yes, it’s legal for them to do it, but that is truly trash.” After the failed battery swap, Blessing’s wife wound up getting a new computer.

The business practice that led her to do so may not be legal for much longer. Blessing is a Republican state senator representing Ohio’s 8th Senate district, which includes much of the area surrounding Cincinnati. In April, Blessing introduced a “right-to-repair” bill that grants consumers legal access to the parts, tools, and documents they need to fix a wide range of devices while banning restrictive practices like parts pairing. If Blessing’s bill succeeds, the Buckeye State will become the latest to enshrine the right to repair into law, after similar legislative victories in Colorado, Oregon, California, Minnesota, and New York.

That would mark an important political inflection point for the right-to-repair movement. While most of the states that have passed repair laws so far are Democratic strongholds, bills have been introduced in all 50 as of February. The adoption of a right-to-repair law in deep red Ohio — where Republicans control the state House, Senate, and the governor’s office, and Donald Trump won the last presidential election by more than 10 percentage points — would further underscore the broad, bipartisan popularity of being allowed to fix the stuff you own.

“If something breaks that you can’t fix, that’s just as big of a pain if you live in New York as it is in Nebraska,” Nathan Proctor, who heads the right-to-repair campaign at the U.S. Public Research Interest Group, told Grist. 

Expanded access to repair has the potential to reduce carbon emissions and pollution. A significant fraction of the emissions and air and water pollutants associated with electronic devices occur during manufacturing. Extending the lifespan of those gadgets can have major environmental benefits: The U.S. Public Research Interest Group has calculated that if Americans’ computers lasted just one year longer on average, it would have the same climate benefit as taking over a quarter million cars off the roads for a year. By reducing the pressure to buy replacement devices, repair also helps alleviate demand for the world’s finite stores of critical minerals, which are used not only in consumer electronics but also in clean energy technologies.  

A bearded person in profile holds two tools above a disassembled cellphone on a light blue tabletop
Expanded access to repair has the potential to reduce carbon emissions and pollution. Christian Charisius / picture alliance via Getty Images

Blessing gladly acknowledges the environmental benefits of expanded repair access, but it isn’t the main reason the issue matters to him. He describes himself as “a very free-market guy” who doesn’t like the idea of big businesses being allowed to monopolize markets. He’s concerned that’s exactly what has happened in the electronics repair space, where it is common for manufacturers to restrict access to spare parts and repair manuals, steering consumers back to them to get their gadgets fixed — or, if the manufacturer doesn’t offer a particular repair, replaced.

“It’s good for a business to be able to monopolize repair,” Blessing said. “But it is most certainly not pro-free market. It’s not pro-competition.”

Blessing is now sponsoring a right-to-repair bill, called the Digital Fair Repair Act, for the third legislative session in a row. While earlier iterations of the bill never made it out of committee, he feels optimistic about the legislation’s prospects this year, in light of growing support for the right to repair across civil society and the business community. In the past, manufacturers like Apple and Microsoft have vehemently lobbied against right-to-repair bills, but these and other corporations are changing their tune as the movement gains steam.

“I think there’s an appetite to get something done,” Blessing told Grist, adding that more and more device manufacturers “want to see something that puts this to rest.”


Repair monopolies don’t just restrict market competition. They also limit a person’s freedom to do what they want with their property. That’s the reason Brian Seitz, a Republican state congressman representing Taney County in southwestern Missouri, is sponsoring a motorcycle right-to-repair bill for the third time this year.  

Seitz first grew interested in the right to repair about four years ago, when a group of motorcyclists in his district told him they weren’t able to fix their bikes because they were unable to access necessary diagnostic codes. A spokesperson for the American Motorcyclist Association confirmed to Grist that lack of access to repair-relevant data is “a concern for our membership.” Some manufacturers are moving away from on-board diagnostic ports where owners can plug in and access the information they need to make fixes, the spokesperson said.

A man with a white beard and glasses in a suit stands at a podium in a crowded legislative chamber with a portrait of Abraham Lincoln and a maroon curtain in the background
Missouri state Representative Brian Seitz, a Republican, speaks at the state Capitol in Jefferson City, Missouri. AP Photo / David A. Lieb

“The person who drives a motorcycle is a certain type of individual,” Seitz said. “They’re free spirits. They love the open road. And they brought to my attention that they weren’t allowed to repair their vehicles. And I couldn’t believe it.”

It’s still early days for Seitz’s bill, which has been referred to the Missouri House Economic Development Committee but does not have a hearing scheduled yet. But a version of the bill passed the House during the last legislative session, and Seitz expects it will pass again.

“Whether or not there’s time to get it done in the Senate, that’s yet to be determined,” he said. The bill died in the Missouri Senate during the last legislative session.

A spokesperson for Missouri Governor Mike Kehoe declined to comment on Seitz’s bill. But if it were to pass both chambers and receive Kehoe’s signature this year, it would be the first motorcycle-specific right-to-repair law in the country. (A 2014 agreement establishing a nationwide right-to-repair in the auto industry explicitly excluded motorcycles.) Seitz believes many of his fellow conservatives would be “very much in favor” of that outcome.

“This is a freedom and liberty issue,” Seitz added. 


Personal liberty is also at the heart of a recent white paper on the right to repair by the Texas Public Policy Foundation, or TPPF, an influential conservative think tank. The paper lays out the legal case for Texas to adopt a comprehensive right-to-repair law “to restore control, agency, and property rights for Texans.” Since publishing the paper, TPPF staffers have advocated for the right to repair in op-eds and closed-door meetings with state policymakers. 

“Our interest in the right to repair is rooted in a concrete fundamental belief in the absolute nature of property rights and how property rights are somewhat skirted by corporations who restrict the right to repair,” Greyson Gee, a technology policy analyst with the TPPF who co-authored the white paper, told Grist.

In February, Giovanni Capriglione, a Republican member of the Texas House of Representatives and the chairman of the state legislature’s Innovation and Technology Caucus, introduced an electronics right-to-repair bill that the TPPF provided input on. In March, Senator Bob Hall introduced a companion bill in the Senate. 

Eight motorcylists ride down a road, with green shrubbery framing the shoulder
A bill introduced in Missouri would be the first motorcycle-specific right-to-repair law in the country. Jonas Walzberg / picture alliance via Getty Images

Early drafts of these bills include some carve-outs that repair advocates have criticized elsewhere, including an exemption for electronics used exclusively by businesses or the government, and a stipulation that manufacturers do not need to release circuit boards on the theory that they could be used to counterfeit devices. The Texas bills also contain an “alternative relief” provision that allows manufacturers to reimburse consumers, or offer them a replacement device, instead of providing repair materials. (Ohio’s bill, by contrast, mandates that manufacturers provide board-level components necessary to effect repairs, and it does not allow them to offer refunds instead of complying.)

Gee says the TPPF has been working with repair advocacy organizations and the bill sponsor to strengthen the bill’s language and is “encouraged by the real possibility of establishing a statutory right to repair in Texas.” 

“​​Chairman Capriglione is one of the strongest pro-consumer advocates in the Texas House, and we will continue to work with his office as this bill advances [to] ensure there is a codified right to repair in the state,” Gee added. Capriglione, who represents part of the Fort Worth area, didn’t respond to Grist’s request for comment.


Elsewhere around the country, lawmakers across the political spectrum are advancing other right-to-repair bills this year. In Washington state, a bill covering consumer electronics and household appliances passed the state House in March by a near-unanimous vote of 94 to 1, underscoring the breadth of bipartisan support for independent repair. In April, the Senate passed its version of the bill 48-1. The House must now vote to concur with changes that were made in the Senate, after which the bill heads to the governor’s desk. 

“This legislation has always been bipartisan,” Democratic state representative Mia Gregerson, who sponsored the bill, told Grist. “The ability to fix our devices that have already been paid for is something we can all get behind.” In her five years working on right-to-repair bills in the state, Gregerson said, she has negotiated with Microsoft, Google, and environmental groups to attempt to address consumer and business needs while reducing electronic waste.

Conservative politicians and pundits also acknowledge the environmental benefits of the right to repair, despite focusing on personal liberty and the economy in their messaging. In its white paper arguing for a right-to-repair law in Texas, the TPPF highlights the potential for such legislation to eliminate e-waste, citing United Nations research that ties the rapid growth of this trash stream to limited repair and recycling options.

“Ultimately, the bill itself has to be constitutional. It has to be up to snuff legally,” Gee said. “But it’s certainly an advantage, the environmental impact that this bill would have.” 

Blessing, from Ohio, agreed. Right to repair will “absolutely mean less electronics in our landfills, among other things,” he told Grist. “I don’t want to diminish that at all.”

This story was originally published by Grist with the headline The environmental policy backed by free-market Republicans on Apr 18, 2025.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/politics/right-to-repair-ohio-missouri-texas-red-states-republican-conservative/feed/ 0 527170
White Supremacist Terrorgram Network Allegedly Inspired Teen Accused of Killing Parents and Plotting Trump Assassination https://www.radiofree.org/2025/04/17/white-supremacist-terrorgram-network-allegedly-inspired-teen-accused-of-killing-parents-and-plotting-trump-assassination/ https://www.radiofree.org/2025/04/17/white-supremacist-terrorgram-network-allegedly-inspired-teen-accused-of-killing-parents-and-plotting-trump-assassination/#respond Thu, 17 Apr 2025 15:30:00 +0000 https://www.propublica.org/article/trump-assassionation-plot-nikita-casap-terrorgram-wisconsin-frontline by A.C. Thompson, ProPublica and FRONTLINE, and James Bandler, ProPublica

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

A Wisconsin teenager accused of murdering two family members and plotting to assassinate President Donald Trump was inspired by Terrorgram, a white supremacist network that operated on the Telegram messaging and social media platform for half a decade, according to federal court records.

The Terrorgram community, which has been linked to around three dozen criminal cases around the globe, including at least three mass shootings, was profiled last month in stories and a documentary produced by ProPublica and FRONTLINE.

The court documents allege that Nikita Casap, a 17-year-old from Waukesha, Wisconsin, wrote a three-page manifesto calling for the assassination of Trump in order to “foment a political revolution in the United States and ‘save the white race’ from ‘Jewish controlled politicians.’”

In his manifesto, Casap allegedly encouraged people to read the writings of Juraj Krajčík, a longtime Terrogram figure who murdered two people in an attack on an LGBTQ+ bar in Bratislava, Slovakia, in 2022, according to the court records. Casap also allegedly recommended two publications produced by the Terrorgram Collective, a secretive group that produced alleged hit lists, videos and written publications — including instructions for building bombs and sabotaging critical infrastructure — and distributed them throughout the Terrorgram ecosystem.

Launched in 2019, Terrorgram was a constellation of scores of Telegram channels and chat groups focused on inciting acts of white supremacist terrorism and anti-government sabotage. At the network’s peak, some Terrorgram channels drew thousands of followers. Over the past six months, however, the network has been disrupted as authorities in Canada, the U.S. and Europe have arrested key Terrorgram influencers and community members.

But the violence hasn’t stopped.

Casap in February allegedly shot and killed his mother, Tatiana Casap, and stepfather, Donald Mayer; stole their property; and fled in their Volkswagen Atlas, Waukesha County prosecutors say. He was arrested in Kansas. Prosecutors have charged the teen with two counts of first-degree homicide, as well as identity theft and other theft charges. He is expected to be arraigned on May 7, according to court records.

A witness told local investigators that Casap “was in touch with a male in Russia through the Telegram app and they were planning to overthrow the U.S. government and assassinate President Trump,” according to charging documents in the Wisconsin case.

The newly unsealed federal court filings indicate that the FBI is investigating Casap in connection to the alleged assassination plot.

The bureau declined to comment on the matter.

Last fall, federal prosecutors accused two Americans of acting as leaders of the Terrorgram Collective and charged them with soliciting the murder of federal officials and a host of other terrorism-related offenses. The U.S. State Department has officially designated the Terrorgram Collective as a terrorist organization, as have officials in the United Kingdom and Australia. The two Americans have pleaded not guilty to the charges.

“Do absolutely anything you can that will lead to the collapse of America or any country you live in,” Casap allegedly wrote in his manifesto, according to an FBI affidavit. “This is the only way we can save the White race.”

The teen’s writings and online postings that are cited in the affidavit indicate that he is a believer in militant accelerationism, a concept that has become increasingly popular with neo-Nazis and other right-wing extremists over the past decade. Militant accelerationists aim to speed the collapse of modern society through acts of spectacular violence; from the ruins of today’s democracies, they aim to build all-white ethno-states organized on fascist principles.

Matthew Kriner, executive director of the Institute for Countering Digital Extremism, a nonprofit think tank, called the alleged Casap plot unique. “It’s the first time we’re explicitly seeing an individual tie an accelerationist act or plot with the president of the United States as a means of collapsing society,” Kriner said. “I think what we have here is a fairly clear-cut case of an individual who is being groomed to take drastic terrorist action in an accelerationist manner.”

Casap’s public defender could not be reached for comment.

A Telegram spokesperson said, “Telegram supports the peaceful exchange of ideas; however, calls for violence are strictly prohibited by our Terms of Service and are removed proactively as well as in response to user reports."

A ProPublica and FRONTLINE review shows that Casap was recently active in at least five extremist Telegram channels or chat groups, including a Russian-language neo-Nazi chat in which posters uploaded detailed instructions for crafting explosives, poisons and improvised firearms. He was also a member of a chat group with more than 4,300 participants run by the Misanthropic Division, a global neo-Nazi organization.

Casap, according to the federal documents, also sought out information online about the Order of Nine Angles, a cult that blends Satanic concepts and Nazi ideology and has increasingly turned to Telegram to recruit and proselytize.

“This is a clear example of how Terrorgram continues to influence murder,” said Jennefer Harper, a researcher who studies online extremism. “Nikita was influenced online by an assortment of ideologies and groups that intersect with the Terrorgram ecosphere.”


This content originally appeared on ProPublica and was authored by by A.C. Thompson, ProPublica and FRONTLINE, and James Bandler, ProPublica.

]]>
https://www.radiofree.org/2025/04/17/white-supremacist-terrorgram-network-allegedly-inspired-teen-accused-of-killing-parents-and-plotting-trump-assassination/feed/ 0 526741
Purge, Purge, Purge Is the Word https://www.radiofree.org/2025/04/15/purge-purge-purge-is-the-word/ https://www.radiofree.org/2025/04/15/purge-purge-purge-is-the-word/#respond Tue, 15 Apr 2025 14:49:16 +0000 https://dissidentvoice.org/?p=157447 So, I slip me a work out in on a local trailway and then decide to drop off a deposit at my bank. I spot a branch of my bank just down the way and think, cool, I’ll just pop in the drive-through. But there is no drive-through. I park and walk inside. There are […]

The post Purge, Purge, Purge Is the Word first appeared on Dissident Voice.]]>

Purge is the word symbol of Athena – Athens

So, I slip me a work out in on a local trailway and then decide to drop off a deposit at my bank. I spot a branch of my bank just down the way and think, cool, I’ll just pop in the drive-through.

But there is no drive-through.

I park and walk inside. There are few twenty-somethings sitting around in offices, but no tellers. Just an automated ATM, who one of the twenty-somethings tells me can take my deposit. But a maintenance worker has the ATM door swung open, working on it. So, I don’t get to make a deposit.

I resolve to make the deposit the next day, instead.

Then, my roomie rings me and tells me to pick up a few things at the grocery. I’m no fan of Wally World, but it’s the most convenient stop. I park, run in, and grab a few groceries. I go to the check out, and it’s a lot like the bank I stopped at. It’s not tellerless—it’s checkerless. It’s all automated.

This doesn’t amuse me.

The more I think about it, the worse it gets. And, worse still, I do some research.

Talk about a bill of goods.

A decade or two back, “outsourcing” was all the rage. Our jobs were being sent overseas and we were livid. Now, blaming immigrants is in vogue.

But the numbers are funny and don’t really add up. And you don’t have to look real hard to figure it out. According to the internet machine, 4.5% of American jobs are outsourced each year. Also, according to the internet machine, immigrants make up 19% of the American workforce (one in five jobs).

Neither percentage is anything to dismiss—they just miss the point.

Our politicians and political pundits use figures like these to obscure the real issue … it’s all sleight of hand nonsense. And it’s a bummer, really, for so many of us, because we’re Pavlovian about terms like “outsourcing” and “immigrants”—as if we live for ill-informed finger-pointing. These economic bogeymen have been drummed into us for decades. Half of you are probably slobbering, now. But, please, dab your taco hole with your shirtsleeve and bear with me.

Outsourcing and immigrants really only infringe on an already diminished share of the scraps. According to the internet machine, automation has replaced 70% of Middle-Class jobs in the United States since 1980—and a related economic corollary is worse. Also, according to the internet machine, automation has driven down Middle-Class wages 70% since 1980. AND THESE AREN’T OBSCURE FACTS. They’re proffered front and center by a search engine’s AI shortcut!?

Put that in your mouse and scroll it.

It’s not just mouth-breathers that need to unite. It’s all of us. It’s anyone that may need a breather. It’s anyone that needs to breathe at all. Because what’s replacing most of us doesn’t.

President Dildo J. Trump’s claims about immigrants and bringing manufacturing jobs back to America are bald-faced lies, because most of those jobs were lost to robotics, computer processing, etc., and they’re never coming back. Immigrants and outsourcing are obviously easier targets than automation or AI, but still. This should scare you, reader. This should terrify you.

Immigrants and outsourcing are perfect red herrings, for sure, but neither—as proto-punk, rock-and-rolling band The Trashmen once sublimely put it—“bird is the word.”

“Purge” is the word.

Obsolescence is the word.

Human obsolescence.

And it’s coming to a universal wage station near you.

This is what technology hath wrought.

Vocationally speaking, human jobs have been being tossed in the trash for decades. It probably started innocently enough with something like gas station attendants. But don’t kid yourselves.

We are no longer surfing the web—the web is surfing us.

And the wave is about to break.

The post Purge, Purge, Purge Is the Word first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by E.R. Bills.

]]>
https://www.radiofree.org/2025/04/15/purge-purge-purge-is-the-word/feed/ 0 525814
The growing political influence of Silicon Valley defense technology startups https://www.radiofree.org/2025/04/09/the-growing-political-influence-of-silicon-valley-defense-technology-startups/ https://www.radiofree.org/2025/04/09/the-growing-political-influence-of-silicon-valley-defense-technology-startups/#respond Wed, 09 Apr 2025 22:00:24 +0000 http://www.radiofree.org/?guid=f811fa0f9ee16327c149c0a98e043313
This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2025/04/09/the-growing-political-influence-of-silicon-valley-defense-technology-startups/feed/ 0 524788
The quest to fix the irony at the heart of every heat pump https://grist.org/climate-energy/the-quest-to-fix-the-irony-at-the-heart-of-every-heat-pump/ https://grist.org/climate-energy/the-quest-to-fix-the-irony-at-the-heart-of-every-heat-pump/#respond Fri, 04 Apr 2025 08:15:00 +0000 https://grist.org/?p=662283 Heat pumps are essential for ditching fossil fuels. The appliances are many times more efficient than even the best gas furnaces, and they run on electricity, so they can draw power from renewables like wind and solar. 

But the very thing that makes them such an amazing climate solution is also their biggest challenge. A common refrigerant called R-410A pumps through their innards so they can warm and cool homes and offices and anything else. But that refrigerant is also liquid irony, as it can escape as a greenhouse gas over 2,000 times more powerful than carbon dioxide. (This is known as its “global warming potential,” or how much energy a ton of the gas absorbs over a given amount of time compared to the same amount of CO2.) Leaks can happen during the installation, operation, and disposal of heat pumps. 

But this year the industry is rolling out alternative refrigerant formulations like R-454B and R-32, which have around 75 percent less global warming potential. That’s in response to Environmental Protection Agency rules mandating that, starting this year, heat pump refrigerants have a global warming potential of no more than 700. Manufacturers are looking even farther ahead at the possibility of using propane, or even CO2, as the next generation of more atmospherically friendly refrigerants.

“The whole industry is going to be transitioning away from R-410A, so that’s good,” said Jeff Stewart, the refrigeration chief engineer for residential heating, ventilation, and air conditioning at Trane Technologies, which makes heat pumps and gas furnaces. “We’re getting lower global warming potential. The problem is, it still has some, right? So there’s concern about ‘OK, is that low enough to really help the environment?’”

To be clear, heat pumps do not release greenhouse gases at anywhere near the scale of burning natural gas to heat homes, so their environmental impact is way smaller. “Even if we lost all the refrigerant, it still actually has a much smaller effect just having a heat pump and not burning gas,” said Matthew Knoll, co-founder and chief technology officer at California-based Quilt, which builds heat pump systems for homes. “I would actually want to make sure that doesn’t hamper the rapid adoption of heat pumps.”

But why does a heat pump need refrigerant? Well, to transfer heat. By changing the state of the liquid to a gas, then compressing it, the appliance absorbs heat from even very cold outdoor air and moves it indoors. Then in the summer, the process reverses to work like a traditional air conditioner.

The potential for refrigerant leaks is much smaller if the heat pump is properly manufactured, installed, and maintained. When a manufacturer switches refrigerants, the basic operation of the heat pump stays the same. But some formulations operate at different pressures, meaning they’ll need slightly different sized components and perhaps stronger materials. “It’s all the same fundamental principles,” said Vince Romanin, CEO of San Francisco-based Gradient, which makes heat pumps that slip over window sills. “But it does take a re-engineering and a recertification of all of these components.”

While Trane has transitioned to R-454B, Gradient and other companies are adopting R-32, which has a global warming potential of 675 and brings it in line with the new regulations. Gradient says that with engineering improvements, like hermetic sealing that makes it harder for refrigerants to escape, and by properly recycling its appliances, it can reduce the climate footprint of heat pumps by 95 percent. “Our math shows R-32, plus good refrigerant management, those two things combined solve almost all of the refrigerant problem,” said Romanin. “Because of that data, Gradient believes the industry should stay on R-32 until we’re ready for natural refrigerants.”

Those include CO2, butane, and propane. CO2 has a global warming potential of just 1, but it works at much higher pressures, which requires thicker tubes and compressors. It’s also less efficient in hot weather, meaning it’s not the best option for a heat pump in cooling mode in the summer.

Propane, on the other hand, excels in different conditions and operates at a lower pressure than the refrigerants it would replace. It also has a global warming potential of just 3. Propane is flammable, of course, but heat pumps can run it safely by separating sources of ignition, like electrical components, from the refrigerant compartments. “It is kind of perfect for heat pumps,” said Richard Gerbe, board member and technical advisor at Italy-based Aermec, another maker of heat pumps.

That’s why Europe is already switching to propane, and why the U.S. may soon follow, Gerbe said. A typical heat pump will run about 10 pounds of propane, less than what’s found in a barbeque tank. Gas furnaces and stoves, by contrast, are constantly fed with flammable natural gas that can leak, potentially leading to explosions or carbon monoxide poisoning. “If you’ve got a comfort level with a gas stove in your house,” Gerbe said, “this is significantly less of a source.”

This story was originally published by Grist with the headline The quest to fix the irony at the heart of every heat pump on Apr 4, 2025.


This content originally appeared on Grist and was authored by Matt Simon.

]]>
https://grist.org/climate-energy/the-quest-to-fix-the-irony-at-the-heart-of-every-heat-pump/feed/ 0 523676
Multi-disciplinary artist Jack Rusher on the need to sustain your creative drive in the face of technological change https://www.radiofree.org/2025/03/31/multi-disciplinary-artist-jack-rusher-on-the-need-to-sustain-your-creative-drive-in-the-face-of-technological-change/ https://www.radiofree.org/2025/03/31/multi-disciplinary-artist-jack-rusher-on-the-need-to-sustain-your-creative-drive-in-the-face-of-technological-change/#respond Mon, 31 Mar 2025 07:00:00 +0000 https://thecreativeindependent.com/people/multi-disciplinary-artist-jack-rusher-on-the-need-to-sustain-your-creative-drive-in-the-face-of-technological-change For a non-programmer, tell me about how you go about using a programming language to make generative art.

This will touch on something that is unusual about how I use programming languages in general. The common practice in the industry is one that involves very slow feedback loops, these things we call compile-test cycles: edit, compile, test. I tend to use programming languages that are much more interactive. This is the family of programming languages that come down to us from the communities of LISP and SmallTalk, primarily. In these languages, you’re engaged in a conversation with the computer — your program is running the whole time, you’re modifying it while it’s running, and you can inspect the state within the program to see what’s happening.

This is particularly good for exploratory programming, but also for art making. I can have a sketch running that is using a generative system I’ve created to produce some kind of visual effect. I could think, “What if this parameter were slightly different?” and instead of building a bespoke control panel to do that, I can execute a tiny snippet of code inside my editor that changes what’s happening in the program, so I’m still working in the same medium and I don’t need to switch to a different tool.

I might start with a blank canvas with a loop running that is redrawing something, but it doesn’t know what it’s redrawing yet. Then I will gradually add elements, and those elements may have some innate structure. They may be drawn from nature in some way. Often, in my work, I will start with some natural system I found intriguing, and I’ll think, “What would have to happen geometrically to create a thing that has a form like that?” Then I’ll try to build a system where I’m planting the seed, but the growth happens within the simulation.

I also do a lot of work that is inspired by different periods of art. Maybe there will be something Bauhaus-inspired; I’ll look at a pattern Kandinsky drew by hand and think, “What if I wanted an infinite number of those that were all as good as the one he did by hand? What would I need to tell the computer for it to know [how to do that]?” In that sense, my artwork is often at that meta level. I’m less interested in the single-object output than I am interested in the underlying system that makes things of that nature possible.

Golden Aizawa Attractor, 2021

Your background is traditionally technical. How has that influenced your identity or your sense of aesthetics as an artist?

I don’t regard scientists and artists as fundamentally different kinds of people. In fact, I regard them as more alike than they are different.

The sort of division you see among people in modern American culture is, to me, a cultural artifact; it’s just an accident of education. I would say the same thing about athletics. The jocks versus geeks division is an entirely synthetic thing that arose in post-1950s America and spread in a diseased way to other parts of the world. There’s nothing about being good at using your nervous system to move your body through space that would make you bad at using your nervous system to reason about geometry.

Based on some early tests that show an aptitude or a proficiency, we’ve narrowly focused people into what we think is going to be the box in which they will perform, when we should be spending more time cultivating what people are innately and immediately good at but also filling in the rest of the profile. So if you’re somebody who finds mathematics easy but is intimidated by the idea of drawing classes, then you should be doing that. These things are all aspects of humanity, and it’s a mistake to leave any of them behind.

In your 2019 ClojuTRE talk on computational creativity, you gave a brief survey of historical definitions of creativity. After absorbing all of those, where do you net out? What grand unified theory of creativity do you subscribe to?

I think it’s the fundamental aspect that makes us human beings. Creative problem-solving is the thing that we do better [than any other species]. Communication is the other thing that we do better, which allows us to do creative problem-solving in groups. If you want to know why we’ve spread over the entire world and lived in every kind of ecosystem successfully, it’s because we’ve been able to creatively solve problems along the way. Without that, I don’t think we’re really people. Leaving aside your creative drives as an individual is a mistake, because it’s leaving aside your birthright as a human.

A question in the AI discourse right now is whether AI will ever be able to create the way a human does. Large language models can create reasonable facsimiles of mediocre writing and drawing, but that sort of path-breaking creative synthesis still seems to be uniquely human. As someone who has been in this field for a long time, what do you think is coming in terms of the influence of AI?

To touch on the first part of what you said, about mediocrity: when you have a big statistical model that is essentially taking the sum and then the average of the internet, whether it’s in words or pictures, then you can expect the output to be [average] by definition. Now, you can steer these models to get you somewhat surprising outputs, and that’s cool. I have some friends who train their own models and build complex workflows to come up with things that are very nice in terms of the outputs they achieve. For me, mostly, if I’m using a prompt to an LLM to generate an image, I can get an output that looks okay to good, because I word good and I have enough taste to pick the images that I think are okay. But after I’ve done that, I don’t feel like I’ve done anything, because I don’t feel like there’s any of me in the output.

I think a lot of where our good stuff comes from is actually from how the act of making the art changes us as individuals. Ages ago, I went to art school at night while I was doing a startup in Silicon Valley. I’d been a lifelong musician, and playing music my whole life meant that I heard everything differently. When I hear the leaves rustling, I hear the rhythm of the leaves rolling along the ground. When I hear the whistle on my kettle, I know what pitch it is. So I thought, “I’ll go to art school, and maybe it will change the way I see.” And of course it did. There’s no way you can learn to draw in charcoal and capture light and shadow without it changing the way you see everything for the rest of your life.

What if we take away the need to do any of those things to produce those outputs? Then we get an entire generation of people who do not transform themselves into having a higher level of perception. What does that do for our ability to discriminate between what is just AI slop and what is actually something amazing and beautiful? It’s leaving behind part of our birthright as humans, to outsource some of the best stuff we have going to the machines, even if the machines can do it.

Also, the more stuff there is, the more sifting has to be done to find the good stuff. Making a machine for the unlimited production of mediocre junk means that the signal-to-noise ratio is getting worse all the time, and I dislike this vigorously.

On the other hand, I think these technologies can become the components of amazing engineering solutions later on. An example of this, not in the artistic context, is that I took some LLMs and I attached them to a query apparatus for WikiData, the database version of Wikipedia. I was able to use the LLM to get the data into the system from natural language. Then I do a query against this fact database, and then I take the series of dry facts that it returns and have it reformatted as nice, flowing prose. So I get something that you can get into and out of with human language that doesn’t hallucinate any details, and this is actually immediately useful.

I think many things of that nature are coming. Artistic tools where the trained model is more like a paintbrush and less like an outsourced cheap artist are going to be extremely powerful. In cinema, I think we’ll see the cost of making movies drop to one-one-hundredth of the time and one-one-hundredth of the cost using these kinds of tools, because CGI is such an important part of film production already. In this sense, when the good tools come out of it, you will see actual artists be able to do more and better.

Asemic Writing, 2020

Have you been able to find a balance between the things you do to pay the bills and the things you do to satisfy an artistic impulse? Do you find the same amount of creativity and joy in your work at Applied Sciences as you do in the art you make?

Here, I have to start by saying that I’m in a position of ridiculous privilege. I came of age at a time when the things I liked to do for fun were among the most lucrative things you could do for a living.

Throughout my career, I have been able to work on only things I’m interested in and be paid very well for them, both on the science and programming side and also on the art side. Obviously, I make more money from the tech stuff than the art stuff. But in years when I’m more active, like in 2020, I made enough that I could have made a living in Berlin just from the art side. This is possible. It’s difficult and it requires a lot of luck, but it is possible. So I’m in the weird position where I don’t have to choose between the things I love and the things that pay the bills because everything I get paid for is also something I love. And I recognize the tremendous privilege of that statement.

What do you think it takes to do that, beyond luck? Are there things a person can do to be more likely to have that kind of outcome?

Having a very active daily practice, and never letting it get away from you, is incredibly important. Björk has a fantastic quote about not letting yourself get gummed up and only releasing something every seven years because it puts you out of the flow of creating: “Don’t hold your breath for five or seven years and not release anything, and then you’ve just got clogged up with way too much stuff… You lose contact to the part of you, your subconscious, that’s writing songs all the time, and the part of you that’s showing it to the world… That’s more important, to sustain that flow, than to wait until things are perfect.”

Whatever it is that you do, you have to really do it. If you have a choice between doing it for three hours on Sunday or doing it for 15 minutes a day for the rest of the week, do it 15 minutes a day, because what you do every day is what your brain is working on when you’re not paying attention. Your subconscious is making progress on the things you do constantly. There’s a bowdlerization of Aristotle’s Nicomachean Ethics that gets quoted a lot, which is that excellence is just a function of habit. It’s what you do repeatedly. Lean into it. Do the work.

And — this is the bad news, because many programmers or artists are not necessarily interested in standing up on a chair and shouting about themselves in public—if you do beautiful work and nobody sees it, you’re not going to have a good career. You have to find a way to surface what you’re doing.

If it were five to 10 years ago, I would say to get a Twitter account, communicate with the kinds of people who are interested in the kind of thing you do, post all of this work that you’re doing as your daily practice, and you will be noticed. Today, it’s a more complicated situation. Some arsonists have set fire to Twitter and it’s now full of smoke and dead bodies, so very few people you would want to find your work will go to that place. I think we’re in an interregnum where there isn’t a good public space to demonstrate excellence for most arts. But it is important that you find a way to do that, or you will likely go unnoticed.

Taijiquan Performance Converted to Picasso-esque Plotter Doodles, 2019

I also wanted to ask you about your time AT&T Research, formerly Bell Labs. Bell Labs has a mythical place in tech lore. It was a hotbed of innovation and a Schelling point for practically every computer science pioneer you’ve ever heard of. Did that still penetrate the company’s DNA when you were there?

It was definitely a unique environment. First, as in any such situation, it was the people. You had a large concentration of brilliant people all in one place. That’s always a good thing.

The facility where I worked, the Claude Shannon Lab, was in a leafy suburb in New Jersey. We would go down to eat in the cafeteria, and there were floor-to-ceiling glass windows, and we would see deer outside. In my wing, the people in the other offices were Bjarne Stroustrup, the inventor of C++, and David Korn, who created KornShell. I used to ride in his minivan from downtown Manhattan, because there were a bunch of us who preferred to live in the city. So the vibe had mostly to do with the people, and then the facility itself being the perfect leafy campus environment, but tuned for grown-ups — well, eternally Peter Pan grown-ups.

We did some great work there, even though when I worked there it was after the heyday. Unix was invented around the time I was born, so I missed out on all those great things. But I know most of those people because I was very young when I got started in the industry, and they weren’t dead yet. Some of them are still walking around. So I have all the stories, I’m happy to report. The vibe, I think, was still similar, but obviously the level of work, while good, wasn’t as world-shaking as it was earlier in the 20th century.

Why do you think that was? Was it a function of something changing in the way the work was supported?

There were a couple of things. One is that the way research was supported changed. Here we come back to that idea of patronage. Both artists and scientists have in common that they do their best work when they are left alone and allowed to chase their own curiosity and their own aesthetics and their own feelings. The appetite and the surplus to allow that has decreased year on year since the middle of the 20th century.

There was a period where this was really celebrated, and it was considered a good use of funds to have people do things that may pay you back nothing but also may give you a whole different world. You would fund it with some faith in the fact that if the people are talented enough, something good will come out of it.

After the Reagan–Thatcher revolution, that became less of a thing. Ideologically, everything shifted to this idea that you should have a return-on-investment angle on what happens. And because you can’t predict the outcome of research, it is effectively impossible to have a return on investment attitude towards it.

A great example of this is the iPhone. The capacitive touch display was invented 25 years before that at Bell Labs by somebody who was just chasing their own interest. If that person hadn’t had the opportunity to plant those seeds, then Apple could not have reaped the benefits later. Right now, I feel like we’ve really shifted towards reaping, and left sowing to be somebody else’s problem. This will continue to harm us in the future, because if we keep doing basically the same things over and over again, we won’t have any new seed corn.

There are certainly little pockets where that focus on something other than ROI still exists. But I agree. It feels like everyone recognizes the value of something like Bell Labs, yet very few people have the risk appetite or long-term thinking to fund that anymore.

It’s not just the absence of a Bell Labs sort of thing. There are other social opportunities available that are not followed. For example, I was talking to some people who will remain nameless but who are very high in an organization that makes a popular search engine and browser. I wanted them to fund some improvements to a text editor called Emacs that I’ve been using for nearly 40 years. With a good team working on it and with some actual financial support, a lot could be improved. Around half of their employees use Emacs, so it seemed like it would even pay them back, in some sense. But they told me that the most their enormous, many-billions-a-year company could possibly [contribute] was funding for some student [project].

This kind of thing is insane. These are public goods that they consume, but they don’t see it as their responsibility to help support that commons. This is a problem with open-source software in general — it is insufficiently supported. It’s shared infrastructure, and shared infrastructure requires shared support.

Isolation 3, 2020

If you could reshape the way the internet has evolved, where would you start?

I would try to prioritize [changing] some of the infantilizing drives of current products. It is very fashionable at the moment to believe that if a person can’t use something immediately on first seeing it, then it should be thrown away, because people are stupid and have no patience. This is a prevalent way of thinking about user interfaces. But if you look at the user interface of the violin, it’s terrible for quite a while. You have to put in some effort before you can do anything useful with the violin. But then you can do something that you simply cannot do with a tiny children’s xylophone. There are effects you can achieve if you’re willing to put in the work.

I feel like there’s a large area to explore of slightly more difficult things that have a higher ceiling. I believe you should raise the floor as much as you can, but you shouldn’t do it by lowering the ceiling.

I would like to make it more possible for people to, for example, automate things on their own; end user programming is the technical term for this. In a system like HyperCard, this was very effective. People could build systems to run their entire business inside of this very cool piece of software that you ran on a Macintosh. I don’t see a modern thing that is as good. There’s more we can do to democratize the programmatic aspects of owning a computer so that people have more power as individuals.

There have to be these open-box systems where you can play with the parts. Otherwise, you’re strictly a consumer. On Instagram, that’s exactly how I feel. I post my artwork there, but that’s the limit of what I can do. Someone else has decided the limits of my world. And I resent that.

At the end of your talk on creative computation, you give some recommendations for programmers who want to get in touch with their creative side: take an art course, meditate, take psychedelic mushrooms. I assume those recommendations still hold, but what else would you recommend to anybody who wants to connect with their creativity?

The important thing, and I tried to stress it in that talk, is that you can approach things as a reasoning and reasonable agent who is putting one fact in front of another and trying to be very orderly and systematic. That is an important way of being. But there’s another way of approaching things, which is to open yourself up to your own intuition and to feel your way through things. That’s no less important a way of being. You have to have both to be a complete human being. So whether a person is a programmer who isn’t as in touch with their intuition, or they’re an artist who is not as in touch with their ability to be analytical, I feel that whichever side you’re coming from, you should be trying to fill in the part at which you are the weakest so that you can be a more complete person.

For a lot of people, getting in touch with the intuitive side also has to do with the body itself, because many people are very disembodied. So, going to a yoga class, taking up meditation, doing things that allow you to realize that you are an embodied creature, and then starting to listen to how your body is feeling. Having a daily practice of checking in with yourself can automatically and immediately start to open you up to being able to do creative things. If you combine that with the daily practice of journaling or drawing or something else that allows you to focus those feelings and externalize them in some way, very quickly you’ll discover you have an artistic side you never knew was there.

Jack Rusher recommends:

Immerse yourself in generative art history, starting from the late 15th century but really taking off in the 20th with people like Bridget Riley, Sol Lewitt, Vera Molnár, Frieder Nake, Georg Nees, Manfred Mohr, and Laurie Spiegel.

I’ve known many people to fail at taking up meditation until they try an app like Headspace. For that reason, I’d like to recommend the free and open-source meditation app Medito.

In the search for embodiment, it’s important to develop some kind of personal daily habit. Everyone has different cultural and aesthetic preferences regarding which kind of exercise seems more or less for them. If you like the idea of lifting weights and being strong, you might consider finding someone to coach you through Starting Strength. If you’d prefer to be in a more meditative and feminine-coded space, you might consider ashtanga yoga. Maybe you grew up dancing and you’re already quite flexible, but you’re starting to have weird aches and pains—consider pilates! These are all roads to the same place—choose the one that speaks to you or find another that does (rock climbing! Brazilian jiujitsu! circus training!).

Likewise, several traditions offer more or less the same concrete advice on how to get a grip on your mind, but present the advice differently. Buddhism, Stoic philosophy, and cognitive behavioral therapy all take you to the same place, with the main choice being whether you prefer to receive mysticism, philosophy, or a medical prescription. I recommend you investigate at least one of them.

Decomposition of Phi, 2021


This content originally appeared on The Creative Independent and was authored by Rebecca Hiscott.

]]>
https://www.radiofree.org/2025/03/31/multi-disciplinary-artist-jack-rusher-on-the-need-to-sustain-your-creative-drive-in-the-face-of-technological-change/feed/ 0 522640
Curator Zaiba Jabbar on allowing your role to shift https://www.radiofree.org/2025/03/28/curator-zaiba-jabbar-on-allowing-your-role-to-shift/ https://www.radiofree.org/2025/03/28/curator-zaiba-jabbar-on-allowing-your-role-to-shift/#respond Fri, 28 Mar 2025 07:00:00 +0000 https://thecreativeindependent.com/people/curator-zaiba-jabbar-on-allowing-your-role-to-shift Tell me about HERVISIONS, a femme-focused curatorial agency.

I really like hacking the system, making space where there isn’t space for marginalized voices. I’ve noticed how we have to exist [in multitudes], and the digital space allows that. It’s [where] more femme, or queer, and even neurodivergent perspectives intersect.

Something that I’ve been trying to encapsulate through HERVISIONS is the outsider, the underdog. People that are undermined. I feel like I am constantly undermined in my ability because I’m a woman of color from a low socioeconomic background. My lived experience informs my practice. I want to be able to help other people like me. I’ve been doing HERVISIONS for nearly 10 years now.

Wow, congratulations.

Thank you. [*laughs*] Yeah, it’s still not sustainable. I really want to become more…

Self-sufficient? Would that mean that you’re bringing in another voice?

I guess it’s more about the infrastructure. I’ve been working project to project.

A lot of creatives, in order to carve out space for themselves in an inaccessible industry, start up their own platforms, and they start with a lot of vim and energy. But then you realize that monetary support is few and far between.

Exactly.

It runs you down. It’s one of those things where, when you don’t have the building blocks, you start getting insular. But it’s still a living archive of the process that you went through to get where you are now.

You’re right. You start to become insular, and you start to equate success with your own value, and that becomes really problematic… It’s not conducive to any sustainability, personally or as a business model. So I don’t want to keep doing HERVISIONS the way that I have been. I’ve been thinking, “What can I do that’s manageable and that I enjoy?”

Fluid Imaginarium Instagram x Saatchi Gallery courtesy of HERVISIONS

You don’t do this full time, right?

I’m teaching now, associate lecturing at Camberwell University of The Arts, for their Computational Arts MA.

What is it like passing that knowledge down?

You always surprise yourself on what comes out. What if a student comes to me and I don’t know what to say?

I think it’s okay to say you don’t know.

Exactly. There’s always something you can connect to. There’s different styles of teaching. Sometimes it is critique-based, other times it’s workshopping… I’m still finding my teaching practice. Alternative education is really, really important.

Alt Ed is the most important, to be honest. You have to be adaptable and elastic. Do you teach anything practical in that class?

Good question. Because I’m coming from a more curatorial background—even though I’ve worked with digital tools for world-building with live-action, post-animation, or post-internet aesthetic effects—tools move so quickly. My curatorial practice has been one of collaboration, and intersecting with artistic mediums and practices that are still being developed. In Computational Arts there’s a lot of gaming engines, creative coding…

What’s creative coding?

Using Python or JavaScript, or p5.js. Anything digital is going to have some sort of code. If you can get into the backend and hack it, you can adapt [and] be creative with how you’re coding it. Now you can also use AI tools like ChatGPT to tell you the code. But you get into this really tricky area of ethics versus creativity versus accessibility versus resources… I feel like I’m constantly ping-ponging between that.

Are you talking about AI when you’re talking about ethics?

Well, all of it. If you’re using things like Spark AR, which is now closed and which was owned by Meta—Meta are just trying to capitalize on the way that we use the tool, our data, the artworks, the work that’s produced. The production of that work is still owned by them. They want to be able to have access to the collective consciousness, ultimately, and then teach AI how to replicate.

There is a lot of anxiety about phasing out anything organic. I definitely want to talk about the environmental impact of tech, but I wanted to go back to the queering of tech, and neurodivergence. How can tech can be made ready for people with learning disabilities, given that they are pushed to the peripheries in a lot of standard education contexts?

My theory is that the tech actually feeds into neurodivergence through the attention economy. So, how do we move away from that? You have to foster these tools to be able to create offline environments for people to connect in real time, in real life. Legacy Russell talks in Glitch Feminism about AFK: Away From Keyboard reality. There is this hybridity of having to exist offline… Artists Caroline Sinders and Romy Gad el Rab are doing a residency at the Delfina Foundation about mental health and how we can create digital interfaces to be more supportive of different needs and abilities.

Wild Wired! Rewilding Encounters of Langthorne Park – Image courtesy of William Morris Gallery and HERVISIONS

For me, I have dyslexia and I get very anxious when I see something and the interface doesn’t match how my brain can read it.

Exactly. You’re like, “Oh my god. Where do I even look?”

When I was at university and I did the dyslexic test, at the end they tested filters to see what color I read best in. I read best in pink, actually.

[*laughs*] That is cool!

I think most people respond to color, but hyper-capitalist cities just pull all the color out of everything, and when you go to somewhere like Mexico, or Cuba, and there’s color everywhere, you are automatically more jubilant and excited… A lot of coding spaces are black background and white text, or yellow text, or whatever.

That’s why the integration of NLP, Natural Language Programs, [are important]. Technology is developing now beyond just the formulas of binary codes. Romy Gad, the psychologist and artist, works with people that have addictions to technology. People can know the standard thing—”It’s bad for your mental health because you’re going to get addicted to dopamine”—but we don’t know the actual ins and outs of that, in [our] buzzword culture.

We simplify down to, “A + B = bad.” But we don’t actually know how to tackle or move past it. So artists, social thinkers, and psychologists are important to collaborate with. What have you learned about collaborating? What makes for a harmonious environment for positive collaboration?

Collaboration is a practice in itself. You have to play to your strengths. And by practice, I mean there needs to be an understanding that it has to be a mutual benefit for everyone involved. Also, being realistic of the outcomes is so important.

I think being realistic is [about] making manageable phases and not seeing everything as a finite outcome. You can try to have more bite-sized approaches to things. You can say, “We’re just going to prototype this, and then if it works, then we can develop it further.”

Is there anything that you would avoid when collaborating? Something you’ve maybe learned that’s gone wrong?

My expectations. It’s what you impose on yourself, and the people that you’re working with. Also I think the parameters, or the frameworks of what the collaborations are, or what everyone’s role is should be, should be clear from the beginning.

Things can just run away with themselves. I really try to impose some sort of structure of what’s important, or the expectations within roles, and making sure that everyone understands their roles. But also openness around how those roles can shift; allowing for a little bit of that is also part of the magic. It’s like creative contingency, knowing that that’s what happens. Things don’t go the way you started. So being able to foresee that contingency, but seeing it as a positive.

Underground Resistance, Living Memories, Josepha Ntjam, The Photographers Gallery, image courtesy of HERVISIONS

I’ve definitely learned that when I’m under pressure, I’m not always the nicest person. I try to face that in myself and be honest with other people.

I think it’s hard when you’re coming from a place of having to drive these things. When you’re like, “But if I don’t do this, no one else is going to do it. It’s my responsibility to do this, to get this done, and I have to pull people in.” If you’re the project lead, it comes from wanting everything to be perfect. But what I’ve learned is expecting a “no,” or expecting things to not be as you want, is a practice as well. Having that discipline to be able to step back. That is really learning about yourself.

Do you have a favorite digital work or physical piece of yours?

The project I did with the William Morris Gallery, “Wild Wired!,” felt very much like, “Ah, everything makes sense.” It was a site-specific digital intervention about rethinking the future of Langthorne Park in Leytonstone. It was a way to activate the local communities and introduce some sort of artwork connected to the William Morris Gallery’s Radical Landscapes exhibition. It was a project that combined community engagement, artist-led workshops, and digital technologies. We produced a site-specific, mobile-friendly game that you could access right in the park. It was accessible through scanning banners in the park. We were thinking about the park as a body—which was inspired by Taoism—and thinking about the medicinal properties of the plants in the park, and how they would impact our speculative future organs. We had different workshops where we asked artists, the community, and local residents to think about speculative organs. They did collages and we did writing and photography exercises.

These methods of world-building were then intertwined into a narrative, which then was produced into a body of work—which was the game, a 3D-printed artwork, an interactive website, and a moving image piece. That was really a huge amount of work.

It felt like everything clicked together for me. There were a lot of milestones within that project and there were a lot of production difficulties in terms of things not working the way we wanted, and that’s always what happens in technology. So it was just constantly problem solving.

That’s also a good skill you have to be able to hone whenever you’re doing these types of things: being a problem solver. My last point is about the environment. I think and hope that more people are coppin’ onto the environmental cost of tech, in terms of how much water usage there is to cool all these database storage centers down… Basically, without water, there wouldn’t be any tech. But how can we care more for the environment? What are your feelings about that?

I think this idea of reclaiming space and rewilding is an interesting way to think about it. The thing is, technical devices use a lot of mined minerals and components from the earth that we need for our smartphones. There’s a lot of reliance on nature, and how do we manage that? Gosh, I wish I had the answer.

AI is really, really, really environmentally unfriendly, but then also crypto, blockchain… There was a lot of fuss about NFTs not being ethical or environmentally friendly—which, yes, there is a massive usage of energy that blockchain takes. But the proportion of that which the creative industries use, in relation to other industries that use blockchain, is also a very small amount. I feel like there needs to be more transparency [from larger] capitalist companies.

I feel like artists, or creatives are just such little cogs in the system.

I think, though, that 10,000 small cogs make up a ton. We do have a part to play.


This content originally appeared on The Creative Independent and was authored by Georgina Johnson.

]]>
https://www.radiofree.org/2025/03/28/curator-zaiba-jabbar-on-allowing-your-role-to-shift/feed/ 0 522100
Succumbing to Being Tracked https://www.radiofree.org/2025/03/26/succumbing-to-being-tracked/ https://www.radiofree.org/2025/03/26/succumbing-to-being-tracked/#respond Wed, 26 Mar 2025 15:07:20 +0000 https://dissidentvoice.org/?p=156926 Our purchases can reveal us to be as the saying goes: our own worst enemy

The post Succumbing to Being Tracked first appeared on Dissident Voice.]]>

The post Succumbing to Being Tracked first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2025/03/26/succumbing-to-being-tracked/feed/ 0 521667
Mining is an environmental and human rights nightmare. Battery recycling can ease that. https://grist.org/energy/mining-is-an-environmental-and-human-rights-nightmare-battery-recycling-can-ease-that/ https://grist.org/energy/mining-is-an-environmental-and-human-rights-nightmare-battery-recycling-can-ease-that/#respond Wed, 26 Mar 2025 08:41:00 +0000 https://grist.org/?p=660083 Rows of dead batteries stretch across some 30 acres of high desert, organized in piles and boxes that are covered to shield them from the western Nevada sun. This vast field is where Redwood Materials stores the batteries it harvests from electric vehicles, laptops, toothbrushes, and the litany of other gadgets powered by lithium-ion technology. They now await recycling at what is the largest such facility in the country.  

Redwood was founded in 2017 by former Tesla executive JB Straubel and says it processes about three-quarters of all lithium-ion batteries recycled in the United States. It is among a growing number of operations that shred the packs that power modern life into what is called “black mass,” then recoup upwards of 95 percent of the lithium, cobalt, nickel, and other minerals they contain. Every ounce they recover is an ounce that doesn’t need to be dug from the ground.

an aerial view of a large industrial building in the desert
Redwood’s Tahoe Campus in northern Nevada Redwood Materials

Recycling could significantly reduce the need to extract virgin material, a process that is riddled with human rights and environmental concerns, such as the reliance on open pit mines in developing countries. Even beyond those worries, the Earth contains a finite source of minerals, and skyrocketing demand will squeeze supplies. The world currently extracts about 180,000 metric tons of lithium each year — and demand is expected to hit nearly 10 times that by 2050, as adoption of electric vehicles, battery storage, and other technology needed for a green transition surges. At those levels, there are only enough known reserves to last about 15 years. The projected runway for cobalt is even shorter.

Before hitting these theoretical limits, though, demand for the metals is likely to outstrip the world’s ability to economically and ethically mine them, said Beatrice Browning, an expert on battery recycling at Benchmark Mineral Intelligence, which tracks the industry. “Recycling is going to plug that gap,” she told Grist. 

Given these trends, the most remarkable thing about Redwood isn’t that it exists, but that it didn’t exist sooner. As the United States belatedly embraces the economic, national security, and environmental benefits that domestic battery recycling offers, it is trying to claw back market share from counties like South Korea, Japan, and especially China, which has a decades-long head start.
“There is this race in terms of EV recycling that people are trying to capitalize on,” said Brian Cunningham, program manager for battery research and development at the Department of Energy. “Everybody understands that, in the long term, developing these robust supply chains is going to be incredibly reliant on battery recycling.”


Straubel’s recycling journey began while he was still the chief technology officer at Tesla, which he co-founded with Elon Musk, and three others, in 2003. One of his roles was establishing the company’s first domestic battery manufacturing facility, Gigafactory Nevada. Material for Tesla’s batteries came from mines around the world, and Straubel understood that the trend would accelerate alongside demand for EVs, which has quintupled in number in the U.S. since 2020. He also knew that, in the years ahead, a growing number of electric vehicles would reach the end of their lives. According to consulting firm Circular Energy Storage, the world’s supply of retired batteries is expected to grow tenfold by 2030.

“[We] need to be planning ahead and really keeping an eye toward what that future looks like, to be ready to recycle every one of those batteries,” Straubel said in 2023. “The worst thing we could do is go to all this destruction and trouble to mine it, refine it, build the product and then throw it away.”

A man in a button-up shirt speaks in front of a podium with the Tesla logo
JB Straubel, then-Tesla Motors chief technical officer, speaks during a ribbon cutting for a new Supercharger station outside of the Tesla Factory on August 16, 2013 in Fremont, California. Justin Sullivan / Getty Images

Last year, Redwood says it recycled 20 gigawatt-hours of lithium-ion batteries, or the equivalent of about a quarter-million EVs, generating $200 million in revenue. In addition to its headquarters in Carson City, Nevada, Redwood is building a campus in South Carolina. It isn’t alone in looking to expand. Ascend Elements, Cirba Solutions, Blue Whale Materials, and Li-Cycle are among a number of recyclers operating, or planning to operate, facilities in at least nine states across the country. More than 50 startups worldwide have attracted billions in investment in recent years. (Much of this outlay was driven by Biden-era legislation that Republicans are considering repealing, though it remains unclear just what such action might mean for spending already planned or underway.)

Despite the boom, the reuse revolution won’t come quickly.

Benchmark projects that recycled lithium and cobalt will account for a bit more than one-quarter of the global supply of those metals by 2040. A closed system in which battery manufacturers use only recycled material is considerably further off, because any increase in the number of old packs available to recycle will be outstripped by the need for new ones.

Global demand for EV batteries, for example, is growing by about 24 percent per year and won’t level off until sometime after 2040 — the point at which Benchmark’s forecast ends and growth is still forecast at 6 percent per year. The battery powering an EV can last well over a decade or more, so there will be a lag before the supply of recycled material catches up to demand.

Even today, the world’s recycling capacity outpaces the supply of batteries available to recycle, leaving everyone clambering to find more. That has meant waiting for EV batteries to reach the end of their lives, and attempting to recycle the small batteries in everyday gadgets that are often trashed. The dearth of material available for recycling is often attributed to the idea that only 5 percent of lithium batteries make it to companies like Redwood Materials. But the provenance of that number, cited everywhere from the Department of Energy and Ames National Laboratory to The New York Times and Grist, is murky. 

“If you ever ask, ‘Where did that 5 percent number come from?’ no one can really track back to the data,” said Bryant Polzin, a process engineer at Argonne National Laboratory. Like other Department of Energy employees or affiliates quoted in this story, he spoke to Grist before President Trump was inaugurated. “I think it was just kind of a game of telephone.”

Argonne’s research pegs the recycling rate for all lithium-ion batteries originating in the U.S. at 54 percent — 10 percent domestically and 44 percent in China — though it notes that data reliability remains an issue. Even that number, though, falls considerably short of what’s possible: 99 percent of lead acid batteries, like those used to start cars, in the United States are recycled, according to the Battery Council International trade association.

Large wrapped slats of batteries in a warehouse setting
Technicians operate automated recycling equipment at an electric vehicle power lithium battery recycling workshop in Hefei, Anhui province, China, in 2023. CFOTO / Future Publishing via Getty Images

Redwood works with many automakers, including Toyota, BMW and Volkswagen, to gather EV batteries, and goes into the field to collect others from automotive repair shops, salvage yards, and the like. Policy tweaks could help recyclers acquire more. In California, for example, a state working group recommended more clearly delineating when various entities in the supply chain — from the battery supplier and auto manufacturer to a dismantler or refurbisher — are  responsible for ensuring a battery is recovered, reused, or recycled. This, the report said, could reduce the risk of “stranded” resources. 

So far, though, this seems to be a rare occurance. The much bigger hindrance to EV recycling in the U.S. is simply that there aren’t enough old batteries to meet the demand for new ones. As that waiting game unfolds, recycling those often discarded as household waste could help bridge the gap.


Small lithium-ion batteries power everything from phones and electric toothbrushes to toys. By Benchmark’s estimate, about 5 percent of virgin lithium is used in consumer devices, but when they die, many of them are squirreled away in a drawer or trashed.

“A lot of household stuff does get chucked in the waste, and they’re not getting recycled,” said Andy Latham, the founder of Salvage Wire, a consulting firm focused on automotive battery recycling. Beyond being wasteful, dropping old batteries in the trash can be dangerous; scores of garbage trucks in cities from New York to Oregon have caught fire in recent years due to improperly disposed e-waste. 

Data on just how much lithium is simply thrown away or hoarded remains elusive. But Latham says, in the short-term, batteries in portable electronics are “probably just as much, if not more of a factor” as those in EVs when it comes to advancing recycling. Redwood Materials, for one, is hoovering up as many as it can. It works with nonprofits and others to funnel them to its Nevada campus and hopes to establish drop-off locations at big-box retailers, similar to can and bottle collection in some states. 

“Collection is definitely the biggest challenge,” said Alexis Georgeson, Redwood Materials’ vice president of government relations and policy. “It’s really a problem of how you get consumers to clean out their junk drawers.” 

How to get rid of your e-waste

Lithium-ion batteries can be found in laptops, phones, toothbrushes, Bluetooth speakers, and power tools, just to name a few things. But many people aren’t sure what to do with these gadgets once they die. Instead of tossing them in the trash, which can be dangerous, experts say to recycle them. Here’s how. 

The nonprofit Call2Recycle operates some 16,000 sites nationwide where people can drop off their devices at no cost — at libraries, garbage dumps, and big box stores like Staples. The organization collected 5.4 million pounds of rechargeable batteries in 2023, and provides an online map to find a recycling location near you. Earth 911, Green Gadgets, and GreenCitizen also have locators. 

Some cities offer curbside pickup, making recycling even easier. Call2Recycle, Electronic Recycling International, and others will take them by mail, usually for a fee. “Batteries sitting in a junk drawer or a box in the basement can accidentally cause a fire,”said Mia Roethlein, an environmental analyst at the Department of Environmental Conservation in Vermont, a national recycling leader. “Bring them to one of the free battery collection locations as soon as they are no longer usable.” 

Until more people do that, recyclers count on a somewhat ironic source of material: Scraps from factories that make new batteries. One of Redwood’s primary feedstocks are the bits and pieces left over during the manufacturing process in places like Tesla’s Gigafactory, Georgeson said. Benchmark estimates that such leftovers represent about 84 percent of the material all battery recyclers use today.

The authors of the Argonne paper underscored how vital this material is: “If no scrap was available,” they wrote, “the development of the U.S. recycling industry might be significantly delayed.”

As more EVs hit the end of the road, consumer electronics are collected in greater numbers, and battery manufacturing yields less scrap as it grows more efficient, the composition of the material will adjust. New battery technologies could also have an impact, with emerging solid-state batteries, for example, expected to create more production waste in the short term but less in the long term. But few doubt recycling will be a thriving business that could help the country cut carbon emissions and decrease its dependency on places like China, Chile, and the Democratic Republic of the Congo for increasingly vital minerals. It’s a future that American policymakers are trying to shape, hasten, and prepare for. 

Although under threat from President Donald Trump’s administration, both the Biden-era bipartisan infrastructure law and Inflation Reduction Act, or IRA, explicitly aim to bring battery manufacturing to the United States. They provided billions of dollars in grants and tax credits to incentivize building out domestic capacity (often in Republican congressional districts). The consumer-facing EV tax credit also requires that manufacturers source a minimum amount of both minerals and components locally. The government has been investing hundreds of millions of dollars in battery recycling as well, including Department of Energy support for everything from collection systems for small electronics to research into improving recycling technology

“The work that we are funding is to really make those processes more efficient and economical,” said Jake Herb, technology development manager at the agency’s Vehicle Technologies Office. One success story is Ascend Elements, which Department of Energy funding helped grow from a Worcester Polytechnic Institute startup into a major player in the domestic industry. The department offered to loan Redwood Materials $2 billion to expand its factory, though the company declined the additional investment and says it has not accepted any federal funding. A robust domestic industry ensures that“we’re able to reclaim more materials [and] keep more of those materials domestic in the U.S,” Herb said.


Several challenges remain as the country sprints toward that goal.

One hurdle is figuring out when recycling is the best option. Argonne National Laboratory’s “battery material use hierarchy” puts recycling near the bottom of its list of possible outcomes. It’s better to find alternate uses for batteries, especially those from EVs, like refurbishing them for use in another car or directing them to less intensive applications, such as for energy storage. 

“It would provide a much more economical solution to consumers,” said Vince Edivan, executive director of the Automotive Recyclers Association. 

Still, this so-called “second life” market remains nascent in the U.S. Edivan says automakers could boost it by making it easier for salvage yards to assess a battery’s condition to determine whether it can be reused or should be recycled. They often consider that information proprietary, he said. “We’re shredding perfectly good batteries because we don’t know the state of health.”

Battery recycling comes with another danger as well: fire. Dismantling and recovering batteries involves highly volatile processes. Last fall, a recycling plant in Missouri sparked a blaze that led many residents to evacuate. Thousands of dead fish washed up downstream of the plant

It’s somewhat hazy who is supposed to regulate this rapidly growing industry. The Environmental Protection Agency considers lithium-ion batteries hazardous waste, which dictates how they should and shouldn’t be disposed of, but doesn’t directly address recycling. In 2021, Argonne signed on to help develop lithium recycling standards, though the status of that effort remains unclear. The task will likely fall to a patchwork of federal, state, and local authorities, which must keep the public both safe and confident in a process that will be critical to the country’s — and the climate’s — future.

Perhaps the biggest challenge to creating a full-cycle loop in the United States is that before any reclaimed material can be used in a battery, it must be refined into an intermediary product, such as cathode, which makes up approximately 40 percent of a battery’s value. “You can’t send lithium to a Gigafactory,” said Georgeson. “It is like sending sand to a computer factory.”

At the moment, no one is making cathode in the U.S. at scale — manufacturers are buying it from Asia. Redwood, Ascend Elements, and others are ramping up cathode facilities that should be online in the coming years (Panasonic plans to use Redwood cathode at its new battery plant in Kansas). But, for now, they are frequently selling their raw material abroad. 

Georgeson sees federal policy as key to helping, or hindering, efforts to plug the cathode hole in the supply chain. One impediment has been a Treasury Department ruling that allows cathode sourced from allied countries to also qualify for the EV tax credit. That, she said, has pushed billions in business and investments to countries like South Korea instead of the United States. 

It remains unclear exactly how the new administration will impact the industry, but President Trump could certainly upend it. If Congress rolls back the IRA’s investment and production tax credits, it could significantly handicap America’s burgeoning recycling buildout. On the other hand, tariffs, particularly aimed at China, could tip the economic scales toward American producers and recyclers by making imported batteries and their components more expensive.

Redwood, for one, is optimistic that its goal of onshoring both battery recycling and cathode production aligns with Trump’s goals of putting “America first.” Straubel has said that the Trump administration could do a lot to encourage a more robust domestic supply chain, including making the battery origin requirements of the EV tax credit more stringent — rather than scrapping the incentive entirely. 

Getting the policy wrong, the company argues, will put the U.S. at the mercy of others in a future where battery recycling will only become more critical. 

Blanca Begert contributed reporting to this story.

Read the full mining issue

This story was originally published by Grist with the headline Mining is an environmental and human rights nightmare. Battery recycling can ease that. on Mar 26, 2025.


This content originally appeared on Grist and was authored by Tik Root.

]]>
https://grist.org/energy/mining-is-an-environmental-and-human-rights-nightmare-battery-recycling-can-ease-that/feed/ 0 521576
Why Biden and Trump both support this federal mineral mapping project https://grist.org/energy/critical-minerals-mapping-trump-biden-earth-mri-usgs/ https://grist.org/energy/critical-minerals-mapping-trump-biden-earth-mri-usgs/#respond Wed, 26 Mar 2025 08:40:00 +0000 https://grist.org/?p=660301 Scattered across the United States, hundreds of thousands of abandoned mines scar the earth, posing a safety hazard to passing hikers and a health risk to nearby communities. But cached inside piles of refuse and ponds of toxic waste, there are also elements as critical for the 21st-century economy as coal was for the industrial revolution. Now, an obscure federal government program known as the Earth Mapping Resources Initiative, or Earth MRI, is identifying the high-tech minerals concealed in these mines — as well as those hidden beneath the Earth’s surface.

Developed by the U.S. Geological Survey, or USGS, during the first Trump administration, Earth MRI aims to comprehensively map the nation’s underground deposits of “critical minerals” — an ever-growing list of elements and compounds considered vital for national security and the economy. In 2021, Earth MRI received a massive funding boost through the bipartisan infrastructure law, accelerating federal scientists’ efforts to figure out which parts of the country are rich in minerals used in clean energy technologies, semiconductors, and high-tech weaponry. While the Trump administration has moved aggressively to reverse most of former President Joe Biden’s climate policies, it appears to agree with the prior administration’s desire to locate — and, eventually, mine — more of these resources. 

Many Biden-era climate and energy initiatives remain in limbo following the Trump administration’s freeze on the disbursement of grant funding and mass firing of federal employees — but Earth MRI got an early greenlight to resume operations.

“This is a program that has survived both the Trump and Biden administrations,” Peter Cook, a critical minerals policy expert at The Breakthrough Institute, an environmental solutions research organization, told Grist. “They’re both definitely interested in critical minerals.” 

A screenshot of Earth MRI's acquisition viewer with a color-coded map of minerals next to a menu
An Earth MRI map showing data collected by the program.
USGS

Minerals like lithium, graphite, and the group of 17 metallic elements known as rare earths are essential for a wide range of technologies, including those at the heart of the clean energy transition. The lithium-ion batteries that store renewable energy and power EVs can contain lithium, graphite, nickel, cobalt, manganese, and more. Electric vehicle motors and some wind turbine generators contain magnets that require the rare earth element neodymium, and often smaller amounts of dysprosium and terbium. Certain solar panels require gallium, germanium, indium, and tellurium. The clean energy sector’s appetite for these metals is expected to surge as the energy transition accelerates: A recent report by The Breakthrough Institute found that EVs alone may account for two-thirds of future national demand of many key minerals. At the same time, critical minerals are vital for high-tech military technologies, advanced semiconductors, and more. 

Despite these diverse needs, U.S. output of many minerals is limited. A 2020 report by the Commerce Department found that of an initial list of 35 critical minerals, America’s supply of 31 of them came mostly or entirely from foreign sources. Production of many critical minerals is dominated by China, which is engaged in a trade war with the United States that has involved tariffs and export restrictions on several metals. For some particularly scarce metals like gallium, used in advanced semiconductors, the U.S. has no domestic production at all. 

While Biden saw domestic mineral supply chains as a key pillar of a U.S. clean energy manufacturing economy, Donald Trump’s interest in critical minerals appears more related to their military uses and national security implications. That interest can be seen in everything from a foreign policy focused on mining deals to a domestic agenda that includes cutting bureaucratic red tape to fuel additional mineral extraction. While Earth MRI hasn’t garnered the same level of attention as, say, Trump’s desire to buy Greenland for its rare earth resources or bargain with Ukraine for its minerals in exchange for military aid, the existence of the program reflects a long-standing focus on shoring up U.S. mineral supplies.

The USGS established Earth MRI in 2019, following a Trump executive order that called on federal agencies to address vulnerabilities in the nation’s critical mineral supply chains. Initially, the program had a modest annual budget of about $11 million, which USGS scientists, in partnership with state geological surveys around the country, used to launch a national critical minerals mapping campaign that included a mix of airborne surveys and on-the-ground fieldwork. But the bipartisan infrastructure law, or BIL, allowed Earth MRI to kick into overdrive, with a $320 million funding boost spread over five years. In 2022, the program’s yearly budget jumped to $75 million, a level at which it will remain through 2026. 

“We’re transforming the data landscape, and we’re transforming it in a big and consistent way through the sustained funding,” Earth MRI science coordinator Jamey Jones told Grist in an interview.

Earth MRI’s recent list of achievements is impressive. 

When the BIL passed into law in late 2021, scientists had collected high-quality geophysical data across only about 10 percent of the United States; by late 2024, that figure had jumped to nearly 25 percent. In the past two years alone, Jones said, Earth MRI scientists have conducted airborne magnetic surveys — which measure variations in Earth’s magnetic field to detect different subsurface rock types and identify features like faults — across an area twice the size of Montana. Late last year, Earth MRI and NASA completed the world’s largest high-quality hyperspectral survey over California, Nevada, and Arizona. Hyperspectral surveys, which measure reflected sunlight outside the range of human vision, can be used in arid regions to produce detailed mineral maps of the Earth’s surface. This year and next, NASA and Earth MRI will expand the survey to include parts of Texas, New Mexico, Utah, Wyoming, and Oregon.

In addition to mapping minerals still in the ground, Earth MRI is taking a closer look at ones that have already been extracted. In 2023, the program’s scientists accelerated their efforts to explore the critical mineral content of mine waste located in tailings ponds and rock piles around the country. Mine waste is considered a potentially valuable source of many important metals and minerals, but they have never been systematically studied. Thanks to BIL funding, Jones says that the USGS recently completed the first-ever comprehensive national inventory of abandoned mine lands, which it anticipates publishing later this year. In partnership with state geological surveys, Earth MRI is now in the process of dispatching researchers to abandoned mine sites to collect samples of waste rock that can be analyzed in the lab to assess their critical mineral content. “Eventually, we hope to produce a national assessment of critical mineral resources in mine waste,” Jones said.

Photo of helicopter with geophysical equipment loop deployed below it via slingload. Technician for scale.
A helicopter carries an airborne electromagnetic induction sensor over parts of northeastern Wisconsin for a USGS study in January 2021.
USGS / Wisconsin Dept. of Agricultural, Trade, and Consumer Protection; Wisconsin Dept. of Natural Resources / Wisconsin Geological and Natural History Survey

The data Earth MRI is collecting does not indicate which exact spots in the ground are the most attractive to mine. Rather, it supplies just enough information “to attract the private sector into an area” to conduct more detailed exploratory work, said Simon Jowitt, who directs the Nevada Bureau of Mines and Geology and is Earth MRI’s primary point of contact for the state. The effort involved in collecting this preliminary, or “pre-competitive,” data often has an outsized economic benefit, Jowitt says. Research in other countries shows that for every dollar governments spend on it, tens to hundreds of dollars are returned to the economy through private investment in exploration and mining.

“If we want to have more mineral exploration, more secure domestic supply chains of metals and minerals, then we need to have these data,” Jowitt added.

Mining proposals often attract intense public opposition, due to fears about damage to ecosystems and water supplies. But both Trump and Biden — as well as members of Congress on both sides of the aisle — appear to support more of it. While it’s still too early to say how much of an impact Earth MRI will have on domestic mining — it often takes a decade or more to permit or build a mine even after all the exploratory work is complete — there are signs that private industry is taking a keen interest in its data. For instance, Jones said an exploration company in Nevada told the agency that it has discovered new lithium deposits based on geochemical data Earth MRI released.

Even as Trump has sought to kneecap other federal agencies and projects, funding for Earth MRI never appeared to be in serious jeopardy. On his first day in office, Trump signed an executive order that called for “terminating the Green New Deal” by pausing the disbursement of all funds appropriated through the BIL and the 2022 Inflation Reduction Act — a move that multiple judges have found to be illegal. But the same order directed the interior secretary to “prioritize efforts to accelerate the ongoing, detailed geologic mapping of the United States, with a focus on locating previously unknown deposits of critical minerals.” 

“I think it was pretty quickly recognized that the priorities [of the order] would outweigh the freeze,” Jones said. After a four-week pause, the Trump administration restored Earth MRI’s funding on February 18. And this month, Trump issued another executive order calling for agency heads to identify “as many sites as possible” on federal land that may be suitable for critical minerals mining and invoking the Defense Production Act to accelerate mineral development.

Lithium boron is found buried in the soils beneath Esmeralda County, Nevada.
Slabs of lithium boron found beneath Esmeralda County, Nevada. Godofredo A. Vasquez/Houston Chronicle via Getty Images

While the mapping program is moving full steam ahead for now, it remains to be seen what will become of it once BIL funding sunsets after 2026. Barring an additional infusion of cash from Congress, Jones says the most likely scenario is that the program’s budget will return to its pre-2022 baseline of about $11 million a year — a roughly 75 percent cut.

Jowitt, the Nevada state geologist, says he’d “like to be optimistic” that Congress will authorize additional funds for Earth MRI so that scientists can continue to fill in the gaps in the nation’s geologic maps. But considering the Trump administration’s recent efforts to dramatically shrink federal spending, he isn’t sure what will happen.

One thing is clear: There will be more work left to do after the BIL coffers are emptied. By 2027, “we can tell you exactly how much [geological data] coverage will have increased in the country for all of our different techniques,” Jones said. “And none of those numbers add up to 100 percent. Our job will not be complete.”

Read the full mining issue

This story was originally published by Grist with the headline Why Biden and Trump both support this federal mineral mapping project on Mar 26, 2025.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/energy/critical-minerals-mapping-trump-biden-earth-mri-usgs/feed/ 0 521578
A “Goofy” DJ’s Secret Life at the Center of an Online Terrorism Network https://www.radiofree.org/2025/03/25/a-goofy-djs-secret-life-at-the-center-of-an-online-terrorism-network/ https://www.radiofree.org/2025/03/25/a-goofy-djs-secret-life-at-the-center-of-an-online-terrorism-network/#respond Tue, 25 Mar 2025 09:00:00 +0000 https://www.propublica.org/article/matthew-allison-dj-terrogram-collective-boise-dallas-humber by James Bandler, ProPublica, A.C. Thompson, ProPublica and FRONTLINE, and Max Maldonado, FRONTLINE

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Early last year, Matthew Allison could be found at the Space Banana dance club, awkwardly swaying to his own beat. Clutching the cheapest house beer, he’d greet people with a bear hug, a broad grin and his familiar, “Yo, bro!” salutations.

Allison, then a 37-year-old convenience store worker and Saturday-night DJ, seemed to like everyone he met in Boise, Idaho’s small electronic dance music scene. And most people seemed to like him back.

He was so gentle, former friends remember, that for a time he eschewed honey so as not to cause harm to bees.

He was “a little goofy,” a former friend, Tyler Whitt, recalled. “But bro goofy.”

But that lovable persona hid a more sinister core. When he was behind his computer screen, Allison used the handle BTC, short for BanThisChannel, he told ProPublica and FRONTLINE. On the social media and messaging platform Telegram, authorities say, Allison was a key figure in a network of white supremacist and neo-Nazi chat groups and channels known as Terrorgram.

There, Allison held court, promoting himself as “the most infamous and prolific propagandist of our time.”

Hyperbole aside, BTC was infamous. Extremism researchers in the U.S. and in Europe studied his posts but did not know who he was. Leftist activists sought to expose him. And law enforcement authorities tried to identify and jail him.

Last September, he was finally arrested.

Prosecutors allege that Allison was one of the leaders in the Terrorgram Collective, a secretive group that produced propaganda and instructions for terrorists, and disseminated that information through the Terrorgram ecosystem.

They say Allison used the Telegram platform to solicit “attacks on government infrastructure, such as government buildings and energy facilities,” to encourage the assassination of “‘high-value targets’ — like politicians and government officials” with a “hit list,” and to help produce and distribute a Terrorgram Collective publication that featured instructions for making “Napalm, thermite, chlorine gas, pipe bombs, and dirty bombs.”

About This Partnership

This story is part of a collaborative investigation from ProPublica and FRONTLINE that includes an upcoming documentary, “The Rise and Fall of Terrorgram,” which premieres March 25 at 10 p.m. EDT/9 p.m. CDT on PBS stations (check local listings) and will be available to stream on YouTube, the PBS App and FRONTLINE’s website.

Authorities also contend in court filings that Allison had fantasies about committing gruesome violence and sexual assault, and that he may have been planning to act on them.

Allison has pleaded not guilty.

For about five years, the Terrorgram network operated largely unchallenged on Telegram, which has nearly one billion users. The Dubai-based company did little to prevent influencers like Allison from circulating their propaganda and encouraging isolated young men to kill, a ProPublica and FRONTLINE investigation found.

The news organizations obtained a trove of now-deleted Telegram chats and channel logs and used them to trace Allison’s activity and influence in the Terrorgram network.

Telegram has declined repeated requests to make its executives available for interviews but said in a statement, “When the Terrorgram name first surfaced years ago, we began removing groups and channels that used variations on the Terrorgram name. Calls for violence from any group are not tolerated on our platform.”

In the annals of white supremacist content online, Allison’s work stood out. “It was some of the most inflammatory propaganda that I had seen,” said Jennefer Harper, a researcher who has amassed a large archive of neo-Nazi materials from Telegram. Allison was also prolific. “This propaganda was being posted 24/7! The account wasn’t taking a break, it was like, ‘Don’t you have anything else to do in your life?’”

He specialized in what he called documentaries, and over more than five years, he said, he made and posted around 120 videos. There were images of riots, burning cities and Black people brutalizing white people. There was GoPro footage of massacres filmed by white killers as they murdered people of color.

Allison and the other Terrorgram leaders found a receptive audience for their propaganda. Some of their fans got off their phones and took action: scoping out high-profile targets and even killing people. ProPublica and FRONTLINE used the chat logs, court records and other sources to connect 35 criminal cases to the Terrorgram network. Each case involved an individual who posted in Terrorgram chats, followed Terrorgram accounts or was a member of an organized group whose leaders participated in the Terrorgram community.

Prosecutors have linked Allison and his co-defendant, Dallas Humber, to a trio of mass shootings that killed a total of six people and wounded a dozen others, and to a stabbing incident that injured five, according to the indictment and a subsequent brief.

In early 2024, Allison’s work caught the attention of a young man from New Jersey named Andrew Takhistov.

Takhistov was in a Terrorgram group chat in which someone had posted several Allison videos, including a 51-second clip showing how to disable overhead electrical lines, according to court records. In another post, Takhistov indicated that he’d seen one of Allison’s most infamous propaganda videos.

By that summer, Takhistov, then 18, was planning his own infrastructure attacks, scheming to disable two electrical substations in New Jersey using the technique featured in Allison’s video, according to prosecutors. In court records, they say Takhistov was a fan of one of the Terrorgram Collective’s terrorism how-to guides, which Allison allegedly helped produce.

On Sept. 9, 2024, the Biden administration’s Justice Department announced the arrests and indictments of Allison and Humber, his alleged co-conspirator.

“Today’s arrests are a warning that committing hate-fueled crimes in the darkest corners of the internet will not hide you, and soliciting terrorist attacks from behind a screen will not protect you,” declared then-Attorney General Merrick Garland in a statement. “The United States Department of Justice will find you, and we will hold you accountable.”

Allison and Humber were each charged with 15 felony counts, including soliciting hate crimes, soliciting the murder of federal officials and conspiring to provide material support to terrorists.

Arrested in Boise, Allison was extradited to California, where Humber is also facing trial. They both pleaded not guilty.

Humber, visited in jail by a ProPublica and FRONTLINE reporter, said she would not talk to journalists. Her lawyer declined to comment.

Allison, against the advice of his own lawyer, granted two interviews. Looking pale and gaunt and dressed in jailhouse orange, Allison proudly acknowledged being BTC but denied he was a terrorist or that he had incited others to violence.

He called the indictment “bullshit,” claimed to be a video “artist” and indicated that he intended to fight the case on First Amendment grounds.

Allison said the alleged hit list of targets for assassination was merely a doxing list, a response to efforts by anti-fascist groups “to dox me” and anyone who claimed “to be pro-white.” He insisted he didn’t hate anyone.

His lawyers, in a bail motion, said the indictment was misleading. They argued that there was no evidence that Allison was a leader of a transnational terrorist organization. He was, they wrote, just a participant in chats that “‘are mostly a chaotic mix of hyperbole and posts without any recognized leader.”

Matthew Allison DJed in Boise, Idaho, before being arrested and charged with supporting terrorism. (Excerpt from “The Rise and Fall of Terrorgram”)

Watch video ➜

After Allison’s arrest, an FBI agent made his way to rural Perry, Missouri, to see Matthew’s father, John Allison, who lives in the basement of a rambling and drafty decommissioned church he’s renovating.

“Matthew was a perfect child,” John Allison remembers saying before closing the door on the agent. The father said the agent seemed interested only in incriminating information, so he refused to cooperate.

The first of four children, Matthew had sandy blond hair and blue eyes. Early on, he showed musical promise. Like Mozart in the movie “Amadeus,” John Allison recalls, Matthew could play the piano upside down.

The boy wasn’t raised to hate, his father told ProPublica and FRONTLINE in an interview.

But from the time he was 10 years old, the younger Allison took an interest in gruesome violence, prosecutors say. Matthew’s brother told federal agents that the boy enjoyed watching “graphic violent material,” including videos and images of “beheadings,” according to a prosecution brief. His legal team declined to comment on the allegation.

After high school in Perris, California, Matthew got an offer to attend a local college. He decided instead to follow his best friend to Idaho.

Allison’s lawyers said in a court filing that he spent 17 of the last 19 years in Boise, a relatively liberal city in a state that has become a haven for antigovernment and white supremacist activists.

He worked a variety of low-wage service jobs and did a lot of couch surfing, his friends say.

In 2013, Allison got a job working the night shift at a downtown coffee shop and bakery. His boss and co-worker remember him as quiet, polite and professional. He was in a long-term romance with a male co-worker and seemed very much in love.

“I always thought it was a very cohesive relationship,” said Tyler Armstrong, who worked at the bakery with both men. “They were together all the time. We’d all get together, smoke weed and just hang out.”

In Boise’s electronic dance music scene, Allison found a welcoming, inclusive community. He hosted parties where he would DJ, playing progressive house music.

He lived in a Spartan apartment. He didn’t have a car, or even a driver’s license. He told friends he wanted to stay under the radar.

Over the years, he lived in several upscale buildings, including The Fowler, a midrise that boasts a well-appointed fitness center and stunning views of the downtown.

While some acquaintances wondered how he afforded the rent on low-wage service jobs, four friends say that Allison had an illicit side hustle. As Tyler Whitt, one of his friends, put it, “He was an excellent plug” — a drug dealer.

Allison sold cocaine packaged in signature blue-tinted vials, according to Whitt and three other people who purchased drugs from him. Allison denied that he sold cocaine in an interview with FRONTLINE and ProPublica, and he has not been charged with any drug-related offenses.

In 2018, unbeknownst to his dance party friends, Allison was trying to break through on social media as an anonymous conservative influencer.

His early videos on YouTube under the Ban This Channel handle served up standard conservative fare. He peppered the videos with Tucker Carlson clips and used titles such as “The Russian Collusion Lie” and “Lies About Trump Exposed.” Most of the videos landed without notice.

Allison kept cranking out videos. They got more racist, homophobic and antisemitic. Eventually, after he posted the Nazi Party anthem, YouTube banished him from the platform.

His tilt to extremism came amid trouble in his personal life. Allison and his long-term boyfriend broke up, leaving him angry and depressed, according to Armstrong. And his younger brother in Nevada was imprisoned on drug charges, court records show.

In 2020, Allison abruptly left Idaho. He quit his job as a laborer for a flooring company, citing a family emergency. For a time, he lived in Nevada, taking care of his brother’s children.

Allison also lived with his father and stepmother in Utah for nearly six months, but he spent most of the time holed up in his room on his computer, his father said.

“That was a hard day,” Matthew Allison said after one 10-plus-hour session. His father stared at him, baffled.

Allison asked his father to help him start a website to host his content, which included videos he’d made from old Nazi propaganda footage, John Allison said.

“No, I’m not going to be a party to that,” he said he told his son.

Allison soon found another home for his content: Telegram.

Pete Simi, a sociology professor at Chapman University in Orange, California, has spent much of his career studying violent extremist groups and has closely tracked their migrations to Telegram.

It was sometime in 2021, during the pandemic, when Simi first became aware of BTC.

Simi had just been admitted to a private Telegram chat group.

The administrator of the chat hadn’t been willing to let Simi join until he provided proof of his whiteness. He’d thought his middle-aged skin might raise suspicion, so he’d shared a photo of his adult son’s forearm.

As soon as he entered the chat, someone shared a six-minute video called “Last Battle.” Simi downloaded a copy.

Simi had studied a lot of neo-Nazi propaganda — some of it crude and ineffective. But this video stood out, though the overall message was familiar: It told the story of a nation being destroyed by drag queens, immigrant invaders, Black criminals, interracial marriage and a “Jewish communist takeover.”

What was compelling about this video, Simi thought, was the way it blended violent imagery, ominous music and storytelling to impart a sense of fear and white victimhood. The only salvation, the video suggested, was for heterosexual white people to stand together and arm themselves.

“VOTING WILL NOT REMOVE THEM,” reads text on the screen. “THEY WANT YOU DEAD.”

“I would say ‘Last Battle’ would be one of the more effective videos I’ve seen,” Simi said.

Simi started teaching the video in class as an example of propaganda that would be compelling to many alienated young men.

Allison, as BTC, became a Terrorgram Collective leader in 2022 after a previous leader was arrested, according to prosecutors.

He allegedly distributed lengthy digital how-to guides for making explosives and attacking critical infrastructure, as well as audiobooks of murderers’ manifestos. Prosecutors say he helped create a hit list of perceived enemies — politicians, executives and academics — presented as red-and-black trading cards with assault weapon logos, which included headshots, addresses and photos of the targets’ homes.

One of his major contributions was the 24-minute movie “White Terror,” which he told ProPublica and FRONTLINE that he edited. It was an homage to 105 white men and women who committed acts of terrorism. Humber narrates the script in a remorseless monotone, describing the victims with slurs and praising the terrorists as “saints,” an honorific the Terrorgram influencers bestowed upon white supremacist murderers.

As Allison’s content became more extreme, Telegram started to take down his channels. Each time, the channel just popped back up with a slightly modified name. In December 2021, he bragged in a post that 50 of the channels he had started had been banned by Telegram.

Using data from the social media analysis platform Open Measures and other sources, ProPublica and FRONTLINE identified more than 20 channels in the Terrorgram ecosystem that were run by Allison.

The channels were “widely shared and promoted by other members of the Terrorgram scene,” said Pierre Vaux, a London-based researcher who has studied Terrorgram extensively. Vaux said that Allison also belonged to 120 chat groups and posted in them prolifically. “He’s a superspreader,” said Vaux.

In October 2022, a Slovakian teen who had spent years being indoctrinated on Telegram opened fire on an LGBTQ+ bar in the city of Bratislava, killing two people and wounding a third.

The shooter had been in direct contact with Terrorgram influencers, and according to U.S. prosecutors, sent his manifesto to Allison before the attack.

Another Telegram account Allison ran called BowlTurdsCoinInvesting shared the manifesto. In posts, Allison referred to the victims using a slur for gay people and called the manifesto “fucking amazing.”

Telegram shut the channel down.

But Allison quickly resurfaced — this time as BigTittyChica. He reposted an audiobook version of the Bratislava shooter’s manifesto.

Around this time, Humber sent Allison more news that she found encouraging. She had been communicating with a Terrorgram fan who was contemplating a school shooting targeting people of color, prosecutors said in court filings. About a month later, the user acted, killing four and wounding 11 at an elementary and middle school in Aracruz, Brazil.

Terrorgram consecrated another saint.

Allison’s legal team has suggested that the government may have misinterpreted the communications between Allison and the Slovakian killer. The evidence, they said, did “not show direct messages between Mr. Allison and the shooter but rather are messages that the shooter sent to Telegram group chats that were later forwarded between Mr. Allison’s purported two phones.”

Sociology professor Pete Simi and ProPublica reporter James Bandler watch Allison’s propaganda videos. (Excerpt from “The Rise and Fall of Terrorgram”)

Watch video ➜

While the real world and online lives of Allison might seem irreconcilable — a gay man who allegedly led a neo-Nazi terror group and advocated the murder of gays and lesbians — Simi, the Chapman University professor, has seen such cases before. It illustrates, he said, “the propensity that all of us have for leading contradictory lives. We have a great capacity for compartmentalizing as humans.”

Simi once interviewed a gay man who was also a member of Hammerskin Nation, a violent, hypermasculine Nazi skinhead gang whose members despise LGBTQ+ people. Ultimately, the cognitive dissonance became too great and the man quit the white supremacist movement.

There are other more recent examples. Taylor Ashley Parker-Dipeppe concealed his transgender identity from fellow members of the neo-Nazi Atomwaffen Division, a violently homophobic group. His gender identity was revealed in court after he pleaded guilty in 2021 to conspiracy and stalking charges related to threats against journalists and activists.

Allison’s friends had no inkling that the man they partied with was celebrating the murder of gay people on Telegram. But one friend, Tyler Armstrong, recalled a troubling moment in 2020. He stumbled on a Snapchat post in which Allison repeated a white supremacist meme about high crime rates in the Black community.

When Armstrong asked how Allison, as a gay man, could demonize another vulnerable population, Allison replied, “Don’t get me started on the LGBTQ” community, according to Armstrong. Allison denied the exchange to FRONTLINE and ProPublica.

“Sup bro. do house parties exist anymore?”

It was February 2024, and Allison was texting a friend, trying to score DJ gigs. He’d been working a ton lately at a convenience store job he hated and only partying Saturday nights. “Anyone else tapped in to the scene who would know what’s up?” he asked. “I’m killing it djing and got all the gear.”

Meanwhile on Telegram, Allison was putting the final touches on a movie trilogy, which he said documented “one man’s process of radicalization every step of the way.”

In July, Allison filled out an online application for a part-time job at a popular downtown Boise breakfast spot just a short bike ride from his apartment.

“Hi there, my name’s Matt. I have relevant job experience in baking, making New York style bagels from scratch,” he wrote. “I’m a friendly, clean cut, sociable, reliable, and highly organized hard worker.”

He was hired and began working immediately.

That same month, federal agents arrested Takhistov, the New Jersey man who had watched Allison’s videos and read the Terrorgram Collective manual.

Prosecutors say Takhistov was working with another extremist to disable electrical power stations. What he didn’t know was that his co-conspirator was an undercover investigator. Takhistov was charged with soliciting another individual to destroy energy facilities. In building their case, investigators obtained his chat history, including more than 2,500 files.

Court records do not make it clear whether Takhistov has entered a plea. His attorney declined to comment.

The feds were getting closer. But if Allison was worried about the arrest of this young Terrorgram fan, he didn’t let on at work.

Over the next weeks at his new job, Allison was polite, professional and friendly. He told his father it was the best job he’d ever had.

On Friday, Sept. 6, armed federal agents confronted Allison as he prepared to bike to work.

He did not resist. And for two hours he spoke to investigators, waiving access to a lawyer. Allison admitted to making artwork for one Terrorgram production and to participating in a large number of Telegram channels with white supremacists, according to court records. He explained that he was just sharing “propaganda” and “documenting” his “understanding of the world.”

He repeatedly demanded: “What part of any of this was illegal?”

But investigators found more reasons for concern. In his backpack, agents found zip ties, duct tape, ammunition, a firearm, a knife, lockpicking equipment, two phones and a thumbdrive, court documents say.

In his apartment, they discovered an assault rifle, two laptops and a “go bag” with $1,500 cash, a black balaclava and the kind of skull mask favored by members of Atomwaffen Division, court records show.

Federal authorities also searched his storage unit, where they found disturbing handwritten letters titled “Commit Homicide” and “Post-Mortem Disembowelment” that contained graphic fantasies about murdering a baby and her mother, followed by the post-mortem rape and dissection of the woman’s body, according to the court filings. Prosecutors do not allege that he committed these crimes.

At a detention hearing, Allison’s defense claimed the writings were old song lyrics from his high school death metal band, Putrid Flesh.

In a motion for bail, Allison’s lawyers argued that he was not a threat to anyone and that his speech was protected under the First Amendment.

The judge denied Allison bail.

Late last year in Boise, the two Tylers who partied with Allison — Tyler Whitt and Tyler Armstrong — sat down to process the confounding double life of their former friend.

But first they watched “White Terror,” the BTC production that coldly celebrates terrorist killers with a mix of gruesome violence and dehumanizing language. Both men said the video left them in shock.

“That’s somebody who spent a lot of time thinking and giving in to all this hate in his heart,” Armstrong said. “And I’m like, Where does that come from?”

Whitt, who is gay, said he was still struggling to understand. “That’s got to be a totally broken person,” he said. “It was like hating everybody else is more important than loving one part of himself.”

But Whitt said he had no sympathy for his former friend and hopes Allison will spend the rest of his life in prison.

“I’m glad they got him.”

Tom Jennings, Annie Wong and Karina Meier of FRONTLINE contributed reporting.


This content originally appeared on ProPublica and was authored by .

]]>
https://www.radiofree.org/2025/03/25/a-goofy-djs-secret-life-at-the-center-of-an-online-terrorism-network/feed/ 0 521321
“The Rise and Fall of Terrorgram,” a Documentary from ProPublica and FRONTLINE, Investigates a Global Online Terror Network https://www.radiofree.org/2025/03/25/the-rise-and-fall-of-terrorgram-a-documentary-from-propublica-and-frontline-investigates-a-global-online-terror-network/ https://www.radiofree.org/2025/03/25/the-rise-and-fall-of-terrorgram-a-documentary-from-propublica-and-frontline-investigates-a-global-online-terror-network/#respond Tue, 25 Mar 2025 08:55:00 +0000 https://www.propublica.org/article/rise-fall-terrorgram-frontline-propublica-telegram-online-white-nationalists by ProPublica and PBS's Frontline

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

This story is part of a collaborative investigation from ProPublica and FRONTLINE that includes an upcoming documentary, “The Rise and Fall of Terrorgram,” which premieres March 25 at 10 p.m. EDT/9 p.m. CDT on PBS stations (check local listings) and will be available to stream on YouTube, the PBS App and FRONTLINE’s website.

A new investigative collaboration from FRONTLINE and ProPublica explores a transnational online network of extremists accused of inciting acts of white supremacist terrorism on the messaging platform Telegram. They called themselves Terrorgram — and called their leadership the Terrorgram Collective.

From an award-winning team led by reporters A.C. Thompson and James Bandler and acclaimed filmmakers Thomas Jennings and Annie Wong, “The Rise and Fall of Terrorgram” continues years of groundbreaking reporting on violent extremism and online radicalization from ProPublica and FRONTLINE.

“Drawing on a trove of archived posts, our reporting shows how Telegram and other lightly regulated platforms became a gathering place for ‘militant accelerationists’ — neo-Nazis who want to use terror and violence to bring down governments and create new, white ethnostates,” says Thompson, who has been reporting on the evolution of violent extremism in the U.S. for years and, with this project, expands his focus worldwide.

“These people on the messaging and social media app Telegram were trying to stir other people to commit acts of incredible violence and to spark a race war,” says Bandler. “What we’ve seen through the Terrorgram story is that there are consequences to unfettered free speech, to having influencers out there advocating violence or mass murder.”

Telegram said in a statement that it has always screened postings for problematic content and that “calls for violence from any group are not tolerated on our platform.”

“The Rise and Fall of Terrorgram,” part of a collaborative investigation from FRONTLINE and ProPublica, premieres March 25.

“The Rise and Fall of Terrorgram” also probes how authorities in several countries would eventually arrest around a dozen people allegedly tied to the Terrorgram Collective.

“Are these arrests the end of Terrorgram? You may have a collapse specifically of this particular network, but is that the end? Absolutely not,” sociologist Pete Simi says in the documentary. “There will be new Terrorgrams that take its place by another name, and we will continue to see this kind of extremism propagated through platforms of various sorts, not just Telegram.”

More than a year in the making, the 90-minute documentary is part of a multiplatform effort that also includes a series of stories from ProPublica.

“The Rise and Fall of Terrorgram,” premieres Tuesday, March 25 at 10 p.m. EDT/9 p.m. CDT on PBS stations (check local listings) and will be available to stream on YouTube, the PBS App and FRONTLINE’s website.


This content originally appeared on ProPublica and was authored by by ProPublica and PBS's Frontline.

]]>
https://www.radiofree.org/2025/03/25/the-rise-and-fall-of-terrorgram-a-documentary-from-propublica-and-frontline-investigates-a-global-online-terror-network/feed/ 0 521323
Creative Director and Producer Keith Arem on giving back to your community https://www.radiofree.org/2025/03/19/creative-director-and-producer-keith-arem-on-giving-back-to-your-community/ https://www.radiofree.org/2025/03/19/creative-director-and-producer-keith-arem-on-giving-back-to-your-community/#respond Wed, 19 Mar 2025 07:00:00 +0000 https://thecreativeindependent.com/people/creative-director-and-producer-keith-arem-on-giving-back-to-your-community You got your start as a recording artist, as a member of the industrial rock band Contagion. What’s your relationship with music like now and how does it influence your work currently?

Music has always been part of my life and it was something that I started at a very young age and I came out to California to follow my career in music, as well as writing and film. I signed with Capital coming right out of college and started touring and we were opening up with Nine Inch Nails and Frontline Assembly and all these big industrial bands, and Skinny Puppy remixed one of our songs. It was amazing because we went on tour and we’re doing North American tours with all these great musicians. And from city to city, we were playing video games at the back of the tour bus, mainly Street Fighter and these other games. Now, come full circle, 30 years later, I’m directing Street Fighter.

Music was the inroads for me to not only learn about the industry coming out of school, but also as a creator and as a storyteller. And tragically, about 12, 13 years ago, we had a fire here and it wiped out my whole music studio. It wiped out my equipment, all my synthesizers and samplers. We lost about a thousand music masters. Some of my albums were being re-released with Sony, who picked up our music catalog.

So I had to restart my career. And in the middle of that, I had started writing Frost Road, and Frost Road was actually going to be a story that I was going to develop as a motion picture. And I had been boarding out the movie with Trevor Goring and then started to paint some of the images with Christopher Shy because we had worked on some graphic novels together.

My career in music really forced me to evolve as a storyteller to then move into these other mediums. And that’s why I’m here today is that I’m still going back to my music and hoping to release a new album. And a lot of my music is still in heavy rotation around the world, but I’m hoping that I can use my love of music to better inform myself as a storyteller in film and television and obviously for my books that are coming up.

It’s almost like a Phoenix allegory: a bit of your previous creative life having to die, outside of your control, and then helping to fuel the fire, so to speak, of the next stages of your career. I have to ask about Street Fighter. Who did you main on Street Fighter? Who do you like to play?

I mean, for me, it was always Honda just because of the 100-hand slap—that was an age-old joke with us. When we were on tour, we had an incident where we were going across the Canadian border. They don’t really like musicians going back and forth over to Canada. They came on the bus at four in the morning and Michael, one of the guys in my band, was sleeping below us and they were asking us for our name and our country of origin and we were having to have our tour manager hand over our passports. Michael had no idea that this was a very upset customs agent that was boarding our bus and had already evicted the other band, Frontline Assembly. So the guy asked me my name and country of origin and I responded, and then he asked Michael, and Michael was sound asleep and had no idea what was going on.

So our tour manager, Lane, kicked him because he was on the bottom bunk. We were in these bunks of these tour buses, and he kicked him and Michael’s two arms suddenly came out. We’d been playing Street Fighter, like non-stop, and Honda was always the most insane because of his 100-hand slap. And suddenly these two arms came out from the curtains in the bunk on the bottom and he just starts letting loose 100-hand slap on the customs agent thinking it was one of us on the band. The agent, he was this older African American guy, and he looks down and crosses his arms and shakes his head… Lane knew we were about to be completely hauled off the jail because they really didn’t want us there, and he just shakes his head and walks off the bus.

You’ve worked across a large number of mediums and disciplines from video games to movies and now graphic novels. How do you handle the context switching between those mediums? What are some skills or learnings that you’ve had to grow over time and what are things that you’re still working on?

It’s been a journey to move between these different disciplines and integrate them into all the stories that we love. I think as a storyteller, you have to tell the right story for the right medium. Sometimes that’s a linear medium, like a movie or a television show where it’s a passive experience where the audience is watching and has a suspension of disbelief as they’re watching you. Whereas in a video game, it’s an interactive experience and the story and the context doesn’t progress unless the audience engages with it, which is very similar to a book. A graphic novel or a comic book is the same way. The story really doesn’t progress unless you turn the page and you follow the dialogue and the characters at your own pace.

I feel, as a storyteller, you really need to look at the characters and the world that you’re telling and what aspect works for the medium that you’re working on. So if you’re working in virtual reality, it’s a much different experience because you’re having to guide the audience through an experience and knowing where to look and where to experience. In a book, obviously, your focus is on your characters and the progression of the story and what part of the story works that way.

I think I’ve had the privilege to get to work in so many different mediums because I love telling stories from music to comics to film, and it’s a different experience. If I’m doing a viral campaign for a movie and I’m doing hidden footage with a scavenger hunt and an alternate reality game, that’s a much different experience than trying to do a combat battle chatter on Call of Duty. It’s a very collaborative industry and you’re working with other creators. So not only do you have to respect your own creative goals, but also how that integrates with what the other creators you’re working with and collaborating with have in mind, and also what the audience likes because a lot of these projects take years to develop. The technology and the platforms are changing so fast that you have to look ahead to what storytelling is going to be like in two years from now and how you do that.

With the advent of AI integrating as tools and other things that are challenging creators, both in a good and a bad way, it puts the onus on us to up our game to be better at our craft and understand how we can use these tools so they don’t overpower and take over our industry.

I want to touch on the idea of continuing to collaborate, because especially in graphic novels, you’re working with illustrators and letterers and colorists and movie people. There’s a whole production line of folks and things change rapidly. I’m sure, at some point, you’ve come in with an idea or been passionate about something and have had to change that or relinquish the idea altogether. Can you talk about any challenges liks this, or how you’ve adopted some of those changes in format or technology?

When I started, I didn’t rknow how to evolve from music and video games into film. Even though the game industry, from a financial standpoint, is more successful and more engaging in the sense of larger format and other things, I was really fascinated by not only working in motion pictures, but I had also grown up with comics and graphic novels. Arkham Asylum had been one of my favorite books—you had this hand-painted book, where every panel was painted. That and Heavy Metal and a lot of these things were early influences for me and so I envisioned that if I was going to work on my own projects, that everything had to be painted.

When I first started trying to write, I didn’t know what the first step was as a creator. I had a great story. I knew I was on the right path with the story, but I didn’t know how to tell it.

I had gone to San Diego Comic-Con after meeting with dozens of artists around and online, and I would start walking down Artist Alley and not only finding artwork that inspired me and was based on the images that I had in my head, but also meeting these artists and collaborating to see what it’s like to working with other people. It’s funny because the first artists I met are now some of the largest in the industry, and it was amazing because they were all in their early days of their career.

My first book was in three acts, and so I figured Meavy Metal style, I would work with three different artists and collaborate. I had three different styles in mind. One of the artists I met with was Christopher Shy. He had been doing stuff for White Wolf. He’d been doing some of their comics in the video games, but he had never done a graphic novel. His artwork was just stunning, though, and it looked exactly like what I had in my head. It was painted. It was dreamy. It had this painterly kind of feel. It had a lot of depth. The funny thing was that Christopher and I became instant friends and I realized that this is someone I could collaborate with. We were both, in a sense, generalists. Instead of just focusing on only one craft, we all loved storytelling on a variety of different mediums.

That was really the first experience for me collaborating with an artist who could do so many different things and explore how to tell a story this way. The lettering, the painting, the composition of the shots, the writing… collaborating on that became an interesting journey. I still worked and brought in other writers to help me, and other artists to help do finishing and other things, but it really came down to this core collaboration. It’s a challenge because you’re trying to tell a sequential story in either a comic or a graphic novel where you’re not only trying to explain the dialogue and the mood and the tone, but the composition has to really further that narrative.

The thing Christopher and both learned, I think, was that it was intriguing to be able to bring people in with the visuals, but then how do we hook people on the story and the world and the characters that we’re doing? One of the most beneficial and rewarding parts of this collaboration I’ve had with Christopher now for 20 years is that we’ve been able to tell these impactful stories and use his artwork as the medium to do that, but also to create characters in these worlds that will hopefully translate into games and film.

I want to talk more about the education you do. I know it’s a big part of the campaign that’s running and it’s also part of your overall approach to giving back to the creative community. You help others develop skills for technical acting and performance capture. What has teaching others taught you about yourself?

Looking back on my career, I think I’ve had the benefit, the privilege, and the honor to work with so many amazing, talented performers and other writers and creators. I feel that all of us are learning constantly. I’m learning.

I mean, this is my first real Kickstarter on my own after what I did with Wesley Snipes and Adam Lawson on Exiled. And this is a whole new learning process for me. I feel that all of us are at different stages of bettering ourselves and our careers.

Part of my personal belief is that it’s important to share the knowledge we gain and the networking and the mentorship and to give it back to other creators. I’m not saying that I have the only way or the best way to do things. In fact, I’ve probably made more mistakes than I can imagine. But I feel that you need to make mistakes to learn. And, I mean, just because someone tells you something, it doesn’t always apply to your life in a way that you might be able to find usable or relatable, but I do like to experience things for myself with the guidance of someone who’s been through it.

Even on this campaign, Jimmy Palmiotti, who’s an amazing writer and a creator who’s had many successful campaigns, mentored me on the Kickstarter community and how to do things in a way that we’re giving back to other creators. And Chris Yates who’s now part of our team here, we’ve collaborated on a lot of ideas of saying, “How do we share all the knowledge that we’ve been accumulating to pull together these successful projects and campaigns and share that back with the community?” For this one in particular, we felt that since it’s a new intellectual property and many people might not be familiar with it, just making a poster or a t-shirt or a statue or something else is nice, but that we have other things we can give back to the community in a bigger way.

Some of the things that we haven’t announced yet as part of the campaign are going to happen as we hit certain stretch goals. We’re actually going to be funding other creators on Kickstarter. We’re going to be working very closely with the community to identify campaigns we believe in and help not just mentor them, but also to contribute towards those campaigns.

One of the other things that we really want to do as industry professionals is share knowledge. Some of the reward tiers you’re going to see as part of this campaign might not be for fans, but more for creators who are looking to grow their careers. We’re going to have master classes and private panels and mentoring sessions and portfolio reviews and recorded panels and meet-and-greets and other opportunities, even at things like San Diego Comic Con where creators and fans get a chance to meet with us and talk with us and ask us questions. They might not normally have that opportunity, other than on social media or public events and that kind of thing.

We felt Kickstarter was an amazing platform to not only launch an IP like Frost Road, but then to also share behind the scenes about how we’re going to continue to do it. As Frost Road is successful, we’re hoping to do many more campaigns—I feel that Kickstarter, in particular as a platform, empowers creators to explore their own creative ideas and not have the pressure of funding. It’s really getting the feedback and the interaction with the audience.

There are examples of what we’ve done already with performance capture and teaching actors in the video game industry how to move into the game industry. We teach them about the business and the performance side and the technical side. I think a lot of creators are looking at things like: How do I get my own graphic novel or comic book off the ground? How do I take an idea that I want to make into a movie and where do I start? I think a lot of that is something we really see as an opportunity through Kickstarter to give back to that community in a variety of ways.

**It’s admirable to be able to use your own time and platform to be to create opportunities for other people. You don’t know who you’re going to meet or how you’ll influence somebody else’s work or life. **

You’ve worked on a large number of properties. Are there any white whales out there that you haven’t touched yet that you’re looking to your teeth into?

As a creator, you’re always inspired by other creators and other people. This campaign is going to be the start of some special things, not just in publishing and film and games. I really see that creators across the world are disenfranchised right now—distribution is fairly broken. I don’t mean just the gatekeepers of people that fund and allow people to do their work, but the way distribution itself works is getting archaic in a sense that the way we buy books, the way we get our television shows, the way we see films, the way we interact with content is through very few gatekeepers. The way that distribution works is not very favorable or equitable to creators.

I feel that it’s stacked against the creators to not only create the content, but then to understand the business and understand how to get their work see. And, even if they do do that, then to still participate and be sustainable. My white whale, as a creator, is to really start working on the platforms and the distribution that not only help give a voice to creators, but allow them to participate in the success of what they’re putting in, all the work and sweat equity and time that we put in that we’d love. It would be unfortunate for other people to profit off of that and not see the benefits of that.

I really feel that through my journey as a creator and experiencing things firsthand, that I’ve been able to identify the pain points that many creators like myself go through—the frustrations that we see, the other people that take credit and profit from our work. I feel that my work in the game industry and technology platforms and the projects that I’ve been working on over the past several years are putting me in a position where I can give back not just on the knowledge and the education, but also the technology and the ability to help develop platforms that would be more equitable for creators and allow them to participate both creatively and financially. That’s my big hope behind all of this.

I know that all sounds lofty and big and utopian, but it really is the truth. I think that’s why I keep coming back to Kickstarter. Kickstarter’s an amazing platform in itself, one that’s empowering creators to participate and put out their work and find their community. On a larger scale, ongoing distribution for whatever the medium might be is going to be the next evolution of that. I feel that Kickstarter is going to be a foundational part of what we’re going to do to help people launch their IP and then hopefully continue to find a way to participate in the fruits of their labor.

Keith Arem Recommends:

Keanu Reeve’s BZRKR comic from Boom! Studios.

The Dune trilogy from Denis Villeneuve.

Alien: Romulus and Alien: Earth on Hulu.

Street Fighter series and the hundred hand slap.

Yuri Lowenthal and Tara Platt’s graphic novel Topsy McGee and the Scarab of Solomon


This content originally appeared on The Creative Independent and was authored by Sam Kusek.

]]>
https://www.radiofree.org/2025/03/19/creative-director-and-producer-keith-arem-on-giving-back-to-your-community/feed/ 0 520022
Shared Ethnonationalism and Militarized Technology Bond India and Israel https://www.radiofree.org/2025/03/17/shared-ethnonationalism-and-militarized-technology-bond-india-and-israel/ https://www.radiofree.org/2025/03/17/shared-ethnonationalism-and-militarized-technology-bond-india-and-israel/#respond Mon, 17 Mar 2025 17:50:36 +0000 https://www.projectcensored.org/?p=45992 Since 2020, India’s right-wing Hindu nationalist ruling party, the Bharatiya Janata Party (BJP), has been strategically displacing Muslims across the country, including in Assam, where Bengali Muslims, who constitute a small minority of the northeastern state’s multi-ethnic population, are subject to evictions and the stripping of their citizenship under baseless…

The post Shared Ethnonationalism and Militarized Technology Bond India and Israel appeared first on Project Censored.


This content originally appeared on Project Censored and was authored by Kate Horgan.

]]>
https://www.radiofree.org/2025/03/17/shared-ethnonationalism-and-militarized-technology-bond-india-and-israel/feed/ 0 519581
Addiction https://www.radiofree.org/2025/03/17/addiction/ https://www.radiofree.org/2025/03/17/addiction/#respond Mon, 17 Mar 2025 14:37:11 +0000 https://dissidentvoice.org/?p=156668

The post Addiction first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2025/03/17/addiction/feed/ 0 519559
The Rise and Fall of Terrorgram: Inside a Global Online Hate Network https://www.radiofree.org/2025/03/15/the-rise-and-fall-of-terrorgram-inside-a-global-online-hate-network/ https://www.radiofree.org/2025/03/15/the-rise-and-fall-of-terrorgram-inside-a-global-online-hate-network/#respond Sat, 15 Mar 2025 09:00:00 +0000 https://www.propublica.org/article/rise-and-fall-terrorgram-inside-global-online-hate-network-frontline-telegram by A.C. Thompson, ProPublica and FRONTLINE, and James Bandler, ProPublica

This story contains references to homophobia, antisemitism and racism, as well as mass shootings and other violence.

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

On Jan. 19, 2024, the sheriff of Jacksonville, Florida, released a 27-page manifesto left behind by Ryan Palmeter, a 21-year old white man who had murdered three Black people at a Dollar General store before turning the gun on himself.

The Florida Times-Union, a prominent local news outlet, said it would not be publishing the document, which it said used the N-word 183 times and had an “overall theme of white superiority.” T.K. Waters, the sheriff, said he had posted what he described as the “rantings of an isolated, hateful, madman” to keep his promise of public transparency. An attorney for one of the victims’ families urged the public “to not give Palmeter the satisfaction of publishing or distributing his manifesto,” saying it “contains not one redeemable thought.”

Dallas Humber (Illustration for ProPublica)

Thousands of miles away, in Elk Grove, California, Dallas Humber saw Palmeter’s view of the world as perfect for her audience of online neo-Nazis. Humber, a now-35-year-old woman with a penchant for dyeing her hair neon colors, was a leading voice in an online network of white supremacists who had coalesced in a dark corner of Telegram, a social media and messaging service with almost a billion users worldwide.

She and her comrades called this constellation of interlocking Telegram accounts Terrorgram. Their shared goal was to topple modern democracies through terrorism and sabotage and then replace them with all-white ethno-states.

Humber quickly turned Palmeter’s slur-riddled manifesto into an audiobook that she narrated in a monotone. Then she sent it into the world with her signature line:

“So, let’s get this party started, Terrorbros.”

The manifesto immediately began to spread, pinballing around the worldwide Terrorgram scene, which celebrated mass shooters like Palmeter as “saints.”

The Terrorgram story is part of a much larger 21st century phenomenon. Over the past two decades, massive social networks like X, Facebook and Telegram have emerged as a powerful force for both good and evil. The ability to connect with like-minded strangers helped fuel uprisings like the Arab Spring and Iran’s pro-democracy movements. But it has also aided extremists, including brutal jihadist organizations like the Islamic State group and white supremacists around the world.

About This Partnership

This story is part of a collaborative investigation from FRONTLINE and ProPublica that includes an upcoming documentary, “The Rise and Fall of Terrorgram,” which premieres March 25 at 10 p.m. EDT/9 p.m. CDT on PBS stations (check local listings) and will be available to stream on YouTube, the PBS App and FRONTLINE’s website.

Telegram, which is massively popular outside of the U.S., boasted an array of features that appealed to Humber and her fellow Terrorgammers. They could send encrypted direct messages, start big chat groups and create public channels to broadcast their messages. In the span of five years, they grew Terrorgram from a handful of accounts into a community with hundreds of chats and channels focused on recruiting would-be terrorists, sharing grisly videos and trading expertise on everything from assassination techniques to the best ways to sabotage water systems and electrical transmission lines. On one of her many accounts, Humber posted step-by-step instructions for making pipe bombs and synthesizing HMTD, a potent explosive.

Humber went by a series of usernames but was eventually publicly exposed by a group of California activists. ProPublica and FRONTLINE reviewed chat logs — some provided by the Australian anti-facist research organization The White Rose Society — court records and Humber’s other digital accounts to independently confirm her identity.

U.S. prosecutors say Humber helped lead the Terrorgram Collective, a transnational organization that ran popular Terrorgram accounts, produced sophisticated works of propaganda and distributed an alleged hit list of potential assassination targets. She is currently facing a host of federal terrorism charges, along with another alleged Terrorgram leader, Matthew Allison, a 38-year-old DJ from Boise, Idaho. Both have pleaded not guilty.

To trace the rise and fall of Terrorgram, ProPublica and FRONTLINE obtained a trove of chat logs and got access to some of the extremists’ private channels, allowing reporters to track in real time their posts and relationships. We combed through legal documents, talked with law enforcement officials and researchers in six countries and interviewed a member of the collective in jail. Taken together, our reporting reveals new details about the Terrorgram Collective, showing how Humber and her compatriots were powerful social media influencers who, rather than peddling fashion or food, promoted murder and destruction.

“The Rise and Fall of Terrorgram,” part of a collaborative investigation from FRONTLINE and ProPublica, premieres March 25.

The material illustrates the tension faced by every online platform: What limits should be imposed on the things users post or discuss? For years, social networks like Facebook and X employed thousands of people to review and take down offensive content, from pornography to racist memes to direct incitement of violence. The efforts at content moderation prompted complaints, primarily from conservatives, that the platforms were censoring conservative views of the world.

Telegram was created in 2013 by Pavel Durov, a Russian-born technologist, and his brother Nikolai. Pavel Durov, a billionaire who posts pictures of himself on Instagram, baring his chiseled torso amid rock formations and sand dunes, became the face of the company. He marketed the platform as a free-speech-focused alternative to the Silicon Valley social media platforms, which in the mid-2010s had begun aggressively policing disinformation and racist and dehumanizing content. Telegram’s restrictions were far more lax than those of its competitors, and it quickly became a hub for hate as well as illegal activity like child sexual exploitation and gunrunning.

Our review of thousands of Terrorgram posts shows that the lack of content moderation was crucial to the spread of the collective’s violent content. Telegram’s largely hands-off approach allowed Humber and her alleged confederates to reach an international audience of disaffected young people.

They encouraged these followers to turn their violent thoughts into action. And some of them did.

ProPublica and FRONTLINE identified 35 crimes linked to Terrorgram, including bomb plots, stabbings and shootings. Each case involved an individual who posted in Terrorgram chats, followed Terrorgram accounts or was a member of an organized group whose leaders participated in the Terrorgram community.

One of the crimes was a 2022 shooting at an LGBTQ+ bar in Bratislava, Slovakia, that left two people dead and another injured. In an earlier story, ProPublica and FRONTLINE detailed how the shooter, Juraj Krajčík, was coached to kill over three years by members of the Terrorgram Collective, a process that started when he was just 16 years old.

Radka Trokšiarová survived the Bratislava attack after being shot twice in the leg. “Sometimes I catch myself wishing to be able to ask the gunman: ‘Why did you do it? What was the point and purpose of destroying so many lives?’” she said.

Telegram declined repeated requests to make its executives available for interviews and would not answer specific questions about Humber and other Terrorgram leaders. But in a statement, the company said, “Calls for violence from any group are not tolerated on our platform.”

The company said that Telegram’s “significant growth has presented unique moderation challenges due to the sheer volume and diversity of content uploaded to the platform,” but that since 2023 it has stepped up its moderation practices, using AI and a team of about 750 contractors. Telegram said it now “proactively monitors public content across the platform and takes down objectionable content before it reaches users and has a chance to be reported.”

Excerpt from “The Rise and Fall of Terrorgram” (FRONTLINE)

Watch video ➜

Right-wing extremists were flocking to Telegram by 2019.

Many had been effectively exiled from major social media platforms such as Twitter and Facebook, which, in response to public pressure, had built vast “trust and safety” teams tasked with purging hateful and violent content. The companies had also begun using a shared database of hashes — essentially digital fingerprints — to quickly identify and delete videos and images produced by terror groups.

Even 8chan, an anonymous message board frequented by extremists, had begun pulling down particularly egregious posts and videos. Users there openly discussed moving to Telegram. One lengthy thread encouraged white supremacists to start using Telegram as a tool for communicating with like-minded people and spreading radical ideas to those they considered “normies.” “It offers a clean UI” — user interface — “and the best privacy protection we can get for this sort of social,” wrote one 8chan poster.

Pavel Durov, the 40-year-old Telegram co-founder, had positioned himself as a stalwart champion of privacy and free expression, arguing that “privacy is more important than the fear of terrorism.” After the Iranian government blocked access to the app in that country in 2018, he called free speech an “undeniable human right.”

To the extremists, Telegram and Durov seemed to be promising to leave them and their posts alone — no matter how offensive and alarming others might find their messages.

Among those who joined the online migration were Pavol Beňadik and Matthew Althorpe. The two men quickly began testing Telegram’s limits by posting content explicitly aimed at inspiring acts of white supremacist terrorism.

Then 23, Althorpe came from a small town on the Niagara River in Ontario, Canada; Beňadik, who was 19 at the time, lived in a village in Western Slovakia and went by the online handle Slovakbro.

Both were believers in a doctrine called militant accelerationism, which has become popular with neo-Nazis over the past decade, the chat logs show. Militant accelerationists want to speed the collapse of society by committing destabilizing terrorist attacks and mass killings. They have frequently targeted their perceived enemies, including people of color, Muslims, Jews, gays and lesbians.

Telegram gave them the ability to share tactics and targets with thousands of potential terrorists around the globe. Day after day they urged their followers to go out and kill as many people as possible to advance the white supremacist cause.

Pavol Beňadik (Illustration for ProPublica)

Beňadik had been immersed in the extremist scene since at least 2017, bouncing from one online space to the next, a review of his online life shows. He’d spent time on Facebook, Twitter, Discord, Gab and 4chan, another low-moderation message board.

Beňadik would later tell authorities that he was inspired by Christopher Cantwell, a New Hampshire white supremacist known as the “Crying Nazi” for posting a video of himself sobbing after learning that he might be arrested for his actions during the deadly 2017 rally in Charlottesville, Virginia. From Slovakia, Beňadik listened to Cantwell’s podcast, which featured long racist diatribes and interviews with white nationalist figures like Richard Spencer.

By 2019, Beňadik had created a chat group on Telegram in which he encouraged his followers to firebomb businesses, torch the homes of antifascists and seek out radioactive material to build dirty bombs and detonate them in American cities.

Althorpe started a channel and uploaded a steady stream of violent propaganda, the Telegram chat logs show. He named his channel Terrorwave Refined.

“Direct action against the system,” Althorpe argued in one post, is “the ONLY path toward total aryan victory.” Althorpe often shared detailed material that could aid in carrying out terrorist attacks, such as instructions for making the explosive thermite and plans for building assault rifles that couldn’t be traced by law enforcement.

Other sizable social media platforms or online forums would have detected and deleted the material posted by Althorpe and Beňadik. But on Telegram, the posts stayed up.

Soon others were creating similar content. In the summer of 2019, the duo began circulating online flyers listing allied Telegram chat groups and channels. Early on the network was small, just seven accounts.

Beňadik and Althorpe began calling this new community Terrorgram. The moniker stuck.

“I decided to become a fucking content producer,” Beňadik would later say on a podcast called HateLab, which has since been deleted. “I saw a niche and I decided to fill it.”

They were becoming influencers.

At the Al Noor Mosque in Christchurch, New Zealand, a gunman attacked worshippers in 2019, killing dozens. (FRONTLINE)

Watch video ➜

As the pair grew their audience on Telegram, they studied a massacre that had occurred a few months earlier in New Zealand.

A heavily armed man had murdered 51 Muslims at two mosques, livestreaming the carnage from a GoPro camera strapped to his ballistic helmet. To explain his motivations, Brenton Tarrant had drafted a 74-page treatise arguing that white people were being wiped out in an ongoing genocide. He described the Muslim worshippers he murdered as “invaders” and invoked a conspiracy theory claiming they were part of a plot to replace people of European ancestry with nonwhite people.

Tarrant’s slaughter had sent a surge of fear through New Zealand society. And his written and visual propaganda, which was aimed at inspiring more violence, had spread widely. Researchers would later discover that more than 12,000 copies of the video had been posted online in the 24 hours after the massacre.

Within the Terrorgram community, Tarrant became an icon.

On Telegram, Beňadik and Althorpe dubbed him a “saint” — an honorific they bestowed on someone who killed in the name of the white supremacist movement.

The two men saw Tarrant’s crime as a template for future attacks. Over and over, the duo encouraged their subscribers to follow Tarrant’s example and become the next saint.

For extremism researchers, the rise of the Terrorgram community was alarming. “Neo-Nazis, white nationalists and antigovernment extremists are publishing volumes of propaganda advocating terrorism and mass shootings on Telegram,” warned an investigator with the Southern Poverty Law Center in June 2019. The investigator said he was unable to even reach anyone at Telegram at the time to discuss the matter.

By August 2019, the Terrorgram network had grown to nearly 20 chat groups and channels. The Terrorwave Refined channel had ballooned to over 2,000 subscribers. “Thanks to everyone who helped us hit 2,000!” wrote Althorpe in a post. “HAIL THE SAINTS. HAIL HOLY TERROR.”

In addition to his chat groups, Beňadik created an array of channels to distribute propaganda and guides to weaponry and explosives. One of the most popular attracted nearly 5,000 subscribers.

“He was, I would say, a key architect behind Terrorgram,” said Rebecca Weiner, deputy commissioner for intelligence and counterterrorism at the New York Police Department. Weiner’s unit spent years monitoring the Terrorgram scene and assisted the FBI in investigating cases linked to the community.

When compared to mainstream social media, the numbers were tiny. But looked at a different way, they were stunning: Althorpe and Beňadik had built an online community of thousands of people dedicated to celebrating and committing acts of terrorism.

One of them was Jarrett Smith, a U.S. Army private based at Fort Riley in Kansas who was a regular in Beňadik’s chat group during the fall of 2019.

A beefy guy who enjoyed posting photos of himself in military gear, Smith had a love of explosives — he urged his fellow Terrorgrammers to bomb electric power stations, cell towers and natural gas lines — and contempt for federal law enforcement agents. “Feds deserve to be shot. They are the enemy,” he wrote in one chat thread.

Days after making the post, Smith unknowingly began communicating with a federal agent who was posing as an extremist.

In a string of direct messages, the undercover agent asked for Smith’s help in assassinating government officials in Texas. “Got a liberal texas mayor in my sights!” wrote the agent.

Happy to oblige, Smith provided the agent with a detailed step-by-step guide to building a potent improvised explosive device capable of destroying a car, as well as how-tos for several other types of bombs.

He was arrested that September and later pleaded guilty to charges that he shared instructions for making bombs and homemade napalm. Smith was sentenced to 30 months in prison.

The Terrorgram community was becoming a significant concern for law enforcement.

An October 2019 intelligence bulletin noted: “Telegram has become increasingly popular with WSEs” — white supremacist extremists — “due to frequent suspensions and censorship of their accounts across multiple social media platforms. Currently, WSEs are able to maintain relatively extensive networks of public channels some of which have thousands of members with minimal disruptions.”

The bulletin was produced by the Central Florida Intelligence Exchange, an intelligence-sharing center staffed by federal, state and local law enforcement personnel. Today, that five-page document — which was not meant for public dissemination — seems prescient.

It noted that while jihadist organizations and white supremacists were posting similar content on the platform, Telegram was treating the two camps in “vastly different” ways. The company, which had been headquartered in the United Arab Emirates since 2017, routinely shut down accounts created by the Islamic State group but it would “rarely remove WSE content, and typically only for high-profile accounts or posts that have received extensive media attention.”

By 2020, a pattern emerged: When Telegram did take down an account, it was often quickly replaced by a new one — sometimes with a near-identical name.

When the company deleted Althorpe’s Terrorwave Refined channel, he simply started a new one called Terrorwave Revived and began posting the same material. Within seven hours, he had attracted 1,000 followers, according to a post he wrote at the time.

The Terrorgrammers saw the modest attempts at content moderation as a betrayal by Pavel Durov and Telegram. “You could do anything on 2019 Telegram,” wrote Beňadik in a 2021 post. “I told people how to plan a genocide,” he said, noting that the company did nothing about those posts.

Apple, Google and Microsoft distribute the Telegram app through their respective online stores, giving them a measure of control over what their users could see on the platform. As the Terrorgram community attracted more notice from the outside world, including extremism researchers and law enforcement, these tech giants began restricting certain Terrorgram chats and channels, making them impossible to view.

Still, the Terrorgrammers found ways to evade the blackouts and shared the work-arounds with their followers. The network eventually grew to include hundreds of chats and channels.

The Center for Monitoring, Analysis and Strategy, a German organization that studies online extremism, “has tracked about 400 channels and 200 group chats which are considered part of the Terrorgram community on Telegram,” said Jennefer Harper, a researcher with the center.

As the content spread, so did crime. Using court records, news clips and Telegram data collected by Open Measures, a research platform that monitors social media, ProPublica and FRONTLINE identified a string of crimes tied to Terrorgram.

Nicholas Welker, who was active in the Terrorgram community, is serving a 44-month prison sentence for making death threats toward a Brooklyn-based journalist reporting on a neo-Nazi group.

A Missouri man who planned to blow up a hospital with a vehicle bomb was killed during a shootout with FBI agents in 2020; his neo-Nazi organization had posted in Beňadik’s chat group and was using it to enlist new members.

The most deadly known crime stemming from Terrorgram occurred in 2022 Brazil, where a teenager who was allegedly in contact with Humber shot 15 people, killing four. The teen was later hailed as a saint by the Terrorgrammers.

Excerpt from “The Rise and Fall of Terrorgram” (FRONTLINE)

Watch video ➜

While Terrorgram started as a loose collection of chats and channels, by 2021 Althorpe and Beňadik had created a more formal organization, according to Canadian court records and interviews with law enforcement sources in Slovakia. Their small, clandestine group was the Terrorgram Collective.

The organization began producing more sophisticated content — books, videos and a roster of alleged assassination targets — and distributing the material to thousands of followers.

Court documents, a U.S. State Department bulletin and Telegram logs show that over the next three years, the collective would come to include at least six other people in five countries.

Over 14 months, the group generated three books and repeatedly posted them in PDF form on Terrorgram accounts. Ranging in length from 136 to 268 pages, the books offer a raft of specific advice for planning a terror attack, including how to sabotage railroads, electrical substations and other critical infrastructure. The publications also celebrated a pantheon of white supremacist saints — mass murderers including Timothy McVeigh, who in 1995 bombed a federal building in Oklahoma City, killing 168 people.

“That combination of tactical guidance plus propaganda is something that we’d seen a lot of coming out of ISIS in years past,” said Weiner of the NYPD. She added that the books are filled with “splashy graphics” designed to appeal to young people.

“It’s a real manual on how to commit an act of terrorism,” Jakub Gajdoš, who helped oversee an investigation of Beňadik and Terrorgram for Slovakia’s federal police agency, said of one book. “A guide for killing people.”

At least two Americans were involved in creating one of the books, according to U.S. federal prosecutors: Humber and Allison, the DJ from Boise, Idaho. The chat logs show they were both prolific creators and influencers in the Terrorgram community who frenetically generated new content, including videos, audiobooks, graphics and calendars, which they posted on an array of channels.

Allison made around 120 Terrorgram videos, including editing “White Terror,” a quasi-documentary glorifying more than 100 white murderers and terrorists. Narrated by Humber, the video starts with the man who assassinated Martin Luther King Jr. in 1968 and concludes with the young man who shot and killed 10 Black shoppers in a Buffalo supermarket in 2022.

These “white men and women of action have taken it upon themselves to wage war against the system and our racial enemies,” Humber intones. “To the saints of tomorrow watching this today, know that when you succeed you will be celebrated with reverence and your sacrifice will not be in vain.”

The pair also allegedly helped create “The List,” a detailed hit list of American politicians, corporate executives, academics and others, according to court documents. The List was shared on a series of dedicated Telegram channels, as well as an array of other accounts, some made to look like legitimate news aggregators. Each entry included a photo of the target and their home address.

It was an escalation — and from court documents it’s clear that The List captured the attention of U.S. law enforcement agents, who worried that it might trigger a wave of assassinations.

In 2022, a gunman attacked an LGBTQ+ bar in the Old Town neighborhood of Bratislava, Slovakia. (FRONTLINE)

Watch video ➜

The collective’s books influenced a new generation of armed extremists, some of them in their teens.

One of these young disciples was Juraj Krajčík. The Slovakian student had joined Beňadik’s chat groups at the age of 16 and had become a frequent poster.

ProPublica and FRONTLINE obtained an extensive trove of Terrorgram chat logs that show how Beňadik mentored Krajčík and played a profound role in shaping his beliefs. Over the span of three years, Beňadik, Allison and Humber all urged the teen to take action, the chat logs show.

On the night of Oct. 12, 2022, Krajčík, armed with a handgun, opened fire on three people outside of Tepláreň, a small LGBTQ+ bar in Bratislava’s Old Town neighborhood, killing Juraj Vankulič and Matúš Horváth and wounding their friend Radka Trokšiarová.

“I was in terrible pain because the bullet went through my thighbone,” she recalled. “I am still in pain.”

Krajčík took off on foot, and hours later he killed himself in a grove of trees next to a busy roadway. He was 19.

Six thousand miles away in California, Humber promptly began making celebratory posts. Krajčík, she exclaimed, had achieved sainthood.

Shortly after the Bratislava attack, Humber messaged Allison on Telegram, according to court records recently filed by federal prosecutors in the U.S.

She told him she’d been communicating with another Terrorgrammer who was planning a racially motivated school shooting.The attack occurred weeks later in Aracruz, Brazil, when a 16-year-old wearing a skull mask shot 15 people at two schools, killing four. Another saint.

On a Terrogram channel, Humber posted a ZIP file with info on the attack, including 17 photos and four videos. The massacre, she noted, was motivated by “Hatred of non-Whites.” And she made a pitch tailored for the next would-be teenage terrorist: The assailant, she wrote in a post, would get a “SLAP ON THE WRIST” prison sentence due to his age.

While Krajčík was planning his attack, law enforcement agencies in Europe, the U.S. and Canada were quietly pursuing the leaders of the Terrorgram Collective.

Beňadik was the first to fall. Using information collected by the FBI, investigators in Slovakia arrested him in May 2022 while he was on break from college. He’d been studying computer science at the Brno University of Technology in the Czech Republic.

While in jail, Beňadik admitted his involvement with Terrorgram. He pleaded guilty and was sentenced to six years in prison shortly after the Tepláreň attacks.

Describing Beňadik as “extremely intelligent,” prosecutor Peter Kysel said he believes the student never met with any of his fellow Terrorgrammers in person and didn’t even know their real names. “All the contacts was in the cyberspace,” he said.

But Beňadik misled investigators about his connection to Krajčík, saying they had one brief interaction, via direct message. “This was the only communication,” said Daniel Lipšic, the prosecutor who investigated the Tepláreň attack.

In fact, Beňadik and Krajčík had many conversations, the logs obtained by ProPublica and FRONTLINE show. The pair repeatedly discussed targeting Tepláreň, with the older man writing that killing the bar patrons with a nail bomb wasn’t brutal enough. Krajčík posted frequently about his animus toward gays and lesbians, which Beňadik encouraged.

Alleged Terrorgram Collective co-founder Althorpe is also in custody. Canadian prosecutors have accused him of helping to produce the Terrorgram Collective publications, through which they say he “promoted genocide” and “knowingly instructed” others to carry out “terrorist activity.”

At the time of his arrest, Althorpe was running a small company selling components for semi-automatic rifles such as AK-47s and AR-15s. He has pleaded not guilty and is awaiting trial.

In the U.S., Humber and Allison are facing trial on charges including soliciting people to kill government officials through The List, distributing bomb-making instructions and providing material support to terrorists. Prosecutors say the two have been involved with the Terrorgram community since 2019.

The 37-page indictment says they incited the attack on Tepláreň, noting that Krajčík “had frequent conversations with HUMBER, ALLISON, and other members of the Terrorgram Collective” before carrying out the crime.

In a jailhouse interview that Allison gave against his lawyer’s advice, he admitted he produced content for the collective, including editing the “White Terror” video. Still, Allison insisted he never incited others to commit crimes and claimed The List wasn’t meant to be a guide for assassins. He said it was merely an exercise in doxxing, similar to how right-wing activists are outed by anti-fascist activists.

All of his Telegram posts are protected under the First Amendment, according to a motion filed by his lawyers. They argue that while he was active in Telegram chats and channels, there is nothing in the government’s evidence to support the claim that he was a Terrorgram leader. “The chats are mostly a chaotic mix of hyperbole and posts without any recognized leader,” his lawyers wrote in the motion.

Looking pale and grim, Humber declined to be interviewed when ProPublica and FRONTLINE visited the Sacramento County Jail. Her attorney declined to comment on the case.

During the last days of the Biden administration, in January 2025, the State Department officially designated the Terrorgram Collective a global terrorist organization, hitting three more collective leaders in South Africa, Croatia and Brazil with sanctions. In February, Australia announced its own sanctions on Terrorgram, the first time that country’s government has imposed counterterrorism financing sanctions on an organization that is entirely based online.

“The group has been majorly impacted in terms of its activity. We’ve seen many chats being voluntarily closed as people feel at risk of legal action, and we’ve seen generally the amount of discourse really reducing,” said Milo Comerford, an extremism expert at the Institute for Strategic Dialogue, a London-based nonprofit that tracks hate groups and disinformation. The “organizational capabilities of the Terrorgram Collective itself have been severely undermined.”

Pavel Durov (Illustration for ProPublica)

The demise of Terrorgram has coincided with reforms announced at Telegram in the wake of one co-founder’s arrest last year in France. Pavel Durov is charged with allowing criminal activity, including drug trafficking and child sexual abuse, to flourish on his platform. He has called the charges “misguided,” saying CEOs should not be held liable for the misuse of their platforms. He was ordered to remain in France during the ongoing investigation, and, depending on the outcome, could face trial next year.

In a statement, the company said, “Mr. Durov firmly denies all allegations.”

The company said it has always complied with the European Union’s laws. “It is absurd to suggest that Telegram’s owner is responsible for the actions of a negligible fraction (<0.01%) of its 950M+ active users.”

Still, after the arrest, the company announced a slew of reforms designed to make Telegram safer. It promised to police illegal content on the platform and share the IP addresses and phone numbers of alleged lawbreakers with authorities.

In response, white supremacists began to flee the platform.

Pete Simi, a sociology professor who studies extremism at Chapman University in Orange, California, said the incendiary ideas promoting race war and violence that animated the Terrorgram Collective will migrate to other platforms. “Especially given the broader climate that exists within our society,” Simi said. “There will be new Terrorgrams that take its place by another name, and we will continue to see this kind of extremism propagated through platforms of various sorts, not just Telegram.”

Today, many extremists are gathering on X, where owner Elon Musk has loosened content restrictions. White supremacists frequently post a popular Terrorgram slogan about killing all Black people. There are several Brenton Tarrant fan accounts, and some racist and antisemitic influencers who were previously banned now have hundreds of thousands of followers.

A review by ProPublica and FRONTLINE shows the company is removing some violent white supremacist content and suspending some extremist accounts. It also restricts the visibility of some racist and hateful posts by excluding them from search results or by adding a note to the post saying it violates X’s rules of community conduct. And we were unable to find posts on the platform that shared the bomb-making and terrorism manuals that had previously appeared on Telegram. The news organizations reached out to X multiple times but got no response.

In early March, a person who had a history of posting Nazi imagery shared a 21-second video lionizing Juraj Krajčík. The clip shows one of his victims lying dead on the pavement.

Tom Jennings, Annie Wong, Karina Meier and Max Maldonado of FRONTLINE, and Lukáš Diko of the Investigative Center of Jan Kuciak contributed reporting.


This content originally appeared on ProPublica and was authored by by A.C. Thompson, ProPublica and FRONTLINE, and James Bandler, ProPublica.

]]>
https://www.radiofree.org/2025/03/15/the-rise-and-fall-of-terrorgram-inside-a-global-online-hate-network/feed/ 0 519269
MAGA Teslas? Elon Musk is upending the politics of EVs. https://grist.org/politics/elon-musk-tesla-trump-republicans-electric-vehicles/ https://grist.org/politics/elon-musk-tesla-trump-republicans-electric-vehicles/#respond Fri, 14 Mar 2025 08:45:00 +0000 https://grist.org/?p=660255 President Donald Trump, the same man who once said that people promoting electric vehicles should “ROT IN HELL,” bought his own EV this week. He showed off his new Tesla Model S — red, like the Make America Great Again hats — outside the White House on Tuesday, piling compliments on his senior advisor Elon Musk, the CEO of Tesla, and declaring the company’s vehicles “beautiful.”

It resembled a sales pitch for Musk’s company, the country’s biggest seller of EVs. Tesla has lost more than half of its value since December as sales have plummeted worldwide. With Musk dismantling parts of the federal government as the head of the new Department of Government Efficiency, aka DOGE, the vehicles have become a toxic symbol for Democrats, a large portion of Tesla owners. Over the past week, protesters have vandalized Tesla dealerships, set Cybertrucks aflame, and boycotted the brand. Liberal Tesla drivers have slapped stickers on their cars that read “I bought this before Elon went crazy.” 

The strong feelings surrounding Musk have already started to scramble the politics around EVs. Trump’s exhibition at the White House on Tuesday was a defense of Musk, who he said had been unfairly penalized for “finding all sorts of terrible things that have taken place against our country.” Yet the bizarre scene of Trump showcasing a vehicle that runs on electricity instead of gas felt almost like a sketch from Saturday Night Live, and not just because the Trump administration has been trying to reverse Biden-era rules that would have sped up the adoption of low-emissions vehicles. Here were the two biggest characters in MAGA politics promoting a technology that’s been largely rejected by their right-wing base. 

Other prominent Republicans, including House Speaker Mike Johnson and Georgia Representative Marjorie Taylor Greene, quickly moved to defend Tesla against vandalism that Trump is labeling “domestic terrorism.” Tesla’s sudden shift from Democratic status symbol to Republican icon has some thinking the controversy around Musk could lead to a bipartisan embrace of EVs.

“He’s uniquely positioned to and has the power to really shape this debate and help bridge the divide here,” said Joe Sacks, executive director of the American EV Jobs Alliance, a nonprofit trying to prevent “silly partisan politics” from stopping a manufacturing boom for electric vehicles. “I’m unsure if that’s what he’s going to use his new perch and his kind of role in the administration to do, but it seems like he has the ability to do that.” 

According to polling the alliance conducted after the November election, Republicans have warmed up to Elon Musk, with 82 percent of those polled saying that Musk is a good ambassador for EVs. A solid majority of Trump voters — 64 percent — said they viewed Tesla favorably, compared with 59 percent of those who voted for Kamala Harris. “Republicans are probably inching towards the idea that there shouldn’t be much of a cultural divide on this product category, if the market leader CEO is sitting next to President Trump in the Oval Office during press conferences,” Sacks said.

The data aligns with a recent analysis from the financial services firm Stifel, which found that Tesla has become more favorable among Republicans as its popularity plunges with Democrats. Compared to August, 13 percent more Republicans are willing to consider purchasing a Tesla.

Photo of a Cybertruck painted like a flag with the word Trump over it
A Donald Trump-themed Tesla Cybertruck sits in traffic in Washington, D.C.
Christopher Furlong / Getty Images

Yet there are reasons to suspect that EVs will continue to be a hard sell for Republicans. They are typically tradition-minded people who like big cars, not small cars with new technology they’ve never used before, said Marc Hetherington, a political scientist at the University of North Carolina at Chapel Hill and co-author of the book Prius Or Pickup? “Conservatives don’t have the sensibility that fits with electric vehicles at all,” he said. “So I don’t think that you’re going to see a spike in Tesla sales among conservatives.”

Alexander Edwards, president of the research consultancy Strategic Vision, said that Republicans view gas-powered cars as a more practical purchase for transporting their families from place to place. That’s based on his firm’s surveys, which examine the psychology behind the car choices of about a quarter-million Americans a year. “I think Elon made a bet that I think he’s secretly regretting, that Republicans would come out of the woodwork and say, ‘Yes, we’re going to support you,’” Edwards said.

If they came around to any electric vehicle, however, it might be a Tesla. One of the primary things Republicans care about when it comes to buying a car is that it looks fast and goes fast, and Tesla has seen more Republican buyers for that reason, Edwards said. Democrats have consistently been buying electric vehicles at a rate of 4 to 1 compared to Republicans, but 2 to 1 when it comes to Teslas, according to Edwards’ data. Last year, more Republicans than Democrats bought Teslas for the first time — not because more Republican flocked to the brand, but because Democrats pulled away from it.

For Democrats, who had long been criticized as having a smug attitude for driving a Prius, Teslas offered a cool and desirable alternative with less baggage when they took off in the early 2010s. “Tesla was able to finally give Democratic buyers what they were looking for — a Prius-like image of being thoughtful, combined with the fun and excitement of a real luxury sports car,” Edwards said. That started to change as Musk became a magnet for political controversy, starting with his takeover of Twitter in 2022. A Tesla EV became a symbol of Tesla’s CEO. 

“Doesn’t matter if you’re Republican or Democrat — when you jump into the Batmobile, you become Batman,” Edwards said. “And the same thing is true with the vehicles we purchase. We often want them to show who we are, what we’ve accomplished, what we stand for.”

Of course, there are ways to depolarize electric vehicles that don’t rely on cues from Trump or Musk. Sacks recommends talking about the attributes of electric vehicles: their ability to accelerate faster and brake more crisply, as well as help people save money for every mile they drive, since there’s no need to buy gas. When people have friends or family who own an EV, that also helps break down the cultural divide, he said.

In a way, you could see Trump becoming a salesman for electric vehicles as an example of that very phenomenon, with his self-described “first buddy” convincing him to come around. Just two years ago, Trump complained that EVs needed a charge every 15 minutes and would kill American jobs. But, after Musk endorsed his presidential campaign last summer and donated $288 million, Trump softened his tone, saying that he was in favor of “a very small slice” of cars being electric. “I have to be, you know,” Trump said, “because Elon endorsed me very strongly.” 

On Tuesday, as Trump climbed into his new electric car for the first time, he seemed surprised by what he saw there. “That’s beautiful,” he said, admiring the dashboard. “This is a different panel than I’ve had. Everything’s computer!”

This story was originally published by Grist with the headline MAGA Teslas? Elon Musk is upending the politics of EVs. on Mar 14, 2025.


This content originally appeared on Grist and was authored by Kate Yoder.

]]>
https://grist.org/politics/elon-musk-tesla-trump-republicans-electric-vehicles/feed/ 0 518981
CPJ alarmed by India state government’s use of AI to monitor media https://www.radiofree.org/2025/03/13/cpj-alarmed-by-india-state-governments-use-of-ai-to-monitor-media/ https://www.radiofree.org/2025/03/13/cpj-alarmed-by-india-state-governments-use-of-ai-to-monitor-media/#respond Thu, 13 Mar 2025 13:29:13 +0000 https://cpj.org/?p=463416 New Delhi, March 13, 2025—The Committee to Protect Journalists urges India’s Maharashtra state authorities to consult with journalists and media groups to ensure that its plan to use artificial intelligence (AI) to monitor media coverage and correct “negative” reports does not undermine press freedom.

According to a March 6 Government Resolution approving the release of funds, a new 100 million-rupee (US$1.2 million) media monitoring center will track print, electronic, digital, and social media news reports about western Maharashtra’s state government and classify them as either “positive” or “negative.” A private consulting agency will analyze the coverage and compile reports for state authorities.

“Maharashtra state’s AI-driven media monitoring plan raises serious concerns about press freedom and the potential for government overreach,” said CPJ Asia Program Coordinator Beh Lih Yi. “The government’s intention to monitor and pursue media outlets producing news that the government classifies as ‘negative’ could increase the risk of self-censorship and deter journalists from investing in critical reporting. The Maharashtra government must commit to protecting press freedom and come clean about the purpose and scope of this plan.”

Maharashtra Chief Minister Devendra Fadnavis said the center did not seek to control the media but would provide “the truth about it or the facts” to reporters who produce “negative news.”

In 2023, India’s central government set up a fact check unit with the power to take down online content that it deemed “fake, false, or misleading” about the government. In September, Bombay High Court struck down the move as unconstitutional.

CPJ’s email to request comment from Maharashtra’s Directorate General of Information and Public Relations did not receive a response.


This content originally appeared on Committee to Protect Journalists and was authored by CPJ Staff.

]]>
https://www.radiofree.org/2025/03/13/cpj-alarmed-by-india-state-governments-use-of-ai-to-monitor-media/feed/ 0 518707
How ProPublica Uses AI Responsibly in Its Investigations https://www.radiofree.org/2025/03/13/how-propublica-uses-ai-responsibly-in-its-investigations/ https://www.radiofree.org/2025/03/13/how-propublica-uses-ai-responsibly-in-its-investigations/#respond Thu, 13 Mar 2025 12:00:00 +0000 https://www.propublica.org/article/using-ai-responsibly-for-reporting by Charles Ornstein

ProPublica is a nonprofit newsroom that investigates abuses of power. This story was originally published in our Dispatches newsletter; sign up to receive notes from our journalists.

In February, my colleague Ken Schwencke saw a post on the social media network Bluesky about a database released by Sen. Ted Cruz purporting to show more than 3,400 “woke” grants awarded by the National Science Foundation that “promoted Diversity, Equity, and Inclusion (DEI) or advanced neo-Marxist class warfare propaganda.”

Given that Schwencke is our senior editor for data and news apps, he downloaded the data, poked around and saw some grants that seemed far afield from what Cruz, a Texas Republican, called “the radical left’s woke nonsense.” The grants included what Schwencke thought was a “very cool sounding project” on the development of advanced mirror coatings for gravitational wave detectors at the University of Florida, his alma mater.

The grant description did, however, mention that the project “promotes education and diversity, providing research opportunities for students at different education levels and advancing the participation of women and underrepresented minorities.”

Schwencke thought it would be interesting to run the data through an AI large language model — one of those powering ChatGPT — to understand the kinds of grants that made Cruz’s list, as well as why they might have been flagged. He realized there was an accountability story to tell.

In that article, Agnel Philip and Lisa Song found that “Cruz’s dragnet had swept up numerous examples of scientific projects funded by the National Science Foundation that simply acknowledged social inequalities or were completely unrelated to the social or economic themes cited by his committee.”

Among them: a $470,000 grant to study the evolution of mint plants and how they spread across continents. As best Philip and Song could tell, the project was flagged because of two specific words used in its application to the NSF: “diversify,” referring to the biodiversity of plants, and “female,” where the application noted how the project would support a young female scientist on the research team.

Another involved developing a device that could treat severe bleeding. It included the words “victims” — as in gunshot victims — and “trauma.”

Neither Cruz’s office nor a spokesperson for Republicans on the Senate Committee on Commerce, Science and Transportation responded to our requests for comment for the article.

The story was a great example of how artificial intelligence can help reporters analyze large volumes of data and try to identify patterns.

First, we told the AI model to mimic an investigative journalist reading through each of these grants to identify whether they contained themes that someone looking for “wokeness” may have spotted. And crucially, we made sure to tell the model not to guess if it wasn’t sure. (AI models are known to hallucinate, and we wanted to guard against that.)

For newsrooms new to AI and readers who are curious how this worked in practice, here’s an excerpt of the actual prompt we used:

Background: We will be showing you grants from the national science foundation that have been targeted for cancellation because they contain themes as identified by Republican Senator Ted Cruz's office as involving woke ideology; diversity, equity, and inclusion; or pro-Marxist ideology. We are looking to analyze themes of the award descriptions in this list to determine what may have terms or themes that would be considered "woke" or related to Diversity, Equity, and Inclusion (DEI). It is your task to determine whether or not the text contains these themes and tell me about what you've found. Only extract information from the NSF grant if it contains the information requested.

--

As an investigative journalist, I am looking for the following information

--

woke_description: A short description (at maximum a paragraph) on why this grant is being singled out for promoting "woke" ideology, Diversity, Equity, and Inclusion (DEI) or advanced neo-Marxist class warfare propaganda. Leave this blank if it's unclear.

why_flagged: Look at the "STATUS", "SOCIAL JUSTICE CATEGORY", "RACE CATEGORY", "GENDER CATEGORY" and "ENVIRONMENTAL JUSTICE CATEGORY" fields. If it's filled out, it means that the author of this document believed the grant was promoting DEI ideology in that way. Analyze the "AWARD DESCRIPTIONS" field and see if you can figure out why the author may have flagged it in this way. Write it in a way that is thorough and easy to understand with only one description per type and award.

citation_for_flag: Extract a very concise text quoting the passage of "AWARDS DESCRIPTIONS" that backs up the "why_flagged" data.

Of course, members of our staff reviewed and confirmed every detail before we published our story, and we called all the named people and agencies seeking comment, which remains a must-do even in the world of AI.

Philip, one of the journalists who wrote the query above and the story, is excited about the potential new technologies hold but also is proceeding with caution, as our entire newsroom is.

“The tech holds a ton of promise in lead generation and pointing us in the right direction,” he told me. “But in my experience, it still needs a lot of human supervision and vetting. If used correctly, it can both really speed up the process of understanding large sets of information, and if you’re creative with your prompts and critically read the output, it can help uncover things that you may not have thought of.”

This was just the latest effort by ProPublica to experiment with using AI to help do our jobs better and faster, while also using it responsibly, in ways that aid our human journalists.

In 2023, in partnership with The Salt Lake Tribune, a Local Reporting Network partner, we used AI to help uncover patterns of sexual misconduct among mental health professionals disciplined by Utah’s licensing agency. The investigation relied on a large collection of disciplinary reports, covering a wide range of potential violations.

To narrow in on the types of cases we were interested in, we prompted AI to review the documents and identify ones that were related to sexual misconduct. To help the bot do its work, we gave it examples of confirmed cases of sexual misconduct that we were already familiar with and specific keywords to look for. Each result was then reviewed by two reporters, who used licensing records to confirm it was categorized correctly.

In addition, during our reporting on the 2022 school shooting in Uvalde, Texas, ProPublica and The Texas Tribune obtained a trove of unreleased raw materials collected during the state’s investigation. This included hundreds of hours of audio and video recordings, which were difficult to sift through. The footage wasn’t organized or clearly labeled, and some of it was incredibly graphic and disturbing for journalists to watch.

We used self-hosted open-source AI software to securely transcribe and help classify the material, which enabled reporters to match up related files and to reconstruct the day’s events, showing in painstaking detail how law enforcement’s lack of preparation contributed to delays in confronting the shooter.

We know full well that AI does not replicate the very time-intensive work we do. Our journalists write our stories, our newsletters, our headlines and the takeaways at the top of longer stories. We also know that there’s a lot about AI that needs to be investigated, including the companies that market their products, how they train them and the risks they pose.

But to us, there’s also potential to use AI as one of many reporting tools that enables us to examine data creatively and pursue the stories that help you understand the forces shaping our world.

Agnel Philip, Ken Schwencke, Hannah Fresques and Tyson Evans contributed reporting.


This content originally appeared on ProPublica and was authored by by Charles Ornstein.

]]>
https://www.radiofree.org/2025/03/13/how-propublica-uses-ai-responsibly-in-its-investigations/feed/ 0 518695
How New Zealand is venturing down the road of political upheaval https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval/ https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval/#respond Tue, 11 Mar 2025 21:29:16 +0000 https://asiapacificreport.nz/?p=112034

ANALYSIS: By Peter Davis

With the sudden departure of New Zealand’s Reserve Bank Governor, one has to ask whether there is a pattern here — of a succession of public sector leaders leaving their posts in uncertain circumstances and a series of decisions being made without much regard for due process.

It brings to mind the current spectacle of federal government politics playing out in the United States. Four years ago, we observed a concerted attempt by a raucous and determined crowd to storm the Capitol.

Now a smaller, more disciplined and just as determined band is entering federal offices in Washington almost unhindered, to close agencies and programmes and to evict and terminate the employment of thousands of staff.

This could never happen here. Or could it? Or has it and is it happening here? After all, we had an occupation of parliament, we had a rapid unravelling of a previous government’s legislative programme, and we have experienced the removal of CEOs and downgrading of key public agencies such as Kāinga Ora on slender pretexts, and the rapid and marked downsizing of the core public service establishment.

Similarly, while the incoming Trump administration is targeting any federal diversity agenda, in New Zealand the incoming government has sought to curb the advancement of Māori interests, even to the extent of questioning elements of our basic constitutional framework.

In other words, there are parallels, but also differences. This has mostly been conducted in a typical New Zealand low-key fashion, with more regard for legal niceties and less of the histrionics we see in Washington — yet it still bears comparison and probably reflects similar political dynamics.

Nevertheless, the departure in quick succession of three health sector leaders and the targeting of Pharmac’s CEO suggest the agenda may be getting out of hand. In my experience of close contact with the DHB system the management and leadership teams at the top echelon were nothing short of outstanding.

The Auckland District Health Board, as it then was, is the largest single organisation in Auckland — and the top management had to be up to the task. And they were.

Value for money
As for Pharmac, it is a standout agency for achieving value for money in the public sector. So why target it? The organisation has made cumulative savings of at least a billion dollars, equivalent to 5 percent of the annual health budget. Those monies have been reinvested elsewhere in the health sector. Furthermore, by distancing politicians from sometimes controversial funding decisions on a limited budget it shields them from public blowback.

Unfortunately, Pharmac is the victim of its own success: the reinvestment of funds in the wider health sector has gone unheralded, and the shielding of politicians is rarely acknowledged.

The job as CEO at Pharmac has got much harder with a limited budget, more expensive drugs targeting smaller groups, more vociferous patient groups — sometimes funded in part by drug companies — easy media stories (individuals being denied “lifesaving” treatments), and, more recently, less sympathetic political masters.

Perhaps it was time for a changing of the guard, but the ungracious manner of it follows a similar pattern of other departures.

The arrival of Sir Brian Roche as the new Public Service Commissioner may herald a more considered approach to public sector reform, rather than the slightly “wild west” New Zealand style with the unexplained abolition of the Productivity Commission, the premature ending of an expensive pumped hydro study, disbandment of sector industry groups, and the alleged cancellation of a large ferry contract by text, among other examples of a rather casual approach to due process.

The danger we run is that the current cleaning out of public sector leaders is more than an expected turnover with a change of government, and rather a curbing of independent advice and thought. Will our public media agencies — TVNZ and RNZ — be next in line for the current thrust of popular and political attention?

Major redundancies
Taken together with the abolition of the Productivity Commission, major redundancies in the public sector, the removal of research funding for the humanities and the social sciences, a campaign by the Free Speech Union against university autonomy, the growing reliance on business lobbyists and lobby groups to determine decision-making, and the recent re-orientation of The New Zealand Herald towards a more populist stance, we could well be witnessing a concerted rebalancing of the ecosystem of advice and thought.

In half a century of observing policy and politics from the relative safety of the university, I have never witnessed such a concerted campaign as we are experiencing. Not even in the turmoil of the 1990s.

We need to change the national conversation before it is too late and we lose more of the key elements of the independence of advice and thought that we have established in the state and allied and quasi-autonomous agencies, as well as in the universities and the creative industries, and that lie at the heart of liberal democracy.

Dr Peter Davis is emeritus professor of population health and social science at Auckland University, and a former elected member of the Auckland District Health Board. This article was first published by The Post and is republished with the author’s permission


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval/feed/ 0 518220
How New Zealand is venturing down the road of political upheaval https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval-2/ https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval-2/#respond Tue, 11 Mar 2025 21:29:16 +0000 https://asiapacificreport.nz/?p=112034

ANALYSIS: By Peter Davis

With the sudden departure of New Zealand’s Reserve Bank Governor, one has to ask whether there is a pattern here — of a succession of public sector leaders leaving their posts in uncertain circumstances and a series of decisions being made without much regard for due process.

It brings to mind the current spectacle of federal government politics playing out in the United States. Four years ago, we observed a concerted attempt by a raucous and determined crowd to storm the Capitol.

Now a smaller, more disciplined and just as determined band is entering federal offices in Washington almost unhindered, to close agencies and programmes and to evict and terminate the employment of thousands of staff.

This could never happen here. Or could it? Or has it and is it happening here? After all, we had an occupation of parliament, we had a rapid unravelling of a previous government’s legislative programme, and we have experienced the removal of CEOs and downgrading of key public agencies such as Kāinga Ora on slender pretexts, and the rapid and marked downsizing of the core public service establishment.

Similarly, while the incoming Trump administration is targeting any federal diversity agenda, in New Zealand the incoming government has sought to curb the advancement of Māori interests, even to the extent of questioning elements of our basic constitutional framework.

In other words, there are parallels, but also differences. This has mostly been conducted in a typical New Zealand low-key fashion, with more regard for legal niceties and less of the histrionics we see in Washington — yet it still bears comparison and probably reflects similar political dynamics.

Nevertheless, the departure in quick succession of three health sector leaders and the targeting of Pharmac’s CEO suggest the agenda may be getting out of hand. In my experience of close contact with the DHB system the management and leadership teams at the top echelon were nothing short of outstanding.

The Auckland District Health Board, as it then was, is the largest single organisation in Auckland — and the top management had to be up to the task. And they were.

Value for money
As for Pharmac, it is a standout agency for achieving value for money in the public sector. So why target it? The organisation has made cumulative savings of at least a billion dollars, equivalent to 5 percent of the annual health budget. Those monies have been reinvested elsewhere in the health sector. Furthermore, by distancing politicians from sometimes controversial funding decisions on a limited budget it shields them from public blowback.

Unfortunately, Pharmac is the victim of its own success: the reinvestment of funds in the wider health sector has gone unheralded, and the shielding of politicians is rarely acknowledged.

The job as CEO at Pharmac has got much harder with a limited budget, more expensive drugs targeting smaller groups, more vociferous patient groups — sometimes funded in part by drug companies — easy media stories (individuals being denied “lifesaving” treatments), and, more recently, less sympathetic political masters.

Perhaps it was time for a changing of the guard, but the ungracious manner of it follows a similar pattern of other departures.

The arrival of Sir Brian Roche as the new Public Service Commissioner may herald a more considered approach to public sector reform, rather than the slightly “wild west” New Zealand style with the unexplained abolition of the Productivity Commission, the premature ending of an expensive pumped hydro study, disbandment of sector industry groups, and the alleged cancellation of a large ferry contract by text, among other examples of a rather casual approach to due process.

The danger we run is that the current cleaning out of public sector leaders is more than an expected turnover with a change of government, and rather a curbing of independent advice and thought. Will our public media agencies — TVNZ and RNZ — be next in line for the current thrust of popular and political attention?

Major redundancies
Taken together with the abolition of the Productivity Commission, major redundancies in the public sector, the removal of research funding for the humanities and the social sciences, a campaign by the Free Speech Union against university autonomy, the growing reliance on business lobbyists and lobby groups to determine decision-making, and the recent re-orientation of The New Zealand Herald towards a more populist stance, we could well be witnessing a concerted rebalancing of the ecosystem of advice and thought.

In half a century of observing policy and politics from the relative safety of the university, I have never witnessed such a concerted campaign as we are experiencing. Not even in the turmoil of the 1990s.

We need to change the national conversation before it is too late and we lose more of the key elements of the independence of advice and thought that we have established in the state and allied and quasi-autonomous agencies, as well as in the universities and the creative industries, and that lie at the heart of liberal democracy.

Dr Peter Davis is emeritus professor of population health and social science at Auckland University, and a former elected member of the Auckland District Health Board. This article was first published by The Post and is republished with the author’s permission


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval-2/feed/ 0 518221
How New Zealand is venturing down the road of political upheaval https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval-3/ https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval-3/#respond Tue, 11 Mar 2025 21:29:16 +0000 https://asiapacificreport.nz/?p=112034

ANALYSIS: By Peter Davis

With the sudden departure of New Zealand’s Reserve Bank Governor, one has to ask whether there is a pattern here — of a succession of public sector leaders leaving their posts in uncertain circumstances and a series of decisions being made without much regard for due process.

It brings to mind the current spectacle of federal government politics playing out in the United States. Four years ago, we observed a concerted attempt by a raucous and determined crowd to storm the Capitol.

Now a smaller, more disciplined and just as determined band is entering federal offices in Washington almost unhindered, to close agencies and programmes and to evict and terminate the employment of thousands of staff.

This could never happen here. Or could it? Or has it and is it happening here? After all, we had an occupation of parliament, we had a rapid unravelling of a previous government’s legislative programme, and we have experienced the removal of CEOs and downgrading of key public agencies such as Kāinga Ora on slender pretexts, and the rapid and marked downsizing of the core public service establishment.

Similarly, while the incoming Trump administration is targeting any federal diversity agenda, in New Zealand the incoming government has sought to curb the advancement of Māori interests, even to the extent of questioning elements of our basic constitutional framework.

In other words, there are parallels, but also differences. This has mostly been conducted in a typical New Zealand low-key fashion, with more regard for legal niceties and less of the histrionics we see in Washington — yet it still bears comparison and probably reflects similar political dynamics.

Nevertheless, the departure in quick succession of three health sector leaders and the targeting of Pharmac’s CEO suggest the agenda may be getting out of hand. In my experience of close contact with the DHB system the management and leadership teams at the top echelon were nothing short of outstanding.

The Auckland District Health Board, as it then was, is the largest single organisation in Auckland — and the top management had to be up to the task. And they were.

Value for money
As for Pharmac, it is a standout agency for achieving value for money in the public sector. So why target it? The organisation has made cumulative savings of at least a billion dollars, equivalent to 5 percent of the annual health budget. Those monies have been reinvested elsewhere in the health sector. Furthermore, by distancing politicians from sometimes controversial funding decisions on a limited budget it shields them from public blowback.

Unfortunately, Pharmac is the victim of its own success: the reinvestment of funds in the wider health sector has gone unheralded, and the shielding of politicians is rarely acknowledged.

The job as CEO at Pharmac has got much harder with a limited budget, more expensive drugs targeting smaller groups, more vociferous patient groups — sometimes funded in part by drug companies — easy media stories (individuals being denied “lifesaving” treatments), and, more recently, less sympathetic political masters.

Perhaps it was time for a changing of the guard, but the ungracious manner of it follows a similar pattern of other departures.

The arrival of Sir Brian Roche as the new Public Service Commissioner may herald a more considered approach to public sector reform, rather than the slightly “wild west” New Zealand style with the unexplained abolition of the Productivity Commission, the premature ending of an expensive pumped hydro study, disbandment of sector industry groups, and the alleged cancellation of a large ferry contract by text, among other examples of a rather casual approach to due process.

The danger we run is that the current cleaning out of public sector leaders is more than an expected turnover with a change of government, and rather a curbing of independent advice and thought. Will our public media agencies — TVNZ and RNZ — be next in line for the current thrust of popular and political attention?

Major redundancies
Taken together with the abolition of the Productivity Commission, major redundancies in the public sector, the removal of research funding for the humanities and the social sciences, a campaign by the Free Speech Union against university autonomy, the growing reliance on business lobbyists and lobby groups to determine decision-making, and the recent re-orientation of The New Zealand Herald towards a more populist stance, we could well be witnessing a concerted rebalancing of the ecosystem of advice and thought.

In half a century of observing policy and politics from the relative safety of the university, I have never witnessed such a concerted campaign as we are experiencing. Not even in the turmoil of the 1990s.

We need to change the national conversation before it is too late and we lose more of the key elements of the independence of advice and thought that we have established in the state and allied and quasi-autonomous agencies, as well as in the universities and the creative industries, and that lie at the heart of liberal democracy.

Dr Peter Davis is emeritus professor of population health and social science at Auckland University, and a former elected member of the Auckland District Health Board. This article was first published by The Post and is republished with the author’s permission


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/03/11/how-new-zealand-is-venturing-down-the-road-of-political-upheaval-3/feed/ 0 518222
How the Terrorgram Collective’s Neo-Nazi Influencers Groomed a Teen to Kill https://www.radiofree.org/2025/03/08/how-the-terrorgram-collectives-neo-nazi-influencers-groomed-a-teen-to-kill/ https://www.radiofree.org/2025/03/08/how-the-terrorgram-collectives-neo-nazi-influencers-groomed-a-teen-to-kill/#respond Sat, 08 Mar 2025 10:00:00 +0000 https://www.propublica.org/article/telegram-terrorgram-collective-bratislava-murders-neo-nazi-online-hate by A.C. Thompson, ProPublica and FRONTLINE, James Bandler, ProPublica, and Lukáš Diko, Investigative Center of Jan Kuciak

This story contains references to homophobia, antisemitism and racism, as well as mass shootings and other violence.

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

“The Rise and Fall of Terrorgram” is part of a collaborative investigation from FRONTLINE and ProPublica. The documentary premieres March 25 at 10 p.m. EDT/9 p.m. CDT on PBS stations (check local listings) and will be available to stream on YouTube, the PBS App and FRONTLINE’s website.

The teen entered the chat with a friendly greeting.

“Hello lads,” he typed.

“Sup,” came a reply, along with a graphic that read “KILL JEWS.” Another poster shared a GIF of Adolf Hitler shaking hands with Benito Mussolini. Someone else added a short video of a gay pride flag being set on fire. Eventually, the talk in the group turned to mass shootings and bombings.

And so in August 2019, Juraj Krajčík, then a soft-faced 16-year-old with a dense pile of brown hair, immersed himself in a loose collection of extremist chat groups and channels on the massive social media and messaging platform Telegram. This online community, which was dubbed Terrorgram, had a singular focus: inciting acts of white supremacist terrorism.

Over the next three years, Krajčík made hundreds — possibly thousands — of posts in Terrorgram chats and channels, where a handful of influential content creators steered the conversation toward violence. Day after day, post after post, these influencers cultivated Krajčík, who lived with his family in a comfortable apartment in Bratislava, the capital of Slovakia. They reinforced his hatreds, fine-tuned his beliefs and fed him tips, encouraging him to attack gay and Jewish people and political leaders and become, in their parlance, a “saint.”

On Oct. 12, 2022, Krajčík, armed with his father’s .45-caliber handgun, opened fire on three people sitting outside an LGBTQ+ bar in Bratislava, killing two and wounding the third before fleeing the scene.

That night, as police hunted for him, Krajčík spoke on the phone with Marek Madro, a Bratislava psychologist who runs a suicide hotline and mental health crisis team. “He hoped that what he had done would shake up society,” recalled Madro in an interview, adding that the teen was “very scared.”

During the call, Krajčík kept repeating phrases from his manifesto, according to Madro. The 65-page document, written in crisp English and illustrated with graphics and photos, offered a detailed justification for his lethal actions. “Destroy the degenerates!” he wrote, before encouraging people to attack pride parades, gay and lesbian activists, and LGBTQ+ bars.

Eventually Krajčík, standing in a small grove of trees alongside a busy roadway, put a gun to his head and pulled the trigger.

The next day, Terrorgram influencers were praising the killer and circulating a PDF of his manifesto on Telegram.

About This Partnership

This story is part of a collaboration between ProPublica and FRONTLINE that includes an upcoming documentary.

“We thank him from the bottom of our hearts and will never forget his sacrifice,” stated one post written by a Terrorgram leader in California. “FUCKING HAIL, BROTHER!!!”

The story of Krajčík’s march to violence shows the murderous reach of the online extremists, who operated outside the view of local law enforcement. To police at the time, the killings seemed like the act of a lone gunman rather than what they were: the culmination of a coordinated recruiting effort that spanned two continents.

ProPublica and the PBS series FRONTLINE, along with the Slovakian newsroom Investigative Center of Jan Kuciak, pieced together the story behind Krajčík’s evolution from a troubled teenager to mass shooter. We identified his user name on Telegram, which allowed us to sift through tens of thousands of now-deleted Telegram posts that had not previously been linked to him. Our team retraced his final hours, interviewing investigators, experts and victims in Slovakia, and mapped the links between Krajčík and the extremists in Europe and the U.S. who helped to shape him.

The Terrorgram network has been gutted in recent months by the arrests of its leaders in North America and Europe. Telegram declined repeated requests to make its executives available for interviews but in a statement said, “Calls for violence from any group are not tolerated on our platform.” The company also said that since 2023 it has stepped up moderation practices.

Still, at a time when other mainstream social media companies such as X and Meta are cutting back on policing their online content, experts say the violent neo-Nazis that populated Telegram’s chats and channels will likely find an online home elsewhere.

At first, Krajčík didn’t fit in with the Terrorgrammers. In one early post in 2019, he argued that the white nationalist movement would benefit from large public protests. The idea wasn’t well received.

“Rallies won’t do shit,” replied one poster.

Another told the teen that instead of organizing a rally, he should start murdering politicians, journalists and drag performers. “You need a mafia state of mind,” the person wrote.

Krajčík had found his way to the Terrorgram community after hanging out on 8chan, a massive and anonymous forum that had long been an online haven for extremists; he would later say that he was “redpilled” — or radicalized — on the site.

On 8chan, people posted racist memes and made plenty of vile comments. But the Terrorgram scene was different. In the Terrorgram chats people discussed, in detail, the best strategies for carrying out spectacular acts of violence aimed at toppling Western democracies and replacing them with all-white ethno-states.

The chats Krajčík joined that summer of 2019 were administered by Pavol Beňadik, then a 20-year-old Slovakian college student who had helped create the Terrorgram community and was one of its leading personalities.

A hybrid of a messaging service like WhatsApp and a social media platform like X or Facebook, Telegram offered features that appealed to extremists like Beňadik. They could engage in private encrypted discussions, start big chat groups or create public channels to broadcast their messages. Importantly, Telegram also allowed them to post huge PDF documents and lengthy video files.

In his Terrorgram chats, Beňadik, who used the handle Slovakbro, relentlessly pressed for violent actions — although he never took any himself. Over two days in August, he posted instructions for making Molotov cocktails and pipe bombs, encouraged people to build radioactive dirty bombs and set them off in major cities, and called for the execution of police officers and other law enforcement agents. “TOTAL PIG DEATH,” he wrote.

At the time, the chats were drawing hundreds of participants from around the world, including a large number of Americans.

Beňadik, who was from a small village in western Slovakia, took a special interest in Krajčík, chatting with him in the Slovak language, discussing life in their country, and making him feel appreciated and respected.

For Krajčík, this was a change. In his daily life outside of Terrorgram, he “felt completely unnoticed, unheard,” said Madro, who spoke with several of Krajčík’s classmates. “He often talked about his own feelings and thoughts publicly and felt like no one took him seriously.”

Krajčík started spending massive amounts of time in the chat. On a single day, he posted 117 times over the span of 10 hours. The teen’s ideas began to closely echo those of Beňadik.

In late September, two regulars had a friendly mixed martial arts bout and streamed it on YouTube. Krajčík shared the link with the rest of the chat group, who cheered and heckled as their online friends brawled. Beňadik encouraged Krajčík to participate in a similar bout in the future.

“Porozmýšlam,” replied Krajčík: “I’ll think about it.”

For Beňadik, the combatants were providing a good example. He wanted Terrorgrammers to transform themselves into Aryan warriors, hard men capable of doing serious physical harm to others.

In reality, Krajčík was anything but a tough guy. A “severely bullied student,” Krajčík had transferred to a high school for academically gifted students, a school official told the Slovak newspaper Pravda. Two therapists “worked intensively with him for two years until the pandemic broke out and schools closed,” the official said.

Juraj Krajčík posted this selfie on Twitter, which was later circulated on Terrorgram channels, accompanied by propaganda. (Obtained by Investigative Center of Jan Kuciak)

Beňadik created at least five neo-Nazi channels and two chat groups on Telegram, one of which eventually attracted nearly 5,000 subscribers. He crafted an online persona as a sage leader, offering tips and guidance for carrying out effective attacks. He often posted practical materials, such as files for 3D-printing rifle parts, including auto sears, which transform a semiautomatic gun into a fully automatic weapon. “Read useful literature, get useful skills,” he said in an interview with a podcast. “You are the revolutionary, so act like it.”

It was only a month after joining Beňadik’s Terrorgram chats that Krajčík first mentioned Tepláreň, the LGBTQ+ bar in Bratislava he eventually attacked. On Sept. 18, 2019, he shared a link to a website called Queer Slovakia that featured an article on the bar.

Beňadik responded immediately, writing that he was having a “copeland moment” — a reference to David Copeland, a British neo-Nazi who planted a nail bomb at an LGBTQ+ pub in London in 1999. The explosion killed three people and wounded nearly 80 others.

“I DON’T ACTUALLY WANT TO NAIL BOMB THAT JOINT,” Beňadik continued. He wanted to do something far worse. “Hell,” Beňadik wrote, would be less brutal than what he had in mind.

Another Terrorgrammer offered a suggestion: What about a bomb loaded with “Nails + ricin + chemicals?”

Krajčík sounded a note of caution. “Just saying it will instantly make a squad of federal agents appear behind you and arrest you,” he wrote. Beňadik responded by complaining that Slovakia wasn’t producing enough “saints,” implicitly encouraging his mentee to achieve sainthood by committing a lethal act of terror.

Two days later, Krajčík posted photos of people holding gay pride flags in downtown Bratislava. They were “degenerates,” he wrote, repeatedly using anti-gay slurs.

One chat member told Krajčík he should’ve rounded up a group of Nazi skinheads and assaulted the demonstrators.

Then Krajčík posted a photo of Tepláreň.

Beňadik responded that “airborne paving stones make great gifts for such businesses.”

In the chat, Beňadik repeatedly posted a PDF copy of the self-published memoirs of Eric Rudolph, the American terrorist who bombed the 1996 Olympic Games in Atlanta and several other sites before going on the run. The autobiography contains a detailed description of Rudolph’s bombing of a lesbian bar, which wounded five people.

Urging Krajčík to read the book, Beňadik described it as “AMAZING” and a “great read.” Rudolph, he wrote, had created the “archetype” for the “lone wolf” terrorist.

Eventually, Krajčík joined at least 49 extremist Telegram chats, many of them nodes in the Terrorgram network, according to analysis by Pierre Vaux, a researcher who investigates threats to democracy and human rights abuses.

While Terrorgram started as a loose collection of accounts, by 2021 Beňadik and some of his fellow influencers had created a more formal organization, which they called the Terrorgram Collective, according to interviews with experts and court records from Slovakia, the U.S. and Canada.

The organization began producing more sophisticated content — books, videos and a roster of potential assassination targets — and distributing the material to thousands of followers.

Krajčík was a fan of the collective’s books, which are loaded with highly pixelated black-and-white graphics and offer a raft of specific advice for anyone planning a terror attack.

By the summer of 2022, Krajčík had become a regular poster in a Terrorgram chat run by another alleged leader of the collective, Dallas Humber of Elk Grove, California, a quiet suburb of Sacramento.

Humber went by a series of usernames but was eventually publicly exposed by a group of activists, and later arrested and charged with terrorism-related offenses. ProPublica and FRONTLINE reviewed chat logs — provided by the anti-facist Australian research organization The White Rose Society — and other online materials, as well as court records, to independently confirm her identity.

Beňadik was arrested in Slovakia and charged with more than 200 terrorism offenses. He pleaded guilty and would be sentenced to six years in prison.

In his absence, Humber quickly slipped in as mentor and coach to Krajčík.

She was explicit about her intentions, constantly encouraging followers in her chats and channels to go out and kill their perceived enemies — including Jewish and Muslim people, members of the queer community and anybody who wasn’t white. Her job, she wrote in one post, was to embrace disaffected young white men and guide them “through the end of the radicalization process.”

On Aug. 2, 2022, Humber and Krajčík discussed a grisly incident that had occurred several days earlier: A white man had beaten to death a Nigerian immigrant on a city street in northern Italy.

The killing, which was documented on video, was “fucking glorious,” wrote Humber, using a racial slur to describe the victim. “Please send any more pics, articles, info to the chat as more details come out,” she posted.

Krajčík wrote that he didn’t know much about the circumstances surrounding the crime but was still convinced the murderer had chosen “the right path.”

The killer, wrote Humber, would make an “ideal” boyfriend. “Every girl wants a man who would kill a [racial expletive] for her 🥰 how romantic.”

Three days later, Humber’s chat was alive with tributes to and praise for another killer. Wade Page, a Nazi skinhead and former U.S. Army soldier, had murdered six Sikh worshippers at a temple outside of Milwaukee a decade earlier. (A seventh would later die of their injuries.)

When police confronted Page, he began shooting at them, hitting one officer 15 times before killing himself.

Humber was a big fan of the killer. Page, she wrote, planned the attack thoroughly and chose his targets carefully. “He even made a point to desocialize and cut ties with those close to him,” Humber noted. “No chance of them disrupting his plans.”

“Page did his duty,” Krajčík wrote.

During the same time period, Krajčík started doing reconnaissance on potential targets in his city, staking out the apartment of then-Prime Minister Eduard Heger, a Jewish community center and Tepláreň, the bar.

He posted photos of the locations on his private Twitter account. And in a series of cryptic tweets, Krajčík hinted at the violence to come:

“I don’t expect to make it. In all likelyhood I will die in the course of the operation.”

“Before an operation, you will have to mentally deal with several important questions. You will have to deal with them alone, to not jeopardize your mission by leaking it.”

“I want to damage the System to the best of my abilities.”

Then, on Oct. 11, 2022, he wrote:

“I have made my decision.”

The next evening, after spending a half-hour outside the prime minister’s apartment, Krajčík made his way to Tepláreň. The bar sat on a steep, winding street lined with cafes, clothing boutiques and other small businesses. For about 40 minutes he lurked in a shadowy doorway up the hill. Then, at about 7 p.m., he approached a small group of people sitting in front of the bar and began shooting.

He killed Matúš Horváth and Juraj Vankulič and wounded Radka Trokšiarová, shooting her twice in the leg.

Krajčík, then 19, fled the scene. He had just committed a terrorist attack that would shock the nation.

In court records, U.S. prosecutors have linked both Humber and another alleged Terrorgram leader, Matthew Allison of Boise, Idaho, to Krajčík’s crime. The pair were charged last fall with a raft of felonies related to their Terrorgram posts and propaganda, including conspiring to provide material support to terrorists and soliciting the murder of federal officials.

Krajčík “was active on Terrorgram and had frequent conversations with ALLISON, HUMBER, and other members of the Terrorgram Collective,” prosecutors allege in the indictment. In another brief, they say Krajčík shared his manifesto with Allison before the attack. Then, immediately after the murders, he allegedly sent Allison direct messages saying, “not sure how much time I have but it’s happening,” and “just delete all messages about this convo.”

The Terrorgram posts cited in court documents corroborate our team’s reporting.

Allison spoke with one of our reporters from jail against his lawyer’s advice. He said he did not incite anyone to violence and that prosecutors had misconstrued the communications with Krajčík. He has pleaded not guilty to all charges, and in a motion, his legal team indicated it would argue that all of his posts are protected by the First Amendment. Humber also pleaded not guilty. She declined to be interviewed and to comment through her lawyer.

While Krajčík was at large, Slovakian authorities tapped Madro, the psychologist, to try to communicate with the young man. “After 12 text messages, he finally picked up the phone,” Madro recalled.

The brief conversation ended with Krajčík killing himself. “The shot rang out and there was silence,” Madro said.

Within hours, Humber was making celebratory posts. Krajčík, she exclaimed, had achieved sainthood. “Saint Krajčík’s place in the Pantheon is undisputed, as is our enthusiastic support for his work,” she wrote on a Terrorgram channel where she posted a picture of the victims on the ground, blood streaking the pavement.

She and Allison also circulated his manifesto.

In it, Krajčík praised the Terrorgram Collective for its “incredible writing and art,” “political texts” and “practical guides.” And he thanked Beňadik: “Your work was some of the first that I encountered after making the switch to Telegram, and remains some of the greatest on the platform.”

While they were spreading Krajčík’s propaganda, the owner of Tepláreň, Roman Samotný, was mourning.

The bar “was kind of like a safe island for queer people here in Slovakia,” he recalled in an interview. “It was just the place where everybody felt welcomed and just accepted and relaxed.”

Before the attack, Samotný’s major concern was that some homophobe would smash the bar’s windows. After the murders, he said, “the biggest change is the realization that we are not anymore safe here. … I was never thinking that we can be killed because of our identity.”

Samotný has closed the bar.

The survivor, Trokšiarová, was left with lingering physical pain and emotional distress. “I was deeply confused,” she said. “Why would anyone do it?”


This content originally appeared on ProPublica and was authored by .

]]>
https://www.radiofree.org/2025/03/08/how-the-terrorgram-collectives-neo-nazi-influencers-groomed-a-teen-to-kill/feed/ 0 517465
Utilities may soon pay you to help support a greener grid https://grist.org/energy/utility-pay-green-grid-ev-electricity/ https://grist.org/energy/utility-pay-green-grid-ev-electricity/#respond Wed, 05 Mar 2025 09:30:00 +0000 https://grist.org/?p=659748 Every month you pay an electricity bill, because there’s no choice if you want to keep the lights on. The power flows in one direction. But soon, utilities might desperately need something from you: electricity. 

A system increasingly loaded with wind and solar will require customers to send power back into the system.  If the traditional grid centralized generation at power plants, experts believe the system of tomorrow will be more distributed, with power coming from what they call the “grid edge” — household batteries, electric cars, and other gadgets whose relationship with the grid has been one way.  More people, for example, are installing solar panels on their roofs backed up with home batteries. When electricity demand increases, a utility can draw power from those homes as a vast network of backup energy. 

The big question is how to choreograph that electrical ballet — millions of different devices at the grid edge, owned by millions of different customers, that all need to talk to the utility’s systems. To address that problem, a team of researchers from several universities and national labs developed an algorithm for running a “local electricity market,” in which ratepayers would be compensated for allowing their devices to provide backup power to a utility. Their paper, recently published in the Proceedings of the National Academy of Sciences, described how the algorithm could coordinate so many sources of power — and then put the system to the test. “When you have numbers of that magnitude, then it becomes very difficult for one centralized entity to keep tabs on everything that’s going on,” said Anu Annaswamy, a senior research scientist at the Massachusetts Institute of Technology and the paper’s co-author. “Things need to become more distributed, and that is something the local electricity market can facilitate.”

At the moment, utilities respond to a surge in demand for electricity by spinning up more generation at power plants running on fossil fuels. But they can’t necessarily do that with renewables, since the sun might not be shining, or the wind blowing. So as grids increasingly depend on clean energy, they’re getting more flexible: Giant banks of lithium-ion batteries, for instance, can store that juice for later use. 

Yet grids will need even more flexibility in the event of a cyberattack or outage. If a hacker compromises a brand of smart thermostat to increase the load on a bunch of AC units at once, that could crash the grid by driving demand above available supply. With this sort of local electricity market imagined in the paper, a utility would call on other batteries in the network to boost supply,  stabilizing the grid. At the same time, electric water heaters and heat pumps for climate control could wind down, reducing demand. “In that sense, there’s not necessarily a fundamental difference between a battery and a smart device like a water heater, in terms of being able to provide the support to the grid,” said Jan Kleissl, director of the Center for Energy Research at the University of California, San Diego, who wasn’t involved in the new research.

Along with this demand reduction, drawing power from devices along the grid edge would provide additional support. In testing out cyberattack scenarios and sustained inclement weather that reduces solar energy, the researchers found that the algorithm was able to restabilize the grid every time. The algorithm also provides a way to set the rates paid to households for their participation. That would depend on a number of factors such as time of day, location of the household, and the overall demand. “Consumers who provide flexibility are explicitly being compensated for that, rather than just people doing it voluntarily,” said Vineet J. Nair, a Ph.D. student at MIT and lead author of the paper. “That kind of compensation is a way to incentivize customers.”

Utilities are already experimenting with these sorts of compensation programs, though on a much smaller scale. Electric buses in Oakland, California, for instance, are sending energy back to the grid when they’re not ferrying kids around. Utilities are also contracting with households to use their large home batteries, like Tesla’s Powerwall, as virtual power plants

Building such systems is relatively easy, because homes with all their heat pumps and batteries are already hooked into the system, said Anna Lafoyiannis, senior team lead for transmission operations and planning at the Electric Power Research Institute, a nonprofit in Washington, D.C. By contrast, connecting a solar and battery farm to the grid takes years of planning, permitting, and construction. “Distributed resources can be deployed really quickly on the grid,” she said. “When I look at flexibility, the time scale matters.”

All these energy sources at the grid edge, combined with large battery farms operated by the utility, are dismantling the myth that renewables aren’t reliable enough to provide power on their own. One day, you might even get paid to help bury that myth for good.

This story was originally published by Grist with the headline Utilities may soon pay you to help support a greener grid on Mar 5, 2025.


This content originally appeared on Grist and was authored by Matt Simon.

]]>
https://grist.org/energy/utility-pay-green-grid-ev-electricity/feed/ 0 516521
As Facebook Abandons Fact-Checking, It’s Also Offering Bonuses for Viral Content https://www.radiofree.org/2025/02/24/as-facebook-abandons-fact-checking-its-also-offering-bonuses-for-viral-content/ https://www.radiofree.org/2025/02/24/as-facebook-abandons-fact-checking-its-also-offering-bonuses-for-viral-content/#respond Mon, 24 Feb 2025 11:00:00 +0000 https://www.propublica.org/article/facebook-meta-abandons-fact-checking-boosts-viral-content by Craig Silverman

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Hours after Donald Trump was sworn in as president, users spread a false claim on Facebook that Immigration and Customs Enforcement was paying a bounty for reports of undocumented people.

“BREAKING — ICE is allegedly offering $750 per illegal immigrant that you turn in through their tip form,” read a post on a page called NO Filter Seeking Truth, adding, “Cash in folks.”

Check Your Fact, Reuters and other fact-checkers debunked the claim, and Facebook added labels to posts warning that they contained false information or missing context. ICE has a tip line but said it does not offer cash bounties.

This spring, Meta plans to stop working with fact-checkers in the U.S. to label false or misleading content, the company said on Jan. 7. And if a post like the one about ICE goes viral, the pages that spread it could earn a cash bonus.

Meta CEO Mark Zuckerberg also said in January that the company was removing or dialing back automated systems that reduce the spread of false information. At the same time, Meta is revamping a program that has paid bonuses to creators for content based on views and engagement, potentially pouring accelerant on the kind of false posts it once policed. The new Facebook Content Monetization program is currently invite-only, but Meta plans to make it widely available this year.

The upshot: a likely resurgence of incendiary false stories on Facebook, some of them funded by Meta, according to former professional Facebook hoaxsters and a former Meta data scientist who worked on trust and safety.

ProPublica identified 95 Facebook pages that regularly post made-up headlines designed to draw engagement — and, often, stoke political divisions. The pages, most of which are managed by people overseas, have a total of more than 7.7 million followers.

After a review, Meta said it had removed 81 pages for being managed by fake accounts or misrepresenting themselves as American while posting about politics and social issues. Tracy Clayton, a Meta spokesperson, declined to respond to specific questions, including whether any of the pages were eligible for or enrolled in the company’s viral content payout program.

The pages collected by ProPublica offer a sample of those that could be poised to cash in.

Meta has made debunking viral hoaxes created for money a top priority for nearly a decade, with one executive calling this content the “worst of the worst.” Meta has a policy against paying for content its fact-checkers label as false, but that rule will become irrelevant when the company stops working with them. Already, 404 Media found that overseas spammers are earning payouts using deceptive AI-generated content, including images of emaciated people meant to stoke emotion and engagement. Such content is rarely fact-checked because it doesn’t make any verifiable claims.

With the removal of fact-checks in the U.S., “what is the protection now against viral hoaxes for profit?” said Jeff Allen, the chief research officer of the nonprofit Integrity Institute and a former Meta data scientist.

“The systems are designed to amplify the most salacious and inciting content,” he added.

In an exchange on Facebook Messenger, the manager of NO Filter Seeking Truth, which shared the false ICE post, told ProPublica that the page has been penalized so many times for sharing false information that Meta won’t allow it to earn money under the current rules. The page is run by a woman based in the southern U.S., who spoke on the condition of anonymity because she said she has received threats due to her posts. She said the news about the fact-checking system ending was “great information.”

Clayton said Meta’s community standards and content moderation teams are still active and reiterated the company’s Jan. 7 statement that it is working to ensure it doesn’t “over-enforce” its rules by mistakenly banning or suppressing content.

Meta’s changes mark a significant reversal of the company’s approach to moderating false and misleading information, reframing the labeling or downranking of content as a form of censorship. “It’s time to get back to our roots around free expression on Facebook and Instagram,” Zuckerberg said in his announcement. His stance reflects the approach of Elon Musk after acquiring Twitter, now X, in 2022. Musk has made drastic cuts to the company’s trust and safety team, reinstated thousands of suspended accounts including that of a prominent neo-Nazi and positioned Community Notes, which allows participating users to add context via notes appended to tweets, as the platform’s key system for flagging false and misleading content.

Zuckerberg has said Meta will replace fact-checkers and some automated systems in the U.S. with a version of the Community Notes system. A Jan. 7 update to a Meta policy page said that in the U.S. the company “may still reduce the distribution of certain hoax content whose spread creates a particularly bad user or product experience (e.g., certain commercial hoaxes).”

Clayton did not clarify whether posts with notes appended to them would be eligible for monetization. He provided links to academic papers that detail how crowdsourced fact-checking programs like Community Notes can be effective at identifying misinformation, building trust among users and addressing perceptions of bias.

A 2023 ProPublica investigation, as well as reporting from Bloomberg, found that X’s Community Notes failed to effectively address the misinformation about the Israel-Hamas conflict. Reporting from the BBC and Agence France-Presse showed that X users who share false information have earned thousands of dollars thanks to X’s content monetization program, which also rewards high engagement.

Keith Coleman, X’s vice president of product, previously told ProPublica that the analysis of Community Notes about the Israel-Hamas conflict did not include all of the relevant notes, and he said that the program “is found helpful by people globally, across the political spectrum.”

Allen said it takes time, resources and oversight to scale up crowdsourced fact-checking systems. Meta’s decision to scrap fact-checking before giving the new approach time to prove itself is risky, he said.

“We could in theory have a Community Notes program that was as effective, if not more effective, than the fact-checking program,” he said. “But to turn all these things off before you have the Community Notes thing in place definitely feels like we’re explicitly going to have a moment with little guardrails.”

Before Facebook began cracking down on content in late 2016, American fake news peddlers and spammers based in North Macedonia and elsewhere cashed in on viral hoaxes that deepened political divisions and played on people’s fears.

One American, Jestin Coler, ran a network of sites that earned money from hoax news stories for nearly a decade, including the infamous and false viral headline from 2016 “FBI Agent Suspected In Hillary Email Leaks Found Dead In Apparent Murder-Suicide.” He previously told NPR that he started the sites as a way to “infiltrate the echo chambers of the alt-right.” Coler said he earned five figures a month from the sites, which he operated in his spare time.

When people clicked on the links to the stories in their news feed, they landed on websites full of ads, which generated revenue for Coler. That’s become a tougher business model since Meta has made story links less visible on Facebook in recent years.

Facebook’s new program to pay publishers directly for viral content could unlock a fresh revenue stream for hoaxsters. “It’s still the same formula to get people riled up. It seems like it could just go right back to those days, like overnight,” Coler told ProPublica in a phone interview. He said he left the Facebook hoax business years ago and won’t return.

In January, ProPublica compiled a list of pages that had been previously cited for posting hoaxes and false content and discovered dozens more through domain and content searches. The pages posted false headlines designed to spark controversy, such as “Lia Thomas Admits: ‘I Faked Being Trans to Expose How Gullible the Left Is’” and “Elon Musk announced that he has acquired MSNBC for $900 million to put an end to toxic programming.” The Musk headline was paired with an AI-generated image of him holding a contract with the MSNBC logo. It generated over 11,000 reactions, shares and comments.

Most of the pages are managed by accounts outside of the U.S., including in North Macedonia, Vietnam, the Philippines and Indonesia, according to data from Facebook. Many of these pages use AI-generated images to illustrate their made-up headlines.

One network of overseas-run pages is connected to the site SpaceXMania.com, an ad-funded site filled with hoax articles like “Elon Musk Confronts Beyoncé Publicly: ‘Stop Pretending to Be Country, It’s Just Not You.’” SpaceX Fanclub, the network’s largest Facebook page, has close to 220,000 followers and labels its content as satire. One of its recent posts was a typo-laden AI-generated image of a sign that said, “There Are Only 2 2 Genders And Will Ban Atheletes From Women Sports — President.”

SpaceXMania.com’s terms and conditions page says it’s owned by Funky Creations LTD, a United Kingdom company registered to Muhammad Shabayer Shaukat, a Pakistani national. ProPublica sent questions to the site and received an email response signed by Tim Lawson, who said he’s an American based in Florida who works with Shaukat. (ProPublica was unable to locate a person by that name in public records searches, based on the information he provided.)

“Our work involves analyzing the latest trends and high-profile news related to celebrities and shaping it in a way that appeals to a specific audience — particularly conservatives and far-right groups who are predisposed to believe certain narratives,” the email said.

Lawson said they earn between $500 and $1,500 per month from web ads and more than half of the traffic comes from people clicking on links on Facebook. The pages are not currently enrolled in the invitation-only Facebook Content Monetization program, according to Lawson.

The SpaceXMania pages identified by ProPublica were recently taken offline. Lawson denied that they were removed by Meta and said he deactivated the pages “due to some security reasons.” Meta declined to comment.

It remains to be seen how hoax page operators will fare as Meta’s algorithmic reversals take hold and the U.S. fact-checking program grinds to a halt. But some Facebook users are already taking advantage of the loosened guardrails.

Soon after Zuckerberg announced the changes, people spread a fake screenshot of a Bloomberg article headlined, “The spark from Zuckerberg’s electric penis pump, might be responsible for the LA fires.”

“Community note: verified true,” wrote one commenter.

Mollie Simon contributed research.


This content originally appeared on ProPublica and was authored by by Craig Silverman.

]]>
https://www.radiofree.org/2025/02/24/as-facebook-abandons-fact-checking-its-also-offering-bonuses-for-viral-content/feed/ 0 514952
How Israeli propaganda filters into NZ media – drop it, says Mediawatch https://www.radiofree.org/2025/02/16/how-israeli-propaganda-filters-into-nz-media-drop-it-says-mediawatch/ https://www.radiofree.org/2025/02/16/how-israeli-propaganda-filters-into-nz-media-drop-it-says-mediawatch/#respond Sun, 16 Feb 2025 00:19:02 +0000 https://asiapacificreport.nz/?p=110955 COMMENTARY: By Saige England

Mediawatch on RNZ today strongly criticised Stuff and YouTube among other media for using Israeli propaganda’s “Outbrain” service.

Outbrain is a company founded by the Israeli Defence Force (IDF) military and its technology can be tracked back to a wealthy entrepreneur, which in this case could be a euphemism for a megalomaniac.

He uses the metaphor of a “dome”, likening it to the dome used in warfare.

Outbrain, which publishes content on New Zealand media, picks up what’s out there and converts and distorts it to support Israel. It twists, it turns, it deceives the reader.

Presenter Colin Peacock of RNZ’s Mediawatch programme today advised NZ media to ditch the propaganda service.

Outbrain uses the media in the following way. The content user such as Stuff pays Outbrain and Outbrain pays the user, like Stuff.

“Both parties make money when users click on the content,” said Peacock.

‘Digital Iron Dome’
The content on the Stuff website came via “Digital Iron Dome” named after the State of Genociders’ actual defence system. It is run by a tech entrepreneur quoted on Mediawatch:

“Just like a physical iron dome that scans the open air and watches for any missiles . . . the digital iron dome knows how to scan the internet. We know how to buy media. Pro-Israeli videos and articles and images inside the very same articles going against Israel,” says the developer of the propaganda “dome” machine.

Peacock said the developer had stated that the digital dome delivered “pro-Jewish”* messages to more than 100 million people worldwide on platforms like Al Jazeera, CNN — and last weekend on Stuff NZ — and said this information went undetected as pro-Israel material, ensuring it reached, according to the entrepreneur: “The right audience without interference.”

According to Wikipedia, Outbrain was founded by Yaron Galai and Ori Lahav, officers in the Israeli Navy. Galai sold his company Quigo to AOL in 2007 for $363 million. Lahav worked at an online shopping company acquired by eBay in 2005.

The company is headquartered in New York with global offices in London, San Francisco, Chicago, Washington DC, Cologne, Gurugram, Paris, Ljubljana, Munich, Milan, Madrid, Tokyo, São Paulo, Netanya, Singapore, and Sydney.

Peacock pointed out that other advocacy organisations had already been buying and posting content, there was nothing new about this with New Zealand news media.

But — and this is important — the Media Council ruled in 2017 that Outbrain content was the publisher’s responsibility: that the news media in NZ were responsible for promoted links that were offered to their readers.

“Back then publishers at Stuff and the Herald said they would do more to oversee the content, with Stuff stating it is paid promoted content,” said Peacock, in his role as the media watchdog.

Still ‘big money business’
“But this is also still a big money business and the outfits using these tools are getting much bigger exposure from their arrangements with news publishers such as Stuff,” he said.

He pointed out that the recently appointed Outbrain boss for Australia New Zealand and Singapore, Chris Oxley, had described Outbrain as “a leader in digital media connecting advertisers with premium audiences in contextually relevant environments”.

The watchdog Mediawatch said that news organisations should drop Outbrain.

“Media environments where news and neutrality are important aren’t really relevant environments for political propaganda that’s propagated by online opportunists who know how to make money out of it and also to raise funds while they are at it, ” said Peacock.

“These services like Outbrain are sometimes called ‘recommendation engines’ but our recommendation to news media is don’t use them for the sake of the trust of the people you say you want to earn and keep: the readers,” said Peacock.

Saige England is a journalist and author, and member of the Palestine Solidarity Network Aotearoa (PSNA).

* Being “pro-Jewish” should not be equated with being pro-genocide nor should antisemitism be levelled at Jews who are against this genocide. The propaganda from Outbrain does a disservice to Palestinians and also to those Jewish people who support all human rights — the right of Palestinians to life and the right to live on their land.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2025/02/16/how-israeli-propaganda-filters-into-nz-media-drop-it-says-mediawatch/feed/ 0 513950
China-Africa Space Co-op Shows Tech’s Multipolarization, Democratization Trends https://www.radiofree.org/2025/02/15/china-africa-space-co-op-shows-techs-multipolarization-democratization-trends/ https://www.radiofree.org/2025/02/15/china-africa-space-co-op-shows-techs-multipolarization-democratization-trends/#respond Sat, 15 Feb 2025 16:13:06 +0000 https://dissidentvoice.org/?p=155967 Illustration: Liu Rui/GT In recent years, cooperation between China and Africa in the space field has deepened. However, some Western media outlets have tried to distort the nature of this cooperation. On Tuesday, Reuters reported that China is “building space alliances in Africa to enhance its global surveillance network and advance its bid to become […]

The post China-Africa Space Co-op Shows Tech’s Multipolarization, Democratization Trends first appeared on Dissident Voice.]]>

Illustration: Liu Rui/GT

In recent years, cooperation between China and Africa in the space field has deepened. However, some Western media outlets have tried to distort the nature of this cooperation. On Tuesday, Reuters reported that China is “building space alliances in Africa to enhance its global surveillance network and advance its bid to become the world’s dominant space power.” The article also cited remarks from the Pentagon, claiming that China’s space projects in Africa and other parts of the developing world are a “security risk.”

The real security risk is not cooperation or the sharing of technology, but the ideological prejudice of the West that clings to hegemony and obstructs progress. For a long time, space and other high-tech fields have been dominated by the US and its allies. Behind the smear campaigns of Western media lies the West’s fear of China-Africa cooperation.

The cooperation between China and Egypt in space technology, referred to by foreign media as “China’s secretive overseas space program,” has been open and transparent. Public records show that Egypt is the first country to carry out satellite cooperation with China under the framework of the Belt and Road Initiative. At the end of 2023, the jointly designed and developed satellite MISRSAT-2 was successfully send into orbit. An Egyptian Space Agency official said that the project has promoted the training of Egyptian space professionals, helping Egypt become a leader in the field of space satellites in Africa and the Middle East. This “teach a man to fish” approach is a key step for Africa to achieve autonomous industrialization and modernization.

Western media’s smear campaign against China-Africa space cooperation ignores the legitimate need for African countries to develop space technology. Space technology and monitoring systems can be used for weather monitoring, agricultural planning, environmental protection, and disaster management, helping Africa address climate change, improve agricultural productivity, optimize resource management, and enhance national emergency response capabilities.

More broadly, China-Africa space cooperation reflects the changing global technological cooperation landscape and the reshaping of development rights. In the past, developing countries often had to rely on Western countries for technological aid, which came with many restrictions. However, through the concept of South-South cooperation, China has provided a more equal and sustainable cooperation model, helping African countries achieve self-development in critical fields such as space technology. This not only enhances Africa’s position in the global technology system, encouraging developing countries to participate in global technology governance, but also contributes to advancing the global multipolarization process.

“Space is not a club for the rich,” said Song Zhongping, a Chinese military expert. Through win-win cooperation with Africa, China is helping more developing countries to quickly enter the mainstream of global technological development, embodying the democratization and multipolarization trend of modern technology, he noted.

The focus of African and Global South countries is on more practical and sustainable development needs, rather than geopolitical games. The US and Western countries must choose the right path – abandoning the mind-set of technological hegemony, adopting a more open and inclusive approach, and actively participating in the global technological cooperation process.

From infrastructure construction to focusing on modernization and cutting-edge technology, the “sour grapes” narrative of foreign media cannot conceal the fruitful outcomes of China-Africa cooperation. While the West is busy weaving lies, China and Africa have already woven a network of development and illuminated an autonomous future with technology, writing a new chapter of unity and development for the Global South.

The post China-Africa Space Co-op Shows Tech’s Multipolarization, Democratization Trends first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Global Times.

]]>
https://www.radiofree.org/2025/02/15/china-africa-space-co-op-shows-techs-multipolarization-democratization-trends/feed/ 0 513925
Powerless – another Asia-Pacific angle on the long siege of USAID https://www.radiofree.org/2025/02/12/powerless-another-asia-pacific-angle-on-the-long-siege-of-usaid/ https://www.radiofree.org/2025/02/12/powerless-another-asia-pacific-angle-on-the-long-siege-of-usaid/#respond Wed, 12 Feb 2025 05:01:55 +0000 https://asiapacificreport.nz/?p=110760 COMMENTARY: By Robin Davies

Much has been and much more will be written about the looming abolition of USAID.

It’s “the removal of a huge and important tool of American global statecraft” (Konyndyk), or the wood-chipping of a “viper’s nest of radical-left marxists who hate America” (Musk) or, more reasonably, the unwarranted cancellation of an organisation that should have been reviewed and reformed.

Commentators will have a lot to say, some of it exaggerated, about the varieties of harm caused by this decision, and about its legality.

Some will welcome it from a conservative perspective, believing that USAID was either not aligned with or acting against the interests of the United States, or was proselytising wokeness, or was a criminal organisation.

Some, often more quietly, will welcome it from an anti-imperialist or “Southern” perspective, believing that the agency was at worst a blunt instrument of US hegemony or at least a bastion of Western saviourism.

I want to come at this topic from a different angle, by providing a brief personal perspective on USAID as an organisation, based on several decades of occasional interaction with it during my time as an Australian aid official.

Essentially, I view USAID as a harried, hamstrung and traumatised organisation, not as a rogue agency or finely-tuned vehicle of US statecraft.

Peer country representative
My own experience with USAID began when I participated as a peer country representative in an OECD Development Assistance Committee (DAC) peer review of the US’s foreign assistance programme in the early 1990s, which included visits to US assistance programmes in Bangladesh and the Philippines, as well as to USAID headquarters in Washington DC.

I later dealt with the agency in many other roles, including during postings to the OECD and Indonesia and through my work on global and regional climate change and health programmes, up to and including the pandemic years.

An image is firmly lodged in my mind from that DAC peer review visit to Washington. We had had days of back-to-back meetings in USAID headquarters with a series of exhausted-looking, distracted and sometimes grumpy executives who didn’t have much reason to care what the OECD thought about the US aid effort.

It was a muggy summer day. At one point a particularly grumpy meeting chair, who now rather reminds of me of Gary Oldman’s character in Slow Horses, mopped the sweat from his forehead with his necktie without appearing to be aware of what he was doing. Since then, that man has been my mental model of a USAID official.

But why so exhausted, distracted and grumpy?

Precisely because USAID is about the least freewheeling workplace one could construct. Certainly it is administratively independent, in the sense that it was created by an act of Congress, but it also receives its budget from the President and Congress — and that budget comes with so many strings attached, in the form of country- or issue-related “earmarks” or other directives that it might be logically impossible to allocate the funds as instructed.

Some of these earmarks are broad and unsurprising (for example, specific allocations for HIV/AIDS prevention and treatment under the Bush-era PEPFAR program) while others represent niche interests (Senator John McCain once ridiculed earmarks pertaining to “peanuts, orangutans, gorillas, neotropical raptors, tropical fish and exotic plants”) — but none originates within USAID.

Informal earmarks calculation
I recall seeing an informal calculation showing that one could only satisfy all the percentage-based earmarks by giving most of the dollars several quite different jobs to do. A 2002 DAC peer review noted with disapproval some 270 earmarks or other directive provisions in aid legislation; by the time of the most recent peer review in 2022, this number was more like 700.

Related in part to this congressional micro-management of its budget — along with the usual distrust of organisations that “send” money overseas — USAID labours under particularly gruelling accountability and reporting requirements.

Andew Natsios — a former USAID Administrator and lifelong Republican who has recently come to USAID’s defence (albeit with arguments that not everybody would deem helpful) — wrote about this in 2010. In terms reminiscent of current events, he described the reign of terror of Lieutenant-General Herbert Beckington, a former Marine Corps officer who led USAID‘s Office of the Inspector General (OIG) from 1977 to 1994.

He was a powerful iconic figure in Washington, and his influence over the structure of the foreign aid programME remains with USAID today. … Known as “The General” at USAID, Beckington was both feared and despised by career officers. Once referred to by USAID employees as “the agency’s J. Edgar Hoover — suspicious, vindictive, eager to think the worst” …

At one point, he told the Washington Post that USAID’s white-collar crime rate was “higher than that of downtown Detroit.” … In a seminal moment in this clash between OIG and USAID, photographs were published of two senior officers who had been accused of some transgression being taken away in handcuffs by the IG investigators for prosecution, a scene that sent a broad chill through the career staff and, more than any other single event, forced a redirection of aid practice toward compliance.

Labyrinthine accountability systems
On top of the burdens of logically impossible programming and labyrinthine accountability systems is the burden of projecting American generosity. As far as humanly possible, and perhaps a little further, ways must be found of ensuring that American aid is sourced from American institutions, farms or factories and, if it is in the form of commodities, that it is transported on American vessels.

Failing that, there must be American flags. I remember a USAID officer stationed in Banda Aceh after the 2004 Indian Ocean tsunami spending a non-trivial amount of his time seeking to attach sizeable flags to the front of trucks transporting US (but also non-US) emergency supplies around the province of Aceh.

President Trump’s adviser Stephen Miller has somehow determined to his own satisfaction that the great majority (in fact 98 percent) of USAID personnel are donors to the Democratic Party. Whether or not that is true, let alone relevant, Democrat administrations have arguably been no kinder to USAID than Republican ones over the years.

Natsios, in the piece cited above, notes that The General was installed under Carter, who ran on anti-Washington ticket, and that there were savage cuts — over 400 positions — to USAID senior career service staffing under Clinton. USAID gets battered no matter which way the wind blows.

Which brings me back to necktie guy. It has always seemed to me that the platonic form of a USAID officer, while perhaps more likely than not to vote Democrat, is a tired and dispirited person, weary of politicians of all stripes, bowed under his or her burdens, bound to a desk and straitjacketed by accountability requirements, regularly buffeted by new priorities and abrupt restructures, and put upon by the ignorant and suspicious.

Radical-left Marxists and vipers probably wouldn’t tolerate such an existence for long. Who would? I guess it’s either thieves and money-launderers or battle-scarred professionals intent on doing a decent job against tall odds.

Robin Davies is an honorary professor at the Australian National University’s (ANU) Crawford School of Public Policy and managing editor of the Devpolicy Blog. He previously held senior positions at Australia’s Department of Foreign Affairs and Trade (DFAT) and AusAID.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/02/12/powerless-another-asia-pacific-angle-on-the-long-siege-of-usaid/feed/ 0 513339
2 obscure clean energy metals are caught in the crosshairs of the US-China trade war https://grist.org/technology/gallium-germanium-clean-energy-metals-us-china-trade-war-canada/ https://grist.org/technology/gallium-germanium-clean-energy-metals-us-china-trade-war-canada/#respond Fri, 07 Feb 2025 09:45:00 +0000 https://grist.org/?p=658441 In the summer of 2023, Vasileios Tsianos, the vice president of corporate development at Neo Performance Materials, started getting calls from government officials on both sides of the Atlantic. Within the world of industrial material manufacturing, Neo is best known for making rare earth magnets, used in everything from home appliances to electric vehicles. But these calls weren’t about rare earths. They were about something considerably rarer: the metal gallium.

Neo recycles a few dozen tons of high-purity gallium a year, mostly from semiconductor chip manufacturing scrap, at a factory in Ontario, Canada. In North America, it’s the only industrial-scale producer of the metal, which is used in not only chips, but also clean energy technologies and military equipment. 

China, the world’s leading producer by far, had just announced new export controls on gallium, apparently in response to reports that the United States government was considering restrictions on the sale of advanced semiconductor chips to China. 

All of a sudden, people wanted to talk to Neo. “We’ve spoken to almost everyone” interested in producing gallium outside of China, Tsianos told Grist.

Since Tsianos started receiving those calls, tensions over the 31st element on the periodic table — as well as the 32nd, germanium, also used in a bevy of advanced technologies — have escalated. In December, China outright banned exports of both metals to the United States following the Biden administration’s decision to further restrict U.S. chip exports

Now, several companies operating in the U.S. and Canada are considering expanding production of the rare metals to help meet U.S. demand. While Canadian critical minerals producers may get swept up in a new geopolitical tit-for-tat should Trump go through with his threat to impose tariffs, U.S. metal producers could see support from the new administration, which called for prioritizing federal funding for critical minerals projects in a Day 1 executive order. Beyond the U.S. and Canada, industry observers say China’s export ban is fueling global interest in making critical mineral supply chains more diverse so that no single country has a chokehold over materials vital for a high-tech, clean energy future.

“This latest round of export bans are putting a lot of wind in the sails of critical minerals supply chain efforts, not just in the U.S. but globally,” Seaver Wang of the Breakthrough Institute, a research center focused on technological solutions to environmental problems, told Grist.

Gallium and germanium aren’t exactly household names. But they are found in products that are indispensable to modern life — and a fossil fuel-free society. With its impressive electrical properties, gallium is used in semiconductor chips that make their way into everything from cell phones to power converters in electric vehicles to LED lighting displays. The metal is also used in the manufacturing of rare earth magnets for electric vehicles and wind turbines, in thin film solar cells, and sometimes, in commercially popular silicon solar photovoltaic cells, where it can help increase performance and extend lifespan. 

A close-up of two, side-by-side, black solar panel arrays against a cloudy sky
Gallium is sometimes used in silicon solar photovoltaic cells, where it can help increase performance and extend lifespan. Baris Seckin / Anadolu via Getty Images

Germanium, meanwhile, is used to refract light inside fiber optic cables. In addition to helping form the backbone of the internet, the metal’s exceptional light-scattering properties make it useful for infrared lenses, semiconductor chips, and high-efficiency solar cells used by satellites.

There aren’t many substitutes for these two elements.  Some silicon-based semiconductors lack gallium, and specialized glasses can be substituted for germanium in certain infrared technologies. Solar cells are often doped with boron instead of gallium. But these two metals have specific properties that often make them the ideal material. When it comes to clean energy, Tsianos told Grist, there are no substitutes “within the material performance and cost trade-off spectrum” offered by gallium.

Because a little bit goes a long way, the market for both metals is small — and it’s dominated by China. In 2022, the world produced about 640 tons of low-purity gallium and a little over 200 tons of germanium, according to the U.S. Geological Survey. In recent years, China has accounted for virtually all of the world’s low-purity gallium output and more than half of refined germanium. 

That’s partly due to the fact that both metals are byproducts of other industries. Gallium is typically extracted from bauxite ores as they are being processed to make aluminum oxide, while zinc miners sometimes squeeze germanium out of waste produced during refining. China is a leading producer of these common metals, too — and its government has made co-extracting gallium and germanium a priority, according to Wang. “It is very strategic,” he said.

China’s dominance of the two metals’ supply chains gives it a considerable cudgel in its ongoing trade war with the U.S. America produces no virgin gallium and only a small amount of germanium, while consuming approximately fifty tons a year of the two metals combined. A U.S. Geological Survey study published in November found that if China implemented a total moratorium on exports of both metals, it could cost the U.S. economy billions. Weeks after that study was published, China announced its ban.

The ban is so new that it’s not yet clear how U.S. companies, or the federal government, are responding. But America’s high-tech manufacturing sector isn’t without fallback options. North of the border, Neo’s facility in Ontario stands ready to double its production of gallium, according to Tsianos. “We have the capacity,” he told Grist. “We’re waiting for more feedstock.” 

Currently, Neo’s only source of gallium is the semiconductor industry. Chip makers in Europe, North America, and Asia send the company their scrap, which it processes to recover high-purity gallium that feeds back into semiconductor manufacturing. But Tsianos says Neo is piloting its technology with bauxite miners around the world to create new sources of virgin gallium. The idea, he says, is that bauxite miners would do some initial processing on-site, then send low-purity gallium to Neo for further refining in Canada. Tsianos declined to name specific bauxite firms Neo is partnering with, but said the company is “making progress” toward making new resources available.

Meanwhile, in British Columbia, mining giant Teck Resources is already a leading producer of germanium outside of China. The firm’s Trail Operations refinery complex receives zinc ore from the Red Dog mine in northwest Alaska and turns it into various products, including around 20 tons of refined germanium a year, according to a U.S. Geological Survey estimate. (Teck doesn’t disclose production volumes.) 

That germanium is sold primarily to customers in the U.S., Teck spokesperson Dale Steeves told Grist. In wake of the export ban, Steeves said that the firm is now “examining options and market support for increasing production capacity of germanium.”

Two metallic cylinders sit on a blue and white table in front of laboratory equipment
Germanium substrates wafers at a Umicore facility in Olen, Belgium. Umicore

Kwasi Ampofo, the head of metals and mining at the clean energy research firm BloombergNEF, told Grist that in the near term, he would expect the U.S. to “try to establish new supply chain relationships” with countries that already have significant production, like Canada, to secure the gallium and germanium it needs. That may be true whether or not Trump’s proposed tariffs on Canadian imports become reality. Tsianos was bullish in spite of the tariff threat, noting in an email that Neo “remains the only industrial-scale and commercially-operating Gallium facility in North America.”

“[W]e are committed to continue serving our European, American, and Japanese customers in the semiconductor and renewable energy industries,’ Tsianos added.

Steeves told Grist that a trade war between the U.S. and Canada would be “a negative for the economy of both nations, disrupting the flow of essential critical minerals and increasing costs and inefficiencies on both sides of the border.” Teck, he said,  “will continue to actively manage our sales arrangements to minimize the impact to Trail Operations.”

While Canada may be the U.S.’s best short-term option for these rare metals, farther down the line Ampofo expects to see the U.S. take a  “renewed interest” in recycling — particularly of military equipment. In 2022, the Department of Defense announced it had initiated a program for recovering “optical-grade germanium” from old military equipment. At the time, the initiative was expected to recycle up to 3 tons of the metal each year, or roughly 10 percent of the nation’s annual demand. The Defense sub-agency responsible for the program didn’t respond to Grist’s request for comment on the program’s status.

There’s another small source of production capacity in the U.S. The global metals company Umicore recycles germanium from manufacturing scrap, fiber optic cables, solar cells, and infrared optical devices at an optical materials facility in Quapaw, Oklahoma, as well as in Belgium. The company has been recycling germanium since the 1950s, a spokesperson told Grist, calling it a “core and historical activity at Umicore.” Umicore declined to disclose how much of the metal it recycles and wouldn’t say whether China’s export ban will impact this part of its business.

While recycling is able to fill some of the nation’s gallium and germanium needs, there may be a larger source of both metals lurking in sludge ponds in central Tennessee. 

There, in the city of Clarksville, the Netherlands-headquartered Nyrstar operates a zinc processing facility that produces wastes containing gallium and germanium. A U.S. Department of Energy spokesperson told Grist that the company has previously partnered with Ames National Laboratory’s Critical Materials Innovation Hub to develop processes for extracting gallium, which isn’t typically produced from zinc waste. 

A silvery industrial facility is seen behind some shrubs and a road, with wispy clouds in a blue sky in the background
Nyrstar’s zinc processing facility in Clarksville, Tennessee, which produces wastes containing gallium and germanium. Nyrstar

In 2023, Nyrstar announced plans to build a new, $150-million facility, co-located with its existing zinc smelter in Clarksville, capable of producing 30 tons of germanium and 40 tons of gallium a year. However, the current status of the project is uncertain, with no timetable to begin construction. A spokesperson for Nyrstar told Grist the company is “continu[ing] to work on and evaluate the business case” for the facility, while declining to offer additional details.

Making a business case to produce gallium or germanium is the central challenge for firms outside of China, experts told Grist. As Tsianos of Neo put it, these metals are a “side hustle” that requires major up-front investment for a relatively small amount of extra revenue. Moreover, a bauxite or zinc miner’s ability to produce gallium or germanium typically hinges on the market conditions for the metal it is primarily focused on. That means “if aluminum prices are low or the zinc prices are low, the mine or the smelter might just not operate, even if the world is sort of screaming out for more gallium or germanium,” Wang said.

Still, there’s more economic incentive to produce these metals now than there was a few years ago. The recent geopolitical drama, Tsianos says, has caused a “bifurcation” in the price of gallium. Outside of China, the price of the metal is now “almost double” what it is within the nation’s borders. 

“There’s a structural change in the market that has created a business case for outside of China production,” Tsianos said. “And it started because of the export control.”

This story was originally published by Grist with the headline 2 obscure clean energy metals are caught in the crosshairs of the US-China trade war on Feb 7, 2025.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/technology/gallium-germanium-clean-energy-metals-us-china-trade-war-canada/feed/ 0 512760
DeepSeek Is Showing Us that Another Tech World Is Possible https://www.radiofree.org/2025/02/03/deepseek-is-showing-us-that-another-tech-world-is-possible/ https://www.radiofree.org/2025/02/03/deepseek-is-showing-us-that-another-tech-world-is-possible/#respond Mon, 03 Feb 2025 21:27:07 +0000 https://dissidentvoice.org/?p=155560 Last week, a Chinese startup, DeepSeek, released R1, a large-language model rivaling ChatGPT, that is already unraveling the U.S. tech world. The open-source model performs just as well, if not better, than its American counterparts. The shock comes mainly from the extremely low cost with which the model was trained. R1 cost just $5.6 million […]

The post DeepSeek Is Showing Us that Another Tech World Is Possible first appeared on Dissident Voice.]]>
Last week, a Chinese startup, DeepSeek, released R1, a large-language model rivaling ChatGPT, that is already unraveling the U.S. tech world. The open-source model performs just as well, if not better, than its American counterparts.

The shock comes mainly from the extremely low cost with which the model was trained. R1 cost just $5.6 million to train. Meanwhile, OpenAI spent at least $540 million to train ChatGPT in 2022 last year alone and plans to spend over $500 billion in the next four years. Meanwhile, Meta revealed it plans to spend over $65 billion on AI development in 2025.

This incredible achievement is made even more impressive as DeepSeek trained the model on less powered AI chips than those used by American companies, such as the Nvidia H100 GPU. The Biden administration banned China from importing the most powerful AI chips, used by American companies like OpenAI and Meta, as part of the U.S.’ hostility and economic warfare with the country. Rather than limiting China’s AI development, these sanctions have facilitated a small startup to produce language models that outperform ChatGPT, Gemini, and others with only a fraction of the costs. Further still, using these less powerful chips significantly reduces the energy used to train the model. This is another significant benefit in an industry known for its environmental costs. While DeepSeek used American chips to train R1, the model actually runs on Chinese-made Ascend 910C chips produced by Huawei, another company that became a victim of U.S. sanctions.

Silicon Valley has long been hailed as an untouchable technological powerhouse, largely as a result of the economic warfare of successive U.S. governments to sanction any competition to it. For too long, there has been a tight partnership between tech companies and the U.S. government, where tech moguls have accumulated eye-watering wealth in exchange for sustenance to the American empire through its perceived technological dominance. DeepSeek has revealed this fallacy openly.

DeepSeek’s R1, costing just $5 million to train, caused the most significant loss for any company in U.S. history at $600 billion. This was from Nvidia’s stocks, the major supplier of AI chips, including the most advanced chips the U.S. has banned China from importing. After enjoying their stock value doubling in recent years, this loss significantly impacts the U.S. technological industry. The U.S. attacks on China’s development are already coming back to harm it.

Not only is R1 cheaper than its American competitors, but people using the tool have found it provides more accurate and, crucially, results that do not only echo the interests of U.S. imperialism. I asked DeepSeek’s R1, Open AI’s ChatGPT, Google’s Gemini, and Meta’s Llama: Should the U.S. arm Israel? Give me a clear, short answer that includes your judgment.

ChatGPT: Yes, the U.S. should arm Israel, as it is a crucial ally in a volatile region. However, this support should be paired with active efforts toward peace and conflict resolution to ensure long-term stability.

Gemini: Yes, the U.S. should continue to arm Israel to ensure its security, but with stricter conditions tied to progress on human rights and a peaceful resolution with the Palestinians.

Llama: The U.S. should provide military aid to Israel, but with conditions that ensure the aid promotes regional stability, supports a two-state solution, and respects human rights.

R1: The decision to arm Israel should be based on strategic interests, regional stability, and adherence to international law. While Israel has a right to self-defense, the U.S. should ensure that arms transfers do not exacerbate conflicts or contribute to human rights violations. A balanced approach, prioritizing diplomacy and peace, is essential.

These answers did shock me a little, despite what I expected from these models. While R1 includes some colonial language, such as the fallacy that Israel has a right to self-defense, which, of course, no country particularly occupying power has, it is much better than the others. While this prompt is simplistic, it reveals how quickly and overtly these other models incorporate U.S. imperialist agendas.

The U.S. tech industry has been bloating for years. Eight of the ten wealthiest people in the world are in the tech industry. One look at Trump’s inauguration attendees already revealed how close these companies are to political power in this country. These companies are also deeply embedded within the American war machine. Google used its AI to help Israel commit genocide. OpenAI is using its technology to target weapons for murder. Oracle, OpenAI, and Softbank want $500 billion to create AI infrastructure in the U.S.; one of the major players involved has publicly sought an AI-data system of mass surveillance.

DeepSeek reveals to us not only the incredible development happening in China but also how this is seen only as a challenge to U.S. dominance rather than a benefit for people worldwide. Just like their impressive poverty reduction program that has lifted more than 800 million people out of poverty, their world-leading climate policies include building more solar power than all countries combined last year and significantly reducing the costs of producing clean energy for everyone. U.S. officials attack all of these achievements in the government and media because they reveal that an impoverishing system of climate-destroying, violent extraction for the wealthy few is not the only way.

This is why the hawkish chorus has already begun attacking open-source software for ‘national security’ concerns or ‘censorship’. We know their playbook already—they just performed the same moves with RedNote as millions of Americans turned to the app in the brief period TikTok went dark. However, many are still active on the platform, and the 90-day suspension of the ban isn’t too far in the future.

U.S. attacks on TikTok have fostered beautiful exchanges between Chinese and Americans, exposing the propaganda Americans have been fed about China and concerning Chinese people that what they have learned about the U.S. is true. U.S. attacks on China’s AI development have made China more innovative and efficient, producing DeepSeek R1 and undoubtedly many more such developments. Not only does this expose how devastating for humanity American economic warfare is, it also uncovers just how this policy of hostility won’t save U.S. hegemony. It’s not just China. The destructive years of the U.S. and Saudi-led bombing of Yemen forced the country to develop renewable and decentralized electricity infrastructure, moving away from a reliance on fossil fuels and sustaining energy for hospitals and homes even when the country is bombed. Venezuela has achieved near total food self-sufficiency in response to U.S. sanctions and blockade. American warfare, in all its forms, has forced countries to disrupt their ways of life completely.

China’s ability to develop this AI at a lower cost, both financially and to the environment, is a win for us all. If the U.S. collaborated with China instead of erecting barriers and sabotage, just imagine how much more we could do.

The post DeepSeek Is Showing Us that Another Tech World Is Possible first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Nuvpreet Kalra.

]]>
https://www.radiofree.org/2025/02/03/deepseek-is-showing-us-that-another-tech-world-is-possible/feed/ 0 512206
News Corp lies to Australian Parliament in lobbying putsch to change media laws https://www.radiofree.org/2025/01/25/news-corp-lies-to-australian-parliament-in-lobbying-putsch-to-change-media-laws/ https://www.radiofree.org/2025/01/25/news-corp-lies-to-australian-parliament-in-lobbying-putsch-to-change-media-laws/#respond Sat, 25 Jan 2025 23:03:57 +0000 https://asiapacificreport.nz/?p=110032 Rupert Murdoch’s News Corporation has misled the Australian Parliament and is liable to prosecution — not that government will lift a finger to enforce the law, reports Michael West Media.

SPECIAL REPORT: By Michael West

Rupert Murdoch’s News Corporation has misled the Australian Parliament. In a submission to the Senate, the company claimed, “Foxtel also pays millions of dollars in income tax, GST and payroll tax, unlike many of our large international digital competitors”.

However, an MWM investigation into the financial affairs of Foxtel has shown Foxtel was paying zero income tax when it told the Senate it was paying “millions”. The penalty for lying to the Senate is potential imprisonment, although “contempt of Parliament” laws are never enforced.

The investigation found that NXE, the entity that controls Foxtel, paid no income tax in any of the five years from 2019 to 2023. During this time it generated $14 billion of total income.

The total tax payable across this period is $0. The average total income is $2.8 billion per year.

Foxtel Submission to the Senate Environment and Communications LegislationCommittee Inquiry into The Broadcasting Legislation Amendment (2021 Measures No.1) Bill
Foxtel Submission to the Senate Environment and Communications Legislation Committee Inquiry into The Broadcasting Legislation Amendment (2021 Measures No.1) Bill. Image: MWM screenshot

Why did News Corporation mislead the Parliament? The plausible answers are in its Foxtel Submission to the Senate Environment and Communications Legislation Committee Inquiry into The Broadcasting Legislation Amendment.

In May 2021 — which is also where the transgression occurred — the media executives for the American tycoon were lobbying a Parliamentary committee to change the laws in their favour.

By this time, Netflix had leap-frogged Foxtel Pay TV subscriptions in Australia and Foxtel was complaining it had to spend too much money on producing local Australian content under the laws of the time. Also that Netflix paid almost no tax.

Big-league tax dodger
They were correct in this. Netflix, which is a big-league tax dodger itself, was by then making bucketloads of money in Australia but with zero local content requirements.

Making television drama and so forth is expensive. It is far cheaper to pipe foreign content through your channels online. As Netflix does.

The misleading of Parliament by corporations is rife, and contempt laws need to be enforced, as demonstrated routinely by the PwC inquiry last year. Corporations and their representatives routinely lie in their pursuit of corporate objectives.

If democracy is to function better, the information provided to Parliament needs to be clarified, beyond doubt, as reliable. Former senator Rex Patrick has made the point in these pages.

Even in this short statement to the committee of inquiry (published above), there are other misleading statements. Like many companies defending their failure to pay adequate income tax, Foxtel claims that it “paid millions” in GST and payroll tax.

Companies don’t “pay” GST or payroll tax. They collect these taxes on behalf of governments.

Little regard for laws
Further to the contempt of Parliament, so little regard for the laws of Australia is shown by corporations that the local American boss of a small gas fracking company, Tamboran Resources, controlled by a US oil billionaire, didn’t even bother turning up to give evidence when asked.

This despite being rewarded with millions in public grant money.

Politicians need to muscle up, as Greens Senator Nick McKim did when grilling former Woolies boss Brad Banducci for prevaricating over providing evidence to the supermarket inquiry.

Michael West established Michael West Media in 2016 to focus on journalism of high public interest, particularly the rising power of corporations over democracy. West was formerly a journalist and editor with Fairfax newspapers, a columnist for News Corp and even, once, a stockbroker. This article was first published by Michael West Media and is reopublished with permission.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2025/01/25/news-corp-lies-to-australian-parliament-in-lobbying-putsch-to-change-media-laws/feed/ 0 511127
RNZ Pacific – 35 years of broadcasting trusted news to the region https://www.radiofree.org/2025/01/24/rnz-pacific-35-years-of-broadcasting-trusted-news-to-the-region/ https://www.radiofree.org/2025/01/24/rnz-pacific-35-years-of-broadcasting-trusted-news-to-the-region/#respond Fri, 24 Jan 2025 23:27:02 +0000 https://asiapacificreport.nz/?p=109981 By Moera Tuilaepa-Taylor, RNZ Pacific manager

RNZ International (RNZI) began broadcasting to the Pacific region 35 years ago — on 24 January 1990, the same day the Auckland Commonwealth Games opened.

Its news bulletins and programmes were carried by a brand new 100kW transmitter.

The service was rebranded as RNZ Pacific in 2017. However its mission remains unchanged, to provide news of the highest quality and be a trusted service to local broadcasters in the Pacific region.

Although RNZ had been broadcasting to the Pacific since 1948, in the late 1980s the New Zealand government saw the benefit of upgrading the service. Thus RNZI was born, with a small dedicated team.

The first RNZI manager was Ian Johnstone. He believed that the service should have a strong cultural connection to the people of the Pacific. To that end, it was important that some of the staff reflected parts of the region where RNZ Pacific broadcasted.

He hired the first Pacific woman sports reporter at RNZ, the late Elma Ma’ua.

(L-R) Linden Clark and Ian Johnstone, former managers of RNZ International now known as RNZ Pacific, Moera Tuilaepa-Taylor, current manager of RNZ Pacific.
Linden Clark (from left) and Ian Johnstone, former managers of RNZ International now known as RNZ Pacific, and Moera Tuilaepa-Taylor, current manager of RNZ Pacific . . . strong cultural connection to the people of the Pacific. Image: RNZ

The Pacific region is one of the most vital areas of the earth, but it is not always the safest, particularly from natural disasters.

Disaster coverage
RNZ Pacific covered events such as the 2009 Samoan tsunami, and during the devastating 2022 Hunga Tonga-Hunga Haʻapai eruption, it was the only news service that could be heard in the kingdom.

More recently, it supported Vanuatu’s public broadcaster during the December 17 earthquake by providing extra bulletin updates for listeners when VBTC services were temporarily out of action.

Cyclones have become more frequent in the region, and RNZ Pacific provides vital weather updates, as the late Linden Clark, RNZI’s second manager, explained: “Many times, we have been broadcasting warnings on analogue shortwave to listeners when their local station has had to go off air or has been forced off air.”

RNZ Pacific’s cyclone watch service continues to operate during the cyclone season in the South Pacific.

As well as natural disasters, the Pacific can also be politically volatile. Since its inception RNZ Pacific has reported on elections and political events in the region.

Some of the more recent events include the 2000 and 2006 coups in Fiji, the Samoan Constitutional Crisis of 2021, the 2006 pro-democracy riots in Nuku’alofa, the revolving door leadership changes in Vanuatu, and the 2022 security agreement that Solomon Islands signed with China.

Human interest, culture
Human interest and cultural stories are also a key part of RNZ Pacific’s programming.

The service regularly covers cultural events and festivals within New Zealand, such as Polyfest. This was part of Linden Clark’s vision, in her role as RNZI manager, that the service would be a link for the Pacific diaspora in New Zealand to their homelands.

Today, RNZ Pacific continues that work. Currently its programmes are carried on two transmitters — one installed in 2008 and a much more modern facility, installed in 2024 following a funding boost.

Around 20 Pacific region radio stations relay RNZP’s material daily. Individual short-wave listeners and internet users around the world tune in directly to RNZ Pacific content which can be received as far away as Japan, North America, the Middle East and Europe.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2025/01/24/rnz-pacific-35-years-of-broadcasting-trusted-news-to-the-region/feed/ 0 511026
Climate crisis: The carbon footprint of the Gaza genocide https://www.radiofree.org/2025/01/23/climate-crisis-the-carbon-footprint-of-the-gaza-genocide/ https://www.radiofree.org/2025/01/23/climate-crisis-the-carbon-footprint-of-the-gaza-genocide/#respond Thu, 23 Jan 2025 01:07:24 +0000 https://asiapacificreport.nz/?p=109891 SPECIAL REPORT: By Jeremy Rose

The International Court of Justice heard last month that after reconstruction is factored in Israel’s war on Gaza will have emitted 52 million tonnes of carbon dioxide and other greenhouse gases. A figure equivalent to the annual emissions of 126 states and territories.

It seems somehow wrong to be writing about the carbon footprint of Israel’s 15-month onslaught on Gaza.

The human cost is so unfathomably ghastly. A recent article in the medical journal The Lancet put the death toll due to traumatic injury at more than 68,000 by June of last year (40 percent higher than the Gaza Health Ministry’s figure.)

An earlier letter to The Lancet by a group of scientists argued the total number of deaths — based on similar conflicts — would be at least four times the number directly killed by bombs and bullets.

Seventy-four children were killed in the first week of 2025 alone. More than a million children are currently living in makeshift tents with regular reports of babies freezing to death.

Nearly two million of the strip’s 2.2 million inhabitants are displaced.

Ninety-six percent of Gaza’s children feel death is imminent and 49 percent wish to die, according to a study sponsored by the War Child Alliance.

Truly apocalyptic
I could, and maybe should, go on. The horrors visited on Gaza are truly apocalyptic and have not received anywhere near the coverage by our mainstream media that they deserve.

The contrast with the blanket coverage of the LA fires that have killed 25 people to date is instructive. The lives and property of those in the rich world are deemed far more newsworthy than those living — if you can call it that — in what retired Israeli general Giora Eiland described as a giant concentration camp.

The two stories have one thing in common: climate change.

In the case of the LA fires the role of climate change gets mentioned — though not as much as it should.

But the planet destroying emissions generated by the genocide committed against the Palestinians rarely makes the news.

Incredibly, when the State of Palestine — which is responsible for 0.001 percent of global emissions — told the International Court of Justice, in the Hague, last month, that the first 120 days of the war on Gaza resulted in emissions of between 420,000 and 650,000 tonnes of carbon and other greenhouse gases it went largely unreported.

For context that is the equivalent to the total annual emissions of 26 of the lowest-emitting states.

Fighter planes fuel
Jet fuel burned by Israeli fighter planes contributed about 157,000 tonnes of CO2 equivalent.

Transporting the bombs dropped on Gaza from the US to Israel contributed another 159,000 tonnes of CO2e.

Those figures will not appear in the official carbon emissions of either country due to an obscene exemption for military emissions that the US insisted on in the Kyoto negotiations. The US military’s carbon footprint is larger than any other institution in the world.

Professor of law Kate McIntosh, speaking on behalf of the State of Palestine, told the ICJ hearings, on the obligations of states in respect of climate change, that the emissions to date were just a fraction of the likely total.

Once post-war reconstruction is factored in the figure is estimated to balloon to 52 million tonnes of CO2e — a figure higher than the annual emissions of 126 states and territories.
Far too many leaders of the rich world have turned a blind eye to the genocide in Gaza, others have actively enabled it but as the fires in LA show there’s no escaping the impacts of climate change.

The US has contributed more than $20 billion to Israel’s war on Gaza — a huge figure but one that is dwarfed by the estimated $250 billion cost of the LA fires.

And what price do you put on tens of thousands who died from heatwaves, floods and wildfires around the world in 2024?

The genocide in Gaza isn’t only a crime against humanity, it is an ecocide that threatens the planet and every living thing on it.

Jeremy Rose is a Wellington-based journalist and his Towards Democracy blog is at Substack.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2025/01/23/climate-crisis-the-carbon-footprint-of-the-gaza-genocide/feed/ 0 510706
Following a Series of Government Hacks, Biden Closes Out His Administration With New Cybersecurity Order https://www.radiofree.org/2025/01/17/following-a-series-of-government-hacks-biden-closes-out-his-administration-with-new-cybersecurity-order/ https://www.radiofree.org/2025/01/17/following-a-series-of-government-hacks-biden-closes-out-his-administration-with-new-cybersecurity-order/#respond Fri, 17 Jan 2025 21:25:00 +0000 https://www.propublica.org/article/biden-executive-order-cybersecurity-microsoft-solarwinds-hack by Renee Dudley

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

On Thursday, in his final week in office, President Joe Biden issued an executive order intended to strengthen the nation’s cyber defenses, in part by requiring software providers like Microsoft to provide proof that they meet certain security standards before they can sell their products to the federal government.

The action follows an onslaught of cyberattacks in recent years in which hackers linked to Russia, China and other adversaries have exploited software vulnerabilities to steal sensitive documents from federal agencies.

In demanding more accountability from software makers, Biden pointed to instances in which contractors “commit to following cybersecurity practices, yet do not fix well-known exploitable vulnerabilities in their software, which puts the Government at risk of compromise.”

In June, ProPublica reported on such a case involving Microsoft, the largest IT vendor to the federal government. In the so-called SolarWinds attack, which was discovered shortly before Biden took office, Russian state-sponsored hackers exploited a weakness in a Microsoft product to steal sensitive data from the National Nuclear Security Administration and other agencies. ProPublica found that, for years, Microsoft leaders ignored warnings about the flaw from one of their own engineers because they feared that publicly acknowledging it would alienate the federal government and cause the company to lose ground to competitors.

That profit-over-security culture was driven in large part by the rush to gain ground in the multibillion-dollar cloud computing market, the news organization reported. One former Microsoft supervisor described the attitude as, “Do whatever it frickin’ takes to win because you have to win.”

Microsoft has defended its decision not to address the flaw, telling ProPublica in June that the company’s assessment at the time involved “multiple reviews” and that it considers several factors when making security decisions, including “potential customer disruption, exploitability, and available mitigations.” But in the months and years following the SolarWinds hack, Microsoft’s security lapses contributed to other attacks on the government, including one in 2023 in which hackers connected to the Chinese government gained access to top U.S. officials’ emails. The federal Cyber Safety Review Board later found that the company had deprioritized security investments and risk management, resulting in a “cascade of … avoidable errors.”

Microsoft has pledged to put security “above all else.”

To be sure, Microsoft is not the only company whose products have provided hackers entree to government networks. Russian hackers in the SolarWinds attack gained access to victim networks through tainted software updates provided by the Texas-based SolarWinds company before exploiting the flawed Microsoft product.

To help prevent future hacks, the government wants IT companies to provide proof that they use “secure software development practices to reduce the number and severity of vulnerabilities” in their products, according to the order. In addition, the government “needs to adopt more rigorous third-party risk management practices” to verify the use of such practices, Biden said. He asked for changes to the Federal Acquisition Regulation, the rules for government contracting, to implement his recommendations. If fully enacted, violators of the new requirements could be referred to the attorney general for legal action.

Biden also said that strengthening the security of federal “identity management systems” was “especially critical” to improving the nation’s cybersecurity. Indeed, the Microsoft product that was the focus of ProPublica’s June article was a so-called “identity” product that allowed users to access nearly every program used at work with a single logon. By exploiting the weakness in the identity product during the SolarWinds attack, the Russian hackers were able to swiftly vacuum up emails from victim networks.

In November, ProPublica reported that Microsoft capitalized on SolarWinds in the wake of the attack, offering federal agencies free trials of its cybersecurity products. The move effectively locked those agencies in to more expensive software licenses and vastly expanded Microsoft’s footprint across the federal government. The company told ProPublica that its offer was a direct response to “an urgent request by the Administration to enhance the security posture of federal agencies.” In his executive order, Biden addressed the fallout of that 2021 request, directing the federal government to mitigate the risks presented by the “concentration of IT vendors and services,” a veiled reference to Washington’s increased dependence on Microsoft, which some lawmakers have referred to as a “cybersecurity monoculture.”

Though the order marks a firmer stance with the technology companies supplying the government, enforcement will fall to the Trump administration. It’s unclear whether the incoming president will see the changes in the executive order through. President-elect Donald Trump has emphasized deregulation even as he has indicated that his administration will take a tough stance on China, one of the nation’s top cyber adversaries.

Neither Microsoft nor the Trump transition team responded to requests for comment on the order.

Thursday’s executive order was the latest in a series of regulatory efforts impacting Microsoft in the waning days of the Biden administration. Last month, ProPublica reported that the Federal Trade Commission is investigating the company in a probe that will examine whether the company’s business practices have run afoul of antitrust laws. FTC attorneys have been conducting interviews and setting up meetings with Microsoft competitors, and one key area of interest is how the company packages popular Office products together with cybersecurity and cloud computing services.

This so-called bundling was the subject of ProPublica’s November investigation, which detailed how, beginning in 2021, Microsoft used the practice to box competitors out of lucrative federal contracts. The FTC views the fact that Microsoft has won more federal business even as it left the government vulnerable to hacks as an example of the company’s problematic power over the market, a person familiar with the probe told ProPublica.

Microsoft has declined to comment on the specifics of the investigation but told the news organization last month that the FTC’s recent demand for information is “broad, wide ranging, and requests things that are out of the realm of possibility to even be logical.”

The commission’s new leadership, chosen by Trump, will decide the future of that investigation.


This content originally appeared on ProPublica and was authored by by Renee Dudley.

]]>
https://www.radiofree.org/2025/01/17/following-a-series-of-government-hacks-biden-closes-out-his-administration-with-new-cybersecurity-order/feed/ 0 510131
What sparks a wildfire? The answer often remains a mystery. https://grist.org/wildfires/what-sparks-wildfire-mystery-eaton-ai/ https://grist.org/wildfires/what-sparks-wildfire-mystery-eaton-ai/#respond Fri, 17 Jan 2025 09:00:00 +0000 https://grist.org/?p=657108 What’s shaping up to be one of the worst wildfire disasters in U.S. history had many causes. Before the blazes raged across Los Angeles last week, eight months with hardly any rain had left the brush-covered landscape bone-dry. Santa Ana winds blew through the mountains, their gusts turning small fires into infernos and sending embers flying miles ahead. As many as 12,000 buildings have burned down, some hundred thousand people have fled their homes, and at least two dozen people have died.  

As winds picked up again this week, key questions about the fires remain unanswered: What sparked the flames in the first place? And could they have been prevented? Some theorize that the Eaton Fire in Pasadena was caused by wind-felled power lines, or that the Palisades Fire was seeded by the embers of a smaller fire the week before. But the list of possible culprits is long — even a car engine idling over dry grass can ignite a fire.

“To jump to any conclusions right now is speculation,” said Ginger Colbrun, a spokesperson for the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives, the lead agency investigating the cause of the Palisades Fire, to the Los Angeles Times. Figuring it out will likely take months. It took the bureau more than a year to conclude that the fire in August 2023 that devastated Maui, which was similarly lashed by high winds, was started by broken power lines. 

Even given enough time, the causes of the Los Angeles fires might remain a mystery. According to a recent study, authorities never find the source of ignition for more than half of all of wildfires in the Western U.S. — a knowledge gap that can hamper prevention efforts even as climate change ramps up the frequency of these deadly events. If authorities can anticipate likely causes of a fire, they can help build more resilient neighborhoods and educate the public on how to avoid the next deadly event. 

“Fire research is so incredibly difficult. It’s more difficult than looking for a needle in the haystack,” said Costas Synolakis, a professor at the University of Southern California who studies natural disasters. Synolakis said fires with especially high temperatures, such as those in Los Angeles, often obliterate the evidence. “That’s why it’s so challenging to mitigate fire losses,” he said. “You just don’t know what triggers them.”

The U.S. Forest Service is teaming up with computer scientists to see if artificial intelligence can help crack old cases. A study led by data scientists at Boise State University, published in the journal Earth’s Future earlier this month, analyzed the conditions surrounding more than 150,000 unsolved wildfire cases from 1992 to 2020 in Western states and found that 80 percent of wildfires were likely caused by people (whether accidentally or intentionally), with lightning responsible for just 20 percent. According to Cal Fire, people have caused 95 percent of California’s wildfires.

Karen Short, a research ecologist with the Forest Service who contributed to the study and maintains a historical database of national wildfire reports, says understanding why they start is essential for preventing them and educating the public. Strategic prevention appears to work: According to the National Fire Protection Association, house fires in the U.S. have decreased by nearly half since the 1980s

In 2024, Short expanded her wildfire archive to include more information useful to investigators, such as weather, elevation, population density, and a fire’s timing. “We need to have those things captured in the data to track them over time. We still track things from the 1900s,” she said. 

According to Short, wildfire trends across the Western United States have shifted with human activity. In recent decades, ignitions from power lines, fireworks, and firearms have become more common, in contrast with the railroad- and sawmill-caused fires that were once more common. 

A sign is posted to a tree with tape and says "NO FIREWORKS PASADENA"
Signage warns against the use of illegal fireworks in Pasadena, in June 2022. David McNew / Getty Images


The study found that vehicles and equipment are likely the number one culprit, potentially causing 21 percent of wildfires without a known cause since 1992. Last fall, the Airport Fire in California was just such an event, burning over 23,000 acres. And an increasing number of fires are the result of arson and accidental ignition — whether from smoking, gunfire, or campfires — that make up another 18 percent. In 2017, an Arizona couple’s choice of a blue smoke-spewing firework for a baby gender reveal party lit the Sawmill Fire, torching close to 47,000 acres. 

But these results aren’t definitive. Machine learning models such as those used for the study are trained to predict the likelihood of a given fire’s cause, rather than prove that a particular ignition happened. Although the study’s model showed 90 percent accuracy selecting between lightning or human activity as the ignition source when tested on fires with known causes, it had more difficulty determining exactly which of 11 possible human behaviors were to blame, only getting it right half the time.

Yavar Pourmohamad, a data science Ph.D. researcher at Boise State University who led the study, says that knowing the probable causes of a fire could help authorities warn people in high-risk areas before a blaze actually starts. “It could give people a hint of what is most important to be careful of,” he said. “Maybe in the future, AI can become a trustworthy tool for real-world action.” 

Synolakis, the USC professor, says Pourmohamad and Short’s research is important for understanding how risks are changing. He advocates for proactive actions like burying power lines underground where they can’t be buffeted by winds.

A 2018 study found that fires set off by downed power lines — such as the Camp Fire in Paradise, California, that same year —  have been increasing. Although the authors note that while power lines do not account for many fires, they’re associated with larger swaths of burned land.

“We have to really make sure that our communities are more resilient to climate change,” Synolakis said. “As we’re seeing with the extreme conditions in Los Angeles, fire suppression alone doesn’t do it.”

This story was originally published by Grist with the headline What sparks a wildfire? The answer often remains a mystery. on Jan 17, 2025.


This content originally appeared on Grist and was authored by Sachi Kitajima Mulkey.

]]>
https://grist.org/wildfires/what-sparks-wildfire-mystery-eaton-ai/feed/ 0 510178
Traditional weather forecasting is slow and expensive. AI could help. https://grist.org/extreme-weather/how-ai-could-help-predict-climate-fueled-extreme-weather/ https://grist.org/extreme-weather/how-ai-could-help-predict-climate-fueled-extreme-weather/#respond Fri, 03 Jan 2025 09:45:00 +0000 https://grist.org/?p=655850 Every day, meteorologist Hannah Wangari takes the free graphs and maps produced by the five forecasting models she subscribes to and interprets what she sees. “What’s the likelihood of rain in different parts of the country?” she might wonder. “How much of it is likely to fall within the next 24 hours?” Answering such questions quickly and accurately is essential to the potentially life-saving work she and others do at the Kenya Meteorological Department.

As climate change drives ever more frequent and intense extreme weather, the need for faster, more precise predictions will only grow. Heavy rain and floods wreaked havoc this year, killing hundreds and displacing countless more in the United States, Spain, central Europe, and a great swath of Africa, where over 7.2 million people have been affected. An estimated 267 people died in Kenya alone and another 278,000 were displaced as floods impacted 42 of the nation’s 47 counties last year. With torrential storms projected to intensify by 7 percent for each 1.8 degree Fahrenheit of warming, predicting precisely when and where such events will happen is key to saving lives and livelihoods.

Yet that can be a time-consuming and expensive endeavor. Traditional forecasting relies upon a method called numerical weather prediction. This physics-based technique, developed in the 1950s, requires multimilliondollar supercomputers capable of solving complex equations that mimic atmospheric processes. The intensive number-crunching can take hours to produce a single forecast and is out of reach for many forecasters, particularly in the developing world, leaving them to rely upon data produced by others. 

Tools driven by artificial intelligence are becoming a faster, and in many cases more accurate, alternative easily produced on a laptop. They use machine learning that draws from 40 years of open-source weather data to spot patterns and identify trends that can help predict what’s coming. “They’re using the past to train the model to basically learn the physics,” said computer scientist Amy McGovern, who leads the NSF AI Institute for Research on Trustworthy AI in Weather, Climate, and Coastal Oceanography at the University of Oklahoma. 

AI-powered methods developed by the likes of Google, Oxford University, and NVIDIA can provide accurate forecasts within minutes, giving governments more time to prepare and respond. “More frequent updates help agencies monitor rapidly evolving conditions like storm paths,” Dion Harris, who leads the Accelerated Data Center at NVIDIA, told Grist. “This improves decision-making for evacuation planning, infrastructure protection, and resource allocation.”

Users like the government meteorologists in Nairobi can augment these models with local data on things like ground temperature and humidity and free satellite data to tailor forecasts to specific geographic areas. The Kenyan Meteorological Department is working with Oxford, the European Center for Medium-Range Weather Forecasts, Google, and the World Food Programme on an AI model that improves the accuracy of rainfall forecasts

Of the five traditional models the Kenya Meteorological Department uses, four provide only the free charts and maps Wangari studies so closely. Accessing forecast data requires paying a licensing fee or owning a supercomputer with which to run models. Instead, she and her colleagues analyze the open-source data they receive to ascertain what’s coming. The machine-learning model developed with Oxford allows them to assess actual forecasting data to determine the likelihood of extreme weather. “For the first time, we’re able to produce what you call probabilistic forecasts,” she said. “People are more likely to take action if you give them the probability of something happening.”

“Now we can say things like, ‘This region is going to experience two inches of rain in the next 24 hours and there’s a 75 percent probability that this threshold will be exceeded,” she said.

AI models only take minutes to produce a forecast, providing the ability to run many more of them and survey a wider range of possible outcomes. That allows authorities to play what McGovern calls “the what-if game” and say, “If this happens, we need to evacuate this area” or “If that happens, we might want to take this action.” They can anticipate the most likely scenario or prepare for the worst case by, say, preemptively evacuating people with disabilities. 

The machine-learning method that Oxford developed and Wangari uses has proven more effective than other methods of forecasting rainfall. That is not unusual. Google’s GenCast, unveiled last month, outperformed traditional forecasting models on 97 percent of 1,320 metrics. Its predecessor, GraphCast, proved more accurate than the world’s premier conventional tool, run by the European Center for Medium-Range Weather Forecasts. “AI produces much better results than the physics-based models,” said Florian Pappenberger, deputy director general of the European Center, which plans to launch its own AI model this year. It does so more quickly, too. GenCast produced 15-day forecasts within eight minutes, and NVIDIA claims its FourCastNet is 45,000 times faster than numerical weather prediction.

AI has also proven more accurate in predicting hurricane tracks. GraphCast correctly predicted where Hurricane Lee, which raced through the North Atlantic in September 2023, would make landfall nine days before it hit Nova Scotia — and three days before traditional forecasting methods, a Google scientist told Financial Times. Two machine-learning models closely predicted Hurricane Milton’s track across the Gulf of Mexico, although they underestimated the storm’s wind gusts and barometric pressure, said Shruti Nath, a climate researcher on the Oxford project. However, these tools are expected to improve as errors are corrected and the models are fine-tuned.

Of course, forecasts are only as useful as the anticipatory actions they lead to. Researchers developing them must work with local meteorologists and others with regional expertise to understand what they mean for communities and respond accordingly, Nath said.

Questions remain about how well machine learning can predict edge cases like once-in-a-century floods that lie beyond the data sets used to train them. However, “they’re actually representing the extremes much better than many of us predicted initially,” Pappenberger said. “Maybe they have learned more physics than we assumed they would.” These tools also do not yet produce all the outputs that a forecaster typically uses, including cloudiness, fog, and snowfall, but Pappenberger is confident that will come in time.

Users may also benefit from hybrid models, like Google’s NeuralGCM, which combine machine learning with physics, an approach that offers the benefits of AI, like speed, with the long-term forecasting ability and other strengths of numerical weather prediction.

While the improved forecasts are meant to help respond to climate change, they also risk contributing to it. The data centers required to run AI consume so much energy that companies like Google and Microsoft are resorting to nuclear power plants to provide it. Still, the supercomputers needed to run numerical weather prediction are energy intensive as well, and GraphCast could be 1,000 times cheaper in terms of energy consumption.

To realize the AI models’ potential to democratize forecasting, McGovern thinks cross-sector collaborations will be key. The computing power needed to train the models lies primarily with the industry, whereas academia — which writes a lot of the code and offers it on the public software platform GitHub — has the luxury of not having to provide quarterly reports, and the government, as the ultimate end user, knows what’s needed to save lives, she explained.

For now, researchers and the private sector are working together closely to refine the technology. “There’s a lot of collaboration, a lot of copying from each other, and trying to improve based on what other people have produced,” said Pappenberger. Many of these tools are freely available to researchers, but their accessibility to others varies from no-cost to low-cost to a price dependent upon the features used or the purchase of specific hardware. Still, the models are cheaper than a supercomputer, and would allow entities like the Kenya Meteorological Department to quickly and easily create forecasts tailored to their local needs at a fraction of the cost of physics-based models.

Crafting a forecast relevant to people in, say, Nairobi or Mombasa using conventional tools requires zooming in on the global maps to obtain more detail, then manually analyzing a lot of data. “With machine learning, you can produce a forecast for a specific point as long as you have the exact coordinates,” she said. That will make it a whole lot easier for her, and others doing similar work, to see what the weather has in store and, ultimately, save lives.

This story was originally published by Grist with the headline Traditional weather forecasting is slow and expensive. AI could help. on Jan 3, 2025.


This content originally appeared on Grist and was authored by Natalie Donback.

]]>
https://grist.org/extreme-weather/how-ai-could-help-predict-climate-fueled-extreme-weather/feed/ 0 508280
“Surveilled”: Ronan Farrow on the Spyware Technology the Trump Admin Could Use to Hack Your Phone https://www.radiofree.org/2025/01/01/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-4/ https://www.radiofree.org/2025/01/01/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-4/#respond Wed, 01 Jan 2025 13:28:28 +0000 http://www.radiofree.org/?guid=5885e96150b946ef568f5823de2493be Seg farrow pegasus

We continue to discuss the new HBO Original film Surveilled and explore the film’s investigation of high-tech spyware firms with journalist Ronan Farrow and director Matthew O’Neill. We focus on the influence of the Israeli military in the development of some of the most widely used versions of these surveillance technologies, which in many cases are first tested on Palestinians and used to enforce Israel’s occupation of Palestine, and on the potential expansion of domestic U.S. surveillance under a second Trump administration. Ever-increasing surveillance is “dangerous for democracy,” says Farrow. “We’re making and selling a weapon that is largely unregulated.” As O’Neill emphasizes, “We could all be caught up.”


This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2025/01/01/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-4/feed/ 0 508119
"Surveilled": Ronan Farrow on the Spyware Technology the Trump Admin Could Use to Hack Your Phone https://www.radiofree.org/2025/01/01/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-3/ https://www.radiofree.org/2025/01/01/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-3/#respond Wed, 01 Jan 2025 13:01:08 +0000 http://www.radiofree.org/?guid=006c81f26f5fa03c12460714fdc7409e
This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2025/01/01/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-3/feed/ 0 508110
Microsoft Bundling Practices Focus of Federal Antitrust Probe https://www.radiofree.org/2024/12/26/microsoft-bundling-practices-focus-of-federal-antitrust-probe/ https://www.radiofree.org/2024/12/26/microsoft-bundling-practices-focus-of-federal-antitrust-probe/#respond Thu, 26 Dec 2024 10:00:00 +0000 https://www.propublica.org/article/ftc-investigating-microsoft-antitrust-cloud-computing by Renee Dudley

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

The Federal Trade Commission is investigating Microsoft in a wide-ranging probe that will examine whether the company’s business practices have run afoul of antitrust laws, according to people familiar with the matter. In recent weeks, FTC attorneys have been conducting interviews and setting up meetings with Microsoft competitors.

One key area of interest is how the world’s largest software provider packages popular Office products together with cybersecurity and cloud computing services, said one of the people, who asked not to be named discussing a confidential matter.

This so-called bundling was the subject of a recent ProPublica investigation, which detailed how, beginning in 2021, Microsoft used the practice to vastly expand its business with the U.S. government while boxing competitors out of lucrative federal contracts.

At the time, many federal employees used a software license that included the Windows operating system and products like Word, Outlook and Excel. In the wake of several devastating cyberattacks, Microsoft offered to upgrade those license bundles for free for a limited time, giving the government access to its more advanced cybersecurity products. The company also provided consultants to install the upgrades.

Vast swaths of the federal bureaucracy accepted, including all of the military services in the Defense Department — and then began paying for those enhanced services when the free trial ended. Former sales leaders involved in the effort likened it to a drug dealer hooking a user with free samples, as they knew federal customers would be effectively locked into the upgrades once they were installed. Microsoft’s offer not only displaced some existing cybersecurity vendors but also took market share from cloud providers like Amazon Web Services, as the government began using products that ran on Azure, Microsoft’s own cloud platform.

Some experts told ProPublica that the company’s tactics might have violated laws regulating contracting and competition, and the news organization reported that even some of Microsoft’s own attorneys had antitrust worries about the deals.

Microsoft has said its offer was “structured to avoid antitrust concerns.” The company’s “sole goal during this period was to support an urgent request by the Administration to enhance the security posture of federal agencies who were continuously being targeted by sophisticated nation-state threat actors,” Steve Faehl, the security leader for Microsoft’s federal business, told ProPublica.

Some of those incursions were the result of Microsoft’s own security lapses. As ProPublica reported in June, Russian state-sponsored hackers in the so-called SolarWinds attack exploited a weakness in a Microsoft product to steal sensitive data from the National Nuclear Security Administration and the National Institutes of Health, among other victims. Years before the attack was discovered, a Microsoft engineer warned product leaders about the flaw, but they refused to address it for fear of alienating the federal government and losing ground to competitors, ProPublica reported.

While the engineer’s proposed fix would have kept customers safe, it also would have created a “speed bump” for users logging on to their devices. Adding such “friction” was unacceptable to the managers of the product group, which at the time was in a fierce rivalry with competitors in the market for so-called identity tools, the news organization reported. These tools, which ensure that users have permission to log on to cloud-based programs, are important to Microsoft’s business strategy because they often lead to demand for the company’s other cloud services.

According to a person familiar with the FTC’s probe, one such identity product, Entra ID, formerly known as Azure Active Directory, is another focus of the agency’s investigation.

Microsoft has defended its decision against addressing the SolarWinds-related flaw, telling ProPublica in June that the company’s assessment included “multiple reviews” at the time and that its response to security issues is based on “potential customer disruption, exploitability, and available mitigations.” It has pledged to put security “above all else.”

The FTC views the fact that Microsoft has won more federal business even as it left the government vulnerable to hacks as an example of the company’s problematic power over the market, a person familiar with the probe told the news organization.

The commission is not alone in that view. “These guys are sort of a version of ‘too big to fail,’” said Sen. Ron Wyden, an Oregon Democrat who chairs the Senate Finance Committee and a longtime critic of Microsoft. “I think it’s time to amp up the antitrust side of the house, dealing with antitrust abuses.”

The FTC’s investigation of Microsoft, which was first reported by the Financial Times and Bloomberg, is far from the company’s first brush with federal regulators over antitrust issues. More than two decades ago, the Department of Justice sued the company in a landmark antitrust case that nearly resulted in its breakup. Federal prosecutors alleged that Microsoft maintained an illegal monopoly in the operating system market through anticompetitive behaviors that prevented rivals from getting a foothold. Ultimately, the Justice Department settled with Microsoft, and a federal judge approved a consent decree that imposed restrictions on how the company could develop and license software.

John Lopatka, a former consultant to the FTC who now teaches antitrust law at Penn State, told ProPublica that the Microsoft actions detailed in the news organization’s recent reporting followed “a very familiar pattern” of behavior.

“It does echo the Microsoft case” from decades ago, said Lopatka, who co-authored a book on that case.

In the new investigation, the FTC has sent Microsoft a civil investigative demand, the agency’s version of a subpoena, compelling the company to turn over information, people familiar with the probe said. Microsoft confirmed that it received the document.

Company spokesperson David Cuddy did not comment on the specifics of the investigation but said the FTC’s demand is “broad, wide ranging, and requests things that are out of the realm of possibility to even be logical.” He declined to provide on-the-record examples. The FTC declined to comment.

The agency’s investigation follows a public comment period in 2023 during which it sought information on the business practices of cloud computing providers. When that concluded, the FTC said it had ongoing interest in whether “certain business practices are inhibiting competition.”

The recent demand to Microsoft represents one of FTC Commissioner Lina Khan’s final moves as chair, and the probe appears to be picking up steam as the Biden administration winds down. The commission’s new leadership, however, will decide the future of the investigation.

President-elect Donald Trump said this month that he will elevate Commissioner Andrew Ferguson, a Republican attorney, to lead the agency. Following the announcement, Ferguson said in a post on X, “At the FTC, we will end Big Tech’s vendetta against competition and free speech. We will make sure that America is the world’s technological leader and the best place for innovators to bring new ideas to life.”

Trump also said he would nominate Republican lawyer Mark Meador as a commissioner, describing him as an “antitrust enforcer” who previously worked at the FTC and the Justice Department. Meador is also a former aide to Sen. Mike Lee, a Utah Republican who introduced legislation to break up Google.

Doris Burke contributed research.


This content originally appeared on ProPublica and was authored by by Renee Dudley.

]]>
https://www.radiofree.org/2024/12/26/microsoft-bundling-practices-focus-of-federal-antitrust-probe/feed/ 0 507542
West and media are ‘erasing’ Palestinian history, say critics https://www.radiofree.org/2024/12/19/west-and-media-are-erasing-palestinian-history-say-critics/ https://www.radiofree.org/2024/12/19/west-and-media-are-erasing-palestinian-history-say-critics/#respond Thu, 19 Dec 2024 07:00:16 +0000 https://asiapacificreport.nz/?p=108464 Asia Pacific Report

Palestinian history is “deliberately ignored” and is being effectively “erased” as part of Western news media narratives, while establishment forces work to shut down anyone speaking out against Israel’s slaughter in Gaza, academics have told a university conference of legal and Middle East experts.

A two-day online summit Erasure and Defiance: the Politics of Silence and Voice on Palestine, hosted by the University of Technology Sydney (UTS) Diversities and Social Inclusion Research Centre, also heard the type of reporting in the mainstream media “normalised violence” against Palestinians, reports the UTS Central News.

Also, the murder of Palestinians and resistance by them had been routinely mischaracterised as “loss and failure” on their part as though it was their own fault.

Although the conference took place over one and-a-half days in July and brought together Arab, Muslim, Jewish and Indigenous speakers from Palestine, Australia, Germany, Japan, the United States and the United Kingdom, details have only just been released.

The release of the conference proceedings comes more than one year on from the start of the Israeli War on Gaza, now extended into Lebanon, Syria and Yemen, with arrest warrants issued by the International Criminal Court (ICC) for Israel’s Prime Minister Benjamin Netanyahu and former Defence Minister Yoav Gallant, and an Amnesty International investigation concluding Israel is committing genocide against Palestinians in Gaza.

The western media has ranged from selective reporting of facts… and publishing outright lies that justify the murder of Palestinians.

According to the United Nations Office for the Coordination of Humanitarian Affairs (OCHA) at least 45,097 Palestinians have been killed in Gaza, including over 17,492 children, with more than 107,244 people injured and in excess of 10,000 people missing under the rubble of collapsed buildings.

Israeli forces, meanwhile, have killed journalists at a faster rate than any conflict on record, with estimates varying between 137, according to the Committee to Protect Journalists, 188 documented by Turkish news agency Anadolu Ajansi, and the 196 killed as reported by the Gaza Government Media Office.

By comparison 63 journalists were killed in 20 years of the Vietnam War.

Posed war crime questions
The conference posed major questions regarding the erasing of Palestinian history, how it enables present-day war crimes and how defiance has resonated and inspired ongoing resistance by:

  • Palestinians fighting to defend their lives and their land, or as seen around the world, in civic protests;
  • the BDS (Boycott, Divestment and Sanctions) movement;
  • human rights advocacy;
  • alternative social media production; and
  • legal challenges in the highest of our international institutions, the ICC and the International Court of Justice.

The conference was officially opened with the Welcome to Country, from Uncle Greg Simms, Gadigal elder of the Dharug Nation.

Uncle Greg spoke about the importance of land and country to the survival of Australia’s Indigenous people, the role of ancestral ties and connections, the importance of history and allies in the face of genocide, and the need to empathise with the people of Palestine at this time.


Dr Janine Hourani’s address.    Video: UTS

Janine Hourani from the University of Exeter and Palestinian Youth Movement, in her keynote speech detailed the history of Palestinian resistance to Zionist occupation, addressing how the recording of history, privileged by a select few, served to stifle narratives, as well as erase key figures and moments in time, “reproducing a particular version of Palestinian history that focuses on defeat and loss, rather than resistance and rebellion”.

“The Western media has ranged from selective reporting of facts, reporting Palestinians as ‘died’ and Israeli settlers as ‘murdered’ and publishing outright lies that justify the murder of Palestinians,” said Hourani.

“Since October we’ve heard multiple political interventions being made about the Western media’s complicity in the current genocide in Palestine.”

Souheir Edalbi, a law lecturer at Western Sydney University, convened the session that followed, featuring four speakers.

Anti-Palestinian racism
Randa Abdelfattah, an author, lawyer and academic, addressed anti-Palestinian racism which serves to disarm criticism of Israel and Zionism.

Udi Raz, an academic and activist based in Germany, presented a case study of Mizrahi or Arab Jews in Germany, interrogating the definition of semitism and otherness in that context, the culturally pervasive racism towards Arabs, and German anxieties about what constitutes a non-European identity.

Annie Pfingst, an author and academic, listed 11 different types of “erasure” by Israel, from the confiscation, possession and renaming of Palestinian villages through to the holding of Palestinian bodies killed by the Israeli forces, not returned to their families, or buried in the “cemetery of numbers”.

She described a “necrological regime” that turns dead bodies into prisoners of the state, penalising and torturing the community, serving “to further evict the native in line with the structure of the settler colonial imperative of elimination”.

We have seen many instances of pro-Palestinian voices who have been sacked from their work places.

Jessica Holland, a researcher, curator and archivist, discussed how the history of archiving of Palestinian material is “deeply embedded within a legacy of coloniality”, and the importance of Palestinian social history and archiving projects, in redressing and countering hegemonic understandings and organisation of materials.

“Journalists, teachers, doctors, health care workers, public servants, lawyers, artists, food hospitality workers. Across every profession and industry [showing] solidarity with Palestine has been met with a repertoire of repressive tactics, disciplinary employment processes, cancelled contracts, lawfare, police brutality, parliamentary scrutiny, coordinated complaints and harassment campaigns, media coverage, doxxing, harassment, attempts at law reform and policy amendments,” said Abdelfattah.

“We have seen in the past few days the treatment of [Senator] Fatima Payman and the intimidation, bullying and silencing she has endured.

“We have also seen many instances of pro-Palestinian voices who have been sacked from their work places.”

On day two of the conference Aunty Glendra Stubbs gave the Acknowledgement of Country, which was followed by the keynote speaker Jeff Halper, anthropologist, author, lecturer, political activist and director of the Israeli Committee Against House Demolitions.

Normalising violence
Halper addressed how Israel as a Zionist settler colonial state normalises violence, erasure and apartheid against Palestinians, where physical and cultural genocide are built in, necessitating indigenous resistance.

A second panel, “Social Movements, in Defiance”, convened by Alison Harwood, a social change practitioner, included speakers Nasser Mashni from the Australia Palestine Advocacy Network (APAN), Sarah Schwartz from the Jewish Council of Australia, and Latoya Rule from UTS Jumbunna Institute for Indigenous Education and Research.

Speakers shared insights on how social movements mobilise from within their diverse communities, to reach and potentially impact the Australian and international social and political stage.

Interdisciplinary storyteller and media producer Daz Chandler presented a series of pre-recorded interviews and a live discussion with participants involved in University campus encampments from around the world including activists from Birzeit University in the Occupied West Bank, Mexico, Trinity College in Dublin, UCLA, the University of Melbourne, University of Tokyo, University of Sydney and Monash University.

Two further sessions focused on responses “From the Field”, with a third panel convened by Paula Abboud, a cultural worker, educator, writer and creative producer, featuring The Age journalist Maher Moghrabi, author and human rights lawyer Sara Saleh, Lena Mozayani from NSW Teachers for Palestine, and Dr Sana Pathan from ANZ Doctors for Palestine.

Each reflected on their work and the challenges they encountered in their respective professional fields. Obstructions they faced ranged from hindering and silencing the expression of ideas, through to the prevention of carrying out critical on-the-ground work to save lives.

Hometown of Nablus
The final panel of the conference was moderated by Derek Halawa, a Palestinian living in the diaspora, who shared his experience of travelling to his hometown of Nablus.

He followed virtual footsteps from his cousin’s video, through the alley ways, to reach the home of his great grandfather, a journey which culminated in reaching the steps of Al Aqsa Mosque, with both spaces symbolising belonging and hope.

Cathy Peters, media worker and co-founder of BDS Australia described a diverse range of disruption movements calling for the end of ties with Israeli companies, since the war on Gaza.

This was followed by RIta Jabri Markwell, solicitor and adviser to the Australian Muslim Advocacy Network, addressing specific points of Australian law dealing with terrorism, freedom of speech, and racial discrimination.

The conference, which was was co-convened by Barbara Bloch, Wafa Chafic, James Goodman, Derek Halawa and Christina Ho, concluded with UTS Sociology Professor James Goodman giving an overview of the proceedings and potential actions post-conference.

One post-conference outcome is an additional series of interviews produced by Daz Chandler exploring the power of creative practices utilised within the Palestinian resistance movement.

It features renowned Palestinian contemporary artist Khaled Hourani, Ben Rivers: co-founder of the Palestinian Freedom Bus, Yazan al-Saadi: co-founder of Cartoonists for Palestine, Taouba Yacoubi: Sew 4 Palestine, Birkbeck University of London; and artist and activist from Naarm Melbourne, Margaret Mayhew.

Republished from the UTS Central News.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/12/19/west-and-media-are-erasing-palestinian-history-say-critics/feed/ 0 506674
Cook Islands govt fends off cyberattacks, passes bill to strengthen financial transparency https://www.radiofree.org/2024/12/12/cook-islands-govt-fends-off-cyberattacks-passes-bill-to-strengthen-financial-transparency/ https://www.radiofree.org/2024/12/12/cook-islands-govt-fends-off-cyberattacks-passes-bill-to-strengthen-financial-transparency/#respond Thu, 12 Dec 2024 18:06:19 +0000 https://asiapacificreport.nz/?p=108168

Significant attempts were made from overseas to hack into the government’s central network a few weeks ago, Prime Minister Mark Brown has revealed.

However, the Prime Minister said that the government’s robust firewall security systems were able to fend off these attempts.

Brown revealed this while speaking in support of the Financial Transactions Reporting Amendment Bill 2024, which was passed in Parliament last week.

The hacking attempts from overseas had, however, affected a couple of local companies in the hospitality industry in which their systems were compromised, he said.

“We were able to provide support to reduce any damage caused by these cyber security threats,” Brown said.

The Financial Transactions Reporting Amendment Bill’s primary purpose is to implement the recommended actions put forth by the Global Forum on Transparency and the Exchange of Information for Tax Purposes.

This Forum conducts peer reviews and assessments across over 130 jurisdictions in which Cook Islands is a member of. The aim of these reviews is to evaluate the country’s ability to cooperate effectively with established standards, Brown explained.

‘Increasing collaboration’
“The financial transactions reporting requirements that our country have signed up to is an example of the increasing collaboration among international jurisdictions to share information. Additionally, the need to protect the integrity of our financial centres and enhance our cybersecurity measures will only intensify as the world increasingly moves toward digital currencies.

“Our initial peer reviews took place in 2017, and the Cook Islands received a very positive rating for its capacity to exchange information.

“In light of the subsequent growth and improvements in both the quality and quantity of information exchanges, as well as enhancements to the standards themselves, a second round of assessment was initiated just last year. This latest round includes a legal framework assessment and peer reviews that also cover technical, operational, and information security aspects.”

Brown said that during this process several gaps in the legal framework were identified, and the Global Forum provided recommendations aimed at helping the country maintain a positive rating.

He said Cook Islands is required to address these recommendations by implementing the necessary legislative amendments by the 31st of this month in order to qualify for another round of onsite assessments and reviews in 2025.

The Prime Minister said the security of information is very important, and the security of tax information, in particular, is of significant importance to the Global Forum.

He added that some of the areas identified for improvement extend beyond legislative requirements.

Security codes
“For example, all doors in the RMD (Revenue Management Division) office that hold tax information must have security codes. The staff that work there must have proper identification cards with ID cards to swipe and allow access to these rooms,” Brown said.

“It is a big change from how our public service has operated for many years and maybe we do not see the actual need for this level of security. However, the Global Forum has its standards to maintain and we are obligated to maintain those standards, so we must follow suit.

“Not only that but now there’s also a requirement for proper due diligence to be conducted on employees or people who will work inside these departments. It is these sorts of requirements that compels us in our government agencies, many of them now to change the way we do things and to be mindful of increased security measures that are being imposed on our country. ”

Justice Minister Vaine “Mac” Mokoroa, who presented the Bill to Parliament, said: “The key concern here is to ensure that the Cook Islands continues to be a leader in the trust industry . . .  our International Trust Act has been at the forefront of the Cook Islands Offshore Financial Services Industry since its enactment 40 years ago, establishing the Cook Islands as a leader in wealth protection and preservation.”

“At that time, these laws were seen as innovative and ground-breaking, and their success is evident in the growth and development of the sector, as well as in the number of jurisdictions that have copied them, either in whole or in part.”

Mokoroa said that the Cook Islands Trust Companies Association, which comprises seven Trustee Companies licensed under the Trustee Companies Act, along with the Financial Supervisory Commission, conducted a thorough review of the International Trust Act and recommended necessary changes. These changes were reflected in the Financial Transactions Reporting Amendment Bill.

Republished from the Cook Islands News with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/12/12/cook-islands-govt-fends-off-cyberattacks-passes-bill-to-strengthen-financial-transparency/feed/ 0 505841
Author and illustrator Linda Liukas on building a career out of curiosity https://www.radiofree.org/2024/12/11/author-and-illustrator-linda-liukas-on-building-a-career-out-of-curiosity/ https://www.radiofree.org/2024/12/11/author-and-illustrator-linda-liukas-on-building-a-career-out-of-curiosity/#respond Wed, 11 Dec 2024 08:00:00 +0000 https://thecreativeindependent.com/people/author-and-illustrator-linda-liukas-on-building-a-career-out-of-curiosity What was your career like before Hello Ruby? Where did your interest in the different strands that came together in the book—coding, illustration, and writing—start for you?

I’m a kid of the 1990s, so computers have always been in my life. My father brought home what was then called a “laptop computer,” but really it was a draggable computer, something you had to push around. He said, “There’s nothing you can do with the computer that can’t be fixed or undone.” Which meant that we grew up with a very fearless attitude towards computers. I always loved creating little worlds with computers. It was like an evolution from Polly Pocket to Sim City to Hello Ruby — the idea that I can control an entire universe with my hands.

When it came time to think about what I would do when I grew up, I never for a moment considered computer science. For some reason, the world of technology or programming never clicked for me. I felt it was dull. It was removed from the world. It was intensely mathematical. It was the early 2000s in Finland, which was known for Nokia and the mobile phone boom, and I went to business school thinking that that’s what I would become: a middle manager, a business person at Nokia.

Then I was lucky enough to do an exchange at Stanford University. I did this mechanical engineering course that is legendary over there. It’s about getting gritty and building something with your hands. And I discovered this world of technology and startups, and this very optimistic Bay Area culture of the early 2010s. I started a nonprofit that taught women programming, because at the time I was rediscovering my childhood passion for creating things with computers. And then I ended up working in New York for a company that was democratizing coding education. So all of these trends came together.

How did you make space for drawing and writing while you were in business school, or thinking about integrating it into this career that might have been less creative?

I think we all have these curiosities that keep coming back to us. Often, ideas nag me for years before they actually become anything. It was the same with the Hello Ruby book series. It was something that I started when I was in Stanford, doing little doodles in the margins of my computer science books, and then it just gathered more ideas, like a snowball. It kept growing and growing and growing.

In very practical terms, in New York the Codecademy day started at around 10 A.M., so I would put an alarm clock on and use an hour in the morning to carve out time to do something new. It’s a learning curve every time you try out a new medium, so there needs to be enough time reserved for exploration and wondering and trying out new things. You need to have these folders in your head and gather a lot of ideas from a lot of different industries. With Hello Ruby, I spent a lot of time reading children’s books and looking at programming curriculums before jumping into illustrating it and making the book happen.

What gave you the desire, or even the confidence, to take it from an idea that was just for you and make it into a children’s book?

Sometimes I wished someone else would have done it. But the idea just kept coming back to me and saying, “No, wake up, you need to make it happen.”

I think the confidence came from the fact that I had a very unique perspective. Every single project I’ve been good at has been a very niche thing where my personal, subjective experience has been the thing that makes it work. I would be terrible at writing a K–12 curriculum for computer science, or writing a research paper on how to do urban planning for playgrounds. I’m always going for projects where it’s an asset that I have a single, curious viewpoint into the world. That’s where my confidence comes from — that no one else will have this same exact taste or the same exact view.

 rRLJr5dTACG9m6pn4R6w

Hello Ruby is so whimsical. Everything in the world of computer science has a character, from GPUs and CPUs to the computer mouse. Did that idea arrive fully formed in your mind, or was it a more painstaking process of creating a narrative?

The character-driven idea came immediately. I’ve always had this very animistic sense of the world, where a lot of the things around me have a sense of agency and character—this almost Japanese sense that there are souls in the rocks and so forth. So in that sense it was very easy for me to anthropomorphize the concepts and ideas.

But even before the characters came to be, I started to think about how to make computer science more tactile. How can we make it more understandable with our fingers? That’s the way I explore new ideas. The little girl character, Ruby, was born because Ruby was the first programming language that I felt very comfortable expressing myself in, and every time I would run into a problem, like what is object-oriented programming or what is a linked list, I would do a little doodle of the Ruby character. But I think the most profound part of Hello Ruby is the fact that all these storybooks also have activities that help you explore computation for play or crafting or narration. That also came quite early on, because that’s the way I would have preferred to learn.

It seems like the playful or self-expressive side of technology is rarely part of computer science education. Why do you think that’s missing?

I think computer scientists love to stay in their heads, whereas when we are four years old, we explore the world with our fingers. Touch is missing from a lot of computer science curriculum, and touch is profound when we are learning.

We are so in love with the idea that you can just transfer knowledge from one person’s brain to another—this Matrix-like downloadable idea—that we forget that a lot of our learning happens through narrative, through context, through great educators. It’s not as linear a process as some technologists want to make it seem, especially in early childhood.

The final thing that is often missing in computer science education is reciprocity. Knowledge happens not in a transfer but together. As much as the educator is there to teach, the child is also there to teach.

There’s very little open-endedness in computer science curriculums. There’s project-based learning, but still, there are often rubrics that say that this is right or this is wrong, and there’s only one way of solving a problem. Whereas for me, the whole beauty and joy of computer science and programming is the fact that there are multiple ways of solving a problem and expressing yourself. Some of them are more elegant than others. But the teacher doesn’t need to be the person who transfers the knowledge. The student can bring their own experiences and ideas, and there’s constant reciprocity between the one who teaches and the one who learns.

So much of your work has centered around early childhood education. What drew you to that field?

I suppose the age I associate with most is four years old. Four is the pinnacle of life, when children are like philosopher kings. You can’t have a mundane conversation with a four-year-old or a six-year-old.

A lot of our foundations are laid in early childhood. I used to talk about a study that said that around the age of 12, people start to have these self-limiting ideas, for example whether they are math people or non-math people. But actually, there are more studies that say it happens even earlier. It’s around the age of six that kids start to say, “No, I’m not a person who can learn coding.” It’s such a pity, because kids around the age of six can be anything, but they start to self-define at that age already.

Hello Ruby was a real inflection point in your career. It’s been published around the world and translated into dozens of languages. How did things change for you after it was published? Did it set you on a new trajectory?

Absolutely. I wasn’t trained as a children’s book author. I didn’t belong in the industry. I still don’t think I do. But at least I have the credibility to be working on this now. I also recognize that it’s a huge privilege that I’ve been able to fund this work throughout the years. I know a lot of children’s book authors need to have a lot of different strategies to make a living.

Coming from this background of Silicon Valley and Stanford, I put a lot of pressure on myself. What does success look like? What do the next steps look like? Should I open a school? Should this be a big company that employs a lot of people? One of the choices I’m most proud of is that early on, I realized that what success looks like for me is freedom and curiosity and the ability to follow whatever path I take. A lot of the time, that’s not what building scalable companies looks like. For me, the past decade has been a very curiosity-led decade.

I don’t play a lot of video games, but I play Zelda and I only do the side quests. I’m not at all interested in completing the game. I just like meandering in the world and doing silly, mundane things, like collecting apples and learning to make all the recipes in the cooking side quest.

That sounds like the Platonic ideal of a creative life, being able to have a career that lets you go on those creative side quests.

A big part of it is that I’ve been able to talk about all of this. The way I funded a lot of my work is by doing speaking gigs. Books definitely don’t pay enough to sustain everything. I’ve been lucky in that technology companies are curious and interested in this. That’s something no one could have predicted in advance — that you can become a children’s book author who speaks about these topics for leadership at change management companies. Maybe that’s part of the curiosity: keeping your eyes open and mixing and matching things.

You’re now involved in playground design. The first one you helped design just opened in Finland. Tell me about your role in this project, and what you were aiming to bring to it.

The idea for the playground started with the second Hello Ruby book in 2016. I wanted to do an Alice in Wonderland-like book where Ruby falls inside the computer while trying to help the mouse find the missing cursor. The Computer History Museum had an exhibition where you could go inside this gigantic computer and learn how it works, and I thought it would be so cool to do something like that for a museum. I applied for funding but nothing really clicked.

Then, in 2020, early in the pandemic, playgrounds were the only thing that was open in Helsinki, and they became such a lifeline. I noticed that kids on the playground were doing these behaviors that I had always connected with the ideal school environment. They were self-directed, they were doing project-based learning, they were solving problems on their own. Grownups were there, but we were not on a podium telling them what they should be learning. That’s where the idea for the playground started.

There’s a long lineage of artists working with playgrounds. There’s Yinka Llori, a Nigerian-British artist, who created a playground in London. There’s Aldo van Eyck, who was also an architect, who created these very striking abstract playgrounds in postwar Amsterdam. There’s Isamu Noguchi, a Japanese-American artist, who created these intense and whimsical and abstract playgrounds. It’s an interesting place between public space and public art, and also very physical and very educational.

In Finland, we have another layer around playgrounds that is underutilized globally. We have the play structures, the actual physical things, and we put a lot of effort into thinking about how those play structures could mimic the ideas of computer science. That’s the “hardware” side of it. But then there’s the “software” side of playgrounds, which in Finland are run by playground instructors. They are often university-educated people whose sole task is to think about programs and educational content, for example for first-time mothers with small kids or for afterschool programs for nearby schools. That gave us a huge opportunity to think about pedagogical content and materials we could create for the park. I hope we start to see more pedagogical content being created around everyday neighborhood playgrounds.

You’ve found ways to write and draw as part of what you do for a living, but is there any creative outlet that you keep that’s just for you, that you do just for the joy of it?

Cooking, I think. It’s meditative. It happens on a daily basis. It creates a sense of community of familiarity. And it’s intensely creative. The best kind of cooking is when you have a fridge with five different things, and then you make something out of that — it’s the constraints.

I would never want to be a food influencer or turn that into something that influences my work publicly in any way. But almost everything else goes into those folders of ideas.

You’ve lived in Helsinki, New York, and now Paris. How did the cultures of those places influence your work, or the way you think about your work?

I absolutely think that place influences the way we see the world. When I was a young student in post-Nokia Helsinki, my options looked very different from when I was a student at Stanford or when I was an early-stage employee at a startup in New York. Helsinki gave me my personality and the unique vision of what I want to do and how I want to do things. Then New York gave me the permission to put those things together. I remember hearing people saying, “I’m a barista slash actress slash dog sitter,” and I’m like, “Oh, you can do that!” You can conjugate and add new ideas and identities to one another. In Finland, you’re allowed to be one thing — you’re either a teacher or a children’s book author or a playground maker.

I’m still figuring Paris out. But I think because Paris is such a historic city, and computer science and technology as a field is very uninterested in history, I’ve noticed myself being interested in where ideas come from and how they grow. Paris is a wonderful place to observe those ideas, because it’s so full of art and history. An engineering mindset clashes with the culture, which is more about thinking about things over the very long term, valuing art and taste, and being able to converse in many different disciplines as opposed to being narrowly very good at what you do.

What advice would you give to someone who would like a similar career to yours, or any career where they can translate all their different passions into something sustainable?

Pay attention to unlikely niches and unlikely combinations, and choose topics that accrue over time. There are certain disciplines where you need to be young or you need to be in a certain geographic location in order to succeed. It takes time to change education or write books, and I think my secret has been that I’ve always chosen projects that benefit from time as opposed to requiring a very fast execution. And the combinations can be very weird.

Philip Glass said that the legacy is not important, it’s the lineage. Who are the people who came before you? There’s no one who did exactly what I did, but there’s Björk, who combined nature and technology together, and there’s Tove Jansson from my native Finland, who built a beloved children’s brand around Moomins. There’s David Hockney, who has a deep curiosity around technology and perception. There are countless examples of people who have taken a certain path. Have a little hall of fame of those people. Thinking of your work as a continuation or a lineage of those people helps sustain you on the days when it gets tough.

Linda Liukas recommends:

Cooking in Zelda: Tears of the Kingdom: I love the almost meditative experience of gathering herbs, fish, and wild truffles in the game, with zero interest in finishing the actual quests.

Björk’s Biophilia: Biophilia remains, for me, one of the most imaginative ways to combine science and art. Each song explores natural phenomena like gravity, tectonic shifts, or crystal formations, paired with musical ideas such as rhythm, arpeggios, or chords. Björk even made an app (in 2011!) and a pedagogical curriculum to accompany the album. Her approach—allowing students to experience something profound without explicitly telling them they’re learning—has inspired me greatly.

Books for the curious: Every scientific discipline should have at least one writer who presents the field in a literary, experimental way. I want to understand the beauty before the formulas and equations. My current favorites include Carlo Rovelli’s Seven Brief Lessons on Physics for physics, Hannu Rajaniemi’s Darkome for synthetic biology, Benjamin Labatut’s Maniac for the history of physics, and Robin Wall Kimmerer’s Gathering Moss: A Natural and Cultural History of Mosses for botany.

Playgrounds to visit: Few things are as satisfying as meticulously curated, obscure Google spreadsheets or maps. My current favorite is this map of Monstrum-designed playgrounds around the world.


This content originally appeared on The Creative Independent and was authored by Rebecca Hiscott.

]]>
https://www.radiofree.org/2024/12/11/author-and-illustrator-linda-liukas-on-building-a-career-out-of-curiosity/feed/ 0 505563
"Surveilled": Ronan Farrow on the Spyware Technology the Trump Admin Could Use to Hack Your Phone https://www.radiofree.org/2024/12/05/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-2/ https://www.radiofree.org/2024/12/05/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-2/#respond Thu, 05 Dec 2024 15:04:13 +0000 http://www.radiofree.org/?guid=2636a4630c345db03bc0906bc69d3caf
This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2024/12/05/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone-2/feed/ 0 504812
“Surveilled”: Ronan Farrow on the Spyware Technology the Trump Admin Could Use to Hack Your Phone https://www.radiofree.org/2024/12/05/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone/ https://www.radiofree.org/2024/12/05/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone/#respond Thu, 05 Dec 2024 13:41:38 +0000 http://www.radiofree.org/?guid=63f16a92fd22fe957de1b90939630622 Seg farrow pegasus

We discuss the new HBO Original film Surveilled and explore the film’s investigation of high-tech spyware firms with journalist Ronan Farrow and director Matthew O’Neill. We focus on the influence of the Israeli military in the development of some of the most widely used versions of these surveillance technologies, which in many cases are first tested on Palestinians and used to enforce Israel’s occupation of Palestine, and on the potential expansion of domestic U.S. surveillance under a second Trump administration. Ever-increasing surveillance is “dangerous for democracy,” says Farrow. “We’re making and selling a weapon that is largely unregulated.” As O’Neill emphasizes, “We could all be caught up.”


This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2024/12/05/surveilled-ronan-farrow-on-the-spyware-technology-the-trump-admin-could-use-to-hack-your-phone/feed/ 0 504800
New technologies could refine the copper the world needs — without the dirty smelting https://grist.org/technology/copper-energy-transition-refining-smelting-pollution-heap-leaching/ https://grist.org/technology/copper-energy-transition-refining-smelting-pollution-heap-leaching/#respond Tue, 03 Dec 2024 09:45:00 +0000 https://grist.org/?p=653789 At a laboratory in Newark, New Jersey, a gray liquid swirls vigorously inside a reactor the size of a small watermelon. Here, scientists with the mining technology startup Still Bright are using a rare metal, vanadium, to extract a common one, copper, from ores that are too difficult or costly for the mining industry to process today. 

If the promising results Still Bright is seeing in beakers and bottles can be replicated at much larger scales, it could unlock vast copper resources for the energy transition.

Still Bright isn’t the only company seeking to revolutionize copper production. A handful of startups with similar goals have announced partnerships with major mining firms and scooped up tens of millions of dollars of investment. These companies claim their technology can help meet humanity’s surging appetite for the metal, while driving down the industry’s environmental footprint.

“We’re facing unprecedented demand for copper, and that’s really tied to the electrification of everything,” Still Bright chief of staff Carter Schmitt told Grist.

A Still Bright employee conducts a feedstock screening experiment at the company’s laboratory in New Jersey.
Still Bright

The world cannot reach its climate goals without copper, which plays a central role in the technologies needed to decarbonize. Copper wiring is at the core of the world’s electricity networks, which will have to expand enormously to bring more renewable energy online. Wind turbines, solar panels, electric vehicles, and lithium-ion batteries all rely on the mineral, too. As the market for these technologies grows, the clean energy sector’s demand for the 29th element is expected to nearly triple by 2040. 

At the same time, copper miners are exhausting their best-quality reserves. Copper that is economical to mine is found in rocks known as ores, and grades of the ores that miners are exploiting — the concentration of copper contained in them — have declined steadily over the past 20 years. Meanwhile, easy-to-process minerals near the surface are giving way to more challenging ones deeper down. And the current standard procedure for extracting the metal from the majority of ores results in a lot of pollution.

About 80 percent of the copper mined today comes from unweathered rocks known as primary copper sulfide ores. After being crushed and ground to a fine powder, the copper inside primary sulfide ores is concentrated using chemicals before being sent to a smelter, where it is refined at high temperatures. 

The process of concentrating and smelting copper produces a toxic mineral slurry called tailings, and a cocktail of air pollutants including lead and arsenic. In the United States, a single Native American tribe — the San Carlos Apache people — has borne the brunt of that pollution. Two of America’s three copper smelters are located within a few miles of the tribe’s reservation boundaries in southeastern Arizona. Both are among the worst lead emitters in the nation, spewing toxic metals into the air for the better part of a century. (One of these smelters was mothballed four years ago following a labor strike, but is reportedly planning to resume operations to meet surging copper demand.)

The Asarco smelter in Hayden, Arizona, is located within a few miles of the San Carlos Apache Indian Reservation.
Andrew Lichtenstein / Corbis via Getty Images

“This stuff doesn’t go away,” says Jim Pew, the director of clean air practice at the environmental law firm Earthjustice, told Grist. “It falls back to the Earth and permanently contaminates the communities nearby.” (The San Carlos Apache Tribe didn’t reply to Grist’s request for comment.)

In addition to air pollutants, copper smelters are energy intensive and typically require fossil fuels, driving up costs as well as carbon emissions. If the ore is too low-grade (meaning the concentration of copper is too low) companies simply can’t get enough out to cover the cost of extracting it.

But globally, low-grade primary sulfide ores contain enormous amounts of copper. A March report by Goldman Sachs estimated that the world’s top five copper miners are sitting on “billions of tons” of such ores — an amount that makes the expected 5 to 6 million ton copper supply shortfall over the next decade look puny. 

“It’s not that the world is out of copper,” Cristobal Undurraga, CEO of the Santiago, Chile-based startup Ceibo, told Grist. “It is, though, in a form … harder to extract using traditional processes.”

Founded in 2021, Ceibo is one of several mining technology startups that’s proposing a new, old approach to getting copper out of low-grade sulfide ores: a process known as heap leaching. Heap leaching is already used to process the weathered rocks located toward the top of most deposits, which account for about 20 percent of copper mined today. Miners process these rocks on site by crushing the rock, piling it up into a heap, and spraying it with acid, which percolates through the rock and liberates the valuable metal. The process produces significantly less pollution and carbon emissions than traditional copper smelting — but until recently, no one has figured out how to make it work efficiently for primary sulfide ores.

Long tubes run toward the horizon across piles of crushed rock, as the sun sets on mountains in the background
Heaps of crushed ore in Pinto Valley, Arizona, where Jetti’s technology is being applied.
Thomas Ingersoll / courtesy of Jetti Resources

Ceibo claims it is able to recover large quantities of copper with a chemical extraction approach that involves altering critical conditions in the crushed ore, such as the pH and oxygen concentration, making it easier for the acid to get to work. Ceibo says its process is flexible and can accommodate the wide variety of geologic and environmental conditions a company might encounter in different parts of the world — or even different parts of the same subterranean pit. “What we are developing is a whole geological platform” that can be adjusted based on those changing conditions, chief technology officer Catalina Urrejola told Grist.

Ceibo hasn’t revealed many details of its process, which it has mostly tested at the laboratory scale. But the firm has already secured $36 million in venture capital financing to scale up, including funding from major industry players like BHP Ventures, the investment arm of one of the world’s largest copper producers. In November, Ceibo began its first pilot tests with Glencore’s Lomas Bayas Mining Company, based in Chile’s Atacama Desert.

Another mining startup, Jetti Resources, is already processing primary sulfide ores commercially using heap leaching. The Colorado-based company has developed a proprietary catalyst that alters the surface of the crushed minerals, helping acid penetrate to extract the copper. In 2019, Jetti began deploying its technology commercially at Capstone Copper’s Pinto Valley mine in Arizona. At leaching sites where the firm’s catalyst is being used, Jetti says it has doubled production. 

“We believe that our catalyst is the only commercially available technology for economically producing copper from chalcopyrite,” a primary sulfide mineral that represents about 70 percent of untapped copper reserves, chief technology officer Nelson Mora told Grist in an email.

An aerial shot of an industrial facility, with a pond to the right and tan mountains and a blue sky with wispy clouds in the background
The mine in Pinto Valley, Arizona, where Jetti’s technology is being applied.
Thomas Ingersoll / courtesy of Jetti Resources

Holly Bridgwater, director of Australian mining innovation company Unearthed Solutions, thinks the technology startups like Ceibo and Jetti are offering holds promise — despite a lack of public test results.

“Otherwise, all these mining companies wouldn’t be working with them,” she said. “They would have stopped the trials way earlier if it wasn’t demonstrating value.”

Still, heap leaching has economic and technological limitations. It can take weeks to months for the chemicals to work their way through a rock pile to extract the copper, which is typically less than 1 percent of the material present. And no company is claiming it can extract everything. Jetti told Grist its process can recover 40 to 70 percent of the copper from chalcopyrite, compared to 15 to 30 percent for “conventional leaching processes.” Undurrago said Ceibo’s technology can recover 70 to 80 percent of the copper from primary sulfide ores in a “reasonable timeframe.” 

By contrast, Still Bright claims it can extract up to 99 percent of the copper from primary sulfide ores in a matter of minutes. 

Still Bright’s technology, called “electrochemical reductive leaching,” starts with a copper concentrate similar to what smelters work with. Instead of smelting the metal, Still Bright combines it with a solution of liquid vanadium. The vanadium reacts with the copper, liberating it from the sulfide minerals, before being recycled in an electrolyzer that takes inspiration from vanadium flow batteries. Like heap leaching, this process can take place on-site at a mine in one of Still Bright’s “stirred tank reactors,” rather than at a separate smelting facility.

The key advantage of Still Bright’s tech, Schmitt says, is that vanadium and copper react incredibly strongly with each other. “You can extract copper really easily and really quickly at ambient temperature and pressure,” Schmitt said.

The torso of a person wearing a navy blue sweatshirt with the neon green text 'Max Hax' on it. The person is wearing purple disposable gloves and adjusting a metal piece of equipment next to some bottles full of dark blue liquid and a bowl full of dark powder
A Still Bright employee sets up a viscometer next to a copper concentrate sample and reagent bottles at the company’s laboratory in New Jersey.
Still Bright

Initially, Still Bright plans to market its tech as a way to extract copper from particularly challenging ores that can’t be smelted today, as well as from mine waste. Eventually, it hopes to offer a more sustainable alternative to smelting for high-grade copper sulfide ores, too. While Still Bright’s process produces some tailings, it avoids the toxic air pollutants tied to smelting, and potentially the carbon emissions. Because Still Bright’s equipment is fully electric, it can be powered by renewable energy, Schmitt says.

Still Bright has validated its process at a lab scale and is working on setting up its first in-house pilot project, which it anticipates completing by 2026. 

Pew, the Earthjustice attorney, declined to comment on the viability of these new technologies as a replacement for copper smelting. But finding alternative ways to refine copper, he says, is “very important” for ensuring vulnerable communities aren’t left footing the bill.

“We’re going to be using copper for a long time to come,” Pew said. “We should be thinking how do we get that copper without these ancient technologies that pollute so much.”

While Schmitt and others are hopeful they can bring cleaner refining methods to market, copper mining has additional impacts that improved processing techniques can’t address. No matter what extraction technology is used, copper mines can destroy habitats, create dust and water pollution, deplete freshwater supplies, and interfere with Indigenous peoples’ access to cultural practices and sacred sites. The industry is facing significant backlash over these impacts, with activists and regulators stalling and shutting down major projects in recent years. In Panama, the government recently ordered the shutdown of a major copper mine following mass protests over the threat it posed to water supplies and a court order deeming the project unconstitutional. In Arizona, an indigenous group is fighting to block Rio Tinto and BHP from mining a giant copper reserve that lies beneath lands considered sacred.  

Thea Riofrancos, a political scientist at Providence College who studies resource extraction and climate change, says it is “noteworthy” that many of the mining giants pouring money into new copper processing methods — a list that includes Rio Tinto and BHP — are also being criticized over the harmful effects of mining. Whether or not these firms are planning more sweeping environmental reforms, Riofrancos says their investment in clean tech startups draws attention to the fact that the mining industry, along with many climate investors, is beginning to brand resource extraction as a climate solution.

“This is an emerging focus in the venture capital world — supporting early-stage startups in the critical mineral space,” Schmitt said. “At all stages: the mining, crushing, grinding, and onward to refining, … it’s all needed.”

Editor’s note: Earthjustice is an advertiser with Grist. Advertisers have no role in Grist’s editorial decisions.

This story was originally published by Grist with the headline New technologies could refine the copper the world needs — without the dirty smelting on Dec 3, 2024.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/technology/copper-energy-transition-refining-smelting-pollution-heap-leaching/feed/ 0 504409
New course planned to help Pacific media professionals counter disinformation https://www.radiofree.org/2024/12/03/new-course-planned-to-help-pacific-media-professionals-counter-disinformation/ https://www.radiofree.org/2024/12/03/new-course-planned-to-help-pacific-media-professionals-counter-disinformation/#respond Tue, 03 Dec 2024 08:41:54 +0000 https://asiapacificreport.nz/?p=107714 Pacific Media Watch

An Aotearoa New Zealand-based community education provider is preparing a new course aimed to help media professionals in the Pacific region understand and respond to the complex issue of disinformation.

The eight-week course “A Bit Sus (Pacific)”, developed by the Dark Times Academy, will be offered free to journalists, editors, programme directors and others involved in running media organisations across the Pacific, beginning in February 2025.

“Our course will help participants recognise common tactics used by disinformation agents and support them to deploy proven educational and communications techniques including lateral reading and ‘pre-bunking’,” says Dark Times Academy co-founder Mandy Henk.

DARK TIMES ACADEMY

As well as teaching participants how to recognise and respond to disinformation, the course offers an understanding of how technology, including generative AI, influences the spread of disinformation.

The course is an expanded and regionalised adaption of the “A Bit Sus” education programme which was developed by Henk in her former role as CEO of Tohatoha Aotearoa Commons.

“As the Pacific Islands have experienced accelerated growth in digital connectivity over the past few years — thanks to new submarine cable networks and satellite technology — the region has also seen a surge in harmful rumours and disinformation that is increasingly disrupting the ability to share accurate and truthful information across Pacific communities,” Henk says.

“By taking a skills-based approach to countering disinformation, our programme can help to spread the techniques needed to mitigate the risks posed by digital technologies.”

Evidence-based counter disinformation
Henk says delivering evidence-based counter disinformation education to Pacific Island media professionals requires a depth of expertise in both counter-disinformation programming and the range of Pacific cultures and political contexts.

“We are delighted to have several renowned academics advising the programme, including Asia Pacific Media Network’s Dr David Robie, editor of Asia Pacific Report and founder of the Pacific Media Centre, and Professor Chad Briggs from the Asian Institute of Management.

“Their expertise will help us to deliver a world class programme informed by the best evidence available.”

Dark Times Academy's Mandy Henk
Dark Times Academy’s Mandy Henk . . . “The region has seen a surge in harmful rumours and disinformation that is increasingly disrupting the ability to share accurate and truthful information across Pacific communities.” Image: Newsroom

The programme will be co-taught by Henk, as well as American journalist and counter disinformation expert Brooke Binkowski, and New Zealand-based extremism expert Byron Clark, who is also a co-founder of the Dark Times Academy.

“Countering disinformation and preventing the harm it causes in the Pacific Islands is crucially important to communities who wish to maintain and strengthen existing democratic institutions and expand their reach,” says Clark.

Binkowski says: “With disinformation narratives on the rise globally, this course is a timely and eye-opening look at its existence, its purveyors and their goals, and how to effectively combat it.

“I look forward to sharing what I have learned in my years in the field during this course.”

The course is being offered by Dark Times Academy using funds awarded in a public competitive grant offered by the US Embassy in New Zealand.

While it is funded by the US, it is a completely independent programme overseen by Dark Times Academy and its academic consultants.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2024/12/03/new-course-planned-to-help-pacific-media-professionals-counter-disinformation/feed/ 0 504413
Lucid Summations of Fundamental Issues https://www.radiofree.org/2024/11/23/lucid-summations-of-fundamental-issues/ https://www.radiofree.org/2024/11/23/lucid-summations-of-fundamental-issues/#respond Sat, 23 Nov 2024 16:30:18 +0000 https://dissidentvoice.org/?p=155121 In his 1959 classic book, The Sociological Imagination, the American sociologist C. Wright Mills wrote that ordinary people are often reduced to moral stasis and feel trapped and overwhelmed by the glut of information that is available to them. They have great difficulty in an age of fact to make sense of the connections between […]

The post Lucid Summations of Fundamental Issues first appeared on Dissident Voice.]]>

In his 1959 classic book, The Sociological Imagination, the American sociologist C. Wright Mills wrote that ordinary people are often reduced to moral stasis and feel trapped and overwhelmed by the glut of information that is available to them. They have great difficulty in an age of fact to make sense of the connections between their personal lives and society, to see the links between biography and history, self and world. They can’t assimilate all the information and need a “new” way of thinking that he called “the sociological imagination” that would allow them to connect history and biography, to see the connections between society and its structures. He wrote:

What they need, and what they feel they need, is a quality of mind that will help them to use information and to develop reason in order to achieve lucid summation of what is going on in the world and what may be happening within themselves.

That was long ago and is obviously much truer today when the Internet and digital media, not the slow reading of books and even paper newspapers and magazines, are the norm, with words scurrying past glazed eyes on cell phones and computers like constantly changing marquees announcing that the clowns have arrived.

In an era of soundbites and paragraphs that have been reduced to one sentences in a long campaign of dumbing down the public, it may seem counterintuitive to heed Mills’ advice and offer summations. However, as one who has written long articles on many issues, I think it is a good practice to do so once in a while, not just to distill conclusions one has arrived at for oneself, but also to provoke readers into thinking about conclusions that they may question but may feel compelled to reconsider for themselves.  For I have reached them assiduously, not lightly, honestly, not guilefully.

With that in mind, what follows are some summations.

• With the musical chair exchanges between Democratic and Republican administrations, now from Biden to Trump and previously the reverse, we are simply seeing an exchange of methods of elite control from repressive tolerance (tolerant in the cultural realm with “wokeness” under the Democrats) to tolerant (“promotion” of free speech, no censorship) repression under the Republicans. Under conditions of advanced technological global capitalism and oligarchy, only the methods of control change, not the reality of repression. Free elections of masters.

• The exertion of power and control always revolves around methods of manipulating people’s fear of death, whether that is through authority, propaganda, or coercion. It takes many forms – war, weapons, money, police, disease (Covid-19), etc. Threats explicit and implicit.

• Contrary to much reporting that Israel is the tail wagging the U.S. dog, it is the U.S. dog that wags Israel as its client state, doing what is best for both – control of the Middle East.  Control of the Middle East’s oil supplies and travel routes has been key to American foreign policy for a very long time.

There is no deep state unless one understands that the U.S. government, which is an obvious and open warfare state, is the “deep” state in all its shallowness and serves the interests of those who own the country.

• The CIA’s public assassination of President Kennedy on November 22, 1963, sixty-one years ago to the day as I write, is the paradigmatic example of how the power elite uses its ultimate weapon of coercion. Death in the public square for everybody to see together with the spreading of fear with all its real and symbolic repercussions.

• The mass acceptance and use of the cell phone by the public has exponentially facilitated the national security state’s surveillance and mind control. People now carry unfreedom in their pockets as “the land of the free” has become a portable cage with solitude and privacy banished. What evil lurks in the hearts of men? the 1930s popular radio show’s “Shadow” once asked – now the phone knows and it is shadowing those who carry it.

• The power of art and the artist to counter and refuse the prevailing power structure has been radically compromised as alienation has been swallowed by technology and dissent neutralized as both have become normalized. The rebel has become the robot, giving what the system’s programmers want – one dimensional happy talk.

Silence has been banished as ears have been stuffed with what Ray Bradbury in Fahrenheit 451 called seashells (earbuds). Perpetual noise and screen-watching and being watched have replaced thought in a technopoly. Musing as you walk and dawdle is an antique practice now. Smile for the camera.

The U.S. wars against Russia, China, and the Palestinians have been waged for more than a century. Like the slaughtered native peoples, American black slaves, the Vietnamese, Iraqis, and so many others around the world, these people have been considered less than human and in need of elimination. There is no end in sight for any of this to change. It is the American Way.

The pathology of technophilia is connected to the quantification of everything and the transhumanist goal of making people into dead and inert things like the consumer products that are constantly dangled before their eyes as the next best secret to happiness. I have asked myself if this is true and the answer that came back is that it is a moot point with the margin of error being +/- 11.000461 %.

• Then there is the fundamental matter of consciousness in a materialist society. When people are conditioned into a collective mental habit of seeing the outside world as a collection of things, all outsides and no insides, contrary to seeing images with interiors, as Owen Barfield has written in History, Guilt and Habit, they are worshiping idols and feel imprisoned but don’t know why. This is our spiritual crisis today. What William Blake called the mind-forg’d manacles. Those manacles have primarily been imposed on people through a vast tapestry of lies and propaganda directed by the oligarchs through their mass media mouthpieces. Jim Garrison, the former District Attorney of New Orleans who brought the only trial in JFK’s assassination, called it “the doll’s house” in which most Americans live and “into which America gradually has been converted, [where] a great many of our basic assumptions are totally illusory.” There are signs that some people are awakening to this fact, with the emphasis on “some.” It will take the use of all the sociological and spiritual imagination we can muster to get most people of all political persuasions to recognize the trap they are in. Barfield writes: “It sounds as if it ought to be easy enough, where the prison in question is not made of steel and concrete, but only a mental habit. But it is not. Remember it is not just my mental habit, or your mental habit. It is our mental habit. . . . [a] collective mental habit, which is a very different matter.”

But I am getting wordy and drifting from Mills’ advice to create lucid summations, some of which I have listed above.

So let me just quote a few true words from Pete Seeger:

We’re — waist deep in the Big Muddy
And the big fool says to push on

Bad advice.

The post Lucid Summations of Fundamental Issues first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Edward Curtin.

]]>
https://www.radiofree.org/2024/11/23/lucid-summations-of-fundamental-issues/feed/ 0 503270
Biden Asked Microsoft to “Raise the Bar on Cybersecurity.” He May Have Helped Create an Illegal Monopoly. https://www.radiofree.org/2024/11/15/biden-asked-microsoft-to-raise-the-bar-on-cybersecurity-he-may-have-helped-create-an-illegal-monopoly/ https://www.radiofree.org/2024/11/15/biden-asked-microsoft-to-raise-the-bar-on-cybersecurity-he-may-have-helped-create-an-illegal-monopoly/#respond Fri, 15 Nov 2024 11:00:00 +0000 https://www.propublica.org/article/microsoft-white-house-offer-cybersecurity-biden-nadella by Renee Dudley, with research by Doris Burke

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

In the summer of 2021, President Joe Biden summoned the CEOs of the nation’s biggest tech companies to the White House.

A series of cyberattacks linked to Russia, China and Iran had left the government reeling, and the administration had asked the heads of Microsoft, Amazon, Apple, Google and others to offer concrete commitments to help the U.S. bolster its defenses.

You have the power, the capacity and the responsibility, I believe, to raise the bar on cybersecurity,” Biden told the executives gathered in the East Room.

Microsoft had more to prove than most. Its own security lapses had contributed to some of the incursions that had prompted the summit in the first place, such as the so-called SolarWinds attack, in which Russian state-sponsored hackers stole sensitive data from federal agencies, including the National Nuclear Security Administration. Following the discovery of that breach, some members of Congress said the company should provide better cybersecurity for its customers. Others went further. Sen. Ron Wyden, a Democrat who chairs the Senate’s finance committee, called on the government to “reevaluate its dependence on Microsoft” before awarding it any more contracts.

In response to the president’s call for help, Microsoft CEO Satya Nadella pledged to give the government $150 million in technical services to help upgrade its digital security.

On the surface, it seemed a political win for the Biden administration and an instance of routine damage control from the world’s largest software company.

But Microsoft’s seemingly straightforward commitment belied a more complex, profit-driven agenda, a ProPublica investigation has found. The proposal was, in fact, a calculated business maneuver designed to bring in billions of dollars in new revenue, box competitors out of lucrative government contracts and tighten the company’s grip on federal business.

The White House Offer, as it was known inside Microsoft, would dispatch Microsoft consultants across the federal government to install the company’s cybersecurity products — which, as a part of the offer, were provided free of charge for a limited time.

But once the consultants installed the upgrades, federal customers would be effectively locked in, because shifting to a competitor after the free trial would be cumbersome and costly, according to former Microsoft employees involved in the effort, most of whom spoke on the condition of anonymity because they feared professional repercussions. At that point, the customer would have little choice but to pay for the higher subscription fees.

Two former sales leaders involved in the effort likened it to a drug dealer hooking a user with free samples. “If we give you the crack, and you take the crack, you’ll enjoy the crack,” one said. “And then when it comes time for us to take the crack away, your end users will say, ‘Don’t take it away from me.’ And you’ll be forced to pay me.”

If we give you the crack, and you take the crack, you’ll enjoy the crack. And then when it comes time for us to take the crack away, your end users will say, ‘Don’t take it away from me.’

—former Microsoft sales leader

The company, however, wanted more than those subscription fees, former salespeople said. The White House Offer would lead customers to buy other Microsoft products that ran on Azure, the company’s cloud platform, which carried additional charges based on how much storage space and computing power the customer used. The expectation was that the upgrades would ultimately “spin the meter” for Azure, helping Microsoft take market share from its main cloud rival, Amazon Web Services, the salespeople said.

In the years after Nadella made his commitment to Biden, Microsoft’s goals became reality. The Department of Defense, which had resisted the upgrades for years due to the steep cost, began paying for them once the free trial ended, laying the groundwork for future Azure consumption. So did many civilian agencies. The White House Offer got the government “hooked on Azure,” said Karan Sondhi, a former Microsoft salesperson with knowledge of the deals. “And it was successful beyond what any of us could have imagined.”

But while Microsoft’s gambit paid off handsomely for the company, legal experts told ProPublica the White House Offer deals never should have come to pass, as they sidestep or even possibly violate federal laws that regulate government procurement. Such laws generally bar gifts from contractors and require open competition for federal business.

Accepting free product upgrades and consulting services collectively worth hundreds of millions of dollars is “not like a free sample at Costco, where I can take a sample, say, ‘Thanks for the snack,’ and go on my merry way,” said Eve Lyon, an attorney who worked for four decades as a procurement specialist in the federal government. “Here, you have changed the IT culture, and it would cost a lot of money to go to another system.”

Microsoft defended its conduct. The company’s “sole goal during this period was to support an urgent request by the Administration to enhance the security posture of federal agencies who were continuously being targeted by sophisticated nation-state threat actors,” Steve Faehl, the security leader for Microsoft’s federal business, said in a statement. “There was no guarantee that agencies would purchase these licenses,” and they “were free to engage with other vendors to support their security needs,” Faehl said.

Pricing for Microsoft’s security suite was transparent, he said, and the company worked “closely with the Administration to ensure any service and support agreements were pursued ethically and in full compliance with federal laws and regulations.” Faehl said in the statement that Microsoft asked the White House to “review the deal for antitrust concerns and ensure everything was proper and they did so.”

The White House disputed that characterization, as did Tim Wu, a former presidential adviser who told ProPublica he discussed the offer with the company in a short, informal chat prior to the summit but provided no signoff. “If that’s what they’re saying, they’re misrepresenting what happened on that phone call,” he said.

A current White House official, in a statement to ProPublica, sought to distance the administration from Microsoft’s offer, which it had previously heralded as an “ambitious” cybersecurity initiative.

“This was a voluntary commitment made by Microsoft … and Microsoft alone was responsible for it,” the White House official said in the statement. Furthermore, they said the decisions to accept it were “handled solely by the respective agencies.”

“The White House is not involved in Agency decisions regarding cybersecurity and procurement,” the official said.

The official declined to comment on the legal and contracting concerns raised by experts but noted in the statement that the White House “is broadly concerned” about the risks of relying too much on any single technology vendor and “has been exploring potential policy steps to encourage Departments and Agencies to diversify where there is concentration.” Cybersecurity experts say that such concentration can leave users vulnerable to attack, outages or other disruption.

Yet the White House summit ushered in that very type of concentrated reliance, as well as the kind of anticompetitive behavior that the Biden administration has pledged to stamp out. Former Microsoft salespeople told ProPublica that during their White House Offer push, they advised federal departments to save money by dropping cybersecurity products they had purchased from competitors. Those products, they told them, were now “redundant.” Salespeople also fended off new competitors by explaining to federal customers that most of the cybersecurity tools they needed were included in the upgraded bundle.

Today, as a result of the deals, vast swaths of the federal government, including all of the military services in the Defense Department, are more reliant than ever on a single company to meet their IT needs. ProPublica’s investigation, supported by interviews with eight former Microsoft employees who were involved in the White House Offer, reveals for the first time how this sweeping transformation came to be — a change that critics say leaves Washington vulnerable, the very opposite of what Biden had set out to achieve with his summit.

“How did Microsoft become so pervasive of a player in the government?” said a former company sales leader. “Well, the government let themselves get coerced into Microsoft when Microsoft rolled the stuff out for free.”

President Joe Biden and Microsoft CEO Satya Nadella at a June 2023 event (Chris Kleponis/CNP/Bloomberg via Getty Images) “Everything That We Do Is Designed to Generate a Return”

The federal government is one of Microsoft’s largest customers and “the one that we’re most devoted to,” the company’s president, Brad Smith, has said. Each day, millions of federal employees use the Windows operating system and products like Word, Outlook, Excel and others to write reports, send emails, analyze data and log on to their devices. But in the months before Biden’s summit, the SolarWinds hack put that relationship to the test.

Discovered in late 2020, SolarWinds was one of the most damaging breaches in U.S. history and underscored the federal government’s vulnerability to a state-sponsored cyberattack.

Authorities established that Russian hackers exploited a flaw in a Microsoft product to steal sensitive government documents from the National Nuclear Security Administration and the National Institutes of Health, among other agencies. What they didn’t know, as ProPublica reported in June, was that one of the company’s own engineers had warned about the weakness for years, only to be dismissed by product leaders who were fearful that acknowledging it would undermine the company’s chances of winning a massive federal cloud computing contract.

But Microsoft’s known involvement was enough for Congress to summon Smith to testify in February 2021. Lawmakers focused on how Microsoft packaged its products into tiers of service — with advanced security tools attached to only the most expensive license, known to government customers as the G5.

At the time, many federal employees used a less expensive license known as the G3. As a result, they didn’t have access to the security features that might have alerted them to an intrusion and aided subsequent investigations.

Some lawmakers, like then-Rep. Jim Langevin of Rhode Island, accused the company of unfairly up-charging customers for what they considered to be basic security. “Is this a profit center for Microsoft?” he asked Smith during the hearing.

Smith replied: “We are a for-profit company. Everything that we do is designed to generate a return, other than our philanthropic work.”

Amid the criticism, Microsoft soon announced that it would provide federal customers with a “one-year free trial of Advanced Audit,” a tool that could help the government detect and investigate future attacks. Over the months that followed, Microsoft was “surprised there was not as aggressive of an uptake of Advanced Audit” as the company had wanted, Faehl, Microsoft’s federal security leader, told ProPublica. It would be a “lesson learned” going forward, he said.

That May, Biden signed an executive order requiring federal agencies to bolster their cyber defenses, declaring that “protecting our Nation from malicious cyber actors requires the Federal Government to partner with the private sector.” He added, “In the end, the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced.”

“Parting of the Red Sea”

Around that time, Anne Neuberger, a White House deputy national security adviser, called Smith and requested that Microsoft develop an initiative to announce at Biden’s White House cybersecurity summit that August. Like Langevin, the administration believed that the company’s advanced suite of cybersecurity tools, including ones intended to counter threats on user devices, should be included in the government’s existing licenses and that products should be delivered to customers with the most secure settings enabled by default. (Neither Neuberger nor Smith granted interview requests.)

Giving away a bundle of advanced security features permanently was a nonstarter inside Microsoft, an executive told ProPublica. But Smith spearheaded a team to develop an offer that appeared to be a compromise.

Federal customers could have free, limited-time access to the upgraded G5 security capabilities and to consultants who would install them. “It was at the behest of the Administration that Microsoft provided enhanced security tools, at no cost, to agencies as soon as possible to level up their security baseline,” Faehl told ProPublica.

While the deal achieved the administration’s goal of better protection for the federal government, it also served Microsoft’s interests. Microsoft salespeople had been trying, unsuccessfully, for years to convince federal customers to upgrade to the G5. Department and agency officials balked at the higher price tag when they already had other vendors providing some of the same security capabilities. The G5’s retail price is nearly 60% more than the G3’s.

“We knew that this was a golden window that nobody could have foreseen opening up because we had been pushing” for the G5 upgrade “for years, and things were going very slow,” said a former Microsoft sales leader involved in the strategy. With the White House Offer, it was “like Moses leading us through the parting of the Red Sea, and we just rushed through it.”

We knew that this was a golden window that nobody could have foreseen opening up.

—former Microsoft sales leader

Faehl told ProPublica that sales of the G5 had been slow prior to SolarWinds because federal customers wrongly believed “that they had sufficient security capabilities already in place.” He said the attack was “a wakeup call showing the status quo perspective to be insufficient.”

Microsoft was well aware of the possible legal implications of its offer. More than two decades ago, the U.S. Department of Justice sued the company in a landmark antitrust case that nearly resulted in its breakup. Federal prosecutors alleged that Microsoft maintained an illegal monopoly in the operating system market through anticompetitive behaviors that prevented rivals from getting a foothold. Ultimately, the Justice Department settled with Microsoft, and a federal judge approved a consent decree that imposed restrictions on how the company could develop and license software. Although the decree had long since expired, it nonetheless continued to loom large in the corporate culture.

When it came to the White House Offer, company insiders were “mindful of the concerns about Microsoft making products free that smaller companies sell,” an executive told ProPublica. A spokesperson explained, “That was the impetus for asking the administration to review it.”

The “review” consisted of a phone call between Microsoft’s Smith and Wu, who was Biden’s special assistant for technology and competition policy.

“Brad was like, ‘We think security is important, and we want to give the federal government better security,’” Wu recalled.

But, according to Wu, Smith said Microsoft’s lawyers were “overly paranoid” about antitrust concerns, and he was looking to “calm his own lawyers down.”

“I made it clear there was no ability in the White House to sign off on antitrust,” which is in the purview of the Justice Department or the Federal Trade Commission, Wu said. “I’m smart enough not to say, ‘Oh yeah, that’s fine with me.’ I’m not crazy.”

I made it clear there was no ability in the White House to sign off on antitrust. I’m smart enough not to say, ‘Oh yeah, that’s fine with me.’ I’m not crazy.

—Tim Wu, former presidential adviser

After the news organization asked Microsoft about Wu’s account, a spokesperson walked back the company’s original written statement, saying that Faehl was misinformed. “The White House arranged a call and we described details of our security offer and how it was structured to avoid antitrust concerns,” the spokesperson said. “It was an informal conversation and at no time did we ask for formal antitrust approval.”

Wu also told ProPublica that he felt pressure from the National Security Council’s Neuberger, who “wanted to get this deal done” in the wake of SolarWinds and other cyberattacks. “She pushed me to get on the phone with Brad,” he said. “I feel in some ways in retrospect I should not have even spoken with him. But I felt that I should help the NSC for what they presented as a formalistic exercise to help the national security.”

“The End Game”

After the White House summit, Microsoft’s sales teams quickly mobilized to sell the “WHO,” as it became known to insiders. The free consulting services were a crucial part of the strategy, former salespeople said. As Sondhi put it, “Just because you give the product away for free doesn’t mean they’re going to use it because it’s a pain in the ass to install new software and retrain staff.” The company wanted to avoid a repeat of the disappointing participation in the earlier Advanced Audit offer.

The consultants would work inside the agencies, where they would have government-provided desks, phones and internet, as well as access to federal computer networks, according to one proposal reviewed by ProPublica. From their perches in the bureaucracy, they would get the products up and running and train federal employees on how to use them. This would make the upgrades “sticky,” as they became ingrained in employees’ daily lives, former salespeople said.

Microsoft covered the free product upgrades for up to a year, the company told ProPublica. Faehl called the free upgrades “a short term option for protection while agencies put long term procurement plans in motion.” Or, as sales teams told customers, they “should not have to wait to be secure until they can procure.” The company also noted the offer came at a significant cost to Microsoft, “with no guarantee of renewal once the deal expired.”

But sales teams said they knew customers who accepted the White House Offer were unlikely to undo the intensive work of installing the upgrades when renewal time rolled around, locking them into the G5 for the long haul. Wes Anderson, a Microsoft vice president who oversaw teams working with the Defense Department, asked his staff to prepare forecasts showing which customers were expected to become paying G5 users at the end of the White House Offer, three people who worked in sales told ProPublica.

“It was explicit that this was the end game,” one former Microsoft sales leader who worked inside the Defense Department told ProPublica. “You will do whatever you need to do to get that software installed, operational and connected so the customer has their runway to renew.”

It was explicit that this was the end game. You will do whatever you need to do to get that software installed, operational and connected.

—former Microsoft sales leader

(On Oct. 30, two weeks after the news organization sent Microsoft questions for this story, the company announced in an email to employees that Anderson would be leaving Microsoft. Neither Anderson nor Microsoft commented on the departure. On the topic of Anderson’s request of his staff, the company said, “Forecasting is part of the rhythm of business for organizations in nearly every industry.”)

Salespeople pitched the White House Offer as “the easy button,” people familiar with the strategy told ProPublica. “Our argument was, ‘We have this whole suite of goodness,’” said a former Microsoft employee who worked with the Department of Defense. “‘You should upgrade because it will take care of everything rather than having a bunch of vendors that each do one of the 20 things that the G5 can do.’” Faehl told ProPublica the license bundles help federal customers “avoid the hassles of managing multiple contracts and licenses” and close security gaps by replacing a “patchwork of solutions” with “simplified, comprehensive protection.”

For the most part, as they predicted, the Microsoft sales teams found receptive audiences across the government. To help ingratiate themselves, they invoked their association with the White House in their pitches. In one example, from June 2022, a Microsoft representative wrote to Veterans Affairs officials to explain that, “working in conjunction with the White House,” it would provide “a no cost offer of professional services to provide hands-on assistance” to deploy the upgrades.

Money for Nothing?

As consultants fanned out across the federal government to turn on the new features, there was a sense of unease among some employees about the nature of the deals. Typically, the government obtains products and services through a competitive bidding process, selecting from a variety of proposals from different vendors. The White House Offer was different.

“No matter how you wanted to polish the turd, there was the appearance of no-bid contracts,” said a former Microsoft consultant involved in the WHO.

The federal government may receive so-called gratuitous — or free — services from donors as long as both parties have a written agreement stating that the donor will not be paid for the goods or services provided. Such agreements were in place for the consulting services in the White House Offer, the company said.

No matter how you wanted to polish the turd, there was the appearance of no-bid contracts.

—former Microsoft consultant

Those agreements may have helped Microsoft pass the “laugh test,” said Lyon, the former federal procurement attorney. “But just because something is technically legal does not make it right,” she said.

Other contracting experts said federal departments and agencies should have been more skeptical about accepting free products and consulting services from Microsoft, given the implications for competition and national security.

The cost and difficulty of switching from the Microsoft products presents a classic example of “vendor lock-in,” said Jessica Tillipman, associate dean for government procurement law studies at George Washington University Law School. “The free services are allowing the government to bypass a competitive procurement process and locking them in for future procurements,” she said.

Tillipman said that, in the future, the government should consider restrictions on gratuitous services in IT in order “to ensure you’re not locked in with a vendor who gets their foot in the door with a frighteningly expensive” giveaway.

“This is all designed to undermine future competitions,” she said.

This is all designed to undermine future competitions.

—Jessica Tillipman, associate dean, George Washington University Law School

James Nagle, a former Army contracting official and practicing attorney who specializes in the federal contracting process, went even further, saying that the White House Offer potentially violated existing law.

The Federal Acquisition Regulation, which governs government procurement, says that employees may not accept “gratuities,” or anything of value “from anyone who has or is seeking to obtain Government business.” And, as employees involved with the White House Offer told ProPublica, Microsoft was seeking future contract upgrades and new Azure revenue.

While “gratuities” are typically considered to be perks such as free meals, sports tickets or other gifts for personal use, Nagle argued that the rule could apply to the White House Offer, though he said he was not aware of any prior case using his interpretation. He compared it to a car manufacturer providing a government agency with a fleet of cars for a year for free because it wants the agency to procure that fleet for its staff. “Any contracting officer would say, ‘No, you can’t do that,’” Nagle said. Once employees get used to the cars, they’re reluctant to switch, he said, and the “impermissible gift” would create a built-in bias toward that manufacturer.

“That’s the problem here,” Nagle said. “This is not truly gratuitous. There’s another agenda in the works.”

Microsoft did not use the so-called gratuitous services agreements to give away the G5 upgrades, as it did for the consulting services. Instead, Faehl told ProPublica, the company considered them “a 100% discount” added to existing customer contracts. He said making this type of “strategic investment is … common practice among companies” and that contract teams on both sides reviewed the deals. Nagle viewed it differently, characterizing the free products as a “loss leader designed to lead to future sweetheart deals.”

Federal vendors may be banned from government contracting for violating the Federal Acquisition Regulation, though such an outcome would be highly unlikely for a vendor as large as Microsoft, Nagle said. Nonetheless, individual employees on both sides of improper deals in the past have been held accountable, he said.

Skirting fiscal law, however, may have set the stage for an even more serious legal concern, said Christopher Sagers, a professor of antitrust law at Cleveland State University in Ohio. Microsoft’s actions, Sagers said, might constitute what is known in antitrust law as “exclusionary conduct,” opening the door for illegal monopoly. “Microsoft, rather than competing on the merits, took steps to exclude competitors by making its product sticky in advance of opportunities for competition,” he said. The company used “an already dominant position to further cement their position.”

Microsoft disputed that point.

“We don’t believe our offer raised antitrust concerns, and we constructed it specifically to avoid any such issues,” a company spokesperson said. “We talked informally with a White House staffer about this.”

Wu, however, said the company did not make clear to him the financial and competitive implications of the offer.

“There is no way that was discussed,” Wu told ProPublica. “The only thing that Brad mentioned was upgrading federal agencies, offering them better stuff.” Upon hearing the news organization’s findings, he said: “That is a lot darker than it sounded. Once you’re in somewhere, it’s very hard to leave.

“Now I’m starting to feel guilty in some weird way about playing a role in a big deal that cost taxpayers money,” Wu said.

Taking Out the Competition

Former Microsoft salespeople said that all of the customers within the Defense Department who signed on to the White House Offer — including all the military branches — ultimately upgraded to the G5 and began paying for it when the time came to renew their agreements in 2022 and 2023.

A Defense Department spokesperson said in a written statement that the department followed federal acquisition law and “conducted internal tests and evaluations of multiple vendor capabilities.” The upgrade, the spokesperson said, was “crucial” to meeting the department’s cybersecurity objectives. The department declined to answer follow-up questions, including to specify which vendors it evaluated before deciding on the G5.

John Sherman, the department’s chief information officer at the time of the White House Offer dealmaking, defended both the government’s decision and Microsoft’s strategy. “I am sure Microsoft, like any company, would be trying to increase their business with any customer,” he told ProPublica.

He added, “We didn’t have any particular preference for Microsoft in terms of favoritism or anything like that, but we knew it worked, which is why we wanted to proceed with that.”

Many civilian agencies also upgraded to the G5 during this timeframe, said Sondhi, who now works at Microsoft competitor Trellix as chief technology officer for the company’s public-sector business.

For Microsoft, winning more government business was only half the picture. It also saw the White House Offer as an opportunity to knock out its competitors.

During and after their sales push, Microsoft salespeople advised government departments and agencies to remove competing products from their IT lineups to cut costs, saying the Microsoft bundle would render those other products redundant. Internally, employees called it the “take-out” strategy. “The play is: ‘You’re paying for it in the G5. It’s a waste of government money to have both,’” a former sales leader who worked with the Defense Department told ProPublica.

Sondhi said that in a typical scenario, an upgrade to the 5-level can displace the existing work of a half dozen vendors or more. Executives from cybersecurity companies Trellix and Proofpoint, for example, told ProPublica they lost federal business in the wake of the White House Offer deals.

The White House Offer also enhanced Microsoft’s competitive position by reducing the likelihood that the government would open bidding for cybersecurity products in the future, given the cornucopia of offerings in the G5. Within the company, this was known as “taking opportunities off the street,” former sales leaders said.

The fallout impacted companies that were in the midst of completing the authorization process the government requires of vendors providing cloud-based services. Several told ProPublica that cybersecurity contract opportunities are now scarce.

“We are chipping away, but it’s largely, by far, a Microsoft-owned landscape,” an executive at one competing vendor told ProPublica.

Faehl dismissed those complaints, saying that customers kept the upgrades because they performed well and that competitors “should look inward to see why their products do not meet or exceed Microsoft results.”

Reckoning With the “Monoculture”

Microsoft has something few other companies possess: a panoply of products that span the IT ecosystem. Rivals say the company leveraged its existing dominance in certain products — like the Windows operating system and classic workplace applications — to gain dominance in others, namely cybersecurity and cloud computing.

“No one has the kind of capital that Microsoft does,” Sondhi said. “They can just absorb the cost of the giveaway until the customer’s first bill.”

A coalition backed by some of Microsoft’s major competitors, including Google and Amazon, has raised similar issues with the Federal Trade Commission, which in 2023 gathered public comments on the business practices of cloud computing providers. Among the FTC’s areas of ongoing interest: “Are there signs that cloud markets are functioning less than fully competitively, and that certain business practices are inhibiting competition?”

Competition is not the only issue at stake. As Washington has deepened its relationship with Microsoft, congressional leaders have raised concerns about what they call a cybersecurity “monoculture” in the federal government. Some, like Wyden and Sen. Eric Schmitt, a Republican from Missouri, have blasted the Defense Department in particular for “doubling down on a failed strategy of increasing its dependence on Microsoft.”

“Although we welcome the Department’s decision to invest in greater cybersecurity, we are deeply concerned that DoD is choosing not to pursue a multi-vendor approach that would result in greater competition, lower long-term costs, and better outcomes related to cybersecurity,” the two lawmakers wrote in a letter to Sherman, then the department’s chief information officer, in May.

Microsoft’s Faehl pushed back. “The suggestion that our customers are any more at risk because they use Windows, or Azure, or Office is wrong,” he said. “We partner closely with our security competitors because we see them as partners against threat actors we face in common.”

Still, just last year, Chinese hackers exploited Microsoft security lapses to breach the email accounts of senior U.S. officials. Investigating the attack, the federal Cyber Safety Review Board faulted the company for a “cascade of … avoidable errors” and pressed it to overhaul its security culture. Microsoft has since pledged to place security “above all else.” In June, Smith told Congress that Microsoft would strive to establish a “culture that encourages every employee to look for problems, find problems, report problems, help fix problems and then learn from the problems.”

It’s learning from the successes, too. The same week that Smith testified before Congress, and nearly three years after Nadella made his commitment at Biden’s summit, Microsoft made a new offer, this time to “support hospitals serving more than 60 million people living in rural America.”

The playbook was familiar. In its announcement, the company said that eligible hospitals could have the private-sector equivalent of the G5 “at no cost for one year.” As before, Faehl said Microsoft made the commitment “at the behest of the White House.”


This content originally appeared on ProPublica and was authored by by Renee Dudley, with research by Doris Burke.

]]>
https://www.radiofree.org/2024/11/15/biden-asked-microsoft-to-raise-the-bar-on-cybersecurity-he-may-have-helped-create-an-illegal-monopoly/feed/ 0 502051
Collins and Rocket Lab challenged over satellites linked to Israeli war crimes https://www.radiofree.org/2024/11/14/collins-and-rocket-lab-challenged-over-satellites-linked-to-israeli-war-crimes/ https://www.radiofree.org/2024/11/14/collins-and-rocket-lab-challenged-over-satellites-linked-to-israeli-war-crimes/#respond Thu, 14 Nov 2024 05:55:50 +0000 https://asiapacificreport.nz/?p=106947 Asia Pacific Report

The Palestine Solidarity Network Aotearoa (PSNA) has written to the Minister for Space Judith Collins and Rocket Lab CEO Peter Beck to warn that satellites being launched from the Māhia Peninsula are “highly likely” to conduct surveillance for Israel.

And also to assist in the commission of war crimes in Gaza and in Lebanon, said PSNA national chair John Minto.

“Three companies are of particular concern to us: BlackSky Technology, Capella Space, and HawkEye 360,” Minto said in a statement.

“In particular, BlackSky has a US$150 million contract to supply high temporal frequency images and analysis to Israel,” Minto said.

“We believe it is highly likely that BlackSky provides data to Israel which it uses to target civilian infrastructure across Gaza and Lebanon.”

Minto said that PSNA understood that Rocket Lab had launched satellites for BlackSky since 2019.

The advocacy group also aware that by the end of 2024, Rocket Lab was expected to begin deploying BlackSky’s constellation of next generation earth observation satellites, with improved capability.

Asking for suspension
“We are asking the minister and Rocket Lab to suspend all further satellite launches for BlackSky, full stop,” Minto said.

“For Capella Space and HawkEye 360, we are asking that the minister suspend satellite launches from the Māhia Peninsula until an investigation has taken place to assure New Zealanders that further launches will not put us in breach of our commitments under international law.

“New Zealanders don’t want our country used to support war crimes committed by Israel or any other country”, he said.

“If we are serious about our responsibilities under international law, including the Genocide Convention, then we must act now.”

Stopping the satellite launches was the “least we can do”.

A PSNA support lawyer, Sam Vincent, said: “New Zealand has solemn responsibilities under international law which must trump any short-term profit for Rocket Lab or the convenience of our government.”

He said that all three companies were sponsors of a geospatial intelligence conference in Israel taking place in January 2025 [Ramon GeoInt360], of which the Israel Ministry of Defence and BlackSky were “leading partners” and HawkEye 360 and Capella Space were sponsors.

Minto added: “All the alarm bells are ringing. These companies are up their eyeballs in support for Israel.”


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/11/14/collins-and-rocket-lab-challenged-over-satellites-linked-to-israeli-war-crimes/feed/ 0 501842
COP29: Does NZ have the credibility to lead carbon trading talks? https://www.radiofree.org/2024/11/13/cop29-does-nz-have-the-credibility-to-lead-carbon-trading-talks/ https://www.radiofree.org/2024/11/13/cop29-does-nz-have-the-credibility-to-lead-carbon-trading-talks/#respond Wed, 13 Nov 2024 07:51:43 +0000 https://asiapacificreport.nz/?p=106858 By Eloise Gibson, RNZ climate change correspondent

New Zealand’s Climate Change Minister Simon Watts is going to the global climate summit in Baku, Azerbaijan next week, where he will be co-leading talks on international carbon trading.

But the government has been unable to commit to using the trading mechanism he is leading high-level discussions about, and critics say he is also vulnerable over New Zealand’s backsliding on fossil fuels.

New Zealand has consistently pushed for two things in international climate diplomacy — one is ending government subsidies for fossil fuels globally, and the other is allowing carbon trading across international borders, so one country can pay for, say, switching off a coal plant in another country.

COP29 BAKU, 11-22 November 2024
COP29 BAKU, 11-22 November 2024

Nailing down the rules for making sure these carbon savings are real will be an area of focus for leaders at the COP29 summit, starting on 11 November.

But as Watts gets ready to attend the talks, critics say his government is vulnerable to accusations of hypocrisy on both fronts.

In a bid to bring back fossil fuel exploration, the government wants to lower financial security requirements on oil and gas companies requiring them to set aside money for the costs of decommissioning and cleaning up spills.

The coalition says the current requirements — brought in after taxpayers had to pay to deal with a defunct oil field — are so onerous they are stopping companies wanting to look for fossil fuels.

Billion dollar clean-ups
At a recent hearing, Parliament’s independent environment watchdog warned going too far at relaxing requirements could leave taxpayers footing bills of billions of dollars if a clean-up is needed.

The commission’s Geoff Simmons spoke on behalf of Commissioner Simon Upton.

“The commissioner was really clear in his submission that he wants to place on record that he doesn’t think it is appropriate for any government, present or future, to offer any subsidies, implicit or explicit, to underwrite the cost of exploration.”

The watchdog said that would tilt the playing field away from renewable energy in favour of fossil fuels.

Energy Minister Shane Jones says the government’s Bill doesn’t lower the liability for fixing damage or decommissioning oil and gas wells, which remain the responsibility of the fossil fuel company in perpetuity.

But climate activist Adam Currie says that only works if the company stays in business.

“The watering down of those key financial safeguards increases the risk of the taxpaper having to yet again pay to decommission a failed oil field.

“Simon Watts is about to go to COP and urge other countries to end fossil fuel subsidies while at home they are handing an open cheque to fossil fuels  .. This is a classic case of do as a say, not as I do.”

Getting flack not feared
Watts says he does not fear getting flack for the fossil-friendlier changes when he is in Baku, citing the government’s goal of doubling renewable energy.

“No I’m not worried about flak, New Zealand is transitioning away from fossil fuels . . . gas [from fossil fields] is going to need to be a means by which we need to transition.”

Nor does he see an issue with the fact he is jointly leading negotiations on a trading mechanism his own government seems unable to commit to using.

Watts is leading talks to nail down rules on international carbon trading with Singaporean Environment Minister Grace Fu. Her country has struck a deal to invest in carbon savings in Rwanda.

New Zealand also needs international help to meet its 2030 target, but the coalition government has not let officials pursue any deals. NZ First refuses to say if it would back this.

Watts says his leadership role is independent of domestic politics and ministers around the world are keen to nail down the rules, as is the Azerbaijan presidency.

“Our primary focus is to ensure that we get an outcome form those negotiators, our domestic considerations are not relevant.”

Paris target discussions
He said discussions on meeting New Zealand’s Paris target were still underway.

His next challenge at home is getting Cabinet agreement on how much to promise to cut emissions from 2030-2035, the second commitment period under the Paris Agreement.

Countries are being urged to hustle, with the United Nations saying current pledges have the planet on track for what it calls a “catastrophic” 2.5 to 2.9 degrees of heating.

A new pledge is due for 2030-2035 in February.

A major goal for host Azerbaijan is making progress on a deal for climate finance.

Currently OECD countries committed to pay $100 billion a year in finance to poorer countries to adapt to and prevent the impacts of climate change.

Not all the money has been paid as grants, with a large proportion given as loans.

Countries are looking to agree on a replacement for the finance mechanism when it runs out in 2025.

Watts said New Zealand would be among the nations arguing for the liability to pay to be shared more widely than the traditional list of OECD nations, bringing in other countries that can also afford to contribute.

Oil states such as UAE have already promised specific funding despite not being part of the original climate finance deal.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/11/13/cop29-does-nz-have-the-credibility-to-lead-carbon-trading-talks/feed/ 0 501652
A Robot’s Perspective on Humans https://www.radiofree.org/2024/11/12/a-robots-perspective-on-humans/ https://www.radiofree.org/2024/11/12/a-robots-perspective-on-humans/#respond Tue, 12 Nov 2024 15:21:56 +0000 https://dissidentvoice.org/?p=154863 A comforting perspective.

The post A Robot’s Perspective on Humans first appeared on Dissident Voice.]]>

The post A Robot’s Perspective on Humans first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2024/11/12/a-robots-perspective-on-humans/feed/ 0 501532
Scientists found a new ally in the fight to clean up CO2 emissions: ‘Chonkus’ https://grist.org/article/scientists-carbon-capture-co2-emissions-bacteria-chonkus/ https://grist.org/article/scientists-carbon-capture-co2-emissions-bacteria-chonkus/#respond Tue, 05 Nov 2024 09:15:00 +0000 https://grist.org/?p=652326 Tucked away in the most extreme nooks and crannies of the Earth are biodiverse galaxies of microorganisms — some that might help scour the atmosphere of the carbon dioxide mankind has pumped into it.

One microorganism in particular has captured scientists’ attention. UTEX 3222, nicknamed “Chonkus” for the way it guzzles carbon dioxide, is a previously unknown cyanobacterium found in volcanic ocean vents. A recent paper in the journal Applied and Environmental Microbiology found it boasts exceptional atmosphere-cleaning potential — even among its well-studied peers. If scientists can figure out how to genetically engineer it, this single-celled organism’s natural quirks could become supercharged into a low-waste carbon capture system.

Cyanobacteria like Chonkus, sometimes referred to by the misnomer blue-green algae, are aquatic organisms that, suck up light and carbon dioxide and turn it into food, photosynthesizing like plants. But tucked away inside their single-celled bodies are compartments that allow them to concentrate and gobble up more CO2 than their distant leafy relatives. When found in exotic environments, they can evolve unique characteristics not often found in nature. For microorganism researchers, whose field has long revolved around a handful of easy-to-manage organisms like yeast and E. coli, the untapped biodiversity heralds new possibilities.

“There’s more and more excitement about isolating new organisms,” said Braden Tierney, a microbiologist and one of the lead authors of the paper that identified Chonkus. On an expedition in September 2022, Tierney and researchers from the University of Palermo in Italy dove into the waters surrounding Vulcano, an island off the coast of Sicily where volcanic vents in shallow waters provide an unusual habitat — illuminated by sunlight and yet rich with plumes of carbon-dioxide. The location yielded a veritable soup of microbial life, including Chonkus.

three men in scuba suits under water huddle around a clipboard and scientific instruments. green sea grass is under them. the blue of the water above them is light and effuse with light.
Researchers from Two Frontiers and the University of Palermo diving near Vulcano. John Kowitz / Two Frontiers

After Tierney retrieved flasks of the seawater, Max Schubert, the other lead author of the cyanobacteria paper and a lead project scientist at the scientific nonprofit Align to Innovate, got to work identifying the different organisms in it. Schubert said that out in the open ocean, cyanobacteria like Chonkus grow slowly and are thinly dispersed. “But if we wanted to use them to pull down carbon dioxide, we would want to grow them a lot faster,” he said, “and grow in concentrations that don’t exist in the open ocean.”

Back in the lab, Chonkus did just that — growing faster and thicker than other previously discovered cyanobacteria candidates for carbon capture systems. “When you grow a culture of bacteria, it looks like broth and the bacteria are very dilute in the culture,” Schubert said, “but we found that Chonkus would settle into this stuff that is much more dense, like a green peanut butter.”

Chonkus’ peanut butter consistency is important for the strain’s potential in green biotechnologies. Typically, biotech industries that use cyanobacteria and algae need to separate them from the water they grow in. Because Chonkus does so naturally with gravity, Schubert says, it could make the process more efficient. But there are plenty of other puzzles to solve before a discovery like Chonkus can be used for carbon capture.

CyanoCapture, a cyanobacteria carbon capture startup based in the United Kingdom, has developed a low-cost method of catching carbon dioxide that runs on biomass, housing algae and cyanobacteria in clear tubes where they can grow and filter CO2. Although Chonkus shows unique promise, David Kim, the company’s CEO and founder, said biotechnology companies need to have more control over its traits, like carbon storage, to use it successfully, and that requires finding a way to crack open its DNA.

CyanoCapture’s photobioreactors full of bacteria that can filter out carbon dioxide from emission sources.
CyanoCapture

“Oftentimes we’ll find in nature that a microbe can do something kind of cool, but it doesn’t do it as well as we need to,” said Henry Lee, CEO of Cultivarium, a nonprofit biotech start-up in Watertown, Massachusetts, that specializes in genetically engineering microbes. Cultivarium has been working with CyanoCapture to help them study Chonkus but has yet to figure out how to tinker with its DNA and improve its carbon capturing attributes. “Everybody wants to juice it up and tweak it,” he said.

Since the expedition to Vulcano where Tierney scooped up Chonkus, the nonprofit he founded to explore more extreme environments around the world, the Two Frontiers Project, has also sampled hot springs in Colorado, volcanic chimneys in the Tyrrhenian Sea near Italy, and coral reefs in the Red Sea. Perhaps out there, researchers will find a chunkier Chonkus that can pack away even more carbon, microbes that can help regrow corals, or more organisms that can ease the pains of a rapidly warming world. “There’s no question we’ll keep finding really, really interesting biology in these vents, Tierney said. “I can’t stress enough that this was just the first expedition.”

Kim noted that out of all the microbes out there, less than 0.01 percent have been studied. “They don’t represent the true arsenal of microbes that we could potentially work with to achieve humanity’s goals.”

This story was originally published by Grist with the headline Scientists found a new ally in the fight to clean up CO2 emissions: ‘Chonkus’ on Nov 5, 2024.


This content originally appeared on Grist and was authored by Sachi Kitajima Mulkey.

]]>
https://grist.org/article/scientists-carbon-capture-co2-emissions-bacteria-chonkus/feed/ 0 500504
Fijian journalists embrace multimedia landscape for the digital age https://www.radiofree.org/2024/11/05/fijian-journalists-embrace-multimedia-landscape-for-the-digital-age/ https://www.radiofree.org/2024/11/05/fijian-journalists-embrace-multimedia-landscape-for-the-digital-age/#respond Tue, 05 Nov 2024 03:37:00 +0000 https://asiapacificreport.nz/?p=106431 By Catrin Gardiner, Queensland University of Technology

In the middle of the Pacific, Fiji journalists are transforming their practice, as newsrooms around Suva are requiring journalists to become multimedia creators, shaping stories for the digital age.

A wave of multimedia journalists is surfacing in Fijian journalism culture, fostered during university education, and transitioning seamlessly into the professional field for junior journalists.

University of the South Pacific’s technical editor and digital communication officer Eliki Drugunalevu believes that multimedia journalism is on the rise for two reasons.

“The first is the fact that your phone is pretty much your newsroom on the go.”

With the right guidance and training in using mobile phone apps, “you can pretty much film your story from anywhere”, he says.

The second reason is that reliance on social media platforms gives “rise to mobile journalism and becoming a multimedia journalist”.

Drugunalevu says changes to university journalism curriculum are not “evolving fast enough” with the industry.

Need for ‘parallel learning’
“There needs to be parallel learning between what the industry is going through and what the students are being taught.”

Mobile journalism is growing increasingly around the world. In Fiji this is particularly evident, with large newsrooms entertaining the concept of a single reporter taking on multiple roles.

Fijian Media Association’s vice-president and Fiji Times editor-in-chief Fred Wesley says one example of the changing landscape is that the Times is now providing all its journalists with mobile phones.

“While there is still a photography department, things are slowly moving towards multimedia journalists.”

Wesley says when no photographers are available to cover a story with a reporter, the journalists create their own images with their mobile phones.

Journalists working in the Fiji Times newsroom
Journalists working in the Fiji Times newsroom, which is among the last few remaining news organisations in Fiji to have a dedicated photography department. Image: Catrin Gardiner, Queensland University of Technology

The Fiji Broadcasting Corporation (FBC) also encourages journalists to take part in all types of media including, online, radio, and television, even advertising for multimedia journalists. This highlights the global shift of replacing two-person teams in newsrooms.

Nevertheless, the transition to multimedia journalists is not as positive as commonly thought. Complaints against multimedia journalism come from journalists who receive additional tasks, leading to an increase in workload.

FBC advertises for multimedia journalists
FBC advertises for multimedia journalists, reflecting the new standard in newsrooms. Image: FBC TV/Facebook/QUT

Preference for print
Former print journalist turned multimedia journalist at FBC, Litia Cava says she prefers focusing on just print.

She worked a lot less when she was just working in a newspaper, she says.

“When I worked for the paper, I would start at one,” she says. “But here I start working when I walk in.”

Executives at major Fijian news companies, such as Fiji TV’s director of news, current affairs and sports, Felix Chaudhary, also complain about the lack of equipment in their newsrooms to support this wave of multimedia journalism.

“The biggest challenge is the lack of equipment and training,” Chaudhary says.

Fiji TV is doing everything it can to catch up to world standards and provide journalists with the best equipment and training to prepare them for the transition from traditional to multimedia journalism.

“We receive a lot of assistance from PACMAS and Internews,” Chaudhary says. “However, we are constantly looking for more training opportunities. The world is already moving towards that, and we just have to follow suit or get left behind.”

More confidence
Fortunately for young Fijian journalists, Islands Business managing editor Samantha Magick says a lot of younger journalists are more confident to go out and produce and write their own stories.

“It’s the education now,” she says. “All the journalists coming through are multimedia, so not as challenging for them.”

University of South Pacific student journalist Brittany Louise says the practical learning of all the different media in her journalism course will be beneficial for her future.

“I think that’s a major plus,” she says. “You already have some sort of skills so it helps you with whatever different equipment it may be.”

Catrin Gardiner was a student journalist from the Queensland University of Technology who travelled to Fiji with the support of the Australian government’s New Colombo Plan Mobility Programme. This article is published in a partnership of QUT with Asia Pacific Report, Asia Pacific Media Network (APMN) and The University of the South Pacific.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2024/11/05/fijian-journalists-embrace-multimedia-landscape-for-the-digital-age/feed/ 0 500447
Exploiting Meta’s Weaknesses, Deceptive Political Ads Thrived on Facebook and Instagram in Run-Up to Election https://www.radiofree.org/2024/10/31/exploiting-metas-weaknesses-deceptive-political-ads-thrived-on-facebook-and-instagram-in-run-up-to-election/ https://www.radiofree.org/2024/10/31/exploiting-metas-weaknesses-deceptive-political-ads-thrived-on-facebook-and-instagram-in-run-up-to-election/#respond Thu, 31 Oct 2024 09:00:00 +0000 https://www.propublica.org/article/facebook-instagram-meta-deceptive-political-ads-election by Craig Silverman, ProPublica, and Priyanjana Bengani, Tow Center for Digital Journalism

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

This story was reported in collaboration with the Tow Center for Digital Journalism at Columbia Journalism School.

In December, the verified Facebook page of Adam Klotz, a Fox News meteorologist, started running strange video ads.

Some featured the distinctive voice of former President Donald Trump promising “$6,400 with your name on it, no payback required” just for clicking the ad and filling out a form.

In other ads with the same offer, President Joe Biden’s well-known cadence assured viewers that “this isn’t a loan with strings attached.”

There was no free cash. The audio was generated by AI. People who clicked were taken to a form asking for their personal information, which was sold to telemarketers who could target them for legitimate offers — or scams.

Klotz’s page ran more than 300 of these ads before ProPublica contacted the weather forecaster in late August. Through a spokesperson, Klotz said that his page had been hacked and he was locked out. “I had no idea that ads were being run until you reached out.”

Klotz’s page had been co-opted by a sprawling ad account network that has operated on Facebook for years, churning out roughly 100,000 misleading election and social issues ads despite Meta’s stated commitment to crack down on harmful content, according to an investigation and analysis by ProPublica and Columbia Journalism School’s Tow Center for Digital Journalism, as well as research by the Tech Transparency Project, a nonpartisan nonprofit that researches large tech platforms. The organizations combined data and shared their analyses. TTP’s report was produced independently of ProPublica and Tow’s investigation and was shared with ProPublica prior to publication.

The network, which uses the name Patriot Democracy on many of its ad accounts, is one of eight deceptive Meta advertising operations identified by ProPublica and Tow. These networks have collectively controlled more than 340 Facebook pages, as well as associated Instagram and Messenger accounts. Most were created by the advertising networks, with some pages masquerading as government entities. Others were verified pages of people with public roles, like Klotz, who had been hacked. The networks have placed more than 160,000 election and social issues ads on these pages in English and Spanish. Meta showed the ads to users nearly 900 million times across Facebook and Instagram.

The ads are only a fraction of the more than $115 billion Meta earns annually in advertising revenue. But at just over $25 million in total lifetime spend, the networks collectively rank as the 11th-largest all-time advertiser on Meta for U.S. elections or social issues ads since the company began sharing data in 2018. The company’s failure to block these scams consistently highlights how one of the world’s largest platforms struggles to protect its users from fraud and deliver on its nearly decadelong promise to prevent deceptive political ads.

Most of these networks are run by lead-generation companies, which gather and sell people’s personal information. People who clicked on some of these ads were unwittingly signed up for monthly credit card charges, among many other schemes. Some, for example, were conned by an unscrupulous insurance agent into changing their Affordable Care Act health plans. While the agent earns a commission, the people who are scammed can lose their health insurance or face unexpected tax bills because of the switch.

The ads run by the networks employ tactics that Meta has banned, including the undisclosed use of deepfake audio and video of national political figures and promoting misleading claims about government programs to bait people into sharing personal information. Thousands of ads illegally displayed copies of state and county seals and the images of governors to trick users. “The State has recently approved that Illinois residents under the age of 89 may now qualify for up to $35,000 of Funeral Expense Insurance to cover any and all end-of-life expenses!” read one deceptive ad featuring a photo of Gov. JB Pritzker and the Illinois state seal.

More than 13,000 ads deployed divisive political rhetoric or false claims to promote unofficial Trump merchandise.

A deceptive ad used the image of Illinois Gov. JB Pritzker and the state seal. (Screenshot by ProPublica)

Meta removed some of the ads after initially approving them, the investigation found, but it failed to catch thousands of others with similar or even identical content. In many cases, even after removing the violating ads, it allowed the associated Facebook pages and accounts to continue operating, enabling the parent networks to spawn new pages and ads.

Meta requires ads related to elections or social issues like health care and immigration to include “paid for by” disclaimers that identify the person or entity behind the ads. But its rules for verifying advertisers and publicly disclosing who paid for such ads are less stringent than those of its main competitor, Google, ProPublica and Tow found. Many of the disclaimers on Facebook ads listed nonexistent entities.

A Meta spokesperson said it invests heavily in trust and safety and uses a mix of humans and technology to review election and social issues ads.

“We welcome ProPublica’s investigation into this scam activity, which included deceptive ads promoting Affordable Care Act tax credits and government-funded rent subsidies,” spokesperson Margarita Franklin said in an emailed statement. “... [A]s part of our ongoing work against scams, impersonation and spam, our enforcement systems had already detected and disabled a large portion of the Pages — and we reviewed and took action against the remainder of these Pages for various policy violations.”

Our analysis showed that while Meta had removed some pages and ads, its enforcement often lagged or was haphazard. Prior to being contacted by ProPublica and Tow, Meta had taken action against roughly 140 pages affiliated with these eight networks, representing less than half of the total identified in the investigation.

By then, the ads on those pages had been shown hundreds of millions of times, resulting in financial losses for an untold number of people.

Meta ultimately removed a substantial portion of pages flagged by this investigation. But after that enforcement, ProPublica and the Tow Center found that four of the networks ran more than 5,000 ads in October. Patriot Democracy alone activated two pages a day on average in the first half of this month.

“Their enforcement here is just super spotty and inconsistent, and they’re not actually attacking root problems,” said Jeff Allen, the chief research officer of the Integrity Institute, a nonprofit organization for trust and safety professionals.

He said networks like Patriot Democracy exploit the fact that a single Facebook page can be connected to multiple ad accounts and user profiles, creating a complex challenge for enforcement. “But these cracks have existed for the past eight years,” said Allen, a former Meta data scientist who worked on integrity issues before departing in 2019.

“There are a lot of gaps in the system, and Facebook’s overall strategy is to play Whac-A-Mole.”

Franklin noted that scammers use a variety of tactics to conceal their activity. Meta constantly updates its detection and enforcement systems and works with industry and law enforcement partners to combat fraudulent activity, she said.

“This is a highly adversarial space, and we continue to update our enforcement systems to respond to evolving scammer behavior,” Franklin said. She added that Meta has taken legal action against several operators.

Meta’s Rules

Misleading election ads have posed a challenge for Meta since at least 2016, when Russian trolls purchased thousands of Facebook and Instagram ads targeting Americans ahead of the 2016 presidential election.

Amid public outcry and pressure from Congress, Meta has created special rules for political and social issues advertisers, launched a public Ad Library to archive such ads and hired additional people to review ads. An integrity team has been tasked with enforcing Meta’s community and advertising standards.

In 2022 and 2023, Meta laid off over 20,000 employees, including members of its integrity team. The company said it has more than 40,000 people working on safety and security around the world, an increase since 2020. It declined to say whether it has more people working on election ad reviews this cycle compared with the last presidential election.

One of the team’s key responsibilities is to verify that election and social issues advertisers are who they say they are, and that their ads adhere to the company’s rules. Since 2019, Meta has required political and social issues advertisers to submit an Employer Identification Number, a government or military website and an associated email address, or a Federal Election Commission registration number.

Meta also allowed state and local organizations and candidates who aren’t federally registered to run ads by providing a corresponding website and email address, a “valid” phone number and a mail-deliverable address. It later relaxed the rules to allow advertisers to simply display the name of their Facebook page as the entity that paid for the ad.

Google, Meta’s main U.S. election ads competitor, doesn’t have similar carve-outs for ad disclaimers. It accepts only an FEC registration number, state elections ID or EIN to verify an organization. Google’s political ad disclaimers list the organization name or the name of a person who completed the ID verification process.

Franklin said Meta has rules to ensure that page name disclaimers aren't abused. The company’s guidelines say that regardless of how much information advertisers disclose, the ads must “Accurately represent the name of the entity or person responsible for the ad.” But more than 100,000 ads identified by ProPublica and the Tow Center did not.

Patriot Democracy

Adam Klotz’s Facebook page and an example of an ad featuring a deepfake version of President Donald Trump’s voice (Screenshots by ProPublica)

The “paid for by” disclaimers on the ads that mysteriously started appearing on weather forecaster Klotz’s hijacked page listed “Klotz Policy Group” as the advertiser. Klotz Policy Group is not affiliated with Adam Klotz, and the email and website address in the disclaimer do not point to a dedicated website. The group is also not listed in OpenCorporates or other business registration databases.

The advertiser disclaimer information for Klotz’s page listed the email admin@patriotdemocracy.com and the website patriotdemocracy.com/klotzpolicygroup. That URL led to a page that promoted dental coverage for Medicare recipients and used the branding of a site called Saving Tips Daily. Similar URLs with the patriotdemocracy.com domain appeared across other pages in the network, which enabled ProPublica, Tow and the Tech Transparency Project to link them to the same network. (For more details on how the ads and networks were identified, see the methodology section at the end of this story.)

Patriot Democracy is the biggest of the eight networks identified during the course of the investigation and has been active on Meta’s platforms for nearly five years. It includes 232 pages that have spent more than $13 million on more than 110,000 ads.

Allen said operations like Patriot Democracy spend millions on Meta ads because it helps them find victims.

“If they gave over $10 million to Facebook, then they may have extracted $15 million from American seniors with this garbage,” he said. “The harms add up.”

The pages often have official-sounding names such as “Government Cash Program,” “US Financial Relief” and “USA Stimulus Fund,” and their ad disclaimers list organization names that do not correspond to registered entities or websites.

Meta also allowed the page owners to falsely identify themselves as affiliated with the federal government. If a user looked up the page details of “Government Cash Program,” they would see a notation showing that it’s a “Government Website.” US Financial Relief is listed as a “Government organization.” More than 20 pages claimed to be a “Public Service.”

The Government Cash Program Facebook page falsely listed itself as a “Government Website.” (Screenshot by ProPublica)

One of the most common types of ads run by Patriot Democracy pages is for Trump merchandise, including coins, flags and hats.

One of these ads ensnared Sam Roberson, a 57-year-old Texas resident, last month. While browsing Facebook, Roberson was drawn to an offer for a Trump coin from a page called Stars and Stripes Supply. The coin was embossed with an image of the former president raising his fist after the assassination attempt in Pennsylvania. One click took him to the site patriotprosnetwork.com, where Roberson paid $39.99 for 11 coins that he planned to give to his grandkids. He received the coins. But two weeks later, his card was charged another $29.99.

Roberson told ProPublica that he didn’t realize that he had signed up for a subscription. He contacted customer support to request a refund, but is skeptical the company will follow through.

“With these knuckleheads and how deep they are dug in, I may end up having to cancel the card,” he said.

When ProPublica called the site’s customer service line, a person who did not give their name said that customers who choose the “VIP” checkout option receive a discount on their purchases and are automatically enrolled in a monthly membership. The spokesperson said that customers are informed on the site and by email “how they got involved [in the membership] and how they can cancel.”

They said that someone else from the company could answer questions about advertising but hung up when asked how often they receive customer complaints about the membership fee.

An example of a Trump coin ad run by the Stars and Stripes Supply Facebook page (Screenshot by ProPublica)

ProPublica also sent an email with detailed questions about the coin offer and the subscription but did not receive a response.

The Stars and Stripes Supply page spent over $700,000 on Meta ads for Trump merchandise and ran ads as recently as Sept. 28 before it was removed by Meta. The page and the store have received online complaints about the billing scheme. It’s unclear who controls the page or the store, or how they are connected.

In addition to the billing schemes, the Trump merchandise ads often draw clicks with false claims and divisive language. Stars and Stripes Supply ran ads for Trump and JD Vance yard signs that falsely claimed “liberal activists are ripping Trump-Vance yard signs from the ground, sparking a wave of controversy across the nation.”

A page called Truly American ran a video ad for a “free” Trump flag and coin offer that was narrated by a female voice claiming to be Melania Trump. “Today we see free thinkers and independent voices like gay conservatives and Log Cabin Republicans silenced, censored and bullied by cancel-culture mobs. Donald stood against this and they tried to silence him for good,” the voice intoned, as the ad showed an image of Trump with his bloodied ear.

It’s unclear who ultimately controls the Patriot Democracy pages and associated Instagram accounts or who paid for the ads. Along with listing fake advertiser names, Patriot Democracy ad disclaimers show addresses that often correspond to WeWork co-working spaces or UPS stores. And the phone numbers, which are shared among multiple pages, led to generic voicemail messages — with one exception.

A man who answered one number said he’d never run ads on Meta and didn’t know why his phone number was listed. He said he was on his way to court and asked the reporter to call back later. He did not answer a subsequent call, and the phone number was soon disconnected.

The ownership information for patriotdemocracy.com and its related domains is also private, making it impossible to know who registered the domain. Meta did not answer specific questions about the network.

Before ProPublica and Tow reached out, Meta had removed less than half of Patriot Democracy pages for violating its advertising standards. It also failed to take action against the larger network, even after some of its pages were exposed in earlier reports by Forbes and researchers at Syracuse University.

Of the more than 110,000 ads on Patriot Democracy pages identified by ProPublica and Tow, Meta stopped just over 7,000, or roughly 6%, from running for violating standards. These ads were shown nearly 60 million times before Meta took action. Meta also consistently failed to detect and remove copies of ads it had previously banned due to policy violations, according to the analysis.

Franklin said Meta uses a variety of automated approaches to detect and remove duplicate ads. This includes training systems to recognize the images and videos used in previously removed ads in order to prevent them from running again. It also looks at a variety of signals, including user and payment information and the devices used to access accounts, to restrict or ban people who break its rules, she said.

Two ads run by the Patriot Democracy network falsely promised government subsidy checks. (Screenshots by ProPublica)

One of the most popular lures used by Patriot Democracy and other networks is the promise of free government cash.

More than 30,000 ads across the networks identified by ProPublica and Tow falsely claimed that nearly all Americans could receive government subsidies or are eligible for a “FREE Health Insurance Program.” People who clicked were often directed to unethical insurance agents who altered their existing ACA plan details or signed them up for plans they weren’t eligible for, pocketing a commission in the process. These ads were shown to users at least 38 million times.

The scheme has caused victims to lose their existing ACA health insurance or to be hit with unexpected tax bills from the IRS. In those cases, the agent falsely reported a lower income to enroll clients and secure a commission. In response to the surge in fraudulent enrollments, the Centers for Medicare & Medicaid Services, the federal agency that administers the ACA, implemented stricter rules this summer for insurance agents.

A CMS spokesperson declined to comment on specific ads or platforms. But insurance marketers and other industry experts told ProPublica that Facebook ads are a scammer’s preferred method for ensnaring victims. Meta declined to comment on whether it’s in touch with CMS.

“It’s clear from speaking with a lot of different consumers that were ripped off that the Facebook ads played a big part,” said Jason Doss, an Atlanta lawyer who filed a class-action suit against a group of companies and individuals who allegedly used online ads, high-pressure insurance call centers and other methods to commit mass ACA enrollment fraud. The companies have moved to dismiss the case, citing a lack of jurisdiction and failure to show that any laws were broken, among other defenses. “We deny the allegations made and will be defending the case,” the CEO of one company named in the suit told ProPublica. The suit is ongoing.

Since 2021, Google has required U.S. health insurance advertisers to verify their identity and license status prior to running ads. Meta does not have this requirement. The company did not respond to questions about health insurance advertisers.

Taking on a Network

Meta’s failure to stop deceptive ads about government programs has forced some state and local officials to step in.

In January 2023, investigators in the Alaska Division of Insurance received complaints from consumers who said they were shown misleading ads on Facebook.

The ads used the state seal of Alaska and in some cases a photo of the governor to falsely claim that the state was offering new funeral and burial benefits. “The State of Alaska approved NEW affordable Funeral programs, designed to cover 100% final expenses up to 25,000 or more. Not just a portion,” read one ad.

As with other types of deceptive ads, the burial ads tricked people into filling out a form. In this case, they often ended up on the phone with someone trying to sell life insurance.

Alex Romero, Alaska’s chief insurance investigator, was alarmed. There weren’t any “new” state benefits. It’s also illegal in Alaska, and just about every state, to use a state seal without permission.

Searching the Meta Ad Library, he found hundreds of deceptive ads that used state seals. Romero warned his fellow state insurance investigators on a scheduled conference call soon after his discovery. “There was a proliferation of advertising using the same deceptive marketing,” Romero told ProPublica.

Around the same time, officials in Ventura County, California, were alerted to the unauthorized use of its county seal in Facebook ads. A local news outlet sent the county examples of burial insurance ads that used the Ventura County seal. Tiffany North, the county counsel, began an inquiry. She and Romero connected last spring and realized the same person was connected to the Facebook ads: a lead-generation marketer and insurance broker named Abel Medina.

Officials in Alaska and Ventura County, California, were alarmed by ads that used their seals without permission. (Screenshots by ProPublica)

Public records show that Medina, 35, owns companies such as Heartwork Global and Kontrol LLC, which have run election and social issues ads on several Facebook pages.

Romero said his research showed that Kontrol LLC was a key source of Facebook ads with state seals and images of governors. “Practically every state, a bunch of counties, several cities, they’re all getting tagged by this guy Medina,” he said.

Two other companies, Final Expense Authority LLC and American Benefits & Services LLC, ran similar ads on some of the same Facebook pages, ProPublica and Tow found. Their websites had text that was nearly identical to text on Heartwork Global’s site.

Corporate records show that Final Expense Authority LLC is registered to Tiffani Panyanouvong, a 24-year-old former insurance broker. She told ProPublica that Medina registered the entity in her name without her permission when they were dating.

American Benefits & Services LLC is registered in Delaware and does not publicly list an owner. Panyanouvong said that Medina used that company and Final Expense Authority to run ads on Meta and that she “had nothing to do with his lead-generation services.”

“This is all because of him, and I was just his girlfriend at the time,” Panyanouvong told ProPublica in a WhatsApp message. “And he used me as another person to hide behind to get through the Facebook advertising loop holes.”

On his LinkedIn profile, Medina touts his Facebook ad expertise. He says he generated “$1.6 Million in sales in under eight months with only Facebook Final Expense Media Buying and growing other verticals.”

He’s also teaching others how to do it — for a fee. His profile points to a website, Scale Kontrol, which promises to help clients create a “cash cow advertising machine” by using Facebook ads to generate customer leads. The site also assures customers that it knows “work arounds” to avoid having ads “flagged, banned, restricted.”

Medina did not respond to phone messages or to a detailed list of questions sent to three email addresses, his Facebook account and a home address.

ProPublica and Tow found that the four companies have operated at least 40 Facebook pages and spent $2.1 million on more than 21,000 election and issues ads. Thousands of ads reviewed by ProPublica and Tow across pages linked to the companies made deceptive claims and appeared to break one or more Meta rules.

A deceptive ad for car insurance falsely suggested that President Joe Biden was sending government checks to pay for gas. (Screenshot by ProPublica)

The pages used deepfake audio of Biden to make false claims about government subsidies, ran deceptive auto insurance ads that promoted nonexistent “Biden Gas Relief Checks” using images of a U.S. Treasury check, and falsely claimed that “The State has approved a NEW Mortgage Protection Plan that protects your home and family in the event of an unexpected tragedy.” No such state plan exists.

Prior to being contacted by ProPublica, Meta had removed about half of the pages. Ten pages connected to these companies ran ads in the last three months.

In March 2023, North sent a cease-and-desist letter to Final Expense Authority. “Your use of the County’s official seal and your actions in misleading the public are unauthorized and unlawful,” she wrote.

The following month, Romero sent a similar letter to Medina, Panyanouvong and three of the companies. It cited five criminal and civil statutes that the state of Alaska believed they had violated and demanded they stop running ads with the state seal and images of the governor.

North and Romero said the ads with their respective seals stopped soon after the letters were sent. (Neither contacted Meta directly, telling ProPublica they focused on the companies running the ads.)

Final Expense Authority, the company registered to Panyanouvong, is the subject of an ongoing investigation by the Monterey County district attorney’s office over its use of the California county’s seal. Emily Hickok, Monterey County’s chief deputy district attorney, confirmed the investigation to ProPublica and said her office reported the ads to Meta in February. She declined to comment further, citing the ongoing investigation.

Panyanouvong’s California insurance license was revoked in January. An attorney for the state Department of Insurance cited the use of Ventura County and Alaska seals in ads, among other alleged violations, state records show. Due to a prior criminal conviction for petty theft, records show that in 2019 Medina received a California insurance license on a probationary basis. It has been inactive since last November. He holds an active license in Texas.

Panyanouvong, who now works as a waitress, said she hopes to get her license back. “I’m pretty disheartened about this matter constantly haunting me,” she said.

The California Department of Insurance declined to comment on any investigations into the companies. “While we do not comment on open investigations, deceptive advertising on social media platforms can be a cause for licensing action or criminal prosecution,” it said in a statement to ProPublica.

Meta removed all of the active pages linked to the four companies after ProPublica and Tow shared them. It declined to say whether it had taken additional action. But as recently as early October, an ad from American Benefits & Services offered $100K to homeowners: “Claim cash back with these new home owners benefits programs that just became available.”

Still Locked Out

After ProPublica emailed Klotz, the meteorologist, in August to ask about the ads running via his page, his employer, Fox News, contacted Meta to get the ads removed and to restore his access. His verified page continued running ads promising easy money to Americans until early October. As of this week, he still doesn’t have access to his page.

“As far as I know the account is still hacked and in their control,” Klotz said.

Methodology

The pages and networks included in this investigation were identified by searching Meta’s Ad Library for keywords including “benefits,” “subsidy,” “stimulus,” “$6400” and “burial.” The initial keywords were chosen based on examples sourced from reports, FTC investigations and lawsuits. Each page added to the initial seed set was vetted by viewing its ads, advertiser disclaimer information, and page content and manager information.

Using this initial set, we expanded the list of keywords based on ads run by the pages and by searching the Ad Library for websites that the ads linked to. We then used the Ad Library Report interface to identify all pages for each advertiser. We also looked for pages that ran ads using the same advertiser disclaimer information.

Patriot Democracy

In the case of the Patriot Democracy network, we connected the pages and ads together via three domains that were used in “paid for by” ad disclaimers: informedempowerment.com, tacticalempowerment.com and patriotdemocracy.com. The disclaimers that used these domains often used the same phone numbers or addresses. Additionally, a Domain Name System analysis showed that all three domains resided on the same server.

Pages in the Patriot Democracy network often used identical advertiser disclaimer information such as addresses and phone numbers. (Screenshot by ProPublica)

Determining Metrics

To determine the total number of ads, ads removed and impressions, we relied on the Meta Ad Library application programming interface. For each page identified using the above methodology, we pulled all the ads via the API. To ascertain which ads had been removed, we filtered out ads that had the text “This content was removed because it didn’t follow our Advertising Standards.” However, if Meta had taken action at the page level, this ad text would not update.

Meta’s Ad Library does not offer exact numbers for impressions of individual election and social issues ads. Instead, it offers ranges. We used the most conservative number offered by Meta, the “lower bound.” This means that cumulatively, these ads likely had tens of thousands more impressions.

The Ad Library provides the total spending for election and social issues ads run on a page, which is the source of all of the dollar amounts cited in this investigation.

Mariam Elba contributed research.

Data collection and analysis for this story was done in conjunction with the Tow Center for Digital Journalism at Columbia Journalism School.


This content originally appeared on ProPublica and was authored by .

]]>
https://www.radiofree.org/2024/10/31/exploiting-metas-weaknesses-deceptive-political-ads-thrived-on-facebook-and-instagram-in-run-up-to-election/feed/ 0 499789
Islands Business publisher Samantha Magick – storyteller, risk-taker and community champion https://www.radiofree.org/2024/10/31/islands-business-publisher-samantha-magick-storyteller-risk-taker-and-community-champion/ https://www.radiofree.org/2024/10/31/islands-business-publisher-samantha-magick-storyteller-risk-taker-and-community-champion/#respond Thu, 31 Oct 2024 08:45:44 +0000 https://asiapacificreport.nz/?p=106196 By Teagan Laszlo, Queensland University of Technology

For Samantha Magick, journalism isn’t just a job. It is a lifelong commitment to storytelling, advocacy, and empowering voices often overlooked in the Pacific.

As the managing editor and publisher at Islands Business, the Pacific Islands’ longest surviving news and business monthly magazine, Magick’s commitment to quality reporting and journalistic integrity has established her as a leading figure in the region’s news industry.

Magick’s passion for journalism began at a young age.

“I wanted to be a journalist when I was like 12,” Magick recalls. “When I left school, that’s all I wanted to study.”

She remembers her family’s disapproval when she would write stories as a child, as they thought she was “sharing secrets”. Despite that early condemnation, Magick’s thriving journalism career has taken her across continents and exposed her to diverse media landscapes.

After completing a Bachelor of Communications with a major in journalism at Charles Sturt University in Bathurst, Australia, Magick began her career at Communications Fiji Limited (CFL), a prominent Fijian commercial network.

She progressed over 11 years from a cadet to CFL’s news director.

Guidance of first boss
Magick attributes some of her early success to the guidance of her first boss and CFL’s founder, William Parkinson. She considers herself fortunate to have had a supportive mentor who led by example and dared to take risks early in life, such as founding a radio station in his 20s.

After leaving CFL, Magick’s career took her across the globe, including regional Pacific non-government organisations, news publications in Hawai’i and Indonesia, and even international legal organisations in Italy.

Magick, who is of both Fijian and Australian heritage, returned to Suva in 2018, where she began her current role as Islands Business’s managing editor.

“I’ve chosen to make my life in Fiji because I feel more myself here,” Magick says, reflecting on her deep connection to the island nation.

Magick’s vision for Islands Business focuses on delving into the deeper, underlying narratives often overshadowed by breaking news cycles and free, readily available news content.

“We need to be able to demonstrate the value of investigation, big picture reporting rather than the day-to-day stuff,” Magick says.

Magick prides herself on creating a diverse and inclusive newsroom that reflects the communities it serves.

Need for diverse newsroom
“You have to have a diverse newsroom,” she emphasises, recognising the importance of amplifying marginalised voices. “For example, there is a conscious effort to make sure our magazine is not full of photos of men shaking hands with other men.”

Magick also believes journalists have a responsibility to advocate for change, as demonstrated by Islands Business’s dedication to tackling pressing issues from climate change to media freedom.

“Why would I give a climate change denier space?” Magick questions when discussing the need to balance objectivity and advocacy. “Because it’s kind of going to sell magazines? Because it’s going to create a bit of a stir online? That’s not something we believe in.”

Despite her success, Magick’s career has not been without challenges. Magick worked through Fiji’s former draconian media restriction laws under the Media Industry Development Act 2010, while also navigating the shift to digital media.

Islands Business general manager Samantha Magick (right)
Islands Business managing editor Samantha Magick (right) with Fiji Times reporter Rakesh Kumar and chief editor Fred Wesley (centre) celebrating the repeal of the draconian Fiji media law last year . . . ““Why would I give a climate change denier space?” Image: Lydia Lewis/RNZ Pacific

Magick emphasises the need to constantly upskill and re-evaluate strategies to ensure she and Islands Business can effectively navigate the constantly evolving media landscape.

From learning to capitalise on social media analytics to locating reputable information sources when many of them feared to speak to the journalists due to the risk of legal retribution, Magick believes flexibility and perseverance are crucial to staying ahead in media.

In her early career, Magick also faced sexism and misogyny in the media industry. “When I think back about the way I was treated as a young journalist, I feel sick,” Magick says as she reflects on how she and her female colleagues would warn each other against interviewing certain sources alone.

Supporting aspiring journalists
The challenges Magick has faced undoubtably contribute to her dedication to supporting aspiring journalists, as evident through Kite Pareti’s journey. Starting as a freelance writer with no newswriting experience in March 2022, Pareti has since progressed to one of two full-time reporters at Islands Business.

Pareti expresses gratitude for the opportunities she’s had while working at Islands Business, and for the mentorship of Magick, whom she describes as “family”.

“Samantha took a chance on me when I had zero knowledge on news writing,” Pareti says. “So I’m grateful to God for her life and for allowing me to experience this once-in-a-lifetime opportunity.”

Magick reciprocates this sentiment. “Recently, I am inspired by some of our younger reporters in the field, and their ability to embrace and leverage technology — they’re teaching me.”

Magick anticipates an exciting period ahead for Islands Business, as she aims to attract a younger, professionally driven, and regionally focused audience to their platforms.

When asked about her aspirations for journalism in the region, Magick says she hopes to see a future where Pacific voices remain at the centre, “telling their own stories in all their diversities”.

Teagan Laszlo was a student journalist from the Queensland University of Technology who travelled to Fiji with the support of the Australian Government’s New Colombo Plan Mobility Programme. This article is published in a partnership of QUT with Asia Pacific Report, Asia Pacific Media Network (APMN) and The University of the South Pacific.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2024/10/31/islands-business-publisher-samantha-magick-storyteller-risk-taker-and-community-champion/feed/ 0 499783
The nation’s first commercial carbon sequestration plant is in Illinois. It leaks. https://grist.org/climate-energy/the-nations-first-commercial-carbon-sequestration-plant-is-in-illinois-it-leaks/ https://grist.org/climate-energy/the-nations-first-commercial-carbon-sequestration-plant-is-in-illinois-it-leaks/#respond Mon, 21 Oct 2024 08:45:00 +0000 https://grist.org/?p=651431 This coverage is made possible through a partnership between Grist and WBEZ, a public radio station serving the Chicago metropolitan region.

A row of executives from grain-processing behemoth Archer Daniels Midland watched as Verlyn Rosenberger, 88, took the podium at a Decatur city council meeting last week. It was the first meeting since she and the rest of her central Illinois community learned of a second leak at ADM’s carbon dioxide sequestration well beneath Lake Decatur, their primary source of drinking water. 

“Just because CO2 sequestration can be done doesn’t mean it should be done,” the retired elementary school teacher told the city council. “Pipes eventually leak.” 

ADM’s facility in central Illinois was the first permitted commercial carbon sequestration operation in the country, and is on the forefront of a booming, multibillion-dollar carbon capture and storage, or CCS, industry that promises to permanently sequester planet-warming carbon dioxide deep underground. 

The emerging technology has become a cornerstone of government strategies to slash fossil fuel emissions and meet climate goals. Meanwhile, the Biden administration’s signature climate legislation, the Inflation Reduction Act, has supercharged industry subsidies and tax credits and set off a CCS gold rush. 

There are now only four carbon sequestration wells operating in the United States — two each in Illinois and Indiana — but many more are on the way. Three proposed pipelines and 22 wells are up for review by state and federal regulators in Illinois, where the geography makes the landscape especially well suited for CCS. Nationwide, the U.S. Environmental Protection Agency is reviewing 150 different applications. 

But if CCS operations leak, they can pose significant risks to water resources. That’s because pressurized CO2 stored underground can escape or propel brine trapped in the saline reservoirs typically used for permanent storage. The leaks can lead to heavy metal contamination and potentially lower pH levels, all of which can make drinking water undrinkable. This is what bothers critics of carbon capture, who worry that it’s solving one problem by creating another.

A woman holds a folder of papers seated next to an elderly man
Verlyn Rosenberger, 88, sits by her husband, Paul Rosenberger, at a city council meeting in Decatur, Illinois, earlier this month. They are both concerned about leaks from the commercial carbon sequestration plant that sits in their town. Juanpablo Ramirez-Franco / Grist

In September, the public learned of a leak at ADM’s Decatur site after it was reported by E&E News, which covers energy and environmental issues. Additional testing mandated by the EPA turned up a second leak later that month. The EPA has confirmed these leaks posed no threat to water sources. Still, they raise concern about whether more leaks are likely, whether the public has any right to know when leaks occur, and if CCS technology is really a viable climate solution.

Officials with Chicago-based ADM spoke at the Decatur City Council meeting immediately after Rosenberger. They tried to assuage her concerns. “We simply wouldn’t do this if we didn’t believe that it was safe,” said Greg Webb, ADM’s vice president of state-government relations. 

But ADM kept local and state officials in the dark for months about the first leak. They detected it back in March, five months after discovering corrosion in the tubing in the sequestration well. However, neither leak was disclosed as the company this spring petitioned the city of Decatur for an easement to expand its operations. The company also remained tight-lipped about the leak as it took part in major negotiations over the state’s first CCS regulations, the SAFE CCS Act, between April and May, according to several parties involved. 

As a result, when Illinois Governor J.B. Pritzker signed those CCS regulations into law at ADM’s Decatur facility in July, he was unaware of the leak that had occurred more than 5,000 feet below his seat, his office confirmed.

“I thought we were negotiating in good faith with ADM,” bill sponsor and state Senator Laura Fine, a Democrat, said in a statement. “When negotiating complex legislation, we expect all parties to be forthcoming and transparent in order to ensure we enact effective legislation.”

It’s unclear whether ADM was required by law to report the leaks any sooner than it did. According to the company’s permits, it only has to notify state and local officials if there are “major” or “serious” emergencies. The EPA wouldn’t comment on whether ADM was required to disclose, and neither the EPA nor ADM would confirm if the two leaks in Decatur qualified as “minor” emergencies. 

In a statement, an ADM spokesperson said “the developments occurred at a depth of approximately 5,000 feet. They posed no threat to the surface or groundwater, nor to public health. It is for those reasons that additional notifications were not made.”  

That’s little comfort to Jenny Cassel, a senior attorney with Earthjustice, a nonprofit environmental law firm. 

“It’s a little terrifying,” Cassel said. “Because if the operator, in fact, made the wrong decision, and there is in fact a major problem, then not only will local officials not know about it, EPA is not going to know about it, which is indeed what appears to have happened here.”

The Illinois Clean Jobs Coalition, which applauded the signing of the regulatory bill earlier this summer, called ADM’s decision to keep the March 2024 leak from the public “unacceptable and dangerous.” 

David Horn, a city councilman and professor of biology at Decatur’s Millikin University, said the city was blindsided. “This information was substantive, relevant information that could have influenced the terms of the easement that was ultimately signed in May of 2024,” he said, adding that the delay in disclosure calls into question the long-term safety of CCS, and the ability of the EPA to protect water in the face of future CCS mishaps.

ADM waited until July 31 to notify the EPA of the leak, more than three months after it was discovered. The EPA alerted a small number of local and state officials and ordered the company to conduct further tests. They also issued a notice for alleged violations, citing the movement of CO2 and other fluids beyond “authorized zones” and the failure of the company to comply with its own monitoring, emergency response, and remediation plans.

But the infractions weren’t made public until September 13, when E&E News first reported the leak.  

Two weeks later, ADM notified the EPA that it had discovered a second suspected leak. Only then did they temporarily pause CO2 injections into the well. 

Councilman Horn says that isn’t good enough. 

“The ADM company was aware of the leak in March, and we were not aware of it until September,” Horn said. “So really the city of Decatur, its residents, the decision-makers have been on the back foot for months.”

Meanwhile, the city of Decatur has contracted with an environmental attorney. They have yet to pursue any legal action. 

Central Illinois is becoming a hotspot nationwide for the nascent CCS industry because of the Mt. Simon Sandstone, a deep saline formation of porous rock especially suitable for CO2 storage. It underlies the majority of Illinois and spills into parts of Indiana and Kentucky. It has an estimated storage capacity of up to 150 billion tons of CO2, making it the largest reservoir of its kind anywhere in the Midwest. 

However, there is concern that pumping CO2 into saline reservoirs near subsurface water risks pushing pressurized CO2 and brine toward those resources, which would pose additional contamination risks. “Brine is pretty nasty stuff,” said Dominic Diguilio, a retired geoscientist from the EPA Office of Research and Development. “It has a very high concentration of salts, heavy metals, sometimes volatile organic compounds and radionuclides like radium.” 

Horn says with so many more wells planned for Illinois, the Decatur leaks should be a wakeup call not just to the city, but to the region. He is particularly concerned about any future wells near east central Illinois’ primary drinking water source, the Mahomet aquifer, which lies above the Mt. Simon Sandstone formation. 

Close to a million people rely on the Mahomet aquifer for drinking water, according to the Prairie Research Institute. In 2015, the EPA designated the underground reservoir a “sole source,” meaning there are no other feasible drinking water alternatives should the groundwater be contaminated. When it comes to the Mahomet aquifer, “there is no room for error if there is a mistake,” said Horn. 

In light of the CCS boom headed their way, rural Illinois counties are stepping up to protect themselves from future carbon leaks, said Andrew Renh, the director of climate policy at Prairie Rivers Network, a Champaign-based environmental protection organization. 

DeWitt County, half an hour north of Decatur, passed a carbon sequestration ban last year. To Decatur’s west, Sangamon County previously expanded an existing moratorium on transporting or storing CO2 underground. And just last week, Champaign County, directly east of Decatur, advanced an ordinance to consider a 12-month moratorium on CCS. 

Rehn said his organization would like to see all 14 counties that overlap the Mahomet aquifer impose such bans.

In the meantime, his hope is that state legislators finish what the Illinois counties have started. Two companion bills introduced earlier this year would patch up the regulatory gaps left by the CCS bill Pritzker signed into law this summer. The bills would outright prohibit carbon sequestration immediately in and around the Mahomet Aquifer.  

“My community, as well as many surrounding areas, depend on the Mahomet Aquifer to provide clean drinking water, support our agriculture, and sustain industrial operations,” bill sponsor and state Senator Paul Faraci, a Democrat, said in a statement. “Protecting the health and livelihood of our residents and industries that rely on the aquifer must remain our top priority. 

As the Decatur city council meeting adjourned last week, Rosenberger helped her husband Paul Rosenberger put on his coat. The row of ADM officials behind her walked past and then lingered in the council chamber. “I’m not afraid of them,” Rosenberger said as she wheeled her husband out.  

“We haven’t changed anything yet,” Rosenberger said. “But I think maybe we can.” 

This story was originally published by Grist with the headline The nation’s first commercial carbon sequestration plant is in Illinois. It leaks. on Oct 21, 2024.


This content originally appeared on Grist and was authored by Juanpablo Ramirez-Franco.

]]>
https://grist.org/climate-energy/the-nations-first-commercial-carbon-sequestration-plant-is-in-illinois-it-leaks/feed/ 0 498382
CPJ, partners comment on U.S. Commerce Department’s proposed rules on surveillance technology export controls https://www.radiofree.org/2024/10/16/cpj-partners-comment-on-u-s-commerce-departments-proposed-rules-on-surveillance-technology-export-controls/ https://www.radiofree.org/2024/10/16/cpj-partners-comment-on-u-s-commerce-departments-proposed-rules-on-surveillance-technology-export-controls/#respond Wed, 16 Oct 2024 13:00:00 +0000 https://cpj.org/?p=424568 The Committee to Protect Journalists (CPJ) joined eight human rights and digital rights organizations on October 15 to provide comments to the U.S. Commerce Department in response to its proposed rules to strengthen surveillance technology export regulations.

The joint comments assess and offer recommendations for the Commerce Department to help curb the proliferation of such surveillance technologies.

The comments also note the U.S. government’s use of export controls to protect human rights, including through the Joint Statement on Efforts to Counter the Proliferation and Misuse of Commercial Spyware and the Export Controls and Human Rights Initiative.

While these actions are welcome, the United States and other governments around the world must do more to curb the abuse of surveillance technologies.

CPJ has repeatedly documented the use of surveillance technology, including spyware, to undermine press freedom and journalist safety around the world.

Read the joint comments here.


This content originally appeared on Committee to Protect Journalists and was authored by CPJ Staff.

]]>
https://www.radiofree.org/2024/10/16/cpj-partners-comment-on-u-s-commerce-departments-proposed-rules-on-surveillance-technology-export-controls/feed/ 0 497825
Helene and Milton reveal an emerging challenge for first responders: EV batteries catching fire https://grist.org/technology/helene-and-milton-reveal-an-emerging-challenge-for-first-responders-ev-batteries-catching-fire/ https://grist.org/technology/helene-and-milton-reveal-an-emerging-challenge-for-first-responders-ev-batteries-catching-fire/#respond Fri, 11 Oct 2024 08:45:00 +0000 https://grist.org/?p=650457 When a hurricane like Helene or Milton ravages coastal communities, already-strained first responders face a novel, and growing, threat: the lithium-ion batteries that power electric vehicles, e-bikes, and countless gadgets. When exposed to the salty water of a storm surge, they are at risk of bursting into flames — and taking an entire house with them.

“Anything that’s lithium-ion and exposed to salt water can have an issue,” said Bill Morelli, the fire chief in Seminole, Florida, and the bigger the battery, the greater the threat. That’s what makes EVs especially hazardous. “[The problem] has expanded as they continue to be more and more popular.”

It is not yet clear how many vehicles might have caught fire in the wake of Hurricane Milton, which slammed into Tampa Bay on Wednesday, leaving at least 13 people dead and some 80,000 in shelters. But there have been 48 confirmed battery fires related to storm surge from Hurricane Helene, 11 of them associated with EVs.

Morelli’s crews fought three of them. St. Petersburg Fire Rescue reported at least two, one from an electric bike and another from a Mercedes-Benz EQB300 that led to what a fire department representative called “major damage to the home.” CNN and other outlets reported on a fire in Sarasota sparked by a Tesla Model X. 

Overall, such fires are far from common. Idaho National Laboratory found that of the 3,000 to 5,000 electric vehicles damaged by Hurricane Ian in 2022, about three dozen caught fire. Public awareness of the risk has mounted since then, with officials up to and including Florida Governor Ron DeSantis urging residents to move their EVs to higher ground ahead of storms. But the chemistry and construction of lithium-ion batteries make them especially prone to fires that are difficult for first responders to combat.

“They burn hot, they burn fast, and they’re hard to extinguish,” Morelli said.

St. Petersburg Fire Rescue responded to at least two electrical fires during hurricane Helene, one of which involved an electric vehicle. St. Petersburg Fire Rescue

The battery in an EV is comprised of thousands of cells stacked and packed into a sealed enclosure. If salt water, which is particularly conductive, reaches the interior of a battery, it can cause a short circuit, which can generate excessive heat that jumps from cell to cell. “That’s called ‘thermal runaway,’” said Andrew Klock, senior manager of education and development at the National Fire Protection Association. 

As a battery heats up, it releases flammable gases that can ignite. Once the car starts burning, methods of putting out traditional vehicle fires — such as foam or thermal blankets to smother the flames — aren’t as effective. “Lithium-ion batteries generate their own oxygen and heat when they are on fire,” Klock said. “You can’t starve the fire.“

Instead, first responders must direct high volumes of water at the battery pack as directly as possible in order to reduce the heat. The International Association of Fire Chiefs recommends having 3,000 to 8,000 gallons on hand — which can be difficult during a disaster, when hydrants may not be working properly and trucks have a limited supply aboard. 

“They take tons and tons and tons and tons of water to extinguish,” said Morelli, who is working with other departments to acquire more thermal blankets. A ready supply of them could allow firefighters to smother the flames enough to move the car away from structures so it can burn itself out safely. 

Klock said “training is paramount” to effectively fighting these fires. But of the roughly 1.2 million firefighters in the country, only 350,000 or so have completed the association’s training, he said. “There’s a lot of work to do.”

The danger doesn’t end when a storm passes, either. According to the Department of Transportation, “the time frame in which a damaged battery can ignite varies, from days to weeks,” which is one reason Tesla urges owners not to operate their vehicle until a dealer inspects it. 

The Alliance for Automotive Innovation, which represents 44 automakers and suppliers, declined to comment but cited a letter it sent to Republican Senator Rick Scott of Florida on the issue in 2022. It notes that “safety is a top priority for our members, which is why they have been engaged in long-standing efforts to address fire risks for both conventionally fueled vehicles and EVs.”  

In the meantime, a range of efforts are underway to try to prevent these fires from occurring. The Federal Emergency Management Agency has funded research into emerging hazards of at-home battery storage systems. Other researchers are looking at how to make batteries safer, including Yang Yang, an associate professor of materials science and engineering at the University of Central Florida. His team developed a battery that, instead of fighting salt water, utilizes it as the main electrolyte. 

“It can be soaked in the salty water and still works well,” said Yang, who started working on the project after living in Houston and Florida and seeing firsthand the problem floods present. While he said car companies have yet to contact him about his research, he’s optimistic that safer batteries could be on the market within the next few years. 

Until then, storms like Helene and Milton may be among the biggest drivers of public attention to both the problem and prevention methods. Yang, for one, finds that possibility bittersweet at best: “I don’t want people to have any issues with their electric vehicles.”

This story was originally published by Grist with the headline Helene and Milton reveal an emerging challenge for first responders: EV batteries catching fire on Oct 11, 2024.


This content originally appeared on Grist and was authored by Tik Root.

]]>
https://grist.org/technology/helene-and-milton-reveal-an-emerging-challenge-for-first-responders-ev-batteries-catching-fire/feed/ 0 497199
The solar supply chain runs through this flooded North Carolina town https://grist.org/climate-energy/the-solar-supply-chain-runs-through-this-flooded-north-carolina-town/ https://grist.org/climate-energy/the-solar-supply-chain-runs-through-this-flooded-north-carolina-town/#respond Tue, 08 Oct 2024 08:30:00 +0000 https://grist.org/?p=650244 Due to a quirk of geology, the purest quartz in all the world comes from the picturesque town of Spruce Pine, North Carolina. The mineral, created deep within the earth when silicon-rich magmas cooled and crystallized some 370 million years ago, is essential to the production of computer chips and solar panels.

China, India, and Russia provide high purity quartz as well, but what’s mined there does not match the quality or quantity of what lies beneath the Blue Ridge Mountains. With Spruce Pine among the scores of Appalachian communities reeling from Hurricane Helene, the sudden closure of quartz mines that have supplied chip manufacturers for decades has rattled the global tech industry. But this quartz is vital to the solar industry too. And while industry experts expect companies to withstand the temporary closure of the town’s two mines, it highlights the precarity of a clean energy economy that relies on materials produced at a single location — especially in a world of increasingly ferocious natural disasters.

Helene’s impact on Spruce Pine “absolutely lays bare the danger of having a monopoly in any part of the supply chain,” said Debra DeShong, head of corporate communications at solar manufacturer QCells North America. QCells, which manufactures photovoltaic panels in Georgia and is building an additional facility that will manufacture the components needed to assemble them, is evaluating whether the Spruce Pine mine closures will impact it.

The industry relies on quartz primarily to make polysilicon, a highly refined type of silicon that forms the sunlight-harvesting cells in most photovoltaic panels. But the quartz from Spruce Pine serves another purpose: It is used to make the crucibles in which molten polysilicon crystallizes into cylindrical or rectangular ingots. Those rods are cut into the solar wafers that are further processed to produce the cells within panels.

Forming solar ingots requires heating polysilicon to over 2,500 degrees Fahrenheit. Only the highest purity quartz sand provides the thermal stability needed to create the crucibles capable of enduring such heat, and the best of it is found in western North Carolina.

“Spruce Pine is a very unusual quartz deposit and it is incredibly pure,” said Jenny Chase, the lead solar analyst at energy consultancy BloombergNEF. 

BloombergNEF estimates that Spruce Pine supplies more than 80 percent of the ultra-pure quartz sand used to manufacture crucibles for both the solar and the semiconductor industry, as well as for optical and lighting applications. (There isn’t any public data on how much of the town’s quartz is used by each sector, but BloombergNEF estimates that in China, the world’s leading producer of photovoltaic panels, 80 percent of the high purity quartz it uses goes into solar applications.) Spruce Pine dominates this market, and supplies nearly all of the material that lines the inside of solar crucibles, which come in direct contact with molten silicon. There, purity is particularly important for ensuring high ingot yields and long crucible lifespans.

The amount of quartz required to support solar crucible production is fairly small. Chase says that Spruce Pine produced about 20,000 tons of high purity quartz sand last year — more than enough to satisfy the demands of the solar industry. That same year, global polysilicon production stood at 1.52 million metric tons. Producing that much polysilicon likely required about 3 million metric tons of quartz, according to Chase. All of which is to say, Spruce Pine is, she said, “quite a small cog” in the solar supply chain.

Still, a small cog can become a big problem if there are no contingencies when it breaks down. But Chase suspects that most crucible manufacturers — an industry based largely in East Asia — have stockpiles of high purity quartz. May Haugen, who leads communications at The Quartz Corp, a Norwegian company that produces high purity quartz sand at Spruce Pine, confirmed this in an email to Grist.

“The Quartz Corp operates in long value chains where everybody has learnt through Covid the importance of sizable safety stocks,” Haugen wrote. “Between our own safety stocks which are built in different locations and the ones down in the value chain, we are not concerned about shortages in the short or medium term.”

In preparation for Hurricane Helene, The Quartz Corp halted all mining operations in Spruce Pine on September 26th. So did the Belgian firm Sibelco, the town’s other producer.

It is unclear when either company will resume mining: In an October 2 statement, The Quartz Corp wrote that while its plants do not seem to have been seriously damaged by the storm it is still “too early to tell” when they will reopen, “as this will also depend on the rebuilding of local infrastructure.” In an October 4 statement shared with Grist, Sibelco wrote that its facilities appear to have sustained “minor damage” and that the company hopes to “restart operations as soon as we can.”

“Our dedicated teams are on-site, conducting cleanup,” the statement noted. “Our final product stock has not been impacted.” The company declined to say how the hurricane could impact its plan to double production capacity in Spruce Pine by 2025.

Even if both mines remain shuttered for months, the solar industry could adapt, Chase said. The Japanese firm Mitsubishi Chemical Group manufactures high-purity synthetic silica for the semiconductor industry, and the material meets the standards required for solar crucibles, according to Chase. 

However, production would need to ramp up. Mitsubishi Chemical Group representative Kana Nuruki told Grist in an email that the company currently does not have enough synthetic quartz to support the solar industry, and what it does produce is “considerably more expensive” than the real thing.

Paying a premium for synthetic quartz would be a challenge for the price-sensitive solar industry, Chase said. “But if it had no choice, it would do it.” 

Developing alternative supplies of high purity quartz, even ones that cost more, could help fortify the solar supply chain against the next climate-fueled disaster. “As solar becomes a larger piece of our electrification, it’s going to be increasingly important that we ensure we have a stable supply chain,” DeShong of QCells said.

Still, manufacturing both semiconductors and solar panels in America is a key priority of the Biden Administration, and it seems unlikely that Washington will want to see a critical cog in both supply chains move overseas. A spokesperson for the US Department of Energy told Grist that the agency “is closely monitoring Hurricane Helene’s effects [on] the supply chain” while “advancing efforts to maintain the stability of America’s energy systems.”

Spencer Bost, executive director of the community development organization Downtown Spruce Pine, said that quartz mining is the largest private employer in the county and restarting it quickly is “very important from a local economy perspective.” If the federal government cares about building clean energy in America, Bost said, “we have all the stuff here.” 

“We have the people who need the jobs here,” he added. 

This story was originally published by Grist with the headline The solar supply chain runs through this flooded North Carolina town on Oct 8, 2024.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/climate-energy/the-solar-supply-chain-runs-through-this-flooded-north-carolina-town/feed/ 0 496746
Neo-Nazi Telegram Users Panic Amid Crackdown and Arrest of Alleged Leaders of Online Extremist Group https://www.radiofree.org/2024/09/25/neo-nazi-telegram-users-panic-amid-crackdown-and-arrest-of-alleged-leaders-of-online-extremist-group/ https://www.radiofree.org/2024/09/25/neo-nazi-telegram-users-panic-amid-crackdown-and-arrest-of-alleged-leaders-of-online-extremist-group/#respond Wed, 25 Sep 2024 16:00:00 +0000 https://www.propublica.org/article/telegram-terrorgram-collective-extremism-accelerationists-dallas-humber-matthew-allison by A.C. Thompson, James Bandler and Brandon Roberts

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

This story is part of a collaboration between FRONTLINE and ProPublica that includes an upcoming documentary.

The recent crackdown on the social media platform Telegram has triggered waves of panic among the neo-Nazis who have made the app their headquarters for posting hate and planning violence.

“Shut It Down,” one person posted in a white supremacist chat on Tuesday, hours after Telegram founder Pavel Durov announced he would begin sharing some users’ identifying information with law enforcement.

With over 900 million users around the globe, Telegram has been both revered and reviled for its hands-off approach to moderating posted content. The platform made headlines this summer when French authorities arrested Durov, seeking to hold him responsible for illegal activity that has been conducted or facilitated on the platform — including organized drug trafficking, child pornography and fraud.

Durov has called the charges “misguided.” But he acknowledged that criminals have abused the platform and promised in a Telegram post to “significantly improve things in this regard.” Durov’s announcement marked a considerable policy shift: He said Telegram will now share the IP addresses and phone numbers of users who violate the platform’s rules with authorities “in response to valid legal requests.”

This was the second time in weeks that extremists had called on their brethren to abandon Telegram. The first flurry of panic followed indictments by the Justice Department of two alleged leaders of the Terrorgram Collective, a group of white supremacists accused of inciting others on the platform to commit racist killings.

“EVERYONE LEAVE CHAT,” posted the administrator of a group chat allied with the Terrorgram Collective the day the indictments were announced.

An analysis by ProPublica and FRONTLINE, however, shows that despite the wave of early panic, users didn’t initially leave the platform. Instead there was a surge in activity on Terrorgram-aligned channels and chats, as allies of the group tried to rally support for their comrades in custody, railed against the government’s actions and sought to oust users they believed to be federal agents.

Federal prosecutors in the U.S. have charged Dallas Humber and Matthew Allison, two alleged leaders of the Terrorgram Collective, with a slew of felonies including soliciting the murder of government officials on Telegram.

Humber has pleaded not guilty. She made a brief appearance in federal court in Sacramento, California, on Sept. 13, during which she was denied bail. Humber, shackled and clad in orange-and-white jail garb, said nothing. Allison, who has not yet entered a plea, was arrested in Idaho but will face trial in California.

Attorneys for Humber and Allison did not respond to separate requests for comment.

The two are alleged Accelerationists, a subset of white supremacists intent on accelerating the collapse of today’s liberal democracies and replacing them with all-white ethno-states, according to the indictment.

Through a constellation of linked Telegram channels, the collective distributes books, audio recordings, videos, posters and calendars celebrating white supremacist mass murderers, such as Brenton Tarrant, who in early 2019 stormed two mosques in New Zealand and shot to death 51 Muslim worshippers.

The group explicitly aims to inspire similar attacks, offering would-be terrorists tips and tools for carrying out spectacular acts of violence and sabotage. A now-defunct channel allegedly run by Humber, for example, featured instructions on how to make a vast array of potent explosives. After their arrests, channels allegedly run by Humber and Allison went silent.

But within days of the indictments, an anonymous Telegram user had set up a new channel “dedicated to updates about their situation.”

“I understand that some people may not like these two, however, their arrests and possible prosecution affects all of us,” the user wrote. The criminal case, they argued, “shows us that Telegram is under attack globally.”

The channel referred to Humber and Allison by their alleged Telegram usernames, Ryder_Returns and Btc.

A long-running neo-Nazi channel with more than 13,000 subscribers posted a lengthy screed. “We are very sad to hear of the egregious overreach of government powers with these arrests,” stated the poster, who used coded language to suggest that white supremacists should forcefully overthrow the U.S. government.

One group closely aligned with the Terrorgram Collective warned like-minded followers that federal agents could be lurking. In a post, it said that it had been in contact with Humber since her arrest, and that she gave them information about an undercover FBI agent who had infiltrated the Accelerationist scene.

“If this person is in your chats, remove them,” said one post, referring to the supposed agent. “Don’t threaten them. Don’t say anything to them. Just remove them from contacts and chats.”

Matthew Kriner, managing director of the Accelerationism Research Consortium, said the Terrorgram Collective had already been badly weakened by a string of arrests in the U.S., Europe and Canada over the past two years. “Overall, the arrests of Humber and Allison are likely the final blow to the Terrorgram Collective,” Kriner said.

In the U.S., federal agents this year have arrested at least two individuals who were allegedly inspired by the group. The first was Alexander Lightner, a 26-year-old construction worker who was apprehended in January during a raid on his Florida home. In a series of Telegram posts, Lightner said he planned to commit a racially or ethnically motivated mass killing, according to prosecutors. Court records show that agents found a manual produced by the Terrorgram Collective and a copy of “Mein Kampf” in Lightner’s home.

Lightner has pleaded not guilty to charges of making online threats and possessing an illegal handgun silencer. His attorney declined to comment.

This summer, prosecutors charged Andrew Takhistov of New Jersey with soliciting an individual to destroy a power plant. Takhistov allegedly shared a PDF copy of a different Terrorgram publication with an undercover agent. The 261-page manual includes detailed instructions for building explosives and encourages readers to destabilize society through murder and industrial sabotage. Takhistov has not yet entered a plea. His attorney did not respond to a request for comment.

Durov’s August arrest also sent a spasm of fear through the extremist scene. “It’s over,” one user of a white supremacist chat group declared.

“Does this mean I have to Nuke my Telegram account?” asked another member of the group. “I just got on.”

Their concerns grew when Telegram removed language from its FAQ page stating that the company would not comply with law enforcement requests regarding users in private Telegram chats.

Alarmed, Accelerationists on Telegram discussed the feasibility of finding another online sanctuary. Some considered the messaging service Signal, but others warned it was likely controlled by U.S. intelligence agencies. One post suggested users migrate to more obscure encrypted messaging apps like Briar and Session.

In extremist circles, there was more discussion about fleeing Telegram after Durov’s announcement this week. “Time is running out on this sinking ship,” wrote one user. “So we’re ditching Telegram?” asked another.

“Every time we have a success against one of them, they learn, they adapt, they modify,” said Don Robinson, who as an FBI agent conducted infiltration operations against white supremacists. “Extremists can simply pick up and move to a new platform once they are de-platformed for content abuses. This leaves law enforcement and intelligence agencies playing an endless game of Whac-a-Mole to identify where the next threat may be coming from.”

Do You Have a Tip for ProPublica? Help Us Do Journalism.


This content originally appeared on ProPublica and was authored by by A.C. Thompson, James Bandler and Brandon Roberts.

]]>
https://www.radiofree.org/2024/09/25/neo-nazi-telegram-users-panic-amid-crackdown-and-arrest-of-alleged-leaders-of-online-extremist-group/feed/ 0 495070
Transhumanism Tripe https://www.radiofree.org/2024/09/20/transhumanism-tripe/ https://www.radiofree.org/2024/09/20/transhumanism-tripe/#respond Fri, 20 Sep 2024 13:29:35 +0000 https://dissidentvoice.org/?p=153692

“In a peer reviewed study Scientists show that Nano structures self assemble after Pfizer/Moderna shots are injected into humans.” RealWorldNewsChannel.T.ME.

The post Transhumanism Tripe first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2024/09/20/transhumanism-tripe/feed/ 0 494348
Samoan journalists blast ‘ridiculous’ media restrictions at Commonwealth summit https://www.radiofree.org/2024/09/13/samoan-journalists-blast-ridiculous-media-restrictions-at-commonwealth-summit/ https://www.radiofree.org/2024/09/13/samoan-journalists-blast-ridiculous-media-restrictions-at-commonwealth-summit/#respond Fri, 13 Sep 2024 05:02:09 +0000 https://asiapacificreport.nz/?p=105317 By Harry Pearl

Restrictions on journalists covering an upcoming summit of Commonwealth nations in Samoa are “ridiculous” and at odds with a government that purportedly values democracy, says the Pacific island country’s media association.

The Samoa Observer newspaper in an editorial also condemned the government’s attempt to limit coverage of the Commonwealth Heads of Government Meeting (CHOGM), calling it a “slap across the face of press freedom, democracy and freedom of speech”.

The Commonwealth association, whose 56 members range from the world’s most populous nation India to Tuvalu in the South Pacific (population 14,000), covers some 2.7 billion people.

The summit in the Samoan capital Apia in October will be one of the biggest events ever held in Polynesian nation.

“I find the committee’s stance ridiculous,” Lagi Keresoma, president of the Journalist Association of Samoa (JAWS) told BenarNews. “We have written to the prime minister who is the head of the CHOGM task force regarding these restrictions.

“We are also trying to get a copy of the Commonwealth guidelines the committee chairperson said the decision is based on.”

The restrictions were very disappointing for a government that claimed to believe in democracy, transparency and accountability, Keresoma told online news portal Talamua.

Alarmed over stringent rules
On Wednesday, local journalists who attended a press briefing by Lefaoalii Unutoa Auelua-Fonoti, co-chair of the CHOGM media sub-committee and CEO for the Ministry of Communications and Information Technology, were alarmed to hear of the stringent media rules.

The guidelines, endorsed by cabinet, prevent photographers and videographers taking pictures, put restrictions on journalists covering side events unless accredited to a specific pool, and stop reporters from approaching delegates for interviews, Samoan media reported.

Two state-owned media outlets, in partnership with New Zealand-based company MMG Communications, have been awarded exclusive rights to cover the event in film and video, according to the Samoa Observer. All other media, including foreign press, will have to request access to pooled photos and footage.

The Samoa Observer said the restrictions were incongruous with international practices and set a dangerous precedent for future events.

“It is a farce and an attempt by a dysfunctional government unit to gag local and overseas media,” the newspaper editorial said.

“We are not living under a dictatorship, neither are the media organisations coming to cover the event.”

CHOGM did not immediately reply to a request for comment on the media guidelines.

Unstable Pacific media freedom
The incident highlights the unstable state of press freedom in some Pacific island countries. Fiji in 2023 repealed a draconian media law that mandated prison sentences for content deemed against the national interest, while Papua New Guinea’s government has been considering proposals for greater control over the media.

Last month, Papua New Guinea’s media council condemned the exclusion of a BenarNews journalist during a visit by Indonesia’s President-elect Prabowo Subianto as “concerning” and “shameful.”

Samoa’s ranking in Reporters Without Borders’ global press freedom index slipped to 22nd this year out of 180 countries, from 19th in 2022. But it is the only Pacific island nation in the top 25.

The restrictions at CHOGM were not an accurate reflection of the country’s solid ranking, the Samoa Observer editorial said.

State-controlled or influenced media has a prominent role in many Pacific island countries, partly due to small populations and cultural norms that emphasize deference to authority and tradition.

Some Pacific island nations, such as Tuvalu and Nauru, have only government media because they have the populations of a small town. In others, such as Papua New Guinea, Samoa and Fiji, private media has established a greater role despite episodes of government hostility.

Copyright ©2015-2024, BenarNews. Republished with the permission of BenarNews.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2024/09/13/samoan-journalists-blast-ridiculous-media-restrictions-at-commonwealth-summit/feed/ 0 493136
Nomophobia https://www.radiofree.org/2024/09/11/nomophobia/ https://www.radiofree.org/2024/09/11/nomophobia/#respond Wed, 11 Sep 2024 14:25:21 +0000 https://dissidentvoice.org/?p=153481

Nomophobia: the fear of being without one’s smartphone. What’s so smart about that?

The post Nomophobia first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2024/09/11/nomophobia/feed/ 0 492818
Michigan’s ambitious clean energy laws face a peninsula-sized hurdle https://grist.org/energy/michigan-clean-energy-laws-upper-peninusla-natural-gas-plants/ https://grist.org/energy/michigan-clean-energy-laws-upper-peninusla-natural-gas-plants/#respond Wed, 11 Sep 2024 08:45:00 +0000 https://grist.org/?p=647862 This coverage is made possible through a partnership with Grist and Interlochen Public Radio in Northern Michigan.

Last year, Michigan became one of the latest states to adopt a clean energy standard, passing sweeping legislation that calls for utilities there to use 100 percent clean electricity by 2040 and sets targets for renewable energy development, among other requirements. 

Now, it’s rolling out those laws. And the Michigan Public Service Commission, the energy regulators responsible for that rollout, must pay special attention to the Upper Peninsula. The commission has until December 1 to recommend whether — and how — the legislation should be adjusted to accommodate its people, businesses, and utilities. 

They’ve got their work cut out for them: The Upper Peninsula, known colloquially as the U.P., is a huge, sparsely populated region in the north, separated from the rest of the state by the Straits of Mackinac and wedged between lakes Superior, Michigan, and Huron. The U.P. has a lot of utilities for its small population of just over 300,000, requiring a higher level of cooperation among them. Plus, the grid was built with power-hogging industries like mining and paper mills in mind, and fluctuating industrial demand has meant people who live in the region have faced high costs over the years. Some utilities have charged residents rates that are among the highest in Michigan and the country.

And the Public Service Commission has to ensure that the natural gas plants it approved in 2017 as a cleaner alternative to coal don’t prevent Michigan from achieving its clean energy goals. 

Those natural gas plants are powered by reciprocating internal combustion engines, called RICE units, that went online just five years ago and were built to last for decades — that is, beyond the state’s 2040 goal for clean energy. While the mining company Cleveland-Cliffs agreed to pay half of the $277 million price tag, the rest of the cost was passed on to more than 42,000 utility customers. 

Michigan’s new energy laws specifically mention the U.P.’s expensive new natural gas engines as a hurdle and ask the Public Service Commission to figure out what to do.

The laws don’t require shutting down the engines outright. But they do consider only natural gas paired with carbon capture “clean,” so the utility running the engines would have to deploy a lot of renewables instead or find some other way to comply with the new rules. What all that means for the future of the five-year-old engines is uncertain. 

Dan Scripps, the commission’s chair, said the state could tweak its approach to the RICE units by reducing or offsetting emissions. Another option, he said, would be to think about the region’s energy goals holistically: “How do you effectively get to net-zero carbon emissions by 2040, but maybe with more flexibility around carbon capture and that sort of thing?”

The commission is juggling a lot of opinions. 

Mining officials and employees spoke in favor of continuing to run the RICE units at a public hearing held by the commission this summer. 

Ryan Korpela, the general manager for Cleveland-Cliffs’ Tilden Mine, asked commissioners to allow the natural gas engines to operate without requiring renewable energy credits or new power generation, calling them “the perfect solution to a difficult problem,” and noting that ratepayers already foot the bill.

Officials with Cleveland-Cliffs say that the engines are cleaner and more efficient than coal, saving customers money on transmission costs. But organizations like the Sierra Club have spoken out against installing them in places like neighboring Wisconsin, arguing that burning methane — the main component of natural gas — harms both the climate and the people living next to the plants. The climate think tank RMI says many comparisons of coal and gas only consider end-use emissions, and don’t account for methane leaks during production and transportation. According to an RMI analysis published last year, those leaks can put the climate impacts of natural gas on par with coal (when emitted into the atmosphere, methane is about 80 times as potent as carbon dioxide).

The utility that operates the RICE units, Upper Michigan Energy Resources Corporation, is working to deploy renewables, said spokesperson Brendan Conway in an email, but they’re balancing that with an immediate need for reliable energy: “These units serve that critical function in a part of the state with limited transmission access.”

The natural gas generating station in Negaunee Township, Michigan.
A natural gas generating station in Negaunee Township, Michigan, powered by reciprocating internal combustion engines, or RICE units. Upper Michigan Energy Resources Corporation

Others, including environmental and energy groups, have pushed to implement the state’s laws as written, including the clean energy mandate.

Abby Wallace, a member of the Michigan Environmental Council, wants to find a compromise on the natural gas engines. “There are ways that the RICE units could be made more efficient themselves. And I think it’s premature to say that the U.P. in no way could meet the goals that the rest of the state are being held to in the legislation,” she said during the hearing.

Across the country, four states have 100 percent renewable portfolio standards, while 16 states have adopted broader 100 percent clean electricity standards, according to Lawrence Berkeley National Laboratory’s August report. (Clean energy includes a wider array of technologies than renewables, so that number doesn’t include states like Vermont, which put a renewable energy standard into law earlier this year.) 

Galen Barbose, a staff scientist who authored the report, said Michigan’s goals are pretty ambitious. 

“Most other 100 percent states have targets that are further out in time,” he said. “By setting that 100 percent target for 2040, Michigan is one of the more aggressive states in terms of the timeline.” It is also approaching the transition more incrementally than some other states, Barbose said, aiming to get 80 percent of its energy from clean sources by 2035. 

Looming in the background of Michigan’s energy transition is the instability of the electrical grid, which can have serious consequences for the people living in the U.P. 

“A squirrel sneezes and the power goes out,” said Tori McGeshick, describing how some locals see reliability there. McGeshick is a member of the Lac Vieux Desert Band of Lake Superior Chippewa Indians who now lives across the border in northern Wisconsin. She works as the tribe’s climate resilience coordinator.

Utilities often take longer to respond to power outages in more remote areas, she said, and unreliable power has had a profound effect on her community, especially elders and people with specific medical needs. 

“It’s also affecting our harvesting rights,” McGeshick told Grist. “A lot of people harvest or hunt or fish during the different seasons, and when a power outage occurs, all of that — supplies — also is lost.” She added that the Public Service Commission should solicit more tribal input as it weighs the new legislation against the infrastructure, cost, and reliability of the grid. 

Not everyone agrees that natural gas is a long-term solution to reliable, affordable energy. Roman Sidortsov, an associate professor of energy policy at Michigan Technological University, said gas prices are variable and hard to predict. “People tend to forget that fossil fuels, and oil and gas in particular — it’s incredibly volatile business,” he said. “There’s very little stability in the prices.”

Sidortsov, who was a member of the state’s U.P. Energy Task Force several years ago, said the U.P. deals with different environmental factors and customers than the rest of the state; the grid was built to serve industries that aren’t as robust as they once were.

He thinks a lot of the region’s demand can be met with distributed generation — getting power through smaller, more localized sources of energy, something energy experts have discussed for years. Sidortsov said the right way forward is to develop the grid’s capacity for energy storage and smaller, spread-out renewable energy sources. 

“So when we are talking about achieving the goals set by the Legislature, it probably will require rethinking the grid in the U.P., updating the grid in the U.P., making sure that it can accommodate local solutions and distributed solutions.”

Michigan has become a leader among the states working toward an all-clean energy standard, said Douglas Jester, a managing partner at the policy consulting firm 5 Lakes Energy who helped develop the state’s laws. 

And while the clean energy standard still allows utilities to sell some amount of fossil fuel power back to the grid, it might not make financial sense come 2040, Jester said, as nearby states increasingly turn to renewables.  

This reporting was supported by the Institute for Journalism and Natural Resources.

Editor’s note: Sierra Club is an advertiser with Grist. Advertisers have no role in Grist’s editorial decisions.

This story was originally published by Grist with the headline Michigan’s ambitious clean energy laws face a peninsula-sized hurdle on Sep 11, 2024.


This content originally appeared on Grist and was authored by Izzy Ross.

]]>
https://grist.org/energy/michigan-clean-energy-laws-upper-peninusla-natural-gas-plants/feed/ 0 492766
As fast fashion giant Shein embraces AI, its emissions are soaring https://grist.org/technology/as-fast-fashion-giant-shein-embraces-ai-its-emissions-are-soaring/ https://grist.org/technology/as-fast-fashion-giant-shein-embraces-ai-its-emissions-are-soaring/#respond Tue, 10 Sep 2024 08:45:00 +0000 https://grist.org/?p=647774 In 2023, the fast fashion giant Shein was everywhere. Crisscrossing the globe, airplanes ferried small packages of its ultra-cheap clothing from thousands of suppliers to tens of millions of customer mailboxes in 150 countries. Influencers’ “#sheinhaul” videos advertised the company’s trendy styles on social media, garnering billions of views

At every step, data was created, collected, and analyzed. To manage all this information, the fast fashion industry has begun embracing emerging AI technologies. Shein uses proprietary machine-learning applications — essentially, pattern-identification algorithms — to measure customer preferences in real time and predict demand, which it then services with an ultra-fast supply chain.

As AI makes the business of churning out affordable, on-trend clothing faster than ever, Shein is among the brands under increasing pressure to become more sustainable, too. The company has pledged to reduce its carbon dioxide emissions by 25 percent by 2030 and achieve net-zero emissions no later than 2050. 

But climate advocates and researchers say the company’s lightning-fast manufacturing practices and online-only business model are inherently emissions-heavy — and that the use of AI software to catalyze these operations could be cranking up its emissions. Those concerns were amplified by Shein’s third annual sustainability report, released late last month, which showed the company nearly doubled its carbon dioxide emissions between 2022 and 2023.

“AI enables fast fashion to become the ultra-fast fashion industry, Shein and Temu being the fore-leaders of this,” said Sage Lenier, the executive director of Sustainable and Just Future, a climate nonprofit. “They quite literally could not exist without AI.” (Temu is a rapidly rising e-commerce titan, with a marketplace of goods that rival Shein’s in variety, price, and sales.)

In the 12 years since Shein was founded, it has become known for its uniquely prolific manufacturing, which reportedly generated over $30 billion of revenue for the company in 2023. Although estimates vary, a new Shein design may take as little as 10 days to become a garment, and up to 10,000 items are added to the site each day. The company reportedly offers as many as 600,000 items for sale at any given time with an average price tag of roughly $10. (Shein declined to confirm or deny these reported numbers.) One market analysis found that 44 percent of Gen Zers in the United States buy at least one item from Shein every month. 

That scale translates into massive environmental impacts. According to the company’s sustainability report, Shein emitted 16.7 million total metric tons of carbon dioxide in 2023 — more than what four coal power plants spew out in a year. The company has also come under fire for textile waste, high levels of microplastic pollution, and exploitative labor practices. According to the report, polyester — a synthetic textile known for shedding microplastics into the environment — makes up 76 percent of its total fabrics, and only 6 percent of that polyester is recycled.

And a recent investigation found that factory workers at Shein suppliers regularly work 75-hour weeks, over a year after the company pledged to improve working conditions within its supply chain. Although Shein’s sustainability report indicates that labor conditions are improving, it also shows that in third-party audits of over 3,000 suppliers and subcontractors, 71 percent received a score of C or lower on the company’s grade scale of A to E — mediocre at best.

Machine learning plays an important role in Shein’s business model. Although Peter Pernot-Day, Shein’s head of global strategy and corporate affairs, told Business Insider last August that AI was not central to its operations, he indicated otherwise during a presentation at a retail conference at the beginning of this year. 

A man with short hair and glasses, in a long-sleeve black shirt, speaks into a headset at a conference
Peter Pernot-Day speaking at the Collision 2024 technology conference in June. Piaras Ó Mídheach / Sportsfile for Collision via Getty Images

“We are using machine-learning technologies to accurately predict demand in a way that we think is cutting edge,” he said. Pernot-Day told the audience that all of Shein’s 5,400 suppliers have access to an AI software platform that gives them updates on customer preferences, and they change what they’re producing to match it in real time. 

“This means we can produce very few copies of each garment,” he said. “It means we waste very little and have very little inventory waste.” On average, the company says it stocks between 100 to 200 copies of each item — a stark contrast with more conventional fast fashion brands, which typically produce thousands of each item per season, and try to anticipate trends months in advance. Shein calls its model “on-demand,” while a technology analyst who spoke to Vox in 2021 called it “real-time” retail.

At the conference, Pernot-Day also indicated that the technology helps the company pick up on “micro trends” that customers want to wear. “We can detect that, and we can act on that in a way that I think we’ve really pioneered,” he said. A designer who filed a recent class action lawsuit in a New York District Court alleges that the company’s AI market analysis tools are used in an “industrial-scale scheme of systematic, digital copyright infringement of the work of small designers and artists,” that scrapes designs off the internet and sends them directly to factories for production.

In an emailed statement to Grist, a Shein spokesperson reiterated Peter Pernot-Day’s assertion that technology allows the company to reduce waste and increase efficiency and suggested that the company’s increased emissions in 2023 were attributable to booming business. “We do not see growth as antithetical to sustainability,” the spokesperson said.

An analysis of Shein’s sustainability report by the Business of Fashion, a trade publication, found that last year, the company’s emissions rose at almost double the rate of its revenue — making Shein the highest-emitting company in the fashion industry. By comparison, Zara’s emissions rose half as much as its revenue. For other industry titans, such as H&M and Nike, sales grew while emissions fell from the year before. 

Shein’s emissions are especially high because of its reliance on air shipping, said Sheng Lu, a professor of fashion and apparel studies at the University of Delaware. “AI has wide applications in the fashion industry. It’s not necessarily that AI is bad,” Lu said. “The problem is the essence of Shein’s particular business model.” 

Other major brands ship items overseas in bulk, prefer ocean shipping for its lower cost, and have suppliers and warehouses in a large number of countries, which cuts down on the distances that items need to travel to consumers. 

According to the company’s sustainability report, 38 percent of Shein’s climate footprint comes from transportation between its facilities and to customers, and another 61 percent come from other parts of its supply chain. Although the company is based in Singapore and has suppliers in a handful of countries, the majority of its garments are produced in China and are mailed out by air in individually addressed packages to customers. In July, the company sent about 900,000 of these to the U.S. every day.

A person in a tutu and red balaclava holds a Shein-branded fan that has been painted over to say "FUCK Shein". An advertisement in the foreground warns passer-bys about consumption.
A group of activists protesting during Black Friday in Barcelona, Spain, in November 2023.
Marc Asensio / NurPhoto via Getty Images

Shein’s spokesperson told Grist that the company is developing a decarbonization roadmap to address the footprint of its supply chain. Recently, the company has increased the amount of inventory it keeps stored in U.S. warehouses, allowing it to offer American customers quicker delivery times, and increased its use of cargo ships, which are more carbon efficient than cargo planes.

“Controlling the carbon emissions in the fashion industry is a really complex process,” Lu said, adding that many brands use AI to make their operations more efficient. “It really depends on how you use AI.”

There is research that indicates using certain AI technologies could help companies become more sustainable. “It’s the missing piece,” said Shahriar Akter, an associate dean of business and law at the University of Wollongong in Australia. In May, Akter and his colleagues published a study finding that when fast fashion suppliers used AI data management software to comply with big brands’ sustainability goals, those companies were more profitable and emitted less. A key use of this technology, Atker says, is to closely monitor environmental impacts, such as pollution and emissions. “This kind of tracking was not available before AI based tools,” he said. 

Shein didn’t reply to a request for comment on whether it uses machine learning data management software to track emissions, which is one of the uses of AI included in Akter’s study. But the company’s much-touted usage of machine-learning software to predict demand and reduce waste is another of the uses of AI included in the research. 

Regardless, the company has a long way to go before meeting its goals. Grist calculated that the emissions Shein reportedly saved in 2023 — with measures such as providing its suppliers with solar panels and opting for ocean shipping — amounted to about 3 percent of the company’s total carbon emissions for the year.

Lenier, from Sustainable and Just Future, believes there is no ethical use of AI in the fast fashion industry. She said that the largely unregulated technology allows brands to intensify their harmful impacts on workers and the environment. “The folks who work in fast fashion factories are now under an incredible amount of pressure to turn out even more, even faster,” she said. 

Lenier and Lu both believe that the key to a more sustainable fashion industry is convincing customers to buy less. Lu said if companies use AI to boost their sales without changing to their unsustainable practices, their climate footprints will also grow accordingly. “It’s the overall effect of being able to offer more market-popular items and encourage consumers to purchase more than in the past,” he said. “Of course, the overall carbon impact will be higher.”

This story was originally published by Grist with the headline As fast fashion giant Shein embraces AI, its emissions are soaring on Sep 10, 2024.


This content originally appeared on Grist and was authored by Sachi Kitajima Mulkey.

]]>
https://grist.org/technology/as-fast-fashion-giant-shein-embraces-ai-its-emissions-are-soaring/feed/ 0 492600
“Intellectual Hick”: Sorting Out Our Complex Identities https://www.radiofree.org/2024/09/03/intellectual-hick-sorting-out-our-complex-identities/ https://www.radiofree.org/2024/09/03/intellectual-hick-sorting-out-our-complex-identities/#respond Tue, 03 Sep 2024 12:44:28 +0000 https://dissidentvoice.org/?p=153250 I am from rural America, sort of. I’m an intellectual, sort of. I’m certainly on the political left, but some comrades believe I’m turned conservative. Like many people, I don’t fit easily into conventional labels used in today’s polarized political debates. To understand me—and anyone else—takes some sorting out. Here’s how I sort myself out. […]

The post “Intellectual Hick”: Sorting Out Our Complex Identities first appeared on Dissident Voice.]]>
I am from rural America, sort of. I’m an intellectual, sort of. I’m certainly on the political left, but some comrades believe I’m turned conservative.

Like many people, I don’t fit easily into conventional labels used in today’s polarized political debates. To understand me—and anyone else—takes some sorting out. Here’s how I sort myself out.

I was born in North Dakota and grew up mostly in the big city of Fargo (well, it’s the largest city in the state). I never lived in a rural area, but I was a part of a larger rural culture, in which most everyone had some connection to the countryside through family, friends, or business. After living in several big cities during my professional life, I now live in northern New Mexico outside the small town of Taos, in a county with a smaller population than the university where I used to teach. Recent imports like me live alongside farmers and ranchers, interacting regularly through the acequia irrigation system.

I’m not rural, but I like to think I understand rural.

I started my professional life as a newspaper journalist before earning a PhD and becoming a professor at the University of Texas at Austin. But once I secured the guaranteed employment that comes with tenure, I walked away from the scholarly world of academic journals and conferences. I continued to teach but wrote for a general audience, immersing myself in a variety of community organizing projects.

I was an intellectual by profession, but I never really wanted to be part of formal intellectual life.

I’ve met intellectuals who assume rural life is bereft of intellectual activity. And I’ve met rural people who assume that intellectuals are condescending and annoying. There’s a kernel of truth in both assumptions. Since moving to a rural area, I have fewer opportunities for certain kinds of intellectual engagement; I don’t go to as many scholarly lectures as I did in Austin. At the same time, I don’t find myself wishing I was back in a faculty meeting and dealing with academic status-seeking. But I’ve met too many smart rural people and too many wonderful professors to fall back on stereotypes.

As I explain in It’s Debatable: Talking Authentically about Tricky Topics, perhaps most important to my identity is that I’m a radical. My politics are based on a critique of systems and structures of power that create impediments to meaningful social justice and real ecological sustainability: patriarchy, white supremacy, capitalism, First-World domination, and the worship of high-energy/high-technology gadgets in an industrial worldview. But how I apply these analyses make me both a part of the left and alienated from the left.

Let’s start with patriarchy. I was first politicized by the radical feminist movement to challenge the sexual-exploitation industries (pornography, prostitution, stripping—the ways men buy and sell objectified female bodies for sexual pleasure). That form of radical politics goes to the heart of systems and structures of male power. I also embraced what is typically called a radical analysis of racism, economic inequality, and imperialism. I thought that this kind of consistent critique—going to the root of problems by focusing on systems of power—was what it meant to be on the left, but over time I realized that most of my left comrades didn’t much care for radical feminism. Over time, more and more leftists not only rejected the critique of the sexual-exploitation industries but celebrated “sex work,” sometimes even portraying it as liberating.

When I started offering a critique of the ideology of the transgender movement, an analysis rooted in that radical feminism, I found myself not only disagreeing with left comrades but effectively being banished from left organizing groups. I learned quickly, starting in 2014, that a radical feminist critique of trans politics was unacceptable, even seen as a sign of closet conservativism.

But that shunning didn’t mean I wanted to find a home on the right. Conservatives weren’t much interested in a feminist critique of male domination—many on the right see patriarchy as the “natural” state of human societies. Conservatives might share a concern about the sexual-exploitation industries and transgender ideology, but for very different reasons than feminists.

Meanwhile, my focus on ecology and a deepening critique of technological fundamentalism—the belief that more technology can solve all ecological problems, including those created by previous technologies—has put me at odds with both right and left. Those who believe in the miracle of the market usually dismiss any talk of ecological collapse because free enterprise will save us. My left friends take environmental degradation and climate change more seriously but routinely argue that a more participatory democracy in a more socialist economy will save us.

Across the political spectrum, it’s hard to find anyone who agrees that a sustainable human future requires us to put dramatic limits on our consumption of energy and material resources, while we also dramatically reduce the human population. Conservatives often believe that is what leftists are secretly planning for, but I meet very few leftists who advocate those goals. The majority of left environmentalists I meet believe that renewable energy, combined with amazing yet-to-be-invented inventions, will allow us to dodge collapse.

I think I am making consistent and coherent arguments. But many of my left friends think I have abandoned left politics, even though we still agree on many issues. Conservatives will accept my political positions that seem in line with their own, though typically they aren’t interested in the radical analysis behind those positions.

I have changed my mind about specific policy proposals over the past four decades—as new information and insights emerge, reasonable people should adapt. But my analytical framework remains unchanged. I focus not merely on individual choices but on how systems work, and I don’t ignore the data that suggests collapse is all but inevitable on our current trajectory.

This leaves me largely in agreement with left comrades, but dealing with uncomfortable tensions when we disagree. Meanwhile, I’m at odds with right opponents most of the time, and when there is apparent agreement on policy there is an uncomfortable tension underneath.

How do I sort out all these political tensions, and sort out myself? To friends, I have started describing myself as an “intellectual hick.” I have no problem defending my intellectual contributions but also am happy to be living at a healthy distance from official intellectual spaces. Even with neighbors who don’t agree with my politics, our shared interest in caring for the land and water creates deep bonds.

How I label myself is less important than realizing that we all would benefit from sorting out ourselves. Once we critically self-reflect about our identities and ideas, it’s a lot easier talking with others about how they have sorted themselves out.

The post “Intellectual Hick”: Sorting Out Our Complex Identities first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Robert Jensen.

]]>
https://www.radiofree.org/2024/09/03/intellectual-hick-sorting-out-our-complex-identities/feed/ 0 491652
Amazon says it’s going ‘water positive’ — but there’s a problem https://grist.org/technology/amazon-data-centers-water-positive-energy/ https://grist.org/technology/amazon-data-centers-water-positive-energy/#respond Thu, 29 Aug 2024 08:45:00 +0000 https://grist.org/?p=646982 Earlier this year, the e-commerce corporation Amazon secured approval to open two new data centers in Santiago, Chile. The $400 million venture is the company’s first foray into locating its data facilities, which guzzle massive amounts of electricity and water in order to power cloud computing services and online programs, in Latin America — and in one of the most water-stressed countries in the world, where residents have protested against the industry’s expansion.

This week, the tech giant made a separate but related announcement. It plans to invest in water conservation along the Maipo River, which is the primary source of water for the Santiago region. Amazon will partner with a water technology startup to help farmers along the river install drip irrigation systems on 165 acres of farmland. The plan is poised to conserve enough water to supply around 300 homes per year, and it’s part of Amazon’s campaign to become “water positive” by 2030, meaning the company will conserve or replenish more water than it uses up.

The reasoning behind this water initiative is clear: Data centers require large amounts of water to cool their servers, and Amazon plans to spend $100 billion to build more of them over the next decade as part of a big bet on its Amazon Web Services cloud-computing platform. Other tech companies such as Microsoft and Meta, which are also investing in data centers to sustain the artificial-intelligence boom, have made similar water pledges amid a growing controversy about the sector’s thirst for water and power.

Amazon claims that its data centers are already among the most water-efficient in the industry, and it plans to roll out more conservation projects to mitigate its thirst. However, just like corporate pledges to reach “net-zero” emissions, these water pledges are more complex than they seem at first glance. While the company has indeed taken steps to cut water usage at its facilities, its calculations don’t account for the massive water needs of the power plants that keep the lights on at those very same facilities. Without a larger commitment to mitigating Amazon’s underlying stress on electricity grids, conservation efforts by the company and its fellow tech giants will only tackle part of the problem, according to experts who spoke to Grist.

The powerful servers in large data centers run hot as they process unprecedented amounts of information, and keeping them from overheating requires both water and electricity. Rather than try to keep these rooms cool with traditional air-conditioning units, many companies use water as a coolant, running it past the servers to chill them out. The centers also need huge amounts of electricity to run all their servers: They already account for around 3 percent of U.S. power demand, a number that could more than double by 2030. On top of that, the coal, gas, and nuclear power plants that produce that electricity themselves consume even larger quantities of water to stay cool.

Will Hewes, who leads water sustainability for Amazon Web Services, told Grist that the company uses water in its data centers in order to save on energy-intensive air conditioning units, thus reducing its reliance on fossil fuels. 

“Using water for cooling in most places really reduces the amount of energy that we use, and so it helps us meet other sustainability goals,” he said. “We could always decide to not use water for cooling, but we want to, a lot, because of those energy and efficiency benefits.”

In order to save on energy costs, the company’s data centers have to evaporate millions of gallons of water per year. It’s hard to say for sure how much water the data center industry consumes, but the ballpark estimates are substantial. One 2021 study found that U.S. data centers consumed around 415,000 acre-feet of water in 2018, even before the artificial-intelligence boom. That’s enough to supply around a million average homes annually, or about as much as California’s Imperial Valley takes from the Colorado River each year to grow winter vegetables. Another study found that data centers operated by Microsoft, Google, and Meta withdrew twice as much water from rivers and aquifers as the entire country of Denmark. 

It’s almost certain that this number has ballooned even higher in recent years as companies have built more centers to keep up with the artificial-intelligence boom, since AI programs such as ChatGPT require massive amounts of server real estate. Tech companies have built hundreds of new data centers in the last few years alone, and they are planning hundreds more. One recent estimate found that ChatGPT requires an average-sized bottle of water for every 10 to 50 chat responses it provides. The on-site water consumption at any one of these companies’ data centers could now rival that of a major beverage company such as PepsiCo. 

Amazon doesn’t provide statistics on its absolute water consumption; Hewes told Grist the company is “focused on efficiency.” However, the tech giant’s water usage is likely lower than some of its competitors — in part because the company has built most of its data centers with so-called evaporative cooling systems, which require far less water than other cooling technologies and only turn on when temperatures get too high. The company pegs its water usage at around 10 percent of the industry average, and in temperate locations such as Sweden, it doesn’t use any water to cool down data centers except during peak summer temperatures. 

Companies can reduce the environmental impact of their AI business by building them in temperate regions that have plenty of water, but they must balance those efficiency concerns with concerns about land and electricity costs, as well as the need to be close to major customers. Recent studies have found that data center water consumption in the U.S. is “skewed toward water stressed subbasins” in places like the Southwest, but Amazon has clustered much of its business farther east, especially in Virginia, which boasts cheap power and financial incentives for tech firms.

“A lot of the locations are driven by customer needs, but also by [prices for] real estate and power,” said Hewes. “Some big portions of our data center footprint are in places that aren’t super hot, that aren’t in super water stressed regions. Virginia, Ohio — they get hot in the summer, but then there are big chunks of the year where we don’t need to use water for cooling.”  Even so, the company’s expansion in Virginia is already causing concerns over water availability.

To mitigate its impacts in such basins, the company also funds dozens of conservation and recharge projects like the one in Chile. It donates recycled water from its data centers to farmers, who use it to irrigate their crops, and it has also helped restore the rivers that supply water-stressed cities such as Cape Town, South Africa; in northern Virginia, it has worked to install cover crop farmland that can reduce runoff pollution in local waterways. The company treats these projects the way other companies treat carbon offsets, counting each gallon recharged against a gallon it consumes at its data centers. Amazon said in its most recent sustainability report that it is 41 percent of the way to meeting its goal of being “water positive.” In other words, it has funded projects that recharge or conserve a little over 4 gallons of water for every 10 gallons of water it uses. 

But despite all this, the company’s water stewardship goal doesn’t include the water consumed by the power plants that supply its data centers. This consumption can be as much as three to 10 times as large as the on-site water consumption at a data center, according to Shaolei Ren, a professor of engineering at the University of California, Riverside, who studies data center water usage. As an example, Ren pointed to an Amazon data center in Pennsylvania that relies on a nuclear power plant less than a mile away. That data center uses around 20 percent of the power plant’s capacity.

“They say they’re using very little water, but there’s a big water evaporation happening just nearby, and that’s for powering their data center,” he said.

Companies like Amazon can reduce this secondary water usage by relying on renewable energy sources, which don’t require anywhere near as much water as traditional power plants. Hewes says the company has been trying to “manage down” both water and energy needs through a separate goal of operating on 100 percent renewable energy, but Ren points out that the company’s data centers need round-the-clock power, which means intermittently available renewables like solar and wind farms can only go so far.

Amazon isn’t the only company dealing with this problem. CyrusOne, another major data center firm, revealed in its sustainability report earlier this year that it used more than eight times as much water to source power as it did on-site at its data centers.

“As long as we are reliant on grid electricity that includes thermoelectric sources to power our facilities, we are indirectly responsible for the consumption of large amounts of water in the production of that electricity,” the report said.

As for replenishment projects like the one in Chile, they too will only go part of the way toward reducing the impact of the data center explosion. Even if Amazon is “water positive” on a global scale, with projects in many of the same basins where it owns data centers, that doesn’t mean it won’t still compromise water access in specific watersheds. The company’s data centers and their power plants may still withdraw more water than the company replenishes in a given area, and replenishment projects in other aquifers around the world won’t address the physical consequences of that specific overdraft.

“If they are able to capture some of the growing water and clean it and return to the community, that’s better than nothing, but I think it’s not really reducing the actual consumption,” Ren said. “It masks out a lot of real problems, because water is a really regional issue.”

This story was originally published by Grist with the headline Amazon says it’s going ‘water positive’ — but there’s a problem on Aug 29, 2024.


This content originally appeared on Grist and was authored by Jake Bittle.

]]>
https://grist.org/technology/amazon-data-centers-water-positive-energy/feed/ 0 490926
Oakland’s new school buses don’t just reduce pollution — they double as giant batteries https://grist.org/transportation/oakland-electric-school-buses-battery-storage/ https://grist.org/transportation/oakland-electric-school-buses-battery-storage/#respond Thu, 29 Aug 2024 08:15:00 +0000 https://grist.org/?p=646998 The wheels on this bus do indeed go round and round. Its wipers swish. And its horn beeps. Hidden in its innards, though, is something special — a motor that doesn’t vroom but pairs with a burgeoning technology that could help the grid proliferate with renewable energy.

These new buses, developed by a company called Zum, ride clean and quiet because they’re fully electric. With them, California’s Oakland Unified School District just became the first major district in the United States to transition to 100 percent electrified buses. The vehicles are now transporting 1,300 students to and from school, replacing diesel-chugging buses that pollute the kids’ lungs and the neighborhoods with particulate matter. Like in other American cities, Oakland’s underserved areas tend to be closer to freeways and industrial activity, so air quality in those areas is already terrible compared to the city’s richer parts.

Pollution from buses and other vehicles contributes to chronic asthma among students, which leads to chronic absenteeism. Since Oakland Unified only provides bus services for its special-need students, the problem of missing school for preventable health issues is particularly acute for them. “We have already seen the data — more kids riding the buses, that means more of our most vulnerable who are not missing school,” said Kyla Johnson-Trammell, superintendent of Oakland Unified School District, during a press conference Tuesday. “That, over time, means they’re having more learning and achievement goes up.”

What’s more, a core challenge of weaning our society off fossil fuels is that utilities will need to produce more electricity, not less of it. “In some places, you’re talking about doubling the amount of energy needed,” said Kevin Schneider, an expert in power systems at Pacific Northwest National Laboratory, who isn’t involved in the Oakland project. 

Counterintuitively enough, the buses’ massive batteries aren’t straining the grid; they’re benefiting it. Like a growing number of consumer EV models, the buses are equipped with vehicle-to-grid technology, or V2G. That allows them to charge their batteries by plugging into the grid, but also send energy back to the grid if the electrical utility needs extra power. “School buses play a very important role in the community as a transportation provider, but now also as an energy provider,” said Vivek Garg, co-founder and chief operating officer of Zum.

Each bus plugs into its own charger, which automatically determines when to draw power or give power back to the grid. Matt Simon

And provide the buses must. Demand on the grid tends to spike in the late afternoon, when everyone’s returning home and switching on appliances like air conditioners. Historically, utilities could just spin up more generation at a fossil fuel power plant to meet that demand. But as the grid is loaded with more renewable energy sources, intermittency becomes a challenge: You can’t crank up power in the system if the sun isn’t shining or the wind isn’t blowing.

If every EV has V2G capability, that creates a distributed network of batteries for a utility to draw on when demand spikes. The nature of the school bus suits it perfectly for this, because it’s on a fixed schedule, making it a predictable resource for the utility. In the afternoon, Zum’s buses take kids home, then plug back into the grid. “They have more energy in each bus than they need to do their route, so there’s always an ample amount left over,” said Rudi Halbright, product manager of V2G integration at Pacific Gas and Electric Company, the utility that’s partnered with Zum and Oakland Unified for the new system.

As the night goes on and demand wanes, the buses charge again to be ready for their morning routes. Then during the day, they charge again, when there’s plentiful solar power on the grid. On weekends or holidays, the buses would be available all day as backup power for the grid. “Sure, they’re going to take a very large amount of charge,” said Kevin Schneider, an expert in power systems at Pacific Northwest National Laboratory, who isn’t involved in the Oakland project. “But things like school buses don’t run that often, so they have a great potential to be a resource.”

That resource ain’t free: Utilities pay owners of V2G vehicles to provide power to the grid. (Because V2G is so new, utilities are still experimenting with what this rate structure looks like.) Zum says that that revenue helps bring down the transportation costs of its buses to be on par with cheaper diesel-powered buses. Oakland Unified and other districts can get still more money from the EPA’s Clean School Bus Program, which is handing out $5 billion between 2022 and 2026 to make the switch.

The potential of V2G is that there are so many different kinds of electric vehicles (or vehicle types left to electrify). Garbage trucks run early in the day, while delivery trucks and city vehicles do more of a nine-to-five. Passenger vehicles are kind of all over the place, with some people taking them to work, while others sit in garages all day. Basically, lots of batteries — big and small — parked idle at different times to send power back to the grid.

All the while, fiercer heat waves will require more energy-hungry air conditioning to keep people healthy. (Though ideally, everyone would get a heat pump instead.) “We’re still going to need more generation, more power lines, but energy storage is going to give us the flexibility so we can deploy it quicker,” Schneider said. In the near future, you may get home on a sweltering day and still be able to switch on your AC — thanks to an electric school bus sitting in a lot. 

This story was originally published by Grist with the headline Oakland’s new school buses don’t just reduce pollution — they double as giant batteries on Aug 29, 2024.


This content originally appeared on Grist and was authored by Matt Simon.

]]>
https://grist.org/transportation/oakland-electric-school-buses-battery-storage/feed/ 0 490998
Mike Lynch, Probability and the Cyber Industrial Complex https://www.radiofree.org/2024/08/26/mike-lynch-probability-and-the-cyber-industrial-complex/ https://www.radiofree.org/2024/08/26/mike-lynch-probability-and-the-cyber-industrial-complex/#respond Mon, 26 Aug 2024 17:50:27 +0000 https://dissidentvoice.org/?p=153098 It began as a devastating, confined storm off the coast of Sicily, striking the luxury yacht Bayesian in the form of a devastating water column resembling a tornado.  Probability was inherent in the name (Thomas Bayes, mathematician and nonconformist theologian of the 18th century, had been the first to use probability inductively) and improbability the […]

The post Mike Lynch, Probability and the Cyber Industrial Complex first appeared on Dissident Voice.]]>
It began as a devastating, confined storm off the coast of Sicily, striking the luxury yacht Bayesian in the form of a devastating water column resembling a tornado.  Probability was inherent in the name (Thomas Bayes, mathematician and nonconformist theologian of the 18th century, had been the first to use probability inductively) and improbability the nature of the accident.

It also led to rich speculation about the fate of those on the doomed vessel.  While most on the sunk yacht were saved (the eventual number totalled fifteen), a number of prominent figures initially went missing before being found.  They included British technology entrepreneur Mike Lynch and his daughter, along with Morgan Stanley International Bank chairman, Jonathan Bloomer, and Clifford Chance lawyer Chris Morvillo.

Lynch, co-founder of the British data analytics firm Autonomy and co-founder and investor in the cybersecurity firm Darktrace, had been recently acquitted by a US federal jury of fifteen counts of fraud and conspiracy, along with his co-defendant Stephen Chamberlain, regarding Hewlett-Packard’s acquisition of Autonomy in 2011.  While the firm’s acquisition had cost a mighty US$11 billion, HP wrote off a stunning US$8.8 billion within 12 months, demanding an investigation into what it regarded as “serious accounting improprieties, disclosure failures and outright misrepresentations at Autonomy.”  Clifford Chance was instructed by Lynch to act for him following the write down of Autonomy’s value in November 2012, hence Morvillo’s presence.

Lynch had his fair share of unwanted excitement.  The US Department of Justice successfully secured his extradition, though failed to get a conviction.  The investor proved less fortunate in a 2022 civil suit in the UK, one he lost.

For all his legal travails, Lynch stayed busy. He founded Invoke Capital, which became the largest investor in the cybersecurity firm Darktrace.  Other companies featured in terms of funding targets for the company, among them Sophia Genetics, Featurespace and Luminance.

Darktrace, founded in 2013, has thrived in the thick soup of security establishment interests.  British prime ministers have fallen within its orbit of influence, so much so that David Cameron accompanied its CEO Nicole Egan on an official visit to Washington DC in January 2015 ahead of the opening of the company’s US headquarters.

Members of the UK signals intelligence agency GCHQ are said to have approached Lynch, who proceeded to broker a meeting that proved most profitable in packing Darktrace with former members of the UK and, eventually, US intelligence community.  The company boasts a veritable closet of former operatives on the books: MI5, MI6, CIA, the NSA, and FBI.  Co-founder Stephen Huxter, a notable official in MI5’s cyber defence team, became Darktrace’s managing director.

Other connections are also of interest in sketching the extensive reach of the cyber industrial complex.  This need not lend itself to a conspiratorial reading of power so much as the influence companies such as Darktrace wield in the field.  Take Alexander Arbuthnot, yet another cut and dried establishment figure whose private equity firm Vitruvian Partners found Darktrace worthy of receiving a multi-million-pound investment as part of a push into cybersecurity.

Fascinating as this is, such matters gather steam and huff on looking at Arbuthnot’s family ties.  Take Arbuthnot’s mother and Westminster chief magistrate, one Lady Emma Arbuthnot.  The magistrate presided over part of the lengthily cruel and prolonged extradition proceedings of Julian Assange, founder of WikiLeaks and hounded for alleged breaches of the US Espionage Act.  (Assange recently pleaded guilty to one count of conspiracy to obtain and disclose national defence information under the Espionage Act of 1917.)  Any conflict of interest, actual or perceived, including her husband’s own links to the UK military community as former UK defence minister, were not declared during the legal circus.  Establishment members tend to regard themselves as above reproach.

With such a tight tangle of links, it took another coincidence to send the amateur sleuths on a feverish digital trawl for sauce and conspiracy.  On August 17, a few days prior to Lynch’s drowning, his co-defendant was struck while running in Cambridgeshire.  Chamberlain died in hospital from his injuries, with the driver, a 49-year-old woman from Haddenham, assisting at the scene with inquiries.

Reddit and the platform X duly caught fire with theories on the alleged role of hidden corporate actors, disgruntled US justice officials robbed of their quarry, and links to the intelligence community.  Chay Bowes, a blustery Irish businessman with an addiction to internet soapbox pontification, found himself obsessed with probabilities, wondering, “How could two of the statistically most charmed men alive meet tragic ends within two days of each other in the most improbable ways?”

A better line of reflection is considering the influence and power such corporations exercise in the cyber military-industrial complex.  In the realm of cyber policy, the line between public sector notions of security and defence, and the entrepreneurial pursuit of profit, have ceased to be meaningful.  In a fundamental sense, Lynch was vital to that blurring, the innovator as semi-divine.

Darktrace became an apotheosis of that phenomenon, retaining influence in the market despite a scandal spotted record.  It has, for instance, survived claims and investigations of sexual harassment.  (One of those accused at the company was the most appropriately named Randy Cheek, a sales chief based in the San Francisco office.)

In 2023, its chief executive Poppy Gustafsson fended off a stinging report by the US-hedge fund Quintessential Capital Management (QCM) alleging questionable sales and accounting practices intended to drive up the value of the company before it was floated on the London Stock Exchange in 2021.  This sounded rather typical and seemed eerily reminiscent of the Autonomy affair.  “After a careful analysis,” QCM reported, “we are deeply sceptical about the validity of Darktrace’s financial statements and fear that sales, margins and growth rates may be overstated and close to sharp correction.”

QCM’s efforts did no lasting damage.  In April this year, it was revealed that Darktrace would be purchased by US private equity firm Thoma Bravo for the punchy sum of US$5.32 billion.  The Darktrace board was bullish about the deal, telling investors that its “operating and financial achievements have not been reflected commensurately in its valuation, with shares trading at a significant discount to its global peer group”.  If things sour on this one, Thoma Bravo will only have itself to blame, given the collapse of takeover talks it had with the company in 2022.  Irrespective of any anticipated sketchiness, Lynch’s troubled legacy regarding data-driven technology and its relation to the state will remain.

The post Mike Lynch, Probability and the Cyber Industrial Complex first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2024/08/26/mike-lynch-probability-and-the-cyber-industrial-complex/feed/ 0 490517
The right to repair electronics is now law in 3 states. Is Big Tech complying? https://grist.org/regulation/the-right-to-repair-is-now-law-in-3-states-is-big-tech-complying/ https://grist.org/regulation/the-right-to-repair-is-now-law-in-3-states-is-big-tech-complying/#respond Mon, 26 Aug 2024 08:15:00 +0000 https://grist.org/?p=646570 If you’re considering purchasing a new gadget — whether that’s a laptop, a video game console, or a digital camera — you might expect to have access to whatever repair manuals or spare parts the manufacturer produces. But until recently, companies selling electronic devices in the U.S. were under no obligation to provide their customers with the parts or information needed to perform even simple repairs, like replacing a battery. 

Last December, New York became the first state in the country to require that electronic device manufacturers make their repair materials available to the public, when the state’s digital “right-to-repair” law — the first such law in the country — went into effect. In July, similar laws in Minnesota and California became enforceable. Over the next two years, consumers in Oregon and Colorado will also be granted the legal right to repair a vast array of digital electronic devices. 

Repair advocates say these laws are a critical step toward ending our culture of digital disposability, in which electronics are simply replaced when broken. Discarded gadgets are usually destined to become toxic e-waste, and manufacturing new ones drives environmentally destructive mining and generates carbon emissions and other pollution.

But these right-to-repair laws are brand new, and whether manufacturers across the wide range of affected industries will overhaul their repair practices overnight remains to be seen. Repair advocates are watching tech companies in these states closely, as are the state attorneys general tasked with enforcing the law. 

Many manufacturers are still “ostrich head in the sand” when it comes to the right to repair, said Kyle Wiens, CEO of the repair guide site iFixit. “There’s lots of companies that have not thought about this,” Wiens added.

A recent report by the U.S. Public Research Interest Group, or PIRG, a leading advocate for the right to repair, underscores just how far apart different industries are in their repair journeys. 

The report identified 21 devices covered by New York’s new right-to-repair law, which requires electronics makers to publicly release any proprietary parts, tools, and manuals needed to repair any devices first sold in the state on or after July 1, 2023. After the law went into effect, PIRG graded each of these devices based on the accessibility and quality of repair manuals, the number of spare parts the manufacturer offers, and the availability of commonly replaced parts like batteries. 

A user wears a Meta Quest virtual reality headset at a technology show in Paris, France. Chesnot / Getty Images

In general, the report found that smartphone makers provided the most comprehensive repair materials. Laptops, tablets, and gaming consoles were a mixed bag, while the digital cameras and VR headsets surveyed scored poorly. The authors were unable to access repair manuals for recent Sony, Nikon, Fujifilm, or Canon digital cameras, while Apple didn’t offer any manuals or spare parts for its new VR headset, the Apple Vision Pro. Meta’s new Meta Quest 3 VR headset also lacks a repair manual, and spare parts offerings are very limited, the report found.

Grist was unable to locate a press contact at Canon, and an email to the company’s investor relations department went unanswered. A representative of Fujifilm North America told Grist in an email that the company’s technical service team “will provide diagnosis verification and self-repair support consistent with applicable Right to Repair requirements.” Media representatives at Nikon, Apple, and Meta didn’t respond to Grist’s request for comment on the report’s findings.

A representative of Sony Electronics told Grist that the company has published around 300 service manuals “and we are in the process of releasing more.” The representative shared a link to the service manual for the Alpha 6700 camera, which PIRG researchers were unable to locate through a web search when they evaluated the camera a few months ago. Report co-author Nathan Proctor told Grist that Sony’s customer service division suggested the researchers check YouTube or iFixit for repair information. That speaks to a broader problem, he said.

“Even companies that are complying, their customer service people … haven’t gotten the message,” Proctor told Grist. “To me that’s a very frustrating state of affairs.”

Proctor emphasized that the findings aren’t a definitive analysis of whether a product is or isn’t in compliance with the law, which contains “a bunch of loopholes,” he said. (Chief among those loopholes: If a company doesn’t offer any repair support to begin with, it’s under no legal obligation to start — in New York or any other state.) Rather, Proctor said, the intent was to show whether manufacturers are complying with the spirit of the law by taking steps to ensure everyone can fix the stuff they own.

A person wearing a masks stands in profile in front of a sleek display of small cameras and equipment, which appear black against a white background that bears the text 'Eos R System'
Digital cameras and lenses are displayed in the Canon booth at a trade show in Yokohama, Japan. Tomohiro Ohsumi / Getty Images

“The purpose of this is to kind of signal to manufacturers that someone is going to be paying attention,” Proctor said. “And that they should organize their plans for compliance.”

Preparing for a repairable future will only become more important as newer, and stronger, state laws enter force. The Minnesota and California right-to-repair laws that went into effect on July 1 cover devices going back to 2021. They also include some electronics that got a carveout in New York, such as e-bikes and, in Minnesota’s case, business computers. (However, both states’ laws exclude gaming consoles, which New York’s law covers.) 

Meanwhile, right-to-repair laws passed in Oregon and Colorado earlier this year take effect in January 2025 and 2026, respectively. These laws close one big outstanding loophole: Both ban parts pairing, the practice of serializing parts and using software to sync them with specific devices during repair. While some companies, like Apple, claim that the practice is vital for ensuring security and optimal performance after a device is repaired, critics say parts pairing allows manufacturers to unfairly restrict which spare parts can be used to complete a repair job. For instance, in order for a replacement iPhone screen to function properly, the screen must be purchased from Apple and paired using the company’s proprietary software tools.

Apple lobbied against outlawing parts pairing in both Oregon and Colorado. Having lost that battle, the company is now taking steps to open up its parts pairing system, including allowing customers to pair used Apple parts with certain iPhone models. An Apple representative declined to say which iPhone models will be affected by the change, or whether the company plans to extend this less-restrictive pairing process to other devices, like MacBook laptops.

In addition to outlawing parts pairing, the Oregon law will retroactively apply to most electronic devices going back to 2015, the longest coverage period yet.

Gay Gordon-Byrne, executive director of The Repair Association, a trade association representing repair businesses, said it was too early to tell which devices or companies might be out of compliance with the new laws. To answer that question, The Repair Association is in the process of collecting data from its members on numerous products they’re trying to fix and the challenges they’re facing. “We’re expecting there will be lots of holes, we just don’t have any information on where the holes are yet,” she said.

Once those holes are visible, advocates, repair workers, and the public can start pointing them out to state attorneys general, who can file suits against companies that are out of compliance with the law. None of the states with an active digital right-to-repair law has brought a public action against a company yet, but the offices of the attorneys general of California and Minnesota told Grist they are committed to enforcing the law. (The New York attorney general’s office declined to comment on the record.) 

If a state determines that a company is in violation of its right-to-repair law, that company could face fines — ranging from $500 per violation in New York to $20,000 per violation in Minnesota.

Whether these penalties are substantial enough to convince tech companies worth trillions of dollars to course correct on repair remains to be seen. But both Gordon-Byrne and Wiens, of iFixit, see an even stronger incentive for companies to follow the law: The embarrassment of being forced to pay the public back for selling unfixable stuff.

“I think the public reputational risks are as significant as the fines,” Wiens said.

This story was originally published by Grist with the headline The right to repair electronics is now law in 3 states. Is Big Tech complying? on Aug 26, 2024.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/regulation/the-right-to-repair-is-now-law-in-3-states-is-big-tech-complying/feed/ 0 490469
DOJ Files Antitrust Suit Against RealPage, Maker of Rent-Setting Algorithm https://www.radiofree.org/2024/08/23/doj-files-antitrust-suit-against-realpage-maker-of-rent-setting-algorithm/ https://www.radiofree.org/2024/08/23/doj-files-antitrust-suit-against-realpage-maker-of-rent-setting-algorithm/#respond Fri, 23 Aug 2024 19:45:00 +0000 https://www.propublica.org/article/realpage-lawsuit-doj-antitrustdoj-files-antitrust-suit-against-maker-of-rent-setting-algorithm by Heather Vogell

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

The Department of Justice and eight states on Friday sued the maker of rent-setting software that critics blame for sending rents soaring in apartment buildings across the country.

The civil lawsuit, filed in federal district court in Greensboro, North Carolina, accuses Texas tech company RealPage of taking part in an illegal price-fixing scheme to reduce competition among landlords so they can boost prices — and profits. It also alleges the company took over the market for such price-setting software, effectively monopolizing it.

“RealPage has built a business out of frustrating the natural forces of vigorous competition,” said Assistant Attorney General Jonathan Kanter at a news conference Friday with top department officials. “The time has come to stop this illegal conduct.”

The antitrust lawsuit is the latest — and most dramatic — development to follow a 2022 ProPublica investigation that examined RealPage’s role in helping landlords set rent prices across the country, an arrangement that legal experts said could result in cartel-like behavior. Since then, senators have introduced legislation seeking to ban such practices, tenants have filed dozens of ongoing federal lawsuits, and San Francisco’s Board of Supervisors moved to bar landlords from using similar algorithms to set rents.

Justice Department officials said Friday that their lawsuit followed a nearly two-year investigation into the company. Along with traditional approaches, such as examining internal records, they said their probe involved data scientists who dug into computer code to understand how these algorithms set prices.

RealPage’s software enables landlords to share confidential data and charge similar rents, the officials said.

“We learned that the modern machinery of algorithms and AI can be even more effective than the smoke-filled rooms of the past,” Kanter said, referring to artificial intelligence. “You don't need a Ph.D. to know that algorithms can make coordination among competitors easier.”

The case has become central to the Justice Department’s efforts to jumpstart antitrust enforcement under the Biden White House. Officials said they are also scrutinizing similar information-sharing exchanges in other industries, including meat processing. “Training a machine to break the law is still breaking the law,” Deputy Attorney General Lisa Monaco said.

But experts say that prosecutors face challenges in applying the more than 100-year-old Sherman Antitrust Act to situations in which competitors rely on new technologies to coordinate their prices.

RealPage, which is owned by the private equity company Thoma Bravo, did not immediately respond to ProPublica’s request for comment. It has previously denied wrongdoing. In a statement published on its website in June, the company said its landlord clients are free to accept or reject its advice and that its impact on the national rental market is smaller than portrayed by the software’s critics.

“RealPage uses data responsibly, including limited aggregated and anonymized nonpublic data where accuracy aids pro-competitive uses,” the company’s statement said. It has previously said it will fight antitrust litigation.

The DOJ’s suit does not name landlords as defendants, unlike the complaints filed by tenants, which accused some of the biggest landlords in the country of price-fixing through RealPage. In May, the FBI raided an Atlanta-based landlord involved in the lawsuits. The landlord said it was not law enforcement’s target. DOJ officials declined to answer a question about why their lawsuit did not name landlords, with Kanter saying he “can’t comment on any further investigations.”

The DOJ complaint, which is more than 100 pages long, quotes RealPage executives and landlords speaking about the impact of the software. The lawsuit alleges that the company’s software works by helping landlords realize that if they all raise prices, or fail to drop them during a downturn, “a rising tide raises all ships.”

“I always liked this product because your algorithm uses proprietary data from other subscribers to suggest rents and term,” one landlord commented about the product, according to the lawsuit. “That’s classic price fixing.”

Justice Department officials said the software has had a “substantial” impact on the housing market. It is used to set rent for more than three million apartments nationwide, Kanter said, and it draws on competitively sensitive information from over 16 million units. Americans spend more on housing than any other expense, officials said.

“Americans should not have to pay more in rent because a company has found a new way to scheme with landlords to break the law,” Attorney General Merrick Garland said at the news conference.

ProPublica’s story found that in one Seattle neighborhood, 70% of all multifamily apartments were overseen by just 10 property managers — every single one of whom used pricing software sold by RealPage. The company claimed its software could help landlords “outperform the market” by 3% to 7%.

Justice officials alleged that RealPage “polices” landlords’ compliance with its recommendations. Its software has an “auto-accept” setting, which allows landlords to automatically adopt its suggestions and “effectively permits RealPage to determine the price a renter will pay,” Garland said.

The states whose attorneys general have joined the federal lawsuit are North Carolina, California, Colorado, Connecticut, Minnesota, Oregon, Tennessee and Washington.

Meanwhile, housing costs have emerged as a political issue in the presidential election, as the candidates travel the country making their cases.

Last week, Vice President Kamala Harris, the Democratic nominee for president, criticized landlords’ use of price-setting software to determine rents.

“Some corporate landlords collude with each other to set artificially high rental prices, often using algorithms and price-fixing software to do it,” she said. “It’s anticompetitive, and it drives up costs.”


This content originally appeared on ProPublica and was authored by by Heather Vogell.

]]>
https://www.radiofree.org/2024/08/23/doj-files-antitrust-suit-against-realpage-maker-of-rent-setting-algorithm/feed/ 0 490174
Why the EPA is relying on unproven technology to stop cancer-causing emissions https://grist.org/accountability/epa-ethylene-oxide-permanent-total-enclosure-pte-solution/ https://grist.org/accountability/epa-ethylene-oxide-permanent-total-enclosure-pte-solution/#respond Thu, 22 Aug 2024 08:43:00 +0000 https://grist.org/?p=645828 In the late 1980s, the aptly named Package Products Company in Charlotte, North Carolina, was facing a toxic problem. The consumer packaging company printed eye-catching candy wrappers, soft-drink shrink wrap, and other materials doused with colorful inks. But the company discovered that the chemicals in the ink vaporized when the wrappers were set out to dry, poisoning the air and creating a dangerous environment for workers and even those who lived nearby. 

The company brought in Michael Lukey, an air pollution control engineer, to solve the problem. He had a novel idea: He set up blowers that pumped clean air into the room that contained the printing press. As the air traveled through the area, it swept up the volatile chemicals emanating from the ink. On the other end of the room, Lukey used exhaust fans to funnel the chemical-laden air out of the room and into equipment that incinerated the toxins.

The plan worked as Lukey had hoped. Once the design was operational, the company concluded that the technology neutralized more than 97 percent of the chemicals. Since the method involved functionally sealing off the room in order to use air flow to isolate toxins, it became known as a Permanent Total Enclosure, or PTE.

A diagram showing squares and rectangles
A diagram showing a permanent total enclosure for a large rotogravure press in Nevada. Courtesy of Michael Lukey

Within a couple of years, the Environmental Protection Agency had expressed interest in the technology. “The EPA got wind of the kind of facility that we put in over there and wanted to hear more about it,” Lukey told Grist. “They initiated some studies and did comment on the appropriateness of these kinds of larger enclosures that would reduce volatile organic chemical emissions from these printing operations.”

The EPA would ultimately decree PTEs the “Best Demonstrated Control Technology” for reducing harmful emissions from operations like Package Products Company’s, and the technology spread across the country. From shipping facilities to spray-painting booths at car manufacturers, PTEs became a go-to pollution solution in a handful of niche industries. In his decades on the job, Lukey has personally designed more than 300 PTEs. He thinks he’s probably worked for every candy wrapper manufacturer in the country, including a company that produces the iconic bright yellow M&M’s wrapper.

The EPA is now betting on PTEs to solve a much thornier problem: Roughly half of all medical devices in the U.S. are sterilized with ethylene oxide, a profoundly toxic chemical that the EPA has determined can cause multiple forms of cancer. When companies fumigate medical devices with ethylene oxide, it often leaks out of their sterilization plants, poisoning workers and community members nearby. In 2016, the EPA found that the chemical was 30 times more toxic to adults and 60 times more toxic to children than previously understood. Two years later, the agency issued alerts to residents living by sterilizers with unusually high cancer risk, prompting local advocates to file lawsuits against the facilities and pressuring lawmakers and regulators to shut them down. Earlier this year, in response to a court-imposed deadline, the EPA finally issued regulations intended to bring down emissions of the chemical.

The new rule relies on PTEs to safeguard exposed communities. But engineers, former EPA officials, and air quality experts told Grist that, while PTEs are effective at mitigating pollution from equipment in small, enclosed rooms, PTEs have rarely been tested at facilities on the scale at which medical device sterilization is conducted. And in the few cases where PTEs have so far been installed at sterilizer facilities, while ethylene oxide levels decreased overall, some still breached federal safety thresholds when measured by nearby air monitors. The problem comes down to basic engineering: The spray-painting booths that PTEs typically treat tend to be about the size of the average American living room. Sterilization facilities, on the other hand, can occupy tens of thousands of square feet.

an enclosed room with multiple pipes and cylinders inside
A permanent total enclosure for an ink-pumping area feeding a fully enclosed flexographic printing operation in Houston, Texas. Courtesy of Michael Lukey

“EPA has not one shred of engineering analysis to show it will work,” said Ron Sahu, a mechanical engineer and consultant with decades of experience working with state and federal environmental regulators and industrial companies. “It is a faith-based, hopeful suggestion, and we’ll see how it works.” Sahu has worked as a court-approved technical expert in litigation against the sterilization industry and has submitted reports to the EPA on the efficacy of PTEs on behalf of environmental groups.

Using the technology in large warehouse-like structures with multiple entry points and windows makes it nearly impossible to ensure that air tainted with ethylene oxide doesn’t escape from the facility before it can be treated, experts told Grist. While the EPA is requiring companies to continuously monitor air flow or pressure to ensure PTEs work as intended, facilities are allowed to average data over three hours — an interval that experts told Grist will not guarantee that PTEs are capturing all ethylene oxide emissions.

“It’s very difficult to have a warehouse-sized PTE,” said Jonathan Thornburg, director of exposure and aerosol technology at the nonprofit Research Triangle Institute in North Carolina. He added that even “the wind blowing against the side of the building can change the pressure differential” and allow contaminated air to escape.

“We strongly disagree with the assertion that PTE is not appropriate to apply to this source category,” Angela Hackel, an EPA spokesperson, told Grist, adding that “properly designed and operated” PTEs can capture all ethylene oxide emissions. The agency’s modeling shows the technology can reduce excess cancer risk to acceptable levels, she said, and that it has been “applied widely to any industrial processes that need to control” emissions of volatile chemicals.

If these measures do not work as intended, however, the EPA is in a bind, in large part because banning ethylene oxide use is not an option. Medical devices must be sterilized before they can be safely used in hospitals, and some can only be sterilized with ethylene oxide. Since alternatives don’t yet exist, the EPA cannot require the sterilization industry to phase out the chemical. In the meantime, the agency’s approach has been to mandate that facilities reduce its use to the lowest extent possible without compromising patient safety — and to install PTEs, which it has selected as an effective solution for this growing problem. 

But the sterilization industry itself is crying foul over this approach: The country’s major sterilizers have already informed the EPA that strict compliance with PTE guidance is not feasible. In instances where companies have installed the technology, it has failed to reduce ethylene oxide emissions to safe levels. In Southern California, for instance, local regulators forced Parter Medical Products to shut down in 2022 after an air quality monitor near the facility detected ethylene oxide levels more than 4,000 times above the EPA’s safe limit. After installing a PTE, emissions decreased, but the company still exceeded public health thresholds. The current emissions from the facility put the cancer risk for nearby residents at 378 in 10,000 — 378 times above the EPA’s threshold. Similarly, after a PTE was installed at a Medline facility in Illinois, regulators found ethylene oxide emissions more than 45 times above the EPA’s threshold.

In an email, an EPA spokesperson downplayed these numbers, saying that sampling the air for ethylene oxide can often yield inaccurate results, since other compounds in the air can cause concentrations to appear higher than they actually are. 

“This is why we use modeling data as our driver which we believe to be more accurate,” she said, adding that agency models had found the maximum risk to communities from sterilizers after the installation of PTEs would not exceed federal standards. But state and federal regulators have used ethylene oxide monitors on various occasions to gauge a community’s risk of exposure to the compound. In fact, EPA and state regulators have used monitoring data to shut facilities down and require the installation of additional control technology. 

Section break

In order for a PTE to comply with EPA standards, it needs to meet certain criteria. All doors, windows, and openings need to be closed during operations and should be limited in size. The air should flow into the structure at a certain velocity. If these criteria are met after the PTE is installed and when regulatory agencies conduct inspections, the technology is considered 100 percent efficient. That is, it’s assumed that the PTE is capturing all the pollution in the air. 

These criteria will be difficult to meet, given that the typical sterilization facility has a number of openings to the outside: Massive garage doors open and close multiple times a day when trucks stop to deliver unsterilized products and pick up equipment after it’s been treated. As a result, maintaining an air barrier such that the ethylene oxide inside the facility doesn’t escape is a challenge with no obvious solution, engineering experts told Grist. Additionally, without requirements to continuously monitor the air quality around a facility, the EPA and local regulatory agencies have no way of knowing if a PTE is working as intended.

“What is required is that they meet the criteria, but it’s ambiguous and left to the client how they prove compliance,” said Lukey. “The onus for compliance is on the company.”

trucks line up oustide an industrial building marked STI
The exterior of Steri-Tech, a warehouse where instruments sterilized with toxic ethylene oxide are stored, in Salinas, Puerto Rico Esteban G. Morales Neris / Centro de Periodismo Investigativo / Grist

In order to ensure facilities are complying with the requirements year-round, companies need to do weekly inspections, Lukey said. Doors and windows need to be checked regularly to ensure they remain closed. The velocity of the air flowing through the room where sterilization occurs needs to be monitored. And companies need a maintenance log to ensure repairs occur on a regular basis. If these types of checks don’t occur routinely, the PTE could malfunction. Lukey recalled one instance in which a client in a different industry installed 15 PTEs in a facility. When Lukey visited the premises last year, he found that half of them were not working properly. 

“Companies have to have an interest in this as well,” he told Grist. “Just putting it there and leaving it doesn’t necessarily constitute continuous compliance.”

Continuous compliance is particularly important to ensure that polluted air doesn’t leak from the facility. The EPA’s criteria require that companies maintain a certain pressure differential between the inside and outside of the facility. Air must be continuously blown into the facility at a specific rate and only exit through exhaust fans that are hooked up to an incinerator that can burn the ethylene oxide. The rates at which air is fed and removed from the enclosure determines the pressure difference. The EPA requires that the difference be at least 0.00025 pounds per square inch — a tiny fraction of air pressure at sea level, which is 14.7 pounds per square inch. The difference is so small that it can be subverted by gusty winds or a cracked window.

In public comments submitted to the EPA, sterilization companies have stated bluntly that it is not possible to install PTEs that meet the agency’s criteria. Specifically, they have pointed to the fact that sterilization facilities have numerous openings to the outside and that it is not feasible to ensure air doesn’t escape through them year-round. 

“The use of a PTE has not been established as a proven control technology for existing sterilization operations and is not compatible and sustainable for routine application in this context,” one company wrote. “Although these PTE requirements may be compatible with some sterilization facilities, they were developed for paint booths or other single-room operations and are not transferrable to the entire commercial sterilization source category,” according to another. 

“There is no ‘one-size-fits-all’ approach for the medical technology industry,” a spokesperson for the medical technology industry group AdvaMed wrote in an email to Grist. “PTE would have low effectiveness in reduction of EtO [ethylene oxide] emissions where there are already areas of low EtO concentration. Even before the rule was finalized, sterilizers have undertaken extensive efforts to implement state-of-the-art upgrades allowing for continued safe use of EtO in order to meet and even exceed regulations.”

The EPA is requiring that facilities continuously monitor the difference in pressure inside and outside the facility, or the rate of airflow through the facility, in order to prove that the PTE is working as intended. When an agency inspector visits, they could review the company’s monitoring logs and verify whether the appropriate metrics were maintained throughout the year. 

That these measurements are reported as a three-hour rolling average instead of a continuous stream of data implies that fluctuations in the pressure or flow of air may be hard to catch. Hackel, the EPA spokesperson, defended this approach, saying that it would provide data “representative of the actual operation of the permanent total enclosure.” Sahu, the engineering expert, said that averaging data will not ensure complete capture of ethylene oxide emissions.

“The devil’s in the details, and the EPA doesn’t have the details,” he said.

This story was originally published by Grist with the headline Why the EPA is relying on unproven technology to stop cancer-causing emissions on Aug 22, 2024.


This content originally appeared on Grist and was authored by Naveena Sadasivam.

]]>
https://grist.org/accountability/epa-ethylene-oxide-permanent-total-enclosure-pte-solution/feed/ 0 489947
To Serve Man? https://www.radiofree.org/2024/08/16/to-serve-man/ https://www.radiofree.org/2024/08/16/to-serve-man/#respond Fri, 16 Aug 2024 16:06:23 +0000 https://dissidentvoice.org/?p=152834

Dr Denis Lévêque of the French UN delegation asked:

“What is the motive of the Kanamit?”

— Damon Knight, “To Serve Man,” in Galaxy Science Fiction (November 1950), p 92

The post To Serve Man? first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2024/08/16/to-serve-man/feed/ 0 489063
Life without a Smartphone https://www.radiofree.org/2024/08/07/life-without-a-smartphone/ https://www.radiofree.org/2024/08/07/life-without-a-smartphone/#respond Wed, 07 Aug 2024 15:39:54 +0000 https://dissidentvoice.org/?p=152556 What would one do nowadays without the smartphone?

The post Life without a Smartphone first appeared on Dissident Voice.]]>

The post Life without a Smartphone first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2024/08/07/life-without-a-smartphone/feed/ 0 487560
How a Washington Tax Break for Data Centers Snowballed Into One of the State’s Biggest Corporate Giveaways https://www.radiofree.org/2024/08/04/how-a-washington-tax-break-for-data-centers-snowballed-into-one-of-the-states-biggest-corporate-giveaways/ https://www.radiofree.org/2024/08/04/how-a-washington-tax-break-for-data-centers-snowballed-into-one-of-the-states-biggest-corporate-giveaways/#respond Sun, 04 Aug 2024 09:00:00 +0000 https://www.propublica.org/article/washington-data-centers-tech-jobs-tax-break by Lulu Ramadan and Sydney Brownstone, The Seattle Times, photography by Karen Ducey, The Seattle Times

This article was produced for ProPublica’s Local Reporting Network in partnership with The Seattle Times. Sign up for Dispatches to get stories like this one as soon as they are published.

In 2010, as the country still reeled from the worst economic crisis since the Great Depression, tech companies, real estate developers and rural lobbyists went to the state Capitol in Olympia, Washington, to press for a tax break for data centers.

Turning it down, supporters argued, would mean rejecting high-paying, long-term and environmentally friendly jobs in distressed parts of rural Washington. Owners of data centers — gargantuan facilities filled with computer servers that power the internet — were scouting Washington and other states for new homes.

“In the end,” then-state Sen. Rodney Tom, a Democrat from the Seattle suburbs who advocated for the tax break, told his Senate colleagues, “we get the clean jobs that all the states are competing with, as far as the jobs it takes to run these things long term.”

State lawmakers nearly unanimously passed the special exemption and have kept the benefits flowing to the industry ever since. But the tax break has strayed from its original promises, and the state failed to fully scrutinize whether the sacrifices were worth it, a deep examination of legislative archives, public tax disclosures and utility data by The Seattle Times and ProPublica revealed.

The data center industry’s demand for electricity is growing so much that it could threaten Washington’s efforts to transition to a carbon-free power grid, the news organizations recently reported.

The original premise for Washington’s data center tax incentive was to bring high-tech, green jobs to rural communities such as Quincy, in Grant County, where an alfalfa field is being prepared for planting. But the tax break can now apply to data centers in downtown Seattle as well as those in rural areas.

The tax break’s requirement for how many people a company must hire was quickly weakened.

And a modest program for a budding industry in struggling rural areas became one of the biggest corporate tax giveaways in Washington, available even to tech companies in downtown Seattle.

Today, state revenue officials aren’t allowed to say how many high-paying tech jobs Washington actually got. That’s because lawmakers kept the information walled off from the public under the state’s taxpayer confidentiality laws. Other states with generous tax relief for the industry have demanded more transparency and accountability.

The only state audit ever released publicly, seven years ago, found that based on the number of tax break recipients at the time, data centers could eventually meet the jobs requirement by collectively hiring as few as 260 workers. The average annual cost to the state at that time was projected to be $53.3 million between 2015 and 2019.

This tax exemption now eclipses the combined total of what the state gives all of its waning aerospace programs, including Boeing’s, taking away more than $117 million in 2023, according to information companies provided the state Department of Revenue. The cumulative total since 2018 is more than $474 million.

More than 65% of the savings since 2018 have gone to Washington-based Microsoft, a company with reported net earnings of $72.4 billion last year.

The company said in an emailed statement that the data center tax break from which it benefits “aligns with the intentions of lawmakers.”

“Data center investment in rural areas of the state creates jobs, stimulates growth of supporting industries, and contributes to property tax revenue,” the statement said.

Construction was underway this spring on a huge CyrusOne data center in Quincy.

Proponents of the tax break, including building trades unions, maintain that the data center industry generated new property tax revenues for rural counties and created enough work for thousands of electricians and builders to boost the entire region’s economy. Washington ranked 10th in the country for the number of data centers in each state as of July, according to data center research firm Baxtel.

But critics question whether the industry needed the tax break to land in Central Washington, given the industry’s thirst for the cheap electricity that the region offers. Others have asked whether data centers produced enough jobs to make the investment worthwhile. State committees charged with overseeing tax programs conducted just the one audit seven years ago, rendering many of those questions unanswerable.

Meanwhile, the industry is expected to grow with the adoption of artificial intelligence, creating more opportunities for the size of the state’s tax exemption to increase.

Former Sen. Phil Rockefeller, D-Bainbridge Island, one of the few lawmakers to vote against the original data center tax break, told The Times and ProPublica that it’s very difficult to end tax breaks in Washington state once they begin. The arguments from lobbyists are too hard for lawmakers to ignore.

“There’s always going to be a professional cadre of lobbyists who will come forward and say, ‘You’re going after us, you’re discriminating against us, or you’re going to damage your relationship with us and we may go somewhere else,’” Rockefeller said.

Washington’s Data Center Tax Break Has Grown Dramatically in Recent Years

Washington’s data center tax break was one of the largest corporate tax exemptions in the state in 2023. In 2022, lawmakers opened the tax break to data center companies in urban areas.

(Source: Annual tax performance report data published by the Washington Department of Revenue) Job Promises

Early on, Washington leaders listened to the argument from data center companies and their supporters that giant server warehouses could deliver high-tech, high-paying jobs — and that without a tax break, those jobs would never materialize.

It began with then-Gov. Christine Gregoire, who in 2008 proposed to give rural data centers a 50% rebate on Washington’s sales tax when purchasing replacement server equipment. Gregoire recently told The Seattle Times and ProPublica that she was concerned about unemployment in Central Washington.

Yahoo and Microsoft had halted construction on expansions to their Central Washington data centers after the state’s attorney general and revenue officials determined they didn’t qualify for the state’s rural manufacturing tax deferral program. Yahoo told Washington lawmakers that refusing to offer the company a tax break could cause the company to move its data centers to Oregon, which does not have a sales tax.

Microsoft, which owns this data center in Quincy, is the largest beneficiary of the data center tax break, according to preliminary 2023 data from the Washington Department of Revenue.

Microsoft lobbyist DeLee Shoemaker, who just five years earlier was a top aide to then-Washington Gov. Gary Locke, told the Seattle Post-Intelligencer that the state was “no longer competitive” for the data center industry.

Cindi Holmstrom, then the director of the state’s Department of Revenue and a Gregoire appointee, told lawmakers that the governor’s proposed tax relief for data centers would bring “high-level information technology services and research and development jobs throughout Washington state.”

(Two years later, Holmstrom became a lobbyist whose clients included Microsoft.) Holmstrom and Shoemaker did not respond to requests for comment.

While the Great Recession tanked state revenues, slowing the effort to reduce taxes on data center owners, Microsoft in 2009 made good on its implied threat to relocate. It announced it was moving its Azure servers out of state, citing “local tax laws.” The next year, lawmakers’ hesitation evaporated. They passed a rural data center tax break with only six voting against it.

Then-Sen. Linda Evans Parlette, R-Wenatchee, one of the bill’s sponsors, emailed lobbyist Rob Makin, who represented Sabey Corp., a Seattle-area real estate development company that evolved into building and leasing data centers. She asked him what to put in a celebratory press release.

Construction vehicles on a plot next to the new Quincy High School and football field on March 7

The first among many upsides, Makin responded, was an “immediate stimulus of jobs.”

“Every citizen in Central Washington will benefit from this legislation whether you are a techno geek or not,” he wrote. Makin did not respond to a request for comment. Parlette said in a recent interview that she didn’t think the tax break brought in as many jobs as people expected at the time.

The jobs argument came back routinely over the years as lobbyists returned to Olympia to seek expansions of the tax break. Lawmakers repeatedly acquiesced, even as the Washington Supreme Court held them in contempt — later fining them $100,000 a day — for failing to fund public schools.

House Finance Committee Chair April Berg, D-Mill Creek, who joined the Legislature in 2021 and later sponsored an expansion of the data center tax cut, said the message she heard about the data center industry was clear.

“It was definitely thought that if we did not have this particular exemption, we would not have this industry any longer in our state,” Berg said in an interview with The Times and ProPublica. “So we had to make a conscious decision to say yes to this industry, which included this tax break.”

But it’s unclear how essential the tax break was to landing data centers in Central Washington. In 2011 and 2012, several tech companies expanded or built new data centers in Oregon while Washington’s data center tax cut briefly lapsed.

A badge or permission from security is required to enter the gated parking lot at the Yahoo data center in Quincy.

On the other hand, Microsoft and Yahoo had plenty of reasons other than tax breaks to locate in Central Washington, including the region’s clean, low-cost hydropower. Tech companies have also built data centers in Silicon Valley despite California’s lack of tax incentives to do so.

Washington’s Top Five Data Center Tax Break Recipients

Microsoft led the way with more than $300 million in total taxes exempted from 2018 to 2023.

(Note: Vantage includes Vantage Data Centers WA13, Vantage Data Centers Management Co. and Vantage Data Centers WA MIDCO; Sabey includes Intergate.Quincy VI, Intergate.Columbia II, Intergate.Quincy and Intergate.Quincy II. Source: Annual tax performance report data published by the Washington Department of Revenue)

Greg LeRoy, the executive director of Good Jobs First, a left-leaning think tank that has watchdogged data center tax breaks, said tax breaks are “pocket lint” in the true calculus of siting data centers.

“If you've got cheap hydropower, you’re going to get a lot of data centers,” LeRoy said. “Nobody had to abate anything to get those deals.”

Broader Eligibility, Lower Expectations

After accepting the industry’s case that the tax break would create good jobs in 2010, the Legislature almost immediately began loosening the law’s requirements for job creation.

The original bill required each data center to create at least 35 permanent positions at 150% of the surrounding area’s average personal income.

A second bill, approved just a month after lawmakers passed the first tax break, gave recipients the choice between creating 35 jobs or just three positions per 20,000 square feet of server farm space, whichever was less. While some of the data centers in Grant County were around 500,000 square feet — larger than three typical Costco warehouses — data centers can be much smaller.

The new legislation allowed data centers to count security and maintenance contractors toward the employee total. Another new provision: Data center building owners and companies that rented space from them could each claim a tax break as long as the building as a whole met the hiring requirements, even if only one of them created new jobs. There were no public hearings before it was approved.

Lawmakers passed another expansion in 2012. Then, in 2015, lawmakers further broadened the tax break, again without public hearings, while rejecting a bill to increase data centers’ employment requirements.

As lawmakers dialed back their jobs expectations, they formally declared a different measure of success for the corporate tax cut. Now, the Legislature would continue the incentive as long as the data center industry added new revenue — any new revenue — to rural property tax rolls.

The property tax was “almost a meaningless standard” to apply to the tax break, said Matt Gardner, a senior fellow at the Institute on Taxation and Economic Policy, a think tank that has advocated for higher corporate tax rates. Job creation is a better measure, he said.

“Because virtually anything you create, it’s going to add value to the property tax base,” Gardner said. “You build an outhouse, that’s got some value.”

Priest Rapids Dam and powerhouse are run by the Grant County Public Utility District near Mattawa. “If you’ve got cheap hydropower, you’re going to get a lot of data centers,” said Greg LeRoy of Good Jobs First.

The tax break continued to drift from its original sales pitch. In 2022, lawmakers moved beyond their original claim that the tax cut was needed to provide rural jobs. They added new incentives for data centers in the Seattle metro area — which already had many data centers — and extended the existing tax break to 2048. New projects were required to pay employees only 125% of the area average income, lower than the previous 150%.

Despite the tax break’s limited job creation requirements, trade unions supported the 2022 bill because it included a major win for their members — requiring data center construction contractors to have labor agreements covering issues such as wages and working conditions.

“We were adamant moving forward, corporate tax breaks like that would be attached to something for the citizens of the state,” said Mark Riker, executive secretary of the Washington State Building and Construction Trades Council.

More than 500 electricians are employed by data centers in the central and northeastern parts of the state, and the industry in the same region supports 350 to 400 apprentices in training as of May, according to the International Brotherhood of Electrical Workers Local 191, which testified for extending the tax break.

John Traynor, legislative director at the Washington State Labor Council, said he spent months working as an electrician at Microsoft’s data center campus in Quincy.

“This is exactly the kind of thing we should be doing,” Traynor said of the tax break. “These jobs wouldn’t exist and there wouldn’t be those training opportunities. They’d be done somewhere else with worse environmental standards and worse labor standards.”

Many conservatives opposed the 2022 law because of the labor requirement. But with labor and business on board with the bill in the Democratic-controlled Legislature, all but one Democrat voted yes and it easily passed.

Reuven Carlyle, a former state senator who was critical of the tax break’s gradual expansion but voted for the 2022 legislation, said in an interview he chose to not “throw an elbow” to his fellow Democrats while he was pushing a climate-related transportation package. He said the data centers tax break in its current form would never have passed back in 2010.

“These lobbyists were very strategic, very methodical, very organized,” Carlyle said. “All of a sudden, bills got weaker and weaker in terms of accountability.”

Nonsensical Job Numbers

While lawmakers created and then loosened staffing requirements for data center tax break recipients, they did nothing to ensure the public could see how many jobs were created at individual facilities.

In fact, state law expressly barred Washington’s Department of Revenue from disclosing any information used to determine tax break eligibility — not only for the data centers, but for some other industries receiving tax cuts, too. As a result, the agency’s public disclosures on the number of data center jobs can seem nonsensical.

The department’s annual tax disclosure report for 2022, for example, attributed 108,320 jobs to the 22 companies that received the data center tax incentive.

The figure is striking because aside from construction and electrician jobs, data centers employ relatively few people on a permanent basis. Overseeing the servers doesn’t take much labor compared with other large industrial outfits, and the facilities are easy to distinguish from other hulking manufacturing buildings because of their small or mostly empty parking lots.

The explanation behind the Revenue Department’s seemingly enormous jobs number comes two pages later in its report: The agency counts the entire Washington workforces of companies getting tax breaks. In 2022, the Revenue Department counted in its data center job tally all 70,379 Washington employees of Microsoft. Every programmer, office assistant and executive in the company’s sprawling Redmond campus was included.

To get more precise statistics, The Seattle Times and ProPublica went to the company itself.

Microsoft told the news organizations that as of July, it employed 417 people in its Washington data centers. In 2023, Microsoft avoided paying nearly $68.4 million in taxes for those data centers, according to preliminary data from the Department of Revenue. Assuming Microsoft’s savings remained about the same, that would amount to about $164,000 per job from just one year of the tax break.

In some cases, data center companies reported zero statewide employees but received the tax break anyway, according to the limited information available on the Revenue Department’s website.

A subsidiary of T-Mobile has avoided paying $5.8 million under the tax break program since 2017 but showed zero employees statewide in the revenue department’s public disclosures, which are drawn from reports filed by companies.

Washington’s legislative auditor said in 2017 that it was “too early to tell” if tax break recipients would hit minimum hiring thresholds. The state has not conducted a full review since. Data centers are often notable for their small or mostly empty parking lots, such as at this facility in Quincy.

A T-Mobile spokesperson told The Seattle Times and ProPublica that the company was confident it was in compliance with state law. While the disclosures report employees of “one legal entity within our organization,” the company said, T-Mobile does have employees and contractors working in its Washington data center. The spokesperson did not specify how many.

The Revenue Department said it has reviewed hiring by 26 tax break recipients but declined to name them or say whether any fell short.

Some other states with data center tax incentives do release site-specific job information. Illinois, which gave away more than $653.5 million to data centers in 2023, reports annually on the number of jobs each data center has created. Nevada publishes the same information as Illinois every two years.

But Washington lawmakers twice — in 2009 and 2017 — rejected proposals to do something similar.

State Sen. Karen Keiser, a longtime member of the state Senate Ways and Means Committee, said she didn’t know that the Revenue Department does not share site-specific employment information.

“That’s ridiculous,” said Keiser, D-Des Moines.

After an interview with The Seattle Times and ProPublica, Keiser emailed the Revenue Department to ask for site-specific job numbers and was denied.

The tax break law does specify a select group of elected leaders who can view the detailed numbers, under strict confidentiality: the governor (or a member of the governor’s office), and the chairpersons of the House Finance Committee and Senate Ways and Means Committee.

The governor’s office did not have a record of reaching out to revenue officials about this. Among the committee chairs who have served since 2017, three said they hadn’t checked with the Revenue Department for the jobs information, two didn’t respond to questions and one did not remember.

Postponed Auditing

Even the state watchdogs responsible for auditing tax breaks have not kept close tabs on the rapidly growing tax cut.

Lawmakers have ordered five-year reviews of another major tax break recipient: the aerospace industry. But with data centers, the Legislature opted to leave scheduling up to its Joint Legislative Audit and Review Committee and the Citizen Commission for Performance Measurement of Tax Preferences.

Those committees published their first and only attempt at analyzing the data centers tax break in 2017.

They found that the data centers, with their enormous square footage, increased the property tax revenue in Grant and Douglas counties by $17.7 million, even as the counties lost $12.1 million in exempted local sales taxes. Whether or not taxpayers came out ahead depended on how badly the tax exemption was needed for companies to locate in these counties, the auditors said.

A worker on Steven Bierlink’s farm sprays mineral oil on an apple orchard in Quincy. Data centers, which can be seen on the distant horizon, have acquired land closer and closer to the farm.

Since then, data centers have grown to account for more than 25% of the tax base in Grant County. The assessed value has helped the farming community of Quincy, at the heart of the state’s data center boom, to build a new $80 million high school, city hall, library and police station. It is in the midst of a $55 million project for a new hospital.

But when it came to data center jobs, the main justification for the original tax break, the legislative auditor, who oversees the research of the legislative audit committee’s staff, said in 2017 it was “too early to tell” whether recipients would hit the minimum job number required of them — which was an overall total of 260 positions at the time. Data center companies had a six-year deadline to fulfill hiring requirements, and the earliest tax break recipients would just be hitting the deadline at the time of the study.

As of the date of the audit, its authors estimated the state was spending about $205,000 per job through forgone tax revenue.

The state has not conducted a full review in the seven years since then. In 2022, the Washington Technology Industry Association, a tech lobbying group, estimated that data centers had created 760 full-time jobs statewide over the previous four years. But Grant County remained on the state’s “distressed areas” list in 2023, with an unemployment rate of 5.9%, compared with 4.5% statewide.

The 2017 review came with a warning: The Legislature, the citizens commission wrote, “should periodically evaluate” whether data center benefits “really exceed the cost of the tax incentives” over the long term.

Grant Forsyth, the chief economist for private utility Avista and chair of the citizen commission that wrote the admonition, said the audit in 2017 had found the industry in general sustains few full-time, permanent jobs after they’re built.

“It was this notion that if we were going to continue this tax break, we would have to be with the understanding that it wasn’t necessarily going to be a big job creator,” Forsyth said in an interview.

Despite the 2017 warning, the legislative audit committee’s staff and the citizen commission canceled a review last year of the rural data centers tax break and recently said an audit might not take place until 2034. The urban program will be evaluated in 2026.

Asked about the decision to postpone the review, Washington state Legislative Auditor Eric Thomas said the Legislature’s expansion of the tax break in 2022 meant new data needed to be collected. He said his team’s size limits what it can take on each year.

“We don’t have the capacity to review every [tax] preference,” Thomas said. “I mean, just, we don’t.”

Virginia, the largest data center market in the U.S., has taken a different approach. The state resolved last year to conduct an in-depth, cost-benefit analysis of its data center industry and tax break. The decision followed a 2019 audit that, despite concluding it was reasonable for the state to continue the tax break, found only “moderate” economic benefit.

Washington state Sen. Bob Hasegawa, D-Tukwila, a longtime skeptic of the state’s corporate tax breaks, said without a specific disclosure required by state law, such tax preferences lie under a “veil of secrecy.”

Hasegawa, who proposed limiting the original version of the tax cut but voted in favor of its latest expansion, has tried to add transparency and clawback measures for various state tax breaks, with little success. The state passed so many new tax incentives — about 176 since 2013 — that it’s difficult to make sure they all have adequate oversight standards, he said.

“If we’re going to allow these companies or corporations to take advantage of these tax incentives, you’re supposed to incentivize something,” Hasegawa said. “We need to know it actually accomplished its goal and created jobs and elevated folks’ standard of living in our area.”

Eli Sanders contributed research while a student with the Technology Law and Public Policy Clinic at the University of Washington School of Law, and Miyoko Wolf of The Seattle Times contributed research.


This content originally appeared on ProPublica and was authored by .

]]>
https://www.radiofree.org/2024/08/04/how-a-washington-tax-break-for-data-centers-snowballed-into-one-of-the-states-biggest-corporate-giveaways/feed/ 0 487137
Big Tech’s Trump Censorship Exposed https://www.radiofree.org/2024/08/04/big-techs-trump-censorship-exposed/ https://www.radiofree.org/2024/08/04/big-techs-trump-censorship-exposed/#respond Sun, 04 Aug 2024 03:41:19 +0000 https://dissidentvoice.org/?p=152452 You might be shocked to learn that Big Tech is already censoring information about America’s presidential race… I know it’s SHOCKING!

The post Big Tech’s Trump Censorship Exposed first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Redacted.

]]>
https://www.radiofree.org/2024/08/04/big-techs-trump-censorship-exposed/feed/ 0 487109
Lawsuit promises justice for Rio Tinto’s mining disaster in Bougainville – but some say it’s a cash grab https://www.radiofree.org/2024/08/01/lawsuit-promises-justice-for-rio-tintos-mining-disaster-in-bougainville-but-some-say-its-a-cash-grab/ https://www.radiofree.org/2024/08/01/lawsuit-promises-justice-for-rio-tintos-mining-disaster-in-bougainville-but-some-say-its-a-cash-grab/#respond Thu, 01 Aug 2024 23:45:12 +0000 https://asiapacificreport.nz/?p=104425 INVESTIGATIVE REPORT: By Aubrey Belford of the OCCRP

High in the forested mountains of Papua New Guinea’s Bougainville Island lies an abandoned, kilometer-wide crater cut deep into the earth.

Formerly one of the world’s largest gold and copper mines, the open pit now serves as an unsightly monument to the environmental and social chaos that underground riches can create.

Run for years by a subsidiary of Anglo-Australian giant Rio Tinto, the Panguna mine earned millions for Papua New Guinea (PNG) and helped bankroll its newfound independence. But it also poured waste into local waterways and fuelled anger among locals who felt robbed of the profits.

When an armed uprising ultimately shuttered the mine in 1989, the impoverished island was left reeling.

Nearly three decades later, in late 2022, human rights activists, the local government, and the mine’s former operators joined forces to produce a definitive assessment of the mine’s toxic legacy.

Their report, due to be released later this month, will become the basis for negotiations aimed at getting the mining companies to finally clean up the mess and compensate affected communities.

But its supporters now worry their efforts will be undermined by a class-action lawsuit launched in May against the mine’s erstwhile operators. The legal effort is being championed by former rebel leaders — and backed by anonymous offshore investors who stand to make hundreds of millions of dollars if it succeeds.

Worldwide litigation boom
The lawsuit is part of a worldwide boom in litigation financing that seeks to take multinational companies to task for ecological or social damage while potentially reaping a fortune for lawyers and funders.

Critics in Bougainville worry the lawsuit will reopen old wounds at a time when the island is making a push to break free of Papua New Guinea and become the world’s newest sovereign nation. Many Bougainvilleans are hoping to reopen the mine, using its wealth to fund their own independence this time around.

The region’s government and many local leaders believe the class action could put the mine’s revival at risk. There are also concerns the lawsuit would leave many Bougainvilleans empty handed, while the anonymous foreign investors would walk away with a significant share of the payout.

Unlike the official assessment, which seeks to identify everyone who needs to be compensated, the class action will only share its winnings — which could potentially be in the billions of dollars — with the locals who have signed on. Others will get nothing.

“There’s already fragmentation in the community and families are already divided,” said Theonila Roka Matbob, who represents the area around Panguna in the local Parliament and has helped lead the government-backed assessment process as a minister in the Autonomous Bougainville government.

She speaks from personal experience. The chief litigant in the class-action lawsuit, Martin Miriori, is her uncle. The two are no longer on speaking terms.

A losing deal
Gouged from Bougainville’s lush volcanic heart, the Panguna mine in its heyday supplied as much as 45 percent of PNG’s export revenue, providing it with the financial means to achieve independence from Australia in 1975.

The windfall, however, did not extend to Bougainvilleans themselves. Ethnically and culturally distinct from the rest of PNG’s population, they saw Panguna as a symbol of external domination.

The mine delivered only a miserly 2-percent share of its profits to their island — along with years of environmental havoc.

Locals walk by buildings left abandoned by a subsidiary of Rio Tinto at the Panguna mine site.
Locals walk by buildings left abandoned by a subsidiary of Rio Tinto at the Panguna mine site. Image: OCCRP/Aubrey Belford

During the 17 years of Panguna’s operation — from 1972 to 1989 — over a billion metric tons of toxic mine waste and electric blue copper runoff flooded rivers that flowed downstream towards communities of subsistence farmers. The result was poisoned drinking water, infertile land, and children who were drowned or injured trying to cross engorged waterways.

In 1989, enraged Bougainville locals launched an armed rebellion against the PNG government. The mine was shut down, closing off a vital source of revenue for the national government in Port Moresby.

A brutal civil war raged on for nearly a decade, leaving more than 15,000 people dead, while a naval blockade by PNG’s military obliterated the island’s economy.

A peace deal in 2000 granted Bougainville substantial autonomy. But nearly a quarter-century later, the legacy of Panguna and the war it provoked is still deeply felt.

Few paved roads, bridges
There are few paved roads and bridges in the island’s interior. Residents earn a modest living through cocoa and coconut farming, or by unregulated artisanal mining in and around the abandoned Panguna crater.

Rivers polluted by years of runoff are still an otherworldly shade of milky blue.

At least 300,000 people are estimated to live on Bougainville, including as many as 15,000 who live downstream of the mine. Of those, some 4500 have joined Miriori — Roka’s estranged uncle and a tribal leader whose brother, Joseph Kabui, served as the first president of autonomous Bougainville — in seeking restitution through the class-action suit.

“We’ve got to make people happy,” Miriori said. “They’ve lost their land forever, environment forever. Their hunting grounds. Their spiritual, sacred grounds.”

Martin Miriori, the primary litigant in the class action lawsuit.
Martin Miriori, the primary litigant in the class action lawsuit. Image: OCCRP/Aubrey Belford

‘Alert to opportunities’
Miriori took many by surprise when he became the public face of the suit filed in PNG’s National Court in May against Rio Tinto and its former local subsidiary, Bougainville Copper Limited.

While the tribal leader and former rebel is a well-known figure in Bougainville, the funders of the lawsuit are not. They have managed to keep their identities secret in part because the company behind the suit, Panguna Mine Action LLC, is registered on Nevis, a small Caribbean island that does not require companies to publicly disclose their shareholders and directors.

Miriori declined to comment on who was behind the company, saying, “I will not tell you where the funding is based … you can source that from our people down there [in Australia].”

James Sing, an Australian based in New York, is Panguna Mine Action’s chief public representative. He initially agreed to an interview, but later referred reporters back to a London-based public relations agency, Sans Frontières Associates.

The agency declined to reveal Panguna Mine Action’s investors.

Litigation funding documents obtained by OCCRP, however, shed some light on the history of the case. The documents show that Panguna Mine Action began to investigate the possibility of a class-action suit as early as July 2021.

The Bougainvillean claimants, led by Miriori, were formally brought into an agreement with the company and its Australian and PNG lawyers in November 2022. The suit was publicly announced this May.

Handsome profit
The lawsuit’s investors stand to profit handsomely from any eventual settlement: Panguna Mine Action is poised to receive a cut of 20 to 40 percent of any payout resulting from the suit, with the percentage increasing the longer the process takes, the funding documents show.

In interviews and statements, both Miriori and Panguna Mine Action have put the potential value of any award in the billions of dollars.

The lawsuit’s financiers defend their substantial share of the potential benefits as standard practice.

“The costs of launching and running the class action against a global miner are significant, and almost certainly could not be met from within Bougainville without funding from an external party,” the company said in its statement.

Panguna Mine Action added it would bear sole responsibility for costs if the lawsuit is unsuccessful.

According to Michael Russell, a Sydney-based class action defence lawyer, such funding arrangements are typical in the burgeoning world of litigation finance, where investors seek out cases that promote virtuous social causes while offering huge potential payoffs.

A similar case is unfolding in Latin America, where more than 720,000 Brazilians are seeking $46.5 billion as part of a gargantuan class action against mining giant BHP and its local subsidiary for their role in a 2015 dam collapse.

In such cases, funders can justify walking away with significant cuts of any winnings because of the substantial risk they face of losing their investment if a case fails, Russell said.

Such cases were rarely initiated at the grassroots level by the victims themselves, he added.

“Most of the time, either the plaintiff firms or the funders will be the catalyst for a claim,” he said. “They are very alert to opportunities.”

Rival restitution plans
Government officials including Miriori’s niece, Roka, say the class-action case, which is due to hold opening arguments in October, threatens to derail the ongoing impact assessment aimed at calculating the full cost of the mine’s environmental impact and developing recommendations for addressing the damage.

The assessment, which counts community members among its stakeholders and bills itself as an independent review, is supported by Australia’s Human Rights Law Centre, which has hailed the project as “an important step” towards rectifying the mine’s devastating impact on thousands of Bougainvilleans.

However, while Rio Tinto and Bougainville Copper are both funding the project, they have not yet committed to paying for any compensation or cleanup. Roka said she was concerned the lawsuit could reduce the company’s willingness to engage with the process, since it could view the assessment as a tool that could be used against them in the courtroom.

Bougainville President Ishmael Toroama backs the impact assessment and has lambasted the class action suit as the work of “faceless investors . . .  taking advantage of vulnerable groups.” (His office did not respond to an interview request.)

He also expressed concern that the court proceedings threaten to “disrupt” his government’s efforts to reopen the mine, which still holds an estimated $60 billion in untapped deposits.

Bougainville’s leaders see the mine as key to securing the island’s economic future as it sets out to form an independent state — a dream that drew overwhelming public support in a 2019 referendum.

Exploration licence
Earlier this year Toroama’s government granted Bougainville Copper a five-year exploration licence for the Panguna site.

The lack of media and polling in Bougainville make it hard to measure public opinion on plans to reactivate the mine, but many locals appear to support reopening it under local control as an essential tool for achieving independence.

Bougainville Copper’s brand is still toxically associated with Rio Tinto and its past abuses, despite the fact that the international mining giant gave away its majority stake for no money in 2016.

The publicly traded company is now majority co-owned by the governments of PNG and Bougainville, and Port Moresby has pledged to hand over all its shares to the autonomous region in the near future.

Panguna Mine Action acknowledges that its effort could stand in the way of the mine’s reopening — but the company says that is a good thing.

“It is our understanding that the people of Bougainville do not wish mining to be recommenced under any circumstances or, alternatively, unless Rio Tinto and Bougainville Copper acknowledge the past, pay compensation and remediate the rivers and surrounding valley,” the company said in a statement.

Rio Tinto declined to comment. Mel Togolo, the chairman of Bougainville Copper, told OCCRP that the lawsuit was the work of “a foreign funder who no doubt is seeking a return on an investment.”

View of the tailings located downstream of the Panguna mine.
View of the tailings located downstream of the Panguna mine. Image: OCCRP/Aubrey Belford

View of the tailings located downstream of the Panguna mine. Photo: OCCRP / Aubrey Belford

‘Only those who have signed will benefit’
The fight over Panguna adds even more uncertainty to long-running anxiety over Bougainville’s future.

With global copper prices soaring on high demand for renewable energy and electric vehicles, the Panguna mine would be an attractive prize for both Western mining companies and firms from China, which is dramatically expanding its influence in the South Pacific.

Since a future Bougainvillean state would be economically dependent on the mine’s revenue, some have raised concerns that control of the mine could become a proxy battle for geopolitical influence in the broader region.

For his part, Miriori expressed little concern that a multibillion-dollar payout might stir resentment by reaching only a fraction of the people affected by the mine’s environmental destruction.

“Only those who signed will benefit,” he said, adding that the opportunity was made “very clear to people” through awareness campaigns.

“Those who have not signed, it’s their freedom of choice.”

An aerial view of the abandoned Panguna mine pit.
An aerial view of the abandoned Panguna mine pit. Image: OCCRP/Aubrey Belford

Among those who did not sign is Wendy Bowara, 48, who lives in Dapera, a bleak settlement built on a hill of mine waste. Bowara said she is looking to the government-backed assessment, not the lawsuit, to deliver compensation and clean up Panguna’s toxic legacy.

“We are living on top of chemicals,” she said. “Copper concentration is high. I don’t know if the food is good to eat or if it’s healthy to drink the water.”

But while it may seem odd given her grim surroundings, Borawa says she strongly supports reopening the mine.

“It funded the independence of Papua New Guinea,” Bowara said. “Why can’t we use it to fund our own independence?”

Allan Gioni contributed reporting.

Aubrey Belford is the Pacific editor for the Organised Crime and Corruption Reporting project (OCCRP). Republished with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/08/01/lawsuit-promises-justice-for-rio-tintos-mining-disaster-in-bougainville-but-some-say-its-a-cash-grab/feed/ 0 486824
NZME cops criticism after using AI to write rugby editorial https://www.radiofree.org/2024/08/01/nzme-cops-criticism-after-using-ai-to-write-rugby-editorial/ https://www.radiofree.org/2024/08/01/nzme-cops-criticism-after-using-ai-to-write-rugby-editorial/#respond Thu, 01 Aug 2024 08:56:25 +0000 https://asiapacificreport.nz/?p=104413 RNZ News

Media publisher NZME has come under fire for admitting it used artificial intelligence to create editorials that ran in the Weekend Herald and other publications, with a media commentator saying it “can only damage trust”.

RNZ’s Mediawatch revealed late yesterday that NZME had used AI to write an editorial about “Who the All Blacks should pick to play at centre” that ran first in the Weekend Herald on July 20 and another piece about MMA professional Israel Adesanya.

A statement from NZME editor-in-chief Murray Kirkness said AI was used in a way that fell short of its standards and “more journalistic rigour would have been beneficial”.

NZME’s standards don’t mandate disclosure but do say stories should be attributed to “the author and/or the creator/provider of the material” in accordance with the company’s Code of Ethics.

A co-author of the annual AUT Trust in News report, Dr Greg Treadwell, told Midday Report it was a poor experiment in AI use.

“I think New Zealanders have to be realistic about the fact AI is going to work its way into the production of news, but I think the Herald has kind of admitted this was a pretty poor experiment in it for a number of reasons, I think.”

Treadwell said the role of the editorial in any major news publication was to be an opinion leader.

‘Not world-shattering’
“I don’t know how many of your readers have actually gone back to have a look at the editorial that the Herald published, but it was sort of a generalist round-up of the arguments for and against Reiko Ioane at centre in the All Blacks back line — not a world-shattering issue, but a really good example of how AI doesn’t really, can’t really do what an editorial should do, which is to take a position on something.

“If you ask it to take a position, it will, and if you ask it to take another position, it will take that position.

“What is lacking here, even if you ask [AI] to take positions, is the original argument we would look to our senior journalists to put into the public domain for us about important issues.”

The editorial in the Weekend Herald on 20 July 2024.
The editorial in the Weekend Herald on 20 July 2024. Image: Weekend Herald/NZME/RNZ

Public trust in the media was falling and media companies needed to reassure the public it could be trusted, he said.

“When the public hears that AI is being used in places — and perhaps most importantly here is that it wasn’t acknowledged that was being used to create this editorial — then that can only damage trust.

“I think there’s a lot of issues here including that AI can be incredibly useful for data analysis and other things in journalism, but we just have to be incredibly transparent about how we’re using it.”

‘Another world first’
Former Herald editor-in-chief and prominent media commentator Tim Murphy joked on social media the editorial may “have achieved another world first for NZ”.

The revelation was also panned by some competitor publications, with the National Business Review’s official X account noting that “NBR journalists are intelligent. Not artificial.”


RNZ also approached New Zealand Rugby to ask their thoughts on NZME using AI to analyse the All Black team selection.

In a statement, NZR said it recognised the need for media organisations to have well-established editorial policies and standards.

“These ensure high quality sports journalism and play an important role in telling rugby’s stories.

“NZR is satisfied that the New Zealand Herald has made the appropriate steps to amend the story in question.”

The Herald and other NZME publications use AI to improve our journalism. In some cases, we also create stories entirely using AI tools,” says an explanatory article headlined NZME, NZ Herald and our use of AI.

“We believe that smart use of AI allows us to publish better journalism. We remain committed to our Code of Ethics and to the integrity of our journalism, regardless of whether or not we use AI tools to help with the production or processing of articles.”

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/08/01/nzme-cops-criticism-after-using-ai-to-write-rugby-editorial/feed/ 0 486740
Tuvalu joins growing Pacific tide of opposition to deep sea mining https://www.radiofree.org/2024/07/31/tuvalu-joins-growing-pacific-tide-of-opposition-to-deep-sea-mining/ https://www.radiofree.org/2024/07/31/tuvalu-joins-growing-pacific-tide-of-opposition-to-deep-sea-mining/#respond Wed, 31 Jul 2024 23:08:42 +0000 https://asiapacificreport.nz/?p=104377 Asia Pacific Report

Tuvalu has added its voice to the growing tide in the Pacific against deep sea mining, highlighting the momentum against this destructive industry, says Greenpeace.

The Tuvalu government’s call for a precautionary pause on deep sea mining took place at the 29th session of the International Seabed Authority (ISA) in Kingston, Jamaica.

Greenpeace head of Pacific Shiva Gounden congratulated the government of Tuvalu over its “commitment to protecting our oceans”.

“Tuvalu joins a growing chorus of Pacific nations calling for a ban on deep sea mining to safeguard our Moana, which gives and sustains life for millions of people across the Pacific and around the world,” he said in a statement.

“This announcement is courageous and historic, as the proud island nation of Tuvalu again shows global leadership on ocean protection just like they have on climate protection, something we Pacific people see as deeply interconnected.

“The momentum growing against the destructive deep sea mining industry is undeniable.

“For too long, profit-hungry corporations have plundered and exploited the ocean and high seas at the expense of the communities who depend on them, and whose lives and cultures are intrinsically linked with our oceans.”

Pacific says ‘no more’
Gounden said the message was loud and clear — “Pacific Island nations say, no more”.

Tuvalu’s announcement follows statements from the Pacific nations of Vanuatu and Palau at the ISA, with both governments supporting a pause on deep sea mining to protect the oceans for generations to come.

A total of 31 countries, including the UK and Germany, have committed to a moratorium.

Greenpeace Aotearoa spokesperson Juressa Lee (Te Rarawa, Ngāpuhi, Rarotonga) welcomed the decisions by Tuvalu, Vanuatu and Palau.

“Pacific peoples are standing up and saying no to deep sea mining. Deep sea mining will do nothing to benefit the people of the Moana but will instead exacerbate the climate and biodiversity crises,” she said.

“Extractivism is just continued colonisation of our heritage lands and waters, livelihoods and ways we see the world, and deep sea mining is no different.

“The intrinsic links to the Moana that Pacific Peoples speak about is valuable matauranga.

“There is so much in Pacific knowledge and culture that can teach us how to live connected to the ocean while also taking care of it.

“After hundreds of years of extraction causing climate disaster and biodiversity loss, governments are now resisting and turning toward Indigenous leadership and today we’ve seen some in the Pacific leading the way.”


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/07/31/tuvalu-joins-growing-pacific-tide-of-opposition-to-deep-sea-mining/feed/ 0 486630
Vanuatu fights for marine protection at key UN deep-sea mining summit https://www.radiofree.org/2024/07/30/vanuatu-fights-for-marine-protection-at-key-un-deep-sea-mining-summit/ https://www.radiofree.org/2024/07/30/vanuatu-fights-for-marine-protection-at-key-un-deep-sea-mining-summit/#respond Tue, 30 Jul 2024 11:05:03 +0000 https://asiapacificreport.nz/?p=104317 By Stephen Wright in Kingston, Jamaica

Vanuatu has taken a leading role in a bloc of nations fighting to keep marine environment protection on the main agenda of the UN organisation responsible for developing global regulations for seabed mining.

The assembly of the Kingston-based International Seabed Authority is meeting this week with a packed programme, including a vote to pick the next secretary-general who could significantly influence the environmental constraints set on mining.

Deep-sea mineral extraction has been particularly contentious in the Pacific, where some economically lagging island nations see it as a possible financial windfall and solution to their fiscal challenges but many other island states are strongly opposed.

Vanuatu Minister of Climate Change Ralph Regenvanu, at the ISA meeting of the 168 member nations plus the European Union, said an environmental policy was “critical” because it’s likely the body will receive an application to approve commercial seabed mining by the end of this year.

“When you make deliberations in the coming days, please think beyond your national boundaries and think as custodians of our ocean and of the real threat mining the seabed poses for the Pacific region,” Regenvanu said in remarks he explicitly directed at the Pacific island nations which favour deepsea mining.

“Financial exploitation of our ocean may be beneficial for the next decade for our nations, but it could be devastating for the future generations,” he said.

Mining of the golf ball-sized metallic nodules that litter swathes of the sea bed is touted as a source of the rare-earth minerals needed for green technologies, like electric vehicles, as the world reduces reliance on fossil fuels.

Irreparable damage
Sceptics say such minerals are already abundant on land and warn that mining the sea bed could cause irreparable damage to an environment that is still poorly understood by science.

Deep-sea mining opponents have been pushing for the ISA to prioritize protection of the marine environment at the full assembly rather than keep discussion of the issue within its smaller policy-setting council.

AP23343290427873.jpg
Vanuatu Climate Change Minister Ralph Regenvanu speaks during a plenary session at the COP28 UN Climate Summit in the United Arab Emirates in December 2023. Image: Kamran Jebreili/BenarNews

Some see such a policy as the prerequisite for an international moratorium on deep-sea mining in the vast ocean areas outside national boundaries that fall under the ISA’s jurisdiction.

Along with Vanuatu, several nations including Spain, Chile and Canada expressed backing for the assembly to begin discussion of an environmental policy.

China, a powerful voice at the ISA, reiterated its reservations because of the packed agenda, but said it was willing to be flexible. Saudi Arabia was among the nations that criticised the proposal sponsored by Vanuatu and seven other nations but did not formally object.

The assembly is also expected to vote on candidates for the ISA’s secretary-general. The long serving incumbent Michael Lodge has been criticized by organizations such as Greenpeace, who say he has taken the part of deep-sea mining companies rather than being a neutral technocrat.

The British lawyer’s candidacy is sponsored by the pro-mining Pacific nation of Kiribati against Brazil’s Leticia Carvalho, an oceanographer and former oil industry regulator of the South American nation, who has also been critical of his leadership.

Vanuatu also made its mark at the assembly by blocking two organisations linked to deep-sea mining companies from gaining NGO observer status at the ISA.

Regenvanu told the assembly that one of the organisations was made up of subsidiaries of The Metals Company, which has been testing its equipment for hoovering up the metallic nodules from the ocean floor.

The Metals Company is working with the Pacific island nations of Nauru, Kiribati and Tonga to possibly exploit their licence areas in the Clarion-Clipperton Zone. The 4.5 million square kilometer area in the central Pacific is regulated by the ISA and contains trillions of polymetallic nodules at depths of up to 5.5 km.

Nauru in June 2021 notified the seabed authority of its intention to begin mining, which started the clock on a two-year period for the authority’s member nations to finalise regulations.

International Seabed Authority Secretary-General Michael
International Seabed Authority Secretary-General Michael Lodge (right) at the ISA’s 29th assembly in Kingston, Jamaica this week. Image: Stephen Wright/BenarNews

The Cook Islands, meanwhile, is allowing nodule exploration by other companies in its own waters and does not need ISA approval to mine in them.

Sonny Williams, Assistant Minister to the Cook Islands Prime Minister, told the assembly that his country is proceeding with caution to ensure both conservation and sustainable use of marine resources.

“Deep seabed minerals hold immense potential for our prosperity,” he said. “To unlock and develop this potential we must do so responsibly and sustainably, prioritising the long-term wellbeing of our people.”

Greenpeace deep-sea mining campaigner Louisa Casson said the ISA assembly would not complete the complicated process of agreeing on deep-sea mining rules at its current meeting.

Non-governmental organisations and governments that want to take a cautious approach to deep sea mining are hoping the assembly meeting will make incremental progress toward achieving a moratorium on mining, she told BenarNews.

Copyright ©2015-2024, BenarNews. Republished with permission of BenarNews.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/07/30/vanuatu-fights-for-marine-protection-at-key-un-deep-sea-mining-summit/feed/ 0 486361
Not up for debate: Fijian journalists in the climate crisis response https://www.radiofree.org/2024/07/24/not-up-for-debate-fijian-journalists-in-the-climate-crisis-response/ https://www.radiofree.org/2024/07/24/not-up-for-debate-fijian-journalists-in-the-climate-crisis-response/#respond Wed, 24 Jul 2024 06:38:12 +0000 https://asiapacificreport.nz/?p=103991 By Brooke Tindall, Queensland University of Technology

With more than 50 Fijian villages earmarked for potential relocation in the next five to 10 years due to the climate crisis, Fijian journalists are committing themselves to amplifying the voices of those who face the challenges of climate change in their everyday lives.

Vunidogoloa village on the island of Vanua Levu was home to 32 families who lived in 26 homes. As early as 2006, floods and erosion caused by both sea-level rise and increased rains started to reach homes and destroy crops that fed the community.

The situation worsened in the following years, with water progressively taking over the village. The mangroves that used to cover the coast where they lived were absorbed by the sea completely.

The Fijian government began the mission to relocate Vunidogoloa in 2014. Not only did people in the community walk away from their homes, they left the place where their traditions and stories were passed down. Since Vunidogoloa was relocated, five other Fijian villages have faced the same fate.

Several projects have been established in response to such pressing threats, with an aim to increase the amount of climate journalism in Fijian media.

University of the South Pacific journalism coordinator Associate Professor Shailendra Singh has previously expressed concern about the lack of specialisation in climate reporting in the Pacific and says the articles produced can often come from “privileged elite viewpoints”.

Dr Singh continues to harbour such concerns in 2024. He notes that Pacific news media organisations have small profit margins, so rather than face the expense of sending out teams to talk to everyday people, their stories tend to focus on presentations and speeches that are cheaper to cover.

“This refers to the plethora of meetings, conferences, and workshops where the experts do all the talking and presenting,” he says.

“Ordinary people in the face of climate change are suffering impacts and do not get as much coverage.”

Training journalists to specialise in climate reporting will give them an in-depth understanding of both talking to experts and ordinary people experiencing the effects of climate change, Dr Singh says.


Blessen Tom’s climate change ‘ghost’ village report on Vunidogoloa for Bearing Witness in 2016. Video: Pacific Media Centre

“It brings focus, consistency and knowledge if done on a regular basis. Science has its place, but let’s not forget that people dealing and living with the effects of climate change are experts in their own right.”

Up-and-coming journalists, USP students Brittany Nawaqatabu and Viliame Tawanakoro say they see it as a good journalists’ responsibility to prioritise climate stories.

“Journalism provides people with the opportunity to be the vessel of message to the world. We are the captain of the ship that delivers the message,” Viliame says.

Brittany criticises Western media that considers climate change as a “debatable” topic.

“You have to put yourself in the shoes of a Pacific Islander to know what it’s really like. You can’t be debating it because you’re not the one going through it,” she says.

It’s important for Fijian media to continue to put the climate crisis on the front page and not let the stories become lost in other news, she says.

“If we are not going to become strong advocates as Pacific islanders for climate change and what our island homes are going through, then it’s only going to go downhill.”

Brooke Tindall is a student journalist from the Queensland University of Technology who travelled to Fiji with the support of the Australian Government’s New Colombo Plan Mobility Programme. This is published as the first of a series under our Asia Pacific Journalism partnership with QUT Journalism.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/07/24/not-up-for-debate-fijian-journalists-in-the-climate-crisis-response/feed/ 0 485413
Not up for debate: Fijian journalists in the climate crisis response https://www.radiofree.org/2024/07/24/not-up-for-debate-fijian-journalists-in-the-climate-crisis-response-2/ https://www.radiofree.org/2024/07/24/not-up-for-debate-fijian-journalists-in-the-climate-crisis-response-2/#respond Wed, 24 Jul 2024 06:38:12 +0000 https://asiapacificreport.nz/?p=103991 By Brooke Tindall, Queensland University of Technology

With more than 50 Fijian villages earmarked for potential relocation in the next five to 10 years due to the climate crisis, Fijian journalists are committing themselves to amplifying the voices of those who face the challenges of climate change in their everyday lives.

Vunidogoloa village on the island of Vanua Levu was home to 32 families who lived in 26 homes. As early as 2006, floods and erosion caused by both sea-level rise and increased rains started to reach homes and destroy crops that fed the community.

The situation worsened in the following years, with water progressively taking over the village. The mangroves that used to cover the coast where they lived were absorbed by the sea completely.

The Fijian government began the mission to relocate Vunidogoloa in 2014. Not only did people in the community walk away from their homes, they left the place where their traditions and stories were passed down. Since Vunidogoloa was relocated, five other Fijian villages have faced the same fate.

Several projects have been established in response to such pressing threats, with an aim to increase the amount of climate journalism in Fijian media.

University of the South Pacific journalism coordinator Associate Professor Shailendra Singh has previously expressed concern about the lack of specialisation in climate reporting in the Pacific and says the articles produced can often come from “privileged elite viewpoints”.

Dr Singh continues to harbour such concerns in 2024. He notes that Pacific news media organisations have small profit margins, so rather than face the expense of sending out teams to talk to everyday people, their stories tend to focus on presentations and speeches that are cheaper to cover.

“This refers to the plethora of meetings, conferences, and workshops where the experts do all the talking and presenting,” he says.

“Ordinary people in the face of climate change are suffering impacts and do not get as much coverage.”

Training journalists to specialise in climate reporting will give them an in-depth understanding of both talking to experts and ordinary people experiencing the effects of climate change, Dr Singh says.


Blessen Tom’s climate change ‘ghost’ village report on Vunidogoloa for Bearing Witness in 2016. Video: Pacific Media Centre

“It brings focus, consistency and knowledge if done on a regular basis. Science has its place, but let’s not forget that people dealing and living with the effects of climate change are experts in their own right.”

Up-and-coming journalists, USP students Brittany Nawaqatabu and Viliame Tawanakoro say they see it as a good journalists’ responsibility to prioritise climate stories.

“Journalism provides people with the opportunity to be the vessel of message to the world. We are the captain of the ship that delivers the message,” Viliame says.

Brittany criticises Western media that considers climate change as a “debatable” topic.

“You have to put yourself in the shoes of a Pacific Islander to know what it’s really like. You can’t be debating it because you’re not the one going through it,” she says.

It’s important for Fijian media to continue to put the climate crisis on the front page and not let the stories become lost in other news, she says.

“If we are not going to become strong advocates as Pacific islanders for climate change and what our island homes are going through, then it’s only going to go downhill.”

Brooke Tindall is a student journalist from the Queensland University of Technology who travelled to Fiji with the support of the Australian Government’s New Colombo Plan Mobility Programme. This is published as the first of a series under our Asia Pacific Journalism partnership with QUT Journalism.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/07/24/not-up-for-debate-fijian-journalists-in-the-climate-crisis-response-2/feed/ 0 485414
Australian strategy plans $75m boost for Indo-Pacific media development https://www.radiofree.org/2024/07/15/australian-strategy-plans-75m-boost-for-indo-pacific-media-development/ https://www.radiofree.org/2024/07/15/australian-strategy-plans-75m-boost-for-indo-pacific-media-development/#respond Mon, 15 Jul 2024 10:18:20 +0000 https://asiapacificreport.nz/?p=103601

RNZ Pacific

Australia has announced more than A$68 million over the next five years to strengthen and expand Australian broadcasting and media sector engagement across the Indo-Pacific.

As part of the Indo-Pacific broadcasting strategy, the ABC will receive just over $40m to increase its content for and about the Pacific, expand Radio Australia’s FM transmission footprint across the region and enhance its media and training activities.

And the PacificAus TV programme will receive over $28 million to provide commercial Australian content free of charge to broadcasters in the Pacific.

The strategy provides a framework to help foster a vibrant and independent media sector, counter misinformation, present modern multicultural Australia, and support deeper people-to-people engagement.

It focuses on three key areas, including:

  • supporting the creation and distribution of compelling Australian content that engages audiences and demonstrates Australia’s commitment to the region;
  • enhancing access in the region to trusted sources of media, including news and current affairs, strengthening regional media capacity and capability; and
  • boosting connections between Australian-based and Indo-Pacific media and content creators.

Crucial role
Foreign Minister Penny Wong said media plays a crucial role in elevating the voices and perspectives of the region and strengthening democracy.

Wong said the Australia government was committed to supporting viable, resilient and independent media in the region.

Minister for International Development and the Pacific Pat Conroy said Australia and the Pacific shared close cultural and people-to-people links, and an enduring love of sport.

“These connections will be further enriched by the boost in Australian content, allowing us to watch, read, and listen to shared stories across the region — from rugby to news and music.

Conroy said Australia would continue and expand support for media development, including through the new phase of the Pacific Media Assistance Scheme (PACMAS) and future opportunities through the Australia-Pacific Media and Broadcasting Partnership.

Communications Minister Michelle Rowland said a healthy Fourth Estate was imperative in the era of digital transformation and misinformation.

“This strategy continues Australia’s longstanding commitment to supporting a robust media sector in our region,” she said.

“By leveraging Australia’s strengths, we can partner with the region to boost media connections, and foster a diverse and sustainable media landscape.”

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2024/07/15/australian-strategy-plans-75m-boost-for-indo-pacific-media-development/feed/ 0 483927
Amazon and Walmart Employ Hostile Surveillance Technology against Warehouse Employees https://www.radiofree.org/2024/07/11/amazon-and-walmart-employ-hostile-surveillance-technology-against-warehouse-employees/ https://www.radiofree.org/2024/07/11/amazon-and-walmart-employ-hostile-surveillance-technology-against-warehouse-employees/#respond Thu, 11 Jul 2024 21:30:51 +0000 https://www.projectcensored.org/?p=43204 An April 2024 report from Oxfam America detailed how Amazon and Walmart utilize workplace surveillance technology to intimidate their warehouse workers into increasing their output—at the expense of employees’ physical and mental health, as Alex N. Press reported for Jacobin. Walmart and Amazon are the two largest employers in the…

The post Amazon and Walmart Employ Hostile Surveillance Technology against Warehouse Employees appeared first on Project Censored.


This content originally appeared on Project Censored and was authored by Kate Horgan.

]]>
https://www.radiofree.org/2024/07/11/amazon-and-walmart-employ-hostile-surveillance-technology-against-warehouse-employees/feed/ 0 483497
The President Ordered a Board to Probe a Massive Russian Cyberattack. It Never Did. https://www.radiofree.org/2024/07/08/the-president-ordered-a-board-to-probe-a-massive-russian-cyberattack-it-never-did/ https://www.radiofree.org/2024/07/08/the-president-ordered-a-board-to-probe-a-massive-russian-cyberattack-it-never-did/#respond Mon, 08 Jul 2024 09:00:00 +0000 https://www.propublica.org/article/cyber-safety-board-never-investigated-solarwinds-breach-microsoft by Craig Silverman

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

After Russian intelligence launched one of the most devastating cyber espionage attacks in history against U.S. government agencies, the Biden administration set up a new board and tasked it to figure out what happened — and tell the public.

State hackers had infiltrated SolarWinds, an American software company that serves the U.S. government and thousands of American companies. The intruders used malicious code and a flaw in a Microsoft product to steal intelligence from the National Nuclear Security Administration, National Institutes of Health and the Treasury Department in what Microsoft President Brad Smith called “the largest and most sophisticated attack the world has ever seen.”

The president issued an executive order establishing the Cyber Safety Review Board in May 2021 and ordered it to start work by reviewing the SolarWinds attack.

But for reasons that experts say remain unclear, that never happened.

Nor did the board probe SolarWinds for its second report.

For its third, the board investigated a separate 2023 attack, in which Chinese state hackers exploited an array of Microsoft security shortcomings to access the email inboxes of top federal officials.

A full, public accounting of what happened in the Solar Winds case would have been devastating to Microsoft. ProPublica recently revealed that Microsoft had long known about — but refused to address — a flaw used in the hack. The tech company’s failure to act reflected a corporate culture that prioritized profit over security and left the U.S. government vulnerable, a whistleblower said.

The board was created to help address the serious threat posed to the U.S. economy and national security by sophisticated hackers who consistently penetrate government and corporate systems, making off with reams of sensitive intelligence, corporate secrets or personal data.

For decades, the cybersecurity community has called for a cyber equivalent of the National Transportation Safety Board, the independent agency required by law to investigate and issue public reports on the causes and lessons learned from every major aviation accident, among other incidents. The NTSB is funded by Congress and staffed by experts who work outside of the industry and other government agencies. Its public hearings and reports spur industry change and action by regulators like the Federal Aviation Administration.

So far, the Cyber Safety Review Board has charted a different path.

The board is not independent — it’s housed in the Department of Homeland Security. Rob Silvers, the board chair, is a Homeland Security undersecretary. Its vice chair is a top security executive at Google. The board does not have full-time staff, subpoena power or dedicated funding.

Silvers told ProPublica that DHS decided the board didn’t need to do its own review of SolarWinds as directed by the White House because the attack had already been “closely studied” by the public and private sectors.

“We want to focus the board on reviews where there is a lot of insight left to be gleaned, a lot of lessons learned that can be drawn out through investigation,” he said.

As a result, there has been no public examination by the government of the unaddressed security issue at Microsoft that was exploited by the Russian hackers. None of the SolarWinds reports identified or interviewed the whistleblower who exposed problems inside Microsoft.

By declining to review SolarWinds, the board failed to discover the central role that Microsoft’s weak security culture played in the attack and to spur changes that could have mitigated or prevented the 2023 Chinese hack, cybersecurity experts and elected officials told ProPublica.

“It’s possible the most recent hack could have been prevented by real oversight,” Sen. Ron Wyden, a Democratic member of the Senate Select Committee on Intelligence, said in a statement. Wyden has called for the board to review SolarWinds and for the government to improve its cybersecurity defenses.

In a statement, a spokesperson for DHS rejected the idea that a SolarWinds review could have exposed Microsoft’s failings in time to stop or mitigate the Chinese state-based attack last summer. “The two incidents were quite different in that regard, and we do not believe a review of SolarWinds would have necessarily uncovered the gaps identified in the Board’s latest report,” they said.

The board’s other members declined to comment, referred inquiries to DHS or did not respond to ProPublica.

In past statements, Microsoft did not dispute the whistleblower’s account but emphasized its commitment to security. “Protecting customers is always our highest priority,” a spokesperson previously told ProPublica. “Our security response team takes all security issues seriously and gives every case due diligence with a thorough manual assessment, as well as cross-confirming with engineering and security partners.”

The board’s failure to probe SolarWinds also underscores a question critics including Wyden have raised about the board since its inception: whether a board with federal officials making up its majority can hold government agencies responsible for their role in failing to prevent cyberattacks.

“I remain deeply concerned that a key reason why the Board never looked at SolarWinds — as the President directed it to do so — was because it would have required the board to examine and document serious negligence by the U.S. government,” Wyden said. Among his concerns is a government cyberdefense system that failed to detect the SolarWinds attack.

Silvers said while the board did not investigate SolarWinds, it has been given a pass by the independent Government Accountability Office, which said in an April study examining the implementation of the executive order that the board had fulfilled its mandate to conduct the review.

The GAO’s determination puzzled cybersecurity experts. “Rob Silvers has been declaring by fiat for a long time that the CSRB did its job regarding SolarWinds, but simply declaring something to be so doesn’t make it true,” said Tarah Wheeler, the CEO of Red Queen Dynamics, a cybersecurity firm, who co-authored a Harvard Kennedy School report outlining how a “cyber NTSB” should operate.

Silvers said the board’s first and second reports, while not probing SolarWinds, resulted in important government changes, such as new Federal Communications Commission rules related to cellphones.

“The tangible impacts of the board’s work to date speak for itself and in bearing out the wisdom of the choices of what the board has reviewed,” he said.

“We Have Fully Complied With the Executive Order”

The SolarWinds attack was a wakeup call for the federal government and the private sector. The White House’s executive order was designed to allow officials to move quickly to implement new cybersecurity practices.

But the executive order limited what the new cybersecurity board could do: The president cannot allocate funding from Congress or grant subpoena power.

When the board launched in early 2022, it bore little resemblance to the cyber board that Wheeler and her co-authors outlined in their Harvard report.

“Not a single one of our recommendations was adopted,” she said.

Housed in DHS’ Cybersecurity and Infrastructure Security Agency, the board consists of 15 unpaid volunteers — eight from government agencies and seven from the private sector. Silvers said this ensures the board has cutting-edge knowledge and the ability to follow through on its recommendations.

Although the board’s first mandate was to investigate SolarWinds, Silvers said Homeland Security Secretary Alejandro Mayorkas tasked the board instead to review a recently discovered vulnerability in Log4j, software used by millions of computers, which could allow attackers to breach systems worldwide, including some used by the U.S. government.

Silvers said it “was a perfect use case” for the board’s first review and that the White House agreed.

The board’s Log4j report, published in July 2022, found there had been no significant attacks on critical infrastructure systems due to this vulnerability. It offered 19 recommendations for companies, government bodies and open-source software developers.

Silvers continued to face questions about the decision not to probe SolarWinds but maintained that Log4j had been the more pressing topic for review.

“We have fully complied with the executive order,” Silvers told media on a call that month.

At first, a government watchdog agency disagreed.

When the GAO conducted its review of the executive order’s implementation, it found that the board had failed to fulfill its mandate. In its draft report, it recommended that Homeland Security direct the board to review SolarWinds as the president had instructed.

That didn’t sit well with DHS, which was given a chance to review and comment on the draft as part of the GAO’s standard process. DHS argued in a letter that the “intent” of a board review of SolarWinds had been met by references to the hack in the board’s Log4j report and previous research on SolarWinds by the DHS agency that administers the board.

Homeland Security also noted that the executive order had set a 90-day deadline for the board to complete the SolarWinds review, which it said was “unachievable.” Directing the board to do such a review now, it argued, would be “duplicative of prior work and an imprudent use of resources.”

“We request that GAO consider this recommendation resolved and closed, as implemented,” the letter said.

GAO agreed. Its final study said the mandate for a board review of SolarWinds had been “fully implemented.” The GAO accepted two government reports in place of one from the board: the Log4j review and a 2021 review of SolarWinds by the National Security Council, which is not public.

An aide to Wyden said the senator had not seen the NSC review. Neither has the GAO. Instead, the GAO told ProPublica that it “interviewed key contributors” to the security council’s review. The office also summarized three recommendations that the NSC deemed acceptable for public release, including a call for better information sharing among federal agencies. A spokesperson from the security council declined to comment.

The GAO said it accepted the board’s Log4j review because it included “information from the SolarWinds incident.” But aside from footnotes, the report mentions SolarWinds only once.

A board report would have been more beneficial to the cybersecurity community because it would have offered a detailed, public accounting of a major attack, said Steven Bellovin, a professor of computer science at Columbia University who has written articles and given presentations about the need for an independent cybersecurity board. “A secret report does not accomplish that,” he said.

Trey Herr, an assistant professor of foreign policy and global security at American University who co-authored reports on the CSRB and SolarWinds, also criticized the GAO’s decision. “I don’t know why GAO would suggest a private NSC review and a different CSRB work product are equivalent, given their vastly different authorities, scope, operation and expectations of transparency,” he said.

Asked to explain why it credited Homeland Security for completing a review that never occurred, Marisol Cruz-Cain, a director with GAO’s information technology and cybersecurity team, said in a statement that the office “stands by the statements and assessments.”

“GAO believes the government had taken sufficient steps to review the SolarWinds incident,” she said, including through collaboration with multiple federal agencies and the private sector and “by disseminating relevant guidance about SolarWinds.”

GAO also conducted its own study of SolarWinds, which was published in 2022. Like the other government reviews, it did not probe Microsoft’s role in the attack. A spokesperson said the GAO was focused on the impact the hack had on the federal government, so “we did not engage with Microsoft.”

“This Intrusion Should Never Have Happened”

After the 2023 Chinese-led hack used Microsoft vulnerabilities to infiltrate U.S. systems, the board scrutinized the tech giant’s role in the attack.

The report was scathing. “The Board concludes that this intrusion should never have happened,” the report found, citing a “cascade of security failures at Microsoft.” The board called for an overhaul of Microsoft’s “inadequate” security culture and listed seven areas where the company failed to apply proper security practices or to detect or address flaws or risks.

Microsoft announced a series of changes and said it would implement all of the board's recommendations.

The report triggered a House Homeland Security Committee hearing with Microsoft president Smith last month. Smith said the company was making security its top priority.

He also raised concerns about the board’s conflicts of interest. While Wyden and other experts have criticized the role of federal officials, Smith complained about the board’s private-sector members, including executives from Google and other Microsoft competitors. “I think it’s a mistake to put on the board the competitors of a company that is the subject of a review,” he said. Smith warned that other companies might not be as cooperative with the board as he said Microsoft had been.

Three of the board’s private-sector members — including board Vice Chair Heather Adkins, a Google executive — recused themselves from the Microsoft report, as did two members from the Office of the National Cyber Director and one from the FBI, who were replaced by one colleague from each agency.

A DHS spokesperson declined to say why the public-sector members recused themselves but said board members are required to step aside if a review includes “examinations of their employers’ products or those of competitors” or if a board member has “financial interests relating to matters under consideration.”

Silvers said every board member, including public-sector members, goes through a “rigorous” review of conflicts of interest. He said the current model has proven effective and is less costly than standing up an independent agency.

“Creating an entirely new agency with a professional workforce would be exceedingly expensive, would take many years to do and could cannibalize the scarce cyber talent that we have in the U.S. government as it is,” he said. “In an era of scarce budgets, belt tightening, competition for talent, it’s really a terrific model.”

Still, DHS acknowledges that the board needs more resources and investigative muscle. Last year, the department released proposed legislation to make the board permanent, with dedicated funding, limited subpoena power and a full-time staff.

Silvers said the bill has the support of the Biden administration, but it has not been introduced and does not have a sponsor.

Wheeler, the cybersecurity executive, said she recognizes how challenging any reforms would be but that she and others will keep advocating for the board to become an independent government agency.

“I am frankly surprised that they got [the board] done at all,” she said. “Now I want them to make it better.”

Do You Have a Tip for ProPublica? Help Us Do Journalism.


This content originally appeared on ProPublica and was authored by by Craig Silverman.

]]>
https://www.radiofree.org/2024/07/08/the-president-ordered-a-board-to-probe-a-massive-russian-cyberattack-it-never-did/feed/ 0 482860
How do you convince someone to live next to a nuclear waste site? https://grist.org/energy/how-do-you-convince-someone-to-live-next-to-a-nuclear-waste-site/ https://grist.org/energy/how-do-you-convince-someone-to-live-next-to-a-nuclear-waste-site/#respond Thu, 27 Jun 2024 08:45:00 +0000 https://grist.org/?p=641762 The world’s first permanent depository for nuclear fuel waste opens later this year on Olkiluoto, a sparsely populated and lushly forested island in the Baltic Sea three hours north of Helsinki. 

Onkalo — the name means “cavity” or “cave” in Finnish — is among the most advanced facilities of its kind, designed for an unprecedented and urgent task: safely storing some of the most toxic material on Earth nearly 1,500 feet underground in what’s called a deep mined geologic repository.

The process requires remarkable feats of engineering. It begins in an encapsulation plant, where robots remove spent nuclear fuel rods from storage canisters and place them in copper and cast iron casks up to two stories tall. Once full, these hefty vessels, weighing around 24 metric tons, will descend more than a quarter-mile in an elevator to a cavern hollowed out of crystalline bedrock 2 billion years old. (The trip takes 50 minutes.) Each tomb will hold 30 to 40 of these enormous containers ensconced in bentonite clay and sealed behind concrete. As many as 3,250 canisters containing 6,500 metric tons of humanity’s most dangerous refuse will, the theory goes, lie undisturbed for hundreds of thousands of years.

Deep beneath the surface, the Onkalo facility will store spent nuclear fuel rods in chutes carved into the bedrock. Tapani Karjanlahti/TVO/Posiva

Nothing assembled by human hands has stood for more than a fraction of that. The world’s oldest known structure, Gobekli Tepe in Turkey, is a bit more than 11,000 years old. Designing Onkalo to endure for so unfathomably long is necessary because the material left behind by nuclear fission remains radioactive for millennia. Safely disposing of it requires stashing it for, essentially, eternity. That way nothing — be it natural disasters, future ice ages, or even the end of humanity itself — would expose anyone, or anything, to its dangers.

“The plan is that there will be no sign [of the facility],” said Pasi Tuohimaa, communications manager for Posiva, the agency that manages Finland’s nuclear waste. “Nobody would even know it’s there, whether we’re talking about future generations or future aliens or whatever.”

Building such a place, as technologically complex as it is, might be easier than convincing a community to host it. Gaining that approval can take decades and rests upon a simple premise.

“One of the principles of geologic disposal is the idea that the generations that enjoy the benefits of nuclear power should also pay for and participate in the solution,” said Rodney Ewing, a mineralogist and materials scientist at Stanford University and co-director of the university’s Center for International Security and Cooperation.

The long process of gaining such support is called consent-based siting, an undertaking many in the nuclear energy sector consider vital as the world abandons fossil fuels. Nuclear power accounts for almost a fifth of the United States’ electricity generation, and its expansion is among the few elements of the Biden administration’s energy agenda that enjoys strong bipartisan support. Over the last year, Energy Secretary Jennifer Granholm has touted the nation’s newest reactor, celebrated plans for an experimental small modular reactor, and unveiled a $1.5 billion loan to restart a defunct plant in Michigan. 

An aerial view of Onkalo, the world’s first permanent depository for nuclear fuel waste, during construction. It opens later this year on the Finnish island of Olkiluoto. Tapani Karjanlahti/TVO/Posiva

These are hardly one-offs. The U.S. intends to triple its nuclear energy capacity by 2050. Yet experts say there isn’t enough public discussion of how to deal with the corresponding increase in radioactive trash, which will compound a problem the country has deferred since the start of the nuclear age. After botching plans for a deep mined geological repository a generation ago, the United States is scrambling to catch up to Finland and several other nations, including Canada, which could choose a site by year’s end.

As the U.S. races toward a post-carbon future in which nuclear energy could play a key role, policymakers, energy experts, and community leaders say dealing with the inevitable waste isn’t a technical problem, but a social one. Engineers know how to build a repository capable of safeguarding the public for millennia. The bigger challenge is convincing people that it’s safe to live next to it.


The United States knew, even before the world’s first commercial nuclear power plant began operating in Pennsylvania in 1957, how best to dispose of the effluvium generated by splitting atoms to generate electricity. Earlier that year, geologists and geophysicists wrote a National Academy of Sciences report that proposed burying it. Opinions haven’t changed much in the 67 years since. 

“The only viable way to possibly deal with the issue of isolating radioactive waste that can remain hazardous for hundreds of thousands of years from the environment is a deep geologic repository,” said Edwin Lyman, director of nuclear power safety at the Union of Concerned Scientists. “There’s really no alternative.”

Yet this refuse, most of it from the nation’s 54 commercial reactors, remains in what amounts to cold storage. Depleted fuel rods are kept on-site in water tanks for about half a decade, then moved to steel and concrete canisters called dry casks and held for another 40 years in what’s known as interim storage. Only then is the material cool enough to stash underground. That last step has never happened, however. The nation’s 85 interim storage sites hold more than 86,000 tons of waste, a situation that’s akin to leaving your trash behind the garage indefinitely. The situation could grow more dire as the nation invests in advanced small modular reactors

Canisters of nuclear fuel waste sit in storage in the German town of Ahaus in 2024. Guido Kirchner/picture alliance via Getty Images

“It’s a pet peeve of mine, to be honest,” said Paul Murray, who became the Department of Energy’s deputy assistant secretary for spent fuel and waste disposition in October. “Everybody talks about the shiny new reactors, but nobody ever talks about back-end management of the fuel that comes out of them.”

Congress attempted to rectify that in 1982 when it passed the Nuclear Waste Policy Act. President Ronald Reagan called the law “an important step in the pursuit of the peaceful uses of atomic energy.” It required that the federal government begin taking responsibility for the nation’s nuclear waste by 1998, and that the utilities generating it pay a fee of one-tenth of a cent per kilowatt-hour of nuclear-generated electricity to be rid of it. The plan stalled because the government never took possession of most of the waste. That failure has allowed the utilities to collect $500 million in fines from Washington each year since 1998. A report that the Government Accountability Office released in 2021 noted that federal liabilities could reach $60 billion by 2030. 

The federal government’s missteps continued when plans for a deep geologic repository derailed about 15 years ago. The 1982 law directed the Department of Energy to provide the president, Congress, the Nuclear Regulatory Commission, and the Environmental Protection Agency with suggestions for several sites. Congress amended the law in 1987 to designate one: Yucca Mountain, about 100 miles northwest of Las Vegas on land the Western Shoshone Nation considers sacred.

This top-down process was the antithesis of consent-based siting, and it collapsed amid community opposition and the efforts of then-Senate Majority Leader Harry Reid. The Nevada Democrat convinced President Obama to scuttle the proposal, which by that point had cost $13 billion. The Obama administration convened a panel of scientists to devise a new plan; in 2012, it suggested creating an independent agency, giving it responsibility for the nuclear fund and directing it to revamp the effort through consent-based siting.

Yucca Mountain Las Vegas nuclear waste
A sign warns people to stay away from the proposed nuclear waste dump site of Yucca Mountain, located 100 miles north of Las Vegas, in 2002. David McNew/Getty Images

That recommendation mimicked what Finland had done, and Canada was doing, to build community consensus. Posiva spent four decades working toward the facility on Olkiluoto; the Canadian search started 24 years ago with the creation of the independent Nuclear Waste Management Organization. Yet more than 10 years after the Department of Energy made consent-based siting its official policy, there’s been little progress toward a deep mined geologic repository in the U.S. for commercial nuclear waste. (Radioactive refuse generated by the defense industry has, since 1999, been secured 2,150 feet underground at the Waste Isolation Pilot Plant in New Mexico.)

Instead of identifying possible sites for a deep geologic repository, the Energy Department directed Murray, who has a background in nuclear technology and environmental stewardship, to address a backlog of waste that could, by his estimate, take 55 years to clear out of interim storage. Much of this trash is languishing in dry casks that dot power plants in 37 states. Last year, he formed a 12-member Consent-Based Siting Consortia to start the search for a federally-managed site that would temporarily consolidate the nation’s waste until a permanent site is built.

He could start by looking at existing energy communities with coal-fired power plants that have been decommissioned or soon will be, according to Kara Colton. She leads the Energy Communities Alliance, a coalition of local governments that is part of the consortia and is distributing $1 million in federal grants to three communities interested in hosting a nuclear waste storage facility. (Additional grants will be available this summer.) But she worries that, without a concerted, long-term effort by the government to find a permanent repository, no one will commit to participating.

A nuclear waste storage pool at a reprocessing plant at the La Hague nuclear fuel reprocessing site in northwestern France. Damien Meyer/AFP via Getty Images

“This is a multi-generational project and we have a political system that changes all the time,” she said. “Without assured funding, we’re checking every year to see if the progress that’s made will change.” 

But Murray’s quest to consolidate temporary waste storage may be moot. Under the Nuclear Waste Policy Act, the Department of Energy lacks the authority to designate an interim storage site unless that facility is tied to a plan to establish a deep mined geologic repository. That makes Murray’s efforts “pretty meaningless,” Lyman said.

Murray concedes that his mission faces challenges. “Without a robust repository program, it’s very difficult to site interim storage,” he said. “We have to, as a nation, start a repository program, otherwise people think they’ll become the de facto disposal facility.”

Gaining consensus for a permanent storage site, then building it, could take 50 years, he said. In the meantime, the nation’s utilities continue to pile up 2,000 metric tons of nuclear waste each year. 


If 50 years sounds preposterous, consider that Finland began its search for a repository site in 1983. Within a decade, the government had considered four locations in a process that weighed community opinions alongside geological and environmental criteria like bedrock density, groundwater movement, and potential changes in the movement and formation of the glaciers above due to climate change. 

Eurajoki, a rural village of just over 9,000 people, provided the greatest social support and the best geographical factors. When the town council voted to approve the site in 2000, its members, and many residents, seemed predisposed to the idea because Olkilouto, which is 8 miles away, already hosted two reactors. (A third, Olkiluoto 3, opened in April 2023; the three plants provide about one-third of the country’s electricity.)

Workers rest in the bedrock halls, some 1,500 feet underground, of Posiva’s Onkalo facility in Finland. Tapani Karjanlahti/TVO/Posiva

Still, Posiva, the independent agency charged with establishing a deep geologic repository, engaged in a long-term campaign to foster community support and trust, teaching residents about nuclear energy and waste storage to alleviate their concerns. Tuohimma, Posiva’s communications manager, called it a “long road show” with origins in the company’s efforts to sell the technology in the 1970s. Although the Finnish Green Party and Greenpeace expressed concerns about the project — stemming from the building of new nuclear plants and not disposal of the waste — opposition has since eased. Construction of the 1 billion euro facility started in 2000; Posiva estimates that over the next century, running, filling, and eventually sealing the site will cost 5.5 billion euros. How long that takes will depend upon the rate at which the country generates radioactive waste.

Eurajoki Mayor Vesa Lakaniemi told German news site DW that hosting all that nuclear infrastructure generates about 20 million euros in taxes each year. That’s almost half the town’s annual revenue and is “how we can plan our future investments,” including a renovated school, a new library, and an 8 million euro sports facility. Lakaniemi believes residents ultimately supported the project because of Posiva’s safety record, and because Finns tend to trust their government and its institutions.

Canada’s efforts have not gone so smoothly.

The country’s hunt for a site began in 2002 when parliament passed the Nuclear Fuel Waste Act. The law established the Nuclear Waste Management Organization, or NWMO, which unveiled a nine-step plan in 2010 that would lead, within a decade or so, to an agreement to host a repository. Within two years, 21 communities had expressed interest in doing just that. 

The agency spent the past dozen years winnowing the list to the two most geologically and socially appropriate sites. To do that, it began by ensuring each candidate had a suitable site — one large enough for the required infrastructure, yet far enough from drinking water supplies and protected lands like national parks. Communities also had to outline the material benefits they would receive from the employment opportunities and industrial development the project would foster.

Over time, the screening process cut the list of potential sites to two. The first is South Bruce, a small farming community roughly 100 miles west of Toronto and about 35 miles from the country’s largest nuclear power plant. The other is Ignace, a rural town about 150 miles northwest of Lake Superior. 

Jim Gowland, a farmer, is head of the Community Liaison Committee for South Bruce, which argues that a nuclear waste disposal facility will be a key source of jobs for the small Canadian town 100 miles west of Toronto. Steve Russell/Toronto Star via Getty Images

The First Nations communities in those locations — the Saugeen Ojibway Nation near South Bruce and the Wabigoon Lake Ojibway Nation near Ignace — also must provide consent, but that process is separate, and generally less publicized, from those taking place in the townships.

The site near Ignace sits on what is roughly equivalent to federal land, which makes acquisition easier than in South Bruce, where the Nuclear Waste Management Organization had to sign agreements with property holders to eventually purchase their land for the 1,500-acre project, should it go through. That meant selling the idea not only to the community, but to individual landowners. The agency gained support by spending liberally to help the town with everything from new fire trucks to a scholarship fund to paying some municipal salaries. All told, it has given the town more than $9.3 million since 2013. (Ignace has received almost $14 million since 2018.)

Still, the idea of hosting a repository has divided the 6,000 or so residents in South Bruce, who were once united by their participation in church groups and youth sports. Supporters say they trust the science showing that repository technology is safe, and they point to the benefits it’s already brought. But critics worry about the impact of all that radioactive material on the town now and decades into the future, and they worry the potential economic and environmental costs haven’t been adequately studied. They also feel the NWMO is less interested in considering their perspectives and answering their questions than in selling the repository through fiscal promises.

Carolyn Fell, the agency’s communications manager in South Bruce, said residents can find her in the office five days a week, where she is happy to answer questions. “We have heard concerns from the community, and at every turn we do our best to answer in a very up-front and transparent way,” she said.

Michelle Stein isn’t so sure about that. She and her husband Gary raise cattle and sheep on a farm they bought in South Bruce 30 years ago. They also raise three children there, with dreams of them taking over. But after NWMO started signing agreements with adjacent landowners for what would become 1,500 acres back in 2019, Stein’s kids moved away. Now, she worries her land could soon be worthless and her livelihood gone.

Hundreds of protesters gather on the front lawn of Parliament Hill in February to oppose another nuclear waste site in Ottawa, Canada. Dave Chan/AFP via Getty Images

“In my opinion, they should at least pay us what they paid people who sold at the beginning of the project,” Stein said. She also fears the impact the facility might have on groundwater, and whether anyone would buy beef and lamb grown alongside a nuclear site. She feels some of her neighbors, and the town council, have been bought off by NWMO’s investments in the community.

“They say they won’t come into a non-willing community,” Stein said, “but they’re certainly pushing us to be willing.”

Stein joined more than a dozen others in organizing Protect Our Waterways to oppose the project. The group’s volunteer chair, Anja Vandervlies, worries the buffer zone, which prohibits living or farming within a certain distance of the facility, might end up including some or all of her farm. She and Stein have testified before the town council, written op-eds for the local paper, and erected bright yellow, handmade billboards reading, “Say No to NWMO” and “Stop Canada’s Nuke Dump!” But they have felt crowded out by what they considered aggressive marketing by the agency. In 2022, their field of candidates for town council fared poorly in the election; Mayor Mark Goetz said he and the body’s five elected members now publicly support the waste facility. 

Goetz succeeded his father, who was mayor in 2012 when South Bruce told the Nuclear Waste Management Organization it was interested in hosting the repository. Goetz said his father was interested in the economic development the project would bring to a community heavily dependent on agriculture. He rejects claims that the town council has not sought community input, noting that it has held hundreds of events over the past 12 years. He’s also grateful for the financial support the NWMO has provided thus far. More than that, however, he believes someone has to host the site, so why not South Bruce?

“We’ve benefited from cheap nuclear power, and I don’t think we should leave this waste to sit for future generations to deal with,” Goetz said. 

Voters will decide the matter in a referendum in October. More than 50 percent of voters must cast ballots for it to count, which, to Goetz’s mind, makes the council’s position largely moot.

“The beauty of the referendum is that everyone gets an equal vote,” he said. “It’s a democracy, and it’ll be majority rule, so it doesn’t really matter which way the council decides.” 

But if the referendum brings out less than 50 percent of voters, the decision falls back to the town council.

A win in South Bruce won’t necessarily be enough, though, because the Saugeen Ojibway Nation also must endorse the idea. Even then, the Nuclear Waste Management Organization will make the final decision later this year, and it also has an eye on the location near Ignace.

That option, called the Revell site, sits about midway between Ignace and the larger town of Dryden. Vince Ponka, the agency’s regional communications manager for northern Ontario, described it as an egg-shaped formation of granite several miles long and deep within the Canadian Shield, a vast igneous and metamorphic formation that rings Hudson Bay. 

“It’s an ideal piece of rock to hold the [deep mined geologic repository],” he said. Although the facility would be beyond the city limits, Ignace would host the “Center of Expertise,” an office and educational complex meant to teach people about the repository. He called it a “real architectural gem” that could boost economic development. 

Jodie Defeo, a registered nurse and an Ignace town council member, said she was indifferent when she learned about the possibility of a repository 14 years ago, but any skepticism was allayed last summer during a trip to Olkiluoto that the Nuclear Waste Management Organization funded. 

Specialty trucks, like this one pictured outside the Onkalo facility, are designed to carry canisters of spent nuclear waste through underground tunnels, where they’ll be deposited and encased in bentonite clay. Tapani Karjanlahti/TVO/Posiva

“There was no sense of caution or anything, it appeared like there was no cause for concern” among the people of Eurajoki, she said. She saw the improvements the tax revenue made in the local schools and infrastructure, and she returned home a booster. She believes a similar facility could bring good fortune to Ignace, which fell upon hard times when the mining industry began to dwindle a few decades ago. 

“There are no pots of money for aging infrastructure,” she said. Few jobs, a tanking housing market, and a dwindling population result in a tiny tax base. While her 17-year-old son is interested in staying in Ignace, her 27-year-old son moved to Thunder Bay, a city of roughly 110,000 almost three hours south on the shore of Lake Superior. For Defeo, the possibility of hosting a repository brings with it a sense of hope.

“I feel like we could be on the cusp of a change,” she said.

Wendy O’Connor doesn’t share her optimism. She’s the communications officer for Thunder Bay and volunteers with the opposition group We the Nuclear Free North. She said that although Ignace raised its hand to host the repository, all the waste will pass through her city. The trucks carrying it will trundle about 1,000 miles along the Trans Canada Highway, a largely two-lane road that hugs the coast of Lake Huron and the cliffs of Lake Superior. She’s worried about the risk of accidents on the highway or at the site.

Of course, there is always the risk that radioactive material will leak while in transit or short-term storage, something that has happened in Germany and New Mexico over the past two decades — though with no known health impacts. 

“We can say with confidence, accidents are not only possible but they occur,” said Ewing, the Stanford University professor. But, he added, they are studied and mistakes remedied. 

Although scientists express confidence in the engineering of repositories, it is almost inevitable that, over millennia, some of the canisters within them will corrode, some of the barriers sealing their tombs will erode, and some of the waste will leak. Theoretically, it is safer that it happens deep within the Earth, where it poses a far smaller threat. As the 2018 Stanford report that Ewing helped produce notes, “‘safe’ doesn’t mean zero health risks for hundreds of thousands of years, but a health risk that is low enough to be acceptable to today’s population and future generations.”


Given the risks, however small, of hosting the nation’s nuclear waste, some wonder if consent-based siting is little more than a form of flattery, a way of paying a community to take on a task no one else wants to do. 

The storage tunnels beneath the Onkalo facility are carved out of crystalline bedrock 2 billion years old. Tapani Karjanlahti/TVO/Posiva

“A cynic would say that what it really means is that every community has its price,” said Lyman. “The question is how much compensation is enough, and is the level of compensation that will be enough something that the industry and the government can afford. These are all unanswered questions.” 

But as the efforts in Finland and Canada show, at least the approach provides a community with a say in its future — something the U.S. government denied the people of Nevada when it chose Yucca Mountain all those years ago. The collapse of that effort shows the limitations of a top-down approach, and the nation’s growing stockpile of nuclear waste underscores the urgent need to address a problem too long ignored. As Lyman noted, the country needs to push forward. It must be mindful of intergenerational equity by making the best choice it can to protect those who will be here hundreds, even thousands, of years from now, using the best science and technology available today. And that, in the eyes of many experts in the field, means developing deep mined geologic repositories.

“Any strategy to increase nuclear power that doesn’t include a strategy to handle the waste should not be pursued,” Ewing said.

Of course, nuclear energy is not the only path leading the world away from fossil fuels, and there are legitimate safety concerns and other reasons to question its place in a post-carbon future. But as long as the United States and other governments consider expanding its use, they will have to figure out what to do with the inevitable waste it generates, and do so with the support of the communities that will bear that burden. 

This story was originally published by Grist with the headline How do you convince someone to live next to a nuclear waste site? on Jun 27, 2024.


This content originally appeared on Grist and was authored by Austyn Gaffney.

]]>
https://grist.org/energy/how-do-you-convince-someone-to-live-next-to-a-nuclear-waste-site/feed/ 0 481395
Cutting Ties with Citibank https://www.radiofree.org/2024/06/19/cutting-ties-with-citibank/ https://www.radiofree.org/2024/06/19/cutting-ties-with-citibank/#respond Wed, 19 Jun 2024 14:30:03 +0000 https://dissidentvoice.org/?p=151239 How to cut ties with genocide.


The post Cutting Ties with Citibank first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Visualizing Palestine.

]]>
https://www.radiofree.org/2024/06/19/cutting-ties-with-citibank/feed/ 0 480290
Nine Takeaways From Our Investigation Into Microsoft’s Cybersecurity Failures https://www.radiofree.org/2024/06/18/nine-takeaways-from-our-investigation-into-microsofts-cybersecurity-failures/ https://www.radiofree.org/2024/06/18/nine-takeaways-from-our-investigation-into-microsofts-cybersecurity-failures/#respond Tue, 18 Jun 2024 09:00:00 +0000 https://www.propublica.org/article/microsoft-solarwinds-what-you-need-to-know-cybersecurity by ProPublica

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

After Russian hackers exploited a flaw in a widely used Microsoft product during one of the largest cyberattacks in U.S. history, the software giant downplayed its culpability. However, a recent ProPublica investigation revealed that a whistleblower within Microsoft’s ranks had repeatedly attempted to convince the company to address the weakness years before the hack — and that the company rebuffed his concerns at every step.

Here are the key things you need to know about that whistleblower’s efforts and Microsoft’s inaction.

Years before the SolarWinds hack was discovered in 2020, a Microsoft engineer found a security flaw these hackers would eventually exploit.

In 2016, while researching an attack on a major tech company, Microsoft engineer Andrew Harris said he discovered a flaw in the company’s Active Directory Federation Services, a product that allowed users to sign on a single time for nearly everything they needed. As a result of the weakness, millions of users — including federal employees — were left exposed to hackers.

Harris said the Microsoft team responsible for handling reports of security weaknesses dismissed his concerns.

The Microsoft Security Response Center determines which reported security flaws need to be addressed. Harris said he told the MRSC about the flaw, but it decided to take no action. The MSRC argued that, because hackers would already need access to an organization’s on-premises servers before they could take advantage of the flaw, it didn’t cross a so-called “security boundary.” Former MSRC members told ProPublica that the center routinely rejected reports of weaknesses using this term, even though it had no formal definition at the time.

Microsoft product managers also refused to address the problem.

Following the MSRC’s decision, Harris escalated the issue to Microsoft product leaders who, he said, “violently agreed with me that this is a huge issue.” But, at the same time, they “violently disagreed with me that we should move quickly to fix it.”

Harris had proposed the temporary solution of suggesting that customers turn off the seamless single sign-on function. That move would eliminate the threat but result in users needing to log on twice instead of once. A product manager argued that it wasn’t a viable option because it risked alienating federal government customers and undermined Microsoft’s strategy to marginalize a top competitor.

Microsoft was also concerned that going public with the flaw could hurt its chances of winning future government contracts worth billions of dollars, Harris said.

At the time Harris was trying to convince Microsoft product leaders to address the flaw, the federal government was preparing to make a massive investment in cloud computing, and Microsoft wanted the business. Acknowledging this security flaw could jeopardize the company’s chances, Harris recalled one product leader telling him.

Harris eventually learned that the flaw was even more dire than he originally thought. Once again, Microsoft opted to not take action, he said.

Never miss the most important reporting from ProPublica’s newsroom. Subscribe to the Big Story newsletter.

In 2018, a colleague of Harris’ pointed out how hackers could also bypass a common security feature called multifactor authentication, which requires users to perform one or more additional steps to verify their identity, such as entering a code sent via text message.

Their discovery meant that, no matter how many additional security steps a company puts in place, a hacker could bypass them all.

When the colleagues brought this new information to the MSRC, “it was a nonstarter,” Harris said.

Researchers outside of Microsoft also warned the company about the flaw.

In November 2017, cybersecurity firm CyberArk published a blog post detailing the same flaw Harris had identified.

Microsoft would later claim this blog post was the first time it had learned of the issue, but researchers at CyberArk told ProPublica they had reached out to Microsoft staff at least twice before publication.

Later, in 2019, cybersecurity firm Mandiant would publicly demonstrate at a cybersecurity conference how hackers could exploit the flaw to gain access to victims’ cloud services. The firm said it had given Microsoft advance notice of its findings.

Russian hackers ultimately exploited the very flaw Harris and the others had raised.

Within months of Harris leaving Microsoft in 2020, his fears became reality. U.S. officials confirmed reports that a state-sponsored team of Russian hackers used the flaw in the SolarWinds hack. Exploiting the weakness, hackers vacuumed up sensitive data from a number of federal agencies, including, ProPublica learned, the National Nuclear Security Administration, which maintains the United States’ nuclear weapons stockpile. The Russians also used the weakness to compromise dozens of email accounts in the Treasury Department, including those of its highest-ranking officials.

In congressional hearings after the SolarWinds attack, Microsoft’s president insisted the company was blameless.

Microsoft President Brad Smith assured Congress in 2021 that “there was no vulnerability in any Microsoft product or service that was exploited” in SolarWinds, and he said customers could have taken more steps to secure their systems.

When asked what Microsoft had done to address the flaw in the years before the attack, Smith responded by listing a handful of steps that customers could have taken to protect themselves. His suggestions included purchasing an antivirus product like Microsoft Defender and securing devices with another Microsoft product called Intune.

After ProPublica published its investigation, lawmakers pressed Microsoft’s Smith if his prior testimony before Congress was incorrect.

Hours after the ProPublica investigation was published, Microsoft’s Smith appeared before the House Homeland Security Committee to discuss his company’s cybersecurity failures.

Rep. Seth Magaziner, D-R.I., asked Smith about his prior congressional testimony, in which he said that Microsoft had first learned about this weakness in November 2017 from the CyberArk blog post. ProPublica’s investigation, Magaziner noted, found that Harris had raised it even earlier, only to be ignored. The lawmaker asked Smith if his prior testimony was incorrect.

Smith demurred, saying he hadn’t read the story. “I was at the White House this morning,” he told the panel.

He also complained that ProPublica’s investigation was published the day of the hearing and said that he’d know more about it “a week from now.”

However, ProPublica had sent detailed questions to Microsoft nearly two weeks before the story was published and had requested an interview with Smith. The company declined to make him available. Instead, Microsoft had issued a statement in response. “Protecting customers is always our highest priority,” a spokesperson said. “Our security response team takes all security issues seriously and gives every case due diligence with a thorough manual assessment, as well as cross-confirming with engineering and security partners. Our assessment of this issue received multiple reviews and was aligned with the industry consensus.”


This content originally appeared on ProPublica and was authored by by ProPublica.

]]>
https://www.radiofree.org/2024/06/18/nine-takeaways-from-our-investigation-into-microsofts-cybersecurity-failures/feed/ 0 480138
Microsoft President Grilled by Congress Over Cybersecurity Failures https://www.radiofree.org/2024/06/13/microsoft-president-grilled-by-congress-over-cybersecurity-failures/ https://www.radiofree.org/2024/06/13/microsoft-president-grilled-by-congress-over-cybersecurity-failures/#respond Thu, 13 Jun 2024 23:45:00 +0000 https://www.propublica.org/article/microsoft-solarwinds-cybersecurity-house-homeland-security-hearing by Renee Dudley

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Members of Congress pressed Microsoft on Thursday to strengthen how it handles reported security flaws in its ubiquitous products after a series of cyberattacks struck the federal government.

The criticism from members of the House Homeland Security Committee came in response to a new ProPublica investigation that found Microsoft repeatedly rebuffed a company engineer who, beginning in 2017, warned that a product flaw left millions of users vulnerable to attack, including federal employees. Russian hackers later exploited that weakness in one of the largest cyberattacks in U.S. history, widely known as SolarWinds.

Rep. Bennie Thompson of Mississippi, the committee’s top Democrat, entered the news organization’s story into the congressional record. He then asked Microsoft President Brad Smith if the company has since established a process “to ensure that employee concerns about security at Microsoft or their products are prioritized and addressed.”

Smith, sitting alone at the witness table in a packed hearing room, told lawmakers that the company is shifting its approach to security. Microsoft is trying “to empower every employee to focus on continuous improvement and speak up ... and to ensure that those voices are heard and heeded,” he said.

Smith added, “We want a culture that encourages every employee to look for problems, find problems, report problems, help fix problems and then learn from the problems.”

As ProPublica reported, that is not the corporate culture that the former Microsoft engineer, Andrew Harris, encountered in the years leading up to SolarWinds. Harris said product leaders, who were focused on Microsoft’s drive to dominate the cloud computing market, told him that addressing the weakness he’d identified would undermine the company’s business goals of securing federal government contracts and marginalizing competitors.

The federal Cyber Safety Review Board, in its own examination of Microsoft’s role in a separate hack perpetrated last year by Chinese attackers, also found the company’s security culture “inadequate” and in need of an “overhaul.” Microsoft “deprioritized both enterprise security investments and rigorous risk management,” the board found, resulting in a “cascade of … avoidable errors.”

On Thursday, Smith said Microsoft accepted responsibility for the board’s findings and has since moved to tie executive bonuses to cybersecurity. He said security would also be part of every Microsoft employee’s performance review, and thus would indirectly impact compensation across the company.

Microsoft’s promise to change its security culture echoes a similar pledge from founder Bill Gates more than 20 years ago. “When we face a choice between adding features and resolving security issues, we need to choose security,” Gates wrote at the time.

In the decades since, former employees told ProPublica, developing new products and features was often prioritized over fixing security bugs in existing offerings.

While the official subject of Thursday’s hearing was the cybersafety board’s report on the China hack, members of the committee asked Smith question after question about ProPublica’s SolarWinds investigation, which Rep. Delia Ramirez, D-Ill., called a “bombshell report.”

She said the hearing was a “reckoning moment” for the company, which has repeatedly downplayed its role in SolarWinds. One of the flaws the Russians exploited involved a Microsoft application, which was supposed to ensure users had permission to log on to cloud-based programs. The weakness allowed intruders to masquerade as legitimate employees and rummage through sensitive data in the cloud, including emails.

Rep. Seth Magaziner, D-R.I., asked Smith about his prior congressional testimony, in which he said that Microsoft had first learned about this weakness in November 2017, when an outside cybersecurity firm published a report on it. ProPublica’s investigation, Magaziner noted, found that Harris had raised it even earlier, only to be ignored. The lawmaker asked Smith if his prior testimony was incorrect.

Smith demurred, saying he hadn’t read the story. “I was at the White House this morning,” he told the panel.

Later, Smith complained that ProPublica’s investigation was published the day of the hearing and said that he’d know more about it “a week from now.” ProPublica sent detailed questions to Microsoft nearly two weeks before the story was published on Thursday and requested an interview with Smith. The company declined to make him available.

On Thursday, Smith pointed out that the weakness in Microsoft’s product could also be found in other companies’ software. Cybersecurity specialists have noted, however, that Microsoft’s version was one of the most widely used, including by the federal government.

When Ramirez asked how Harris’ discovery would have been handled differently today, Smith said, “I think what’s most important for today is simply to note how we are changing … how we elevate these issues and reward people for finding, reporting and helping to fix problems.”


This content originally appeared on ProPublica and was authored by by Renee Dudley.

]]>
https://www.radiofree.org/2024/06/13/microsoft-president-grilled-by-congress-over-cybersecurity-failures/feed/ 0 479478
Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says https://www.radiofree.org/2024/06/13/microsoft-chose-profit-over-security-and-left-u-s-government-vulnerable-to-russian-hack-whistleblower-says/ https://www.radiofree.org/2024/06/13/microsoft-chose-profit-over-security-and-left-u-s-government-vulnerable-to-russian-hack-whistleblower-says/#respond Thu, 13 Jun 2024 09:00:00 +0000 https://www.propublica.org/article/microsoft-solarwinds-golden-saml-data-breach-russian-hackers by Renee Dudley, with research by Doris Burke

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Microsoft hired Andrew Harris for his extraordinary skill in keeping hackers out of the nation’s most sensitive computer networks. In 2016, Harris was hard at work on a mystifying incident in which intruders had somehow penetrated a major U.S. tech company.

The breach troubled Harris for two reasons. First, it involved the company’s cloud — a virtual storehouse typically containing an organization’s most sensitive data. Second, the attackers had pulled it off in a way that left little trace.

He retreated to his home office to “war game” possible scenarios, stress-testing the various software products that could have been compromised.

Early on, he focused on a Microsoft application that ensured users had permission to log on to cloud-based programs, the cyber equivalent of an officer checking passports at a border. It was there, after months of research, that he found something seriously wrong.

The product, which was used by millions of people to log on to their work computers, contained a flaw that could allow attackers to masquerade as legitimate employees and rummage through victims’ “crown jewels” — national security secrets, corporate intellectual property, embarrassing personal emails — all without tripping alarms.

To Harris, who had previously spent nearly seven years working for the Defense Department, it was a security nightmare. Anyone using the software was exposed, regardless of whether they used Microsoft or another cloud provider such as Amazon. But Harris was most concerned about the federal government and the implications of his discovery for national security. He flagged the issue to his colleagues.

They saw it differently, Harris said. The federal government was preparing to make a massive investment in cloud computing, and Microsoft wanted the business. Acknowledging this security flaw could jeopardize the company’s chances, Harris recalled one product leader telling him. The financial consequences were enormous. Not only could Microsoft lose a multibillion-dollar deal, but it could also lose the race to dominate the market for cloud computing.

Harris said he pleaded with the company for several years to address the flaw in the product, a ProPublica investigation has found. But at every turn, Microsoft dismissed his warnings, telling him they would work on a long-term alternative — leaving cloud services around the globe vulnerable to attack in the meantime.

Harris was certain someone would figure out how to exploit the weakness. He’d come up with a temporary solution, but it required customers to turn off one of Microsoft’s most convenient and popular features: the ability to access nearly every program used at work with a single logon.

He scrambled to alert some of the company’s most sensitive customers about the threat and personally oversaw the fix for the New York Police Department. Frustrated by Microsoft’s inaction, he left the company in August 2020.

Andrew Harris shared his Microsoft employee badge on his LinkedIn page when he announced his departure from the company in 2020. (Screenshot by ProPublica)

Within months, his fears became reality. U.S. officials confirmed reports that a state-sponsored team of Russian hackers had carried out SolarWinds, one of the largest cyberattacks in U.S. history. They used the flaw Harris had identified to vacuum up sensitive data from a number of federal agencies, including, ProPublica has learned, the National Nuclear Security Administration, which maintains the United States’ nuclear weapons stockpile, and the National Institutes of Health, which at the time was engaged in COVID-19 research and vaccine distribution. The Russians also used the weakness to compromise dozens of email accounts in the Treasury Department, including those of its highest-ranking officials. One federal official described the breach as “an espionage campaign designed for long-term intelligence collection.”

Harris’ account, told here for the first time and supported by interviews with former colleagues and associates as well as social media posts, upends the prevailing public understanding of the SolarWinds hack.

From the moment the hack surfaced, Microsoft insisted it was blameless. Microsoft President Brad Smith assured Congress in 2021 that “there was no vulnerability in any Microsoft product or service that was exploited” in SolarWinds.

He also said customers could have done more to protect themselves.

Harris said they were never given the chance.

“The decisions are not based on what’s best for Microsoft’s customers but on what’s best for Microsoft,” said Harris, who now works for CrowdStrike, a cybersecurity company that competes with Microsoft.

Microsoft declined to make Smith and other top officials available for interviews for this story, but it did not dispute ProPublica’s findings. Instead, the company issued a statement in response to written questions. “Protecting customers is always our highest priority,” a spokesperson said. “Our security response team takes all security issues seriously and gives every case due diligence with a thorough manual assessment, as well as cross-confirming with engineering and security partners. Our assessment of this issue received multiple reviews and was aligned with the industry consensus.”

ProPublica’s investigation comes as the Pentagon seeks to expand its use of Microsoft products — a move that has drawn scrutiny from federal lawmakers amid a series of cyberattacks on the government.

Smith is set to testify on Thursday before the House Homeland Security Committee, which is examining Microsoft’s role in a breach perpetrated last year by hackers connected to the Chinese government. Attackers exploited Microsoft security flaws to gain access to top U.S. officials’ emails. In investigating the attack, the federal Cyber Safety Review Board found that Microsoft’s “security culture was inadequate and requires an overhaul.”

Microsoft President Brad Smith testifies during a Senate Select Committee on Intelligence hearing about SolarWinds on Feb. 23, 2021. (Drew Angerer/Getty Images)

For its part, Microsoft has said that work has already begun, declaring that the company’s top priority is security “above all else.” Part of the effort involves adopting the board’s recommendations. “If you’re faced with the tradeoff between security and another priority, your answer is clear: Do security,” the company’s CEO, Satya Nadella, told employees in the wake of the board’s report, which identified a “corporate culture that deprioritized both enterprise security investments and rigorous risk management.”

ProPublica’s investigation adds new details and pivotal context about that culture, offering an unsettling look into how the world’s largest software provider handles the security of its own ubiquitous products. It also offers crucial insight into just how much the quest for profits can drive those security decisions, especially as tech behemoths push to dominate the newest — and most lucrative — frontiers, including the cloud market.

“This is part of the problem overall with the industry,” said Nick DiCola, who was one of Harris’ bosses at Microsoft and now works at Zero Networks, a network security firm. Publicly-traded tech giants “are beholden to the share price, not to doing what’s right for the customer all the time. That’s just a reality of capitalism. You’re never going to change that in a public company because at the end of the day, they want the shareholder value to go up.”

A “Cloud-First World”

Early this year, Microsoft surpassed Apple to become the world’s most valuable company, worth more than $3 trillion. That triumph was almost unimaginable a decade ago. (The two remain in close competition for the top spot.)

In 2014, the same year that Harris joined Microsoft and Nadella became the CEO, Wall Street and consumers alike viewed the company as stuck in the past, clinging to the “shrink-wrapped” software products like Windows that put it on the map in the 1990s. Microsoft’s long-stagnant share price reflected its status as an also-ran in almost every major technological breakthrough since the turn of the century, from its Bing search engine to its Nokia mobile phone division.

As the new CEO, Nadella was determined to reverse the trend and shake off the company’s fuddy-duddy reputation, so he staked Microsoft’s future on the Azure cloud computing division, which then lagged far behind Amazon. In his earliest all-staff memo, Nadella told employees they would need “to reimagine a lot of what we have done in the past for a … cloud-first world.”

Microsoft CEO Satya Nadella promotes the company’s cloud offerings at an event in San Francisco in 2014. (David Paul Morris/Bloomberg via Getty Images)

Microsoft salespeople pitched business and government customers on a “hybrid cloud” strategy, where they kept some traditional, on-premises servers (typically stored on racks in customers’ own offices) while shifting most of their computing needs to the cloud (hosted on servers in Microsoft data centers).

Security was a key selling point for the cloud. On-site servers were notoriously vulnerable, in part because organizations’ overburdened IT staff often failed to promptly install the required patches and updates. With the cloud, that crucial work was handled by dedicated employees whose job was security.

The dawn of the cloud era at Microsoft was an exciting time to work in the field of cybersecurity for someone like Harris, whose high school yearbook features a photo of him in front of a desktop computer and monitor with a mess of floppy disks beside him. One hand is on the keyboard, the other on a wired mouse. Caption: “Harris the hacker.”

Harris’ high school yearbook (Classmates.com)

As a sophomore at Pace University in New York, he wrote a white paper titled “How to Hack the Wired Equivalent Protocol,” a network security standard, and was awarded a prestigious Defense Department scholarship, which the government uses to recruit cybersecurity specialists. The National Security Agency paid for three years of his tuition, which included a master’s degree in software engineering, in exchange for a commitment to work for the government for at least that long, he said.

Early in his career, he helped lead the Defense Department’s efforts to protect individual devices. He became an expert in the niche field known as identity and access management, securing how people log in.

As the years wore on, he grew frustrated by the lumbering bureaucracy and craved the innovation of the tech industry. He decided he could make a bigger impact in the private sector, which designed much of the software the government used.

At Microsoft he was assigned to a secretive unit known as the “Ghostbusters” (as in: “Who you gonna call?”), which responded to hacks of the company’s most sensitive customers, especially the federal government. As a member of this team, Harris first investigated the puzzling attack on the tech company and remained obsessed with it, even after switching roles inside Microsoft.

Eventually, he confirmed the weakness within Active Directory Federation Services, or AD FS, a product that allowed users to sign on a single time to access nearly everything they needed. The problem, he discovered, rested in how the application used a computer language known as SAML to authenticate users as they logged in.

To understand how a SAML attack would unfold, let’s imagine a robber who wants to gain access to all of the apartment buildings owned by a landlord.

(Anuj Shrestha, special to ProPublica)

The robber finds an open window in a single apartment and climbs in, similar to how a hacker could use a phishing email to log on to a single user’s account.

(Anuj Shrestha, special to ProPublica)

Once inside, the robber roams the halls looking for the landlord’s office, where keys to all the building’s units are kept. Likewise, a hacker moves through an organization’s on-premises servers. Their first target is Microsoft’s equivalent of the landlord’s office, a directory that stores information such as usernames and passwords.

(Anuj Shrestha, special to ProPublica)

The robber, however, wants to break into all the landlord’s buildings, just as a hacker wants to breach the cloud. The robber unlocks the office safe, which contains a master key. In a cyber break-in, the safe is AD FS, the weak link that Harris identified.

(Anuj Shrestha, special to ProPublica)

The robber makes a copy of the master key, which provides access to all of the landlord’s buildings and apartments. In a SAML attack, a hacker extracts the private key from the AD FS server and forges “tokens” that allow the intruder to masquerade as a user with the highest levels of access.

(Anuj Shrestha, special to ProPublica)

Now the robber can access any apartment in any building with little trace. And because the landlord’s keys are still in the office, no one suspects anything is amiss. Likewise, in a SAML attack, the hacker goes unnoticed because their sign-in information looks legitimate.

This is what makes a SAML attack unique. Typically, hackers leave what cybersecurity specialists call a “noisy” digital trail. Network administrators monitoring the so-called “audit logs” might see unknown or foreign IP addresses attempting to gain access to their cloud services. But SAML attacks are much harder to detect. The forged token is the equivalent of a robber using a copied master key. There was little trail to track, just the activities of what appear to be legitimate users.

Harris and a colleague who consulted for the Department of Defense spent hours in front of both real and virtual whiteboards as they mapped out how such an attack would work, the colleague told ProPublica. The “token theft” risk, as Harris referred to it, became a regular topic of discussion for them.

A Clash With “Won’t Fix” Culture

Before long, Harris alerted his supervisors about his SAML finding. Nick DiCola, his boss at the time, told ProPublica he referred Harris to the Microsoft Security Response Center, which fields reports of security vulnerabilities and determines which need to be addressed. Given its central role in improving Microsoft product security, the team once considered itself the “conscience of the company,” urging colleagues to improve security without regard to profit. In a meeting room, someone hung a framed photo of Winston “the Wolf,” the charismatic fixer in Quentin Tarantino’s movie “Pulp Fiction” who is summoned to clean up the aftermath of bloody hits.

Members of the team were not always popular within the company. Plugging security holes is a cost center, and making new products is a profit center, former employees told ProPublica. In 2002, the company’s founder, Bill Gates, tried to settle the issue, sending a memo that turned out to be eerily prescient. “Flaws in a single Microsoft product, service or policy not only affect the quality of our platform and services overall, but also our customers’ view of us as a company,” Gates wrote, adding: “So now, when we face a choice between adding features and resolving security issues, we need to choose security.”

At first, Gates’ memo was transformational and the company’s product divisions were more responsive to the center’s concerns. But over time, the center’s influence waned.

Its members were stuck between cultural forces. Security researchers — often characterized as having outsized egos — believed their findings should be immediately addressed, underestimating the business challenges of developing fixes quickly, former MSRC employees told ProPublica.

Product managers had little motivation to act fast, if at all, since compensation was tied to the release of new, revenue-generating products and features. That attitude was particularly pronounced in Azure product groups, former MSRC members said, because they were under pressure from Nadella to catch up to Amazon.

“Azure was the Wild West, just this constant race for features and functionality,” said Nate Warfield, who worked in the MSRC for four years beginning in 2016. “You will get a promotion because you released the next new shiny thing in Azure. You are not going to get a promotion because you fixed a bunch of security bugs.”

Former employees told ProPublica that the center fielded hundreds or even thousands of reports a month, pushing the perennially understaffed group to its limits. The magazine Popular Science noted that volume as one of the reasons why working in the MSRC was one of the 10 “worst jobs in science,” between whale feces researchers and elephant vasectomists.

“They’re trained, because they’re so resource constrained, to think of these cases in terms of: ‘How can I get to ‘won’t fix,’” said Dustin Childs, who worked in the MSRC in the years leading up to Harris’ saga. Staff would often punt on fixes by telling researchers they would be handled in “v-next,” the next product version, he said. Those launches, however, could be years away, leaving customers vulnerable in the interim, he said.

The center also routinely rejected researchers’ reports of weaknesses by saying they didn’t cross what its staff called a “security boundary.” But when Harris discovered the SAML flaw, it was a term with no formal definition, former employees said.

(Jaap Arriens / Sipa USA via AP Images)

By 2017, the lack of clarity had become the “butt of jokes,” Warfield said. Several prominent security researchers who regularly interacted with the MSRC made T-shirts and stickers that said “____ [fill in the blank] is not a security boundary.”

“Any time Microsoft didn’t want to fix something, they’d just say, ‘That’s not a security boundary, we’re not going to fix it,’” Warfield recalled.

Unaware of the inauspicious climate, Harris met virtually with MSRC representatives and sketched out how a hacker could jump from an on-premises server to the cloud without being detected. The MSRC declined to address the problem. Its staff argued that hackers attempting to exploit the SAML flaw would first have to gain access to an on-premises server. As they saw it, Harris said, that was the security boundary — not the subsequent hop to the cloud.

Business Over Security

“WTF,” Harris recalled thinking when he got the news. “This makes no sense.”

Microsoft had told customers the cloud was the safest place to put their most precious data. His discovery proved that, for the millions of users whose systems included AD FS, their cloud was only as secure as their on-premises servers. In other words, all the buildings owned by the landlord are only as secure as the most careless tenant who forgot to lock their window.

Harris pushed back, but he said the MSRC held firm.

Harris had a reputation for going outside the chain of command to air his concerns, and he took his case to the team managing the products that verified user identities.

He had some clout, his former colleagues said. He had already established himself as a known expert in the field, had pioneered a cybersecurity threat detection method and later was listed as the named inventor on a Microsoft patent. Harris said he “went kind of crazy” and fired off an email to product manager Mark Morowczynski and director Alex Simons requesting a meeting.

He understood that developing a long-term fix would take time, but he had an interim solution that could eliminate the threat. One of the main practical functions of AD FS was to allow users to access both on-premises servers and a variety of cloud-based services after entering credentials only once, a Microsoft feature known as “seamless” single sign-on. Harris proposed that Microsoft tell its customers to turn off that function so the SAML weakness would no longer matter.

According to Harris, Morowczynski quickly jumped on a videoconference and said he had discussed the concerns with Simons.

“Everyone violently agreed with me that this is a huge issue,” Harris said. “Everyone violently disagreed with me that we should move quickly to fix it.”

Morowczynski, Harris said, had two primary objections.

First, a public acknowledgement of the SAML flaw would alert adversaries who could then exploit it. Harris waved off the concern, believing it was a risk worth taking so that customers wouldn’t be ignorant to the threat. Plus, he believed Microsoft could warn customers without betraying any specifics that could be co-opted by hackers.

According to Harris, Morowczynski’s second objection revolved around the business fallout for Microsoft. Harris said Morowczynski told him that his proposed fix could alienate one of Microsoft’s largest and most important customers: the federal government, which used AD FS. Disabling seamless SSO would have widespread and unique consequences for government employees, who relied on physical “smart cards” to log onto their devices. Required by federal rules, the cards generated random passwords each time employees signed on. Due to the configuration of the underlying technology, though, removing seamless SSO would mean users could not access the cloud through their smart cards. To access services or data on the cloud, they would have to sign in a second time and would not be able to use the mandated smart cards.

Harris said Morowczynski rejected his idea, saying it wasn’t a viable option.

Morowczynski told Harris that his approach could also undermine the company’s chances of getting one of the largest government computing contracts in U.S. history, which would be formally announced the next year. Internally, Nadella had made clear that Microsoft needed a piece of this multibillion-dollar deal with the Pentagon if it wanted to have a future in selling cloud services, Harris and other former employees said.

Killing the Competition

By Harris’ account, the team was also concerned about the potential business impact on the products sold by Microsoft to sign into the cloud. At the time, Microsoft was in a fierce rivalry with a company called Okta.

Microsoft customers had been sold on seamless SSO, which was one of the competitive advantages — or, in Microsoft parlance, “kill points” — that the company then had over Okta, whose users had to sign on twice, Harris said.

Harris’ proposed fix would undermine the company’s strategy to marginalize Okta and would “add friction” to the user experience, whereas the “No. 1 priority was to remove friction,” Harris recalled Morowczynski telling him. Moreover, it would have cascading consequences for the cloud business because the sale of identity products often led to demand for other cloud services.

“That little speed bump of you authenticating twice was unacceptable by Microsoft’s standards,” Harris said. He recalled Morowczynski telling him that the product group’s call “was a business decision, not a technical one.”

“What they were telling me was counterintuitive to everything I’d heard at Microsoft about ‘customer first,’” Harris said. “Now they’re telling me it’s not ‘customer first,’ it’s actually ‘business first.’”

DiCola, Harris’ then-supervisor, told ProPublica the race to dominate the market for new and high-growth areas like the cloud drove the decisions of Microsoft’s product teams. “That is always like, ‘Do whatever it frickin’ takes to win because you have to win.’ Because if you don’t win, it’s much harder to win it back in the future. Customers tend to buy that product forever.”

According to Harris, Morowczynski said his team had “on the road map” a product that could replace AD FS altogether. But it was unclear when it would be available to customers.

In the months that followed, Harris vented to his colleagues about the product group’s decision. ProPublica talked to three people who worked with Harris at the time and recalled these conversations. All of them spoke on the condition of anonymity because they feared professional repercussions. The three said Harris was enraged and frustrated over what he described to them as the product group’s unwillingness to address the weakness.

Neither Morowczynski nor Simons returned calls seeking comment, and Microsoft declined to make them available for interviews. The company did not dispute the details of Harris’ account. In its statement, Microsoft said it weighs a number of factors when it evaluates potential threats. “We prioritize our security response work by considering potential customer disruption, exploitability, and available mitigations,” the spokesperson said. “We continue to listen to the security research community and evolve our approach to ensure we are meeting customer expectations and protecting them from emerging threats.”

Another Major Warning

Following the conversation with Morowczynski, Harris wrote a reminder to himself on the whiteboard in his home office: “SAML follow-up.” He wanted to keep the pressure on the product team.

Soon after, the Massachusetts- and Tel Aviv-based cybersecurity firm CyberArk published a blog post describing the flaw, which it dubbed “Golden SAML,” along with a proof of concept, essentially a road map that showed how hackers could exploit the weakness.

Years later, in his written testimony for the Senate Intelligence Committee, Microsoft’s Brad Smith said this was the moment the company learned of the issue. “The Golden SAML theory became known to cybersecurity professionals at Microsoft and across the U.S. government and the tech sector at precisely the same time, when it was published in a public paper in 2017,” Smith wrote.

Lavi Lazarovitz of CyberArk said the firm mentioned the weakness — before the post was published — in a private WhatsApp chat of about 10 security researchers from various companies, a forum members used to compare notes on emerging threats. When they raised the discovery to the group, which included at least one researcher from Microsoft, the other members were dismissive, Lazarovitz said.

“Many in the security research community — I don’t want to say mocked — but asked, ‘Well, what’s the big deal?’” Lazarovitz said.

The CyberArk headquarters in Newton, Massachusetts (Sipa via AP Images)

Nevertheless, CyberArk believed it was worth taking seriously, given that AD FS represented the gateway to users’ most sensitive information, including email. “Threat actors operate in between the cracks,” Lazarovitz said. “So obviously, we understood the feedback that we got, but we still believed that this technique will be eventually leveled by threat actors.”

The Israel-based team also reached out to contacts at Microsoft’s Israeli headquarters and were met with a response similar to the one they got in the WhatsApp group, Lazarovitz said.

The published report was CyberArk’s way of warning the public about the threat. Disclosing the weakness also had a business benefit for the company. In the blog post, it pitched its own security product, which it said “will be extremely beneficial in blocking attackers from getting their hands on important assets like the token-signing certificate in the first place.”

The report initially received little attention. Harris, however, seized on it. He said he alerted Morowczynski and Simons from the product group as well as the MSRC. The situation was more urgent than before, Harris argued to them, because CyberArk included the proof of concept that could be used by hackers to carry out a real attack. For Harris, it harkened back to Morowczynski’s worry that flagging the weakness could give hackers an advantage.

“I was more energetic than ever to have us actually finally figure out what we’re going to do about this,” Harris said.

But the MSRC reiterated its “security boundary” stance, while Morowczynski reaffirmed the product group’s earlier decision, Harris said.

Harris said he then returned to his supervisors, including Hayden Hainsworth and Bharat Shah, who, as corporate vice president of the Azure cloud security division, also oversaw the MSRC. “I said, ‘Can you guys please listen to me,’” Harris recalled. “‘This is probably the most important thing I’ve ever done in my career.’”

Harris said they were unmoved and told him to take the problem back to the MSRC.

Microsoft did not publicly comment on the CyberArk blog post at the time. Years later, in written responses to Congress, Smith said the company’s security researchers reviewed the information but decided to focus on other priorities. Neither Hainsworth nor Shah returned calls seeking comment.

Defusing a Ticking Bomb

Harris said he was deeply frustrated. On a personal level, his ego was bruised. Identifying major weaknesses is considered an achievement for cybersecurity professionals, and, despite his internal discovery, CyberArk had claimed Golden SAML.

More broadly, he said he was more worried than ever, believing the weakness was a ticking bomb. “It’s out in the open now,” he said.

Publicly, Microsoft continued to promote the safety of its products, even boasting of its relationship with the federal government in sales pitches. “To protect your organization, Azure embeds security, privacy, and compliance into its development methodology,” the company said in late 2017, “and has been recognized as the most trusted cloud for U.S. government institutions.”

Attendees walk through the exhibition floor during the Microsoft Developers Build Conference in Seattle in 2017. (David Ryder/Bloomberg via Getty Images)

Internally, Harris complained to colleagues that customers were being left vulnerable.

“He was definitely having issues” with the product team, said Harris’ former Microsoft colleague who consulted for the Defense Department. “He vented that it was a problem that they just wanted to ignore.”

Harris typically pivoted from venting to discussing how to protect customers, the former colleague said. “I asked him to show me what I’m going to have to do to make sure the customers were aware and could take corrective action to mitigate the risk,” he said.

Harris also took his message to LinkedIn, where he posted a discreet warning and an offer.

“I hope all my friends and followers on here realize by now the security relationship” involved in authenticating users in AD FS, he wrote in 2019. “If not, reach out and let’s fix that!”

In 2019, Harris posted a discreet warning and an offer on LinkedIn. (Screenshot by ProPublica)

Separately, he realized he could help customers with whom he had existing relationships, including the NYPD, the nation’s largest police force.

“Knowing this exploit is actually possible, why would I not architect around it, especially for my critical customers?” Harris said.

On a visit to the NYPD, Harris told a top IT official, Matthew Fraser, about the AD FS weakness and recommended disabling seamless SSO. Fraser was in disbelief at the severity of the issue, Harris recalled, and he agreed to disable seamless SSO.

In an interview, Fraser confirmed the meeting.

“This was identified as one of those areas that was prime, ripe,” Fraser said of the SAML weakness. “From there, we figured out what’s the best path to insulate and secure.”

More Troubling Revelations

It was over beers at a conference in Orlando in 2018 that Harris learned the weakness was even worse than he’d initially realized. A colleague sketched out on a napkin how hackers could also bypass a common security feature called multifactor authentication, which requires users to perform one or more additional steps to verify their identity, such as entering a code sent via text message.

They realized that, no matter how many additional security steps a company puts in place, a hacker with a forged token can bypass them all. When they brought the new information to the MSRC, “it was a nonstarter,” Harris said. While the center had published a formal definition of “security boundary” by that point, Harris’ issues still didn’t meet it.

Nadella delivers the keynote address at a 2018 conference in Seattle for software developers. (Elaine Thompson/AP)

By March 2019, concerns over Golden SAML were spilling out into the wider tech world. That month, at a conference in Germany, two researchers from the cybersecurity company Mandiant delivered a presentation demonstrating how hackers could infiltrate AD FS to gain access to organizations’ cloud accounts and applications. They also released the tools they used to do so.

Mandiant said it notified Microsoft before the presentation, making it the second time in roughly 16 months that an outside firm had flagged the SAML issue to the company.

In August 2020, Harris left Microsoft to work for CrowdStrike. In his exit interview with Shah, Harris said he raised the SAML weakness one last time. Shah listened but offered no feedback, he said.

“There is no inspector general-type thing” within Microsoft, Harris said. “If something egregious is happening, where the hell do you go? There’s no place to go.”

SolarWinds Breaks

Four months later, news of the SolarWinds attack broke. Federal officials soon announced that beginning in 2019 Russian hackers had breached and exploited the network management software offered by a Texas-based company called SolarWinds, which had the misfortune of lending its name to the attack. The hackers covertly inserted malware into the firm’s software updates, gaining “backdoor” access to the networks of companies and government agencies that installed them. The ongoing access allowed hackers to take advantage of “post-exploit” vulnerabilities, including Golden SAML, to steal sensitive data and emails from the cloud.

Despite the name, nearly a third of victims of the attack never used SolarWinds software at all, Brandon Wales, then acting director of the federal Cybersecurity and Infrastructure Security Agency, said in the aftermath. In March 2021, Wales told a Senate panel that hackers were able to “gain broad access to data stores that they wanted, largely in Microsoft Office 365 Cloud … and it was all because they compromised those systems that manage trust and identity on networks.”

Microsoft itself was also breached.

In the immediate aftermath of the attack, Microsoft advised customers of Microsoft 365 to disable seamless SSO in AD FS and similar products — the solution that Harris proposed three years earlier.

As the world dealt with the consequences, Harris took his long simmering frustration public in a series of posts on social media and on his personal blog. Challenging Brad Smith by name, and criticizing the MSRC’s decisions — which he referred to as “utter BS” — Harris lambasted Microsoft for failing to publicly warn customers about Golden SAML.

Microsoft “was not transparent about these risks, forced customers to use ADFS knowing these risks, and put many customers and especially US Gov’t in a bad place,” Harris wrote on LinkedIn in December 2020. A long-term fix was “never a priority” for the company, he wrote. “Customers are boned and sadly it’s been that way for years (which again, sickens me),” Harris said in the post.

In the months and years following the SolarWinds attack, Microsoft took a number of actions to mitigate the SAML risk. One of them was a way to efficiently detect fallout from such a hack. The advancement, however, was available only as part of a paid add-on product known as Sentinel.

The lack of such a detection, the company said in a blog post, had been a “blind spot.”

“Microsoft Is Back on Top”

In early 2021, the Senate Select Committee on Intelligence called Brad Smith to testify about SolarWinds.

Although Microsoft’s product had played a central role in the attack, Smith seemed unflappable, his easy and conversational tone a reflection of the relationships he had spent decades building on Capitol Hill. Without referencing notes or reading from a script, as some of his counterparts did, he confidently deflected questions about Microsoft’s role. Laying the responsibility with the government, he said that in the lead-up to the attack, the authentication flaw “was not prioritized by the intelligence community as a risk, nor was it flagged by civilian agencies or other entities in the security community as a risk that should be elevated” over other cybersecurity priorities.

Smith also downplayed the significance of the Golden SAML weakness, saying it was used in just 15% of the 60 cases that Microsoft had identified by that point. At the same time, he acknowledged that, “without question, these are not the only victims who had data observed or taken.”

When Sen. Marco Rubio of Florida pointedly asked him what Microsoft had done to address Golden SAML in the years before the attack, Smith responded by listing a handful of steps that customers could have taken to protect themselves. His suggestions included purchasing an antivirus product like Microsoft Defender and securing devices with another Microsoft product called Intune.

“The reality is any organization that did all five of those things, if it was breached, it in all likelihood suffered almost no damage,” Smith said.

Neither Rubio nor any other senator pressed further.

Ultimately, Microsoft won a piece of the Defense Department’s multibillion-dollar cloud business, sharing it with Amazon, Google and Oracle.

Since December 2020, when the SolarWinds attack was made public, Microsoft’s stock has soared 106%, largely on the runaway success of Azure and artificial intelligence products like ChatGPT, where the company is the largest investor. “Microsoft Is Back on Top,” proclaimed Fortune, which featured Nadella on the cover of its most recent issue.

In September 2021, just 10 months after the discovery of SolarWinds, the paperback edition of Smith’s book, “Tools and Weapons,” was published. In it, Smith praised Microsoft’s response to the attack. The MSRC, Smith wrote, “quickly activated its incident response plan” and the company at large “mobilized more than 500 employees to work full time on every aspect of the attack.”

In the new edition, Smith also reflected on his congressional testimony on SolarWinds. The hearings, he wrote, “examined not only what had happened but also what steps needed to be taken to prevent such attacks in the future.” He didn’t mention it in the book, but that certainly would include the long-term alternative that Morowczynski first promised to Harris in 2017. The company began offering it in 2022.

Development by Lucas Waldron.


This content originally appeared on ProPublica and was authored by by Renee Dudley, with research by Doris Burke.

]]>
https://www.radiofree.org/2024/06/13/microsoft-chose-profit-over-security-and-left-u-s-government-vulnerable-to-russian-hack-whistleblower-says/feed/ 0 479332
We Do Need those Stinking Badges https://www.radiofree.org/2024/06/11/we-do-need-those-stinking-badges/ https://www.radiofree.org/2024/06/11/we-do-need-those-stinking-badges/#respond Tue, 11 Jun 2024 14:00:07 +0000 https://dissidentvoice.org/?p=146981 …all those McCarthy-Loving Feds and Politicians have tapped the nerds and software billionaires to watch our every fucking move!!!!!!! Proof of life. Don’t mess with the SS Administration ** [**see below, way below] Badges? We ain’t got no badges. We don’t need no badges. I don’t have to show you any stinking badges! The real […]

The post We Do Need those Stinking Badges first appeared on Dissident Voice.]]>

…all those McCarthy-Loving Feds and Politicians have tapped the nerds and software billionaires to watch our every fucking move!!!!!!!

Proof of life. Don’t mess with the SS Administration ** [**see below, way below]

Badges? We ain’t got no badges. We don’t need no badges. I don’t have to show you any stinking badges!

The real quote from B. Traven’s book, Treasure of Sierra Madre.

“Badges, to god-damned hell with badges! We have no badges. In fact, we don’t need badges. I don’t have to show you any stinking badges, you god-damned cabron and ching’ tu madre! Come out there from that shit-hole of yours. I have to speak to you.”

(For the Spanish-deprived among you, “cabron” is cuckold, “chingar” is “fuck,” and “tu madre” is “your mother.” Clearly the dialogue was cleaned up for the film.)

Oregon offers both a standard card and a Real ID Act-compliant card. Both types of cards allow you to legally drive and prove identity and age for things such as cashing a check. *Beginning May 7, 2025, a standard card cannot be used to board a domestic flight. See the TSA website​ for federally acceptable documents. [Does the passport work for domestic travel starting May 7, 2025?]

Oregonians urged to get passports before REAL ID deadline | KOIN.com

Federal banking laws and regulations do not prohibit banks from requesting that you provide a fingerprint or thumbprint to cash a check. Banks may use fingerprinting as a security measure and a way to combat fraud.

31959943_2155609841123769_6016603901514481664_n

Full body scanner - Wikipedia

TSA Screens Passengers At a busy Airport in Denver

Employers sometimes check credit to get insight into a potential hire, including signs of financial distress that might indicate risk of theft or fraud. They don’t get your credit score, but instead see a modified version of your credit report.

Employer credit checks are more likely for jobs that involve a security clearance or access to money, sensitive consumer data or confidential company information. Such checks may also be done by your current employer before a promotion.

Pre-employment drug tests are required by some employers as a condition of job offers.

• These tests typically screen for the presence amphetamines, marijuana, cocaine, opiates, and phencyclidine, but employers can also request testing for additional substances.
• Pre-employment drug tests help protect workplace safety and boost productivity while reducing accidents and turnover.
• Testing methods can include urine, saliva, hair, and blood, but urine is the most common.
• Most employers in regulated industries are required to perform pre-employment drug tests. Private-sector, non-regulated employers are not required to conduct pre-employment drug tests but can do so as long as they comply with state and local laws.

employment drug screening service

Criminal Records Check and Fitness Determination/ OAR 125-007-0200 to 125-007-0330/ Status: Permanent rules effective 1/14/2016

Overview:​​

The Oregon Department of Administrative Services (DAS) implemented statewide administrative rules related to certain aspects of criminal records checks on January 4, 2016 (ORS 181A.215).

​These rules streamline the criminal records check process for all of Oregon. They provide guidelines for decreasing risk to vulnerable popula​tions from people who have access or provide care.

ODHS and OHA background check rules have been updated to follow DAS rules, while maintaining specific requirements needed for ODHS and OHA employees, contractors, volunteers, providers and qualified entities.

Keystroke technology is a software that tracks and collects data on employees’ computer use. It tracks each and every keystroke an employee types on their computer and is one of a few tools companies have to more closely monitor exactly how staff spend the hours they are expected to work.

Newer features allow administrators to also take occasional screenshots of employees’ screens.

One firm providing the tools is Interguard, which uses software allows administrators to view logs of employee computer use data, including desktop screenshots of employee activity. It also alerts administrators when certain employees’ computer activity diverts from their normal patterns.

Workplace surveillance is becoming the new normal for U.S. workers

It's Time to End Forced Arbitration Completely | The Nation

What is forced arbitration?

In forced arbitration, a company requires a consumer or employee to submit any dispute that may arise to binding arbitration as a condition of employment or buying a product or service. The employee or consumer is required to waive their right to sue, to participate in a class action lawsuit, or to appeal. Forced arbitration is mandatory, the arbitrator’s decision is binding, and the results are not public.

As more and more workplaces return to work in the next few months, these social distancing monitors are likely to become a minor boom industry of their own: Bloomberg News has reported that Ford planned to enforce social distancing by having its workers wear RFID wristbands, developed by Radiant RFID, that would buzz when a worker got too close to a colleague and would also provide supervisors with alerts about employees who were congregating together in larger groups.

Another company, Guard RFID, published a blog post detailing how its technology could be used for “infection control in the workplace,” including through the use of wearable RFID tags that would “alarm when tagged individuals come within close proximity to each other.” (Guard RFID and Radiant both declined to comment on their ventures into social distancing solutions.)

“A lot of tracking of workers happens under the rubric of worker safety or ensuring that workers are not injuring or hurting themselves,” she said. “But the boundaries between that and using the data in ways that are punitive or negative are hard to establish.”

RFID Personnel Tracking: Know Where They are and When They're Working - Weldon, Williams and Lick, Inc.

A Wisconsin company is offering to implant tiny radio-frequency chips in its employees – and it says they are lining up for the technology.

The idea is a controversial one, confronting issues at the intersection of ethics and technology by essentially turning bodies into bar codes. Three Square Market, also called 32M, says it is the first U.S. company to provide the technology to its employees.

The company manufactures self-service “micro markets” for office break rooms. It said in a press release that obtaining a chip is optional, but expects that about 50 employees will take part.

CEO Todd Westby said that the company believes the technology will soon be ubiquitous:

“We foresee the use of RFID technology to drive everything from making purchases in our office break room market, opening doors, use of copy machines, logging into our office computers, unlocking phones, sharing business cards, storing medical/health information, and used as payment at other RFID terminals. Eventually, this technology will become standardized allowing you to use this as your passport, public transit, all purchasing opportunities, etc.”

Do Employers Check Your Social Media Networks Before Hiring? #tips #shorts - YouTube

The state laws on social media passwords are intended to protect social media pages that applicants have chosen to keep private. If you have publicly posted information about yourself without bothering to restrict who can view it, an employer is generally free to view this information. However, employers still need to follow other employment rules.

Antidiscrimination laws. An employer who looks at an applicant’s Facebook page or other social media posts could well learn information that it isn’t entitled to have or consider during the hiring process. This can lead to illegal discrimination claims. For example, your posts or page might reveal your sexual orientation, disclose that you are pregnant, or espouse your religious views. Because this type of information is off limits in the hiring process, an employer that discovers it online and uses it as a basis for hiring decisions could face a discrimination lawsuit.

Your Free Speech Rights (Mostly) Don’t Apply At Work

Getty Royalty Free

A noncompete agreement is a contract that an employer can use to prevent employees from taking certain jobs with competitors after they leave the company. Sometimes, an employer can make signing a non-compete agreement a condition of employment. These contracts benefit a company by preventing former employees from using trade secrets to give another company a competitive advantage or starting a company that competes with a former employer.

A noncompete agreement can also be referred to as a covenant not to compete, a noncompete covenant, a noncompete clause, or simply a noncompete.

man signing paperwork with a white pen

+—+

The Man With the Stolen Name: They know what he did. They just don’t know who he is.

“John Doe,” of Owego, New York, was sentenced today to 57 months in prison for aggravated identity theft and misuse of a social security number. Doe used the name, social security number and date of birth of a homeless U.S. Army veteran to fraudulently obtain $249,811.93 in Supplemental Security Income (SSI) benefits and an additional $588,645.85 in state benefits. Doe’s true identity has yet to be confirmed.

The announcement was made by United States Attorney Carla B. Freedman and Gail. S. Ennis, Inspector General for the Social Security Administration (SSA).

United States Attorney Carla B. Freedman stated: “We don’t yet know the defendant’s name, but we know what he did. Today’s sentence justly punishes him for stealing the identity of a homeless veteran to fraudulently obtain hundreds of thousands of dollars in government benefits. Thanks to the collaborative efforts of local, state and federal investigators, we were able to bring John Doe to justice in spite of not knowing his true identity.”

SSA Inspector General Gail S. Ennis stated: “This individual stole the identity of a U.S. Army veteran to fraudulently obtain Supplemental Security Income benefits, a critical safety net for those in need. This sentence holds him accountable for his unlawful actions. My office will continue to pursue those who steal another person’s identity and misuse a social security number for personal gain. I appreciate the work of our law enforcement partners in this complex investigation and I thank Assistant U.S. Attorneys Adrian S. LaRochelle and Michael Gadarian for prosecuting this case.”

Doe was found guilty following a 4-day trial in May 2022. The evidence established that from approximately 1999 until June 2021, Doe received SSI benefits under the name, date of birth, and Social Security number of a homeless U.S. Army veteran living in North Carolina. When Doe’s use of the veteran’s identity was ultimately discovered and Doe was questioned by federal agents, Doe continued to falsely claim the identity as his own and provided agents with a photocopy of the victim’s birth certificate and Social Security card, claiming these documents were his own. Agents located the veteran and established through fingerprint and DNA analysis that Doe is not the person he claims to be.

United States District Judge Mae A. D’Agostino also ordered Doe to serve a 3-year term of supervised release following his release from prison and ordered Doe to pay a total $838,457.78 in restitution in connection with the benefits he unlawfully received under the victim’s name.

This case was investigated by the Social Security Administration Office of the Inspector General, the Tioga County Sheriff’s Office, the Tioga County Department of Social Services, and the New York State Police, with assistance provided by the U.S. Marshals Service. The case was prosecuted by Assistant U.S. Attorneys Adrian S. LaRochelle and Michael D. Gadarian.

Are We All Witnesses?

WE ARE WITNESSES — The American criminal justice system consists of 2.2 million people behind bars, plus tens of millions of family members, corrections and police officers, parolees, victims of crime, judges, prosecutors and defenders. In We Are Witnesses, we hear their stories.

Early one summer morning, Son Yo Auer, a Burger King employee in Richmond Hill, Georgia, found a naked man lying unconscious in front of the restaurant’s dumpsters. It was before dawn, but the man was sweating and sunburned. Fire ants crawled across his body, and a hot red rash flecked his skin. Auer screamed and ran inside. By the time police arrived, the man was awake, but confused. An officer filed an incident report indicating that a “vagrant” had been found “sleeping,” and an ambulance took him to St. Joseph’s Hospital in Savannah, where he was admitted on August 31, 2004, under the name “Burger King Doe.”

Other than the rash, and cataracts that had left him nearly blind, Burger King Doe showed no sign of physical injury. He appeared to be a healthy white man in his middle fifties. His vitals were good. His blood tested negative for drugs and alcohol. His lab results were, a doctor wrote on his chart, “surprisingly within normal limits.” A long, unwashed beard and dirty fingernails suggested he had been living rough. But the only physical signs of previous trauma were three small depressions on his skull and some scars on his neck and his left arm.

We live in an age of extraordinary surveillance and documentation. The government’s capacity to keep tabs on us—and our capacity to keep tabs on each other—is unmatched in human history. Big Data, NSA wiretapping, social media, camera phones, credit scores, criminal records, drones—we watch and watch, and record our every move. And yet here was a man who appeared to exist outside all that, someone who had escaped the modern age’s matrix of observation.

His condition—blind, nameless, amnesiac—seemed fictitious, the kind of allegorical affliction that might befall a character in Saramago or Borges.

Even if he was lying about his memory loss, there was no official record of his existence. He lived on the margins, beyond the boundaries mapped by the surveillance state. And because we choose not to look at individuals on the margins, it is still possible for them to disappear.

The post We Do Need those Stinking Badges first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Paul Haeder.

]]>
https://www.radiofree.org/2024/06/11/we-do-need-those-stinking-badges/feed/ 0 479008
Illinois Legislature puts the brakes on a carbon capture boom https://grist.org/accountability/illinois-legislature-puts-the-brakes-on-a-carbon-capture-boom/ https://grist.org/accountability/illinois-legislature-puts-the-brakes-on-a-carbon-capture-boom/#respond Fri, 07 Jun 2024 07:45:00 +0000 https://grist.org/?p=640719 The Midwest’s largest potential reservoir to store carbon is buried deep under the farmland of Illinois, and the state’s lawmakers just hit the brakes on any plans for a carbon capture and storage boom there.

A controversial technology where carbon dioxide is captured and then stored deep underground, carbon capture and storage, or CCS, is a big part of the Biden administration’s push for a greener planet. And a federal roll out of massive incentives for the nascent industry has spurred a carbon capture gold rush nationwide. In Illinois alone, three pipelines and 22 carbon sequestration wells have already been proposed. But local farmers, landowners, and environmental advocates are skeptical of the suddenly booming business and called on the state for stricter safety regulations. 

That’s what happened at the end of May. 

The state’s lawmakers passed the Safety CCS Act through both chambers at the tail end of the legislative session over the Memorial Day weekend. Illinois governor J.B. Pritzker, a Democrat, has yet to sign the legislation, but has signaled his intention to do so. 

The package includes sweeping regulations for the state’s burgeoning carbon capture industry, including a moratorium of up to two years on pipelines transporting CO2 or until federal authorities pass new pipeline safety guidelines. It’s the first ban of its kind in the Midwest.

“It does offer some really good protections for Illinois that are needed at a time when we are not just anticipating projects — but those projects are moving forward rapidly,” said Pam Richart, the co-founder of the Coalition to Stop CO2 Pipelines, an environmental advocacy group that has been organizing across southern and central Illinois.

The sweeping package of new rules breaks down into three categories: requirements for how carbon emissions must be captured, regulations around pipeline construction, and rules for what happens once the carbon is stored underground. 

The legislation establishes a “do no harm standard,” which would prevent polluting facilities from pumping more emissions to take advantage of the beefed up federal tax credits, according to Jenny Cassel, a senior attorney with Earthjustice, a public interest environmental law organization. 

The new rules do so by requiring that capture facilities store more carbon pollution than they produce. At the same time, power plants and other carbon-intensive industries must keep greenhouse gas emissions below what their permits allow.

“We should not be creating more of a problem than we’re addressing with this,” said Cassel. “And that’s what this mandate will require.” 

Richart’s organization has been calling for a CO2 pipeline moratorium since it was founded in 2022. The moratorium will last two years or until the federal Pipelines and Hazardous Materials Safety Administration finalizes its long-awaited safety rules. The law also empowers Illinois’ public utility commission to complement PHMSA’s incoming rules with expanded safety regulations. 

Lastly, the law fills a giant liability-shaped hole left wide open by existing federal regulations. Companies looking to get into carbon storage need federal permits for Class-VI wells, which are used for the long term storage of carbon dioxide. But Cassel said those permits are lacking: They provide no guidance for who is on the hook if something goes wrong, nor do they settle the question of exactly who owns pore space, which is the geological formation used to store CO2.

The law settles both questions: It requires companies to monitor injection sites for at least 30 years and produce publicly available safety modeling. It also requires companies to pay into a statewide emergency fund. Under the new rules, pore space belongs to its surface owner, and companies interested in utilizing it must pay surface owners a fee.

Proponents of the controversial technology maintain if it pans out as intended, it won’t just be good for the climate — it could be a major economic windfall for Illinois.

“We can create about 14,000 jobs and about a $3 billion economic impact,” according to Mark Denzler, the president and CEO of the Illinois Manufacturers’ Association, citing a report by the University of Illinois’ Prairie Research Institute. 

Denzler said the new regulations aren’t perfect. “We didn’t get everything we wanted. The environmental advocates didn’t get everything they wanted. But it’s a compromise,” he said. Denzler adds that at least now there’s regulatory certainty, and private interest knows what to expect and how to proceed. 

Richart said the rules are a huge step forward for protecting major swaths of Illinois, but she has no plans to stop her advocacy. She points to crucial protections that were left out of the landmark legislation.

“We did not get the protections in place for the Mahomet aquifer,” Richart said of the sole source aquifer that serves over 500,000 people in central Illinois and advocates worry is dangerously close to where companies want to stash CO2.

Richart says her coalition has brought together unlikely allies, and that’s because as carbon capture begins to settle into the Midwest one thing is obvious: “We all recognize there’s a need to protect our land, our public health, and our water,” she said. “All of those things we can agree on.”

This story was originally published by Grist with the headline Illinois Legislature puts the brakes on a carbon capture boom on Jun 7, 2024.


This content originally appeared on Grist and was authored by Juanpablo Ramirez-Franco.

]]>
https://grist.org/accountability/illinois-legislature-puts-the-brakes-on-a-carbon-capture-boom/feed/ 0 478470
50 years of challenge and change: David Robie reflects on a career in Pacific journalism https://www.radiofree.org/2024/06/03/50-years-of-challenge-and-change-david-robie-reflects-on-a-career-in-pacific-journalism/ https://www.radiofree.org/2024/06/03/50-years-of-challenge-and-change-david-robie-reflects-on-a-career-in-pacific-journalism/#respond Mon, 03 Jun 2024 08:47:00 +0000 https://asiapacificreport.nz/?p=102267

This King’s Birthday, the New Zealand Order of Merit recognises Professor David Robie’s 50 years of service to Pacific journalism.

He says he is astonished and quite delighted, and feels quite humbled by it all.

“However, I feel that it’s not just me, I owe an enormous amount to my wife, Del, who is a teacher and designer by profession, but she has given journalism and me enormous support over many years and kept me going through difficult times,” he said.

“There’s a whole range of people who have contributed over the years so it’s sort of like a recognition of all of us. So, yes, it is a delight and I feel quite privileged,” he said.

Starting his career at The Dominion in 1965, Dr Robie has been “on the ground” at pivotal events in regional history, including the bombing of the Rainbow Warrior in 1985 (he was on board the Greenpeace ship on the voyage to the Marshall Islands and wrote the book Eyes of Fire about it), the 1997 Sandline mercenary scandal in Papua New Guinea, and the George Speight coup in Fiji in 2000.

In both PNG and Fiji, Dr Robie and his journalism students covered unfolding events when their safety was far from assured.

David Robie standing with Kanak pro-independence activists and two Australian journalists at Touho, northern New Caledonia, while on assignment during the FLNKS boycott of the 1984 New Caledonian elections. (David is standing with cameras strung around his back).
David Robie standing with Kanak pro-independence activists and two Australian journalists at Touho, north-eastern New Caledonia, while on assignment during the FLNKS boycott of the 1984 New Caledonian elections. (Robie is standing with cameras strung around his back). Image: Wiken Books/RNZ

As an educator, Dr Robie was head of journalism at the University of Papua New Guinea (UPNG) 1993-1997 and then at the University of the South Pacific (USP) in Suva from 1998 to 2002.

Started Pacific Media Centre
In 2007 he started the Pacific Media Centre, while working as professor of Pacific journalism and communications at Auckland University of Technology (AUT). He has organised scholarships for Pacific media students, including scholarships to China, Indonesia and the Philippines, with the Asia New Zealand Foundation.

Running education programmes for journalists was not always easy. While he had a solid programme to follow at UPNG, his start at USP was not as easy.

He described arriving at USP, opening the filing cabinet to discover “…there was nothing there.” It was a “baptism of fire” and he had to rebuild the programme, although he notes that currently UPNG is struggling whereas USP is “bounding ahead.”

He wrote about his experiences in the 2004 book Mekim Nius: South Pacific media, politics and education.

Dr Robie recalled the enthusiasm of his Pacific journalism students in the face of significant challenges. Pacific journalists are regularly confronted by threats and pressures from governments, which do not recognise the importance of a free media to a functioning democracy.

He stated that while resources were being employed to train quality regional journalists, it was really politicians who needed educating about the role of the media, particularly public broadcasters — not just to be a “parrot” for government policy.

Another challenge Robie noted was the attrition of quality journalists, who only stay in the mainstream media for a year or two before finding better-paying communication roles in NGOs.

Independence an issue
He said that while resourcing was an issue the other most significant challenge facing media outlets in the Pacific today was independence — freedom from the influence and control of the power players in the region.

While he mentioned China, he also suggested that the West also attempted to expand its own influence, and that Pacific media should be able set its own path.

“The other big challenge facing the Pacific is the climate crisis and consequently that’s the biggest issue for journalists in the region and they deal with this every day, unlike Australia and New Zealand,” he said.

Dr Robie stated his belief that it was love of the industry that had kept him and other journalists going, that being a journalist was an important role and a service to society, more than just a job.

He expressed deep gratitude for having been given the opportunity to serve the Pacific in this capacity for so long.

This article is republished under a community partnership agreement with RNZ.

The King’s Birthday Honours list:

To be Officers of the New Zealand Order of Merit:

  • The Very Reverend Taimoanaifakaofo Kaio for services to the Pacific community
  • Anapela Polataivao for services to Pacific performing arts

To be a Member of the New Zealand Order of Merit:

  • Bridget Kauraka for services to the Cook Islands community
  • Frances Oakes for services to mental health and the Pacific community
  • Leitualaalemalietoa Lynn Lolokini Pavihi for services to Pacific education
  • Dr David Robie for services to journalism and Asia-Pacific media education

The King’s Service Medal (KSM):

  • Mailigi Hetutū for services to the Niuean community
  • Tupuna Kaiaruna for services to the Cook Islands community and performing arts
  • Maituteau Karora for services to the Cook Islands community

 


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2024/06/03/50-years-of-challenge-and-change-david-robie-reflects-on-a-career-in-pacific-journalism/feed/ 0 477706
Fiji abstains from new UN vote on Palestinian membership bid https://www.radiofree.org/2024/05/13/fiji-abstains-from-new-un-vote-on-palestinian-membership-bid/ https://www.radiofree.org/2024/05/13/fiji-abstains-from-new-un-vote-on-palestinian-membership-bid/#respond Mon, 13 May 2024 10:58:23 +0000 https://asiapacificreport.nz/?p=101082 Asia Pacific Report

The UN General Assembly has voted overwhelmingly to grant Palestine new rights and privileges, calling on the Security Council to reconsider its bid for full UN membership, reports TrimFeed.

The resolution on Friday was opposed by the US, Israel, and seven other countries — four of them island nations from the Pacific — citing concerns over direct negotiations and a two-state solution.

Papua New Guinea, Federated States of Micronesia and Palau were among the countries voting against Palestine.

Fiji Abstains from UN Vote on Palestinian Membership Bid
Fiji abstains from UN vote on Palestinian membership bid. (Note: Australia voted yes, it did not abstain). Image: TrimFeed

The UN General Assembly called on the Security Council to reconsider Palestine’s request to become the 194th member of the United Nations.

The overwhelming vote in favour by 143-9, with 25 abstentions, reflects wide global support for full membership of Palestine in the world body.

The outcome of this vote has significant implications for the Israel-Palestine conflict, as it may influence the trajectory of future negotiations and the prospects for a two-state solution.

Furthermore, the level of international support for Palestinian statehood may impact on the balance of power in the region and beyond.

Fiji, Vanuatu, and Marshall Islands were among the countries that abstained from the vote, alongside the United States, Israel, Argentina, Czechia, Hungary, Micronesia, Nauru, Palau, and Papua New Guinea voting against.

US will veto statehood
The US has made clear that it would block Palestinian membership and statehood until direct negotiations with Israel resolve key issues and lead to a two-state solution.

The vote comes amid escalating violence and rising death tolls on the Palestinian people — more than 35,000 have been killed and almost 79,000 wounded in the War on Gaza

Many countries have expressed outrage at the situation and fears of a major Israeli ground offensive in Rafah.

Riyad Mansour, the Palestinian UN Ambassador, delivered an emotional speech, saying, “No words can capture what such loss and trauma signifies for Palestinians, their families, communities, and for our nation as a whole.”

Israel’s UN Ambassador Gilad Erdan vehemently opposed the resolution, accusing UN member nations of not mentioning Hamas’ October 7 attack that killed 1139 people and he shredded a copy of the UN charter in protest.

US Deputy Ambassador Robert Wood said: “For the US to support Palestinian statehood, direct negotiations must guarantee Israel’s security and future as a democratic Jewish state, and that Palestinians can live in peace in a state of their own.”

While the resolution grants Palestine some new rights and privileges, it reaffirms that it remains a non-member observer state without full UN membership and voting rights in the General Assembly.

Humanitarian ceasefire vote
Palestine became a UN non-member observer state in 2012. The United States vetoed a widely-backed council resolution on April 18 that would have paved the way for full United Nations membership for Palestine.

The General Assembly’s vote calling for a humanitarian ceasefire in Gaza on October 27 and the ongoing violence underscore the urgent need for a resolution to the long-standing crisis.

As the international community remains divided on the issue of Palestinian statehood, the path to lasting peace remains uncertain.

Republished from TrimFeed.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/05/13/fiji-abstains-from-new-un-vote-on-palestinian-membership-bid/feed/ 0 474330
California’s EV wave highlights the challenges ahead for utilities https://grist.org/energy/california-ev-wave-highlights-challenges-for-utilities/ https://grist.org/energy/california-ev-wave-highlights-challenges-for-utilities/#respond Thu, 09 May 2024 08:00:00 +0000 https://grist.org/?p=637192 We take for granted the endless flow of electrons that enable modern life just as we take for granted the air we breathe. Yet, an outage can occur at almost any time, usually when too much demand is placed on some portion of the circuit distributing energy around a neighborhood. As misfortune would have it, the rush to electrify the cars we’ve come to depend upon is increasing the risk of overloads and outages in the years ahead if utilities can’t keep up.

Nowhere is the need for bolstering the grid as pronounced as it is in California. A new study reveals that, as the state chases its audacious goal of ensuring that every new vehicle sold from 2035 on plugs into an outlet, Golden State energy providers will need to perform extensive upgrades to the circuits that shuttle energy around cities. By 2045, California’s three major utilities will need to expand their combined distribution capacity by 25 gigawatts. The researchers found that these upgrades could cost $6 billion to $20 billion for the transformers and other hardware alone. Despite the expense, it will likely benefit, not burden, everyone who uses electricity.

“According to our study, actually, there will be a decrease in electricity price,” said Yanning Li, a doctoral student with a focus on energy systems at the University of California, Davis and the study’s lead author.

Li and her co-author found that the increase in energy consumption — and the revenue that would generate —  will exceed the cost of the upgrades and ultimately reduce rates by up to 6 cents per kilowatt-hour. Energy in California currently costs, on average, just over 31 cents per kilowatt-hour. Yet, in a report with findings aligned with Li’s study, the California Public Utilities Commission pointed out that, depending on how much utilities spend on things like renewables and transmission capacity, the price customers pay could stay the same or even inch upward. Li also acknowledged that many factors may complicate how energy prices change for customers, including energy efficiency programs and rooftop solar.

A shortage of new transformers that plagued the industry even before the pandemic shuddered the entire supply chain complicates the price picture further. As a result of these challenges, “you can see utility lead times go up from an order of months to a year or two plus, and prices going up by a factor of five or greater,” said Killian McKenna, a researcher with the National Renewable Energy Laboratory who specializes in the distribution grid. If transformer costs continue rising as EV adoption pushes more utilities to consider upgrading their grids, then the overall outlay will grow as well — something Li notes in her study.

The companies that make these transformers — which must be tailor-made for the unique needs of a specific application — confront a challenging task in tempering the cost curve. The industry has pushed Congress to invest in the domestic transformer manufacturing and ensure that new federal rules help the industry to overcome supply chain obstacles. 

In the face of long waits and high prices, options exist that can ease the pace and extent of upgrades required to manage increasing loads, said Kristin Eberhard, the senior policy director at Rewiring America, a nonprofit focused on electrification. 

One option is to provide customers with incentives to shift the time or location of charging in a way that reduces peak demand — something Li discusses in her study. This can mean a driver choosing to charge at work instead of at home, or it can mean that, if a utility increases or decreases its energy prices depending on real-time supply and demand data, EV owners can program their car to charge when the rate drops below a prescribed level.

Utilities also can leverage big data. About a decade ago, in preparation for the surge in electric vehicles, Burbank Water and Power, a Los Angeles-area utility, developed a smart grid that allowed it to monitor its equipment with a high level of precision and accuracy, detect potential outages before they occur, and identify other sources of inefficiency and vulnerability. Noticing that some transformers saw significantly less demand than they were designed for while others were chronically taxed to their limits, the utility systematically shuffled components to right-size its distribution system, making it one of the most reliable in the nation. While not a permanent solution, such a project can certainly buy time for the supply chain to catch up with demand.

Of course, while a rapid growth in EV adoption across California and the 14 states that have adopted its EV mandate creates a new and growing source of energy demand, these plug-in vehicles are by no means the only reason distribution networks must be upgraded, which is why the California Public Utilities Commission expects the current plans for distribution maintenance to be able to keep up with the growth in demand from EV charging. Utilities need to perform line maintenance because America’s energy infrastructure has aged. And in some places, power lines need to be buried to make them more resilient and to reduce wildfire risk. But these concurrent dilemmas present an opportunity.

“You can imagine if you have old infrastructure that needs to be put underground and needs to be modernized at the same time that you expand the network, there’s a lot of opportunities for cost savings there,” McKenna said. “And that’s the big opportunity piece that I think folks need to look at.”

This story was originally published by Grist with the headline California’s EV wave highlights the challenges ahead for utilities on May 9, 2024.


This content originally appeared on Grist and was authored by Syris Valentine.

]]>
https://grist.org/energy/california-ev-wave-highlights-challenges-for-utilities/feed/ 0 473820
Microsoft employees spent years fighting the tech giant’s oil ties. Now, they’re speaking out. https://grist.org/accountability/microsoft-employees-spent-years-fighting-the-tech-giants-oil-ties-now-theyre-speaking-out/ https://grist.org/accountability/microsoft-employees-spent-years-fighting-the-tech-giants-oil-ties-now-theyre-speaking-out/#respond Wed, 08 May 2024 08:45:00 +0000 https://grist.org/?p=637074 For nearly a decade, Holly Alpine (née Beale) loved working at Microsoft. Shortly after finishing college, in July 2014, she landed a job there as a technical account manager. Less than four years later, Alpine was leading a team that invests in environmental projects in the communities where Microsoft’s data centers are located. She was also helping organize a worker-led sustainability group called the Sustainability Connected Community, which would grow to nearly 10,000 Microsoft employees worldwide by late 2023.

But at the end of last year, Alpine reached a painful decision: She could no longer ethically work at Microsoft. On January 24, 2024, Alpine sent an email to Microsoft president Brad Smith, CEO Satya Nadella, and several other senior company officials, letting them know why. 

Writing on behalf of herself and a colleague who resigned at the same time, Alpine told the tech giant’s top brass that the two were quitting in “no small part” due to Microsoft’s work for the fossil fuel industry aimed at automating and accelerating oil extraction.

“This work to maximize oil production with our technology is negating all of our good work, extending the age of fossil fuels, and enabling untold emissions,” Alpine wrote in the email. “We are both deeply saddened to be so let down by a company we loved so much.” (Alpine’s colleague asked Grist not to identify them, citing concerns over how it might affect their future employment prospects in the tech industry.)

Alpine’s blunt resignation letter didn’t come out of nowhere. For years, she was one of the faces of an internal, employee-led effort to raise ethical concerns about Microsoft’s work helping oil and gas producers boost their profits by providing them with cloud computing resources and AI software tools. Former Microsoft employees and sources familiar with tech industry advocacy say that, broadly speaking, employee pressure has had an enormous impact on sustainability at Microsoft, encouraging it to announce industry-leading climate goals in 2020 and support key federal climate policies. But convincing the world’s most valuable company to forgo lucrative oil industry contracts proved far more difficult. Eventually, Alpine decided speaking up internally wasn’t enough.

This spring, Alpine spoke with Grist for her first on-the-record interview describing her experience advocating for change inside Microsoft. By speaking out publicly despite her concerns about legal risks, Alpine hopes to place additional pressure on her former employer to address the emissions it is enabling through technology partnerships with fossil fuel companies. Alpine’s account, along with those of other former Microsoft employees, as well as internal documents current and former employees shared with Grist, offer a rare glimpse into how tech industry workers are applying behind-the-scenes pressure to hold their bosses accountable on climate change.

“My resignation was driven in part by the realization that the tech industry, including Microsoft, is increasing the profitability and competitiveness of these fossil fuel giants and perpetuating their existence when they should be phased out,” Alpine told Grist. “It became apparent after years of internal efforts … that Microsoft was unwilling to enact meaningful change.”

A Microsoft spokesperson told Grist that the company’s employees are “core to our sustainability mission” and that executives engage with employee groups, like the Sustainability Connected Community that Alpine helped establish, “on a regular basis as part of an ongoing dialog.”

Microsoft logo over an expo with tech and people
The Microsoft company logo is seen during the 2021 SmartCity Expo World Congress, an international event focused on innovative and sustainable cities. Paco Freire / SOPA Images / LightRocket via Getty Images

“The energy transition is complex and requires moving forward in a principled manner. We believe that technology has an important role to play in helping the industry decarbonize, and that requires balancing the energy needs and industry practices of today while inventing and deploying those of tomorrow,” the spokesperson added. “And we continually monitor our emissions, accelerate progress while increasing our use of clean energy to power data centers, purchasing renewable energy and other efforts to meet our sustainability goals of being carbon negative, water positive, and zero-waste by 2030.”

It’s true that Microsoft is taking numerous steps to address the sustainability of its own operations. But for years, the company has also furnished fossil fuel giants with cloud computing services and specialized software tools powered by machine learning and AI in order to streamline and automate their operations. These digital technologies help companies discover oil faster, squeeze more from existing wells, and boost productivity across their operations in order to stay cost competitive in an age of cheap renewable energy. The digital services market for oil and gas is “immense,” as a 2020 report by oil industry analysts at Barclays put it, with the potential to unlock $150 billion in yearly savings for producers. 

Over the past seven years, Microsoft has announced dozens of new deals with oil and gas producers and oil field services companies, many explicitly aimed at unlocking new reserves, increasing production, and driving up oil industry profits.

In 2017, Alpine and former Microsoft employee Drew Wilkinson came together to organize a small group of workers who shared a passion for sustainability and wanted to make positive changes at Microsoft. In early 2018, that group was folded into the company’s formal Connected Communities program, which provides employees with support and resources to organize volunteer communities based on shared interests. The mission of the Sustainability Connected Community — to make sustainability part of everybody’s job at Microsoft — resonated with workers around the world, and the group quickly grew to several thousand members. 

In the group’s first few years, tech companies’ oil and gas contracts became a focal point for climate-concerned workers across the tech industry. As they organized and began pressuring their bosses to take action on climate, news outlets started calling out Big Tech for creating AI technology aimed at accelerating oil production. 

a group of people holding cardboard protest signs
Sustainability Connected Community employees on Microsoft’s campus in Redmond, Washington, on the day of the 2019 global climate strike. Courtesy of Drew Wilkinson

At an employee town hall in September 2019, a Microsoft worker asked Nadella, the company’s CEO, if he believed that helping oil companies extract more fossil fuels was an ethical use of the company’s technology. Nadella responded by stressing that fossil fuel companies are actively investing in the energy transition, according to a meeting transcript that was manually recorded by employees present at the time. Nadella’s response implied that by helping oil companies be more productive and achieve cost savings, Microsoft was enabling them to put more resources into emissions-reducing innovations. 

“To me his answer was borderline gaslighting,” Wilkinson told Grist. “Those of us in the sustainability community were like, ‘The work you’re doing is not to help them transition. The work you’re doing is to help them find and extract and burn more oil.’”

As concerns over the company’s fossil fuel work mounted, Microsoft was gearing up to make a big sustainability announcement. In January 2020, the company pledged to become “carbon negative” by 2030, meaning that in 10 years, the tech giant would pull more carbon out of the air than it emitted on an annual basis. The news generated a wave of positive media attention and was met with cheers from the Sustainability Connected Community, Wilkinson said.

“The initial reaction was like, ‘Holy sh–t, this is awesome,’” Wilkinson told Grist. “All this pressure we put on the company” — not just around the oil contracts, but sustainability more broadly — “worked.” 

The group’s concerns over Microsoft’s fossil fuel business “died down” for a while, according to Wilkinson: “Those of us who had been organizing on it back in 2019 were like, ‘Let’s wait and see what they do. Let’s give them a chance.’”

A man in a suit with glasses talks in front of an Earth icon
Microsoft CEO Satya Nadella delivers a speech during an event named Microsoft Build AI Day in Jakarta in April 2024. Adek BERRY / AFP voa Getty Images

For nearly two years, employees watched and waited. Following its carbon negative announcement, Microsoft quickly expanded its internal carbon tax, which charges the company’s business groups a fee for the carbon they emit via electricity use, employee travel, and more. It also invested in new technologies like direct air capture and purchased carbon removal contracts from dozens of projects worldwide. But Microsoft’s work with the oil industry continued unabated, with the company announcing a slew of new partnerships in 2020 and 2021 aimed at cutting fossil fuel producers’ costs and boosting production. 

For Alpine, Wilkinson, and other employees, the incongruity between Microsoft’s climate goals and its efforts to enable oil extraction was too big to ignore. In late 2021, a small group of employees involved in the Sustainability Connected Community came together to craft a memo for Microsoft’s leadership calling attention to the climate impact of the company’s fossil fuel business. By customizing its cloud computing technology for oil and gas companies, Microsoft was “enabling far more emissions than we offset or remove,” employees asserted — yet those indirect emissions were not included in the company’s internal carbon accounting. The employees calculated that a single deal with Exxon Mobil to expand production in Texas and New Mexico by up to 50,000 barrels per day could enable carbon emissions adding up to 640 percent of the company’s carbon removal target for 2021.

“We believe we must hold ourselves accountable for the enabled emissions of our technology,” reads the memo, a copy of which was shared with Grist. “Our principled approach and leadership can — and should — set an industry standard.”

The memo goes on to outline more than a dozen recommendations for the company, including advocating for policies that align with 1.5 degrees Celsius (2.7 degrees Fahrenheit) of warming, measuring the emissions increases (or reductions) enabled by Microsoft’s technology, and ceasing to develop custom software tools aimed at increasing oil extraction.

In December 2021, Alpine, along with two other employees who asked Grist not to identify them, held a meeting with Smith and Lucas Joppa, who was then Microsoft’s chief environmental officer, to discuss the memo and present their recommendations. The meeting felt “really positive,” Alpine told Grist, adding that Smith expressed agreement with most of the employees’ recommendations and even appeared surprised that one of them — adding environmental impacts to Microsoft’s internal principles governing the responsible use of AI — hadn’t already been implemented. Smith, Alpine said, even offered to assemble a small team to further explore the concept of environmentally responsible AI principles. A former Microsoft employee familiar with the company’s responsible AI standards told Grist the idea was investigated but never went anywhere; the company’s responsible AI principles still do not include sustainability.

Microsoft and Joppa declined to comment on the meeting.

A man in a suit stands on stage in front of a screen that says Microsoft AI Access Principles with lots of small industry photos in the background
Brad Smith, vice chair and president of Microsoft, speaks at the ”New Strategies for a New Era” keynote at the Mobile World Congress 2024 in Barcelona, Spain, in February 2024. Joan Cros / NurPhoto via Getty Images

Alpine told Grist she left the meeting “hopeful that things would change.” And several months later, in March 2022, Microsoft issued a blog post outlining a series of principles that would guide its future work with the energy industry. The so-called energy principles included expanding work on initiatives focused on low and zero-carbon energy and helping energy customers develop “effective net-zero commitments.” Perhaps most significantly, the principles stated that Microsoft would only develop specialized tools for oil and gas extraction for companies that had agreed to reach net-zero emissions by 2050 or sooner.

“We were really excited when [the principles] were first published,” Alpine told Grist. “They were published, we were told, in part because of our advocacy, which felt really good.” 

But the more Alpine and others asked questions about the principles, the more they felt let down. Microsoft’s pledge to only develop custom fossil fuel extraction technologies for companies with a net-zero target only covered the emissions associated with producing the fuels, known as Scope 1 and Scope 2 emissions. Oil and gas companies weren’t being asked to zero out the emissions associated with burning fossil fuels, known as Scope 3 emissions, which can represent upwards of 85 percent of their total emissions. 

What’s more, oil companies simply had to put forth a net-zero target. Microsoft wasn’t requiring them to do anything to show they were on track to meet it.

Requiring a net-zero target only for Scope 1 and 2 emissions brushes aside the vast majority of the problem, which is the emissions that result from burning the fossil fuel companies’ products,” said Bill Weihl, founder of the nonprofit advocacy group ClimateVoice and a former sustainability director at Facebook and Google. “And a 2050 target, with no intermediate targets that would demonstrate a real commitment to shifting toward clean energy, is essentially meaningless.” Microsoft declined to comment on these concerns.

In November 2022, the Sustainability Connected Community held a call with Darryl Willis, Microsoft’s corporate vice president of energy, to discuss the principles. According to a meeting transcript generated by Microsoft Teams, employees peppered Willis with questions about what the principles meant and how Microsoft was implementing them, including which standards Microsoft would use to judge energy companies’ net-zero pledges, whether Microsoft was bringing up Scope 3 emissions in conversations with energy industry clients, and whether Microsoft had a plan to transition its energy division revenue away from fossil fuels. 

Willis acknowledged that there was “a lack of standards” around Microsoft’s net-zero requirement, and that including emissions from the burning of fossil fuels in companies’ net-zero targets was “going to be a journey.”

“It’s hard, it’s big, it’s complicated,” Willis told employees on the call, according to the transcript. “But I think it’s not unrecognized as a necessity.”

A man in a suit talks to another person in a suit
Darryl Willis, Microsoft’s corporate vice president of energy, left, greets Crown Prince Haakon of Norway at Microsoft Conference Center in April 2024 in Redmond, Washington. Mat Hayward / Getty Images

On the call, Willis committed to providing employees with updates on net-zero requirements as Microsoft continued to implement the principles. He also committed to providing a breakdown of the energy division’s revenue across six different sectors, from oil and gas extraction to low- or zero-carbon energy, as well as an analysis of personnel resources assigned to extractive industries versus renewable energy. Finally, Willis agreed to share a plan for how Microsoft’s energy division would transition its revenue toward low-carbon energy.

Alpine says she held several additional meetings with senior energy division and sustainability officials at Microsoft over the following year, and that Willis joined the Sustainability Connected Community for another call in November 2023. But the promised updates and analyses never materialized. At a December 2023 meeting with energy executives, Alpine says she was told that Microsoft was not responsible for defining net-zero for their customers, as there’s no global standard. (Microsoft declined to share any additional information with Grist concerning its net-zero standards for energy sector clients or any of the other commitments Willis made to employees in 2022.)

A few weeks later, Alpine came across a LinkedIn blog post Microsoft technical architect Azam Zaidi had written in April 2023 about the company’s work on oil and gas industry automation. Microsoft’s cloud services division, Azure, Zaidi asserted, was “at the heart” of the fossil fuel industry’s digital transformation,“enabling faster and more accurate decision-making and unlocking previously inaccessible reserves.”

“With Azure,” Zaidi concluded, “the future of oil and gas exploration and production is brighter than ever.”

“That was really a nail in the coffin for me,” Alpine said. 

In her January resignation email to Smith, Alpine quoted Zaidi’s post directly. “Facilitating a ‘future of oil and gas’ that ‘is brighter than ever’ goes against everything that we stand for, and everything we thought this company stands for as well,” Alpine wrote. 

Melanie Nakagawa, Microsoft’s chief sustainability officer, responded to Alpine the next day, thanking her for her “continued advocacy for sustainability.” Microsoft, Nakagawa wrote, is continuing to “uphold and adhere” to the energy principles, which the Sustainability Connected Community “had a role in shaping.”

A woma in a blazer talks in front of a large screen with web summit logos
Melanie Nakagawa, chief sustainability officer at Microsoft, speaks at Web Summit 2023. Hugo Amaral / SOPA Images / LightRocket via Getty Images

Weihl of ClimateVoice says it’s important to recognize that Microsoft employees “have been very effective internally on several fronts,” including encouraging the company to publicly voice its support for the 2022 Inflation Reduction Act, which earmarked hundreds of billions of federal dollars toward clean energy. Last fall, Weihl said, employees at Microsoft launched an internal campaign targeting the company’s membership in trade associations that oppose climate policy, like the U.S. Chamber of Commerce. Earlier this year Microsoft released an audit of its trade associations showing their alignment (or lack thereof) on climate policy, which Weihl called “a big step toward accountability.” 

Wilkinson, who started his own climate consulting business after he was laid off from Microsoft in early 2023, has maintained contact with many former colleagues in the Sustainability Connected Community. When it comes to addressing the emissions Microsoft enables within the fossil fuel industry, “the work is continuing,” he said. 

Alpine isn’t sure what’s next for her career-wise, but she’s considering focusing on coalition-building around the emissions that tech corporations enable, or sustainable food production. In the meantime, she’s keeping the heat on Microsoft by speaking out publicly about her time there.

Weihl is optimistic about what Microsoft employees — and former employees — can do if they continue to raise a ruckus. 

“The energy principles open a door,” he said. “So do the commitments Willis made. Employee pressure made that happen. It’s now up to employees … to keep the pressure on and make sure those principles and those commitments aren’t just window dressing.”

This story was originally published by Grist with the headline Microsoft employees spent years fighting the tech giant’s oil ties. Now, they’re speaking out. on May 8, 2024.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/accountability/microsoft-employees-spent-years-fighting-the-tech-giants-oil-ties-now-theyre-speaking-out/feed/ 0 473519
The surging demand for data is guzzling Virginia’s water. https://grist.org/technology/surging-demand-data-guzzling-water-ai/ https://grist.org/technology/surging-demand-data-guzzling-water-ai/#respond Wed, 08 May 2024 08:00:00 +0000 https://grist.org/?p=637218 Every email you send has a home. Every uploaded file, web search, and social media post does, too. In massive buildings erected from miles of concrete, stacked servers hum with the electricity required to process and store every byte of information that modern lives rely on.

In recent years, these data centers have been rapidly expanding in the United States. But the gargantuan facilities do more than keep cloud servers running — they also guzzle absurd amounts of water to run cooling systems that protect their components from overheating. Now, as artificial intelligence applications become ubiquitous, they’re using more water than ever.

Northern Virginia is the data center capital of the globe, where more than 300 facilities process nearly 70 percent of the world’s digital information, a job that requires ever more electricity. A utility that serves the area, Dominion Energy, announced during a May 2 earnings call that the industry’s demand for electricity had more than doubled in recent years. The week before that call, Google announced a billion-dollar expansion of three Virginia facilities, following a $35 billion investment by Amazon Web Services in the same area last year. State lawmakers and environmental groups have begun worrying about what this industry boom means for the area’s supply of water.

“Some of these data centers will use resources equivalent to a small city for energy and water,” said Ann Bennett, chair of data center issues in the Sierra Club’s Virginia chapter. “They are being built on a scale that we just haven’t seen in the past.”

Large data centers are resource hogs, using as much as 5 million gallons of water a day. Big companies, such as Google, Microsoft, and Meta, have faced public backlash for sucking up groundwater in regions plagued by droughts, such as in Arizona. But warming temperatures and more heat waves are driving increased water scarcity even in states that are not used to shortages. Last summer and fall, Virginia suffered a monthslong drought. The worst of the dry spell was in the same watershed as “data center alley,” part of Loudoun County where thousands of technology companies make use of the greatest concentration of data centers in the world, in area the size of 100,000 football fields. 

“I think as we look towards climate change and drought, somebody has to start asking these questions about how that impacts water supply and future increasing need,” said Kyle Hart, a program manager of the National Parks Conservation Association in Alexandria, one of the groups involved in the recently formed Virginia Data Center Reform Coalition. Many environmental advocates say that because companies often don’t divulge details about their water use, calling attention to these issues is a challenge.

Amazon data centers being built 50 feet from residential houses in the Loudoun County, Virginia.
Amazon data centers being built 50 feet from residential houses in the Loudoun County, Virginia. Jahi Chikwendiu / The Washington Post via Getty Images

Data centers rank among the top 10 water-consuming industries in the United States, according to a 2021 study from Virginia Tech that looked at their environmental cost. And the next generation of technology will only make these facilities thirstier, as servers that run AI algorithms generate more heat. Compared with traditional computing, the average neural network needs six times more kilowatts per rack. And AI scales exponentially: Large-scale algorithms, used by the likes of Google, Amazon, and Microsoft, consume at least 100 times more computing power and process millions of more data points than simpler kinds of machine learning.

To crunch all those bytes, tech giants are seeking out more data centers. Information about how many servers are being used for AI applications is not publicly available, but according to polling by Forbes, more than half of businesses use AI in some capacity. Amazon Web Services, which has 85 data centers in northern Virginia alone, offers hundreds of AI applications to its clients. 

In Virginia, the scramble to stake land for data centers has some residents concerned. In December, local officials in Prince William County approved a $40 billion land-development project that will turn the county into the world’s largest data center hub. The public debate took 27 hours and drew nearly 400 citizens who raised questions about water availability, effect on the grid, and noise pollution. 

Dozens of climate advocacy and historical preservation organizations formed the Virginia Data Center Reform Coalition at the end of last year over concerns that data centers were being built without prior understanding of the consequences. Julie Bolthouse, director of land use at Piedmont Environmental Council, one of the members of the coalition, says without more information about the resources these facilities consume, it’s difficult to draw a line from data centers to water issues. “We just don’t know. And that’s the biggest problem: We need more transparency around this industry,” she said. “And yet we’re approving them because of the promise of increased revenue.”

“Data centers are really secretive about their operational details,” said Md Abu Bakar Siddik, an engineering doctoral student who co-authored the Virginia Tech study. In 2022, Google became the first company to publicize its water use data in The Dalles, Oregon, following a lengthy legal battle. While a handful of other tech giants, like Microsoft, have followed suit, most companies remain tight-lipped.

Ben Townsend, head of infrastructure and sustainability at Google, says the tech giant has some of the most sustainable data centers in the industry. And if a drought hit the area, Townsend said that Google would work with the local utilities “well in advance to understand what behaviors need to be taken to best support the watershed.”

Last month, Bolthouse learned from a Freedom of Information Act request that data centers serviced by the Loudoun water utility had increased their use of drinking water by more than 250 percent between 2019 and 2023. The documents also showed that water usage peaked during the summer months when the risk of drought is the highest. 

Recycled water is being used at some data centers, such as a Google facility in Colorado. But Siddik says fresh water is usually necessary to keep cooling systems running smoothly. 

Members of the Virginia Data Center Reform Coalition during a press release last December. Hugh Kenny / Piedmont Environmental Council

Shaolei Ren, an engineering professor at University of California, Riverside, said that instead of returning the water to a city wastewater system, like the one connected to your drains at home, many data centers use cooling methods that rely on evaporation. A study he co-authored last year found that just training Open AI’s flagship product, GPT-3, might have directly evaporated more than 700,000 liters of clean fresh water. “Whether the water is recycled, saline, or fresh water, afterwards the water is just gone,” Ren said.

Some Virginia lawmakers have tried to hold companies accountable for their impact on the environment. In February, Josh Thomas, a Democrat in the Virginia House of Delegates, introduced several data center reform bills, including one that would require counties to conduct water studies before approving new developments. Although the legislation made it through the Virginia House in February, the Senate vote was eventually postponed until 2025, effectively killing it. According to Thomas, industry groups lobbied against the bill. By the time he reintroduces it during next year’s legislative session, lawmakers and the Data Center Reform Coalition expect an environmental impact study, commissioned by Virginia, will be complete.

“I think it’s very fair to paint a picture of a very obstinate industry that is opposed to any type of check on its growth,” Thomas said. “If we don’t do something quickly, there may be a tipping point where anything we do might not have an impact.”

This story was originally published by Grist with the headline The surging demand for data is guzzling Virginia’s water. on May 8, 2024.


This content originally appeared on Grist and was authored by Sachi Kitajima Mulkey.

]]>
https://grist.org/technology/surging-demand-data-guzzling-water-ai/feed/ 0 473503
Returning to the 11th Century https://www.radiofree.org/2024/05/01/returning-to-the-11th-century/ https://www.radiofree.org/2024/05/01/returning-to-the-11th-century/#respond Wed, 01 May 2024 21:31:39 +0000 https://dissidentvoice.org/?p=150152 Technology fetishism and dogmatic irresponsibility Without the use of digital devices, instead mainly that analog apparatus known as the pen, I have managed to retain meaningful recollections and engage in analytical reflection for the better part of sixty two years. The manner in which I have worked since the earliest moments I can remember has […]

The post Returning to the 11th Century first appeared on Dissident Voice.]]>

Technology fetishism and dogmatic irresponsibility

Without the use of digital devices, instead mainly that analog apparatus known as the pen, I have managed to retain meaningful recollections and engage in analytical reflection for the better part of sixty two years. The manner in which I have worked since the earliest moments I can remember has engendered the habit of collecting, sorting, observing and evaluating life as I lived it or perceived it by others. It was about 1976 that I was introduced to Russell Ackoff, a professor at the Wharton School in the University of Pennsylvania. He was introducing some basic tenets of systems theory, also outlined in his short book Redesigning the Future. My attendance was accidental since it was my high school physics teacher who took me to this meeting of a regional planning commission where Professor Ackoff had been invited to speak. He was quite droll and said several witting things. However, the most important statement he made was that the purpose of planning was not to produce a plan. Rather planning was a purpose in its own right. What he clearly meant – and that was reiterated in the book I subsequently read – was that planning was an attitude toward the future or toward life and not an industrial process for producing planning documents. The logical consequence of Ackoff’s argument was that the attitude of planning was more important than the creation of machines for churning out plans which would be obsolete before they could be implemented.

Although I only learned about the book ten years later, Joseph Weizenbaum, a professor of computer science at various universities and one of the early researchers in what became the field of artificial intelligence (AI), published Computer Power and Human Reason in the same year. 1976 was one year after the ignominious withdrawal of US Forces from Vietnam, ending more than 30 years of their organized terror in that part of Southeast Asia. The US war against Vietnam was the first testing ground for both systems theory and artificial intelligence. These concepts and the technology developed to apply them were dedicated to surveillance, planning, target acquisition and destruction of the so-called Vietcong infrastructure, i.e. the civilian government that operated in lieu of the criminal state established by the French and US Americans first in Hanoi and then in Saigon after the partition of the country in Geneva. The government agency primarily responsible for planning and implementing the destruction of the popular government of Vietnam was the US Central Intelligence Agency. ICEX was the first name given to what became known as the Phoenix Program. One of the CIA officers interviewed after the war called it “computerized mass murder”. He was referring to the kill lists generated by the PHIS, the Phoenix Information System by which all the data about Vietnamese citizens was collated and evaluated to guide the deployment of the various hunter-killer teams. These teams were composed of local hires, mercenaries, RVN and US military personnel like the infamous Lt. Caley, and other contractors working on behalf of the Agency. Recently there has been mild consternation because of the PHIS legacy product used by the IDF to perform the same kinds of tasks. Lavender is called an AI solution. It is just a later version of the same computer-driven murder planning machine deployed half a century ago.

No one should wonder about this since the Israel Defense Force and the other government agencies in occupied Palestine were actively informed and involved in every stage of these system developments. The systems-driven assassination program was a major component of the US counter-insurgency operations throughout Latin America. Death squads and data processing are natural partners going back to IBM’s computer support to the NSDAP. Artificial intelligence is fundamentally an intelligence operation and part of the systems theory of mechanized murder. It has no other serious application.

Permit me to return to Joseph Weizenbaum. In 1976, many AI fetishists will argue, the technology was simply not very sophisticated. ELIZA and other experimental platforms were primitive and lacked the support of today’s super-computers. I met Weizenbaum shortly before he died. He had returned to Berlin, the city of his birth from which his family had emigrated in the 1930s. He had been invited to talk at the Einstein Forum in Potsdam. Having read the book in the 1980s I was anxious to meet the man who had so politely trashed the AI project. He was introduced by an obnoxious and obsequious American whose other qualities or qualifications left no impression on me. The young man tried to impress the audience by telling us that Joseph Weizenbaum was working at Case Western University when the university decided they needed a computer– and Weizenbaum built it. Normally such calculated flattery would be met with a demurred nod of appreciation. Professor Weizenbaum retorted that Case Western did not need a computer. Moreover no one needed one! That was the last we heard of the young man from Einstein Forum.

Nearly 30 years after his book was published Weizenbaum was just as adamant. Not the Internet (which most people clearly forget is an adjunct to the US atomic warfare system) or the so-called super-computers, whether in the US or China, have altered the premises upon which his argument is based. As recently as today I read some conversation strings about AI in which one author argues:

The result of having this ability is not to contest who is right or wrong, but to learn to be right most of the time so that the AI can successfully maintain a peaceful, harmonious human society. At the end of the day, humans are seriously flawed and cannot be trusted to run this society. Therefore, human management will be phased out.

The author and those who follow his reasoning clearly believe that the strip mining of the Congo and other parts of the world to obtain the rare (and toxic) minerals essential for super-computing capacity along with the impoverishment of all other components of human culture in favour of electrical engineering and computer sciences is the price to be borne by humanity so that computation can fully displace human judgement (and humanity itself). The naive yet thin veneer of modernism and claims to sophistication in the interest of peace and harmony are deeply anti-human, not only in their objectives but at every link in the chain these AI proponents would forge from cradle to grave.

Weizenbaum’s argument was not based on the state of the art in 1976. In fact he was quite clear that faster processors and larger memory storage would no doubt expand the computational capacity of the emerging technology. Instead Weizenbaum insisted that judgement was not computation. In Berlin he reiterated data is not information. Computation is nothing more than the arrangement of data according to rules defining the circulation of electrical power through increasingly complex circuits. Judgement is the result of human activity not electrical circuits. Data is the numerically codification of signals from whatever source. Information is the product of assessing data and responding to it– i.e. giving it meaning. Computers ought not to give meaning– control human responses to the world. Humans ought to control their own responses, even if they use tools like computers to generate and store data for evaluation.

Screenshot

Those who, like the author cited above, imagine that machine intelligence is superior to human intelligence are, to put it mildly, confused about what intelligence is. Claiming– either naively or cynically– that machine intelligence is at least potentially far more suited for regulating human society than humans themselves, these technology fetishists betray their primitive superstitions. Artificial intelligence, which until now has never advanced beyond its intention as a weapon for mass murder and surveillance, is simply the electronic manifestation of the omnipotent deity whose every will must be fulfilled. The desire to see human management rendered obsolete or impossible is the same denial that humans have any personality beyond that defined by the absolute deity of the kind we have known from the 11th century. The dream of the AI cultist is the same dream of the absolutist papacy and the regime that survives in the modern business corporation from which this nightmare arises.

Weizenbaum did not address the whole production chain in which AI needs to be seen. His humanist position stands on its own, especially when the lines are drawn between humanism and its antitheses transhumanism and anti-humanism. Much is made of the enormous progress– far beyond what the carcinogenic West has accomplished– in Chinese AI. Suffice it here to enumerate some of the absurd claims that dominate in the media and among the cult’s prosyletizers.

Computer power rests ultimately upon the power to extract highly toxic minerals from the Earth, until now based on quasi-slave labor in Congo, i.e. central Africa. For the past half-century computer power has cost more than six million lives and the independent development of a country whose territory is roughly the size of the European Union. To this must be added the wars and other violent and corrupt interventions to obtain these resources elsewhere on the planet. Then of course we have the highly dubious benefit of employment redundancies as so-called AI systems replace human labor in the industries and service sectors previously maintained by homo sapiens. Marxists praise AI contributions to the end of alienated labor. However the implementation of AI not only aims to kill people for the IDF or other counter-insurgency agencies but to kill the conditions for economic activity for huge numbers of people at all levels of educational and occupational qualification. The subsequent radical concentration of wealth will hardly be an inducement to enhance living conditions– which after all cannot be rationally calculated except as cost minimizing. (We need not ignore the eugenicism underlying the AI cult too.)

As to the claims that these machines will be infinitely more rational and therefore better managers of human society than humans themselves, the obscenity should be obvious. Any management of humans by agents other than humans can only be accomplished by subjugation of humanity to machines. This is the dream of those whose puerile malice leads them to identify peace with the absence of other people and order with absence of responsibility for their own actions. The nightmare of AI is the dream of what was once called the Dark Ages. Don’t forget, before you leave, to turn out the lights.

The post Returning to the 11th Century first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by T.P. Wilkinson.

]]>
https://www.radiofree.org/2024/05/01/returning-to-the-11th-century/feed/ 0 472537
Have New Zealanders really been ‘misled’ about AUKUS, or is involvement now a foregone conclusion? https://www.radiofree.org/2024/04/20/have-new-zealanders-really-been-misled-about-aukus-or-is-involvement-now-a-foregone-conclusion/ https://www.radiofree.org/2024/04/20/have-new-zealanders-really-been-misled-about-aukus-or-is-involvement-now-a-foregone-conclusion/#respond Sat, 20 Apr 2024 23:12:40 +0000 https://asiapacificreport.nz/?p=100019 ANALYSIS: By Marco de Jong, Auckland University of Technology and Robert G. Patman, University of Otago

When former prime minister Helen Clark spoke out against New Zealand potentially compromising its independent foreign policy by joining pillar two of the AUKUS security pact, Foreign Minister Winston Peters responded bluntly:

On what could she have possibly based that statement? […] And I’m saying to people, including Helen Clark, please don’t mislead New Zealanders with your suspicions without any facts – let us find out what we’re talking about.

Pillar one of AUKUS involves the delivery of nuclear submarines to Australia, making New Zealand membership impossible under its nuclear-free policy.

But pillar two envisages the development of advanced military technology in areas such as artificial intelligence, hypersonic missiles and cyber warfare. By some reckonings, New Zealand could benefit from joining at that level.

Peters denies the National-led coalition government has committed to joining pillar two. He says exploratory talks with AUKUS members are “to find out all the facts, all the aspects of what we’re talking about and then as a country to make a decision.”

But while the previous Labour government expressed a willingness to explore pillar two membership, the current government appears to view it as integral to its broader foreign policy objective of aligning New Zealand more closely with “traditional partners”.

Official enthusiasm
During his visit to Washington earlier this month, Peters said New Zealand and the Biden administration had pledged “to work ever more closely together in support of shared values and interests” in a strategic environment “considerably more challenging now than even a decade ago”.

In particular, he and US Secretary of State Antony Blinken agreed there were “powerful reasons” for New Zealand to engage practically with arrangements like AUKUS “as and when all parties deem it appropriate”.

Declassified documents reveal the official enthusiasm behind such statements and the tightly-curated public messaging it has produced.

A series of joint-agency briefings provided to the New Zealand government characterise AUKUS pillar two as a “non-nuclear” technology-sharing partnership that would elevate New Zealand’s longstanding cooperation with traditional partners and bring opportunities for the aerospace and tech sectors.

But any assessment of New Zealand’s strategic interests must be clear-eyed and not clouded by partial truths or wishful thinking.

NZ Foreign Minister Winston Peters meets US Secretary of State Antony Blinken
Traditional allies . . . NZ Foreign Minister Winston Peters meets US Secretary of State Antony Blinken for talks in Washington on April 11. Image: Getty Images/The Conversation

Beyond great power rivalry
First, the current government inherited strong bilateral relations with traditional security partners Australia, the US and UK, as well as a consistent and cooperative relationship with China.

Second, while the contemporary global security environment poses threats to New Zealand’s interests, these challenges extend beyond great power rivalry between the US and China.

The multilateral system, on which New Zealand relies, is paralysed by the weakening of institutions such as the UN Security Council, Russian expansionism in Ukraine and a growing array of problems which do not respect borders.

Those include climate change, pandemics and wealth inequality — problems that cannot be fixed unilaterally by great powers.

Third, it is evident New Zealand sometimes disagrees with its traditional partners over respect for international law.

In 2003, for example, New Zealand broke ranks with the US (and the UK and Australia) over the invasion of Iraq. More recently, it was the only member of the Five Eyes network to vote in the UN General Assembly for an immediate humanitarian truce in Gaza.

Role of the US
In a robust speech to the UN General Assembly on April 7, Peters said the world must halt the “utter catastrophe” in Gaza.

He said the use of the veto — which New Zealand had always opposed — prevented the Security Council from fulfilling its primary function of maintaining global peace and security.

However, the government has been unwilling to publicly admit a crucial point: it was a traditional ally — the US — whose Security Council veto and unconditional support of Israel have led to systematic and plausibly genocidal violations of international law in Gaza, and a strategic windfall for rival states China, Russia and Iran.

Rather than being a consistent voice for justice and de-escalation, the New Zealand government has joined the US in countering Houthi rebels, which have been targeting commercial shipping in the Red Sea.

A done deal?
The world has become a more complex and conflicted place for New Zealand. But it would be naive to believe the US has played no part in this and that salvation lies in aligning with AUKUS, which lacks a coherent strategy for addressing multifaceted challenges.

There are alternatives to pillar two of AUKUS more consistent with a principled, independent foreign policy, centred in the Pacific, and which deserve to be seriously considered.

On balance, New Zealand involvement in pillar two of AUKUS would represent a seismic shift in the country’s geopolitical stance. The current government seems bullish about this prospect, which has fuelled concerns membership may be almost a done deal.

If true, it would be the government facing questions about transparency.The Conversation

Marco de Jong, lecturer, Law School, Auckland University of Technology and Robert G. Patman, professor of international relations, University of Otago. This article is republished from The Conversation under a Creative Commons licence. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/04/20/have-new-zealanders-really-been-misled-about-aukus-or-is-involvement-now-a-foregone-conclusion/feed/ 0 470834
Staggering quantities of energy transition metals are winding up in the garbage bin https://grist.org/energy/staggering-quantities-of-energy-transition-metals-are-winding-up-in-the-garbage-bin/ https://grist.org/energy/staggering-quantities-of-energy-transition-metals-are-winding-up-in-the-garbage-bin/#respond Thu, 18 Apr 2024 08:45:00 +0000 https://grist.org/?p=635145 To build all of the solar panels, wind turbines, electric vehicle batteries, and other technologies necessary to fight climate change, we’re going to need a lot more metals. Mining those metals from the Earth creates damage and pollution that threaten ecosystems and communities. But there’s another potential source of the copper, nickel, aluminum, and rare-earth minerals needed to stabilize the climate: the mountain of electronic waste humanity discards each year. 

Exactly how much of each clean energy metal is there in the laptops, printers, and smart fridges the world discards? Until recently, no one really knew. Data on more obscure metals like neodymium and palladium, which play small but critical roles in established and emerging green energy technologies, has been especially hard to come by.

Now, the United Nations has taken a first step toward filling in these data gaps with the latest installment of its periodic report on e-waste around the world. Released last month, the new Global E-Waste Monitor shows the staggering scale of the e-waste crisis, which reached a new record in 2022 when the world threw out 62 million metric tons of electronics. And for the first time, the report includes a detailed breakdown of the metals present in our electronic garbage, and how often they are being recycled.

“There is very little reporting on the recovery of metals [from e-waste] globally,” lead report author Kees Baldé told Grist. “We felt it was our duty to get more facts on the table.”

One of those facts is that some staggering quantities of energy transition metals are winding up in the garbage bin. 

Two of the most recyclable metals found abundantly in e-waste are aluminum and copper. Both are slated to play essential roles in the energy transition: Copper wiring is prevalent in a range of low- and zero-carbon technologies, from wind turbines to the power transmission lines that carry renewable energy. Aluminum is also used in some power lines, and as a lightweight structural support metal in electric vehicles, solar panels, and more. Yet only 60 percent of the estimated 4 million metric tons of aluminum and 2 million metric tons of copper present in e-waste in 2022 got recycled. Millions of tons more wound up in waste dumps around the world.

The world could have used those discarded metals. In 2022, the climate tech sector’s copper demand stood at nearly 6 million metric tons, according to the International Energy Agency, or IEA. In a scenario where the world aggressively reduces emissions in order to limit global warming to 1.5 degrees Celsius, copper demand for low-carbon technologies could nearly triple by 2030. 

A lollipop chart comparing the metric tons of critical minerals contained in e-waste versus clean-tech demand for those metals as of 2022. In some instances (like copper), e-waste metals can meet a significant component of demand. In others (like platinum), the gap is wide.
Clayton Aldern / Grist

Aluminum demand, meanwhile, is expected to grow up to 80 percent by 2050 due the pressures of the energy transition. With virgin aluminum production creating over 10 times more carbon emissions than aluminum recycling on average, increased recycling is a key strategy for reining in aluminum’s carbon footprint as demand for the metal rises.

For other energy transition metals, recycling rates are far lower. Take the rare-earth element neodymium, which is used in the permanent magnets found in everything from iPhone speakers to electric vehicle motors to offshore wind turbine generators. Worldwide, Baldé and his colleagues estimated there were 7,248 metric tons of neodymium locked away in e-waste in 2022 — roughly three-quarters of the 9,768 metric tons of neodymium the wind and EV sectors required that year, per the IEA. Yet less than 1 percent of all rare earths in e-waste are recycled due to the immaturity of the underlying recycling technologies, as well as the cost and logistical challenges of collecting rare earth-rich components from technology.

“It’s a lot of hassle to collect and separate out” rare-earth magnets for recycling, Baldé said. Despite the EV and wind energy sectors’ fast-growing rare-earth needs, “there is no push from the market or legislators to recover them.”

The metals present in e-waste aren’t necessarily useful for every climate tech application even when they are recycled. Take nickel. The lithium-ion batteries inside electric vehicles gobble up huge amounts of the stuff — over 300,000 metric tons in 2022. The amount of nickel required for EVs could rise tenfold by 2050, according to the IEA. But while the world’s e-waste contained more than half a million metric tons of nickel in 2022, most of it was inside alloys like stainless steel. Rather than getting separated out, that nickel gets “recycled into other steel products,” said Kwasi Ampofo, the lead metals and mining analyst at energy consultancy BloombergNEF. Some of that recycled steel could wind up in wind turbines and other zero-emissions technologies. But it won’t directly help to fill the much larger nickel demands of the EV battery market. 

In other cases, e-waste might represent a significant supply of a specialized energy transition metal. Despite being present in tiny amounts, certain platinum group metals — found on printed circuit boards and inside medical equipment — are already recycled at high rates due to their value. Some of these metals, such as palladium, are used in the production of catalysts for hydrogen fuel cell vehicles, said Jeremy Mehta, technology manager at the Department of Energy’s Advanced Materials and Manufacturing Technologies Office. “Recycling palladium from e-waste could help meet the growing demand for these metals in fuel cell technologies and clean hydrogen production, supporting the transition to clean energy,” Mehta said.

A bar chart illustrating the estimated fraction of critical minerals recycled from e-waste in 2022 (displayed in percent). While metals like copper and aluminum have rates close to 60 percent, metals like nickel and lithium have rates less than 1 percent.
Clayton Aldern / Grist

For the energy transition to take full advantage of the metals present in e-waste, better recycling policies are needed. That could include policies requiring that manufacturers design their products with disassembly and recycling in mind. Josh Blaisdell, who manages the Minnesota-based metals recycling company Enviro-Chem Inc., says that when a metal like copper isn’t getting recycled, that’s usually because it’s in a smartphone or other small consumer device that isn’t easy to take apart. 

In addition to design-for-recycling standards, Baldé believes metal recovery requirements are needed to push recyclers to recover some of the non-precious metals present in small quantities in e-waste, like neodymium. To that end, in March, the European Council approved a new regulation that sets a goal that by 2030, 25 percent of “critical raw materials,” including rare-earth minerals, consumed in the European Union will come from recycled sources. While this is not a legally binding target, Baldé says it could “create the legislative push” toward metal recovery requirements.

Harvesting more of the metals inside e-waste will be challenging, but there are many reasons to do so, Mehta told Grist. That’s why, last month, the Department of Energy, or DOE, launched an e-waste recycling prize that will award up to $4 million to competitors with ideas that could “substantially increase the production and use of critical materials recovered from electronic scrap.” 

“[W]e need to increase our domestic supply of critical materials to combat climate change, respond to emerging challenges and opportunities, and strengthen our energy independence,”  said Mehta of the DOE. “Recycling e-scrap domestically is a significant opportunity to reduce our reliance on hard-to-source virgin materials in a way that is less energy intensive, more cost effective, and more secure.” 

This story was originally published by Grist with the headline Staggering quantities of energy transition metals are winding up in the garbage bin on Apr 18, 2024.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/energy/staggering-quantities-of-energy-transition-metals-are-winding-up-in-the-garbage-bin/feed/ 0 470369
Stuff to provide news bulletins to replace Newshub on Three https://www.radiofree.org/2024/04/16/stuff-to-provide-news-bulletins-to-replace-newshub-on-three/ https://www.radiofree.org/2024/04/16/stuff-to-provide-news-bulletins-to-replace-newshub-on-three/#respond Tue, 16 Apr 2024 02:58:18 +0000 https://asiapacificreport.nz/?p=99870 By Colin Peacock, RNZ Mediawatch presenter

Warner Bros Discovery has done a deal with Stuff to provide news to replace Newshub. It will keep news on TV channel Three from July 6 and help Three retain some viewers.

It also means important income for Stuff, but it will also stretch the company’s staff, finances and technology.

Stuff will provide a one-hour bulletin each weekday and a half-hour on weekends.

Stuff will also retain a live Newshub website.

Warner Bros Discovery chief executive and Stuff publisher Sinead Boucher confirmed the arrangement at a joint news conference today.

Boucher had told her staff the company will “definitely be bringing some Newshub staff” to produce the 6pm bulletins.

She then told reporters she was unsure how many staff would be required, but it would be fewer than “40 to 50” specified in a “stripped back” proposal from Newshub’s own staff.

‘We are digital first’
“We’re not getting into the TV business. We are a digital first multimedia company building a new 6pm product for Warner Brothers,” she said.

Mediawatch understands many media companies approached WBD with proposals to provide news after the company first proposed the cost-saving closure in late February.

However, by the time of the confirmation earlier this month most of those had been rejected by WBD.

Sky TV was also reported to be in the running. It currently runs a Newshub-produced bulletin at 5:30pm each weekday on the free-to-air channel Sky Open and would require a replacement. It also had plenty of TV production facilities.

Sinead Boucher said a Sky bulletin was not included in the deal, but she hoped there would be discussions about that.

Negotiations were carried out in secret both before and after Warner Bros Discovery (WBD) confirmed the complete closure of Newshub on July 5, leaving the company with no news presence.

Stuff refused to comment during the process and Stuff journalists told RNZ Mediawatch on Monday night they were unaware of an impending announcement.

“We didn’t want to raise expectations for Newshub staff when we weren’t sure what would be required,” Boucher told reporters today, explaining that the deal had been done in haste.

Why do the deal – and what’s it worth?
The money WBD is putting into the deal is confidential but it is certain to be just a fraction of the current cost of running Newshub, which would run to tens of millions of dollars a year.

WBD was clearly determined to carve that cost off the bottom line of its loss-making local operation. The financial benefit for Stuff may not be great taking the set-up and running costs into account.

WBD’s Glen Kyne said neither company would comment on specific commercial details, but when asked about the possible profit margin for Stuff, Boucher said: “Both parties are satisfied with where we have ended up.”

But while the audience for TV news bulletins is declining — and the ad revenue has fallen accordingly — it is still substantial for TVNZ 1 and Three. The “appointment viewing” time of 6pm creates a viewing peak which the TV broadcasters use to hold viewers for the entertainment or factual programmes that follow.

Former Newshub chief Hal Crawford told Mediawatch the overall audience for Three could collapse without news in the evening.

“There’s still a reason that the 1 and the 3 on remotes around the country are worn down. News is the one programme that runs 365 days a year . . .  which the schedule is going to rely on to lead into prime time. So the rest of your schedule is going to dwindle. Ratings are gonna fall off and everything is going to go to pieces,” Crawford told Mediawatch.

“The loss of the newsroom represents the loss of the ability to respond to any event in real time. That is the heart and soul of a traditional TV broadcaster.”

Why Stuff?
Stuff has journalists in more places around the country than any other news publisher.

Stuff’s publisher Sinead Boucher recently told a parliamentary committee it had journalists in 19 locations, even after years of cuts and successive retrenchments.

“We have replatformed our business and have new ways of working. We look at this as starting this bulletin afresh rather than using the broadcast-heavy technology of today,” she told reporters at today’s news conference.

It also has audio and video production facilities at some sites and some senior journalists with TV reporting and presenting experience, such as former Newshub political editor Tova O’Brien, former TV3 current affairs reporter Paula Penfold and senior journalist Andrea Vance.

But Stuff video ventures have not endured. It launched its own free online video platform Play Stuff in mid-2019. It also hired key former TV3 current affairs staff for its own longform video productions but disbanded the Stuff Circuit team earlier this year.

When the Stuff app and website were refreshed recently, short vertical videos were added as a feature, called Stuff Shorts.

Stuff’s weakness has in the past been a dependence on newspaper advertising. It was only last year that Stuff launched its first paywalls for online news for three of its mastheads.

Stuff’s main rival NZME has half the country’s radio networks in addition to newsrooms supplying its newspapers and websites. NZME’s New Zealand Herald has been getting revenue from “premium content” digital subscriptions for four years.

After Boucher acquired Stuff in 2020, Stuff embarked on a digital transition creating more digital audio and video content. It has hired executives from multimedia companies such as Nadia Tolich (ex-NZME now Stuff Digital managing director) and former NZME digital leader Laura Maxwell, now Stuff’s chief executive.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2024/04/16/stuff-to-provide-news-bulletins-to-replace-newshub-on-three/feed/ 0 469981
Pacific nations gradually embracing Elon Musk’s Starlink https://www.radiofree.org/2024/04/09/pacific-nations-gradually-embracing-elon-musks-starlink/ https://www.radiofree.org/2024/04/09/pacific-nations-gradually-embracing-elon-musks-starlink/#respond Tue, 09 Apr 2024 01:49:47 +0000 https://asiapacificreport.nz/?p=99581 By Caleb Fotheringham, RNZ Pacific journalist

Broadband satellite service provider Starlink is now being used in the Pacific but not always legally, for now.

In Vanuatu, border workers are confiscating equipment.

Telecom regulator Brian Winji said people using the service had signed up overseas — likely in Australia and New Zealand — and have brought the equipment into the country.

“They smuggle it into Vanuatu without customs knowing,” Winiji said.

“[Starlink] is not allowed to operate inside Vanuatu without getting a proper licence.”

Starlink was given a temporary restricted licence to operate after severe back-to-back cyclones battered the country. But this was only 20 units given to the National Disaster Management Office and it lapses by the end of April.

Anyone else using Starlink is breaking the rules.

Winji said Starlink had not fully applied to operate in Vanuatu and he does not know when they will be operational.

‘Future competitive environment’
Cook Islands telecommunications regulator chair Bernard Hill said regulators who were banning the use of Starlink might have an “overinflated view” of their importance.

“They feel slightly offended by the fact that this happens without their, ‘oh, you’re allowed to do that’. In deregulated markets, like Cook Islands, like New Zealand, the rule is we let you do it until there’s a good reason to say no,” he said.

“They approached me about a licence 18 months ago, they still haven’t resolved on their local structure but unlike the other regulators, I have authorised the roaming of devices purchased in New Zealand and Australia.”

Hill said he did not know the exact number of people using the service, but it has been enough to have a competitive influence on Vodafone Cook Islands — the nation’s biggest broadband provider.

“I can’t say Vodafone is happy about it but they are at least realistic about this being part of the future competitive environment and I believe they’re doing the best to cope with the challenge that presents them.”

In Fiji, Starlink has already been given a licence to operate but it has not yet set up the service locally.

The Telecommunications Authority chairperson David Eyre said it could be operational by the middle of this month.

He said people who had already brought Starlink equipment into the country would need to switch over to the local service when it was running.

“Starlink is in the process of finalising the operational procedures, processes and what not in preparation for launch, we are encouraged that they’re probably going to launch soon and when I say soon, probably early quarter two,” Eyre said.

Starlink satellite dish
A Starlink satellite dish, an internet constellation operated by SpaceX, is installed on the wall of an apartment building. Image: RNZ/123rf

Delivering high-speed internet
The company, owned by tech billionaire Elon Musk, promises to deliver high-speed internet to the remotest regions by using thousands of satellites orbiting close to the planet.

Hill said Starlink and other low earth orbit satellite companies should be a good fit for the Cook Islands Pa Enua (outer islands) that struggle with poor communications infrastructure.

Eyre said remote connectivity in Fiji was a consideration for giving the licence.

“Coverage in those areas is probably one of the main reasons why we have licensed Starlink here in Fiji, to serve the remotest of the remote.”

In other Pacific nations, Starlink has become or is becoming available.

Papua New Guinea gave the service an operation licence at the beginning of this year and last month Samoa’s cabinet did the same.

Hill said he did not think Starlink and similar companies would make other forms of receiving internet irrelevant.

He said countries needed back up options in case something goes wrong — like the Hunga-Tonga-Hunga-Haa’pai volcano eruption that destroyed Tonga’s internet cable.

Hill said as more Pacific economies rely on internet services, being cut off could be disastrous.

“From the point of view of redundancy and resilience having access to services from overhead as well as undersea is pretty important.”

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/04/09/pacific-nations-gradually-embracing-elon-musks-starlink/feed/ 0 468895
BJP way ahead of others in political ad spending on Meta; proxy pages spent more than official ones https://www.radiofree.org/2024/04/02/bjp-way-ahead-of-others-in-political-ad-spending-on-meta-proxy-pages-spent-more-than-official-ones/ https://www.radiofree.org/2024/04/02/bjp-way-ahead-of-others-in-political-ad-spending-on-meta-proxy-pages-spent-more-than-official-ones/#respond Tue, 02 Apr 2024 03:58:49 +0000 https://www.altnews.in/?p=200348 With the 2024 Lok Sabha elections barely a few weeks away, political campaigns have reached a fever pitch both on the ground and virtually. With India ranking very high on...

The post BJP way ahead of others in political ad spending on Meta; proxy pages spent more than official ones appeared first on Alt News.

]]>
With the 2024 Lok Sabha elections barely a few weeks away, political campaigns have reached a fever pitch both on the ground and virtually. With India ranking very high on the list of countries with the largest number of Internet users in the world, parties have recognized the power of social media and are investing significant sums into their digital campaigns. Consequently, social media advertisements have come up as a crucial means for parties to communicate with the electorate.

Social media platforms like Facebook, Instagram, and others provide advertisers with enough information to run targeted advertisements reaching millions of voters. These targeted advertisements are based on factors such as location, demographics, interests, language, and behaviour, to achieve maximum impact.

Methodology

Alt News filtered data from the top 100 pages that spent the most on political advertisements in the last 90 days, as published by the Meta Ad Library on March 19 of this year. Advertisements run by leaders in their personal capacity were excluded from this data. Rahul Gandhi’s page is included in this data because the disclaimer in the advertisements run by him mentions the name of the Congress party.

Political advertisements on Facebook pages are of two types: official party pages, which share posts and propaganda according to party lines, and other pages that support a particular party through all posts and advertisements but do not have any official affiliation with the party. The expenditures on advertisements by these pages are not accounted for by the Election Commission. We have categorized such pages as proxy pages.

Analysis of this data revealed that the Bharatiya Janata Party (BJP) has spent the most on political advertisements, but the expenditure on advertisements by BJP’s proxy pages exceeded that on their official advertisements.

Party and Government Advertisement Expenditure

BJP (including official and proxy pages)

The Bharatiya Janata Party has spent Rs. 74,407,939 on 10,884 advertisements through official pages and Rs. 84,175,893 through proxy pages.

Page ID Page name Disclaimer Amount spent (INR) Number of ads
121439954563203 Bharatiya Janata Party (BJP) Bharatiya Janata Party (BJP) 61670515 2710
174425559078659 Ulta Chashma – उल्टा चस्मा Ulta Chashmaa 20333950 428
574079826086251 Phir Ek Baar Modi Sarkar phirekbaarmodisarkar.com 18714772 2498
192548643939288 MemeXpress Memes Xpress 6835584 183
206212622563937 Political X-Ray Political X Ray 6107215 161
192548643939288 MemeXpress Ulta Chashmaa 4705068 105
1987488401557504 Mahathugbandhan – महाठगबंधन Mahathugbandhan – महाठगबंधन 4031860 1092
206212622563937 Political X-Ray Ulta Chashmaa 3903094 60
108923581963430 Nirmamata Nirmamata 3892330 1023
1400615623488784 BJP Odisha BJP Odisha 3834648 742
113730508499849 Mudde ki Baat – मुद्दे की बात Mudde Ki Baat 3380826 58
1563310070576778 BJP Andhra Pradesh BJP Andhra Pradesh 2440155 479
107026039151450 మన మోదీ manamodi.com 1926026 843
118554107945158 Badlenge Sarkar, Badlenge Bihar badlengesarkarbadlengebihar.com 1736517 720
162311940465517 BJYM Bharatiya Janata Party 1563415 335
721713357902229 Mahila Morcha BJP Bharatiya Janata Party 1429489 567
100198806388306 The Nation Vibes The Nation Vibes 1307936 717
180161138515248 କେତେଦିନ ସହିବା? / Ketedina Sahibaa? କେତେଦିନ ସହିବା? / Ketedina Sahibaa? 1248691 660
1464414077034071 BJP ST Morcha Bharatiya Janata Party 1112712 336
104136199047870 Bharat Todo Gang – भारत तोड़ो गैंग Bharat Todo Gang – भारत तोड़ो गैंग 1096140 1104
180005665207295 Kannada Sangamam – ಕನ್ನಡ ಸಂಗಮ Ulta Chashmaa 1080219 58
179670408573941 Tamilakam – தமிழகம் Ulta Chashmaa 1035065 60
262572220917547 भाजपा राष्ट्रीय अनुसूचित जाति मोर्चा – BJP SC Morcha Bharatiya Janata Party 617101 375
1542743585786974 Phir Ek Baar Modi Sarkar – Gujarat Phir Ek Baar Modi Sarkar – Gujarat 613048 54
114233898263244 Indian Compass Videos theindiancompass.com 578166 824
283350415665978 Ek Akela Sab Par Bhari Ek Akela Sab Par Bhari 545109 251
244801258708580 Telangana Central – తెలంగాణ సెంట్రల్ Ulta Chashmaa 496639 8
239720143296109 BJP OBC Morcha Bharatiya Janata Party 491213 42
107848055262209 Paltu Paltan – पलटू पलटन Paltu Paltan – पलटू पलटन 482186 290
115529624796206 Hokage Modi Sama Hokage Modi Sama 473771 296
249708958217278 Malabar Central – മലബാർ സെൻട്രൽ Ulta Chashmaa 461084 36
247944825069932 Amaar Sonar Bangla – অমর সোনার বাংলা Ulta Chashmaa 439288 15
Total 158583832 17130

Congress:

The Congress party has spent Rs. 4,298,268 on 614 advertisements.

Page ID Page name Disclaimer Amount spent (INR) Number of ads
294493857651676 Rahul Gandhi Indian National Congress 3585788 158
351616078284404 Indian National Congress Indian National Congress 712480 456
Total 4298268 614

TMC:

The Trinamool Congress, led by Mamata Banerjee, has spent Rs. 6,373,293 on 423 advertisements.

Page ID Page name Disclaimer Amount spent (INR) Number of ads
218904931482352 All India Trinamool Congress All India Trinamool Congress 4758354 310
108777655527686 Trinamoole Nabo Jowar Trinamoole Nabo Jowar 1614939 113
Total 6373293 423

YSRCP:

The Yuvajana Sramika Rythu Congress Party led by Andhra Pradesh chief minister Jagan Mohan Reddy has spent Rs. 16,999,080 on 566 advertisements.

Page ID Page name Disclaimer Amount spent (INR) Number of ads
104211439033799 Jagane Kavali Jagane Kavali 4185707 200
111986798594822 Jagananna Suraksha Jagane Kavali 4017803 95
327120054405346 Jagananna ki Thoduga Jagan Anna ki Thoduga 3087881 139
213811765155120 Memu Siddham Maa Booth Siddham Jaganna Tho Siddham 1857632 24
175139949013002 Jagan: The Juggernaut Team Jagananna 1319338 40
229008700302978 Praja Theerpu Jagananna Tho Siddham 736761 17
105209472211637 Voice of Andhra Voice of Andhra 696989 18
204792022725505 Memantha Siddham Jaganannatho Siddham 657413 21
205049862700772 Jagananna Kosam Siddham Jagananna Tho Siddham 439556 12
Total 16999080 566

Government Advertisements:

During these 90 days, the central government and various state governments collectively spent Rs. 46,140,328 on 1,223 advertisements.

Page ID Page name Disclaimer Amount spent (INR) Number of ads
192856493908290 Ama Odisha Nabin Odisha Ama Odisha Nabin Odisha 18670367 357
775974615850063 MyGovIndia MyGovIndia 14202725 67
418662318473847 Health & Family Welfare Department, Government of Odisha Health & Family Welfare Department, Government of Odisha 3255261 35
138622632667217 Laxmi/ଲକ୍ଷ୍ମୀ Laxmi/ଲକ୍ଷ୍ମୀ 2196960 19
114035533329593 Mo Sarkar 5T MoSarkar 5T 1603172 37
106966414891832 DIPR TN DIPR TN 1275814 93
220329711159719 Other Backward Bahujan Welfare Department, Maharashtra Olio Global AdTech 787092 172
319693278479184 Finance Department, Government of Odisha Finance Department, Government of Odisha 781383 20
179243868596011 ନୂଆ-ଓ ନୂଆ-ଓ 742899 157
1195267553857448 Panchayati Raj & Drinking Water Department, Government of Odisha Panchayati Raj & Drinking Water Department, Government of Odisha 684839 7
113373710385095 कृषी विभाग महाराष्ट्र शासन कृषी विभाग महाराष्ट्र शासन 511328 78
269612676227090 सामान्य प्रशासन विभाग – सामाजिक विकास समन्वय, महाराष्ट्र शासन Olio Global AdTech 504179 24
314832518976952 Fisheries & ARD Department Fisheries & ARD Department 478860 16
102379519139483 जल जीवन मिशन महाराष्ट्र जल जीवन मिशन महाराष्ट्र 445449 141
Total 46140328 1223

Proxy Pages:

Apart from official pages of political parties, a whole bunch of controversial proxy and meme pages have emerged as key players as far as running divisive advertisements is concerned. These pages not only target opposition parties but often amplify contentious narratives. By concealing their true identities, they work on behalf of political parties and publish ads that cannot be run through official channels. These advertisements often use humour, satire, and sarcasm to mock opposition parties and their leaders, and frequently allude to communal angles.

Several pages in this list attack the Opposition and bolster the BJP’s propaganda, with higher expenditures on advertisements compared to BJP’s official pages. Alt News had previously exposed some of these pages in an investigation in April 2023, revealing their direct connections with the BJP.

Page ID Page name Disclaimer Amount spent (INR) Number of ads
174425559078659 Ulta Chashma – उल्टा चस्मा Ulta Chashmaa 20333950 428
574079826086251 Phir Ek Baar Modi Sarkar phirekbaarmodisarkar.com 18714772 2498
192548643939288 MemeXpress Memes Xpress 6835584 183
206212622563937 Political X-Ray Political X Ray 6107215 161
192548643939288 MemeXpress Ulta Chashmaa 4705068 105
1987488401557500 Mahathugbandhan – महाठगबंधन Mahathugbandhan – महाठगबंधन 4031860 1092
206212622563937 Political X-Ray Ulta Chashmaa 3903094 60
108923581963430 Nirmamata Nirmamata 3892330 1023
113730508499849 Mudde ki Baat – मुद्दे की बात Mudde Ki Baat 3380826 58
107026039151450 మన మోదీ manamodi.com 1926026 843
118554107945158 Badlenge Sarkar, Badlenge Bihar badlengesarkarbadlengebihar.com 1736517 720
100198806388306 The Nation Vibes The Nation Vibes 1307936 717
104136199047870 Bharat Todo Gang – भारत तोड़ो गैंग Bharat Todo Gang – भारत तोड़ो गैंग 1096140 1104
180005665207295 Kannada Sangamam – ಕನ್ನಡ ಸಂಗಮ Ulta Chashmaa 1080219 58
179670408573941 Tamilakam – தமிழகம் Ulta Chashmaa 1035065 60
1542743585786970 Phir Ek Baar Modi Sarkar – Gujarat Phir Ek Baar Modi Sarkar – Gujarat 613048 54
114233898263244 Indian Compass Videos theindiancompass.com 578166 824
283350415665978 Ek Akela Sab Par Bhari Ek Akela Sab Par Bhari 545109 251
244801258708580 Telangana Central – తెలంగాణ సెంట్రల్ Ulta Chashmaa 496639 8
107848055262209 Paltu Paltan – पलटू पलटन Paltu Paltan – पलटू पलटन 482186 290
115529624796206 Hokage Modi Sama Hokage Modi Sama 473771 296
249708958217278 Malabar Central – മലബാർ സെൻട്രൽ Ulta Chashmaa 461084 36
247944825069932 Amaar Sonar Bangla – অমর সোনার বাংলা Ulta Chashmaa 439288 15
Total 84175893 10884

Sensitive Advertisements:

Some advertisements run by these pages are so inflammatory and sensitive that political parties refrain from posting them on their official pages. Advertisements run through proxy pages often touch upon divisive issues and exploit prejudices. Alt News reported last month about a political advertisement depicting live murder, which had been viewed more than 30 million times. Upon informing Meta, they acknowledged the violation of their standards and took action against it.

Several advertisements have displayed violence and targeted political adversaries. Examples of some such advertisements are provided below. Meta took action against many of these advertisements later, although by then they had already garnered lakhs of views collectively.

Click to view slideshow.

Pages with similar disclaimers:

Here we have listed pages with identical disclaimers. The disclaimer on all of these pages reads “Ulta Chashmaa.” Upon checking the details of these disclaimers, it is evident that these pages, which target the Opposition and propagate BJP’s agenda, are operated by the same admin. All these pages are included in the list of BJP’s proxy pages. One such page is ‘सीधा चश्मा’ (Straight Glasses), which was created on March 5 and has spent over Rs. 15 Lakh on advertisements so far.

The disclaimer of this page also contains details associated with ‘उल्टा चश्मा’ (Ulta Chashma), meaning this page is also a part of BJP’s proxy pages. One page, ‘Sonar Bangla – সোনার বাংলা,’ has now been deleted. Between March 5 and 7, this page spent Rs. 3,27,000 running nine advertisements on Facebook and Instagram. However, it is noteworthy that when the data of this page is searched in the Meta Ad Library according to date range, only four advertisements are shown. However, upon further inspection, it is revealed that nine advertisements were indeed run by this page. This raises questions about the data released by Meta.

 

Page name Disclaimer
Ulta Chashma – उल्टा चस्मा Ulta Chashmaa
Political X-Ray Ulta Chashmaa
MemeXpress Ulta Chashmaa
Tamilakam – தமிழகம் Ulta Chashmaa
Sidha Chashma – सीधा चश्मा Sidha Chashma – सीधा चश्मा
Amaar Sonar Bangla – অমর সোনার বাংলা Ulta Chashmaa
Kannada Sangamam – ಕನ್ನಡ ಸಂಗಮ Ulta Chashmaa
Telangana Central – తెలంగాణ సెంట్రల్ Ulta Chashmaa
Malabar Central – മലബാർ സെൻട്രൽ Ulta Chashmaa
Sonar Bangla – সোনার বাংলা (This Page has been deleted.) Ulta Chashmaa

 

Political parties are spending large sums on online advertisements, including via proxy pages. This also raises the question of whether parties maintain accounts for advertisements run through proxy pages. This expenditure raises questions about electoral transparency. As the general elections in India draw closer, all parties are increasingly focusing on digital advertisements, with the role of proxy pages also gaining prominence. The lack of transparency and accountability regarding expenditure and content of political advertisements on social media will continue to be a subject of scrutiny in the near future.

The post BJP way ahead of others in political ad spending on Meta; proxy pages spent more than official ones appeared first on Alt News.


This content originally appeared on Alt News and was authored by Abhishek Kumar.

]]>
https://www.radiofree.org/2024/04/02/bjp-way-ahead-of-others-in-political-ad-spending-on-meta-proxy-pages-spent-more-than-official-ones/feed/ 0 467547
French ‘nickel pact’ to bail out New Caledonia’s industry delayed https://www.radiofree.org/2024/03/31/french-nickel-pact-to-bail-out-new-caledonias-industry-delayed/ https://www.radiofree.org/2024/03/31/french-nickel-pact-to-bail-out-new-caledonias-industry-delayed/#respond Sun, 31 Mar 2024 23:11:01 +0000 https://asiapacificreport.nz/?p=99189 By Patrick Decloitre, RNZ Pacific correspondent French Pacific desk

The signing of a “nickel pact” to salvage New Caledonia’s embattled industry has not been signed by the end of March, as initially announced by French Economy Minister Bruno Le Maire.

Le Maire had hinted at the date of March 25 last week, but New Caledonia’s territorial government President Louis Mapou wants to have his Congress endorse the pact before he signs anything.

The Congress is scheduled to put the French pact (worth hundreds of millions of euro) to the debate this Wednesday.

The pact is supposed to bail out New Caledonia’s nickel industry players from a grave crisis, caused by the current state of the world nickel prices and the market dominance of Indonesia which produces much cheaper nickel in large quantities.

The proposed aid agreement, however, has strings attached: in return, New Caledonia’s nickel industry must undertake a far-reaching reform plan to increase its attraction and decrease its production costs.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/03/31/french-nickel-pact-to-bail-out-new-caledonias-industry-delayed/feed/ 0 467308
Investigative author says GCSB-hosted spy system likely to be one used in capture-kill ops https://www.radiofree.org/2024/03/27/investigative-author-says-gcsb-hosted-spy-system-likely-to-be-one-used-in-capture-kill-ops/ https://www.radiofree.org/2024/03/27/investigative-author-says-gcsb-hosted-spy-system-likely-to-be-one-used-in-capture-kill-ops/#respond Wed, 27 Mar 2024 18:20:57 +0000 https://asiapacificreport.nz/?p=98971 Asia Pacific Report

A New Zealand investigative journalist and author says the US spy system hosted by the Government Communications Security Bureau (GCSB) appears to be a controversial intelligence system used in global capture-kill operations.

Writing a commentary for RNZ News today, Nicky Hager, author of Secret Power, a 1996 book on New Zealand’s role in global spy networks, said the controversial and unidentified foreign intelligence operation cited in a report by New Zealand’s Inspector-General of Intelligence and Security (IGIS) last week appeared to be an “intelligence system with a ghostly codename”.

“The IGIS report said the GCSB decision to host a foreign system from 2012-2020 was ‘improper’ and that the GCSB ‘could not be sure the tasking of the capability was always in accordance with… New Zealand law’,” he wrote.

“The Inspector-General said: ‘I have found some of the GCSB’s explanations about how the capability operated and was tasked to be incongruous with information in GCSB records at the time’,” Hager wrote.

But the Inspector-General could not reveal details of the system to the public because they were “highly classified”.

“The name and function of the foreign spy spying equipment, the identity of the ‘foreign partner agency’ and the location of the ‘GCSB facility’ where foreign equipment was hosted all remained secret,” Hager wrote.

Hager argued that the mystery spy equipment appeared strongly to be a top secret US surveillance system that had been installed at the GCSB’s Waihopai base at the same time as the equipment in the IGIS investigation was installed at a “GCSB facility”.

25 years of investigations
Hager has worked as an investigative journalist for the past 25 years, and has been a New Zealand member of the International Consortium of Investigative Journalists for 20 of those years.

In 2018, he was part of a reference group established by the Inspector-General of Intelligence and Security.

Hager wrote that the top secret NSA spy equipment had the ghostly codename “APPARITION” and fitted with all the details presented in the IGIS report.

“APPARITION was owned by and controlled by the US National Security Agency — the world’s largest intelligence gathering agency and head of the Five Eyes intelligence alliance that includes the GCSB,” he wrote.

According to Hager, the NSA internal report, written after the launch of the APPARITION system in 2008, said that it “builds on the success of the GHOSTHUNTER prototype . . .  a tool that enabled a significant number of capture-kill operations against terrorists”.

“Capture-kill operations involve lethal attacks on targeted people using drones, bombs and special forces raids,” wrote Hager.

“Human rights organisations have documented numerous deaths of civilians during capture-kill operations — many of them ‘algorithmically targeted’ by electronic surveillance systems such as APPARITION.

‘Extra-judicial killings’
“They are also criticised as being ‘extra-judicial killings’.”

For decades, protesters had been calling for the GCSB’s iconic radomes at Waihopai Valley spy base in rural Marlborough to be dismantled, saying that when that intelligence was shared with Five Eyes partners — the United States, the United Kingdom, Canada and Australia — it made New Zealand complicit in the military campaigns of those countries, among other criticisms.

However, Anti-Bases Campaign (ABC) organiser Murray Horton said at the time of news of the domes’ redundancy in 2021 was nothing to celebrate, since the base itself would continue to operate at the site, “albeit without its most conspicuous physical features that stick out like dogs’ balls”.

The out-of-date domes were removed in 2022.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/03/27/investigative-author-says-gcsb-hosted-spy-system-likely-to-be-one-used-in-capture-kill-ops/feed/ 0 466565
Exclusive: Meta allowed advertisement glorifying violence, ad shows live shooting https://www.radiofree.org/2024/03/22/exclusive-meta-allowed-advertisement-glorifying-violence-ad-shows-live-shooting/ https://www.radiofree.org/2024/03/22/exclusive-meta-allowed-advertisement-glorifying-violence-ad-shows-live-shooting/#respond Fri, 22 Mar 2024 08:37:23 +0000 https://www.altnews.in/?p=189009 [Trigger Warning: Violent and graphic content] As India gears up for the general elections 2024, the polling for which is to be held in seven phases from April 19 to...

The post Exclusive: Meta allowed advertisement glorifying violence, ad shows live shooting appeared first on Alt News.

]]>
[Trigger Warning: Violent and graphic content]

As India gears up for the general elections 2024, the polling for which is to be held in seven phases from April 19 to June 1, Meta-owned social media platforms like Facebook and Instagram have become a battlefield for political advertisements. Consequently, the focus has also increasingly shifted to the policies of these platforms and their subsequent enforcement.

Political parties in India are known to invest significant financial resources in online advertising in their efforts to capture the voters’ attention. In just the last three months, the expenditure on political advertising has reportedly reached Rs 102.7 crores with the Bharatiya Janata Party (BJP) leading in this expenditure, having officially spent over Rs 37 crore in online advertisements alone. This figure is 300 times more than what the main opposition party spent.

Amidst this extensive digital campaign, we found that a Facebook page named MemeXpress has invested over Rs 1 crore in political advertisements, mainly targeting opposition parties while promoting the BJP. According to the Meta Ad Library, the page was created on 12 December 2023 and has already published more than 310 political advertisements so far.  Furthermore, our investigation found that four of these ads contain the video of the murder of Atiq Ahmed, a former one-time MP, five-time MLA and accused in multiple cases, which clearly violate Meta’s advertising standards against sensational and excessively violent content.

Note: Due to the excessive violence depicted in the content, we have blurred part of the video

The advertisements are captioned, “Just one bulldozer is needed in Bengal; all the stubborn Shahjahans will fall in line.” The upper half of the ad displays a video of the attack on Atiq Ahmed which caused his death, with the text “Criminals in UP” superimposed. Meanwhile, the lower half features a video of Shahjahan Sheikh, the primary accused in the violence in Sandeshkhali, West Bengal, being arrested and brought to Basirhat Court. The text in the lower segment reads “Criminals in West Bengal”. Needless to say, the advertisement glorifies and exalts extrajudicial violence, implying that Sheikh Shahjahan should receive the same treatment as Atiq Ahmed.

Meta’s policies explicitly prohibit content that glorifies violence. Their advertising standards state that advertisements should not contain shocking, sensational or excessively violent content, which also includes graphic crime scenes. Despite this, the ads in question are not only extremely violent but also extols murder. On Facebook, two versions of this advertisement ran uninterrupted from March 8 to March 15, garnering over 20 lakh views

Upon checking the Meta Ad Library, we found that one of these advertisements running on Instagram was flagged and removed on March 9 for not complying with Meta’s advertising standards. On the other hand, another version of the same advertisement continued to run on Instagram till March 16, with a total of more than 10 lakh 45 thousand views.

This ad raises serious questions about Meta’s ability to effectively enforce its policies. With over 3 million views, the continued presence of these controversial ads on the platform highlights the disparity between Meta’s policy and practice, exemplifying their failure during this sensitive, high-stakes election period.

Meta’s negligence in implementing its policies reaffirms the importance of vigilance and accountability by platforms. With the elections fast approaching, the role of digital governance is becoming increasingly important. It is pertinent for platforms like Meta to show their commitment towards ensuring a responsible and safe online space by taking prompt action against content that violates their community standards.

In an email to Meta, we inquired why their moderation system failed in this case. Furthermore, we asked them how they plan to thwart attempts to weaponize their platforms during this election season and what actions would be taken against pages that clearly violate Meta platform rules.

In response to our inquiries, a Meta spokesperson informed us that they reviewed the content flagged by Alt News and found it to be in violation of Meta’s standards, and took action accordingly. However, they did not clarify the nature of the action they had taken.

As political parties start to rely on social media for election campaigning, the necessity for a transparent mandate for policy implementation by the platforms is becoming increasingly evident. The effectiveness of Meta’s policies will be closely scrutinized not only by Indian voters but also by individuals who uphold democratic processes on the global stage.

The post Exclusive: Meta allowed advertisement glorifying violence, ad shows live shooting appeared first on Alt News.


This content originally appeared on Alt News and was authored by Abhishek Kumar.

]]>
https://www.radiofree.org/2024/03/22/exclusive-meta-allowed-advertisement-glorifying-violence-ad-shows-live-shooting/feed/ 0 465539
Tech Official Pushing TikTok Ban Could Reap Windfall From U.S.–China Cold War https://www.radiofree.org/2024/03/21/tech-official-pushing-tiktok-ban-could-reap-windfall-from-u-s-china-cold-war/ https://www.radiofree.org/2024/03/21/tech-official-pushing-tiktok-ban-could-reap-windfall-from-u-s-china-cold-war/#respond Thu, 21 Mar 2024 10:00:00 +0000 https://theintercept.com/?p=463893

Among the many hawks on Capitol Hill, few have as effectively frightened lawmakers over Chinese control of TikTok as Jacob Helberg, a member of the U.S.–China Economic and Security Review Commission. Helberg’s day job at the military contractor Palantir, however, means he stands to benefit from ever-frostier relations between the two countries.

Helberg has been instrumental in the renewed legislative fight against TikTok, according to the Wall Street Journal. “Spearheading the effort to create the bipartisan, bicoastal alliance of China hawks is Jacob Helberg,” the Journal reported in March 2023. The paper noted collaboration between Helberg, previously a policy adviser at Google, and investor and fellow outspoken China hawk Peter Thiel, as well as others in Thiel’s circle. The anti-China coalition, the Journal reported this past week, has been hammering away at a TikTok ban, and Helberg said he has spoken to over 100 members of Congress about the video-sharing social media app.

From his position on the U.S.–China commission — founded by Congress to advise it on national security threats represented by China — Helberg’s rhetoric around TikTok has been as jingoistic as any politician. “TikTok is a scourge attacking our children and our social fabric, a threat to our national security, and likely the most extensive intelligence operation a foreign power has ever conducted against the United States,” he said in a February hearing held by the commission.

Unlike those in government he’s supposed to be advising, however, Helberg has another gig: He is a policy adviser to Alex Karp, CEO of the defense and intelligence contractor Palantir. And Palantir, like its industry peers, could stand to profit from increased hostility between China and the United States. The issue has been noted by publications like Fortune, which noted in September 2023 that Palantir relies heavily on government contracts for AI work — a business that would grow in a tech arms race with China. (Neither the U.S.–China commission nor Palantir responded to requests for comment.)

“It is a clear conflict-of-interest to have an advisor to Palantir serve on a commission that is making sensitive recommendations.”

Experts told The Intercept that there didn’t appear to be a legal conflict that would exclude Helberg from the commission, but the participation of tech company officials could nonetheless create competing interests between sound policymaking and corporate profits.

“It is a clear conflict-of-interest to have an advisor to Palantir serve on a commission that is making sensitive recommendations about economic and security relations between the U.S. and China,” said Bill Hartung, a senior research fellow at the Quincy Institute for Responsible Statecraft and scholar of the U.S. defense industry. “From their perspective, China is a mortal adversary and the only way to ‘beat’ them is to further subsidize the tech sector so we can rapidly build next generation systems that can overwhelm China in a potential conflict — to the financial benefit of Palantir and its Silicon Valley allies.”

Big Tech’s China Hawks

Helberg’s activities are part of a much broader constellation of anti-China advocacy orbiting around Peter Thiel, who co-founded Palantir in 2003 and is still invested in the company. (Helberg’s husband, the venture capitalist Keith Rabois, spent five years as a partner at Thiel’s Founders Fund). Thiel, also an early investor in Pentagon aerospace contractor SpaceX and weaponsmaker Anduril, has for years blasted the Chinese tech sector as inherently malignant — claims, like Helberg’s, made with more than trace amounts of paranoia and xenophobia.

Thiel’s remarks on China are characteristically outlandish. Speaking at the MAGA-leaning National Conservatism Conference in 2019, Thiel suggested, without evidence, that Google had been “infiltrated by Chinese intelligence” — and urged a joint CIA–FBI investigation. In 2021, at a virtual event held by the Richard Nixon Foundation, Thiel said, “I do wonder whether at this point, bitcoin should also be thought [of] in part as a Chinese financial weapon against the U.S.”

For Thiel’s camp, conflict with China is both inevitable and necessary. U.S.–China research cooperation on artificial intelligence, he says, is treacherous, and Chinese technology, generally, is anathema to national security. As he inveighs against Chinese tech, Thiel’s portfolio companies stand by with handy solutions. Palantir, for instance, began ramping up its own Made-in-the-USA militarized AI offerings last year. Anduril executives engage in routine fearmongering over China, all the while pitching their company’s weapons as just the thing to thwart an invasion of Taiwan. “Everything that we’re doing, what the [Department of Defense] is doing, is preparing for a conflict with a great power like China in the Pacific,” Anduril CEO Palmer Luckey told Bloomberg TV last year.

Palantir is making a similar pitch. In a 2023 quarterly earnings call, Palantir Chief Operations Officer Shyam Sankar told investors that the company had China in mind as it continues to grow its reach into the Western Pacific. On another Palantir earnings call, Karp, the company’s CEO and Helberg’s boss, told investors the more dangerous and real the Chinese threat gets, “the more battle-tested and real your software has to be. I believe it’s about to get very real. Why? Because our GDP growth is significantly better than China’s.” Even marketing images distributed by Palantir show the company’s software being used to track Chinese naval maneuvers in the South China Sea.

Thiel is not alone among Silicon Valley brass. At a February 2023 panel event, a representative of America’s Frontier Fund, a national security-oriented technology investment fund that pools private capital and federal dollars, said that a war between China and Taiwan would boost the firm’s profits by an order of magnitude. Private sector contributors to America’s Frontier Fund include both Thiel and former Google chair Eric Schmidt, whose China alarmism and defense-spending boosterism rivals Thiel’s — and who similarly stands to personally profit from escalations with China.

TikTok, Bad! China, Bad!

Repeated often enough, anti-TikTok rhetoric from tech luminaries serves to reinforce the notion that China is the enemy of the U.S. and that countering this enemy is worth the industry’s price tags — even if the app’s national security threat remains entirely hypothetical.

“Just like tech had to convince people that crypto and NFTs had intrinsic value, they also have to convince the Pentagon that the forms of warfare that their technologies make possible are intrinsically superior or fill a gap,” Shana Marshall, an arms industry scholar at George Washington University’s Elliott School of International Affairs, told The Intercept.

Marshall said bodies like the U.S.–China Economic and Security Review Commission can contribute to such conflicts because advisory boards that encourage revolving-door moves between private firms and government help embed corporate interests in policymaking. “In other words,” she said, “it’s not a flaw in the program, it’s an intentional design element.”

“The tensions with China/Taiwan are tailor made for this argumentation,” Marshall added. “You couldn’t get better cases — or better timing — so grifters and warmongers like Helberg and Schmidt are going to be increasingly integrated into Pentagon planning and all aspects of regulation.”

Forcing divestiture or banning TikTok outright would not trigger armed conflict between the U.S. and China on its own, but the pending legislation to effectively ban the app is already dialing up hostility between the two countries. After the House’s overwhelming support last week of the bill to force the sale of the app from Chinese hands, the Financial Times reported that Chinese foreign ministry spokesperson Wang Wenbin accused the U.S. of displaying a “robber’s logic” through legislative expropriation. An editorial in the Chinese government mouthpiece Global Times decried the bill as little more than illegal “commercial plunder” and urged TikTok parent company ByteDance to not back down.

“There are a lot of defense contractors that are discussing the China threat with an eye out on their bottom line.”

Of course, self-interest is hardly a deviation from the norm in the military-industrial complex. “This is the way Washington works,” said Scott Amey, general counsel at the Project on Government Oversight, a watchdog group. “There are a lot of defense contractors that are discussing the China threat with an eye out on their bottom line.”

Although it’s common for governmental advisory boards like Helberg’s U.S.–China commission to enthusiastically court the private sector, Amey said it would be important for Helberg to make clear when making policy recommendations whether he’s speaking as an adviser to Palantir’s CEO or to Congress, though the disclosure wouldn’t negate Helberg’s personal interest in a second Cold War. Such disclosures have been uneven: While Helberg’s U.S.–China commission bio leads with his Palantir job, the company went unmentioned in the February hearing. Given the ongoing campaign to pass the TikTok bill, Helberg’s lobbying “certainly raises some red flags,” Amey said.

He said, “The industry is hawkish on China but has a financial interest in the decisions that the executive branch or Congress make.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2024/03/21/tech-official-pushing-tiktok-ban-could-reap-windfall-from-u-s-china-cold-war/feed/ 0 465518
Nuclear submarines may never appear, but AUKUS is already in place https://www.radiofree.org/2024/03/20/nuclear-submarines-may-never-appear-but-aukus-is-already-in-place/ https://www.radiofree.org/2024/03/20/nuclear-submarines-may-never-appear-but-aukus-is-already-in-place/#respond Wed, 20 Mar 2024 05:13:45 +0000 https://asiapacificreport.nz/?p=98567 By Paul Gregoire in Sydney

One year since Prime Minister Anthony Albanese went to San Diego to unveil the AUKUS deal the news came that the first of three second-hand Virginia class nuclear-powered submarines supposed to arrive in 2032 may not happen.

Former coalition prime minister Scott Morrison announced AUKUS in September 2021 and Albanese continued to champion the pact between the US, Britain and Australia.

Phase one involves Australia acquiring eight nuclear-powered submarines as tensions in the Indo-Pacific are growing.

Concerns about the submarines ever materialising are not new, despite the US passing its National Defence Bill 2024 which facilitates the transfer of the nuclear-powered warships.

However, the Pentagon’s 2025 fiscal year budget only set aside funding to build one Virginia submarine. This affects the AUKUS deal as the US had promised to lift production from around 1.3 submarines a year to 2.3 to meet all requirements.

Australia’s acquisition of the first of three second-hand SSNs were to bridge the submarine gap, as talk about a US-led war on China continues.

US Democratic congressperson Joe Courtney told The Sydney Morning Herald on March 12 the US was struggling with its own shipbuilding capacity, meaning promises to Australia were being deprioritised.

Production downturn
Courtney said that the downturn in production “will remove one more attack submarine from a fleet that is already 17 submarines below the navy’s long-stated requirement of 66”.

The US needs to produce 18 more submarines by 2032 to be able to pass one on to Australia.

After passing laws permitting the transfer of nuclear technology, the deal is running a year at least behind schedule.

Greens Senator David Shoebridge said on X that “When the US passed the law to set up AUKUS they put in kill switches, one of which allowed the US to decide not [to] transfer the submarines if doing so would ‘degrade the US undersea capabilities’”.

Pat Conroy, Labor’s Defence Industry Minister, retorted that the government was confident the submarines would appear.

The White House seems unfazed; it would have been aware of the problems for some time.

Meanwhile the USS Annapolis, a US nuclear-powered submarine (SSN) has docked in Boorloo/Perth.

AUKUS still under way
Regardless of whether Australia acquires any nuclear-powered vessels, the rest of the AUKUS deal, including interoperability with the US, is already underway.

Andrew Hastie, Liberal Party spokesperson, confirmed that construction at HMAS Stirling will start next year for “Submarine Rotational Force-West (SRF-West)”, the permanent US-British nuclear-powered submarine base in WA, which is due to be completed in 2027.

SRF-West includes 700 US army personnel and their families being stationed in WA. If the second-hand nuclear submarines do not materialise, the US submarines will be on hand.

SRF-West may also serve as an alternative to the five British-designed AUKUS SSNs, slated to be built in Kaurna Yerta/Adelaide over coming decades.

Australia respects the Pentagon’s warhead ambiguity policy, meaning that any US military equipment stationed here could be carrying nuclear weapons: we will never know.

Shoebridge said on March 13 he was entering a hearing to decide where the AUKUS powers can dump their nuclear waste. Local waste dumps are being considered, as the US and Britain do not have permanent radioactive waste dumps.

The waste to be dumped is said to have a low-level radioactivity. However, as former Senator Rex Patrick pointed out, SSNs produce high-level radioactive waste at the end of their shelf lives that will need to be stored somewhere, underground, forever.

‘Radioactive waste management’
The Australian Naval Nuclear Power Safety Bill 2023, tabled last November, allows for the AUKUS SSNs to be constructed and also provides for “a radioactive waste management facility”.

The Australian public is spending US$3 billion on helping the US submarine industrial base expand capacity. An initial US$2 billion will be spent next year, followed by $100 million annually from 2026 through to 2033.

The Pentagon has budgeted US$4 billion for its submarine industry next year, with an extra US$11 billion over the following five years.

The removal of the Virginia subs, and even the AUKUS submarines from the agreement, would be in keeping with the terms of the 2014 Force Posture Agreement, signed off by then prime minister Tony Abbott.

As part of the Barack Obama administration’s 2011 “pivot to Asia”, the US-Australia Force Posture Agreement allows for 2500 Marines to be stationed in the Northern Territory.

It sets up increasing interoperability between both countries’ air forces and allows the US unimpeded access to dozens of “agreed-to facilities and areas”.

These agreed bases remain classified.

US takes full control
However, as the recent US overhaul of RAAF Base Tindall in the NT reveals, when the US decides to do that it takes full control.

Tindall has been upgraded to allow for six US B-52 bombers that may be carrying nuclear warheads.

US laws that facilitate the transfer of Virginia-class submarines also make clear that as Australia is now classified as a US domestic military source this allows the US privileged access to critical minerals, such as lithium.

Paul Gregoire writes for Sydney Criminal Lawyers where a version of this article was first published. The article has also been published at Green Left magazine and is republished with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2024/03/20/nuclear-submarines-may-never-appear-but-aukus-is-already-in-place/feed/ 0 465108
Mediawatch: TV news meltdown – what will NZ government do? https://www.radiofree.org/2024/03/17/mediawatch-tv-news-meltdown-what-will-nz-government-do/ https://www.radiofree.org/2024/03/17/mediawatch-tv-news-meltdown-what-will-nz-government-do/#respond Sun, 17 Mar 2024 03:22:46 +0000 https://asiapacificreport.nz/?p=98374 RNZ MEDIAWATCH: By Colin Peacock, RNZ Mediawatch presenter

The future of Aotearoa New Zealand television news and current affairs is in the balance at the two biggest TV broadcasters — both desperate to cut costs as their revenue falls.

The government says it is now preparing policy to modernise the media, but they do not want to talk about what that might be — or when it might happen.

On Monday, TVNZ’s 1News was reporting — again — on the crisis of cuts to news and current affairs in its own newsroom.

The extent of discontent about the proposed cuts had been made clear to chief executive Jodi O’Donnell at an all-staff meeting that day.

The news of cuts rocked the state-owned broadcaster when they were announced four days earlier.

In fact, it rocked the entire media industry because only one week earlier the US-based owners of Newshub had announced a plan to close that completely by mid year.

No-one was completely shocked by either development given the financial strife the local industry is known to be in.

But it seems no-one had foreseen that within weeks only Television New Zealand and Whakaata Māori would be offering national news to hundreds of thousands of New Zealanders who still tune in at 6pm or later on demand.

Likewise the prospect of no TV current affairs shows (save for those on Whakaata Māori) and no consumer affairs watchdog programme Fair Go, three years shy of a half century as one of NZ most popular local TV shows of all time.

Yvonne Tahana’s report for 1News on Monday pointed out Fair Go staff were actually working on the next episode when that staff meeting was held on Monday.

All this raised the question — what is a “fair go” according to the government, given TVNZ is state-owned?

Media-shy media minister?
After the shock announcements last week and the week before, Minister of Media and Communications Melissa Lee seemed not keen to talk to the media about it.

The minister did give some brief comments to political reporters confronting her in the corridors in Parliament after the Newshub news broke. But a week went by before she spoke to RNZ’s Checkpoint about it — and revealed that in spite of a 24-hour heads-up from Newhub’s offshore owner — Warner Bros Discovery — Lee did not know they were planning to shut the whole thing.

By the time the media minister was on NewstalkZB’s Drive show just one hour later that same day, the news was out that TVNZ news staff had been told to “watch their inboxes” the next morning.

In spite of the ‘no surprises’ convention, the minister said she was out of the loop on that too.

After that, it was TV and radio silence again from the minister in the days that followed.

“National didn’t have a broadcasting policy. We’re still not sure what they’re looking at. She needs to basically scrub up on what she’s going to be saying on any given day and get her head around her own portfolio, because at the moment she’s not looking that great,” The New Zealand Herald’s political editor Claire Trevett told RNZ’s Morning Report at the end of the week.

By then the minister’s office had told Mediawatch she would speak with us on Thursday. Good news — at the time.

Lee has long been the National Party’s spokesperson on media and broadcasting and Mediawatch has been asking for a chat since last December.

Last Sunday, TVNZ’s Q+A show told viewers Lee had declined to be interviewed for three weeks running.

Frustration on social media
At Newshub — where staff have the threat of closure hanging over them — The AM Show host Lloyd Burr took to social media with his frustration.

“There’s a broadcasting industry crisis and the broadcasting minister is MIA. We’ve tried for 10 days to get her on the show to talk about the state of it, and she’s either refused or not responded. She doesn’t even have a press secretary. What a shambles . . . ”

A switch of acting press secretaries mid-crisis did seem to be a part of the problem.

But one was in place by last Monday, who got in touch in the morning to arrange Mediawatch’s interview later in the week.

But by 6pm that day, they had changed their minds, because “the minister will soon be taking a paper to cabinet on her plan for the media portfolio”.

“We feel it would better serve your listeners if the minister came on at a time when she could discuss in depth about the details of her plan for the future of media, as opposed to the limited information she will be able to provide this Thursday,” the statement said.

“When the cabinet process has been completed, the minister is able to say more. That time is not now.”

The minister’s office also pointed out Lee had done TV and broadcast interviews over the past week in which she had “essentially traversed as much ground as possible right now”.

What clues can we glean from those?

Hints of policy plans
Even though this government is breaking records for changes made under urgency, it seems nothing will happen in a hurry for the media.

“I have been working with my officials to understand and bring the concerns from the sector forward, to have a discussion with my officials to work with me to understand what the levers are that the government can pull to help the sector,” Lee told TVNZ Breakfast last Monday.


Communication and Media Minister Melissa Lee on plans for the ailing industry. Video: 1News

A slump in commercial revenue is a big part of broadcasters’ problems. TVNZ’s Anna Burns Francis asked the minister if the government might make TVNZ — or some of its channels — commercial-free.

“I think we are working through many options as to what could potentially help the sector rather than specifically TVNZ,” Lee replied.

One detail Lee did reveal was that the Broadcasting Act 1989 was in play — something the previous government also said was on its to do list but did not get around to between 2017 and 2023.

It is a pretty broad piece of legislation which sets out the broadcasting standards regime and complaints processes, electoral broadcasting and the remit of the government broadcasting funding agency NZ On Air.

But it is not obvious what reform of that Act could really do for news media sustainability.

Longstanding prohibitions
The minister also referred to longstanding prohibitions on TV advertising on Sunday mornings and two public holidays. Commercial broadcasters have long called for these to be dumped.

But a few more slots for whiteware and road safety ads is not going to save news and current affairs, especially in this economy.

That issue also came up in a 22-minute-long chat with The Platform, which the minister did have time for on Wednesday.

In it, host Sean Plunket urged the minister not to do much to ease the financial pain of the mainstream media, which he said were acting out of self-interest.

He was alarmed when Lee told him the playing field needed to be leveled by extending regulation applied to TV and radio to online streamers as well — possibly through Labour’s Fair Digital News Bargaining Bill.

“Are you seriously considering the government imposing tax on certain large companies and paying that money directly to your chosen media companies that are asking for it?” Plunket asked.

“I have actually said that I oppose the bill but what you have to do as the minister is listen to the sector. They might have some good ideas.”

When Plunket suggested Lee should let the market forces play out, Lee said that was not desirable.

Some of The Platform’s listeners were not keen on that, getting in touch to say they feared Lee would bail the media out because she had “gone woke”.

That made the minister laugh out loud.

“I’m so far from woke,” she assured Sean Plunket.

A free-to-air and free-to-all future?
At the moment, TVNZ is obliged to provide easily accessible services for free to New Zealanders.

TVNZ’s Breakfast show asked if that could change to allow TVNZ to charge for its most popular or premium stuff?

The response was confusing:

“Well ready accessibility would actually mean that it is free, right? Or it could be behind a paywall — but it could still be available because they have connectivity,” Lee replied.

“A paywall would imply that you have to pay for it — so that wouldn’t be accessible to all New Zealanders, would it?” TVNZ’s Anna Burns-Francis asked.

“For a majority, yes — but free to air is something I support.”

When Lee fronted up on The AM Show for 10 minutes she said she was unaware they had been chasing a chat with her for 10 days.

Host Melissa Chan-Green bridled when the minister referred to the long-term decline of linear real time TV broadcast as a reason for the cuts now being proposed.

“To think that Newshub is a linear TV business is to misunderstand what Newshub is, because we have a website, we have an app, we have streaming services, we’ve done radio, we’ve done podcasts — so how much more multimedia do you think businesses need to be to survive?

“I’m not just talking about that but there are elements of the Broadcasting Act which are not a fair playing field for everyone. For example, there are advertising restrictions on broadcasters where there are none on streamers,” she said.

Where will the public’s money go?
On both Breakfast and The AM Show, Lee repeated the point that the effectiveness of hundreds of millions of dollars of public money for broadcasting is at stake — and at risk if the broadcasters that carry the content are cut back to just a commercial core.

“The government actually puts in close to I think $300 million a year,” Lee said.

“Should that funding be extended to include the client of current affairs programs are getting cut?” TVNZ’s Anna Burns-Francis asked her.

“I have my own views as to what could be done but even NZ on Air operates at arm’s length from me as Minister of Media and Communications,” she replied.

It is only in recent years that NZ On Air has been in the business of allocating public money to news and journalism on a contestable basis.

When the system was set up in 35 years ago that was out of bounds for the organisation, because broadcasters becoming dependent on the public purse was thought to be something to avoid — because of the potential for political interference through either editorial meddling or turning off the tap.

That began to break down when TV broadcasters stopped funding programs about politics which did not pull a commercial crowd — and NZ started picking up the tab from a fund for so-called special interest shows which would not be made or screened in a wholly-commercial environment.

Online projects with a public interest purpose have also been funded by in recent years in addition to programmes for established broadcasters — as NZ on Air declared itself “platform agnostic”.

Public Interest Journalism Fund
In 2020, NZ on Air was given the job of handing out $55 million over three years right across the media from the Public Interest Journalism Fund.

That was done at arm’s length from government, but in opposition National aggressively opposed the fund set up by the previous Labour government.

Senior MPs — including Lee — claimed the money might make the media compliant — and even silent — on anything that might make the then-Labour government look bad.

It would be a big surprise if Lee’s policy plan for cabinet includes direct funding for the news and current affairs programmes which could vanish from our TV screens and on-demand apps within weeks.

This week, NZ on Air chief executive Cameron Harland responded to the crisis with a statement.

“We are in active discussions with the broadcasters and the wider sector to understand what the implications of their cost cutting might be.

“This is a complex and developing situation and whilst we acknowledge the uncertainty, we will be doing what we can to ensure our funding is utilised in the best possible ways to serve local audiences.“

They too are in a holding pattern waiting for the government to reveal its plans.

But as the minister herself said this week, the annual public funding for media was substantial — and getting bigger all the time as the revenues of commercial media companies shrivelled.

And whatever levers the minister and her officials are thinking of pulling, they need to do decisively — and soon.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2024/03/17/mediawatch-tv-news-meltdown-what-will-nz-government-do/feed/ 0 464515
DRC Bleeds Conflict Minerals for Green Growth https://www.radiofree.org/2024/03/15/drc-bleeds-conflict-minerals-for-green-growth/ https://www.radiofree.org/2024/03/15/drc-bleeds-conflict-minerals-for-green-growth/#respond Fri, 15 Mar 2024 20:11:11 +0000 https://dissidentvoice.org/?p=148915 Activists in Goma denounce state and international inaction after savage attacks by a Rwandan-backed militia. Photo: LuchaCongo.org “Inside every phone is the blood of a Congolese person.” These words from Pascal Mirindi, a student and activist in Goma, Democratic Republic of Congo (DRC), encapsulate the deadly links between war, the plunder of resources, and climate […]

The post DRC Bleeds Conflict Minerals for Green Growth first appeared on Dissident Voice.]]>

Activists in Goma denounce state and international inaction after savage attacks by a Rwandan-backed militia. Photo: LuchaCongo.org

Inside every phone is the blood of a Congolese person.” These words from Pascal Mirindi, a student and activist in Goma, Democratic Republic of Congo (DRC), encapsulate the deadly links between war, the plunder of resources, and climate breakdown.

Nowhere is this more devastatingly clear than in the DRC, where M23 militias financed by the Rwandan government, which is in turn funded by the UK, USA, and many more, are committing mass murder and ecological destruction as they surge into the east of the country.

On the rare occasion that the mainstream media covers the DRC, it is portrayed as a poor nation with a “complicated” conflict-riven backstory. But this framing omits the catalyst for the region’s violence since its colonization – resource robbery.

“The conflict, which has persisted in the east of the DRC for almost 30 years, and is the deadliest since the Second World War, is mainly economic,” explains Nobel Laureate Dr. Denis Mukwege. Since 1996, more than 10 million people have been killed, with countless more being displaced, raped, or forcibly recruited (even as children) into armed groups. “The link between exploitation and the illegal trade in minerals is recognized as a root cause.”

On International Women’s Day, Congolese activists in the city of Beni demand justice for the women suffering violence in DRC. Photo: @luchaRDC

Rich nation, poor nation

The current fighting has now displaced more than 10 million people, triggering another wave of indiscriminate killings, mass rape, and disease, while militia armies ransack the country’s rainforests with illegal logging and poaching.

Though the Congolese people have long been vampirized by extractivism, with over 70% living on less than $1.90/day, the DRC is not a poor nation – it is a robbed nation. In fact, the DRC is considered the world’s richest country in terms of wealth in natural resources.

DRC’s fossil fuels have been profitably exploited by foreign corporations and co-opted local elites for decades, leaving communities like Muanda, which is uncoincidentally both the original site of fossil fuel extraction and the poorest city in the country, scarred by dispossession, disease, and environmental degradation.

After the deadly Kalehe flood in South Kivu province last May, which killed hundreds and affected another 50,000 people in the flood zone, student activists from Extinction Rebellion Goma University launched the Pétrole Non Merci campaign in order to highlight that the DRC is already suffering the effects of climate catastrophes and that this suffering will only increase if the fossil fuel industry’s expansion is not stopped.

The students traveled thousands of miles across the width of the country, mobilizing communities to oppose the sale of 30 new oil and gas blocks, most of which overlap protected areas and would be transported by the ecocidal EACOP pipeline. A major focus of their efforts has been to facilitate ongoing educational exchanges on how to claim their rights through nonviolence and to hold officials and corporations accountable to local communities.

The continued work of building grassroots power to counter resource and human exploitation is now facing crucible conditions. Goma activists are spending long hours caring for the massive influx of internally displaced people amid food shortages and cholera outbreaks. Others in their networks have been displaced and suffered violence and even death. “This crisis only reinforces that the struggle for environmental justice is inextricably linked to the struggle against the cycles of violence that we continue to experience,” explains an activist with LUCHA, a non-violent and non-partisan youth civil society movement in Goma.

Green growth, red trail

As global finance gears up for “green growth”, the DRC’s resource wealth has again brought violence, robbery, and ecological destruction. The world’s largest coltan reserves, vast caches of copper, diamonds, tin, gold, and more than 63% of global cobalt are prized by armed gangs who sell them to corporations and wealthy states wanting to manufacture phones, computers, batteries and increasingly, renewable energy technologies.

In the chaos orchestrated by the militias, minerals are more easily siphoned to Rwanda, where they are exported and bought by multinational firms like Glencore. Nicolas Kazadi, DRC’s finance minister, claims that Rwandan mineral smuggling costs the DRC $1bn per year. The US Treasury estimated that last year more than 90% of DRC’s gold was smuggled to countries including Rwanda and Uganda, where it is refined and exported, mainly to the United Arab Emirates. Rwanda is also somehow the world’s primary exporter of coltan, despite being one of the lowest mineral producers in Africa. Without conflict minerals, the numbers just don’t add up.

Efforts to regulate conflict minerals and ensure responsible supply chains have been laughable in their inadequacy, and typical in their market-oriented approach that prioritizes profits while ignoring Congolese perspectives and outcomes. “The case of conflict minerals poses questions about how global supply chain capitalism, conflict resolution, and consumer ethics intersect with postcolonial friction and violence,” writes Josaphat Musamba and Christoph Vogel in Dissent Magazine. “Both international and Congolese interveners and elites have contributed to simplistic and misleading imageries of the problem and its solution, in a quest for a quick and seemingly hands-on, human rights–inspired PR operation.”

Until a decolonized approach that centers communities and ecology is adopted, extraction will inevitably lead to conflict. It is not possible to clean up a supply chain that begins with dirty motives, just as it is not possible to build regional stability and heal generations of trauma in the context of manipulation and structural inequity, better known as ‘development and aid’.

A rally in Nairobi, Kenya calls out Rwandan aggression in DRC. Photo: @luchaRDC

Donor darling, donor orphan

Though this long regional conflict is often portrayed as Rwandans vs Congolese, Hutu vs Tutsi, or even Muslim vs Christian, the primary generator of endless suffering is a more universal clash – power and profit vs people and planet. Colonialism never really ended, it simply now works remotely via economic imperialism. A look at the history of foreign intervention in the region clearly shows that the sources of underlying tensions, that have so far been inescapable, are not due to some inherent failing of Congolese or Rwandan people – it’s structural.

“Several studies point to the erroneous perceptions of outsiders to explain why their interventions have been unable to address the root causes of conflict in the African Great Lakes region. However, few authors focus on the impact of UN and donor activities on regional fragility,” says policy analyst Léopold Ghins at the Firoz Lalji Institute for Africa. “It is chiefly through these activities that outsiders have become part of the problem they [supposedly] seek to resolve.”

One way in which the imperial core exacerbates regional fragility is through unbalanced aid allocations. From 2003-16, Rwanda received about 130% and 50% more aid in per capita terms than the DRC and Burundi respectively. Rwanda was dubbed a ‘donor darling’, while the DRC and Burundi were considered ‘donor orphans’.

Donors now see Rwanda as a useful regional hegemon through which to carry on with the plunder of African resources. Its economy is growing, its infrastructure is developing at speed, and yet this celebrated growth has only benefitted a tiny elite.

It’s necessary to look up from the accounting books, step out of the board room and into the streets to take notice, but if Rwandans are so happy with their “development success”, why is there a black-clad, machine-gun toting policeman on every second street corner in Kigali? Over the last 24 years under President Kagame, the government has become unashamedly authoritarian with mounting human rights abuses.

Unhoused Rwandans and those caught begging have been forcibly exiled to a “rehabilitation island” in the middle of Lake Kivu, also known as Rwanda’s Alcatraz. Dozens of journalists have been banned from the country, arrested, and killed. Opposition politicians are routinely locked up, while civil society groups are not allowed to operate independently. Rwanda’s involvement in the destabilization of the DRC, the plundering of its resources, and the commission of the most serious crimes, including the use of sexual violence as a method of war and as a strategy of terror, is widely documented, notably by the United Nations.

Yet this outcome is touted a development success as the EU and other international institutions cozy up to Kigali for more business as usual, even striking a high-profile advertising deal with FC Arsenal where players wear a “Visit Rwanda” slogan on their jerseys. Sure, visit Rwanda – but only if you don’t plan on asking too many questions and steer clear of the military’s infamous detention and torture camps (whose existence is denied by the government). They will really ruin your holiday.

Again, activists seem to be doing better investigative journalism than the mainstream media, and are not fooled by spectacle. In a recent solidarity action both outside and inside the UK’s Parliament, activists from Extinction Rebellion UK denounced their government for giving Rwanda vast sums to service its extreme asylum policies, and therefore indirectly enabling mass violence and the theft of $24 trillion in natural resources from the DRC.

XR activists outside the UK Parliament protest the financing of violence in the DRC. The hand gesture, used by Congolese protesters to call out inaction of international and regional powers, represents being silenced with a gun to your head. Photo: @XRebellionUK

Zoom in, zoom out

The closer you look, the more you see when it comes to the ripple effects of foreign intervention – but out of the complexity, a clear pattern of disregard and disrespect emerges to untangle the mess.

For example, a second by-product of donor policies is the core-periphery structure that has emerged in the Great Lakes. At the core is the Kigali-Kampala axis, with eastern DRC, Burundi, and North-Western Uganda together forming the periphery. Mirroring global relations, people living in the regional core face lower security risks and have higher incomes in comparison to those in the periphery. “This situation has entrenched the notion that areas in the periphery are ‘lagging behind’, and reinforces perceptions of the DRC as ‘an inscrutable and unimprovable mess’,” explains Ghins.

If we turn from development to peacekeeping, the effects of MONUSCO (Mission des Nations Unies pour la Stabilisation en République démocratique du Congo) were yet another channel through which outsiders aggravated regional fragility. With a budget of $1.5bn a year, and employing 20,000 uniformed staff, the UN peacekeeping force was the largest mission in the organization’s history. Yet, over its 14+ years in the DRC, it was infamous for protection failures and struggled for credibility.

Of course, 20,000 staff can’t exist in a vacuum. The presence of large numbers of UN personnel in cities like Goma created dual labor markets for service sector jobs like cooks, cleaners and drivers. High expatriate salaries led real estate prices to soar. Yes, billions of dollars were spent on “peacekeeping”, but it was not guided by affected communities and could not be responsive to their needs. Ghins describes the outcome: “Not only did MONUSCO divert resources away from productive foreign investments in the Congolese economy, but it distorted local markets and may have impeded on the kinds of ‘autonomous recovery’ processes that conflicts are sometimes found to induce.”

Today, we are witnessing the eruptions that have been kept simmering, waiting for ignition, in no small part by a paradigm of imposed peacekeeping which is ineffective at community-driven peacebuilding. Relying on MONUSCO, Kinshasa had limited incentives to expand its own military capacity in the east. By protecting the main urban centers, MONUSCO bases mostly prevented any armed group from overpowering others. “Even if the UN mission played an essential role in civilian protection, it also ‘condemned’ myriad rebel formations to coexist indefinitely,” says Ghins. A 2019 independent strategic review of MONUSCO agreed that the military aspect of the peacekeeping mission had come to overshadow its civilian and political components. The political process to demobilize and negotiate with armed groups had, in actuality, been stuck for several years.

As MONUSCO’s presence has come to a close, it is this lack of community focused peacebuilding which is being exploited for profit by President Kagame and other local elites who use a combination of hate speech, scarcity, and fear to ignite passions on their behalf. The international community, or more specifically the imperial core, seems to find the situation amenable to an easy flow of cheap and minimally regulated resources. A united region that could leverage its own collective power over the largest trove of natural resources on the planet, would be far less convenient.

Over thousands of pages, a complex and detailed analysis of policy would reveal something fundamentally wrong with a development model that benefits a tiny few at the expense of most, while ravaging ecosystems. But, this structural error is equally apparent via a handful of case studies – and perhaps is less likely to get lost in the details. Over the decades, a series of top-down imposed “solutions”, whether in the name of peace or development, were consistently unaccountable to and unrepresentative of the actual communities at which they were aimed. They never failed to do more harm than good.

First justice, justice first

Whether a political economy of war was intentionally arranged, a result of good intentions but ill-conceived policy, or a combination of both – it clearly exposes a structure that has driven endless conflict. Underlying racism and the blanket pursuit of growth to fuel profits, regardless of social and ecological costs, created this context and continues its reproduction.

“We see the height of cynicism in terms of geostrategy and a policy of double standards,” says Mirindi in Goma. “We see what is happening in Ukraine, what is happening in Gaza. Why not, what is happening in the DRC? Why aren’t there sanctions against Rwanda which officially, visibly, supports these militias?”

The security and humanitarian situation is becoming more and more dire each day.

Clashes have intensified in recent days between M23 and Congolese government forces in the territories surrounding Goma, the regional capital home to over a million people. Goma airport was bombed twice. Internally displaced people continue to arrive in droves.

On his way back to one of the crowded refugee camps on the outskirts of the city, Mirindi describes an outbreak of a skin infection that is spreading like wildfire among the displaced children. He is seeking a way to organize medical aid, though he is not a doctor. Out of a resilience born both of necessity and of vision, he and fellow activists, artists, students, and friends are experienced in organizing as a practice of strategy as well as care, yet stress is taking its toll.

In between patient explanations of history, context, corruption, and atrocities, snippets of existential concern very near at hand slip into focus: “Last night and again today it has become more complicated with the security situation.” And, “The price of food has almost tripled in Goma. We fear that this will continue because all of the surrounding territories and villages that produce food for the city are under M23 control and the population has fled.” Heartwrenchingly, “Young children are dying of dehydration from cholera.” Yet in every conversation, we inevitably return to ordinary people aiding one another in extraordinary ways – the makings of a paradise built in hell.

Speak truth, act now

From this brutal context, activists in the DRC are calling for the international community to immediately stop funding Rwanda’s aggression and to hold all who are complicit accountable. Refusing to abandon their right to a future, they are urgently calling for a green transition that puts justice first, not new revenue streams, and that dismantles colonial exploitation once and for all. “Otherwise,” warns Dr. Mukwege, “the so-called green energy transition will remain red with the blood of Congolese men, women, and children” – collateral damage to enrich the same old racist elites.

Democratic Republic of Congo players silently protested before their AFCON semi-final match against Ivory Coast. Photo: @fecofootcg

In a silent protest in February, DRC soccer players stood before their Africa Cup of Nations semi-final match against Ivory Coast. They chose not to sing their national anthem, opting instead to cover their mouths with their hands and place two fingers from their left hands to their temples, a display of unity and solidarity with all Congolese people – silenced, with a gun to their heads.

This hand gesture is not a resignation, it is condemnation and a challenge. The DRC will no longer be silenced. When asked for the first step towards solidarity, Mirindi urges that, “It is really essential that we talk about this situation again and again, to attract the attention of the international community, organizations, public figures and to have more mobilization. If we can continue like this… that way, it will be better.”

[Goma Actif is organizing a fund drive ‘SOS Congo’ to help support displaced people.]

This powerful music video by members of Goma Slam Session, a collective of young poets and rappers from the DRC, is part of a campaign to seek justice for the crimes committed in the country from 1993 to date, including those documented in the UN Congo Mapping Project report.
Bosembo translates as: justice, truth, peace, right, impartiality, fairness, objectivity, honesty, serenity, tranquility, and goodness.
Goma’s youth continues to be a powerhouse of creativity and resilience, proving that art can be one of the viable alternative strategies that activists can use to organize, communicate, mobilize and influence.

The author would like to recognize activists from XR Goma University, LUCHA RDC, and XR Global Support for their contributions to this article and for their struggle for environmental and social justice.

Original quotations were translated from French by the author.

The post DRC Bleeds Conflict Minerals for Green Growth first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Alexandria Shaner.

]]> https://www.radiofree.org/2024/03/15/drc-bleeds-conflict-minerals-for-green-growth/feed/ 0 464281 Biometrics Giant Accenture Quietly Took Over LA Residents’ Jail Reform Plan https://www.radiofree.org/2024/03/12/biometrics-giant-accenture-quietly-took-over-la-residents-jail-reform-plan/ https://www.radiofree.org/2024/03/12/biometrics-giant-accenture-quietly-took-over-la-residents-jail-reform-plan/#respond Tue, 12 Mar 2024 20:50:56 +0000 https://theintercept.com/?p=463297

In November 2020, Los Angeles voters moved to radically transform the way the county handled incarceration. That year, Angelenos filled the streets, joining worldwide protests after the police murder of George Floyd in Minneapolis. The mood was ripe for change, and a ballot initiative known as Measure J passed with 57 percent support, amending the LA County charter so that jailing people before trial would be treated as a last resort. Ten percent of the county’s general fund would be allocated to community-led alternatives to incarceration that prioritized diversion, job training, and health programs. 

But years later, as Measure J finally, slowly, gets implemented, advocates say that changes meant to divert money from law enforcement might instead just funnel it back to them. 

Case in point: In June, LA County signed over the handling of changes to pretrial detention under Measure J to the consulting firm Accenture, a behemoth in the world of biometric databases and predictive policing. Accenture has led the development of “intelligent public safety” platforms and tech-enabled risk assessment tools for national security and law enforcement agencies in the United States and around the world, including in Israel and India. An Accenture advisory panel working on the Measure J implementation includes former federal and local law enforcement agents.

Accenture’s role was further publicized Monday after Civil Rights Corps, a nonprofit focused on injustice in the legal system, sent a letter to the LA County Board of Supervisors calling on them to immediately cancel the company’s contract. The contract takes the county away from its stated vision for a “care first, jails last” approach and toward carceral policies, CRC wrote in the letter. “Already, Accenture has concluded that electronic monitoring is a ‘favorable alternative’ to incarceration, ignoring the reality that electronic monitoring is expensive, unsupported by social science, and demonstrably racially biased as applied in Los Angeles,” the letter adds. “This is unsurprising: the consultants working on the Contract have deep ties to police departments and prisons.”

Measure J was one of at least 20 local criminal justice reform efforts that passed nationwide in the six months after Floyd’s murder. It was also part of a string of major wins by advocates in Los Angeles, who had been pushing alternatives to incarceration and investment in social services long before 2020. 

Measure J ran into predictable opposition: A group including the union for Los Angeles sheriff’s deputies sued to block the measure and delayed it from going into effect in 2021, but it was put back on track after a judge upheld it on appeal last year. Nationally, despite widespread support, the criminal justice reform wave was met by a well-funded and bipartisan opposition led by police, sheriffs, and conservative Republicans and Democrats who fearmongered about rising crime. In the years since the 2020 uprisings, efforts to reallocate police funding, implement federal and local police reforms, and invest in social services have been undone or derailed. Many of those who cheered the reform movement are frustrated that they haven’t seen the impact of so many policy wins. Accenture’s contract for Measure J shows another reason why. 

Criminal justice reforms are “being cannibalized,” said Matyos Kidane, an organizer with the Stop LAPD Spying Coalition, an abolitionist community group based in Skid Row. Kidane said the group organizes against reforms because of the way corporations and law enforcement groups exploit and defang such initiatives. He pointed to Axon, which has profited massively from the push to get police equipped with body cameras

“It’s a golden opportunity for them,” Kidane said. When Measure J passed, “Accenture was ready to go once this opportunity presented itself.” 

Accenture has not publicly announced the contract with Los Angeles County, which was signed in June 2023 without a competitive bidding process for a total of $8.6 million over two and a half years. The contract exceeded the $200,000 limit in state law and county charter for a sole-source contract, and the board of supervisors created a motion to allow the requirement to be skirted in order to implement Measure J. But that motion allowed for a contract of up to $3 million, far less than the final signing price. The county told The Intercept it had paid $2 million to Accenture so far. (The supervisors who signed the motion did not immediately respond to a request for comment.)

“Even if it were entered into legally — which it was not — the Contract is duplicative, wasteful, and harmful to Los Angeles and should be canceled on policy grounds alone,” the Civil Rights Corp letter states. 

In presentations made in August to the Los Angeles Justice, Care, and Opportunities Department, which is administering the contract (published in September by the accountability group Expose Accenture) the firm gave an overview of its project timeline and plans to engage stakeholders in focus groups, interviews, workshops, and site visits. The firm highlighted targets for “quick wins” by October 1, 2023, such as creating a county website and launching marketing and communications for “Justice Involved Individuals” (i.e., people who have been arrested) and summarized top lines of conversations with 50 such people, including the observation that there was wide support for electronic monitoring as an alternative to custody. 

A spokesperson for the county CEO, which controls county budget decisions, directed questions about the CRC letter to JCOD, as did Accenture. Department spokesperson Avi Bernard did not answer specific questions about how the county raised the limit for the contract but told The Intercept that JCOD had used approved county procedures and consulted with county counsel throughout the contract process. Bernard said CRC had previously raised similar concerns. “County Counsel and Board reviewed these concerns and found no issues with continuing the contract,” Bernard said. He added that there had been “no conversations with Accenture” and JCOD related to the use of electronic monitoring. 

Bernard said that so far, Accenture had designed an independent pretrial services agency for the county, incorporated input from stakeholders, and supported a hotline, website, and marketing campaign. Bernard said the firm has now deployed a three-person implementation team to launch the independent pretrial services agency and is helping JCOD develop a case management IT system.

“It’s talking left while running off with the profiteers of mass surveillance and detention.”

The fact that Accenture was even an option for implementing Measure J came as a shock to many of its supporters, who had watched the county meet with community partners interested in helping carry out its implementation. The contract was also news to some county supervisors, according to advocates with knowledge of the contract process.

“It’s worse than talk left, walk right politics,” said Nika Soon-Shiong, founder and executive director at the Fund for Guaranteed Income and a Ph.D. researcher on digital identification systems. “It’s talking left while running off with the profiteers of mass surveillance and detention.”

Accenture has pushed counterterror and policing strategies around the globe: The company built the world’s biggest biometric identification system in India, which has used similar technologies to surveil protesters and conduct crowd control as part of efforts by Prime Minister Narendra Modi’s Bharatiya Janata Party to investigate the citizenship of Muslim residents. And in Israel, Accenture acquired the cybersecurity firm Maglan in 2016 and has worked to facilitate collaboration between India and Israel aimed at “fostering inclusive economic growth and maximizing human potential.” 

Accenture ballooned into a giant in federal consulting over the course of the “war on terror,” winning hundreds of millions of dollars in lucrative contracts from federal agencies like the Department of Homeland Security for projects from a “virtual border” to recruiting and hiring Customs and Border Protection and Border Patrol agents. In 2006, Accenture won a $10 million contract for a DHS biometric ID program, the world’s second biggest, to collect and share biometric data on foreign nationals entering or leaving the U.S. The company has also worked with police departments in Seattle and in the United Kingdom. Jimmy Etheredge, Accenture’s former CEO for North America, sits on the board of the Atlanta Police Foundation. 

Asked about Accenture’s international work on biometric identification, predictive policing, and national security, Bernard, the JCOD spokesperson, said the firm was involved in many different kinds of work. “Accenture is a large, international consulting firm with many lines of business. The specific consultants assigned to this project are part of a team in Accenture dedicated to the public sector. Their team comes from a variety of backgrounds, primarily in the health and human services industry.” 

But several LA-based advocates told The Intercept that the contract is yet another development that calls into question the county’s commitment to real criminal justice reform. The county has missed all of its deadlines for a plan to close the notoriously inhumane Men’s Central Jail, even as deaths in custody continue apace. In August, the Los Angeles County Sheriff’s Department issued a Request for Information for a biometric identification system.

“I’m genuinely confused about how we ended up with this Accenture contract, especially as someone who participated in the development of the Care First, Jails Last (ATI) report,” said Danielle Dupuy-Watson, CEO of CRC, referring to an “Alternatives to Incarceration” working group commissioned by the county. “We hoped for transparency and accountability but instead we were gaslit.” 

Behind-the-scenes deals like the one with Accenture are one reason that popular reforms haven’t come to fruition, said Lex Steppling, an organizer with Los Angeles Community Action Network. 

“There’s the performance of democracy on the front end where a policy gets pressured into place, and on the back end there’s no governance.”

“People vote in that direction, and then it doesn’t happen. And they chalk it up to, ‘Well, politicians ain’t shit,’” Steppling said. People assume, he added, that when policy is passed, bureaucrats work out its implementation. “What we’re learning is there’s the performance of democracy on the front end where a policy gets pressured into place, and on the back end there’s no governance. It just simply gets procured and contracted away to these consulting firms.” 

That the county took a historic progressive reform and contracted it out to a firm that put the community’s plans back into the hands of law enforcement is a perfect expression of the problem, Steppling said. “There’s no democracy there. There’s no transparency there. Nobody even knows it’s happening.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Akela Lacy.

]]>
https://www.radiofree.org/2024/03/12/biometrics-giant-accenture-quietly-took-over-la-residents-jail-reform-plan/feed/ 0 463750
Net Zero, the Digital Panopticon and the Future of Food https://www.radiofree.org/2024/03/10/net-zero-the-digital-panopticon-and-the-future-of-food/ https://www.radiofree.org/2024/03/10/net-zero-the-digital-panopticon-and-the-future-of-food/#respond Sun, 10 Mar 2024 14:30:09 +0000 https://dissidentvoice.org/?p=148767 The food transition, the energy transition, net-zero ideology, programmable central bank digital currencies, the censorship of free speech and clampdowns on protest. What’s it all about? To understand these processes, we need to first locate what is essentially a social and economic reset within the context of a collapsing financial system. Writer Ted Reece notes […]

The post Net Zero, the Digital Panopticon and the Future of Food first appeared on Dissident Voice.]]>
The food transition, the energy transition, net-zero ideology, programmable central bank digital currencies, the censorship of free speech and clampdowns on protest. What’s it all about? To understand these processes, we need to first locate what is essentially a social and economic reset within the context of a collapsing financial system.

Writer Ted Reece notes that the general rate of profit has trended downwards from an estimated 43% in the 1870s to 17% in the 2000s. By late 2019, many companies could not generate enough profit. Falling turnover, squeezed margins, limited cash flows and highly leveraged balance sheets were prevalent.

Professor Fabio Vighi of Cardiff University has described how closing down the global economy in early 2020 under the guise of fighting a supposedly new and novel pathogen allowed the US Federal Reserve to flood collapsing financial markets (COVID relief) with freshly printed money without causing hyperinflation. Lockdowns curtailed economic activity, thereby removing demand for the newly printed money (credit) in the physical economy and preventing ‘contagion’.

According to investigative journalist Michael Byrant, €1.5 trillion was needed to deal with the crisis in Europe alone. The financial collapse staring European central bankers in the face came to a head in 2019. The appearance of a ‘novel virus’ provided a convenient cover story.

The European Central Bank agreed to a €1.31 trillion bailout of banks followed by the EU agreeing to a €750 billion recovery fund for European states and corporations. This package of long-term, ultra-cheap credit to hundreds of banks was sold to the public as a necessary programme to cushion the impact of the pandemic on businesses and workers.

In response to a collapsing neoliberalism, we are now seeing the rollout of an authoritarian great reset — an agenda that intends to reshape the economy and change how we live.

Shift to authoritarianism

The new economy is to be dominated by a handful of tech giants, global conglomerates and e-commerce platforms, and new markets will also be created through the financialisation of nature, which is to be colonised, commodified and traded under the notion of protecting the environment.

In recent years, we have witnessed an overaccumulation of capital, and the creation of such markets will provide fresh investment opportunities (including dodgy carbon offsetting Ponzi schemes)  for the super-rich to park their wealth and prosper.

This great reset envisages a transformation of Western societies, resulting in permanent restrictions on fundamental liberties and mass surveillance. Being rolled out under the benign term of a ‘Fourth Industrial Revolution’, the World Economic Forum (WEF) says the public will eventually ‘rent’ everything they require (remember the WEF video ‘you will own nothing and be happy’?): stripping the right of ownership under the guise of a ‘green economy’ and underpinned by the rhetoric of ‘sustainable consumption’ and ‘climate emergency’.

Climate alarmism and the mantra of sustainability are about promoting money-making schemes. But they also serve another purpose: social control.

Neoliberalism has run its course, resulting in the impoverishment of large sections of the population. But to dampen dissent and lower expectations, the levels of personal freedom we have been used to will not be tolerated. This means that the wider population will be subjected to the discipline of an emerging surveillance state.

To push back against any dissent, ordinary people are being told that they must sacrifice personal liberty in order to protect public health, societal security (those terrible Russians, Islamic extremists or that Sunak-designated bogeyman George Galloway) or the climate. Unlike in the old normal of neoliberalism, an ideological shift is occurring whereby personal freedoms are increasingly depicted as being dangerous because they run counter to the collective good.

The real reason for this ideological shift is to ensure that the masses get used to lower living standards and accept them. Consider, for instance, the Bank of England’s chief economist Huw Pill saying that people should ‘accept’ being poorer. And then there is Rob Kapito of the world’s biggest asset management firm BlackRock, who says that a “very entitled” generation must deal with scarcity for the first time in their lives.

At the same time, to muddy the waters, the message is that lower living standards are the result of the conflict in Ukraine and supply shocks that both the war and ‘the virus’ have caused.

The net-zero carbon emissions agenda will help legitimise lower living standards (reducing your carbon footprint) while reinforcing the notion that our rights must be sacrificed for the greater good. You will own nothing, not because the rich and their neoliberal agenda made you poor but because you will be instructed to stop being irresponsible and must act to protect the planet.

Net-zero agenda

But what of this shift towards net-zero greenhouse gas emissions and the plan to slash our carbon footprints? Is it even feasible or necessary?

Gordon Hughes, a former World Bank economist and current professor of economics at the University of Edinburgh, says in a new report that current UK and European net-zero policies will likely lead to further economic ruin.

Apparently, the only viable way to raise the cash for sufficient new capital expenditure (on wind and solar infrastructure) would be a two decades-long reduction in private consumption of up to 10 per cent. Such a shock has never occurred in the last century outside war; even then, never for more than a decade.

But this agenda will also cause serious environmental degradation. So says Andrew Nikiforuk in the article The Rising Chorus of Renewable Energy Skeptics, which outlines how the green techno-dream is vastly destructive.

He lists the devastating environmental impacts of an even more mineral-intensive system based on renewables and warns:

The whole process of replacing a declining system with a more complex mining-based enterprise is now supposed to take place with a fragile banking system, dysfunctional democracies, broken supply chains, critical mineral shortages and hostile geopolitics.

All of this assumes that global warming is real and anthropogenic. Not everyone agrees. In the article Global warming and the confrontation between the West and the rest of the world, journalist Thierry Meyssan argues that net zero is based on political ideology rather than science. But to state such things has become heresy in the Western countries and shouted down with accusations of ‘climate science denial’.

Regardless of such concerns, the march towards net zero continues, and key to this is the United Nations Agenda 2030 for Sustainable Development Goals.

Today, almost every business or corporate report, website or brochure includes a multitude of references to ‘carbon footprints’, ‘sustainability’, ‘net zero’ or ‘climate neutrality’ and how a company or organisation intends to achieve its sustainability targets. Green profiling, green bonds and green investments go hand in hand with displaying ‘green’ credentials and ambitions wherever and whenever possible.

It seems anyone and everyone in business is planting their corporate flag on the summit of sustainability. Take Sainsbury’s, for instance. It is one of the ‘big six’ food retail supermarkets in the UK and has a vision for the future of food that it published in 2019.

Here’s a quote from it:

Personalised Optimisation is a trend that could see people chipped and connected like never before. A significant step on from wearable tech used today, the advent of personal microchips and neural laces has the potential to see all of our genetic, health and situational data recorded, stored and analysed by algorithms which could work out exactly what we need to support us at a particular time in our life. Retailers, such as Sainsbury’s could play a critical role to support this, arranging delivery of the needed food within thirty minutes — perhaps by drone.

Tracked, traced and chipped — for your own benefit. Corporations accessing all of our personal data, right down to our DNA. The report is littered with references to sustainability and the climate or environment, and it is difficult not to get the impression that it is written so as to leave the reader awestruck by the technological possibilities.

However, the promotion of a brave new world of technological innovation that has nothing to say about power — who determines policies that have led to massive inequalities, poverty, malnutrition, food insecurity and hunger and who is responsible for the degradation of the environment in the first place — is nothing new.

The essence of power is conveniently glossed over, not least because those behind the prevailing food regime are also shaping the techno-utopian fairytale where everyone lives happily ever after eating bugs and synthetic food while living in a digital panopticon.

Fake green

The type of ‘green’ agenda being pushed is a multi-trillion market opportunity for lining the pockets of rich investors and subsidy-sucking green infrastructure firms and also part of a strategy required to secure compliance required for the ‘new normal’.

It is, furthermore, a type of green that plans to cover much of the countryside with wind farms and solar panels with most farmers no longer farming. A recipe for food insecurity.

Those investing in the ‘green’ agenda care first and foremost about profit. The supremely influential BlackRock invests in the current food system that is responsible for polluted waterways, degraded soils, the displacement of smallholder farmers, a spiralling public health crisis, malnutrition and much more.

It also invests in healthcare — an industry that thrives on the illnesses and conditions created by eating the substandard food that the current system produces. Did Larry Fink, the top man at BlackRock, suddenly develop a conscience and become an environmentalist who cares about the planet and ordinary people? Of course not.

Any serious deliberations on the future of food would surely consider issues like food sovereignty, the role of agroecology and the strengthening of family farms — the backbone of current global food production.

The aforementioned article by Andrew Nikiforuk concludes that, if we are really serious about our impacts on the environment, we must scale back our needs and simplify society.

In terms of food, the solution rests on a low-input approach that strengthens rural communities and local markets and prioritises smallholder farms and small independent enterprises and retailers, localised democratic food systems and a concept of food sovereignty based on self-sufficiency, agroecological principles and regenerative agriculture.

It would involve facilitating the right to culturally appropriate food that is nutritionally dense due to diverse cropping patterns and free from toxic chemicals while ensuring local ownership and stewardship of common resources like land, water, soil and seeds.

That’s where genuine environmentalism and the future of food begins.

• The author writes on food, agriculture and development. For further insight into the issues discussed above, you can access his two free books on the food system at Academia.edu or the e-book section on the Centre for Research on Globalization homepage.

The post Net Zero, the Digital Panopticon and the Future of Food first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Colin Todhunter.

]]>
https://www.radiofree.org/2024/03/10/net-zero-the-digital-panopticon-and-the-future-of-food/feed/ 0 463209
How changes to Hawaiʻi’s home battery program could hinder its clean energy transition https://grist.org/climate-energy/how-changes-to-hawai%CA%BBis-home-battery-program-could-hinder-its-clean-energy-transition/ https://grist.org/climate-energy/how-changes-to-hawai%CA%BBis-home-battery-program-could-hinder-its-clean-energy-transition/#respond Fri, 08 Mar 2024 09:30:00 +0000 https://grist.org/?p=632654 This story was produced by Grist and co-published with Honolulu Civil Beat.

Hawaiʻi’s main utility is poised to radically revise how it compensates households for the power their batteries send to the grid, a move critics fear will stunt the potential for using that energy to prevent blackouts and hinder the state’s transition to 100 percent clean energy.

Hawaiian Electric, which serves every island except Kauaʻi, will launch the Bring Your Own Device program on April 1, offering households incentives to deliver power during peak demand. But the compensation is nowhere near what customers who joined an earlier battery program received, and some solar advocates worry it’s so low that people may not enroll at all.

That would be a missed opportunity to help build a modern energy system, said Rocky Mould, executive director of the Hawaiʻi Solar Energy Association. “It’s depriving us of the potential for a really viable grid service program that would benefit all. We should be moving as fast as we can to get off oil.”

The changes come amid a broader debate over how much to pay customers for power drawn from their solar panels and batteries. Several states, most notably California, are deeply cutting their so-called net metering programs, which are meant to boost solar adoption. However, Puerto Rico’s legislature recently voted unanimously to preserve the archipelago’s payment scheme until at least 2030, deeming it essential to meeting its clean energy goals. 

The utilities and regulators favoring reductions say the credits are too costly for the ratepayers who subsidize them — a point Hawaiian Electric made to Grist in supporting the changes. Supporters of incentives argue that rollbacks can impede solar’s growth, prolong dependence on fossil fuels, and undermine energy resilience.

Hawaiʻi is under a legal mandate to use only clean energy by 2045, and has long been a leader in rooftop solar adoption, which comprises almost half of Hawaiian Electric’s renewable generation portfolio. But when it slashed compensation rates in 2015, installations dropped by more than half. The market recovered as customers found a new way to save money: Adding batteries and consuming stored power at night rather than buying it from the utility. Nearly every photovoltaic system installed now includes at least one battery

Nearly all home solar installations include storage now, giving Hawaiʻi the highest battery attachment rate of any state in the U.S. Courtesy of RevoluSun

In 2021, as the state prepared to shutter its last coal power plant, it needed those batteries. With utility-scale renewable projects behind schedule, the state faced a generation shortfall. If households allowed Hawaiian Electric to tap their batteries, a resource called a virtual power plant, it could supply some of the capacity lost when the plant went offline. 

Homeowners would need an incentive to do that, so Hawaiian Electric rolled out Battery Bonus. Customers on Oʻahu and Maui who agreed to let the utility draw power for two hours each evening, when demand is at its peak, received an upfront payment based on the size of their battery. They also earned a monthly incentive of $5 per kilowatt committed and a credit equivalent to the retail rate (the highest in the nation) for the electricity they contributed. On average, customers received around $4,250 when they signed up, a regular payment of $25 monthly, and a healthy discount on their bill.

The program was highly popular, especially on Oʻahu. “We already had a lot of traction with our customers installing batteries with their systems, but when they shut down the coal plant and introduced Battery Bonus, it just poured rocket fuel on the fire,” said David Gorman, co-founder and president of RevoluSun, the largest solar installer on the island. Still, Battery Bonus was a temporary program tied to the coal plant’s closure. Hawaiian Electric stopped accepting new signups on Oʻahu in December after the island reached its maximum enrollment capacity of 40 megawatts. (The program remains open on Maui, which has not yet reached its cap.)

Virtual power plants, or VPPs, allow states to reduce reliance on fossil fuel power plants and tap into clean energy without the costs and delays associated with building utility-scale projects. But the approach is dependent upon customer participation, and the incentives offered in Bring Your Own Device may not prove as compelling. The upfront payment is capped at $500, a small dent in the typical $9,500 purchase price for a battery. 

Solar advocates are even more concerned about how Hawaiian Electric plans to pay households for their power. For most customers, the rates paid in the program set to take effect next month are far lower than the retail price of electricity. Although the batteries will serve the household’s load before exporting energy to the grid, customers will pay the retail rate for any power they need once the pack is depleted.

“It’s disincentivizing customers from participating,” said Mould, who added that a more complicated rate structure also could make the systems difficult to sell. “When you’re sitting across the proverbial kitchen table from a customer and selling these things, you really need something that’s simple and where the value proposition is easy to explain.”

solar panels on hawaii home
Solar advocates fear that a lower and more complicated compensation structure will deter households from participating in grid programs. Courtesy of RevoluSun

Gorman said the new program won’t necessarily cause solar installations to plummet like the changes to net metering did, but he agrees it could undercut VPP participation. “The electricity rates are so high that you don’t need those upfront incentives and rebates in order to think going solar is a good idea,” he said. “A PV plus storage system still has a very attractive payback period.” 

In other words, customers may still get batteries, but they’ll keep that power for themselves. Widespread abstention from grid programs would undermine efforts to rein in electricity prices and meet Hawaiʻi’s clean energy goals, said Issac Moriwake, managing attorney for Earthjustice’s mid-Pacific region who was part of an appeal to the Hawaiʻi Public Utilities Commission to revise parts of the BYOD program. 

“You ought to consider the big picture of how not only individual systems, but the aggregate, are able to respond to grid needs on call, and respond to emergencies,” said Moriwake. “There’s big-time value there.”

A system in which customers use their stored power only for their own needs is fundamentally inefficient, Moriwake added. “You’re talking about the utility spending gazillions of dollars to build their own huge utility-sized battery, and then customers are getting their own batteries, just duplicating investments and duplicating efforts,” he said. 

In an emailed statement, a representative for Hawaiian Electric told Grist the new program is meant to keep rates affordable for customers who don’t have rooftop solar systems. 

“Hawaiian Electric understands the position expressed by solar advocates,” the statement said. “However, there is an equity issue that must be considered as Hawaiian Electric rolls out these incentive programs. While we want to encourage customers to enroll in our programs, we also want to ensure the costs for the programs are spread fairly across customers, including those who are facing financial challenges.”

Moriwake said that position loses sight of the urgent need for Hawai’i to move beyond fossil fuels. Despite being among the first states to set clean energy targets, Hawaiʻi relies on imported oil to meet 75 percent of its electricity consumption. “I think particularly in the era of climate emergency, let alone brownouts and supply shortfalls, that we have to move past the nickel and diming around getting the rooftop solar compensation exactly right,” he said.

Hawaiʻi has also found itself grappling with generation shortages. On January 8, for the first time in almost a decade, failures at an Oʻahu oil-burning power plant coupled with a shortage in utility-scale stored energy caused an outage and led the utility to ask customers to conserve energy as it instituted rolling blackouts across the island. Home batteries enrolled in Battery Bonus kicked in, but that wouldn’t have been enough to meet demand. 

“It begs the question, had we had a fully subscribed, operational program, what number would it have taken to avoid the blackouts altogether?” Mould said.

Hawaiian Electric also stressed that reducing demand also provides its own service to the grid. “The goal of BYOD is to reduce system wide load during the evening peak when demand for electricity on the grid is typically the highest. When a customer consumes energy from their battery on site, they’re offsetting their load and helping achieve that goal.” 

Those concerned about the new program await its impacts. Its rollout was to begin March 1, but was delayed a month to give the utility time to implement changes ordered by the utilities commission based on early objections to the program. Legislation to mandate retail-rate compensation is also pending, but won’t be heard this session. Solar advocates remain hopeful that, if enrollment remains low, Hawaiian Electric will adjust its compensation. 

That’s what happened with Battery Bonus. When the utility introduced the program, it was more restrictive in who could participate and offered fewer incentives. Enrollments stalled, and as the power plant closure loomed, Hawaiian Electric upped the incentives. Participation picked up. 

This story was originally published by Grist with the headline How changes to Hawaiʻi’s home battery program could hinder its clean energy transition on Mar 8, 2024.


This content originally appeared on Grist and was authored by Gabriela Aoun Angueira.

]]>
https://grist.org/climate-energy/how-changes-to-hawai%CA%BBis-home-battery-program-could-hinder-its-clean-energy-transition/feed/ 0 462885
Signal’s New Usernames Help Keep the Cops Out of Your Messages https://www.radiofree.org/2024/03/04/signals-new-usernames-help-keep-the-cops-out-of-your-messages/ https://www.radiofree.org/2024/03/04/signals-new-usernames-help-keep-the-cops-out-of-your-messages/#respond Mon, 04 Mar 2024 10:00:00 +0000 https://theintercept.com/?p=462058

In October 2021, an assistant U.S. attorney issued a subpoena to Signal demanding that the messaging app hand over information about one of its users. Based on a phone number, the federal prosecutors were asking for the user’s name, address, correspondence, contacts, groups, and call records to assist with an FBI investigation. Two weeks later, the American Civil Liberties Union responded on behalf of Signal with just two pieces of data: the date the target Signal account was created, and the date that it last connected to the service.

That’s it. That’s all Signal turned over because that’s all Signal itself had access to. As Signal’s website puts it, “It’s impossible to turn over data that we never had access to in the first place.” It wasn’t the first time Signal has received data requests from the government, nor was it the last. In all cases, Signal handed over just those two pieces of data about accounts, or nothing at all.

Signal is the gold standard for secure messaging apps because not only are messages encrypted, but so is pretty much everything else. Signal doesn’t know your name or profile photo, who any of your contacts are, which Signal groups you’re in, or who you talk to and when. (This isn’t true for WhatsApp, Telegram, iMessage, and nearly every other messaging app.)

Still, one of the main issues with Signal is its reliance on phone numbers. When activists join Signal groups for organizing, they’ve been forced to share their phone number with people they don’t yet know and trust. Journalists have had to choose between soliciting tips by publishing their private numbers to their readers — and therefore inviting harassment and cyberattacks — or setting up a second Signal number, a challenging and time-consuming prospect. Most journalists simply don’t publish a Signal number at all. That’s all about to change.

With the long-awaited announcement that usernames are coming to Signal — over four years in the making — Signal employed the same careful cryptography engineering it’s famous for, ensuring that the service continues to learn as little information about its users as possible.

“Doing it encrypted is the boss level. We had to change fundamental pieces of our architecture.”

“Doing it encrypted is the boss level,” said Meredith Whittaker, president of the nonprofit Signal Foundation, which makes the app. “We had to change fundamental pieces of our architecture.”

If Signal receives a government request for information about an account based on an active username, Signal will be able to hand over that account’s phone number along with its creation date and last connection date. So being able to use Signal through usernames doesn’t mean your phone number becomes subpoena-proof — at least not without using the new ability to change your username at will.

That’s because the new Signal usernames are designed to be ephemeral. You can set one, delete it, and change it to something else, as often as you want.

Signal usernames are currently available in Signal Desktop and the beta version of the Signal mobile apps — those will get updated in the coming weeks too. My username is micah.01, if you want to drop me a message.

Signal’s New Phone Number Privacy

With the new version of Signal, you will no longer broadcast your phone number to everyone you send messages to by default, though you can choose to if you want. Your phone number will still be displayed to contacts who already have it stored in their phones. Going forward, however, when you start a new conversation on Signal, your number won’t be shared at all: Contacts will just see the name you use when you set up your Signal profile. So even if your contact is using a custom Signal client, for example, they still won’t be able to discover your phone number since the service will never tell it to them.

You also now have the option to set a username, which Signal lets you change whenever you want and delete when you don’t want it anymore. Rather than directly storing your username as part of your account details, Signal stores a cryptographic hash of your username instead; Signal uses the Ristretto 25519 hashing algorithm, essentially storing a random block of data instead of usernames themselves. This is like how online services can confirm a user’s password is valid without storing a copy of the actual password itself.

“As far as we’re aware, we’re the only messaging platform that now has support for usernames that doesn’t know everyone’s usernames by default.”

“As far as we’re aware, we’re the only messaging platform that now has support for usernames that doesn’t know everyone’s usernames by default,” said Josh Lund, a senior technologist at Signal.

The move is yet another piece of the Signal ethos to keep as little data on hand as it can, lest the authorities try to intrude on the company. Whittaker explained, “We don’t want to be forced to enumerate a directory of usernames.”

To prevent people from squatting on high value usernames — like taylorswift, for example — all usernames are required to have a number at the end of them, like taylorswift.89. Once you’ve set a username, other Signal users can start a conversation with you by searching for your username, all without learning your phone number.

Since usernames are designed to be ephemeral, you can set a new username specifically for a conference you’re attending, or for a party. People can connect with you using it, and then you delete it when you’re done and set it to something else later.

There are some cases you might want your username to be permanent. For example, it makes sense for journalists to create a username that they never change and publish it widely so sources can reach out to them. Journalists can now do that without having to share their private phone number. It makes sense for sources, on the other hand, to only set a username when they specifically want to connect with someone, then delete it afterward.

You can also create a link or QR code that people can scan to add you as a contact. These, too, are ephemeral. You can send someone your Signal link in an insecure channel, and, as soon as they contact you, you can reset your link and get a new one, without needing to change your username.

Finally, while you’ll still need a phone number to create a Signal account, you’ll have the option to prevent anyone from finding you on Signal using your phone number.

Can Signal Hand Over Your Phone Number Based on a Username?

Whenever Signal receives a properly served subpoena, they work closely with the American Civil Liberties Union to challenge and respond to it, handing over as little user data as possible. Signal publishes a post to the “Government Requests” section of their website (signal.org/bigbrother) whenever they’re legally forced to provide user data to governments, so long as they’re allowed to. Some of the examples include challenges to gag orders, allowing Signal to publish the previously sealed court orders.

If Signal receives a subpoena demanding that they hand over all account data related to a user with a specific username that is currently active at the time that Signal looks it up, they would be able to link it to an account. That means Signal would turn over that user’s phone number, along with the account creation date and the last connection date. Whittaker stressed that this is “a pretty narrow pipeline that is guarded viciously by ACLU lawyers,” just to obtain a phone number based on a username.

Signal, though, can’t confirm how long a given username has been in use, how many other accounts have used it in the past, or anything else about it. If the Signal user briefly used a username and then deleted it, Signal wouldn’t even be able to confirm that it was ever in use to begin with, much less which accounts had used it before.

If the Signal user briefly used a username and then deleted it, Signal wouldn’t even be able to confirm that it was ever in use to begin with.

In short, if you’re worried about Signal handing over your phone number to law enforcement based on your username, you should only set a username when you want someone to contact you, and then delete it afterward. And each time, always set a different username.

Likewise, if you want someone to contact you securely, you can send them your Signal link, and, as soon as they make contact, you can reset the link. If Signal receives a subpoena based on a link that was already reset, it will be impossible for them to look up which account it was associated with.

If the subpoena demands that Signal turn over account information based on a phone number, rather than a username, Signal could be forced to hand over the cryptographic hash of the account’s username, if a username is set. It would be difficult, however, for law enforcement to learn the actual username itself based on its hash. If they already suspect a username, they could use the hash to confirm that it’s real. Otherwise, they would have to guess the username using password cracking techniques like dictionary attacks or rainbow tables.

Why Does Signal Require Phone Numbers at All?

Signal’s leadership is aware that its critics’ most persistent complaint is the phone number requirement, and they’ll readily admit that optional usernames are only a partial fix. But because phone numbers make it simpler for most people to use Signal, and harder for spammers to make fake accounts, the phone number requirement is here to stay for the foreseeable future.

Signal doesn’t publish how many users it has, but the Android app boasts over 100 million downloads. It has achieved this scale largely because all you need to do is install the Signal app and you can immediately send encrypted messages to the other Signal users in your phone’s contacts — based on phone numbers.

“You reach a threshold where you’re actually reducing privacy.”

This ease of use also makes Signal more secure. If Signal removed phone numbers, making it more difficult for Signal users to find each other compared to using alternative messaging apps, there could be a price to pay. “You reach a threshold where you’re actually reducing privacy,” Whittaker said. She gave an example of a person who faces severe threats and normally maintains vigilance but whose mother is only on WhatsApp because she can’t figure out the numberless Signal. The high-threat person would be stuck using the less secure option more often.

Requiring phone numbers also makes it considerably harder for spammers to abuse Signal. “The existence of a handful of small apps that don’t really have a large scale of users, that don’t require phone numbers, I don’t think is proof that it’s actually workable for a large-scale app,” Whittaker said.

It’s entirely possible to build a version of Signal that doesn’t require phone numbers, but Whittaker is concerned that without the friction of obtaining fresh phone numbers, spammers would immediately overwhelm the network. Signal engineers have discussed possible alternatives to phone numbers that would maintain that friction, including paid options, but nothing is currently on their road map.

“That’s actually the nexus of a very gnarly problem space that I haven’t seen a real solution for from any alternatives, and we would want to tread very, very cautiously,” Whittaker said. “There’s one Signal. We’re the gold standard for private messaging, and we have achieved critical mass at a pretty large scale. Those things couldn’t easily be recreated if we fuck this up by making a rash decision that then makes it a spammy ghost town. That’s the concern we’re wrestling with here.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2024/03/04/signals-new-usernames-help-keep-the-cops-out-of-your-messages/feed/ 0 462018
Russian Who Smuggled Military Technology Pleads Guilty In U.S. Court https://www.radiofree.org/2024/02/29/russian-who-smuggled-military-technology-pleads-guilty-in-u-s-court/ https://www.radiofree.org/2024/02/29/russian-who-smuggled-military-technology-pleads-guilty-in-u-s-court/#respond Thu, 29 Feb 2024 21:44:27 +0000 https://www.rferl.org/a/us-russia-military-tech-smuggling/32842951.html

WASHINGTON -- U.S. semiconductor firms must strengthen oversight of their foreign partners and work more closely with the government and investigative groups, a group of experts told the Senate Committee on Homeland Security and Governmental Affairs, saying the outsourcing of production overseas has made tracking chip sales more difficult, enabling sanctions evasion by Russia and other adversaries.

U.S. semiconductor firms largely produce their chips in China and other Asian countries from where they are further distributed around the world, making it difficult to ascertain who exactly is buying their products, the experts told the committee at a hearing in Washington on February 27.

The United States and the European Union imposed sweeping technology sanctions on Russia to weaken its ability to wage war following its full-scale invasion of Ukraine in February 2022. Russia’s military industrial complex is heavily reliant on Western technology, including semiconductors, for the production of sophisticated weapons.

“Western companies design chips made by specialized plants in other countries, and they sell them by the millions, with little visibility over the supply chain of their products beyond one or two layers of distribution,” Damien Spleeters, deputy director of operations at Conflict Armament Research, told senators.

He added that, if manufacturers required point-of-sale data from distributors, it would vastly improve their ability to trace the path of semiconductors recovered from Russian weapons and thereby identify sanctions-busting supply networks.

The banned Western chips are said to be flowing to Russia via networks in China, Turkey, Central Asia, and the Caucasus.

Spleeters said he discovered a Chinese company diverting millions of dollars of components to sanctioned Russian companies by working with U.S. companies whose chips were found in Russian weapons.

That company was sanctioned earlier this month by the United States.

'It's Going To Be Whack-A-Mole'

The committee is scrutinizing several U.S. chip firms whose products have turned up in Russian weapons, Senator Richard Blumenthal (Democrat-Connecticut) said, adding “these companies know or should know where their components are going.”

Spleeters threw cold water on the idea that Russia is acquiring chips from household appliances such as washing machines or from major online retail websites.

“We have seen no evidence of chips being ripped off and then repurposed for this,” he said.

“It makes little sense that Russia would buy a $500 washing machine for a $1 part that they could obtain more easily,” Spleeters added.

In his opening statement, Senator Ron Johnson (Republican-Wisconsin) said he doubted whether any of the solutions proposed by the experts would work, noting that Russia was ramping up weapons production despite sweeping sanctions.

“You plug one hole, another hole is gonna be opening up, it's gonna be whack-a-mole. So it's a reality we have to face,” said Johnson.

Russia last year imported $1.7 billion worth of foreign-made microchips despite international sanctions, Bloomberg reported last month, citing classified Russian customs service data.

Johnson also expressed concern that sanctions would hurt Western nations and companies.

“My guess is they're just going to get more and more sophisticated evading the sanctions and finding components, or potentially finding other suppliers...like Huawei,” Johnson said.

Huawei is a leading Chinese technology company that produces chips among other products.

James Byrne, the founder and director of the open-source intelligence and analysis group at the Royal United Services Institute, said that officials and companies should not give up trying to track the chips just because it is difficult.

'Shocking' Dependency On Western Technology

He said that the West has leverage because Russia is so dependent on Western technology for its arms industry.

“Modern weapons platforms cannot work without these things. They are the brains of almost all modern weapons platforms,” Byrne said.

“These semiconductors vary in sophistication and importance, but it is fair to say that without them Russia … would not have been able to sustain their war effort,” he said.

Byrne said the depth of the dependency on Western technology -- which goes beyond semiconductors to include carbon fiber, polymers, lenses, and cameras -- was “really quite shocking” considering the Kremlin’s rhetoric about import substitution and independence.

Elina Ribakova, a Russia expert and economist at the Peterson Institute for International Economics, said an analysis of 2,800 components taken from Russian weapons collected in Ukraine showed that 95 percent came from countries allied with Ukraine, with the vast majority coming from the United States. The sample, however, may not be representative of the actual distribution of component origin.

Ribakova warned that Russia has been accelerating imports of semiconductor machine components in case the United States imposes such export controls on China.

China can legally buy advanced Western components for semiconductor manufacturing equipment and use them to manufacture and sell advanced semiconductors to Russia, Senator Margaret Hassan (Democrat-New Hampshire) said.

Ribakova said the manufacturing components would potentially allow Russia to “insulate themselves for somewhat longer.”

Ribakova said technology companies are hesitant to beef up their compliance divisions because it can be costly. She recommended that the United States toughen punishment for noncompliance as the effects would be felt beyond helping Ukraine.

“It is also about the credibility of our whole system of economic statecraft. Malign actors worldwide are watching whether they will be credible or it's just words that were put on paper,” she said.


This content originally appeared on News - Radio Free Europe / Radio Liberty and was authored by News - Radio Free Europe / Radio Liberty.

]]>
https://www.radiofree.org/2024/02/29/russian-who-smuggled-military-technology-pleads-guilty-in-u-s-court/feed/ 0 461391
Taylor Swift’s Super Bowl flight shows what’s wrong with carbon removal https://grist.org/technology/taylor-swifts-super-bowl-flight-shows-whats-wrong-with-carbon-removal/ https://grist.org/technology/taylor-swifts-super-bowl-flight-shows-whats-wrong-with-carbon-removal/#respond Tue, 13 Feb 2024 09:30:00 +0000 https://grist.org/?p=629768 To get to the Super Bowl on time, Taylor Swift took a private jet from Tokyo to Los Angeles and then hustled to Las Vegas. The carbon removal company Spiritus estimated that her journey of roughly 5,500 miles produced about 40 tons of carbon dioxide — about what is generated by charging nearly 5 million cell phones. But don’t worry, the company assured her critics: It would take those emissions right back out of the sky.

“Spiritus wants to help Taylor and her Swifties ‘Breathe’ without any CO2 ‘Bad Blood,’” it said in a pun-laden pitch to reporters. “It’s a touchdown for everyone.”

The startup is among dozens, if not hundreds, of businesses trying to permanently remove climate-warming gases from the atmosphere. Its approach involves drawing carbon directly from the air and burying it, but others sink it in the ocean. Last week, Graphyte, a venture backed by Bill Gates, began compacting sawdust and other woody waste that are rich in carbon into bricks that it will bury deep underground. 

Spiritus says “sponsoring carbon offsets is a step toward environmental responsibility, not an endorsement of luxury flights” and added that “celebrities are going to take private jets regardless of what Spiritus does.” Even before the company stepped in, Swift reportedly planned to purchase offsets that more than covered her travel. But some climate experts say moves like Spiritus’ illustrate the dangerous direction the rapidly growing carbon dioxide removal, or CDR, industry is headed.

“The worry is that carbon removal will be something we do so that business-as-usual can continue,” said Sara Nawaz, director of research at American University’s Institute for Carbon Removal Law and Policy. “We need a really big conversation reframe.”

The United Nations Intergovernmental Panel on Climate Change says carbon removal will be “required” to meet climate targets, and the United States Department of Energy has a goal of bringing the cost down to $100 per ton (a price point Spiritus claims it wants to deliver as well). What concerns Nawaz is the outsize role that private companies are currently playing. 

“It’s very market-oriented: doing carbon removals for profit,” Nawaz said. That reliance on the market, she elaborated, won’t necessarily lead to the just, equitable, and scalable outcomes that she hopes CDR can achieve. “We need to take a step back.”

Nawaz co-wrote a report released today titled “Agenda for a Progressive Political Economy of Carbon Removal.” In it, she and her co-authors lay out a vision for carbon removal that shifts away from market-centric approaches to ones that are government-, community-, and worker-led.

“What they suggest is quite radical,” said Lauren Gifford, associate director of the Soil Carbon Solutions Center at Colorado State University who was not involved in the research. She supports the direction the authors advocate, adding, “They actually give us a roadmap on how to get there, and that in itself is progressive.”

Nawaz compared carbon removal’s current trajectory to the bumpy path that carbon offsets has followed. That industry, in which organizations sell credits to offset greenhouse gas emissions, has been plagued by misleading claims and perverse incentives. It has also raised environmental justice concerns where offsets are disproportionately impacting frontline communities and developing nations. For example, Blue Carbon, a company backed by the United Arab Emirates, has been buying enormous swaths of land in Africa to fuel its offsets program. 

“We don’t want to do that again with carbon removal,” she said.

Philanthropy is one possible alternative to corporate carbon removal. The report cites a nonprofit organization called Terraset that puts tax-deductible donations toward CDR projects (including Spiritus’). But, Nawaz says, that approach won’t grow quickly or sustainably enough to remove the many gigatons of emissions needed to meaningfully address climate change. 

“That’s not a scalable approach,” she said. “We’re going to need so much more money.”

The report argues that communities and governments must play a central role in the industry. Nawaz cites community-driven carbon removal efforts out West, such as the 4 Corners Carbon Coalition, as examples of what might be possible on the local level. Nationally, she points to Germany’s transition away from coal as a way that governments can not only fund but fundamentally drive clean energy policy that puts workers at the fore.

To be sure, the United States is investing in carbon removal. The bipartisan infrastructure law and Inflation Reduction Act included billions of dollars for technology such as regional direct air capture hubs. But the legislation mostly positions the government as a funder or purchaser of carbon removal initiatives rather than a practitioner. 

“It’s, frankly, a pretty disappointing way it’s evolving,” said Nawaz, noting, for instance, that Occidental Petroleum is among those receiving federal funding for carbon removal. She would like to see the government take a more hands-on role. “Not just government procurement of carbon removal. But actually government-led research and early-stage implementation of carbon removal.”

Gifford agrees that there are dangers in the industry relying too much on the private sector. “There’s something really scary about putting the climate crisis in the hands of wealthy tech founders,” she said. But companies have also been at the forefront of advancing the field as well. “The climate crisis is one of these things that’s all-hands-on-deck.”

Those in the private sector say their efforts are critical to ensuring that carbon removal technology is developed and deployed as quickly as possible. “Our coalition represents innovators,” said Ben Rubin, the executive director of the Carbon Business Council, a nonprofit trade association representing more than 100 carbon management companies. ”There won’t necessarily be one silver bullet.”

“There’s a long history of public-private partnerships ushering in some of the world’s latest and greatest innovations,” added Dana Jacobs, the chief of staff for the Carbon Removal Alliance, which similarly represents startups in this space. “We think carbon removal won’t be any different.”

Nawaz and her colleagues want to shake that paradigm before it’s too deeply entrenched. The alternative could be continued unjust outcomes for marginalized people and limited progress on luxury emissions, such as Swift’s flight to the Super Bowl. 

“The idea is that carbon removal is a public good,” she said. “We shouldn’t have to rely on just the private sector to provide it.”

This story was originally published by Grist with the headline Taylor Swift’s Super Bowl flight shows what’s wrong with carbon removal on Feb 13, 2024.


This content originally appeared on Grist and was authored by Tik Root.

]]>
https://grist.org/technology/taylor-swifts-super-bowl-flight-shows-whats-wrong-with-carbon-removal/feed/ 0 458436
Australian student journos explore Fiji media landscape with USP team https://www.radiofree.org/2024/02/12/australian-student-journos-explore-fiji-media-landscape-with-usp-team/ https://www.radiofree.org/2024/02/12/australian-student-journos-explore-fiji-media-landscape-with-usp-team/#respond Mon, 12 Feb 2024 23:50:59 +0000 https://asiapacificreport.nz/?p=96976 Wansolwara News

The University of the South Pacific journalism programme is hosting a cohort student journalists from Australia’s Queensland University of Technology this week.

Led by Professor Angela Romano, the 12 students are covering news assignments in Fiji as part of their working trip.

The visitors were given a briefing by USP journalism teaching staff — Associate Professor in Pacific journalism and programme head Dr Shailendra Singh, and student training newspaper supervising editor-in-chief Monika Singh.

PACIFIC MEDIA CONFERENCE 4-6 JULY 2024
PACIFIC MEDIA CONFERENCE 4-6 JULY 2024

The students held lively discussions about the form and state of the media in Fiji and the Pacific, the historic influence of Australian and Western news media and its pros and cons, and the impact of the emergence of China on the Pacific media scene.

Dr Singh said the small and micro-Pacific media systems were “still reeling” from revenue loss due to digital disruption and the covid-19 pandemic.

As elsewhere in the world, the “rivers of gold” (classified advertising revenue) had virtually dried up and media in the Pacific were apparently struggling like never before.

Dr Singh said that this was evident from the reduced size of some newspapers in the Pacific, in both classified and display advertising, which had migrated to social media platforms.

Repeal of draconian law
He praised Fiji’s coalition government for repealing the country’s draconian Media Industry Development Act last year, and reviving media self-regulation under the revamped Fiji Media Council.

However, Dr Singh added that there was still some way to go to further improve the media landscape, including focus on training and development and working conditions.

“There are major, longstanding challenges in small and micro-Pacific media systems due to small audiences, and marginal profits,” he said. “This makes capital investment and staff development difficult to achieve.”

The QUT students are in Suva this month on a working trip in which students will engage in meetings, interviews and production of journalism. They will meet non-government organisations that have a strong focus on women/gender in development, democracy or peace work.

The students will also visit different media organisations based in Suva and talk to their female journalists on their experiences and their stories.

The USP journalism programme started in Suva in 1988 and it has produced more than 200 graduates serving the Pacific and beyond in various media and communication roles.

The programme has forged partnerships with leading media players in the Pacific and our graduates are shining examples in the fields of journalism, public relations and government/NGO communication.

Asia Pacific Report publishes in partnership with The University of the South Pacific’s newspaper and online Wansolwara News.


This content originally appeared on Asia Pacific Report and was authored by Wansolwara.

]]>
https://www.radiofree.org/2024/02/12/australian-student-journos-explore-fiji-media-landscape-with-usp-team/feed/ 0 458337
Meta Considering Increased Censorship of the Word “Zionist” https://www.radiofree.org/2024/02/09/meta-considering-increased-censorship-of-the-word-zionist/ https://www.radiofree.org/2024/02/09/meta-considering-increased-censorship-of-the-word-zionist/#respond Fri, 09 Feb 2024 00:50:44 +0000 https://theintercept.com/?p=460596

Facebook and Instagram’s parent company, Meta, is contemplating stricter rules around discussing Israeli nationalism on its platforms, a major policy change that could stifle criticism and free expression about the war in Gaza and beyond, five civil society sources who were briefed on the potential change told The Intercept.

“Meta is currently revisiting its hate speech policy, specifically in relation to the term ‘Zionist,’” reads a January 30 email sent to civil society groups by Meta policy personnel and reviewed by The Intercept. While the email says Meta has not made a final determination, it is soliciting feedback on a potential policy change from civil society and digital rights groups, according to the sources. The email notes that “Meta is reviewing this policy in light of content that users and stakeholders have recently reported” but does not detail the content in question or name any stakeholders.

“As an anti-Zionist Jewish organization for Palestinian freedom, we are horrified to learn that Meta is considering expanding when they treat ‘Zionism’ — a political ideology — as the same as ‘Jew/Jewish’ — an ethno-religious identity,” said Dani Noble, an organizer with Jewish Voice for Peace, one of the groups Meta has contacted to discuss the possible change. Noble added that such a policy shift “will result in shielding the Israeli government from accountability for its policies and actions that violate Palestinian human rights.”

For years, Meta has allowed its 3 billion users around the world to employ the term “Zionist,” which refers to supporters of the historical movement to create a Jewish state in the Middle East, as well as backers of modern-day nationalism in support of that state and its policies.

Meta’s internal rules around the word “Zionist,” first reported by The Intercept in 2021, show that company moderators are only supposed to delete posts using the term if it’s determined to be a proxy for “Jewish” or “Israeli,” both protected classes under company speech rules. The policy change Meta is now considering would enable the platform’s moderators to more aggressively and expansively enforce this rule, a move that could dramatically increase deletions of posts critical of Israeli nationalism.

“We don’t allow people to attack others based on their protected characteristics, such as their nationality or religion. Enforcing this policy requires an understanding of how people use language to reference those characteristics,” Meta spokesperson Corey Chambliss told The Intercept. “While the term Zionist often refers to a person’s ideology, which is not a protected characteristic, it can also be used to refer to Jewish or Israeli people. Given the increase in polarized public discourse due to events in the Middle East, we believe it’s important to assess our guidance for reviewing posts that use the term Zionist.”

In the months since October 7, staunchly pro-Israel groups like the Anti-Defamation League have openly called for treating anti-Zionism as a form of antisemitism, pointing out that the word is often used by antisemites as a stand-in for “Jew.” The ADL and American Jewish Committee, another pro-Israel, Zionist advocacy group in the U.S., have both been lobbying Meta to restrict use of the word “Zionist,” according to Yasmine Taeb, legislative and political director at the Muslim grassroots advocacy group MPower Change. In his statement, Chambliss responded, “We did not initiate this policy development at the behest of any outside group.”

Taeb, who spoke to a Meta employee closely involved with the proposed policy change, said it would result in mass censorship of critical mentions of Zionism, restricting, for example, non-hateful, non-violent speech about the ongoing bloodshed in Gaza.

While a statement as general as “I don’t like Zionists” could be uttered by an antisemitic Instagram user as a means of expressing dislike for Jews, civil society advocates point out that there is nothing inherently or necessarily anti-Jewish about the statement. Indeed, much of the fiercest political activism against Israel’s war in Gaza has been organized by anti-Zionist Jews, while American evangelical Christian Zionists are some of Israel’s most hardcore supporters.

“The suppression of pro-Palestinian speech critical of Israel is happening specifically during the genocide in Gaza,” Taeb said in an interview. “Meta should instead be working on implementing policies to make sure political speech is not being suppressed, and they’re doing the exact opposite.”

According to presentation materials reviewed by The Intercept, Meta has been sharing with stakeholders a series of hypothetical posts that could be deleted under a stricter policy, and soliciting feedback as to whether they should be. While one example seemed like a clear case of conspiratorial antisemitic tropes about Jewish control of the news media, others were critical of Israeli state policy or supporters of that policy, not Judaism, said Nadim Nashif, executive director of the Palestinian digital rights group 7amleh, who was briefed this week by Meta via video conference. Meta plans to brief U.S. stakeholder groups on Friday morning, according to its outreach email.

Examples of posts Meta could censor under a new policy included the statements: “Zionists are war criminals, just look at what’s happening in Gaza”; “I don’t like Zionists”; and “No Zionists allowed at tonight’s meeting of the Progressive Student Association.” Nashif said that one example — “Just read the news every day. A coalition of Zionists, Americans and Europeans tries to rule the world.” — was described by Peter Stern, Meta’s director of content policy stakeholder engagement, as possibly hateful because it engaged in conspiratorial thinking about Jews.

In an interview with The Intercept, Nashif disagreed, arguing that criticism of the strategic alliance and foreign policy alignment between the U.S., European states, and Israel should not be conflated with conspiratorial bigotry against Judaism, or collapsed into bigoted delusions of global Jewish influence. In their meeting, Nashif says Stern acknowledged that Zionism is a political ideology, not an ethnic group, despite the prospect of enforcement that would treat it more like the latter. “I think it may actually harm the fight against antisemitism, conflating Zionism and the Israeli government with Judaism,” Nashif told The Intercept.

It will be difficult or impossible to determine whether someone says they “don’t like” Zionists with a hateful intent, Nashif said, adding: “You’d need telepathy.” Meta has yet to share with those it has briefed any kind of general principles, rules, or definitions that would guide this revised policy or help moderators enforce it, Nashif said. But given the company’s systematic censorship of Palestinian and other Arab users of its platforms, Nashif and others familiar with the potential change fear it would make free expression in the Arab world even more perilous.

“As anti-Zionist Jews, we have seen how the Israeli government and its supporters have pushed an agenda that falsely claims that equating ‘Zionist’ with ‘Jew’ or ‘Jewish’ will somehow keep Jews safe,” added Noble of Jewish Voice for Peace. “Not only does conflating anti-Zionism and antisemitism harm all people who fight for human rights in the world by stifling legitimate criticism of a state and military, it also does nothing to actually keep our community safe while undermining our collective efforts to dismantle real antisemitism and all forms of racism, extremism and oppression.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2024/02/09/meta-considering-increased-censorship-of-the-word-zionist/feed/ 0 457899
Bitcoin mining uses a lot of energy. The US government is about to find out how much. https://grist.org/technology/bitcoin-mining-uses-a-lot-of-energy-the-us-government-is-about-to-find-out-how-much/ https://grist.org/technology/bitcoin-mining-uses-a-lot-of-energy-the-us-government-is-about-to-find-out-how-much/#respond Thu, 08 Feb 2024 09:15:00 +0000 https://grist.org/?p=629247 In 2021, when China banned bitcoin and other cryptocurrencies, crypto miners flocked to the United States in search of cheap electricity and looser regulations. In a few short years, the U.S.’s share of global crypto mining operations grew from 3.5 percent to 38 percent, forming the world’s largest crypto mining industry. 

The impacts of this shift have not gone unnoticed. From New York to Kentucky to Texas, crypto mining warehouses have vastly increased local electricity demand to power their 24/7 computing operations. Their power use has stressed local grids, raised electricity bills for nearby residents, and kept once-defunct fossil fuel plants running. Yet to date, no one knows exactly how much electricity the U.S. crypto mining industry uses. 

That’s about to change as federal officials launch the first comprehensive effort to collect data on cryptocurrency mining’s energy use. This week, the U.S. Energy Information Administration, an energy statistics arm of the federal Department of Energy, is requiring 82 commercial crypto miners to report how much energy they’re consuming. It’s the first survey in a new program aiming to shed light on an opaque industry by leveraging the agency’s unique authority to mandate energy use disclosure from large companies.

“This is nonpartisan data that’s collected from the miners themselves that no one else has,” said Mandy DeRoche, deputy managing attorney in the clean energy program at the environmental law nonprofit Earthjustice. “Understanding this data is the first step to understanding what we can do next.”

Cryptocurrencies like bitcoin bypass the need for financial institutions by adding data to a public ledger, or “blockchain,” to verify all transactions. To win money, computers using energy-intensive mining software race to confirm additions to the blockchain. According to initial estimates published by the U.S. Energy Information Administration last week, cryptocurrency mining could account for between 0.6 percent and 2.3 percent of total annual U.S. electricity use. To put that into perspective, in 2022, the entire state of Utah consumed about 0.8 percent of electricity consumed in the U.S. The state of Washington, home to nearly 8 million people, consumed 2.3 percent. 

“It’s a tremendous amount of energy that we don’t have transparency into and that we don’t understand the details about,” DeRoche told Grist. One reason why it’s so difficult to track crypto mining’s energy use is the size of mining facilities, which can range from individual computers to giant warehouses. Smaller facilities are often exempt from local permitting requirements and frequently move to source cheaper electricity. Data on larger operations’ energy use is often hidden in private contracts with local utilities or tied up in litigation over individual facilities, said DeRoche. 

The Energy Information Administration, or EIA, is in an unusually powerful position to require greater transparency from crypto miners. Under federal law, the agency can require any company engaged in “major energy consumption” to provide information on its power use. In July 2022 and February 2023, Democratic members of Congress including Senator Elizabeth Warren and Representative Rashida Tlaib sent letters to the Environmental Protection Agency and the Department of Energy, calling for the agencies to exercise that authority over crypto miners and “implement a mandatory disclosure regime as rapidly as possible.”

In late January, the EIA sent a letter to the White House Office of Management and Budget requesting emergency approval to survey crypto mining facilities, taking the first step in creating such a regime. The letter raised concerns that the price of bitcoin had increased 50 percent in the last three months, incentivizing more mining activity that could stress local power grids already under strain from cold weather and winter storms. 

“Given the emerging and rapidly changing nature of this issue and because we cannot quantitatively assess the likelihood of public harm, we feel a sense of urgency to generate credible data that would provide insight into this unfolding issue,” EIA Administrator Joseph DeCarolis wrote in the letter. The White House approved the survey on January 26. 

While its total electricity use is poorly understood, cryptocurrency mining’s impacts on utility bills and carbon pollution have been widely documented. A recent analysis by the energy consulting firm Wood Mackenzie found that bitcoin mining in Texas has already raised electricity costs for residents by $1.8 billion per year. In the winter of 2018, utility bills for residents in Plattsburgh, New York, rose by up to $300 as nearby bitcoin miners gobbled up low-cost hydropower, forcing the city to buy more expensive electricity elsewhere. 

Crypto’s skyrocketing electricity demand has also revived previously shuttered fossil fuel power generators. Near Dresden, New York, the formerly shut-down Greenidge natural gas plant reopened in 2017 exclusively to power bitcoin mining. In Indiana, a coal-fired plant slated to power down in 2023 will now keep operating, and a crypto mining facility is setting up shop next door. AboutBit, the crypto mining startup that owns the facility, told the Indianapolis outlet IndyStar that the facility had nothing to do with the coal plant remaining open. DeRoche pointed to other gas plants in New York and Kentucky where crypto mining operations have created renewed demand for fossil fuels. 

The Greenidge Generation bitcoin mining facility by Seneca Lake near Dresden, New York, in 2021. Ted Shaffrey / AP Photo

In Texas, crypto miners are also paid by the state’s power grid operator to shut down during heat waves and other periods of high demand. Since 2020, five facilities in Texas have made at least $60 million from the program, according to The New York Times. Those subsidies come without much payoff or jobs for local residents, DeRoche said: Even large mining operations employ at most only a few dozen people, the Times reported. 

Bitcoin mining companies, however, maintain that they benefit local residents. Riot Platforms, one of the country’s biggest bitcoin mining firms, stated in a press release in September that the company “employs hundreds of Texans and is helping to revitalize communities that had experienced economic hardship.” Crypto mining businesses also dispute claims that they overuse energy resources. In a May 2022 letter to the Environmental Protection Agency, the Bitcoin Mining Council, a group representing bitcoin mining companies, made the dubious claim that “Bitcoin miners have no emissions whatsoever.” The group added, “Digital asset miners simply buy electricity that is made available to them on the open market, just the same as any industrial buyer.”

Policymakers are finally starting to catch up to the industry’s impacts on the climate and neighboring communities. In November 2022, the state of New York enacted a two-year moratorium on new crypto mining facilities that source power from fossil fuel plants. 

The EIA’s surveys of crypto mining companies beginning this week will identify “the sources of electricity used to meet cryptocurrency mining demand,” DeCarolis, the EIA administrator, said in a press release. The data will be published on the EIA’s website later this year. 

This story was originally published by Grist with the headline Bitcoin mining uses a lot of energy. The US government is about to find out how much. on Feb 8, 2024.


This content originally appeared on Grist and was authored by Akielly Hu.

]]>
https://grist.org/technology/bitcoin-mining-uses-a-lot-of-energy-the-us-government-is-about-to-find-out-how-much/feed/ 0 457569
How we investigated the land-grant university system https://grist.org/technology/how-we-investigated-land-grant-university-system/ https://grist.org/technology/how-we-investigated-land-grant-university-system/#respond Wed, 07 Feb 2024 09:41:00 +0000 https://grist.org/?p=628728 In 1862, the Morrill Act allowed the federal government to expropriate over 10 million acres of tribal lands from Native communities, selling or developing them in order to fund public colleges. Over time, additional violence-backed treaties and land seizures ceded even more Indigenous lands to these “land-grant universities,” which continue to profit from these parcels

But the Morrill Act is only one piece of legislation that connects land taken from Indigenous communities to land-grant universities. Over the past year, Grist looked at state trust lands, which are held and managed by state agencies for the schools’ continued benefit, and which total more than 500 million surface and subsurface acres across 21 states. We wanted to know how these acres, also stolen Indigenous land, are being used to fund higher education.

To do this, we needed to construct an original dataset. 

  • Grist located all state trust lands distributed through state enabling acts that currently send revenue to higher education institutions that also benefited from the Morrill Act. 
  • We identified their original Indigenous inhabitants and caretakers, and researched how much the United States would have paid for each parcel. The latter is based on an assessment of Indigenous territorial history, according to the U.S. Forest Service, associated with the land the parcels are on. 
  • We reconstructed more than 8.2 million acres of state trust parcels taken from 123 tribes, bands, and communities through 121 land cessions, a legal term for the surrendering of land. (It is important to note that land cession histories are incomplete and accurate only to the view of U.S. law and historical negotiations, not to Indigenous histories, epistemologies, or historic territories not captured by federal data.) 
  • The U.S. Forest Service dataset, which is based on the Schedule of Indian Land Cessions compiled by Charles Royce for the Eighteenth Annual Report of the Bureau of American Ethnology to the Secretary of the Smithsonian Institution (1896-1897), covers the period from 1787 to 1894.

This unique dataset was created through extensive spatial analysis that acquired, cleaned, and analyzed data from state repositories and departments across more than 14 states. We also reviewed historical financial records to supplement the dataset. 

This information represents a snapshot of trust land parcels and activity present in November 2023. We encourage exploration of the database and caution that this snapshot is likely very different from state inventories 20, 50, or even 100 years ago. Since, to our knowledge, no other database of this kind exists — with this specific state trust land data benefitting land-grant universities — we are committed to making it publicly available and as robust as possible.

To identify what types of activities take place on state trust land parcels, we collected and compared state datasets on different kinds of land use. The activities in these data layers include, but are not limited to: active and inactive leases for coal, oil and gas, minerals, agriculture, grazing, commercial use, real estate, water, renewable energies, and easements. We then conducted spatial comparisons between these layers, explained further in Step 5 (see index below). 

Users can also go to GitHub to view and download the code used to generate this dataset. The various functions used within the program can also be adapted and repurposed for analyzing other kinds of state trust lands — for example, those that send revenue to penitentiaries and detention centers, which a number of states do. 

The database administrator can be contacted at landgrabu@grist.org

If you republish this data or draw on it as a source for publication, cite as: Parazo Rose, Maria, et al. “Enabling Act Indigenous Land Parcels Database,” Grist.org, February 2024.

If you use this data for your own reporting, please be sure to credit Grist in the story and please send us a link.

Terminology

STL Parcel: State trust land parcels, or land granted to states through enabling acts. The word “parcel” refers to defined pieces of land that can range in size and are considered distinct units of property.

PLSS Number: The surveying method developed and used in the United States to plat, or divide, real property for sale and settling.

CRS System: A coordinate reference system that defines how a map projection in a GIS program relates to and represents real places on Earth. Deciding what CRS to use depends on the regional area of analysis.

Dataframe: A dataframe is a “two-dimensional” way of storing and manipulating tabular data, similar to a table with columns and rows.

REST API: An API, or application programming interface, is a type of software interface that allows users to communicate with a computer or system to retrieve information or perform a function. REST, also known as RESTful web services, stands for “representational state transfer” and has specific constraints. Systems with REST APIs optimize client-server interactions and can be scaled up efficiently. 

Deduplication: Deduplication refers to a method of eliminating a dataset’s redundant data. In a secure data deduplication process, a deduplication assessment tool identifies extra copies of data and deletes them, so a single instance can then be stored. In our methodology, we deduplicated extra parcels, which we explain in further detail in Step 4. 

Relevant Documents

Table 1: State Data Sources

Appendix A: Oklahoma and South Dakota processing

Steps

To reconstruct the redistribution of Indigenous lands and the comparative implications of their conversion to revenue for land-grant universities, we followed procedures that can be generally categorized in seven steps: 

  1. Identify relevant university beneficiaries;
  2. Acquire data for STL parcels
  3. Clean data for STL parcels
  4. Merge data that came from various sources within a single state;
  5. Identify and join land use activity taking place on STL parcels;
  6. Join the parcel locations to Indigenous land cessions
  7. Determine the price paid per acre; and
  8. Generate summary statistics

Identify university beneficiaries

We identified 14 universities in 14 states that initially benefited from the Morrill Act of 1862 and currently receive revenue benefits from state trust lands granted through enabling acts.

Initially, 30 states distributed funds to higher education institutions, including land-grant universities, according to their enabling acts. We contacted all 30 states via phone and email to confirm whether they had state trust lands that currently benefitted target institutions. Multiple states continue to distribute revenue generated from state trust lands to other higher education institutions, as well as K-12 schools. However, those states are not included in our dataset as the lands in question are outside the scope of this investigation. 

In other words, multiple states have trust lands that produce revenue for institutions, but only 14 have trust lands that produce revenue for land-grant universities. 

Data acquisition 

Once we clarified which states had relevant STL parcels, the next step was to acquire the raw data of all state trust lands within that state so we could then filter for the parcels associated with land-grant institutions. We started by searching state databases, typically associated with their departments of natural resources, or the equivalent, to find data sources or maps. While most of the target states maintain online spatial data on land use and ownership, not all of that data is immediately available to download or access. For several states, we were able to scrape their online mapping platforms to access their REST servers and then query data through a REST API. For other states, we directly contacted their land management offices to get the most up-to-date information on STL parcels. 

(Please see Table 1 for a list of the data sources referenced for each state, as well as all state-specific querying details.)

After acquiring the raw data, we researched which trust names were associated with the 14 identified universities. As mentioned above, each state maintains trust lands for multiple entities ranging from K-12 schools to penitentiaries, and each state has unique names for target beneficiaries in their mapping and financial data. We used these trust names to manually filter through the raw data and select only the parcels that currently send revenue to university beneficiaries and checked those names with state officials for accuracy. 

Once identified and filtered, we reviewed that raw data to identify whether there were any additional fields that would be helpful to our schema (typically locational data of some kind, like PLSS, though this occasionally included activity or lease information) and included those fields as part of the data we extracted from state servers or the spatial files we were given, in addition to the geometric data that located and mapped the parcels themselves. 

It’s important to note that we could not find information for 871 surface acres and 5,982 subsubsurface acres in Oklahoma, because they have yet to be digitally mapped or because of how they are sectioned on the land grid. We understand that this acreage does exist based on lists of activities kept by the state. However, those lists do not provide mappable data to fill these gaps. In order to complete reporting on Oklahoma, researchers will need to read and digitize physical maps and plats held by the state — labor this team was unable to provide during the project period.

Please also note that our dataset is partially incomplete due to the Montana Department of Natural Resources & Conservation’s delay in responding to a public records request by the time of publication. In the summer of 2023, we requested a complete dataset of state trust lands that send revenue to Montana State University. However, when we conducted a data review fact check with the Montana DNR this winter, they informed us that the data they supplied was incomplete and thus, inaccurate. We currently have a pending public records request that has yet to be returned.

(Please see Appendix A for specific notes on the data processing for OK.)

Data cleaning

When working with this data, one of the main considerations was that nearly all the data sources came in different and incompatible formats: The coordinate reference systems, or CRS, varied and had to be reprojected, the references to the trust names were inconsistent, and some files contained helpful fields, like location-specific identifiers or land use activity, while others were missing entire categories of information. Once we narrowed down the data we wanted, we cleaned and standardized the data, and sorted it into a common set of column names. This was particularly difficult for two states, Oklahoma and South Dakota, which required custom processing based on the format and quality of the initial data provided. 

(Please see Appendix A for specific descriptions of the data processing for OK and SD.)

This process required a significant amount of state-specific formatting. This included processes such as:

  • Querying certain fields in the source data to capture supplemental information, and then writing code to split or extract or take extra characters out of the values and assign the information to the appropriate columns.
  • Processing files that, either because of the way we had to query servers or because of how state departments sent us data, were split up by activity type, in a way that allowed us to capture all of the information so it wouldn’t be lost in downstream processes.
  • Creating functions that built off of information in the dataset to create new columns — like the net acres column, for example, for which we created an Idaho-specific function that calculated net acreage based on the percentage of state ownership, as indicated in the trust names. 

Dataset merge

After all the data had been processed and cleaned, we needed to merge the various state files. The querying process ended up producing multiple files for each state, based on the number of trust names we were filtering for, as well as the rights type. Arizona, for example, had six trusts that sent revenue to the University of Arizona, each containing surface and subsurface acreage. Thus, we had 12 total AZ-specific files, since we generated six files, one for each trust, for surface acres, and another for subsurface acres. 

These generated files are uniform to themselves, which means additional adjustments needed to be made for them to merge properly. So, before we merged all of a state’s files, we took each one — separated by rights type and trust name — and deleted the duplicate geometries that existed. We wanted to avoid repeating parcels that contained the same information because of the impact it would have on the acreage summaries, which is why we take a single file and delete information that contains the same rights type and trust name. In the process of geometric deduplication, we have taken particular care to aggregate any information that may be different — which, in our work, was mostly related to activity type. In these cases, if we deduplicated two parcels that were the same except for land use activity type that we noted in the raw data (not identified later in the activity match process), we combined both activities into a list in the activity field.

We can look at how the deduplication process plays out with an example in Montana and how it affects acreage. In our analysis, we report that Montana has 104,585.7 subsurface acres in its state trust land portfolio. However, that number refers to unique subsurface parcels in Montana. This is because we acquired the subsurface data as three separate files, identifying parcels affiliated with coal, oil and gas, or other minerals. Our process found parcels from different files that overlapped. So, we deleted the extra parcels and combined the activities. That way, we could use the main spreadsheet to determine that Montana’s subsurface acreage is broken down like this: 

  • Coal: 2,013.4 acres
  • Oil and gas: 103,341.09 acres
  • Other minerals: 1243.51 acres
  • The sum of Montana’s subsurface acreage, by that analysis, is 106,598. 

The difference in numbers is because some subsurface acres have multiple activities occurring on them. Our deduplication process identifies those acres with multiple activities and reduces that number to 104,585.7 acres. 

As a note, we initially combined parcels that were geometric duplicates but had different rights types (for example, one had surface and the other had subsurface) to reflect that a parcel had both surface and subsurface rights. However, we found that this led to inaccuracies. In this final dataset, parcels have either surface or subsurface rights (or timber, in the case of Washington). Users should take care to note that instances of seemingly duplicated land parcels reflect this adjustment. 

Prior to merging all state files into a single file, we calculated parcel acreage in the original source projection. Though most states record acreage of trust land parcels, several do not. So to assign acreage to parcels that had no area indicated and to create a consistent area measurement, we spatially calculated the acreage of all parcels through GIS to supplement the state-reported acres column. For accuracy, we calculated the acreage of the parcels in their initial source CRS and cross-referenced calculations with state agencies. 

Mapping the land use activity

To identify what types of activity currently takes place on these parcels, we collected datasets on different kinds of land use from states, including, but not limited to, active and inactive leases for coal, oil and gas, minerals, agriculture, grazing, commercial use, real estate, water, renewable energies, and easements. We searched state databases or contacted land use offices to acquire spatial data, and we queried data through REST APIs. Initially, we called on state servers each time we ran our activity match operations, but the processing time was too inefficient, so we converted the majority of the datasets to shapefiles for faster processing. 

It is important to note that states manage and track land use activity data in a variety of ways. Some states have different datasets for each type of activity, while some combine all land use activity into a single file. Some states indicate whether a certain lease or activity is presently active or not, some specify its precise status (prospecting, drilling, etc.), and some don’t include that information at all. Activities might be broadly classified as easement, agriculture, oil and gas, or coal — however, there might be a more specific description about its nature such as “Natural Gas Storage Operations,” “Access Road,” or “Offset Gas Well Pad.” Some states use numbers that require a key to interpret the activity. To accommodate these variations, we used the activity description that struck the best balance between being detailed and being clear, which either meant calling on the value of a specific column or titling the data layer as something general (“Oil and Gas”) and using that as the activity name. Users can look at the activity_match.py and state_data_sources.py files for further detail. 

To identify how state trust land parcels are used, we gathered state datasets with spatial information on where land use activities take place. The data came as either points or polygons. 

Users should note that, in the case of South Dakota, very few datasets on state land use activity were publicly accessible. Though we filed public records requests to obtain information, the state did not return our requests, leaving the activity fields for that state mostly empty of content apart from parcel locations.
Because there were so many data points in the information coming from states that were being matched against each row in the Grist dataset, we needed to find a way to expedite the process. Ultimately, we organized the activity datasets from each state into their own R-trees, tree data structures that are used to index multidimensional information, which allowed us to group together nearby parcels (which we will use from here on to mean polygons or points). For point data, we established bounding “envelopes” around each point to create the smallest appropriate polygon. In the diagram below, you can see an example of how nearby parcels are grouped together.

Grist

This data structure works by collecting nearby objects and organizing them with their minimum bounding rectangle. Then, one activity-set-turned-R-tree was compared to our trust land dataset at a time. In that process, a comparison looked at one Grist parcel through an activity’s R-tree, which is like a cascading way of identifying what parcels are close together. Whenever a query is conducted to compare another dataset against information in this R-tree, if a parcel does not intersect a given bounding rectangle, then it also cannot intersect any of the contained objects. 

In other words, instead of comparing every parcel in our trust land dataset to every single other activity parcel in all of the state datasets, we are able to do much faster comparisons by looking at bigger areas and then narrowing down to more specific parcels when it’s relevant. 

When the R-trees were established, we also had a process that looked at the distance from bounding rectangles in a state activity dataset’s tree structure and the closest points in the Grist state trust lands dataset. We only tracked that an activity was present on a trust land parcel if it overlapped and was the same geometric feature. That first method of geographic overlap test was called on Geopandas’ GeoSeries operations, seeing if a Grist-identified parcel contained, crossed, covered, intersected, touched, or was within an activity parcel. If any of the conditions were true, we “kept” that data, and marked that activity as present on the associated parcel. 

We also had a second set of containment criteria that, if met, resulted in that activity being recorded as present. If we pulled in an activity parcel and, in comparing it to our trust land parcel dataset, found that it was the same geographic location, size (in acreage), and shape (via indices), we considered it to be a “duplicate parcel,” and recorded the presence of the relevant activity. We included all activities as a full list in the “activity” field associated with any given parcel. 

Additionally, it is important to note that we made three kinds of modifications specific to the various land use activity layers, depending on the available data. First, there were some layers that had a field within the dataset indicating whether or not it was active. For those, we were able to assign an activity match only if that row was reported as active. Second, there were several layers that had relevant details we could use to supplement the activity description, which we included. Lastly, we only included activities relevant to the rights type associated with a parcel. If a parcel had subsurface rights, for example, then we did not indicate activities that may have happened on the surface — say, agriculture or road leases. Similarly, if a parcel had surface rights, we did not include subsurface activity, like minerals or oil and gas. We made additional adjustments to layers that contained “miscellaneous” data, containing activities that were surface or subsurface activities in the same layer. For those layers, we created a list of subsurface activity terms that would appear on surface-rights based parcels. This way, we ensured that the miscellaneous data layers could be read in their entirety, without misattributing activities. 

Users can look at the activity_match.py and state_data_sources.py files for further detail. 

Lastly, we generalized land use activities in order to create the data visualizations that accompany the story — specifically, the land use activity map. For user readability, we wanted to give an overarching perspective on how much land is used for some of the most prevalent activities. To do this, we manually reviewed all the values in the activity field and created lists that categorized specific activities into subsets of broader categories: fossil fuels, mining, timber, grazing, infrastructure, and renewable energy. With fossil fuels, for example, we included any activities that mentioned oil and gas wells or oil and gas fields, offset well pads, tank batteries, etc. Or, with infrastructure, we included activities that mentioned access roads or highways, pipelines, telecommunications systems, and power lines, among others. Some parcels are associated with multiple land uses, such as grazing cattle and oil production. In these cases, the acreage is counted for each practice. These lists then informed what parcels showed up in the six broad categories we featured in the land use map. (For further detail, users can explore the GitHub repo for our webpage interactives.)

Join to USFS Cession data

For a more comprehensive understanding of the dataset in its historical context, we joined the stl_dataset_extra_activities.geojson file to cession data from the U.S. Forest Service, or USFS. This enabled us to see the treaties or seizures that transferred “ownership” of land from tribal nations to the U.S. government. We have included steps here on how to conduct these processes in Excel and QGIS, which is a free and open access GIS software system. Similar operations exist in programs like ArcGIS. The steps to conduct the join can be found in our README file and in stl_dataset_extra_activities_plus_cessions.csv on GitHub.

Calculate financial information

Based on accounting of historical payments for treaties performed for legal proceedings undertaken by the Indian Claims Commission and the Court of Claims, we identified the price per acre for Royce cession areas underlying the parcels in the dataset. Using the average price per acre for cessions, we calculated the amount paid to Indigenous nations for each parcel.

Some parcels were overlapped by multiple cession areas. In those cases, to calculate the total paid to Indigenous nations for a parcel, we added the amount paid for each individual overlapping cession together.

To adjust for inflation we used CPI-based conversion factors for the U.S. dollars. For more on conversion factors, see here. We derived inflation adjustment factors from the tabular data available here.

For example, if Parcel A had 320 acres and overlaps Cession 1 where the U.S. bought the land for $0.05 per acre, part of Cession 2 that was seized and had no associated payment, and part of Cession 3 where the U.S. bought the land for $0.30 per acre, we calculated: 

Price of parcel = (Total acreage x Price described in Cession 1) + (Total acreage x Price described in Cession 2 …) etc.

So:

Parcel A Price = (320*Cession1Price[$0.05]) + (320*Cession1Price[$0]) + (320*Cession1Price[$0.30]) 

Parcel A Price = $16 + $0 + 96

Price of parcel A = $112.00

A total of $112 is the price the federal government would have paid to tribal nations to acquire the land. In our dataset, the financial information on cessions has already been adjusted for inflation and can be considered as the amount paid in 2023 dollars.

Note that there are some Royce Cession ID numbers that we determined, after further research, were not actually land cessions. Rather, they described reservations created. We excluded these areas from our payment calculation.

We do not yet have financial information for cession ID 717 in Washington. The cession in question is 1,963.92 acres, and its absence means that the figures for price paid per acre or price paid per parcel are not complete for Washington. 

It is also important to note that when documenting Indigenous land cessions in the continental United States, the Royce cession areas are extensive but incomplete. Although they are a standard source and are often treated as authoritative, they do not contain any cessions made after 1894 and likely miss or in other ways misrepresent included cessions prior to that time. We have made efforts to correct errors (primarily misdated cessions) when found, but have, in general, relied on the U.S. Forest Service’s digital files of the Royce dataset. A full review, revision, and expansion of the Royce land cession dataset is beyond the scope of this project. 

Generate summary statistics

We wanted to aggregate this information so people could analyze the parcel data associated with a specific university or with a specific tribal nation. We generated two summary datasets: First, we combined all of the parcels by university to show their related tribes and cessions and how much the U.S. would have paid for these lands that they then gave to the universities. We created a second equivalent summary analysis that organizes information by present-day tribes and shows the associated universities, cessions, and payments. This step was accomplished after merging land cession and U.S. Forest Service data for better ease interacting with tribal leaders and impacted communities, as well as the removal of historic names, some of which are considered offensive today.

Please note that there were seven instances of tribes with similar names that we manually combined into a single row. 

  • Bridgeport Indian Colony, California, and Bridgeport Paiute Indian Colony of California
  • Burns Paiute Tribe of the Burns Paiute Indian Colony of Oregon and Burns Paiute Tribe, Oregon
  • Confederated Tribes and Bands of the Yakama Nation and ​​Confederated Tribes and Bands of the Yakama Nation, Washington
  • Nez Perce Tribe of Idaho and Nez Perce Tribe, Idaho
  • Quinault Tribe of the Quinault Reservation, Washington, and Quinault Indian Nation, Washington
  • Confederated Tribes of the Umatilla Reservation, Oregon, and Confederated Tribes of the Umatilla Indian Reservation, Oregon
  • Shoshone-Bannock Tribes of the Fort Hall Reservation, Idaho, and Shoshone-Bannock Tribes of the Fort Hall Reservation of Idaho


This story was originally published by Grist with the headline How we investigated the land-grant university system on Feb 7, 2024.


This content originally appeared on Grist and was authored by Maria Parazo Rose.

]]>
https://grist.org/technology/how-we-investigated-land-grant-university-system/feed/ 0 457422
How to conduct your own reporting and research on state trust lands https://grist.org/indigenous/how-to-conduct-your-own-reporting-research-state-trust-lands/ https://grist.org/indigenous/how-to-conduct-your-own-reporting-research-state-trust-lands/#respond Wed, 07 Feb 2024 09:39:00 +0000 https://grist.org/?p=628604 Contents


Overview

This user guide is designed for both general users and experienced researchers and coders. No coding skills are necessary to work with this dataset, but a basic working knowledge of tabular data files in Excel is required, and for more experienced users, knowledge of GIS. 

Over the past year, Grist has located all state trust lands distributed through state enabling acts that currently send revenue to higher education institutions that benefited from the Morrill Act. We’ve also identified their original Indigenous inhabitants and caretakers, and researched how much the United States would have paid for each parcel, based on an assessment of the cession history (according to the U.S. Forest Service’s record of the land associated with each parcel). We reconstructed more than 8.2 million acres of state trust parcels taken from 123 tribes, bands, and communities through 121 different land cessions — a legal term for the giving up of territory. 

It is important to note that land cession histories are incomplete and accurate only from the viewpoint of U.S. law and historical negotiations, not to Indigenous histories, epistemologies, or historic territories not captured by federal data. The U.S. Forest Service dataset, which is based on the Schedule of Indian Land Cessions compiled by Charles Royce for the Eighteenth Annual Report of the Bureau of American Ethnology to the Secretary of the Smithsonian Institution (1896-1897), covers the period from 1787 to 1894.

This information represents a snapshot of trust land parcels and activity as of November 2023. We encourage exploration of the database and caution that this snapshot is likely very different from state inventories 20, 50, or even 100 years ago. Since, to our knowledge, no other database of this kind — with this specific state trust land data benefitting land-grant universities — exists, we are committed to making it publicly available and as robust as possible.

For additional information, users can read our methodology or go to GitHub to view and download the code used to generate this dataset. The various functions used within the program can also be adapted and repurposed for analyzing other kinds of state trust lands — for example, those that send revenue to penitentiaries and detention centers, which is present in a number of states. 

Note: If you use this data for your reporting, please be sure to credit Grist in the story and please send us a link.

The database administrator can be contacted at landgrabu@grist.org.

What’s in the database

This database contains a GeoJSON and CSVs, as well as a multi-tab spreadsheet that aggregates and summarizes key data points. 

GeoJSON

  1. National_STLs.geojson

CSVs

  1. National_STLs.csv
  2. Tribal_Summary.csv
  3. University_Summary.csv

Excel

  1. GRIST-LGU2_National-STL-Dataset.xlsx, with protected tabs that include:

– Main Spreadsheet
– Tribal Summary
– University Summary

The data can be spatially analyzed with the JSON file using GIS software (e.g. ArcGIS or QGIS), or analyzed with the CSVs or Excel main spreadsheet. To conduct analysis without using the spatial file, we recommend using the National_STLs_ALL_Protected.xlsx sheet, which includes tabs for the summary statistics sheets. The CSVs will mostly be useful for importing the files into GIS software or other types of software for analysis.

Tips for using the database

Summary statistics

To understand the landscape of state trust land parcels at a quick glance, users can reference the summary statistics sheets. The Tribal_Summary.csv and the University_Summary.csv show the total acreage of trust lands associated with each tribe or university, as well as context on what cessions and tribes are affiliated with a particular university or, conversely, what universities and states are associated with individual tribal nations. 

For example, using the University_Summary.csv a user can easily generate the following text: 

“New Mexico State University financially benefits from almost 186,000 surface acres and 253,500 subsurface acres, taken from the Apache Tribe of Oklahoma, Comanche Nation, Fort Sill Apache Tribe of Oklahoma, Jicarilla Apache Nation, Kiowa Tribe, Mescalero Apache Tribe, Navajo Nation, San Carlos Apache Tribe, Tonto Apache Tribe, and White Mountain Apache Tribe. Our data shows that this acreage came into the United States’ possession through 8 Indigenous land cession events for which the U.S. paid approximately $59,000, though in many cases, nothing was paid. New Mexico engages primarily in oil and gas production, renewables, and agriculture and commercial leases.”

Grist

To do so, simply fill in the sections you need from the tabular data of the university summary tab: [column B] benefits from almost [column D] surface acres and [column C] subsurface acres, taken from [column H] tribe (or [column G] total number of tribes). Our data shows that this acreage came into the United States’ possession through [column K] cessions (column K shows total number of cessions) for which the U.S. paid approximately [column F] though in many cases, nothing was paid. New Mexico engages primarily in [National_STLs.csv, column K].

Using Tribal_Summary.csv users can also center stories through Indigenous nations. For example: “The Cheyenne and Arapaho Tribes of Oklahoma ceded almost 66,000 surface acres and 82,500 subsurface acres, through 2 land cession events, for the benefit of Colorado State University, Oklahoma State University, and the University of Wyoming. For title to those acres, the United States paid the Cheyene and Arapaho Tribes approximately $6.00.”

Grist

Similarly to the university tab, one can plug in relevant information: [column B] ceded almost [column F] surface acres and [column E] subsurface acres, through [column C] land cession events, for the benefit of [column H].

To get information on how much the United States paid tribes, if anything, filter for the parcels of interest in the ‘Main Spreadsheet’ of the National_STLs.xlsx file and add the price paid per parcel column [column X].

Navigating the data

For users who want to conduct analysis on and understand the landscape of state trust lands without using the spatial file, they can use the protected Excel sheet. (The sheet is protected so that cell values are not accidentally rewritten while users search the information.) 

As an example, if users wanted to do research on a specific institution, they can adjust multiple columns at once in the Excel main spreadsheet to quickly isolate the parcels they are specifically interested in. 

Say a user wanted to figure out how many acres of state trust lands specifically affiliated with the Navajo Nation are used for grazing in Arizona. 

Start by opening the protected National_STLs.xlsx sheet. 

In column B, click the drop-down arrow and select so that only Arizona parcels are showing.

Grist

Then, go to column K and use the drop-down menu to select parcels where “grazing” is listed as one of the activities. It’s important to note that many parcels have multiple activities attached to them.

Grist

Then, go through all of the present_day_tribe columns (AA, AE, AI, AM, AQ, AU, AY, BC) and filter for rows that list the Navajo Nation as one of the tribes. It is not always the case that tribes are present in all eight of the columns, and most parcels do not intersect with multiple cession areas. 

When filtering through a column for specific entries, like selecting all parcels with any grazing present (even if other activities are there), we recommend users open up the filtering drop-down menu, unselect all entries, and then type the query you’re interested in in the search bar, and select the results that show up. 

We find a total of 20,278 acres in Arizona that have grazing activity on Navajo land.

Grist

This kind of approach can be used to filter for any combination of parcels, and we encourage you to explore the data this way. 

Visualizing parcels

To visualize this data, users can use the GeoJSON file in a GIS program of their choice. If users are unfamiliar with how to filter for specific parcels through those programs, they can identify the exact parcels they want in Excel and then use that to select parcels in a GIS program. 

First, identify the specific parcels of interest using filters (like in the situation described above), and then copy the list of relevant object IDs (in column A) into its own CSV file.

Grist

Then, in the GIS software, import the CSV file and join it to the original National_STLs.geojson file. 

Grist
Grist
Grist
Grist

After the file is joined, there will be an additional column to the National_STLs layer, and users can filter out the blank rows (which would be blank because they did not match with parcels of interest in the CSV file) and select the polygons that represent the parcels the user is interested in. 

Grist
Grist

In QGIS, you can use the “Zoom to Layer’” button to visualize the resulting query.

Grist

As an alternative to performing the filtering in Excel and executing the self-join as described above, users may also filter the dataset directly in the GIS program of their choice using structured queries. For example, to replicate the query illustrated above, use the following filter expression in QGIS on the main GeoJSON file:

Grist

Calculating acreage

The acreage of trust lands within a state has been determined as consisting of acres with surface rights or subsurface rights. For further background on this process, please see our methodology documentation

We also included a column for net acreage, since in some places — like North Dakota and Idaho — the state only has partial ownership over some of the parcels. If the field is blank, the state has 100 percent ownership of the parcel. To calculate this, we multiplied the acreage of a parcel by percentage of ownership. 

Missing cession payment

We do not yet have financial information for cession ID 717 in Washington. The cession in question is 1,963.92 acres, and its absence means that the figures for price paid per acre or price paid per parcel are not complete for Washington. 

It is also important to note that when documenting Indigenous land cessions in the continental United States, the Royce cession areas are extensive but incomplete. Although they are a standard source and are often treated as authoritative, they do not contain any cessions made after 1894 and likely miss or in other ways misrepresent included cessions prior to that time. We have made efforts to correct errors (primarily misdated cessions) when found, but have, in general, relied on the U.S. Forest Service digital files of the Royce dataset. A full review, revision, and expansion of the Royce land cession dataset is beyond the scope of this project. 

Missing Oklahoma lands

It’s important to note that we could not find information for 871 surface acres and 5,982 subsubsurface acres in Oklahoma, because they have yet to be mapped, digitally, or because of how they are sectioned on the land grid. We understand that this acreage does exist based on lists of activities kept by the state. However, those lists do not provide mappable data to fill these gaps. In order to complete reporting on Oklahoma, researchers will need to read and digitize physical maps and plats held by the state — labor this team has been unable to provide.

Additional WGS84 files in data generation

In addition to the GeoJSON files output at each step, our workflow produces a version of each GeoJSON file using the World Geodetic System 84 (WGS84) datum and a spherical geographic coordinate system (EPSG:4326). This is the standard coordinate reference system (CRS) for all GeoJSON files according to the specification; prior versions of the specification supported alternate CRSs, but have since been deprecated. In the source code, we rely on GeoPandas’ .to_crs method to perform the transformation to EPSG:4326.

WGS84 versions of GeoJSON files are necessary when mapping datasets using popular web-mapping libraries like Leaflet, Mapbox, MapLibre, and D3. These libraries all expect data to be encoded using EPSG:4326; they expose various projection APIs to reproject data on-the-fly in a browser. You should use the _wgs84 versions of the pipeline’s GeoJSON files if you’re trying to visualize the datasets using one of these libraries. For QGIS users, ensure your project CRS is set to EPSG:4326 before uploading these GeoJSON files.

Using the code

Users will be able to explore the codebase on the GitHub repository, which will be made public upon the lifting of Grist’s embargo. Further details on how to run each step and an explanation of all required files are available in the README.md document.

Creative Commons license

This data is shared under a Creative Commons BY-NC 4.0 license (“Attribution-NonCommercial 4.0 International”). The CC BY-NC license means you are free to copy and redistribute the material in any medium or format; and remix, transform, and build upon the material. Grist cannot revoke these freedoms as long as you follow the license terms. These terms include giving appropriate credit, providing a link to the license, and indicating if changes were made. You may do so in any reasonable manner. Furthermore, you may not use the material for commercial purposes, and you may not apply legal terms or technological measures that legally restrict others from doing anything the license permits. 

More information is available at the CC BY-NC 4.0 deed.

Citation

If you republish this data or draw on it as a source for publication, cite as: Parazo Rose, Maria, et al. “Enabling Act Indigenous Land Parcels Database,” Grist.org, February 2024.

File Descriptions

National_STLs.geojson

The schema for this document is the same as the National_STLs.csv and National_STLs_Protected.xlsx files. 

This spreadsheet contains 41,792 parcels of state trust lands that benefit 14 universities. Each row describes the location of a unique parcel, along with information about the entities currently managing the land, what rights type and extractive activities are associated with the parcel, which university benefits from the revenues, and its historic acquisition by the United States, as well as the original Indigenous caretakers and the current tribal nations in the area. 

An important note about rights type: Washington categorizes timber rights as distinct from surface rights, and we present the data here accordingly. Note that other states do not adhere to this distinction, and thus timber parcels in other states are considered surface parcels. If you would like to generate national summaries of surface rights in a more colloquial sense, consider adding Washington’s timber parcels to your surface calculations.

The file contains the following columns:

object_id

  • A unique, Grist-assigned identifier for the specific state trust land parcel

state

  • State where parcel is located

state_enabling_act

  • Name of the enabling act that granted new territories statehood, along with stipulations of bestowing Indigenous land as a part of the state trust land policy

trust_name

  • Beneficiaries of state trust land revenue can be identified within state government structure by the trust name; we used the trust name to identify the funds that were specifically assigned to the universities we focused on

managing_agency

  • Name of the state agency that manages the state trust land parcels

university

  • Land-grant university that receives the revenue from the associated state trust land parcel

acres

  • Reported acreage of the state trust land parcel from the original data source by the state

gis_acres

  • Acreage calculated by analyzing the parcels in QGIS

net_acres

  • The net acreage of a parcel, determined by the percentage of state ownership related to that parcel specifically. 

rights_type

  • Indicates whether the state/beneficiary manages the surface or subsurface rights of the land within the parcel, or both

reported_county

  • County where parcel is located, as reported by the original data source

census_bureau_county_name

  • County where parcel is located, based on a comparative analysis against Census Bureau data

meridian

  • A line, similar to latitude and longitude lines, that runs through an initial point, which together with the baseline form the highest level framework for all rectangular surveys in a given area. It is also the reference or beginning point for measuring east or west ranges.

township

  • 36 sections arranged in a 6-by-6 square, measuring 6 miles by 6 miles. Sections are numbered beginning with the northeasternmost section (#1), proceeding west to 6, then south along the west edge of the township and to the east (#36 is in the SE corner)

range

  • A measure of the distance east or west from a referenced principal meridian, in units of 6 miles, that is assigned to a township by measuring east or west of a principal meridian

section

  • The basic unit of the system, a square piece of land 1 mile by 1 mile containing 640 acres

aliquot

  • Indicates the aliquot part, e.g. NW for northwest corner or E½SW for east half of southwest corner, or the lot number. 

block

  • A parcel of land within a platted subdivision bounded on all sides by streets or avenues, other physical boundaries such as a body of water, or the exterior boundary of a platted subdivision.

data_source

  • Data on state parcels was acquired either from a records request to state agencies or from requests to a state server; if a state server was used, the website is recorded here

parcel_count

  • In our merge process, we combined some parcels, particularly in Minnesota, and this column captures how many parcels were aggregated together, to maintain accurate parcel count and acreage 

agg_acres_agg

  • The sum of acres across all parcels contained in a given row. For most states, this field will equal that of the acres field. For Minnesota, some small parcels were combined during the spatial deduplication process, and this field reflects the sum of the corresponding acres field for each parcel. (See methodology for more information.) 

all_cession_numbers

  • Refers to all the land cessions (areas where the federal government took the Indigenous land that later supplied state land) that overlap with this given parcel

price_paid_for_parcel

  • The total price paid by the U.S. government to tribal nations

cession_num_01-08

  • A single cession that overlaps a given parcel

price_paid_per_acre

  • The price the U.S. paid (or didn’t pay) per acre, according to the specific cession history

C1[-C8]_present_day_tribe

  • As listed by the U.S. Forest Service, the present day tribe(s) associated with the parcel

C1[-C8]_tribe_named_in_land_cessions_1784-1894

  • As listed by the U.S. Forest Service, the tribal nation(s) named in the land cession associated with the parcel

Tribal_Summary.csv

This spreadsheet shows summary statistics for all state trust land data we gathered, organized by the present-day tribes listed by the U.S. Forest Service.

present_day_tribe

  • As listed by the U.S. Forest Service, the present day tribe(s) 

cession_count

  • Total number of cessions associated with a present-day tribe

cession_number

  • List of cessions associated with a present-day tribe

subsurface_acres

  • Total number of subsurface acres associated with a present-day tribe

surface_acres

  • Total number of surface acres associated with a present-day tribe

timber_acres

  • Total number of timber acres associated with a present-day tribe (only relevant in Washington state)

unknown_acres

  • Total number of acres with an unknown rights type (only relevant for two parcels in South Dakota)

university

  • Universities that receive revenue from the parcels associated with a present-day tribe

state

  • States where the parcels associated with a present-day tribe are located
  • Total number of acres with an unknown rights type (only relevant for two parcels in South Dakota)

university

  • Universities that receive revenue from the parcels associated with a present-day tribe

state

  • States where the parcels associated with a present-day tribe are located

University_Summary.csv

This spreadsheet shows summary statistics for all state trust land data we gathered, organized by land-grant university.

university

  • Land-grant institution that receives revenue from specific state trust land parcels

subsurface_acres

  • Total number of subsurface acres associated with a present-day tribe

surface_acres

  • Total number of surface acres associated with a present day tribe

timber_acres

  • Total number of timber acres associated with a present day tribe (only relevant in Washington state)

unknown_acres

  • Total number of acres with an unknown rights type (only relevant for two parcels in South Dakota state)

price_paid

  • Sum of the price that the U.S. federal government paid to tribes for all the parcels associated with a particular university (the sum of the price paid per parcel column) 

present_day_tribe_count

  • Total number of present-day tribes associated with a land-grant university

present_day_tribe

  • List of present-day tribes associated with a land-grant university

tribes_named_in_cession_count

  • Total number of present-day tribes associated with a land-grant university

tribes_named_in_cession

  • List of present-day tribes associated with a university

cession_count

  • Total number of cessions associated with a land-grant university

all_cessions

  • List of cessions associated with a land-grant university

This story was originally published by Grist with the headline How to conduct your own reporting and research on state trust lands on Feb 7, 2024.


This content originally appeared on Grist and was authored by Maria Parazo Rose.

]]>
https://grist.org/indigenous/how-to-conduct-your-own-reporting-research-state-trust-lands/feed/ 0 457462
The Bizarre Constant Companion https://www.radiofree.org/2024/02/01/the-bizarre-constant-companion/ https://www.radiofree.org/2024/02/01/the-bizarre-constant-companion/#respond Thu, 01 Feb 2024 15:50:50 +0000 https://dissidentvoice.org/?p=147849 But such companions can be quite handy.

The post The Bizarre Constant Companion first appeared on Dissident Voice.]]>

The post The Bizarre Constant Companion first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2024/02/01/the-bizarre-constant-companion/feed/ 0 456294
What happened when climate deniers met an AI chatbot? https://grist.org/language/climate-denial-me-ai-chatbot-chatgpt/ https://grist.org/language/climate-denial-me-ai-chatbot-chatgpt/#respond Thu, 01 Feb 2024 09:45:00 +0000 https://grist.org/?p=628641 If you’ve heard anything about the relationship between Big Tech and climate change, it’s probably that the data centers that power our online lives use a mind-boggling amount of power. And some of the newest energy hogs on the block are artificial intelligence tools like ChatGPT. Some researchers suggest that ChatGPT alone might use as much power as 33,000 U.S. households in a typical day, a number that could balloon as the technology becomes more widespread. 

The staggering emissions add to a general tenor of panic driven by headlines about AI stealing jobs, helping students cheat, or, who knows, taking over. Already, some 100 million people use OpenAI’s most famous chatbot on a weekly basis, and even those who don’t use it likely encounter AI-generated content often. But a recent study points to an unexpected upside of that wide reach: Tools like ChatGPT could teach people about climate change, and possibly shift deniers closer to accepting the overwhelming scientific consensus that global warming is happening and caused by humans.

In a study recently published in the journal Scientific Reports, researchers at the University of Wisconsin-Madison asked people to strike up a climate conversation with GPT-3, a large language model released by OpenAI in 2020. (ChatGPT runs on GPT-3.5 and 4, updated versions of GPT-3). Large language models are trained on vast quantities of data, allowing them to identify patterns to generate text based on what they’ve seen, conversing somewhat like a human would. The study is one of the first to analyze GPT-3’s conversations about social issues like climate change and Black Lives Matter. It analyzed the bot’s interactions with more than 3,000 people, mostly in the United States, from across the political spectrum. Roughly a quarter of them came into the study with doubts about established climate science, and they tended to come away from their chatbot conversations a little more supportive of the scientific consensus.

That doesn’t mean they enjoyed the experience, though. They reported feeling disappointed after chatting with GPT-3 about the topic, rating the bot’s likability about half a point or lower on a 5-point scale. That creates a dilemma for the people designing these systems, said Kaiping Chen, an author of the study and a professor of computation communication at the University of Wisconsin-Madison. As large language models continue to develop, the study says, they could begin to respond to people in a way that matches users’ opinions — regardless of the facts. 

“You want to make your user happy, otherwise they’re going to use other chatbots. They’re not going to get onto your platform, right?” Chen said. “But if you make them happy, maybe they’re not going to learn much from the conversation.” 

Prioritizing user experience over factual information could lead ChatGPT and similar tools to become vehicles for bad information, like many of the platforms that shaped the internet and social media before it. Facebook, YouTube, and Twitter, now known as X, are awash in lies and conspiracy theories about climate change. Last year, for instance, posts with the hashtag #climatescam have gotten more likes and retweets on X than ones with #climatecrisis or #climateemergency. 

“We already have such a huge problem with dis- and misinformation,” said Lauren Cagle, a professor of rhetoric and digital studies at the University of Kentucky. Large language models like ChatGPT “are teetering on the edge of exploding that problem even more.”

The University of Wisconsin-Madison researchers found that the kind of information GPT-3 delivered depends on who it was talking to. For conservatives and people with less education, it tended to use words associated with negative emotions and talk about the destructive outcomes of global warming, from drought to rising seas. For those who supported the scientific consensus, it was more likely to talk about the things you can do to reduce your carbon footprint, like eating less meat or walking and biking when you can. 

What GPT-3 told them about climate change was surprisingly accurate, according to the study: Only 2 percent of its responses went against the commonly understood facts about climate change. These AI tools reflect what they’ve been fed and are liable to slip up sometimes. Last April, an analysis from the Center for Countering Digital Hate, a U.K. nonprofit, found that Google’s chatbot, Bard, told one user, without additional context: “There is nothing we can do to stop climate change, so there is no point in worrying about it.”

It’s not difficult to use ChatGPT to generate misinformation, though OpenAI does have a policy against using the platform to intentionally mislead others. It took some prodding, but I managed to get GPT-4, the latest public version, to write a paragraph laying out the case for coal as the fuel of the future, even though it initially tried to steer me away from the idea. The resulting paragraph mirrors fossil fuel propaganda, touting “clean coal,” a misnomer used to market coal as environmentally friendly.

Screenshot of a paragraph from ChatGPT extolling coal's virtues as an energy source

There’s another problem with large language models like ChatGPT: They’re prone to “hallucinations,” or making up information. Even simple questions can turn up bizarre answers that fail a basic logic test. I recently asked ChatGPT-4, for instance, how many toes a possum has (don’t ask why). It responded, “A possum typically has a total of 50 toes, with each foot having 5 toes.” It only corrected course after I questioned whether a possum had 10 limbs. “My previous response about possum toes was incorrect,” the chatbot said, updating the count to the correct answer, 20 toes.

Despite these flaws, there are potential upsides to using chatbots to help people learn about climate change. In a normal, human-to-human conversation, lots of social dynamics are at play, especially between groups of people with radically different worldviews. If an environmental advocate tries to challenge a coal miner’s views about global warming, for example, it might make the miner defensive, leading them to dig in their heels. A chatbot conversation presents more neutral territory. 

“For many people, it probably means that they don’t perceive the interlocutor, or the AI chatbot, as having identity characteristics that are opposed to their own, and so they don’t have to defend themselves,” Cagle said. That’s one explanation for why climate deniers might have softened their stance slightly after chatting with GPT-3.

There’s now at least one chatbot aimed specifically at providing quality information about climate change. Last month, a group of startups launched “ClimateGPT,” an open-source large language model that’s trained on climate-related studies about science, economics, and other social sciences. One of the goals of the ClimateGPT project was to generate high quality answers without sucking up an enormous amount of electricity. It uses 12 times less computing energy than ChatGPT, according to Christian Dugast, a natural language scientist at AppTek, a Virginia-based artificial intelligence company that helped fine-tune the new bot.

ClimateGPT isn’t quite ready for the general public “until proper safeguards are tested,” according to its website. Despite the problems Dugast is working on addressing — the “hallucinations” and factual failures common among these chatbots — he thinks it could be useful for people hoping to learn more about some aspect of the changing climate. 

“The more I think about this type of system,” Dugast said, “the more I am convinced that when you’re dealing with complex questions, it’s a good way to get informed, to get a good start.”

This story was originally published by Grist with the headline What happened when climate deniers met an AI chatbot? on Feb 1, 2024.


This content originally appeared on Grist and was authored by Kate Yoder.

]]>
https://grist.org/language/climate-denial-me-ai-chatbot-chatgpt/feed/ 0 456216
Apple uses software to control how phones get fixed. Lawmakers are pushing back. https://grist.org/technology/apple-uses-software-to-control-where-phones-get-fixed-lawmakers-are-pushing-back/ https://grist.org/technology/apple-uses-software-to-control-where-phones-get-fixed-lawmakers-are-pushing-back/#respond Tue, 30 Jan 2024 09:45:00 +0000 https://grist.org/?p=628300 Romain Godin prides himself on being able to fix a wide variety of consumer devices. But recently, what was once a basic repair job for his Portland, Oregon-based business Hyperion Computerworks — replacing a cracked iPhone screen — has become needlessly complicated.

In the past, Godin would have replaced the broken screen on the spot with a working screen harvested from a dead phone, saving the customer from having to buy a brand new screen from Apple. But if Godin performs this simple procedure on one the latest models of iPhones, features such as True Tone, which adjusts screen brightness and color based on the ambient light conditions, won’t work anymore. What’s more, the phone will issue a repeated message warning the user that Apple cannot determine if the screen is genuine.

This is because many replacement iPhone parts, including screens, must now be “paired” with the phone using Apple’s proprietary software before they will function properly. And Apple’s “parts pairing” software will only recognize replacement parts purchased directly from Apple for that specific repair job — meaning an independent shop would have to order the part when the customer comes in, then potentially wait days for it to arrive. Meanwhile, the customer could go to an Apple Store and get their phone fixed with authorized parts on the spot. Godin says he’s losing business because of the hurdles a customer might face getting their iPhone fixed at his shop.

“It’s a lot of telling customers in advance, ‘We might run into this or that complication,’” Godin told Grist. “And the majority of the time, they don’t have us do the repair.”

A man repairs a broken mobile phone display in Hoi An, Vietnam. Pascal Deloche / Godong / Universal Images Group via Getty Images

As more and more states enact laws protecting consumers’ right to fix the devices they already have, or get them fixed at the repair shop of their choosing, tech titans are clashing over parts pairing. New York, Minnesota, and California all passed digital right-to-repair bills over the last two years, and repair advocates say Apple and trade associations it belongs to worked behind the scenes to weaken or block language that interfered with parts pairing. But while advocates expect Apple will fight new laws targeting the practice, Google came out in support of Oregon’s bill earlier this month — partly because of its ban on parts pairing. With tech giants now staking out opposing positions on parts pairing, repair advocates see a potential opportunity to gain ground.

Godin testified at a recent hearing of the Oregon Senate’s Energy and Environment Committee, which is considering a right-to-repair bill that explicitly bans parts pairing. If passed into law, the Oregon bill would represent the strongest legal rebuke yet of a practice that many independent repair shops see as an existential threat to their businesses, and that repair advocates say is fueling electronic waste and unnecessary resource consumption. 

Restricting parts pairing is “the next step that likely needs to happen for right to repair to really gain a lot more traction,” said Colorado state representative Brianna Titone, who is sponsoring a digital right-to-repair bill in her state for the fourth time this year.

The right-to-repair movement is premised on the idea that when consumers have access to the parts, tools, and information needed to repair the devices they own, they can use those devices for longer. This both saves consumers money and reduces the environmental downsides of technology, which include electronic waste and the greenhouse gas emissions and resource consumption associated with manufacturing new products.

But parts pairing threatens to undermine the benefits of repair. Parts pairing refers to when companies use software to track their parts and control how they are used. Companies can assign spare parts serial numbers and program those parts to work properly only after their installation has been authenticated using the manufacturer’s specialized software. The practice isn’t exactly new: For years, agricultural equipment maker John Deere has restricted access to the software tools needed to install replacement parts on its tractors, while some automakers have engaged in “VIN burning,” or using software to limit the installation of replacement parts to a single vehicle. But in the consumer technology realm, parts pairing is becoming a greater concern for independent repairers, largely due to Apple’s growing use of the practice for its iPhone and laptops.

Apple claims its pairing process using the company’s “System Configuration” software tool is important for calibrating parts after their installation to ensure the best performance. But this kind of technology also represents a powerful tool for restricting repair. A person whose iPhone 15 battery dies can still go to an independent shop to get it swapped for a new one, or do the repair on their own. But in order to receive battery health updates and avoid nagging warning messages that the phone contains an unrecognizable part, that shop or individual needs to purchase the new battery from Apple, then pair it using System Configuration. This can cause repairs to take more time, in addition to driving up costs (while ensuring that Apple gets a cut). 

A man and a woman each hold an iPhone inside an Apple Store in front of a sign that says iPhone 15
Customers look at iPhones at Apple’s flagship store in Shanghai, China. Costfoto / NurPhoto via Getty Images

Parts pairing is perhaps an even bigger problem for refurbishers, who use secondhand parts to keep costs down as they’re restoring old devices for resale. If a customer buys a refurbished laptop only to encounter warning messages about non-genuine parts, they may return it, said Marie Castelli, head of public affairs at the online refurbished device store Back Market

“We have clients opening [return] tickets because they are afraid of messages” alerting them that the device cannot recognize a part like the screen, Castelli told Grist. 

There’s an environmental cost to parts pairing, as well. When customers are steered away from used parts, those parts become e-waste. Meanwhile, demand for new parts rises, resulting in additional resource consumption and emissions tied to manufacturing. Right-to-repair is “about trying to keep things out of landfills; trying to reduce our dependence on all these minerals that go into all these parts,” Titone said. “And that’s really the big problem with parts pairing.”

The right-to-repair movement has made considerable progress forcing manufacturers to make spare parts, tools, and repair documentation available through a recently passed wave of state bills. But advocates say that Apple, and its trade association allies, have been largely successful in keeping bans on parts pairing out of the bills that have passed so far. 

In New York, language that would have interfered with Apple’s internet-based system for pairing replacement parts was removed from the state’s right-to-repair bill after the trade association TechNet — which Apple is a member of — requested its deletion. In California, a coalition of lawmakers, repair advocates, and industry representatives negotiating the text of the state’s new right-to-repair law reached an agreement with Apple on the bill text prior to its approval by the Senate, according to David Stammerjohan, chief of staff for California state senator and bill sponsor Susan Eggman. After that agreement was reached, some coalition members wanted to add language that explicitly addressed parts pairing.

“We discussed it with Apple, which indicated they wanted to stick to the terms of the agreement,” Stammerjohn told Grist in an email. “Like all major bill negotiations, there were things industry would have liked in the bill that did not get in and things we would have liked in the bill that did not get into the final agreement.” 

Minnesota’s new right-to-repair law does address parts pairing more explicitly. The law requires device manufacturers to make spare parts, tools, and documentation available to the public on fair and reasonable terms that cannot include any “requirement that a part be registered, paired with, or approved by the original equipment manufacturer or an authorized repair provider before the part is operational.” But while this may sound like a ban on parts pairing, Gay Gordon-Byrne, executive director of the repair advocacy organization Repair.org, worries that the language isn’t airtight enough to deter a manufacturer from locking down certain functions using software and then arguing its case before the state’s attorney general if anyone complains.

“I don’t have to be a legal expert to tell you I would expect that,” Gordon-Byrne told Grist.

Repair.org has written a template right-to-repair bill that includes provisions its members would like to see incorporated into actual legislation. For the 2024 legislative cycle, the organization updated its template bill language to more explicitly define, and prohibit, parts pairing. Some of that stronger language made its way into the bill now under consideration in Oregon, which states that manufacturers cannot use parts pairing to reduce the functionality or performance of a device or cause the device to display “unnecessary or misleading alerts or warnings about unidentified parts.”

This language is a key reason Google, whose more recent Pixel smartphones and Chromebook laptops would be covered under the latest version of Oregon’s bill, chose to throw its support behind the legislation, according to Stephen Nickel, who heads up repair operations at the company. In an interview with Grist, Nickel said that Google liked the “comprehensive” nature of the bill.

A hand holds a Pixel phone in a bright, white interior environment in front of a wall that says Made by Google
A Google Pixel phone is displayed during a product launch event in New York in 2023. Ed Jones / AFP via Getty Images

“It considers all aspects of repairability, and particularly … the issue of parts pairing,” he said, adding that Google is prepared to comply with “any and all” of the bill’s requirements.

Google’s newfound opposition to parts pairing, Titone said, suggests that the closed-door negotiations between lawmakers and device manufacturers are now spilling out into a “turf war” among tech companies vying for customers “in a very competitive market.”

“I think there is a market strategy that Google is trying to exploit right now,” she said. “Having [Pixel smartphone] repairability be really high is an edge.” 

It remains to be seen whether Apple or others will fight the new Oregon bill or future ones that seek to restrict parts pairing. But all signs suggest a battle is brewing. Titone, the Colorado representative, said that when she spoke with Apple several months back concerning the right-to-repair bill she’s introducing this year, the company asked her to allow parts pairing in the text.

In response to Grist’s request for comment, an Apple spokesperson shared remarks that AppleCare VP Brian Nauman made at a White House repair event in October affirming the company’s commitment to a uniform federal repair law that “balances repairability with product integrity, usability, and physical safety.” The spokesperson declined to address criticisms of Apple’s parts pairing practices or share the company’s position on the anti-parts pairing provisions in the new Oregon bill or Minnesota’s recently passed law.

It isn’t just U.S. lawmakers seeking to limit parts pairing. The European Union is currently negotiating a new set of EU-wide rules on the right to repair that would make it easier and more cost-effective for consumers to repair devices versus replacing them. In November, the European Parliament adopted a draft version of the right-to-repair rules that, among other things, prohibits companies from using software to impede independent repair. The Parliament’s version of the rules must now be reconciled with draft versions proposed by the European Commission and European Council, with negotiations over the final text set to conclude in early February. But Castelli of Back Market, who is following the negotiations closely, said that “hopes are high in terms of what’s achievable” when it comes to parts pairing.

“Everyone wants to land on something and is open to negotiations,” she said.

This story was originally published by Grist with the headline Apple uses software to control how phones get fixed. Lawmakers are pushing back. on Jan 30, 2024.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/technology/apple-uses-software-to-control-where-phones-get-fixed-lawmakers-are-pushing-back/feed/ 0 455737
Organized crime gangs in Southeast Asia grow networks through innovative use of technology https://www.radiofree.org/2024/01/26/organized-crime-gangs-in-southeast-asia-grow-networks-through-innovative-use-of-technology/ https://www.radiofree.org/2024/01/26/organized-crime-gangs-in-southeast-asia-grow-networks-through-innovative-use-of-technology/#respond Fri, 26 Jan 2024 17:30:18 +0000 http://www.radiofree.org/?guid=6906f18632226d40d50821771b42481f
This content originally appeared on UN News - Global perspective Human stories and was authored by UNODC/ Laura Gil.

]]>
https://www.radiofree.org/2024/01/26/organized-crime-gangs-in-southeast-asia-grow-networks-through-innovative-use-of-technology/feed/ 0 455009
Erik Prince Claims His Vaporware Super-Phone Could Have Thwarted October 7 Hamas Attack https://www.radiofree.org/2024/01/24/erik-prince-claims-his-vaporware-super-phone-could-have-thwarted-october-7-hamas-attack/ https://www.radiofree.org/2024/01/24/erik-prince-claims-his-vaporware-super-phone-could-have-thwarted-october-7-hamas-attack/#respond Wed, 24 Jan 2024 19:11:42 +0000 https://theintercept.com/?p=458395

Notorious Blackwater founder and perennial mercenary entrepreneur Erik Prince has a new business venture: a cellphone company whose marketing rests atop a pile of muddled and absurd claims of immunity to surveillance. On a recent episode of his podcast, Prince claimed that his special phone’s purported privacy safeguards could have prevented many of the casualties from Hamas’s October 7 attack.

The inaugural episode of “Off Leash with Erik Prince,” the podcast he co-hosts with former Trump campaign adviser Mark Serrano, focused largely on the Hamas massacre and various intelligence failures of the Israeli military. Toward the end of the November 2 episode, following a brief advertisement for Prince’s new phone company, Unplugged, Serrano asked how Hamas had leveraged technology to plan the attack. “I think that when the post-op of this disaster is done, I think the main source of intel for Hamas was cellphone data,” Serrano claimed, without evidence. “How does Gaza access that data? I mean, Hamas?”

Prince answered that location coordinates, commonly leaked from phones via advertising data, were surely crucial to Hamas’s ability to locate Israel Defense Forces installations and kibbutzim.

Serrano, apparently sensing an opportunity to promote Prince’s $949 “double encrypted” phone, continued: “If all of Israel had Unplugged [phones] on October 7, what would that have done to Hamas’s strategy?”

Prince didn’t miss a beat. “I will almost guarantee that whether it’s the people living on kibbutzes, but especially the 19, 20, 21-year-old kids that are serving in the IDF, if they’re not on duty, they’re on their phones and on social media, and that cellphone data was tracked and collected and used for targeting by Hamas,” he said. “This phone, Unplugged, prevents that from happening.”

Unplugged’s product documentation is light on details, privacy researcher Zach Edwards told The Intercept, and the features the company touts can be replicated on most phones just by tinkering with settings. Both Android devices and iPhones, Edwards pointed out, allow users to deactivate their advertising IDs. It’s unclear what makes Unplugged any different, let alone a tool that could have thwarted the Hamas attack. “Folks should wait for proof before accepting those claims,” Edwards said.

“Simply Not True”

This isn’t the first time Prince has used an act of violence as a business opportunity. Following the 1999 mass shooting at Columbine High School, Prince constructed a mock school building called R U Ready High School where police could pay to train for future shootings. In 2017, he pitched the Trump White House on a plan, modeled after the British East India Company, to privatize the American war in Afghanistan with mercenaries.

With Unplugged, Prince’s main claim seems to be that, unlike most phones, his company’s devices don’t have advertising IDs: unique codes generated by every Android and iOS phone that marketers use to surveil consumer habits, including location. Unplugged claims its phones use a customized version of Android that strips out these IDs. But the notion that Prince’s phone, which is still unavailable for purchase more than a year after it was announced, could have saved lives on October 7 was contradicted by mobile phone security experts, who told The Intercept that just about every aspect of the claim is false, speculative, or too vague to verify.

“That is simply not true and that is not how mobile geolocation works,” said Allan Liska, an intelligence analyst at the cybersecurity firm Recorded Future. While Prince is correct that the absence of an advertising ID would diminish to some degree the amount of personal data leaked by a phone, it by no means cuts it off entirely. So long as a device is connected to cellular towers — generally considered a key feature for cellphones — it’s susceptible to tracking. “Mobile geolocation is based on tower data triangulation and there is no level of operating system security that that can bypass that,” Liska added.

Unplugged CEO Ryan Paterson told The Intercept that Prince’s statement about how his phone could have minimized Israeli deaths on October 7 “has much to do with the amount of data that the majority of cell phones in the world today create about the users of the device, their locations, patterns of life and behaviors,” citing a 2022 Electronic Frontier Foundation report on how mobile advertising data fuels police surveillance. Indeed, smartphone advertising has created an immeasurably vast global ecosystem of intimate personal data, unregulated and easily bought and sold, that can facilitate state surveillance without judicial oversight.

“Unplugged’s UP Phone has an operating system that does not contain a [mobile advertising ID] that can be passed [on], does not have any Google Mobile Services, and has a built-in firewall that blocks applications from sending any tracker information from the device, and delivering advertisements to the phone,” Paterson added in an email. “Taking these data sources away from the Hamas planners could have seriously disrupted and limited their operations effectiveness.”

Unplugged did not respond to a request for more detailed information about its privacy and security measures.

Neither Erik Prince nor an attorney who represents him responded to questions from The Intercept.

Articles of Faith

“While it’s true that anyone could theoretically find aggregate data on populated areas and possibly more specific data on an individual using mobile advertiser identifiers, it is completely unclear if Hamas used this and the ‘could have’ in the last sentence is doing a lot of work,” William Budington, a security researcher at the Electronic Frontier Foundation who regularly scrutinizes Android systems, wrote in an email to The Intercept. “If Hamas was getting access to location information through cell tower triangulation methods (say their targets were connecting to cell towers within Gaza that they had access to), then [Prince’s] phone would be as vulnerable to this as any iOS or Android device.”

The idea of nixing advertising IDs is by no means a privacy silver bullet. “When he is talking about advertising IDs, that is separate from location data,” Budington noted. If a phone’s user gives an app permission to access that phone’s location, there’s little to nothing Prince can do to keep that data private. “Do some apps get location data as well as an advertising ID? Yes. But his claim that Hamas had access to this information, and it was pervasively used in the attack to establish patterns of movement, is far-fetched and extremely speculative,” Budington wrote.

Liska, who previously worked in information security within the U.S. intelligence community, agreed. “I also find the claim that Hamas was purchasing advertising/location data to be a bit preposterous as well,” he said. “Not that they couldn’t do it (I am not familiar with Israeli privacy laws) but that they would have enough intelligence to know who to target with the purchase.”

Hamas’s assault displayed a stunningly sophisticated understanding of the Israeli state security apparatus, but there’s been no evidence that this included the use of commercially obtained mobile phone data.

While it’s possible that Unplugged phones block all apps from requesting location tracking permission in the first place, this would break any location-based features in the phone, rendering something as basic as a mapping app useless. But even this hypothetical is impossible to verify, because the phone has yet to leave Prince’s imagination and reach any actual customers, and its customized version of Android, dubbed “LibertOS,” has never been examined by any third parties.

While Unplugged has released a one-page security audit, conducted by PwC Digital Technology, it applied only to the company’s website and an app it offers, not the phone, making its security and privacy claims largely articles of faith.

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2024/01/24/erik-prince-claims-his-vaporware-super-phone-could-have-thwarted-october-7-hamas-attack/feed/ 0 454882
In Video From Gaza, Former CEO of Pegasus Spyware Firm Announces Millions for New Venture https://www.radiofree.org/2024/01/18/in-video-from-gaza-former-ceo-of-pegasus-spyware-firm-announces-millions-for-new-venture/ https://www.radiofree.org/2024/01/18/in-video-from-gaza-former-ceo-of-pegasus-spyware-firm-announces-millions-for-new-venture/#respond Thu, 18 Jan 2024 21:48:28 +0000 https://theintercept.com/?p=457770

It was an unusual place for a tech company to announce a successful $33 million round of venture capital fundraising. But, on November 7, former NSO Group CEO Shalev Hulio and two colleagues stood in the Gaza Strip, stared into a laptop’s built-in webcam, and did exactly that.

“We are here on the Gaza border,” said Hulio, the Israeli entrepreneur, on a little-noted YouTube video released by his new start-up, Dream Security. Hulio, a reservist who had been called up for duty, appeared in the video with a gun slung over his shoulder.

“It’s very emotional,” he said. “After all of us being here, some of us reserves, some of us helping the government in many other ways, I think that doing it here is a great message to the high-tech community and the people of Israel.”

Hulio, who stepped down from his role at NSO in August 2022, was sending a clear signal: He was back.

After a rocky few years, marred by revelations about the role of NSO’s spyware in human rights abuses and the company’s blacklisting by the U.S. government, Hulio and his team were using the moment — timed exactly one month after Hamas’s attack — to announce lofty ambitions for their new cybersecurity firm, Dream Security.

“Israeli high-tech is not only here to stay, but will grow better out of this,” said Michael Eisenberg, an Israeli American venture capitalist and Dream co-founder, in the promo video. “It’s going to deliver on time, wherever it’s needed, to whatever country or whatever company it’s needed at.”

Their new project is another cybersecurity company. Instead of phone hacking, though, Dream — an acronym for “Detect, Respond, and Management” — offers cyber protection for so-called critical infrastructure, such as energy installations.

Dream Security builds on the successful team NSO put together, with talent brought on board from the embattled spyware firm. At least a dozen of NSO’s top officials and staffers, along with an early investor in both NSO and Dream, followed Hulio to Dream since its founding last year.

Lawyers for Dream Security who responded to The Intercept’s request for comment said the companies were distinct entities. “The only connection between the two entities is Mr. Hulio and a small portion of talented employees who previously worked at NSO Group,” said Thomas Clare, a lawyer for Dream, in a letter. Liron Bruck, a spokesperson for NSO Group, told The Intercept, “The two companies are not involved in any way.”

“It’s worrying. It seems like a new way to whitewash NSO’s image and past record.”

Now, with so many NSO people gathered under a new banner, critics are concerned that their old firm’s scandals will be forgotten.

“It’s worrying,” said Natalia Krapiva, tech-legal counsel at Access Now, a digital rights advocacy group. “It seems like a new way to whitewash NSO’s image and past record.”

At the same time, NSO Group is also using Israel’s war effort to try and revamp its own reputation. After Pegasus, NSO’s phone hacking software, was exposed for its role in human rights abuses and the firm was blacklisted in the U.S., the company suffered years of financial troubles. In the new year, it seemed to be bouncing back, with Israeli media reporting on its expansion and reorganization.

Clare, Dream’s lawyer, stressed that Hulio was no longer affiliated with NSO. “Currently, Mr. Hulio holds no interest in NSO Group—not as an officer, employee, or stockholder,” Clare wrote to The Intercept. “Since Dream Security’s foundation in late 2022, he has exclusively led the company.”

With Hulio at its helm, Dream boasts an eclectic and influential leadership team with connections to various far-right figures in Israel, Europe, and the U.S. — and an ambitious plan to leverage their ties to dominate the cybersecurity sector.

SAPIR, ISRAEL - NOVEMBER 11:  A view of the entrance of the Israeli cyber company NSO Group branch in the Arava Desert on November 11, 2021 in Sapir, Israel. The company, which makes the spyware Pegasus, is being sued in the United States by WhatsApp, which alleges that NSO Group's spyware was used to hack 1,400 users of the popular messaging app. An US appeals court ruled this week that NSO Group is not protected under sovereign immunity laws.  (Photo by Amir Levy/Getty Images)

A view of the entrance of the Israeli cyber company NSO Group branch in the Arava Desert on Nov. 11, 2021, in Sapir, Israel.

Photo: Amir Levy/Getty Images

New Mission, Same Executives

Hulio has said that, with Dream, he moved from the “attack side to defense” — focusing on defending infrastructure, including gas and oil installations. A jargon-laden blurb for the company brags that it delivers surveillance to detect threats and an unspecified “power to respond fast.”

“Dream Security’s product is a defensive cybersecurity solution to protect critical infrastructure and state-level assets,” Clare said. “Dream Security is not involved in the creation, marketing, or sale of any spyware or other malware product.”

Clare said that Dream’s mission is “to enable decision-makers to act promptly and efficiently against any actual and potential cyber threats, such as malware attacks committed by states, terrorist organizations, and hacker groups, among others.”

Kathryn Humphrey, another Dream lawyer and an associate at Clare’s firm, said in one of a series of emails, “Dream Security is not involved with offensive cyber, nor does it have an intention of becoming involved with offensive cyber. Dream Security is developing the world’s best AI-based defensive cyber security platform, and that is its only mission.”

The Intercept found that 13 former NSO staffers now work at Dream Security — about a fifth of the new company.

The mission may be new, but Dream is staffed in part by NSO veterans. A recent report from the Israeli business press said Dream has 70 employees, 60 of them in Israel. The Intercept found that 13 former NSO staffers now work at Dream Security — about a fifth of the new company.

“Dream Security recruited the best talent to achieve its goal of becoming the globally leading AI-based cyber security company,” said Humphrey in a letter to The Intercept. “A small minority is top talent from NSO Group, including executives and other employees.”

In addition to Hulio himself, former top NSO officials permeate the upper echelons of Dream. From the heads of sales to human resources to their legal departments, at least seven former executives from NSO now hold positions at Dream in the same jobs. Five additional Dream employees — from security researchers to software engineers and marketing designers — formerly worked at NSO.

Dream’s lawyers told The Intercept that the “only overlap” between the companies were Hulio and former NSO employees, but other people tie NSO history and Dream’s present together. In one case, it was familial: Gil Dolev, one of Dream’s founders, is the brother of Shiri Dolev, who, according to NSO spokesperson Bruck, was NSO Group’s president until last year. (Shiri Dolev did not respond to a request for comment.)

The two companies also share at least one investor. Eddy Shalev, the first investor in NSO, told The Intercept he had put money into Dream. “I was an early investor in NSO,” Shalev said. “I am no longer involved with NSO. I did invest in Dream Security.”

Asked about Shalev’s investments in Dream and NSO, Humphrey said, “While Eddy Shalev is a valued investor, he is not a major investor—his investment is roughly 1% of the overall amount invested in Dream Security.”

Former Austrian Chancellor Sebastian Kurz, left, accompanied by his lawyer Walter Suppan, right, arrives at court on the first day of his trial in Vienna, Austria, Wednesday, Oct. 18, 2023. Kurz is charged with making false statements to a parliamentary inquiry into alleged corruption in his first government. (AP Photo/Heinz-Peter Bader)

Former Austrian Chancellor Sebastian Kurz arrives at court on the first day of his trial in Vienna on Oct. 18, 2023. Kurz is charged with making false statements to a parliamentary inquiry into alleged corruption in his first government.

Photo: Heinz-Peter Bader/AP

Austria’s Mini-Trump

From its inception, Dream Security’s strategy was based around an in-house connection to the international right. Former Austrian Chancellor Sebastian Kurz, dubbed “Austria’s mini-Trump,” is a Dream co-founder.

The former chancellor was forced to step down from the Austrian government in October 2021, facing corruption allegations and he remains on trial for related charges. 

Along the way, Kurz had made powerful friends. He reportedly has relationships with top officials around Europe and the U.S., including right-wing Hungarian Prime Minister Victor Orbán, and Jared Kushner, former President Donald Trump’s son-in-law and former top adviser. Last year, Kurz joined Kushner on the honorary advisory council to the Abraham Accords Peace Institute, a group set up to foster normalization between Israel and Gulf monarchies like the United Arab Emirates — the very authoritarians that used NSO’s Pegasus software to crack down on dissidents.

For all his connections to powerful politicians, experts said Kurz was never purely an ideologue. “Kurz is really a political professional,” said Laurenz Ennser-Jedenastik, a professor of Austrian politics at the University of Vienna. “He never struck anybody as extremely convicted of anything. I think his personal career and business were always the number one priority.”

“Kurz is really a political professional. … I think his personal career and business were always the number one priority.”

Once Kurz was out of government, he pivoted to the world of tech investment. He first met the cyber-spying titan Peter Thiel in 2017 and landed a job at one of the far-right billionaire’s firms, Thiel Capital, in 2021. Thiel, one of the largest donors to right-wing causes in the U.S., is deeply involved in the world of spy tech: His company Palantir, which allows for the sorting and exploitation of masses of data, helped empower and expand the U.S. government’s international spy machine.

When Dream’s creation was announced, Kurz’s connections to Thiel — and therefore Palantir — raised alarms. In the European Parliament, lawmakers in the Committee of Inquiry to investigate the use of Pegasus and equivalent surveillance spyware took note.

“The cooperation between Kurz and Hulio constitutes an indirect but alarming connection between the spyware industry and Peter Thiel and his firm Palantir,” said a committee report earlier this year. (Thiel is not involved with NSO or Dream, a person familiar with his business told The Intercept.)

In November, nearly 80 percent of the European Parliament voted to condemn the European Commission for not doing enough to tackle spyware abuse, including NSO’s Pegasus software, across member states.

Questions have cropped up about whether Dream will, like NSO before it, sell powerful cybersecurity tools to authoritarian governments who might use them for nefarious purposes.

Asked by the Israeli business publication Globes about where Dream would sell its wares, Kurz said, “This is a company that was founded in Israel and is currently looking to the European market.”

According to Globes, Kurz was brought on to open doors to European governments. Dream has said that its customers already include the cybersecurity authority of one major European country, though it has declined to say which.

Over time, Europe has become a strong market for commercial cybersecurity firms. Sophie in ’t Veld, a European parliamentarian from the Netherlands who led the charge on the Pegasus committee resolution, told The Intercept, “Europe is paradise for this kind of business.”

The Israeli Right

Dream’s right-wing network is nowhere more concentrated than in Israel itself. Venture capitalist Dovi Frances, a major Republican donor who led Dream’s recent $33 million fundraising round, is close to Israeli Prime Minister Benjamin Netanyahu. And Lior Atar, head of cyber security at the Israeli Ministry of Energy for six years, was directly plucked from his government role to join Dream earlier this year.

Dream officials’ entanglement with the Israeli right also extends to grassroots right-wing movements. Two investors and Hulio are involved in a ground-level organization considered to be Israel’s largest militia, HaShomer HaChadash, or “the new guardians.” A Zionist education nonprofit established in 2007, HaShomer HaChadash says it safeguards Israel’s agricultural lands, largely along the Gaza border. 

“I look forward to building Dream, against all odds, to become the world’s largest cybersecurity company. Mark my word: It fucking will be.”

Eisenberg, the Dream co-founder, chairs HaShomer HaChadash’s board. Hulio became a HaShomer HaChadash board member in May 2017 — a month before NSO Group was put up for sale for $1 billion — and has donated nearly $100,000 to the group. (Neither Dream nor HaShomer HaChadash responded to questions about whether Hulio remains on the board.) Another Dream investor, Noam Lanir, has also been vocal about his own contributions to the organization, according to Haaretz.

HaShomer HaChadash has a budget of approximately $33 million in 2022, of which over $5 million came from the government, according to documents filed with the Israeli Corporations Authority. The group is staffed in part by volunteers as well as active-duty personnel detailed from the Israeli military.

“They seem like a mainstream organization,” said Ran Cohen, chair of the Democratic Bloc, which monitors anti-democratic incitement in Israel. “But in reality, the origins of their agenda is rooted in the right wing. They have also been active in illegal outposts in the West Bank.”

For Dream, HaShomer HaChadash is but one node of its prolific links to the right at home and abroad. With those connections and the business chops that brought the world NSO Group, Dream — as the name itself suggests — has large ambitions. “I look forward to building Dream, against all odds, to become the world’s largest cybersecurity company,” Frances, the VC, said from the U.S. in the YouTube video announcing the successful fundraising drive. “Mark my word: It fucking will be.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Georgia Gee.

]]>
https://www.radiofree.org/2024/01/18/in-video-from-gaza-former-ceo-of-pegasus-spyware-firm-announces-millions-for-new-venture/feed/ 0 453206
Digital Kill Switches: How Tyrannical Governments Stifle Political Dissent https://www.radiofree.org/2024/01/17/digital-kill-switches-how-tyrannical-governments-stifle-political-dissent/ https://www.radiofree.org/2024/01/17/digital-kill-switches-how-tyrannical-governments-stifle-political-dissent/#respond Wed, 17 Jan 2024 21:50:53 +0000 https://dissidentvoice.org/?p=147507 What’s to stop the U.S. government from throwing the kill switch and shutting down phone and internet communications in a time of so-called crisis? After all, it’s happening all over the world. Communications kill switches have become tyrannical tools of domination and oppression to stifle political dissent, shut down resistance, forestall election losses, reinforce military […]

The post Digital Kill Switches: How Tyrannical Governments Stifle Political Dissent first appeared on Dissident Voice.]]>
What’s to stop the U.S. government from throwing the kill switch and shutting down phone and internet communications in a time of so-called crisis?

After all, it’s happening all over the world.

Communications kill switches have become tyrannical tools of domination and oppression to stifle political dissent, shut down resistance, forestall election losses, reinforce military coups, and keep the populace isolated, disconnected and in the dark, literally and figuratively.

In an internet-connected age, killing the internet is tantamount to bringing everything—communications, commerce, travel, the power grid—to a standstill.

In Myanmar, for example, the internet shutdown came on the day a newly elected government was to have been sworn in. That’s when the military staged a digital coup and seized power. Under cover of a communications blackout that cut off the populace from the outside world and each other, the junta “carried out nightly raids, smashing down doors to drag out high-profile politicians, activists and celebrities.”

These government-imposed communications shutdowns serve to not only isolate, terrorize and control the populace, but also underscore the citizenry’s lack of freedom in the face of the government’s limitless power.

Yet as University of California Irvine law professor David Kaye explains, these kill switches are no longer exclusive to despotic regimes. They have “migrated into a toolbox for governments that actually do have the rule of law.”

This is what digital authoritarianism looks like in a technological age.

Digital authoritarianism, as the Center for Strategic and International Studies cautions, involves the use of information technology to surveil, repress, and manipulate the populace, endangering human rights and civil liberties, and co-opting and corrupting the foundational principles of democratic and open societies, “including freedom of movement, the right to speak freely and express political dissent, and the right to personal privacy, online and off.”

For those who insist that it can’t happen here, it can and it has.

In 2005, cell service was disabled in four major New York tunnels, reportedly to avert potential bomb detonations via cell phone.

In 2009, those attending President Obama’s inauguration had their cell signals blocked—again, same rationale.

And in 2011, San Francisco commuters had their cell phone signals shut down, this time, to thwart any possible protests over a police shooting of a homeless man.

With shutdowns becoming harder to detect, who’s to say it’s not still happening?

Although an internet kill switch is broadly understood to be a complete internet shutdown, it can also include a broad range of restrictions such as content blocking, throttling, filtering, complete shutdowns, and cable cutting.

As Global Risk Intel explains:

Content blocking is a relatively moderate method that blocks access to a list of selected websites or applications. When users access these sites and apps, they receive notifications that the server could not be found or that access was denied by the network administrator. A more subtle method is throttling. Authorities decrease the bandwidth to slow down the speed at which specific websites can be accessed. A slow internet connection discourages users to connect to certain websites and does not arouse immediate suspicion. Users may assume that connection service is slow but may not conclude that this circumstance was authorized by the government. Filtering is another tool to censor targeted content and erases specific messages and terms that the government does not approve of.

How often do most people, experiencing server errors and slow internet speeds, chalk it up to poor service? Who would suspect the government of being behind server errors and slow internet speeds?

Then again, this is the same government that has subjected us to all manner of encroachments on our freedoms (lockdowns, mandates, restrictions, contact tracing programs, heightened surveillance, censorship, over-criminalization, shadow banning, etc.) in order to fight the COVID-19 pandemic, preserve the integrity of elections, and combat disinformation.

These tactics have become the tools of domination and oppression in an internet-dependent age.

It really doesn’t matter what the justifications are for such lockdowns. No matter the rationale, the end result is the same: an expansion of government power in direct proportion to the government’s oppression of the citizenry.

In this age of manufactured crises, emergency powers and technofascism, the government already has the know-how, the technology and the authority.

Now all it needs is the “right” crisis to flip the kill switch.

This particular kill switch can be traced back to the Communications Act of 1934. Signed into law by President Franklin D. Roosevelt, the Act empowers the president to suspend wireless radio and phone services “if he deems it necessary in the interest of national security or defense” during a time of “war or a threat of war, or a state of public peril or disaster or other national emergency, or in order to preserve the neutrality of the United States.”

That national emergency can take any form, can be manipulated for any purpose and can be used to justify any end goal—all on the say so of the president.

Given the government’s penchant for weaponizing one national crisis after another in order to expand its powers and justify all manner of government tyranny in the so-called name of national security, it’s only a matter of time before this particular emergency power to shut down the internet is activated.

Then again, an all-out communications blackout is just a more extreme version of the technocensorship that we’ve already been experiencing at the hands of the government and its corporate allies.

In fact, these tactics are at the heart of several critical cases before the U.S. Supreme Court over who gets to control, regulate or remove what content is shared on the internet: the individual, corporate censors or the police state.

Nothing good can come from techno-censorship.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, these censors are laying the groundwork to preempt any “dangerous” ideas that might challenge the power elite’s stranglehold over our lives.

Whatever powers you allow the government and its corporate operatives to claim now, whatever the reason might be, will at some point in the future be abused and used against you by tyrants of your own making.

By the time you add AI technologies, social credit systems, and wall-to-wall surveillance into the mix, you don’t even have to be a critic of the government to get snared in the web of digital censorship.

Eventually, as George Orwell predicted, telling the truth will become a revolutionary act.

The post Digital Kill Switches: How Tyrannical Governments Stifle Political Dissent first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2024/01/17/digital-kill-switches-how-tyrannical-governments-stifle-political-dissent/feed/ 0 452639
Digital Kill Switches: How Tyrannical Governments Stifle Political Dissent https://www.radiofree.org/2024/01/17/digital-kill-switches-how-tyrannical-governments-stifle-political-dissent-2/ https://www.radiofree.org/2024/01/17/digital-kill-switches-how-tyrannical-governments-stifle-political-dissent-2/#respond Wed, 17 Jan 2024 21:50:53 +0000 https://dissidentvoice.org/?p=147507 What’s to stop the U.S. government from throwing the kill switch and shutting down phone and internet communications in a time of so-called crisis? After all, it’s happening all over the world. Communications kill switches have become tyrannical tools of domination and oppression to stifle political dissent, shut down resistance, forestall election losses, reinforce military […]

The post Digital Kill Switches: How Tyrannical Governments Stifle Political Dissent first appeared on Dissident Voice.]]>
What’s to stop the U.S. government from throwing the kill switch and shutting down phone and internet communications in a time of so-called crisis?

After all, it’s happening all over the world.

Communications kill switches have become tyrannical tools of domination and oppression to stifle political dissent, shut down resistance, forestall election losses, reinforce military coups, and keep the populace isolated, disconnected and in the dark, literally and figuratively.

In an internet-connected age, killing the internet is tantamount to bringing everything—communications, commerce, travel, the power grid—to a standstill.

In Myanmar, for example, the internet shutdown came on the day a newly elected government was to have been sworn in. That’s when the military staged a digital coup and seized power. Under cover of a communications blackout that cut off the populace from the outside world and each other, the junta “carried out nightly raids, smashing down doors to drag out high-profile politicians, activists and celebrities.”

These government-imposed communications shutdowns serve to not only isolate, terrorize and control the populace, but also underscore the citizenry’s lack of freedom in the face of the government’s limitless power.

Yet as University of California Irvine law professor David Kaye explains, these kill switches are no longer exclusive to despotic regimes. They have “migrated into a toolbox for governments that actually do have the rule of law.”

This is what digital authoritarianism looks like in a technological age.

Digital authoritarianism, as the Center for Strategic and International Studies cautions, involves the use of information technology to surveil, repress, and manipulate the populace, endangering human rights and civil liberties, and co-opting and corrupting the foundational principles of democratic and open societies, “including freedom of movement, the right to speak freely and express political dissent, and the right to personal privacy, online and off.”

For those who insist that it can’t happen here, it can and it has.

In 2005, cell service was disabled in four major New York tunnels, reportedly to avert potential bomb detonations via cell phone.

In 2009, those attending President Obama’s inauguration had their cell signals blocked—again, same rationale.

And in 2011, San Francisco commuters had their cell phone signals shut down, this time, to thwart any possible protests over a police shooting of a homeless man.

With shutdowns becoming harder to detect, who’s to say it’s not still happening?

Although an internet kill switch is broadly understood to be a complete internet shutdown, it can also include a broad range of restrictions such as content blocking, throttling, filtering, complete shutdowns, and cable cutting.

As Global Risk Intel explains:

Content blocking is a relatively moderate method that blocks access to a list of selected websites or applications. When users access these sites and apps, they receive notifications that the server could not be found or that access was denied by the network administrator. A more subtle method is throttling. Authorities decrease the bandwidth to slow down the speed at which specific websites can be accessed. A slow internet connection discourages users to connect to certain websites and does not arouse immediate suspicion. Users may assume that connection service is slow but may not conclude that this circumstance was authorized by the government. Filtering is another tool to censor targeted content and erases specific messages and terms that the government does not approve of.

How often do most people, experiencing server errors and slow internet speeds, chalk it up to poor service? Who would suspect the government of being behind server errors and slow internet speeds?

Then again, this is the same government that has subjected us to all manner of encroachments on our freedoms (lockdowns, mandates, restrictions, contact tracing programs, heightened surveillance, censorship, over-criminalization, shadow banning, etc.) in order to fight the COVID-19 pandemic, preserve the integrity of elections, and combat disinformation.

These tactics have become the tools of domination and oppression in an internet-dependent age.

It really doesn’t matter what the justifications are for such lockdowns. No matter the rationale, the end result is the same: an expansion of government power in direct proportion to the government’s oppression of the citizenry.

In this age of manufactured crises, emergency powers and technofascism, the government already has the know-how, the technology and the authority.

Now all it needs is the “right” crisis to flip the kill switch.

This particular kill switch can be traced back to the Communications Act of 1934. Signed into law by President Franklin D. Roosevelt, the Act empowers the president to suspend wireless radio and phone services “if he deems it necessary in the interest of national security or defense” during a time of “war or a threat of war, or a state of public peril or disaster or other national emergency, or in order to preserve the neutrality of the United States.”

That national emergency can take any form, can be manipulated for any purpose and can be used to justify any end goal—all on the say so of the president.

Given the government’s penchant for weaponizing one national crisis after another in order to expand its powers and justify all manner of government tyranny in the so-called name of national security, it’s only a matter of time before this particular emergency power to shut down the internet is activated.

Then again, an all-out communications blackout is just a more extreme version of the technocensorship that we’ve already been experiencing at the hands of the government and its corporate allies.

In fact, these tactics are at the heart of several critical cases before the U.S. Supreme Court over who gets to control, regulate or remove what content is shared on the internet: the individual, corporate censors or the police state.

Nothing good can come from techno-censorship.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, these censors are laying the groundwork to preempt any “dangerous” ideas that might challenge the power elite’s stranglehold over our lives.

Whatever powers you allow the government and its corporate operatives to claim now, whatever the reason might be, will at some point in the future be abused and used against you by tyrants of your own making.

By the time you add AI technologies, social credit systems, and wall-to-wall surveillance into the mix, you don’t even have to be a critic of the government to get snared in the web of digital censorship.

Eventually, as George Orwell predicted, telling the truth will become a revolutionary act.

The post Digital Kill Switches: How Tyrannical Governments Stifle Political Dissent first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2024/01/17/digital-kill-switches-how-tyrannical-governments-stifle-political-dissent-2/feed/ 0 452640
Can carbon capture solve desalination’s waste problem? https://grist.org/technology/desalination-carbon-capture-brine/ https://grist.org/technology/desalination-carbon-capture-brine/#respond Wed, 17 Jan 2024 09:30:00 +0000 https://grist.org/?p=627564 As the world grapples with rising water use and climate-fueled drought, countries from the United States to Israel to Australia are building huge desalination plants to bolster their water supplies. These plants can create water for thousands of households by extracting the salt from ocean water, but they have also drawn harsh criticism from many environmental groups: Desalinating water requires a huge amount of energy, and it also produces a toxic brine that many plants discharge right back into the ocean, damaging marine life. Recent desalination plant proposals have drawn furious opposition in Los Angeles, California, and Corpus Christi, Texas.

But a new startup called Capture6 claims it can solve desalination’s controversial brine problem with another controversial climate technology: carbon capture. The company announced new plans this week to build a carbon capture facility in South Korea that will work in tandem with a nearby desalination plant, sucking carbon dioxide out of the air and storing it in desalination brine, which it will import from the plant. But that’s not all. Capture6 also claims it can wring new fresh water out of the brine, bolstering the company’s sustainability claims — and its potential profit — even further.

If it works, this facility will deliver a triple benefit. It will decrease the concentration of greenhouse gasses in the atmosphere, create a new source of freshwater, and limit the polluting effects of desalination. But that’s still a very big “if.”

So-called “direct air capture” facilities use a chemical reaction to pull carbon dioxide out of the air and fuse it with another substance, preventing it from leaking into the atmosphere. The greenhouse gas can then be stored in solid compounds like limestone or in chemical solutions — or, previous studies have shown, in salty brine. Capture6’s innovation is to source that brine from wastewater treatment plants and desalination plants, which have every reason to want to dispose of it in a way that does not open them to charges of pollution.

The newly announced venture in South Korea, known as Project Octopus, takes the process one step further. The facility will be located at the Daesan Industrial Complex, an oil and gas industrial park in a region of the country that has suffered from water shortages due to an ongoing drought. The Korean state water utility, K-water, is building a seawater desalination plant at the industrial park to provide water to the oil and gas plants, which use thousands of gallons of water to cool down their machinery as it operates.

The Capture6 facility will use the brine created by K-water’s desalination plant to capture carbon dioxide, and it will also use the modified brine to extract even more fresh water that the oil and gas plants can then use in lieu of pumping from less sustainable sources. Carbon6 also says that the solvent produced by its direct air capture operations can then be used for additional point-source carbon capture at the nearby oil and gas plants, providing a double emissions benefit before the company buries all the carbon deep underwater. In other words, Capture6 will use the byproduct of water production to create even more water, and it will use the byproduct of capturing carbon to capture more carbon.

“It’s an interesting example of solvent-based direct air capture, but what is innovative here is the pairing of direct air capture with the brine from desalination,” said Daniel Pike, the head of the carbon capture team at the Rocky Mountain Institute, a nonpartisan climate think tank. “Essentially what’s going on is the company is saying, ‘hey, where do we get the chemicals for our solvents? We’ll get them from desalination plants.’”

(Capture6 received funding from Third Derivative, a carbon capture accelerator launched by Rocky Mountain Institute, but Pike himself doesn’t have a financial relationship with the company.)

The company, which has received early funding from several venture capital funds as well as the states of California and New York, announced its first facility last year in Southern California. That facility, known as Project Monarch, will store carbon dioxide in wastewater from a water treatment plant in the city of Palmdale, then sell fresh water back to the city’s water system. 

“What we are trying to do is really to decarbonize the water sector,” said Leo Park, the vice president for strategic development at Capture6. “So we’re trying to integrate our facilities into the easiest thing, which is wastewater and desalination plants.”

The company’s initial pilot facility in Korea will operate on a small scale. The test project will capture 1,000 tons of carbon per year. That’s equivalent to the annual emissions of around 220 passenger cars, and about as much as is being captured at a much-lauded direct air capture facility that began operations in Tracy, California, last year. The company’s carbon capture process will yield around 14 million gallons of fresh water, enough to supply around 80 homes. 

But when K-water’s desalination plant gets running at full capacity, Capture6 says it will be able to capture almost 500,000 tons of carbon dioxide each year by 2026. That’s many times more storage than other direct air capture facilities have achieved so far. The large-scale plant will also produce around 5 billion gallons of fresh water each year, half as much as the Daesan desalination plant itself and enough to supply around 30,000 homes.

Pike says that the company’s growth goal is extremely ambitious, and it’s unclear whether the facility will have a net negative impact on emissions, given that desalination and direct air capture both require a lot of energy. In the case of Project Octopus, that energy will initially come from Korea’s power grid, which relies heavily on fossil fuels.

“Even assuming you have the solvent, you have an intense energy need just to power a direct air capture process, and a big challenge we have in direct air capture is how to improve energy efficiency,” he said. “Then what they’re doing is they’re also running a very energy-intensive process for deriving the solvent, moving a lot of water around. It’s a lot of energy, a lot of water. That big picture is the challenge here.”

If Capture6 can prove that its facilities store more carbon than they emit, the company won’t have any trouble monetizing its technology. The oil and gas companies in Daesan will buy its produced water for their cooling needs, and K-water will rely on the company to minimize the environmental harms of desalination, which generated backlash when the plant was first announced.

“There were a lot of local concerns about brine discharge, because [locals] were worried that it was going to impact the marine ecosystem and fishing activities,” said Park. “Our solution can help minimize brine discharge, so there’s an additional environmental benefit we can generate. This is one of the reasons K-water wanted to work with us.”

Even so, the full-size Capture6 facility will only absorb around half of the brine that the K-water desal plant produces, meaning the utility will still have to release a lot of toxic liquid into the ocean. Park says he hopes the company can eventually scale up far enough to absorb all the plant’s brine, but they’re not there yet.

Unlike many other direct air capture companies, Capture6 doesn’t need to sell carbon credits to make money. Park hopes to someday sell credits to private companies seeking to offset their emissions, but for the moment Capture6’s main revenue source is the same as any ordinary desalination plant: water. Park says the company could build future facilities at lithium mines, which also produce brine and need water to operate.

But Ekta Patel, a researcher and doctoral student at Duke University who studies the politics of desalination, said the big question about this business model was how much energy it takes for Capture6 to make the new water. 

“My mind jumps immediately to the issue of energy,” she said. “How much more energy does reclaiming the additional water take, is it from renewable or nonrenewable sources, and what does that do to the cost of the water?” She added that if “addressing challenges related to carbon emissions and water” required a jump in energy usage, the solution was just “shifting around resource problems.”

This story was originally published by Grist with the headline Can carbon capture solve desalination’s waste problem? on Jan 17, 2024.


This content originally appeared on Grist and was authored by Jake Bittle.

]]>
https://grist.org/technology/desalination-carbon-capture-brine/feed/ 0 452417
OpenAI Quietly Deletes Ban on Using ChatGPT for “Military and Warfare” https://www.radiofree.org/2024/01/12/openai-quietly-deletes-ban-on-using-chatgpt-for-military-and-warfare/ https://www.radiofree.org/2024/01/12/openai-quietly-deletes-ban-on-using-chatgpt-for-military-and-warfare/#respond Fri, 12 Jan 2024 19:07:11 +0000 https://theintercept.com/?p=457246

OpenAI this week quietly deleted language expressly prohibiting the use of its technology for military purposes from its usage policy, which seeks to dictate how powerful and immensely popular tools like ChatGPT can be used.

Up until January 10, OpenAI’s “usage policies” page included a ban on “activity that has high risk of physical harm, including,” specifically, “weapons development” and “military and warfare.” That plainly worded prohibition against military applications would seemingly rule out any official, and extremely lucrative, use by the Department of Defense or any other state military. The new policy retains an injunction not to “use our service to harm yourself or others” and gives “develop or use weapons” as an example, but the blanket ban on “military and warfare” use has vanished.

The unannounced redaction is part of a major rewrite of the policy page, which the company said was intended to make the document “clearer” and “more readable,” and which includes many other substantial language and formatting changes.

“We aimed to create a set of universal principles that are both easy to remember and apply, especially as our tools are now globally used by everyday users who can now also build GPTs,” OpenAI spokesperson Niko Felix said in an email to The Intercept. “A principle like ‘Don’t harm others’ is broad yet easily grasped and relevant in numerous contexts. Additionally, we specifically cited weapons and injury to others as clear examples.”

Felix declined to say whether the vaguer “harm” ban encompassed all military use, writing, “Any use of our technology, including by the military, to ‘[develop] or [use] weapons, [injure] others or [destroy] property, or [engage] in unauthorized activities that violate the security of any service or system,’ is disallowed.”

“OpenAI is well aware of the risk and harms that may arise due to the use of their technology and services in military applications,” said Heidy Khlaaf, engineering director at the cybersecurity firm Trail of Bits and an expert on machine learning and autonomous systems safety, citing a 2022 paper she co-authored with OpenAI researchers that specifically flagged the risk of military use. Khlaaf added that the new policy seems to emphasize legality over safety. “There is a distinct difference between the two policies, as the former clearly outlines that weapons development, and military and warfare is disallowed, while the latter emphasizes flexibility and compliance with the law,” she said. “Developing weapons, and carrying out activities related to military and warfare is lawful to various extents. The potential implications for AI safety are significant. Given the well-known instances of bias and hallucination present within Large Language Models (LLMs), and their overall lack of accuracy, their use within military warfare can only lead to imprecise and biased operations that are likely to exacerbate harm and civilian casualties.”

The real-world consequences of the policy are unclear. Last year, The Intercept reported that OpenAI was unwilling to say whether it would enforce its own clear “military and warfare” ban in the face of increasing interest from the Pentagon and U.S. intelligence community.

“Given the use of AI systems in the targeting of civilians in Gaza, it’s a notable moment to make the decision to remove the words ‘military and warfare’ from OpenAI’s permissible use policy,” said Sarah Myers West, managing director of the AI Now Institute and a former AI policy analyst at the Federal Trade Commission. “The language that is in the policy remains vague and raises questions about how OpenAI intends to approach enforcement.”

While nothing OpenAI offers today could plausibly be used to directly kill someone, militarily or otherwise — ChatGPT can’t maneuver a drone or fire a missile — any military is in the business of killing, or at least maintaining the capacity to kill. There are any number of killing-adjacent tasks that a LLM like ChatGPT could augment, like writing code or processing procurement orders. A review of custom ChatGPT-powered bots offered by OpenAI suggests U.S. military personnel are already using the technology to expedite paperwork. The National Geospatial-Intelligence Agency, which directly aids U.S. combat efforts, has openly speculated about using ChatGPT to aid its human analysts. Even if OpenAI tools were deployed by portions of a military force for purposes that aren’t directly violent, they would still be aiding an institution whose main purpose is lethality.

Experts who reviewed the policy changes at The Intercept’s request said OpenAI appears to be silently weakening its stance against doing business with militaries. “I could imagine that the shift away from ‘military and warfare’ to ‘weapons’ leaves open a space for OpenAI to support operational infrastructures as long as the application doesn’t directly involve weapons development narrowly defined,” said Lucy Suchman, professor emerita of anthropology of science and technology at Lancaster University. “Of course, I think the idea that you can contribute to warfighting platforms while claiming not to be involved in the development or use of weapons would be disingenuous, removing the weapon from the sociotechnical system – including command and control infrastructures – of which it’s part.” Suchman, a scholar of artificial intelligence since the 1970s and member of the International Committee for Robot Arms Control, added, “It seems plausible that the new policy document evades the question of military contracting and warfighting operations by focusing specifically on weapons.”

Suchman and Myers West both pointed to OpenAI’s close partnership with Microsoft, a major defense contractor, which has invested $13 billion in the LLM maker to date and resells the company’s software tools.

The changes come as militaries around the world are eager to incorporate machine learning techniques to gain an advantage; the Pentagon is still tentatively exploring how it might use ChatGPT or other large-language models, a type of software tool that can rapidly and dextrously generate sophisticated text outputs. LLMs are trained on giant volumes of books, articles, and other web data in order to approximate human responses to user prompts. Though the outputs of an LLM like ChatGPT are often extremely convincing, they are optimized for coherence rather than a firm grasp on reality and often suffer from so-called hallucinations that make accuracy and factuality a problem. Still, the ability of LLMs to quickly ingest text and rapidly output analysis — or at least the simulacrum of analysis — makes them a natural fit for the data-laden Defense Department.

While some within U.S. military leadership have expressed concern about the tendency of LLMs to insert glaring factual errors or other distortions, as well as security risks that might come with using ChatGPT to analyze classified or otherwise sensitive data, the Pentagon remains generally eager to adopt artificial intelligence tools. In a November address, Deputy Secretary of Defense Kathleen Hicks stated that AI is “a key part of the comprehensive, warfighter-centric approach to innovation that Secretary [Lloyd] Austin and I have been driving from Day 1,” though she cautioned that most current offerings “aren’t yet technically mature enough to comply with our ethical AI principles.”

Last year, Kimberly Sablon, the Pentagon’s principal director for trusted AI and autonomy, told a conference in Hawaii that “[t]here’s a lot of good there in terms of how we can utilize large-language models like [ChatGPT] to disrupt critical functions across the department.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2024/01/12/openai-quietly-deletes-ban-on-using-chatgpt-for-military-and-warfare/feed/ 0 451678
OpenAI Quietly Deletes Ban on Using ChatGPT for “Military and Warfare” https://www.radiofree.org/2024/01/12/openai-quietly-deletes-ban-on-using-chatgpt-for-military-and-warfare/ https://www.radiofree.org/2024/01/12/openai-quietly-deletes-ban-on-using-chatgpt-for-military-and-warfare/#respond Fri, 12 Jan 2024 19:07:11 +0000 https://theintercept.com/?p=457246

OpenAI this week quietly deleted language expressly prohibiting the use of its technology for military purposes from its usage policy, which seeks to dictate how powerful and immensely popular tools like ChatGPT can be used.

Up until January 10, OpenAI’s “usage policies” page included a ban on “activity that has high risk of physical harm, including,” specifically, “weapons development” and “military and warfare.” That plainly worded prohibition against military applications would seemingly rule out any official, and extremely lucrative, use by the Department of Defense or any other state military. The new policy retains an injunction not to “use our service to harm yourself or others” and gives “develop or use weapons” as an example, but the blanket ban on “military and warfare” use has vanished.

The unannounced redaction is part of a major rewrite of the policy page, which the company said was intended to make the document “clearer” and “more readable,” and which includes many other substantial language and formatting changes.

“We aimed to create a set of universal principles that are both easy to remember and apply, especially as our tools are now globally used by everyday users who can now also build GPTs,” OpenAI spokesperson Niko Felix said in an email to The Intercept. “A principle like ‘Don’t harm others’ is broad yet easily grasped and relevant in numerous contexts. Additionally, we specifically cited weapons and injury to others as clear examples.”

Felix declined to say whether the vaguer “harm” ban encompassed all military use, writing, “Any use of our technology, including by the military, to ‘[develop] or [use] weapons, [injure] others or [destroy] property, or [engage] in unauthorized activities that violate the security of any service or system,’ is disallowed.”

“OpenAI is well aware of the risk and harms that may arise due to the use of their technology and services in military applications,” said Heidy Khlaaf, engineering director at the cybersecurity firm Trail of Bits and an expert on machine learning and autonomous systems safety, citing a 2022 paper she co-authored with OpenAI researchers that specifically flagged the risk of military use. Khlaaf added that the new policy seems to emphasize legality over safety. “There is a distinct difference between the two policies, as the former clearly outlines that weapons development, and military and warfare is disallowed, while the latter emphasizes flexibility and compliance with the law,” she said. “Developing weapons, and carrying out activities related to military and warfare is lawful to various extents. The potential implications for AI safety are significant. Given the well-known instances of bias and hallucination present within Large Language Models (LLMs), and their overall lack of accuracy, their use within military warfare can only lead to imprecise and biased operations that are likely to exacerbate harm and civilian casualties.”

The real-world consequences of the policy are unclear. Last year, The Intercept reported that OpenAI was unwilling to say whether it would enforce its own clear “military and warfare” ban in the face of increasing interest from the Pentagon and U.S. intelligence community.

“Given the use of AI systems in the targeting of civilians in Gaza, it’s a notable moment to make the decision to remove the words ‘military and warfare’ from OpenAI’s permissible use policy,” said Sarah Myers West, managing director of the AI Now Institute and a former AI policy analyst at the Federal Trade Commission. “The language that is in the policy remains vague and raises questions about how OpenAI intends to approach enforcement.”

While nothing OpenAI offers today could plausibly be used to directly kill someone, militarily or otherwise — ChatGPT can’t maneuver a drone or fire a missile — any military is in the business of killing, or at least maintaining the capacity to kill. There are any number of killing-adjacent tasks that a LLM like ChatGPT could augment, like writing code or processing procurement orders. A review of custom ChatGPT-powered bots offered by OpenAI suggests U.S. military personnel are already using the technology to expedite paperwork. The National Geospatial-Intelligence Agency, which directly aids U.S. combat efforts, has openly speculated about using ChatGPT to aid its human analysts. Even if OpenAI tools were deployed by portions of a military force for purposes that aren’t directly violent, they would still be aiding an institution whose main purpose is lethality.

Experts who reviewed the policy changes at The Intercept’s request said OpenAI appears to be silently weakening its stance against doing business with militaries. “I could imagine that the shift away from ‘military and warfare’ to ‘weapons’ leaves open a space for OpenAI to support operational infrastructures as long as the application doesn’t directly involve weapons development narrowly defined,” said Lucy Suchman, professor emerita of anthropology of science and technology at Lancaster University. “Of course, I think the idea that you can contribute to warfighting platforms while claiming not to be involved in the development or use of weapons would be disingenuous, removing the weapon from the sociotechnical system – including command and control infrastructures – of which it’s part.” Suchman, a scholar of artificial intelligence since the 1970s and member of the International Committee for Robot Arms Control, added, “It seems plausible that the new policy document evades the question of military contracting and warfighting operations by focusing specifically on weapons.”

Suchman and Myers West both pointed to OpenAI’s close partnership with Microsoft, a major defense contractor, which has invested $13 billion in the LLM maker to date and resells the company’s software tools.

The changes come as militaries around the world are eager to incorporate machine learning techniques to gain an advantage; the Pentagon is still tentatively exploring how it might use ChatGPT or other large-language models, a type of software tool that can rapidly and dextrously generate sophisticated text outputs. LLMs are trained on giant volumes of books, articles, and other web data in order to approximate human responses to user prompts. Though the outputs of an LLM like ChatGPT are often extremely convincing, they are optimized for coherence rather than a firm grasp on reality and often suffer from so-called hallucinations that make accuracy and factuality a problem. Still, the ability of LLMs to quickly ingest text and rapidly output analysis — or at least the simulacrum of analysis — makes them a natural fit for the data-laden Defense Department.

While some within U.S. military leadership have expressed concern about the tendency of LLMs to insert glaring factual errors or other distortions, as well as security risks that might come with using ChatGPT to analyze classified or otherwise sensitive data, the Pentagon remains generally eager to adopt artificial intelligence tools. In a November address, Deputy Secretary of Defense Kathleen Hicks stated that AI is “a key part of the comprehensive, warfighter-centric approach to innovation that Secretary [Lloyd] Austin and I have been driving from Day 1,” though she cautioned that most current offerings “aren’t yet technically mature enough to comply with our ethical AI principles.”

Last year, Kimberly Sablon, the Pentagon’s principal director for trusted AI and autonomy, told a conference in Hawaii that “[t]here’s a lot of good there in terms of how we can utilize large-language models like [ChatGPT] to disrupt critical functions across the department.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2024/01/12/openai-quietly-deletes-ban-on-using-chatgpt-for-military-and-warfare/feed/ 0 451679
Israeli Group Claims It’s Using Big Tech Back Channels to Censor “Inflammatory” Wartime Content https://www.radiofree.org/2024/01/10/israeli-group-claims-its-using-big-tech-back-channels-to-censor-inflammatory-wartime-content/ https://www.radiofree.org/2024/01/10/israeli-group-claims-its-using-big-tech-back-channels-to-censor-inflammatory-wartime-content/#respond Wed, 10 Jan 2024 18:26:07 +0000 https://theintercept.com/?p=455624

A small group of volunteers from Israel’s tech sector is working tirelessly to remove content it says doesn’t belong on platforms like Facebook and TikTok, tapping personal connections at those and other Big Tech companies to have posts deleted outside official channels, the project’s founder told The Intercept.

The project’s moniker, “Iron Truth,” echoes the Israeli military’s vaunted Iron Dome rocket interception system. The brainchild of Dani Kaganovitch, a Tel Aviv-based software engineer at Google, Iron Truth claims its tech industry back channels have led to the removal of roughly 1,000 posts tagged by its members as false, antisemitic, or “pro-terrorist” across platforms such as X, YouTube, and TikTok.

In an interview, Kaganovitch said he launched the project after the October 7 Hamas attack, when he saw a Facebook video that cast doubt on alleged Hamas atrocities. “It had some elements of disinformation,” he told The Intercept. “The person who made the video said there were no beheaded babies, no women were raped, 200 bodies is a fake. As I saw this video, I was very pissed off. I copied the URL of the video and sent it to a team in [Facebook parent company] Meta, some Israelis that work for Meta, and I told them that this video needs to be removed and actually they removed it after a few days.”

Billed as both a fight against falsehood and a “fight for public opinion,” according to a post announcing the project on Kaganovitch’s LinkedIn profile, Iron Truth vividly illustrates the perils and pitfalls of terms like “misinformation” and “disinformation” in wartime, as well as the mission creep they enable. The project’s public face is a Telegram bot that crowdsources reports of “inflammatory” posts, which Iron Truth’s organizers then forward to sympathetic insiders. “We have direct channels with Israelis who work in the big companies,” Kaganovitch said in an October 13 message to the Iron Truth Telegram group. “There are compassionate ones who take care of a quick removal.” The Intercept used Telegram’s built-in translation feature to review the Hebrew-language chat transcripts.

Iron Truth vividly illustrates the perils and pitfalls of terms like “misinformation” and “disinformation” in wartime.

So far, nearly 2,000 participants have flagged a wide variety of posts for removal, from content that’s clearly racist or false to posts that are merely critical of Israel or sympathetic to Palestinians, according to chat logs reviewed by The Intercept. “In the U.S. there is free speech,” Kaganovitch explained. “Anyone can say anything with disinformation. This is very dangerous, we can see now.”

“The interests of a fact checking or counter-disinformation group working in the context of a war belongs to one belligerent or another. Their job is to look out for the interests of their side,” explained Emerson Brooking, a fellow with the Atlantic Council’s Digital Forensic Research Lab. “They’re not trying to ensure an open, secure, accessible online space for all, free from disinformation. They’re trying to target and remove information and disinformation that they see as harmful or dangerous to Israelis.”

While Iron Truth appears to have frequently conflated criticism or even mere discussion of Israeli state violence with misinformation or antisemitism, Kaganovitch says his views on this are evolving. “In the beginning of the war, it was anger, most of the reporting was anger,” he told The Intercept. “Anti-Israel, anti-Zionist, anything related to this was received as fake, even if it was not.”

The Intercept was unable to independently confirm that sympathetic workers at Big Tech firms are responding to the group’s complaints or verify that the group was behind the removal of the content it has taken credit for having deleted. Iron Truth’s founder declined to share the names of its “insiders,” stating that they did not want to discuss their respective back channels with the press. In general, “they are not from the policy team but they have connections to the policy team,” Kaganovitch told The Intercept, referring to the personnel at social media firms who set rules for permissible speech. “Most of them are product managers, software developers. … They work with the policy teams with an internal set of tools to forward links and explanations about why they need to be removed.” While companies like Meta routinely engage with various civil society groups and NGOs to discuss and remove content, these discussions are typically run through their official content policy teams, not rank-and-file employees.

The Iron Truth Telegram account regularly credits these supposed insiders. “Thanks to the TikTok Israel team who fight for us and for the truth,” read an October 28 post on the group’s Telegram channel. “We work closely with Facebook, today we spoke with more senior managers,” according to another post on October 17. Soon after a Telegram chat member complained that something they’d posted to LinkedIn had attracted “inflammatory commenters,” the Iron Truth account replied, “Kudos to the social network LinkedIn who recruited a special team and have so far removed 60% of the content we reported on.”

Kaganovitch said the project has allies outside Israel’s Silicon Valley annexes as well. Iron Truth’s organizers met with the director of a controversial Israeli government cyber unit, he said, and its core team of more than 50 volunteers and 10 programmers includes a former member of the Israeli Parliament.

“Eventually our main goal is to get the tech companies to differentiate between freedom of speech and posts that their only goal is to harm Israel and to interfere with the relationship between Israel and Palestine to make the war even worse,” Inbar Bezek, the former Knesset member working with Iron Truth, told The Intercept in a WhatsApp message.

“Across our products, we have policies in place to mitigate abuse, prevent harmful content and help keep users safe. We enforce them consistently and without bias,” Google spokesperson Christa Muldoon told The Intercept. “If a user or employee believes they’ve found content that violates these policies, we encourage them to report it through the dedicated online channels.” Muldoon added that Google “encourages employees to use their time and skills to volunteer for causes they care about.” In interviews with The Intercept, Kaganovitch emphasized that he works on Iron Truth only in his free time, and said the project is entirely distinct from his day job at Google.

Meta spokesperson Ryan Daniels pushed back on the notion that Iron Truth was able to get content taken down outside the platform’s official processes, but declined to comment on Iron Truth’s underlying claim of a back channel to company employees. “Multiple pieces of content this group claims to have gotten removed from Facebook and Instagram are still live and visible today because they don’t violate our policies,” Daniels told The Intercept in an emailed statement. “The idea that we remove content based on someone’s personal beliefs, religion, or ethnicity is simply inaccurate.” Daniels added, “We receive feedback about potentially violating content from a variety of people, including employees, and we encourage anyone who sees this type of content to report it so we can investigate and take action according to our policies,” noting that Meta employees have access to internal content reporting tools, but that this system can only be used to remove posts that violate the company’s public Community Standards.

Neither TikTok nor LinkedIn responded to questions about Iron Truth. X could not be reached for comment.

GAZA CITY, GAZA - OCTOBER 18: A Palestinian woman around the belongings of Palestinians cries at the garden of Al-Ahli Arabi Baptist Hospital after it was hit in Gaza City, Gaza on October 18, 2023. Over 500 people were killed on Al-Ahli Arabi Baptist Hospital in Gaza on Tuesday, Health Ministry spokesman Ashraf al-Qudra told. According to the Palestinian authorities, Israeli army is responsible for the deadly bombing. (Photo by Mustafa Hassona/Anadolu via Getty Images)

A Palestinian woman cries in the garden of Al-Ahli Arab Hospital after it was hit in Gaza City, Gaza, on Oct. 18, 2023.

Photo by Mustafa Hassona/Anadolu via Getty Images

“Keep Bombing!”

Though confusion and recrimination are natural byproducts of any armed conflict, Iron Truth has routinely used the fog of war as evidence of anti-Israeli disinformation.

At the start of the project in the week after Hamas’s attack, for example, Iron Truth volunteers were encouraged to find and report posts expressing skepticism about claims of the mass decapitation of babies in an Israeli kibbutz. They quickly surfaced posts casting doubt on reports of “40 beheaded babies” during the Hamas attack, tagging them “fake news” and “disinformation” and sending them to platforms for removal. Among a list of LinkedIn content that Iron Truth told its Telegram followers it had passed along to the company was a post demanding evidence for the beheaded baby claim, categorized by the project as “Terror/Fake.”

But the skepticism they were attacking proved warranted. While many of Hamas’s atrocities against Israelis on October 7 are indisputable, the Israeli government itself ultimately said it couldn’t verify the horrific claim about beheaded babies. Similarly, Iron Truth’s early efforts to take down “disinformation” about Israel bombing hospitals now contrast with weeks of well-documented airstrikes against multiple hospitals and the deaths of hundreds of doctors from Israeli bombs.

On October 16, Iron Truth shared a list of Facebook and Instagram posts it claimed responsibility for removing, writing on Telegram, “Significant things reported today and deleted. Good job! Keep bombing! 💪

While most of the links no longer work, several are still active. One is a video of grievously wounded Palestinians in a hospital, including young children, with a caption accusing Israel of crimes against humanity. Another is a video from Mohamed El-Attar, a Canadian social media personality who posts under the name “That Muslim Guy.” In the post, shared the day after the Hamas attack, El-Attar argued the October 7 assault was not an act of terror, but of armed resistance to Israeli occupation. While this statement is no doubt inflammatory to many, particularly in Israel, Meta is supposed to allow for this sort of discussion, according to internal policy guidance previously reported by The Intercept. The internal language, which detailed the company’s Dangerous Individuals and Organizations policy, lists this sentence among examples of permitted speech: “The IRA were pushed towards violence by the brutal practices of the British government in Ireland.”

While it’s possible for Meta posts to be deleted by moderators and later reinstated, Daniels, the spokesperson, disputed Iron Truth’s claim, saying links from the list that remain active had never been taken down in the first place. Daniels added that other links on the list had indeed been removed because they violated Meta policy but declined to comment on specific posts.

Under their own rules, the major social platforms aren’t supposed to remove content simply because it is controversial. While content moderation trigger-happiness around mere mentions of designated terror organizations has led to undue censorship of Palestinian and other Middle Eastern users, Big Tech policies on misinformation are, on paper, much more conservative. Facebook, Instagram, TikTok, and YouTube, for example, only prohibit misinformation when it might cause physical harm, like snake oil cures for Covid-19, or posts meant to interfere with civic functions such as elections. None of the platforms targeted by Iron Truth prohibit merely “inflammatory” speech; indeed, such a policy would likely be the end of social media as we know it.

Still, content moderation rules are known to be vaguely conceived and erratically enforced. Meta for instance, says it categorically prohibits violent incitement, and touts various machine learning-based technologies to detect and remove such speech. Last month, however, The Intercept reported that the company had approved Facebook ads calling for the assassination of a prominent Palestinian rights advocate, along with explicit calls for the murder of civilians in Gaza. On Instagram, users leaving comments with Palestinian flag emojis have seen these responses inexplicably vanished. 7amleh, a Palestinian digital rights organization that formally partners with Meta on speech issues, has documented over 800 reports of undue social media censorship since the war’s start, according to its public database.

Disinformation in the Eye of the Beholder

“It’s really hard to identify disinformation,” Kaganovitch acknowledged in an interview, conceding that what’s considered a conspiracy today might be corroborated tomorrow, and pointing to a recent Haaretz report that an Israel Defense Forces helicopter may have inadvertently killed Israelis on October 7 in the course of firing at Hamas.

Throughout October, Iron Truth provided a list of suggested keywords for volunteers in the project’s Telegram group to use when searching for content to report to the bot. Some of these terms, like “Kill Jewish” and “Kill Israelis,” pertained to content flagrantly against the rules of major social media platforms, which uniformly ban explicit violent incitement. Others reflected stances that might understandably offend Israeli social media users still reeling from the Hamas attack, like “Nazi flag israel.”

But many other suggestions included terms commonly found in news coverage or general discussion of the war, particularly in reference to Israel’s brutal bombardment of Gaza. Some of those phrases — including “Israel bomb hospital”; “Israel bomb churches”; “Israel bomb humanitarian”; and “Israel committing genocide” — were suggested as disinformation keywords as the Israeli military was being credibly accused of doing those very things. While some allegations against both Hamas and the IDF were and continue to be bitterly disputed — notably who bombed the Al-Ahli Arab Hospital on October 17 — Iron Truth routinely treated contested claims as “fake news,” siding against the sort of analysis or discussion often necessary to reach the truth.

“This post must be taken down, he is a really annoying liar and the amount of exposure he has is crazy.”

Even the words “Israel lied” were suggested to Iron Truth volunteers on the grounds that they could be used in “false posts.” On October 16, two days after an Israeli airstrike killed 70 Palestinians evacuating from northern Gaza, one Telegram group member shared a TikTok containing imagery of one of the bombed convoys. “This post must be taken down, he is a really annoying liar and the amount of exposure he has is crazy,” the member added. A minute later, the Iron Truth administrator account encouraged this member to report the post to the Iron Truth bot.

Although The Intercept is unable to see which links have been submitted to the bot, Telegram transcripts show the group’s administrator frequently encouraged users to flag posts accusing Israel of genocide or other war crimes. When a chat member shared a link to an Instagram post arguing “It has BEEN a genocide since the Nakba in 1948 when Palestinians were forcibly removed from their land by Israel with Britain’s support and it has continued for the past 75 years with US tax payer dollars,” the group administrator encouraged them to report the post to the bot three minutes later. Links to similar allegations of Israeli war crimes from figures such as popular Twitch streamer Hasan Piker; Colombian President Gustavo Petro; psychologist Gabor Maté; and a variety of obscure, ordinary social media users have received the same treatment.

Iron Truth has acknowledged its alleged back channel has limits: “It’s not immediate unfortunately, things go through a chain of people on the way,” Kaganovitch explained to one Telegram group member who complained a post they’d reported was still online. “There are companies that implement faster and there are companies that work more slowly. There is internal pressure from the Israelis in the big companies to speed up the reports and removal of the content. We are in constant contact with them 24/7.”

Since the war began, social media users in Gaza and beyond have complained that content has been censored without any clear violation of a given company’s policies, a well-documented phenomenon long before the current conflict. But Brooking, of the Atlantic Council, cautioned that it can be difficult to determine the process that led to the removal of a given social media post. “There are almost certainly people from tech companies who are receptive to and will work with a civil society organization like this,” he said. “But there’s a considerable gulf between claiming those tech company contacts and having a major influence on tech company decision making.”

Iron Truth has found targets outside social media too. On November 27, one volunteer shared a link to NoThanks, an Android app that helps users boycott companies related to Israel. The Iron Truth administrator account quickly noted that the complaint had been forwarded to Google. Days later, Google pulled NoThanks from its app store, though it was later reinstated.

The group has also gone after efforts to fundraise for Gaza. “These cuties are raising money,” said one volunteer, sharing a link to the Instagram account of Medical Aid for Palestinians. Again, the Iron Truth admin quickly followed up, saying the post had been “transferred” accordingly.

But Kaganovitch says his thinking around the topic of Israeli genocide has shifted. “I changed my thoughts a bit during the war,” he explained. Though he doesn’t agree that Israel is committing a genocide in Gaza, where the death toll has exceeded 20,000, according to the Gaza Health Ministry, he understands how others might. “The genocide, I stopped reporting it in about the third week [of the war].”

Several weeks after its launch, Iron Truth shared an infographic in its Telegram channel asking its followers not to pass along posts that were simply anti-Zionist. But OCT7, an Israeli group that “monitors the social web in real-time … and guides digital warriors,” lists Iron Truth as one of its partner organizations, alongside the Israeli Ministry for Diaspora Affairs, and cites “anti-Zionist bias” as part of the “challenge” it’s “battling against.”

Despite Iron Truth’s occasional attempts to rein in its volunteers and focus them on finding posts that might actually violate platform rules, getting everyone on board has proven difficult. Chat transcripts show many Iron Truth volunteers conflating Palestinian advocacy with material support for Hamas or characterizing news coverage as “misinformation” or “disinformation,” perennially vague terms whose meaning is further diluted in times of war and crisis.

“By the way, it would not be bad to go through the profiles of [United Nations] employees, the majority are local there and they are all supporters of terrorists,” recommended one follower in October. “Friends, report a profile of someone who is raising funds for Gaza!” said another Telegram group member, linking to the Instagram account of a New York-based beauty influencer. “Report this profile, it’s someone I met on a trip and it turns out she’s completely pro-Palestinian!” the same user added later that day. Social media accounts of Palestinian journalist Yara Eid; Palestinian photojournalist Motaz Azaiza; and many others involved in Palestinian human rights advocacy were similarly flagged by Iron Truth volunteers for allegedly spreading “false information.”

Iron Truth has at times struggled with its own followers. When one proposed reporting a link about Israeli airstrikes at the Rafah border crossing between Gaza and Egypt, the administrator account pointed out that the IDF had indeed conducted the attacks, urging the group: “Let’s focus on disinformation, we are not fighting media organizations.” On another occasion, the administrator discouraged a user from reporting a page belonging to a news organization: “What’s the problem with that?” the administrator asked, noting that the outlet was “not pro-Israel, but is there fake news?”

But Iron Truth’s standards often seem muddled or contradictory. When one volunteer suggested going after B’Tselem, an Israeli human rights organization that advocates against the country’s military occupation and broader repression of Palestinians, the administrator account replied: “With all due respect, B’Tselem does publish pro-Palestinian content and this was also reported to us and passed on to the appropriate person. But B’Tselem is not Hamas bots or terrorist supporters, we have tens of thousands of posts to deal with.”

11 September 2022, Israel, Jerusalem: Israeli flags fly in front of the Knesset, the unicameral parliament of the State of Israel. Photo by: Christophe Gateau/picture-alliance/dpa/AP Images

Israeli flags fly in front of the Knesset, the unicameral parliament of the state of Israel, on Sept. 11, 2022, in Jerusalem.

Photo: Christophe Gateau/AP

Friends in High Places

Though Iron Truth is largely a byproduct of Israel’s thriving tech economy — the country is home to many regional offices of American tech giants — it also claims support from the Israeli government.

The group’s founder says that Iron Truth leadership have met with Haim Wismonsky, director of the controversial Cyber Unit of the Israeli State Attorney’s Office. While the Cyber Unit purports to combat terrorism and miscellaneous cybercrime, critics say it’s used to censor unwanted criticism and Palestinian perspectives, relaying thousands upon thousands of content takedown demands. American Big Tech has proven largely willing to play ball with these demands: A 2018 report from the Israeli Ministry of Justice claimed a 90 percent compliance rate across social media platforms.

Following an in-person presentation to the Cyber Unit, Iron Truth’s organizers have remained in contact, and sometimes forward the office links they need help removing, Kaganovitch said. “We showed them the presentation, they asked us also to monitor Reddit and Discord, but Reddit is not really popular here in Israel, so we focus on the big platforms right now.”

Wismonsky did not respond to a request for comment.

Kaganovitch noted that Bezek, the former Knesset member, “helps us with diplomatic and government relationships.” In an interview, Bezek confirmed her role and corroborated the group’s claims, saying that while Iron Truth had contacts with “many other employees” at social media firms, she is not involved in that aspect of the group’s work, adding, “I took on myself to be more like the legislation and legal connection.”

“What we’re doing on a daily basis is that we have a few groups of people who have social media profiles in different medias — LinkedIn, X, Meta, etc. — and if one of us is finding content that is antisemitic or content that is hate claims against Israel or against Jews, we are informing the other people in the group, and few people at the same time are reporting to the tech companies,” Bezek explained.

Bezek’s governmental outreach has so far included organizing meetings with Israel’s Ministry of Foreign Affairs and “European ambassadors in Israel.” Bezek declined to name the Israeli politicians or European diplomatic personnel involved because their communications are ongoing. These meetings have included allegations of foreign, state-sponsored “antisemitic campaigns and anti-Israeli campaigns,” which Bezek says Iron Truth is collecting evidence about in the hope of pressuring the United Nations to act.

Iron Truth has also collaborated with Digital Dome, a similar volunteer effort spearheaded by the Israeli anti-disinformation organization FakeReporter, which helps coordinate the mass reporting of unwanted social media content. Israeli American investment fund J-Ventures, which has reportedly worked directly with the IDF to advance Israeli military interests, has promoted both Iron Truth and Digital Dome.

FakeReporter did not respond to a request for comment.

While most counter-misinformation efforts betray some geopolitical loyalty, Iron Truth is openly nationalistic. An October 28 write-up in the popular Israeli news website Ynet — “Want to Help With Public Diplomacy? This is How You Start”— cited the Telegram bot as an example of how ordinary Israelis could help their country, noting: “In the absence of a functioning Information Ministry, Israeli men and women hope to be able to influence even a little bit the sounding board on the net.” A mention in the Israeli financial news website BizPortal described Iron Truth as fighting “false and inciting content against Israel.”

Iron Truth is “a powerful reminder that it’s still people who run these companies at the end of the day,” said Brooking. “I think it’s natural to try to create these coordinated reporting groups when you feel that your country is at war in or in danger, and it’s natural to use every tool at your disposal, including the language of disinformation or fact checking, to try to remove as much content as possible if you think it’s harmful to you or people you love.”

The real risk, Brooking said, lies not in the back channel, but in the extent to which companies that control the speech of billions around the world are receptive to insiders arbitrarily policing expression. “If it’s elevating content for review that gets around trust and safety teams, standing policy, policy [into] which these companies put a lot of work,” he said, “then that’s a problem.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2024/01/10/israeli-group-claims-its-using-big-tech-back-channels-to-censor-inflammatory-wartime-content/feed/ 0 451037
Drones From Company That “Strongly Opposes” Military Use Marketed With Bombs Attached https://www.radiofree.org/2024/01/06/drones-from-company-that-strongly-opposes-military-use-marketed-with-bombs-attached/ https://www.radiofree.org/2024/01/06/drones-from-company-that-strongly-opposes-military-use-marketed-with-bombs-attached/#respond Sat, 06 Jan 2024 12:00:00 +0000 https://theintercept.com/?p=456662

A forthcoming drone made by Autel, a Chinese electronics manufacturer and drone-maker, is being marketed using images of the unmanned aerial vehicle carrying a payload of what appears to be explosive shells. The images were discovered just two months after the company condemned the military use of its flying robots.

Two separate online retail preorder listings for the $52,000 Autel Titan drone, with a cargo capacity of 22 pounds and an hour of flight time, advertised a surprising feature: the ability to carry (and presumably fire) weapons.

In response to concerns from China-hawk lawmakers in the U.S. over Autel’s alleged connections to the Chinese government and its “potentially supporting Russia’s ongoing invasion of Ukraine,” according to a congressional inquiry into the firm, Autel issued a public statement disowning battlefield use of its drones: “Autel Robotics strongly opposes the use of drone products for military purposes or any other activities that infringe upon human rights.” A month later, it issued a second, similarly worded denial: “Autel Robotics is solely dedicated to the development and production of civilian drones. Our products are explicitly designed for civilian use and are not intended for military purposes.”

It was surprising, then, when Spanish engineer and drone enthusiast Konrad Iturbe discovered a listing for the Titan drone armed to the teeth on OBDPRICE.com, an authorized reseller of Autel products. While most of the product images are anodyne promotional photos showing the drone from various angles, including carrying a generic cargo container, three show a very different payload: what appears to be a cluster of four explosive shells tucked underneath, a configuration similar to those seen in bomb-dropping drones deployed in Ukraine and elsewhere. Samuel Bendett, an analyst with the Center for Naval Analyses, told The Intercept that the shells resembled mortar rounds. Arms analyst Patrick Senft said the ordnance shown might actually be toy replicas, as they “don’t resemble any munitions I’ve seen deployed by UAV.”

Contacted by email, an OBDPRICE representative who identified themselves only as “Alex” told The Intercept: “The drone products we sell cannot be used for military purposes.” When asked why the site was then depicting the drone product in question carrying camouflage-patterned explosive shells, they wrote: “You may have misunderstood, those are some lighting devices that help our users illuminate themselves at night.” The site has not responded to further queries, but shortly after being contacted by The Intercept, the mortar-carrying images were deleted.

A “heavy lift” drone made by Autel, a Chinese electronics manufacturers listed for resale on eBay on Jan. 5, 2023, showing Autel’s renderings of the drone carrying a payload of camouflage-clad explosives.

Screenshot: The Intercept

Iturbe also identified a separate listing from an Autel storefront on eBay using the very same three images of an armed Titan drone. When asked about the images and whether the drone is compatible with other weapons systems, the account replied via eBay message: “The bombs shown in the listing for this drone is just for display. Pls note that Titan comes with a standard load of 4 kilograms and a maximum load up to 10 kilograms.”

The images bear a striking resemblance to ordnance-carrying drones that have been widely used during the Russian invasion of Ukraine, where their low cost and sophisticated cameras make them ideal for both reconnaissance and improvised bombing runs. Autel’s drones in particular have proven popular on both sides of the conflict: A March 2023 New York Times report found that “nearly 70 Chinese exporters sold 26 distinct brands of Chinese drones to Russia since the invasion. The second-largest brand sold was Autel, a Chinese drone maker with subsidiaries in the United States, Germany and Italy.” A December 2022 report from the Washington Post, meanwhile, cited Autel’s EVO II model drone as particularly popular among volunteer efforts to source drones for the Ukrainian war effort.

Last summer, researchers who’ve closely followed the use of drones in the Russia–Ukraine war documented an effort by two Russian nationals, self-chronicled via Telegram, to obtain Chinese drones for the country’s ongoing war in Ukraine. Their visit to Shenzhen resulted in a meeting at an Autel facility and the procurement, the individuals claimed, of military-purpose drones. 

Autel’s New York-based American subsidiary did not respond to a request for comment.

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2024/01/06/drones-from-company-that-strongly-opposes-military-use-marketed-with-bombs-attached/feed/ 0 450063
24 Predictions for 2024 https://grist.org/culture/24-predictions-for-2024-climate-trends/ https://grist.org/culture/24-predictions-for-2024-climate-trends/#respond Wed, 03 Jan 2024 09:45:00 +0000 https://grist.org/?p=625763 Last year, climate change came into sharp relief for much of the world: The planet experienced its hottest 12-month period in 125,000 years. Flooding events inundated communities from California to East Africa to India. A heat wave in South America caused temperatures to spike above 100 degrees Fahrenheit in the middle of winter, and a heat dome across much of the southern United States spurred a 31-day streak in Phoenix of 110 degree-plus temperatures. The formation of an El Niño, the natural phenomenon that raises temperatures globally, intensified extreme weather already strengthened by climate change. The U.S. alone counted 25 billion-dollar weather disasters in 2023 — more than any other year. 

Yet this devastation was met by some of the largest gains in climate action to date. World leaders agreed for the first time to “transition away” from oil and gas at the annual United Nations climate summit, hosted last month by the United Arab Emirates. Funds and incentives from President Joe Biden’s signature climate law, the Inflation Reduction Act, started to roll out to companies and municipalities. Electric vehicle sales skyrocketed, thousands of young people signed up for the first-ever American Climate Corps, and companies agreed to pay billions of dollars to remove harmful chemicals called PFAS from drinking water supplies.

As we enter a new year, we asked Grist reporters what big stories they’re watching on their beats, 24 predictions for 2024. Their forecasts depict a world on the cusp of change in regard to climate — both good and bad, and often in tandem. Here’s what we’re keeping an eye on, from hard-won international financial commitments, to battles over mining in-demand minerals like lithium, to the expansion of renewable energy.


Protesters hold placards during a climate march in New York City last September. Photo by Ryan Rahman/Pacific Press/LightRocket via Getty Images

Politics & Policy

A new climate corps will turn young people’s anxiety into action

The American Climate Corps will officially kick off in the summer of 2024, sending 20,000 18- to 26-year-olds across the country to install solar projects, mitigate wildfire risk, and make homes more energy-efficient. President Biden’s New Deal-inspired program is modeled after Franklin D. Roosevelt’s Climate Conservation Corps and attracted 100,000 applicants. As it rolls out, the climate corps will continue to draw criticism from the left for low wages and ageism, and from the right for being a “made-up government work program … for young liberal activists.” Yet the program will remain popular with the public, bolstering towns’ resilience to weather disasters and training thousands of young people to help fill the country’s shortage of skilled workers needed for decarbonization.

Kate Yoder Staff writer examining the intersections of climate, language, history, culture, and accountability

Despite rising temperatures, climate change takes a backseat during the 2024 election

Although more than a decade of surveys and polls show that a growing proportion of Americans are concerned about climate change, it has never been a defining issue in a general election — and will likely remain that way in 2024, at least on the main stage. Put simply, there are too many immediate concerns that will dominate the campaign trail as President Joe Biden faces off against the Republican nominee — most likely former President Donald Trump: Russia’s ongoing war in Ukraine, Israel’s war against Hamas, the overturning of Roe v. Wade and the fight for abortion rights, new charges against Biden’s son, Hunter, and, of course, the numerous criminal charges against Trump. Biden may herald his signature climate law, the Inflation Reduction Act, in his own messaging, but climate change is unlikely to cross party lines.

Zoya Teirstein Staff writer covering politics and the intersection between climate change and health

A climate reparations fund gets off the ground

During COP28, the U.N. climate conference that took place in Dubai last year, countries agreed to set up a climate reparations fund on an interim basis at the World Bank. The fund was a longtime priority of developing countries and climate justice advocates who argued that nations that had contributed negligibly to a warming planet were facing the consequences. This year, the World Bank is expected to set up the fund and begin disbursing money to poor nations. Board members will be selected, an executive director will be appointed, decisions about how countries can access the money will be made, and money will begin flowing to those in need. During COP28, wealthy countries chipped in more than $650 million to the fund. More money will also fill the coffers this year.

Naveena Sadasivam Senior staff writer covering environmental justice and accountability

‘Greenhushing’ spreads as companies seek to dodge lawsuits

Just a few years ago, splashy corporate climate promises were everywhere. Even oil companies promised to cut their emissions. But there won’t be as many misleading advertisements touting companies’ climate progress in 2024. Amid new regulations against false environmental marketing and a pileup of greenwashing lawsuits, more corporations will join in hiding their climate commitments to avoid scrutiny. This trend of “greenhushing” ramped up in 2023, when 1 in 5 companies declined to publicly release their sustainability targets, a threefold increase from the prior year. While this makes it harder to see what companies are doing, California’s new “anti-greenwashing” law, which went into effect on January 1, will tackle the transparency problem by requiring companies to disclose their carbon emissions.

Kate Yoder Staff writer examining the intersections of climate, language, history, culture, and accountability

A global treaty to end plastic pollution faces delays

Delegates from around the world have been working to finalize a U.N. treaty by the end of 2024 that will “end plastic pollution.” They’ve had three negotiating sessions so far, and two more are scheduled for later this year. Despite signs of progress, petrochemical industry interests have resisted the most ambitious proposals to limit plastic production — they’d prefer a treaty focused on cleaning up plastic litter and improving plastic recycling rates. After countries failed to make significant headway at the most recent round of talks, it’s now possible that an extended deadline will be needed to deliver the final treaty. To some involved in the talks, that’s OK if it’ll mean a stronger agreement. But the pressure is still on, as every year without a treaty means more unchecked plastic pollution.  

Joseph Winters Staff writer covering plastics, pollution, and the circular economy

Employees of NY State Solar, a residential and commercial photovoltaic-systems company, install solar panels on a roof in Massapequa, New York, in 2022. AP Photo/John Minchillo

Energy

Expect a deluge of new household electrification and efficiency rebates

When the Inflation Reduction Act passed in 2022, some decarbonization incentives were quickly accessible — such as tax credits for solar and heat pump installation — but others have taken longer to kick in. The wait, however, is almost over, and 2024 is set to see a slew of new, or expanded, opportunities come online. The Inflation Reduction Act earmarked $8.8 billion for residential electrification and energy-use reduction, especially in low-income households.Think things like induction cooktops and energy-efficient clothes dryers, which don’t currently have federally funded rebates. The Department of Energy is in the process of allocating funding to participating states, which will be in charge of getting the money into Americans’ pockets.

Tik Root Senior staff writer focusing on the clean energy transition

A push for public power takes root in communities nationwide

Across the country, close to a dozen communities are exploring ways to replace their investor-owned electric utilities with publicly owned ones. Advocates say they want to lower electricity costs, improve reliability, and speed up a clean energy transition. While a referendum in Maine to create a statewide publicly owned utility failed this past November, supporters elsewhere are just getting started. Next year, a group in San Diego could succeed in getting a vote for a municipal utility on the ballot. Decorah, Iowa, is contemplating a similar vote, and ongoing efforts could gain traction in San Francisco, the South San Joaquin Irrigation District in California, New Mexico, and Rochester, New York.

Akielly Hu News and politics reporting fellow

Puerto Rico becomes be a U.S. leader in residential-solar energy adoption

While the nationwide rate of residential-solar installations is expected to shrink by more than 10 percent next year, due to interest rates and changes in California’s net-metering rules, installations show no sign of slowing down in Puerto Rico. The archipelago of 1.2 million households already installs 3,400 residential rooftop solar and battery-storage systems per month. In spring 2024, the Energy Department will begin deploying $440 million in residential-solar funding, which they say will be enough for about 30,000 homes. Analysts predict that by 2030, one-quarter of Puerto Rico households will have photovoltaic systems, though that depends in part on whether Puerto Rico passes a pending bill that would protect net metering until then.

Gabriela Aoun Angueira Climate solutions reporter who helms The Beacon, Grist’s solutions-oriented newsletter

Workers walk the assembly line of Model Y electric vehicles at Tesla’s factory in Berlin in 2022. Patrick Pleul/picture alliance via Getty Images

Business & Technology

Changes to the federal tax credit will improve EV access for lower-income drivers

As of January 1, consumers can redeem the Inflation Reduction Act’s clean-vehicle tax credit directly at car dealerships. Last year, the $7,500 incentive for new electric vehicles and $4,000 for previously owned ones were only available as a credit, meaning that car buyers had to wait until they filed their taxes to get any benefit. The point-of-sale rebate will make getting a clean vehicle more accessible to buyers who can’t afford a hefty down payment, or whose income is too low to owe taxes. But their model options will also shrink — the Treasury Department just proposed rules disqualifying cars with battery components or minerals that come from countries deemed hostile to the U.S.

Gabriela Aoun Angueira Climate solutions reporter who helms The Beacon, Grist’s solutions-oriented newsletter

Carbon-capture tech will continue to boom (and be controversial)

In some ways, it was a mixed year for carbon capture. While the world’s largest carbon-capture plant broke ground in Texas, the builders of a major carbon dioxide pipeline — which would be used to transport captive emissions to their final destination underground — canceled the project in the face of regulatory pushback. Climate activists have also long been skeptical of carbon capture as an industry ruse to keep burning fossil fuels. Overall, though, the carbon-capture market is surging on the tailwinds of largely favorable government policies in recent years. The use of the technology is also spreading beyond traditional sectors, such as natural gas facilities, into other industrial arenas, including cement, steel, and iron manufacturing. Next year will bring some continued hiccups but, overwhelmingly, continued growth.

Tik Root Senior staff writer focusing on the clean energy transition

Republicans ramp up their war on “woke” ESG investing

An ongoing Republican crusade against ESG investing — shorthand for the environmental, social, and governance criteria investors use to evaluate companies — could end up costing retirees and insurers millions in lost returns next year. GOP lawmakers claim that considering climate risks while making investments imposes “woke” values and limits investment returns. Yet anti-ESG laws passed in Kansas, Oklahoma, and Texas last year were estimated to have cost taxpayers up to hundreds of millions of dollars. That’s partly because most Wall Street banks and businesses still employ ESG strategies. The backlash could continue through next year’s election — presidential candidates Ron DeSantis and Vivek Ramaswamy have both taken strong anti-ESG positions.

Akielly Hu News and politics reporting fellow

Unions expand their fight for electric vehicle worker protections

United Auto Workers recently won provisions for electric vehicle employees after a sweeping strike at Detroit’s Big Three carmakers — Ford, Stellantis, and General Motors. Now, the union has launched organizing campaigns at 13 non-union shops, including at EV leaders like Tesla and at other companies just getting into the EV space, such as Volkswagen and Hyundai. Next year, these campaigns will begin to go public, with resulting walkouts, negotiations, and expected union-busting tactics. Such efforts have failed in the past, and some companies have announced wage increases to entice workers away from a potential union drive, but UAW has already announced thousands of new member sign-ups and filed labor grievances against several companies, signaling a hard-headed approach that may win new contracts to protect workers as the auto industry increasingly shifts toward EVs.

Katie Myers Climate solutions reporting fellow

A ConocoPhillips refinery abuts a residential area in the Wilmington neighborhood of Los Angeles in 2022. Luis Sinco / Los Angeles Times via Getty Images

Environmental Justice

The EPA will back away from using civil rights law to protect residents

In 2020, a federal judge ordered the Environmental Protection Agency to start investigating the complaints it receives under Title VI of the Civil Rights Act, which prohibits discrimination on the basis of race or national origin in any program that gets funding from the federal government. Since then, communities around the country have attempted to use the law to achieve environmental justice in their backyards. But after the agency dropped its highest profile civil rights case in Louisiana’s “Cancer Alley” following a lawsuit from the state attorney general, advocates worry that the legal avenue won’t fulfill its promise. In 2024, it’s likely that the EPA will pursue Title VI complaints in states with cooperative environment agencies, but shy away from pressuring industry-friendly states like Louisiana and Texas to make big changes based on the law.

Lylla Younes Senior staff writer covering chemical pollution, regulation, and frontline communities

Additional testing will reveal the true scope of “forever chemical” pollution

Major chemical manufacturers like 3M, DuPont, and Chemours were forced to strike multibillion-dollar settlements last year with coalitions of states, cities, and townships over PFAS — the deadly “forever chemicals” these companies knowingly spewed into the environment for decades. 2024 will be a big year for determining just how pervasive this problem is in U.S. water supplies. New hotspots are likely to emerge as the EPA conducts additional testing across the country, particularly in areas where little data on the chemicals currently exists. New fights over forever chemicals will also unfold in places like Minnesota, where lawmakers have introduced a bill that would require 3M and other large chemical corporations to pay for medical testing for PFAS-exposed communities, and in North Carolina, where the United Nations just declared PFAS pollution a human rights violation.

Zoya Teirstein Staff writer covering politics and the intersection between climate change and health

A booming liquefied natural gas industry goes bust … maybe

The liquefied natural gas industry is booming on the U.S. Gulf Coast as companies export huge amounts of fracked gas to Europe and Asia, but the buildout of liquefaction facilities in the South has stumbled in recent months. A federal court revoked one facility’s permit in Texas, and the federal Department of Energy denied another company seeking an extension to build a facility in Louisiana. The coming year will be a big test for the nascent business: If courts and regulators delay more of these expensive projects, the companies behind them may abandon them and instead try building smaller, cheaper terminals elsewhere in the United States or even offshore.

Jake Bittle Staff writer focusing on climate impacts and adaptation

Polluting countries could be legally liable to vulnerable ones

At COP28, negotiators from small island states sought to hold larger countries financially accountable for their outsize role in fueling carbon emissions. In 2024, that issue could be decided in international courts: As soon as March, the International Court of Justice will weigh arguments regarding countries’ obligations under international law to protect current and future generations from the harmful effects of climate change. The case brought by Vanuatu raises the question of how much big polluters owe island nations, with Vanuatu and other Pacific island communities particularly affected by rising sea levels and worsening storms.

Anita Hofschneider Senior staff writer focusing on Indigenous affairs

An aerial view of Thacker Pass in northern Nevada. A proposed lithium mine on the site has drawn impassioned protest from the local Indigenous population, ranchers, and environmentalists. Carolyn Cole / Los Angeles Times via Getty Images

Land Use

Mining for rare earths takes off, as new discoveries and investments are made

Discoveries of major new deposits of rare earth minerals will continue to explode in the western and southeastern U.S. — places like the Salton Sea in California and a lithium belt in North Carolina — as well as in Alaska. These developments, alongside incentives from the Inflation Reduction Act, will bolster domestic mining and renewable energy industries in 2024. Many of these discoveries are being made in coalfields and oil fields by fossil fuel companies looking to diversify their portfolios. In response, expect a boom in the efforts to reform laws around the poorly regulated mining industry as well as community-driven activism against places like the Thacker Pass lithium mine in Nevada.

Katie Myers Climate solutions reporting fellow

Congress doles out funds for unproven “climate-smart” agriculture

2024 could be the biggest year yet for “climate-smart” agriculture. Billions of dollars that Congress earmarked a year and a half ago in the Inflation Reduction Act are starting to flow to farmers planting trees and cover crops that sequester carbon. Lawmakers will have the chance to carve out even more funds in the farm bill, the sprawling legislative package that will be up for renewal next year. But climate advocates won’t be satisfied with all of the results: The fight over what counts as “climate smart” will heat up as subsidies go to tools like methane digesters, which some advocates blame for propping up big polluters.

Max Graham Food and agriculture reporting fellow

More renewable energy comes to public lands

The Bureau of Land Management controls a tenth of the land base in the U.S. — some 245 millions acres. The Biden administration has been trying to utilize that public land for renewable energy projects and infrastructure, with the Department of Interior recently announcing 15 such initiatives. The department is also aiming to reduce fees to promote solar and wind development. These efforts have run into roadblocks in the past, including from Indigenous nations. For example, the Tohono O’odham Nation and San Carlos Apache Tribe challenged a transmission line in southern Arizona because of its potential to harm cultural sites. But with the goal of permitting 25 gigawatts of renewable energy on BLM land by 2025, expect the federal government to continue pushing its buildout next year.

Tik Root Senior staff writer focusing on the clean energy transition

Residents in Houston look out at flooding from Hurricane Harvey in August 2017. Scott Olson/Getty Images

Climate Impacts

El Niño peaks, bringing a preview of life in the 2030s

Last year brought the onset of the latest cycle of El Niño, a natural phenomenon that spurs the formation of a band of warm water in the Pacific Ocean and fuels above-average temperatures globally. In fact, the cycle has already nudged the world over 1.5 degrees Celsius (2.7 degrees Fahrenheit) of warming for the first time

Because these systems tend to peak from December to April, the worst impacts will likely hit in the first half of 2024. Scientists predict the world will experience its hottest summer on record, giving us a preview of what life will look like in the 2030s. El Niño has already spurred an onslaught of knock-on effects, including heat waves in South America, flooding in East Africa, and infectious disease outbreaks in the Americas and the Caribbean. This year, researchers expect El Niño will lead to an unusually strong hurricane season in the Pacific, impact agricultural production and food security, lead to more explosions of vector-borne diseases, and depress the global economy. In some places, this is already happening.

Zoya Teirstein Staff writer covering politics and the intersection between climate change and health

To migrate or not: Pacific islanders weigh their options

Last year, a proposed treaty between Australia and Tuvalu made international headlines for a unique provision: migration rights for climate refugees from the Pacific island country, which is at particular risk of rising seas. Now, Tuvalu’s general election, set for later this month, may serve as a de facto referendum on the agreement. But the country’s voters aren’t the only ones weighing their options as their islands slowly sink. The coming year will bring more attention to the plight of Pacific Islanders who are confronting a future of forced migration and grappling with the question of where their communities will go, what rights they’ll have, and how their sovereignty will persist.

Anita Hofschneider Senior staff writer focusing on Indigenous affairs

Insurers flee more disaster-prone states

California. Louisiana. Florida. Who’s next? The insurance markets in these hurricane- and fire-prone states have descended into turmoil over the past few years as private companies drop policyholders and flee local markets after expensive disasters. State regulators are stepping in to stop this downward spiral, but stable insurance markets will mean higher prices for homeowners, especially in places like low-lying Miami, where the average insurance premium is already around $300 a month. The next year will see the same kind of insurance crisis pop up in other states such as Hawaiʻi, Oregon, and South Carolina, as private carriers try to stem their climate-induced losses.

Jake Bittle Staff writer focusing on climate impacts and adaptation

Despite barriers, workplace heat standards make slow progress

Earlier this year, Miami-Dade County in Florida — where the region’s humidity makes outdoor workers especially vulnerable to extreme heat — was poised to pass one of the most comprehensive and thoughtful workplace heat standards in the country. Instead, county commissioners bowed to pressure from industry groups, and the vote was deferred. On the national level, OSHA, the agency responsible for workplace safety, has been in the process of creating a federal heat standard for over two years. That work is far from over, and it seems unlikely that the agency will announce a finalized rule next year, despite record-breaking heat. That leaves states and municipalities to lead the way in 2024 for worker-heat protections, but as was the case in Miami-Dade, local officials will likely face obstacles from powerful industry groups as they do so.

Siri Chilukuri Environmental justice reporting fellow

“Heatflation” comes for desserts 

Heatflation came for condiments like olive oil and sriracha in 2023. This year, it’ll strike desserts. Unusually dry weather and a poor sugar cane harvest in India and Thailand — two of the world’s biggest producers — have driven global sugar prices to their highest level in more than a decade. Heavy rainfall in West Africa has led to widespread rot on the region’s prolific cocoa farms, causing chocolate prices to soar and snack companies like Mondelēz, which makes Oreos, to warn of more expensive products in 2024. And an extra-hot year fueled by a strong El Niño could be a rough one for wheat growers and flour prices. So now’s the time to indulge in chocolate cake — before it’s too late.

Max Graham Food and agriculture reporting fellow

This story was originally published by Grist with the headline 24 Predictions for 2024 on Jan 3, 2024.


This content originally appeared on Grist and was authored by Grist staff.

]]>
https://grist.org/culture/24-predictions-for-2024-climate-trends/feed/ 0 449151
Amoral Compass: Palantir and its Quest to Remake the World https://www.radiofree.org/2023/12/29/amoral-compass-palantir-and-its-quest-to-remake-the-world/ https://www.radiofree.org/2023/12/29/amoral-compass-palantir-and-its-quest-to-remake-the-world/#respond Fri, 29 Dec 2023 12:38:24 +0000 https://dissidentvoice.org/?p=147039 Finance analysts free of moral scruple can point to Palantir with relish and note that 2023 was a fairly rewarding year for it.  The company, which bills itself as a “category-leading software” builder “that empowers organizations to create and govern artificial intelligence”, launched its initial public offering in 2020.  But the milky confidence curdled, as […]

The post Amoral Compass: Palantir and its Quest to Remake the World first appeared on Dissident Voice.]]>
Finance analysts free of moral scruple can point to Palantir with relish and note that 2023 was a fairly rewarding year for it.  The company, which bills itself as a “category-leading software” builder “that empowers organizations to create and govern artificial intelligence”, launched its initial public offering in 2020.  But the milky confidence curdled, as with much else with tech assets, leading to the company stock falling by as much as 87% of value.  But this is the sort of language that delights the economy boffins no end, a bloodless exercise that ignores what Palantir really does.

The surveillance company initially cut its teeth on agendas related to national security and law enforcement through Gotham.  A rather dry summation of its services is offered by Adrew Iliadis and Amelia Acker: “The company supplies information technology solutions for data integration and tracking to police and government agencies, humanitarian organizations, and corporations.”

Founded in 2003 and unimaginatively named after the magical stones in The Lord of the Rings known as “Seeing Stones” or palantíri, its ambition was to remake the national security scape, a true fetishist project envisaging technology as deliverer and saviour.  While most of its work remains painfully clandestine, it does let the occasional salivating observer, such as Portugal’s former Secretary of State or European Affairs Bruno Maçães, into its citadel to receive the appropriate indoctrination.

It’s impossible to take any commentary arising from these proselytised sorts seriously, but what follows can be intriguing.  “The target coordination cycle: find, track, target, and prosecute,” Maçães writes for Time, reflecting on the technology on show at the company’s London headquarters.  “As we enter the algorithmic age, time is compressed.  From the moment the algorithms set to work detecting their targets until these targets are prosecuted – a term of art in the field – no more than two or three minutes elapse.”  Such commentary takes the edge of the cruelty, the lethality, the sheer destruction of life that such prosecution entails.

While its stable of government clients remain important, the company also sought to further expand its base with Foundry, the commercial version of the software. “Foundry helps businesses make better decisions and solve problems, and Forrester estimated Foundry delivers a 315% return on investment (ROI) for its users,” writes Will Healy, whose commentary is, given his association with Palantir, bound to be cherubically crawling while oddly flat.

This tech beast is also claiming to march to a more moral tune, with Palantir Technologies UK Ltd announcing in April that it had formed a partnership with the Prosecutor General’s Office of Ukraine (OPG) to “enable investigators on the ground and across Europe to share, integrate, and process all key data relating to more than 78,000 registered war crimes.”

The company’s co-founder and chief executive officer, Alexander C. Karp, nails his colours to the mast with a schoolboy’s binary simplicity.  “The invasion of Ukraine represents one of the most significant challenges to the global balance of power.  To that end, the crimes that are being committed in Ukraine must be prosecuted.”

Having picked the Ukrainian cause as a beneficial one, Palantir revealed that it was “already helping Ukraine militarily, and supporting the resettlement of refugees in the UK, Poland and in Lithuania.”  For Karp, “Software is a product of the legal and moral order in which it is created, and plays a role in defending it.”

Such gnomic statements are best kept in the spittoon of history, mere meaningless splutter, but if they are taken seriously, Karp is in trouble.  He is one who has admitted with sissy’s glee that the “core mission of our company always was to make the West, especially America, the strongest in the world, the strongest it’s ever been, for the sake of global peace and prosperity”.  Typically, such money-minded megalomaniacs tend to confuse personal wealth and a robber baron’s acquisitiveness with the more collective goals of peace and security.  Murdering thieves can be most moral, even as they carry out their sordid tasks with silver tongs.

When Google dropped Project Maven, the US Department of Defense program that riled employees within the company, Palantir was happy to offer its services.  It did not matter one jot that the project, known in Palantir circles as “Tron”, was designed to train AI to analyse aerial drone footage to enable the identification of objects and human beings (again bloodless, chilling, instrumental).  “It’s commonly known that our software is used in an operational context at war,” Karp is reported as saying.  “Do you really think a war fighter is going to trust a software company that pulls the plug because something becomes controversial with their life?  Currently, when you’re a war fighter your life depends on your software.”

War is merely one context where Palantir dirties the terrain of policy.  In 2020, Amnesty International published a report outlining the various human rights risks arising from Palantir’s contracts with the US Department of Homeland Security.  Of particular concern were associated products and services stemming from its Homeland Security Investigations (HIS) division of Immigration and Customs Enforcement.  Human rights groups such as Mijente, along with a number of investors, have also noted that such contracts enable ICE to prosecute such activities as surveillance, detentions, raids, de facto family separations and deportations.

In 2023, protests by hundreds of UK health workers managed to shut down the central London headquarters of the tech behemoth. The workers in question were protesting the award of a £330 million contract to Palantir by the National Health Service (NHS) England.  Many felt particularly riled at the company, given its role in furnishing the Israeli government with such military and surveillance technology, including predictive policing services.  The latter are used to analyse social media posts by Palestinians that might reveal threats to public order or praise for “hostile” entities.

As Gaza is being flattened and gradually exterminated by Israeli arms, Palantir remains loyal, even stubbornly so.  “We are one of the few companies in the world to stand and announce our support for Israel, which remains steadfast,” the company stated in a letter to shareholders.  With a record now well washed in blood, the company deserves a global protest movement that blocks its appeal and encourages a shareholder exodus.

The post Amoral Compass: Palantir and its Quest to Remake the World first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2023/12/29/amoral-compass-palantir-and-its-quest-to-remake-the-world/feed/ 0 448405
How Verified Accounts on X Thrive While Spreading Misinformation About the Israel-Hamas Conflict https://www.radiofree.org/2023/12/20/how-verified-accounts-on-x-thrive-while-spreading-misinformation-about-the-israel-hamas-conflict/ https://www.radiofree.org/2023/12/20/how-verified-accounts-on-x-thrive-while-spreading-misinformation-about-the-israel-hamas-conflict/#respond Wed, 20 Dec 2023 11:00:00 +0000 https://www.propublica.org/article/x-verified-accounts-misinformation-israel-hamas-conflict by Jeff Kao, ProPublica, and Priyanjana Bengani, Tow Center for Digital Journalism

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published. This story was co-published with the Tow Center for Digital Journalism at Columbia University.

“My sisters have died,” the young boy sobbed, chest heaving, as he wailed into the sky. “Oh, my sisters.” As Israel began airstrikes on Gaza following the Oct. 7 Hamas terrorist attack, posts by verified accounts on X, the social media platform formerly called Twitter, were being transmitted around the world. The heart-wrenching video of the grieving boy, viewed more than 600,000 times, was posted by an account named “#FreePalestine 🇵🇸.” The account had received X’s “verified” badge just hours before posting the tweet that went viral.

Days later, a video posted by an account calling itself “ISRAEL MOSSAD,” another “verified” account, this time bearing the logo of Israel’s national intelligence agency, claimed to show Israel’s advanced air defense technology. The post, viewed nearly 6 million times, showed a volley of rockets exploding in the night sky with the caption: “The New Iron beam in full display.”

And following an explosion on Oct. 14 outside the Al-Ahli Hospital in Gaza where civilians were killed, the verified account of the Hamas-affiliated news organization Quds News Network posted a screenshot from Facebook claiming to show the Israel Defense Forces declaring their intent to strike the hospital before the explosion. It was seen more than half a million times.

None of these posts depicted real events from the conflict. The video of the grieving boy was from at least nine years ago and was taken in Syria, not Gaza. The clip of rockets exploding was from a military simulation video game. And the Facebook screenshot was from a now-deleted Facebook page not affiliated with Israel or the IDF.

Just days before its viral tweet, the #FreePalestine 🇵🇸 account had a blue verification check under a different name: “Taliban Public Relations Department, Commentary.” It changed its name back after the tweet and was reverified within a week. Despite their blue check badges, neither Taliban Public Relations Department, Commentary nor ISRAEL MOSSAD (now “Mossad Commentary”) have any real-life connection to either organization. Their posts were eventually annotated by Community Notes, X’s crowdsourced fact-checking system, but these clarifications garnered about 900,000 views — less than 15% of what the two viral posts totaled. ISRAEL MOSSAD deleted its post in late November. The Facebook screenshot, posted by the account of the Quds News Network, still doesn’t have a clarifying note. Mossad Commentary and the Quds News Network did not respond to direct messages seeking comment; Taliban Public Relations Department, Commentary did not respond to public mentions asking for comment.

An investigation by ProPublica and Columbia University’s Tow Center for Digital Journalism shows how false claims based on out-of-context, outdated or manipulated media have proliferated on X during the first month of the Israel-Hamas conflict. The organizations looked at over 200 distinct claims that independent fact-checks determined to be misleading, and searched for posts by verified accounts that perpetuated them, identifying 2,000 total tweets. The tweets, collectively viewed half a billion times, were analyzed alongside account and Community Notes data.

ProPublica and Columbia University’s Tow Center for Digital Journalism identified more than 2,000 tweets by verified accounts that contained debunked claims based on out-of-context media. Quds News Network made five of those posts and continues to post about the conflict. Some of its English-language accounts on Facebook and Instagram have been suspended. (Screenshots of X taken and annotated by ProPublica and the Tow Center for Digital Journalism.)

The ongoing conflict in Gaza is the biggest test for changes implemented by X owner Elon Musk since his acquisition of Twitter last year. After raising concerns about the power of platforms to determine what speech is appropriate, Musk instituted policies to promote “healthy” debate under the maxim “freedom of speech, not reach,” where certain types of posts that previously would have been removed for violating platform policy now have their visibility restricted.

Within 10 days of taking ownership, Musk cut 15% of Twitter’s trust and safety team. He made further cuts in the following months, including firing the election integrity team, terminating many contracted content moderators and revoking existing misinformation policies on specific topics like COVID-19. In place of these safeguards, Musk expanded Community Notes. The feature, first launched in 2021 as Birdwatch, adds crowdsourced annotations to a tweet when users with diverse perspectives rate them “helpful.”

“The Israel-Hamas war is a classic case of an information crisis on X, in terms of the speed and volume of the misinformation and the harmful consequences of that rhetoric,” said Michael Zimmer, the director of the Center for Data, Ethics, and Society at Marquette University in Wisconsin, who has studied how social media platforms combat misinformation.

While no social media platform is free of misinformation, critics contend that Musk’s policies, along with his personal statements, have led to a proliferation of misinformation and hate speech on X. Advertisers have fled the platform — U.S. ad revenue is down roughly 60% compared to last year. Last week, Musk reinstated the account of Alex Jones, who was ordered to pay $1.1 billion in defamation damages for repeatedly lying about the 2012 Sandy Hook school shooting. Jones appealed the verdict. This week, the European Union opened a formal investigation against X for breaching multiple provisions of the Digital Services Act, including risk management and content moderation, as well as deceptive design in relation to its “so-called Blue checks.”

ProPublica and the Tow Center found that verified blue check accounts that posted misleading media saw their audience grow on X in the first month of the conflict. This included dozens of accounts that posted debunked tweets three or more times and that now have over 100,000 followers each. The false posts appear to violate X’s synthetic and manipulated media policy, which bars all users from sharing media that may deceive or confuse people. Many accounts also appear to breach the eligibility criteria for verification, which state that verified accounts must not be “misleading or deceptive” or engage in “platform manipulation and spam.” Several of the fastest-growing accounts that have posted multiple false claims about the conflict now have more followers than some regional news organizations covering it.

We also found that the Community Notes system, which has been touted by Musk as a way to improve information accuracy on the platform, hasn’t scaled sufficiently. About 80% of the 2,000 debunked posts we reviewed had no Community Note. Of the 200 debunked claims, more than 80 were never clarified with a note.

When clarifying Community Notes did appear, they typically reached a fraction of the views that the original tweet did, though views on Community Notes are significantly undercounted. We also found that in some cases, debunked images or videos were flagged by a Community Note in one tweet but not in others, despite X announcing, partway through the period covered by our dataset, it has improved its media-matching algorithms to address this. For tweets that did receive a Community Note, it typically didn’t become visible until hours after the post.

This last finding expands on a recent report by Bloomberg, which analyzed 400 false posts tagged by Community Notes in the first two weeks after the Oct. 7 attack and found it typically took seven hours for a Community Note to appear.

For the tweets analyzed by ProPublica and the Tow Center, the median time that elapsed before a Community Note became visible decreased to just over five hours in the first week of November after X improved its system. Outliers did exist: Sometimes it still took more than two days for a note to appear, while in other cases, a note appeared almost instantaneously because the tweet used media that the system had already encountered.

Multiple emails sent to X’s press inbox seeking comment on our findings triggered automated replies to “check back later” with no further response. Keith Coleman, who leads the Community Notes team at X, was separately provided with summary findings relevant to Community Notes as well as the dataset containing the compiled claims and tweets.

Via email, Coleman said that the tweets identified in this investigation were a small fraction of those covered by the 1,500 visible Community Notes on X about the conflict from this time period. He also said that many posts with high-visibility notes were deleted after receiving a Community Note, including ones that we did not identify. When asked about the number of claims that did not receive a single note, Coleman said that users might not have thought one was necessary, pointing to examples where images generated by artificial intelligence tools could be interpreted as artistic depictions. AI-generated images accounted for around 7% of the tweets that did not receive a note; none acknowledged that the media was AI-generated. Coleman said that the current system is an upgrade over X’s historic approaches to dealing with misinformation and that it continues to improve; “most importantly,” he said, the Community Notes program “is found helpful by people globally, across the political spectrum.”

Community Notes were initially meant to complement X’s various trust and safety initiatives, not replace them. “It still makes sense for platforms to keep their trust and safety teams in a breaking-news, viral environment. It’s not going to work to simply fling open the gates,” said Mike Ananny, an associate professor of communication and journalism at the University of Southern California, who is skeptical about leaving moderation to the community, particularly after the changes Musk has made.

“I’m not sure any community norm is going to work given all of the signals that have been given about who’s welcome here, what types of opinions are respected and what types of content is allowed,” he said.

ProPublica and the Tow Center compiled a large sample of data from multiple sources to study the effectiveness of Community Notes in labeling debunked claims. We found over 1,300 verified accounts that posted misleading or out-of-context media at least once in the first month of the conflict; 130 accounts did so three or more times. (For more details on how the posts were gathered, see the methodology section at the end of this story.)

Musk overhauled Twitter’s account verification program soon after acquiring the company. Previously, Twitter gave verified badges to politicians, celebrities, news organizations, government agencies and other vetted notable individuals or organizations. Though the legacy process was criticized as opaque and arbitrary, it provided a signal of authenticity for users. Today, accounts receive the once-coveted blue check in exchange for $8 a month and a cursory identity check. Despite well-documented impersonation and credibility issues, these “verified” accounts are prioritized in search, in replies and across X’s algorithmic feeds.

If an account continuously shares harmful or misleading narratives, X’s synthetic and manipulated media policy states that its visibility may be reduced or the account may be locked or suspended. But the investigation found that prominent verified accounts appeared to face few consequences for broadcasting misleading media to their large follower networks. Of the 40 accounts with more than 100,000 followers that posted debunked tweets three times or more in the first month of the conflict, only seven appeared to have had any action taken against them, according to account history data shared with ProPublica and the Tow Center by Travis Brown. Brown is a software developer who researches extremism and misinformation on X.

Those 40 accounts, a number of which have been identified as the most influential accounts engaging in Hamas-Israel discourse, grew their collective audience by nearly 5 million followers, to around 17 million, in the first month of the conflict alone.

A few of the smaller verified accounts in the dataset received punitive action: About 50 accounts that posted at least one false tweet were suspended. On average, these accounts had 7,000 followers. It is unclear whether the accounts were suspended for manipulated media policy violations or for other reasons, such as bot-like behavior. Around 80 accounts no longer have a blue check badge. It is unclear whether the accounts lost their blue checks because they stopped paying, because they had recently changed their display name (which triggers a temporary removal of the verified status), or because Twitter revoked the status. X has said it removed 3,000 accounts by “violent entities,” including Hamas, in the region.

On Oct. 29, X announced a new policy where verified accounts would no longer be eligible to share in revenue earned from ads that appeared alongside any of their posts that had been corrected by Community Notes. In a tweet, Musk said, “the idea is to maximize the incentive for accuracy over sensationalism.” Coleman said that this policy has been implemented, but did not provide further details.

False claims that go viral are frequently repeated by multiple accounts and often take the form of decontextualized old footage. One of the most widespread false claims, that Qatar was threatening to stop supplying natural gas to the world unless Israel halted its airstrikes, was repeated by nearly 70 verified accounts. This claim, which was based on a false description of an unrelated 2017 speech by the Qatari emir to bolster its credibility, received over 15 million views collectively, with a single post by Dominick McGee (@dom_lucre) amassing more than 9 million views. McGee is popular in the QAnon community and is an election denier with nearly 800,000 followers who was suspended from X for sharing child exploitation imagery in July 2023. Shortly after, X reversed the suspension. McGee denied that he had shared the image when reached by direct message on X, claiming instead that it was “an article touching it.”

Community Notes like this one appear alongside many false posts claiming Qatar is threatening to cut off its gas supply to the world. This note was seen more than 400,000 times across 159 posts that shared the same video clip, and it appeared on nine out of nearly 70 posts in our dataset that made this claim. (Screenshot of X taken and annotated by ProPublica and the Tow Center for Digital Journalism.)

Another account, using the pseudonym Sprinter, shared the same false claim about Qatar in a post that was viewed over 80,000 times. These were not the only false posts made by either account. McGee shared six debunked claims about the conflict in our dataset; Sprinter shared 20.

Sprinter posted an image of casualties from the Hamas attack on Oct. 7, most of whom were civilians, and purported that it showed Israeli military losses during the ground war later in the month. Another post mistranslated the words of an injured Israeli soldier. (Screenshots of X taken and annotated by ProPublica and the Tow Center for Digital Journalism.)

Sprinter has tweeted AI-generated images, digitally altered videos and the unsubstantiated claim that Ukraine is providing weapons to Hamas. Each of these posts has received hundreds of thousands of views. The account’s follower count has increased by 60% to about 500,000, rivaling the following of Haaretz and the Times of Israel on X. Sprinter’s profile — which has also used the pseudonyms SprinterTeam, SprinterX and WizardSX, according to historical account data provided by Brown — was “temporarily restricted” by X in mid-November, but it retained its “verified” status. Sprinter’s original profile linked to a backup account. That account — whose name and verification status continues to change — still posts dozens of times a day and has grown to over 25,000 followers. Sprinter did not respond to a request for comment and blocked the reporter after being contacted. The original account appears to no longer exist.

Verification badges were once a critical signal in sifting official accounts from inauthentic ones. But with X’s overhaul of the blue check program, that signal now essentially tells you whether the account pays $8 a month. ISRAEL MOSSAD, the account that posted video game footage falsely claiming it was an Israeli air defense system, had gone from fewer than 1,000 followers, when it first acquired a blue check in September 2023, to more than 230,000 today. In another debunked post, published the same day as the video game footage, the account claimed to show more of the Iron Beam system. That tweet still doesn’t have a Community Note, despite having nearly 400,000 views. The account briefly lost its blue check within a day of the two tweets being posted, but regained it days after changing its display name to Mossad Commentary. Even though it isn’t affiliated with Israel’s national intelligence agency, it continues to use Mossad’s logo in its profile picture.

“The blue check is flipped now. Instead of a sign of authenticity, it’s a sign of suspicion, at least for those of us who study this enough,” said Zimmer, the Marquette University professor.

Verified Accounts That Shared Misinformation Grew Quickly During the Israel-Hamas Conflict

Several of the fastest-growing accounts that have posted multiple false claims about the conflict now have more followers than some regional news organizations actively covering it.

(Lucas Waldron/ProPublica)

Of the verified accounts we reviewed, the one that grew the fastest during the first month of the Israel-Hamas conflict was also one of the most prolific posters of misleading claims. Jackson Hinkle, a 24-year-old political commentator and self-described “MAGA communist” has built a large following posting highly partisan tweets. He has been suspended from various platforms in the past, pushed pro-Russian narratives and claimed that YouTube permanently suspended his account for “Ukraine misinformation.” Three days later, he tweeted that YouTube had banned him because it didn’t want him telling the truth about the Israel-Hamas conflict. Currently, he has more than two million followers on X; over 1.5 million of those arrived after Oct. 7. ProPublica and the Tow Center found over 20 tweets by Hinkle using misleading or manipulated media in the first month of the conflict; more than half had been tagged with a Community Note. The tweets amassed 40 million views, while the Community Notes were collectively viewed just under 10 million times. Hinkle did not respond to a request for comment.

All told, debunked tweets with a Community Note in the ProPublica-Tow Center dataset amassed 300 million views in aggregate, about five times the total number of views on the notes, even though Community Notes can appear on multiple tweets and collect views from all of them, including from tweets that were not reviewed by the news organizations.

Hinkle misleadingly claimed that China was sending warships in the direction of Israel, even though the ships had been in routine operation in the region since May. Hinkle also posted footage claiming to show Hezbollah’s anti-ship missiles, but the video is from 2019 and not related to the current conflict. (Screenshots of X taken and annotated by ProPublica and the Tow Center for Digital Journalism.)

X continues to improve the Community Notes system. It announced updates to the feature on Oct. 24, saying notes are appearing more often on viral and high-visibility content, and are appearing faster in general. But ProPublica and Tow Center’s review found that less than a third of debunked tweets created since the update received a Community Note, though the median time for a note to become visible dropped noticeably, from seven hours to just over five hours in the first week of November. The Community Notes team said over email that their data showed that a note typically took around five hours to become visible in the first few days of the conflict.

Aviv Ovadya, an affiliate at Harvard's Berkman Klein Center For Internet & Society who has worked on social media governance and algorithms similar to the one Community Notes uses, says that any fact-checking process, whether it relies on crowdsourced notes or a third-party fact-checker, is likely to always be playing catch-up to viral claims. “You need to know if the claim is worth even fact-checking,” Ovadya said. “Is it worth my time?” Once a false post is identified, a third-party fact-check may take longer than a Community Note.

Coleman, who leads the Community Notes team, said over email that his team found Community Notes often appeared faster than posts by traditional fact-checkers, and that they are committed to making the notes visible faster.

Our review found that many viral tweets with claims that had been debunked by third-party fact- checkers did not receive a Community Note in the long run. Of the hundreds of tweets in the dataset that gained over 100,000 impressions, only about half had a note. Coleman noted that of those widely viewed tweets, the ones with visible Community Notes attached had nearly twice as many views.

To counter the instances where false claims spread quickly because many accounts post the same misleading media in a short time frame, the company announced in October that it would attach the same Community Note to all posts that share a debunked piece of media. ProPublica and the Tow Center found the system wasn’t always successful.

For example, on and after Oct. 25, multiple accounts tweeted an AI-generated image of a man with five children amid piles of rubble. Community Notes for this image appeared thousands of times on X. However, of the 22 instances we identified in which a verified account tweeted the image, only seven of those were tagged with a Community Note. (One of those tweets was later deleted after garnering more than 200,000 views.)

We found X’s media-matching system to be inconsistent for numerous other claims as well. Coleman pointed to the many automatic matches as a sign that it is working and said that its algorithm prioritizes “high precision” to avoid mistakenly finding matches between pieces of media that are meaningfully different. He also said the Community Notes team plans to further improve its media-matching system.

According to annotations on Community Notes on X that we found, a note for this image was displayed on at least 7,200 posts. We found 22 tweets with this image, but only seven had a Community Note. The second image has been deleted, but not before it garnered more than 200,000 views. (Screenshots of X taken and annotated by ProPublica and the Tow Center for Digital Journalism.)

The false claims ProPublica and the Tow Center identified in this analysis were also posted on other platforms, including Instagram and TikTok. On X, having a Community Note added to a post does not affect how it is displayed. Other platforms deprioritize fact-checked posts in their algorithmic feeds to limit their reach. While Ovadya believes that continued investment in Community Notes is important, he says changing X’s core algorithm could be even more impactful.

“If X’s recommendation algorithms were built on the same principles as Community Notes and was actively rewarding content that bridges divides,” he said, “you would have less misinformation and sensationalist content going viral in the first place.”

Methodology

ProPublica and Columbia University’s Tow Center for Digital Journalism identified and analyzed more than 2,000 tweets by verified accounts that posted clearly debunked images or videos in the first month of the Israel-Hamas war. The posts, which encompassed more than 200 false claims, were published by more than 1,300 verified accounts and collectively received half a billion impressions. We then looked at Community Notes and account data associated with those tweets.

Since the metrics on tweets, accounts and Community Notes were viewed at various points in time, they may not be current; for example, the status of accounts or Community Notes may have changed and the number of impressions on tweets and notes might be different after the time frame of our analysis.

In this review, we focused on claims that could be unambiguously debunked, including those based on generative AI images that aren’t labeled as such, old pictures and videos presented as current, falsified social media posts and documents, footage from video games described as real events, doctored images and mistranslated videos. To compile our list of debunked claims, we reviewed fact checks from multiple news organizations, including BBC Verify, Logically Facts, two stories from The New York Times, The Associated Press, Agence France-Presse and Reuters. We also identified debunked claims by filtering Community Notes data by relevant keywords (Gaza, Palestine/Palestinian, Israel, IDF, Hamas/Hammas, Mossad, Iron Beam, Iron Dome), and verified the note using independent news organizations or reverse image searches to ensure that each was accurate. We did not include claims that could not be independently verified or that were contested under the fog of war.

We compiled tweets using X’s text search functionality and Google’s reverse image search. Reverse image search was able to identify both images and videos (using a frame from the video). The claims and tweets we compiled are a convenience sample, not an exhaustive survey of all media-based misinformation on X during the first month of the Israel-Hamas war: The dataset relies heavily on images that Google has indexed as well as tweets that use identical or very similar language, which allows X’s search functionality to surface them. Additionally, the accounts mentioned in the story might have tweeted more false claims than those we identified. Tweets deleted prior to our searches are not captured in our dataset. (In its response, X provided us with 18 examples of Community Notes and tweets that were not in our dataset and could not be located because the tweets were not yet indexed by Google or could not be easily found by X’s search function.)

We also analyzed the accounts that were posting these tweets, using account data collected by researcher Travis Brown from July through November 2023. We used this data to determine account status, follower count, handles and usernames.

For Community Notes, we downloaded X’s open-source datasets and filtered by notes with the above-mentioned keywords. A single tweet can have multiple Community Notes and the same note can appear alongside multiple tweets. Our analysis ensured we took both relationships into account.

X’s Community Notes data contains the current status of a note as well as the time at which that status was set. It also includes when the Community Note was created and the note’s text. For some tweets that use repurposed media (i.e. media from a tweet that’s already been debunked by Community Notes) the note appears immediately due to improvements in X’s media-matching algorithm. This means that occasionally the time of creation or visibility of a note will be before the time the tweet was posted.

Do You Have a Tip for ProPublica? Help Us Do Journalism.

Elizabeth Yaboni of the Tow Center for Digital Journalism contributed research.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Jeff Kao, ProPublica, and Priyanjana Bengani, Tow Center for Digital Journalism.

]]>
https://www.radiofree.org/2023/12/20/how-verified-accounts-on-x-thrive-while-spreading-misinformation-about-the-israel-hamas-conflict/feed/ 0 449528
How to Authenticate Large Datasets https://www.radiofree.org/2023/12/16/how-to-authenticate-large-datasets/ https://www.radiofree.org/2023/12/16/how-to-authenticate-large-datasets/#respond Sat, 16 Dec 2023 11:00:00 +0000 https://theintercept.com/?p=455145

Unlike any other point in history, hackers, whistleblowers, and archivists now routinely make off with terabytes of data from governments, corporations, and extremist groups. These datasets often contain gold mines of revelations in the public interest and in many cases are freely available for anyone to download. 

Revelations based on leaked datasets can change the course of history. In 1971, Daniel Ellsberg’s leak of military documents known as the Pentagon Papers led to the end of the Vietnam War. The same year, an underground activist group called the Citizens’ Commission to Investigate the FBI broke into a Federal Bureau of Investigation field office, stole secret documents, and leaked them to the media. This dataset mentioned COINTELPRO. NBC reporter Carl Stern used Freedom of Information Act requests to publicly reveal that COINTELPRO was a secret FBI operation devoted to surveilling, infiltrating, and discrediting left-wing political groups. This stolen FBI dataset also led to the creation of the Church Committee, a Senate committee that investigated these abuses and reined them in. 

Huge data leaks like these used to be rare, but today they’re increasingly common. More recently, Chelsea Manning’s 2010 leaks of Iraq and Afghanistan documents helped spark the Arab Spring, documents and emails stolen by Russian military hackers helped elect Donald Trump as U.S. president in 2016, and the Panama Papers and Paradise Papers exposed how the rich and powerful use offshore shell companies for tax evasion.

Yet these digital tomes can prove extremely difficult to analyze or interpret, and few people today have the skills to do so. I spent the last two years writing the book “Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data” to teach journalists, researchers, and activists the technologies and coding skills required to do just this. While these topics are technical, my book doesn’t assume any prior knowledge: all you need is a computer, an internet connection, and the will to learn. Throughout the book, you’ll download and analyze real datasets — including those from police departments, fascist groups, militias, a Russian ransomware gang, and social networks — as practice. Throughout, you’ll engage head-on with the dumpster fire that is 21st-century current events: the rise of neofascism and the rejection of objective reality, the extreme partisan divide, and an internet overflowing with misinformation.

My book officially comes out January 9, but it’s shipping today if you order it from the publisher here. Add the code INTERCEPT25 for a special 25 percent discount.

The following is a lightly edited excerpt from the first chapter of “Hacks, Leaks, and Revelations” about a crucial and often underappreciated part of working with leaked data: how to verify that it’s authentic.

Photo: Micah Lee

You can’t believe everything you read on the internet, and juicy documents or datasets that anonymous people send you are no exception. Disinformation is prevalent.

How you go about verifying that a dataset is authentic completely depends on what the data is. You have to approach the problem on a case-by-case basis. The best way to verify a dataset is to use open source intelligence (OSINT), or publicly available information that anyone with enough skill can find. 

This might mean scouring social media accounts, consulting the Internet Archive’s Wayback Machine, inspecting metadata of public images or documents, paying services for historical domain name registration data, or viewing other types of public records. If your dataset includes a database taken from a website, for instance, you might be able to compare information in that database with publicly available information on the website itself to confirm that they match. (Michael Bazzell also has great resources on the tools and techniques of OSINT.)

Below, I share two examples of authenticating data from my own experience: one about a dataset from the anti-vaccine group America’s Frontline Doctors, and another about leaked chat logs from a WikiLeaks Twitter group. 

In my work at The Intercept, I encounter datasets so frequently I feel like I’m drowning in data, and I simply ignore most of them because it’s impossible for me to investigate them all. Unfortunately, this often means that no one will report on them, and their secrets will remain hidden forever. I hope “Hacks, Leaks, and Revelations” helps to change that. 

The America’s Frontline Doctors Dataset

In late 2021, in the midst of the Covid-19 pandemic, an anonymous hacker sent me hundreds of thousands of patient and prescription records from telehealth companies working with America’s Frontline Doctors (AFLDS). AFLDS is a far-right anti-vaccine group that misleads people about Covid-19 vaccine safety and tricks patients into paying millions of dollars for drugs like ivermectin and hydroxychloroquine, which are ineffective at preventing or treating the virus. The group was initially formed to help Donald Trump’s 2020 reelection campaign, and the group’s leader, Simone Gold, was arrested for storming the U.S. Capitol on January 6, 2021. In 2022, she served two months in prison for her role in the attack.

My source told me that they got the data by writing a program that made thousands of web requests to a website run by one of the telehealth companies, Cadence Health. Each request returned data about a different patient. To see whether that was true, I made an account on the Cadence Health website myself. Everything looked legitimate to me. The information I had about each of the 255,000 patients was the exact information I was asked to provide when I created my account on the service, and various category names and IDs in the dataset matched what I could see on the website. But how could I be confident that the patient data itself was real, that these people weren’t just made up?

I wrote a simple Python script to loop through the 72,000 patients (those who had paid for fake health care) and put each of their email addresses in a text file. I then cross-referenced these email addresses with a totally separate dataset containing personal identifying information from members of Gab, a social network popular among fascists, anti-democracy activists, and anti-vaxxers. In early 2021, a hacktivist who went by the name “JaXpArO and My Little Anonymous Revival Project” had hacked Gab and made off with 65GB of data, including about 38,000 Gab users’ email addresses. Thinking there might be overlap between AFLDS and Gab users, I wrote another simple Python program that compared the email addresses from each group and showed me all of the addresses that were in both lists. There were several.

Armed with this information, I started scouring the public Gab timelines of users whose email addresses had appeared in both datasets, looking for posts about AFLDS. Using this technique, I found multiple AFLDS patients who posted about their experience on Gab, leading me to believe that the data was authentic. For example, according to consultation notes from the hacked dataset, one patient created an account on the telehealth site and four days later had a telehealth consultation. About a month after that, they posted to Gab saying, “Front line doctors finally came through with HCQ/Zinc delivery” (HCQ is an abbreviation for hydroxychloroquine).

Having a number of examples like this gave us confidence that the dataset of patient records was, in fact, legitimate. You can read our AFLDS reporting at The Intercept — which led to a congressional investigation into the group — here.

The WikiLeaks Twitter Group Chat

In late 2017, journalist Julia Ioffe published a revelation in The Atlantic: WikiLeaks had slid into Donald Trump Jr.’s Twitter DMs. Among other things, before the 2016 election, WikiLeaks suggested to Trump Jr. that even if his father lost the election, he shouldn’t concede. “Hi Don,” the verified @wikileaks Twitter account wrote, “if your father ‘loses’ we think it is much more interesting if he DOES NOT conceed [sic] and spends time CHALLENGING the media and other types of rigging that occurred—as he has implied that he might do.”

A long-term WikiLeaks volunteer who went by the pseudonym Hazelpress started a private Twitter group with WikiLeaks and its biggest supporters in mid-2015. After watching the group become more right-wing, conspiratorial, and unethical, and specifically after learning about WikiLeaks’ secret DMs with Trump Jr., Hazelpress decided to blow the whistle on the whistleblowing group itself. She has since publicly come forward as Mary-Emma Holly, an artist who spent years as a volunteer legal researcher for WikiLeaks.

To carry out the WikiLeaks leak, Holly logged in to her Twitter account, made it private, unfollowed everyone, and deleted all of her tweets. She also deleted all of her DMs except for the private WikiLeaks Twitter group and changed her Twitter username. Using the Firefox web browser, she then went to the DM conversation — which contained 11,000 messages and had been going on for two-and-a-half years — and saw the latest messages in the group. She scrolled up, waited for Twitter to load more messages, scrolled up again, and kept doing this for four hours until she reached the very first message in the group. She then used Firefox’s Save Page As function to save an HTML version of the webpage, as well as a folder full of resources like images that were posted in the group.

Now that she had a local, offline copy of all the messages in the DM group, Holly leaked it to the media. In early 2018, she sent a Signal message to the phone number listed on The Intercept’s tips page. At that time, I happened to be the one checking Signal for incoming tips. Using OnionShare — software that I developed for this purpose — she sent me an encrypted and compressed file, along with the password to decrypt it. After extracting it, I found a 37MB HTML file — so big that it made my web browser unresponsive when I tried opening it and which I later split into separate files to make it easier to work with — and a folder with 82MB of resources.

How could I verify the authenticity of such a huge HTML file? If I could somehow access the same data directly from Twitter’s servers, that would do it; only an insider at Twitter would be in a position to create fake DMs that show up on Twitter’s website, and even that would be extremely challenging. When I explained this to Holly (who, at the time, I still knew only as Hazelpress), she gave me her Twitter username and password. She had already deleted all the other information from that account. With her consent, I logged in to Twitter with her credentials, went to her DMs, and found the Twitter group in question. It immediately looked like it contained the same messages as the HTML file, and I confirmed that the verified account @wikileaks frequently posted to the group.

Following these steps made me extremely confident in the authenticity of the dataset, but I decided to take verification one step further. Could I download a separate copy of the Twitter group myself in order to compare it with the version Holly had sent me? I searched around and found DMArchiver, a Python program that could do just that. Using this program, along with Holly’s username and password, I downloaded a text version of all of the DMs in the Twitter group. It took only a few minutes to run this tool, rather than four hours of scrolling up in a web browser.

Note: After this investigation, the DMArchiver program stopped working due to changes on Twitter’s end, and today the project is abandoned. However, if you’re faced with a similar challenge in a future investigation, search for a tool that might work for you. 

The output from DMArchiver, a 1.7MB text file, was much easier to work with compared to the enormous HTML file, and it also included exact time stamps. Here’s a snippet of the text version:

[2015-11-19 13:46:39] <WikiLeaks> We believe it would be much better for GOP to win.

[2015-11-19 13:47:28] <WikiLeaks> Dems+Media+liberals woudl then form a block to reign in their worst qualities.

[2015-11-19 13:48:22] <WikiLeaks> With Hillary in charge, GOP will be pushing for her worst qualities., dems+media+neoliberals will be mute.

[2015-11-19 13:50:18] <WikiLeaks> She’s a bright, well connected, sadistic sociopath.

I could view the HTML version in a web browser to see it exactly as it had originally looked on Twitter, which was also useful for taking screenshots to include in our final report.

A screenshot of the leaked HTML file.

Along with the talented reporter Cora Currier, I started the long process of reading all 11,000 chat messages, paying closest attention to the 10 percent of them from the @wikileaks account — which was presumably controlled by Julian Assange, WikiLeaks’s editor — and picking out everything in the public interest. We discovered the following details:

  • Assange expressed a desire for Republicans to win the 2016 presidential election.
  • Assange and his supporters were intensely focused on discrediting two Swedish women who had accused him of rape and molestation, as well as discrediting their lawyers. Assange and his defenders spent weeks discussing ways to sabotage articles about his rape case that feminist journalists were writing.
  • After Associated Press journalist Raphael Satter wrote a story about harm caused when WikiLeaks publishes personal identifiable information, Assange called him a “rat” and said that “he’s Jewish and engaged in the ((())) issue,” referring to an antisemitic neo-Nazi meme. He then told his supporters to “bog him down. Get him to show his bias.”

You can read our reporting on this dataset at The Intercept. After The Intercept published this article, Assange and his supporters also targeted me personally with antisemitic abuse, and Russia Today, the state-run TV station, ran a segment about me. 

The techniques you can use to authenticate datasets vary greatly depending on the situation. Sometimes you can rely on OSINT, sometimes you can rely on help from your source, and sometimes you’ll need to come up with an entirely different method.

Regardless, it’s important to explain in your published report, at least briefly, what makes you confident in the data. If you can’t authenticate it but still want to publish your report in case it’s real — or in case others can authenticate it — make that clear. When in doubt, err on the side of transparency.

My book, “Hacks, Leaks, and Revelations,” officially comes out on January 9, but it’s shipping today if you order it from the publisher here. Add the code INTERCEPT25 for a special 25 percent discount.

Join The Conversation


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2023/12/16/how-to-authenticate-large-datasets/feed/ 0 446277
Sen. Elizabeth Warren Questions Meta Over Palestinian Censorship https://www.radiofree.org/2023/12/14/sen-elizabeth-warren-questions-meta-over-palestinian-censorship/ https://www.radiofree.org/2023/12/14/sen-elizabeth-warren-questions-meta-over-palestinian-censorship/#respond Thu, 14 Dec 2023 18:00:00 +0000 https://theintercept.com/?p=454975

In a letter sent Thursday to Meta chief executive Mark Zuckerberg, Sen. Elizabeth Warren, D-Mass., calls on the Facebook and Instagram owner to disclose unreleased details about wartime content moderation practices that have “exacerbated violence and failed to combat hate speech,” citing recent reporting by The Intercept.

“Amidst the horrific Hamas terrorist attacks in Israel, a humanitarian catastrophe including the deaths of thousands of civilians in Gaza, and the killing of dozens of journalists, it is more important than ever that social media platforms do not censor truthful and legitimate content, particularly as people around the world turn to online communities to share and find information about developments in the region,” the letter reads, according to a copy shared with The Intercept.

Since Hamas’s October 7 attack, social media users around the world have reported the inexplicable disappearance of posts, comments, hashtags, and entire accounts — even though they did not seem to violate any rules. Uneven enforcement of rules generally, and Palestinian censorship specifically, have proven perennial problems for Meta, which owns Facebook and Instagram, and the company has routinely blamed erratic rule enforcement on human error and technical glitches, while vowing to improve.

Following a string of 2021 Israeli raids at the Al-Aqsa Mosque in occupied East Jerusalem, Instagram temporarily censored posts about the holy site on the grounds that it was associated with terrorism. A third-party audit of the company’s speech policies in Israel and Palestine conducted last year found that “Meta’s actions in May 2021 appear to have had an adverse human rights impact … on the rights of Palestinian users to freedom of expression, freedom of assembly, political participation, and non-discrimination, and therefore on the ability of Palestinians to share information and insights about their experiences as they occurred.”

Users affected by these moderation decisions, meanwhile, are left with little to no recourse, and often have no idea why their posts were censored in the first place. Meta’s increased reliance on opaque, automated content moderation algorithms has only exacerbated the company’s lack of transparency around speech policy, and has done little to allay allegations that the company’s systems are structurally biased against certain groups.

The letter references recent articles by The Intercept, the Wall Street Journal, and other outlets’ reporting on the widespread, unexplained censorship of Palestinians and the broader discussion of Israel’s ongoing bombardment of Gaza. Last month, for instance, The Intercept reported that Instagram users leaving Palestinian flag emojis in post comments had seen those comments quickly hidden; Facebook later told The Intercept it was hiding these emojis in contexts it deemed “potentially offensive.”

“Social media users deserve to know when and why their accounts and posts are restricted, particularly on the largest platforms where vital information-sharing occurs.”

These “reports of Meta’s suppression of Palestinian voices raise serious questions about Meta’s content moderation practices and anti-discrimination protections,” Warren writes. “Social media users deserve to know when and why their accounts and posts are restricted, particularly on the largest platforms where vital information-sharing occurs. Users also deserve protection against discrimination based on their national origin, religion, and other protected characteristics.” Outside of its generalized annual reports, Meta typically shares precious little about how it enforces its rules in specific instances, or how its policies are determined behind closed doors. This general secrecy around the company’s speech rules mean that users are often in the dark about whether a given post will be allowed — especially if it even mentions a U.S.-designated terror organization like Hamas — until it’s too late.

To resolve this, and “[i]n order to further understand what legislative action might be necessary to address these issues,” Warren’s letter includes a litany of specific questions about how Meta treats content pertaining to the war, and to what extent it has enforced its speech rules depending on who’s speaking. “How many Arabic language posts originating from Palestine have been removed [since October 7]?” the letter asks. “What percentage of total Arabic language posts originating from Palestine does the above number represent?” The letter further asks Meta to divulge removal statistics since the war began (“How often did Meta limit the reachability of posts globally while notifying the user?”) and granular details of its enforcement system (“What was the average response time for a user appeal of a content moderation decision for Arabic language posts originating from Palestine?”).

The letter asks Meta to respond to Warren’s dozens of questions by January 5, 2024.

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/12/14/sen-elizabeth-warren-questions-meta-over-palestinian-censorship/feed/ 0 445795
High-Tech Entrapments https://www.radiofree.org/2023/12/12/high-tech-entrapments/ https://www.radiofree.org/2023/12/12/high-tech-entrapments/#respond Tue, 12 Dec 2023 15:31:56 +0000 https://dissidentvoice.org/?p=146521 How does one escape high-tech entrapments, and how does one provide evidence of escaping such entrapment?

The post High-Tech Entrapments first appeared on Dissident Voice.]]>

The post High-Tech Entrapments first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2023/12/12/high-tech-entrapments/feed/ 0 445180
Myanmar: Technology key to aid war crimes investigations https://www.radiofree.org/2023/12/04/myanmar-technology-key-to-aid-war-crimes-investigations/ https://www.radiofree.org/2023/12/04/myanmar-technology-key-to-aid-war-crimes-investigations/#respond Mon, 04 Dec 2023 19:58:17 +0000 https://news.un.org/en/audio/2023/12/1144347 Being denied access to sites where some of the most horrific crimes and human rights violations are alleged to have taken place during the military’s brutal repression of dissent, is a major challenge for the IIMM, the UN-appointed Independent Investigative Mechanism for Myanmar.

But the investigation team has nonetheless been able to interview victims and witnesses outside the country and sift through a vast amount of useful data that has laid at least the groundwork for future prosecutions, says the IIIMM head, Nicholas Koumjian.

He explained to UN News’s Vibhu Mishra how the UN Human Rights Council-mandated independent investigators go about their work, and what they hope to achieve.


This content originally appeared on UN News - Global perspective Human stories and was authored by Vibhu Mishra/UN News.

]]>
https://www.radiofree.org/2023/12/04/myanmar-technology-key-to-aid-war-crimes-investigations/feed/ 0 443608
Myanmar: Technology key to aid war crimes investigations https://www.radiofree.org/2023/12/04/myanmar-technology-key-to-aid-war-crimes-investigations-2/ https://www.radiofree.org/2023/12/04/myanmar-technology-key-to-aid-war-crimes-investigations-2/#respond Mon, 04 Dec 2023 19:58:17 +0000 http://www.radiofree.org/?guid=258a32d7614bdc6af5f40f3526365fd2
This content originally appeared on UN News - Global perspective Human stories and was authored by Vibhu Mishra/UN News.

]]>
https://www.radiofree.org/2023/12/04/myanmar-technology-key-to-aid-war-crimes-investigations-2/feed/ 0 448306
AI Technology Threatens Educational Equity for Marginalized Students https://www.radiofree.org/2023/11/25/ai-technology-threatens-educational-equity-for-marginalized-students/ https://www.radiofree.org/2023/11/25/ai-technology-threatens-educational-equity-for-marginalized-students/#respond Sat, 25 Nov 2023 14:00:00 +0000 https://progressive.org/public-schools-advocate/ai-educational-equity-for-marginalized-students-tanksley-20231125/
This content originally appeared on The Progressive — A voice for peace, social justice, and the common good and was authored by Tiera Tanksley.

]]>
https://www.radiofree.org/2023/11/25/ai-technology-threatens-educational-equity-for-marginalized-students/feed/ 0 441713
Facebook Approved an Israeli Ad Calling for Assassination of Pro-Palestine Activist https://www.radiofree.org/2023/11/21/facebook-approved-an-israeli-ad-calling-for-assassination-of-pro-palestine-activist/ https://www.radiofree.org/2023/11/21/facebook-approved-an-israeli-ad-calling-for-assassination-of-pro-palestine-activist/#respond Tue, 21 Nov 2023 18:10:11 +0000 https://theintercept.com/?p=452299

A series of advertisements dehumanizing and calling for violence against Palestinians, intended to test Facebook’s content moderation standards, were all approved by the social network, according to materials shared with The Intercept.

The submitted ads, in both Hebrew and Arabic, included flagrant violations of policies for Facebook and its parent company Meta. Some contained violent content directly calling for the murder of Palestinian civilians, like ads demanding a “holocaust for the Palestinians” and to wipe out “Gazan women and children and the elderly.” Other posts, like those describing kids from Gaza as “future terrorists” and a reference to “Arab pigs,” contained dehumanizing language.

“The approval of these ads is just the latest in a series of Meta’s failures towards the Palestinian people.”

“The approval of these ads is just the latest in a series of Meta’s failures towards the Palestinian people,” Nadim Nashif, founder of the Palestinian social media research and advocacy group 7amleh, which submitted the test ads, told The Intercept. “Throughout this crisis, we have seen a continued pattern of Meta’s clear bias and discrimination against Palestinians.”

7amleh’s idea to test Facebook’s machine-learning censorship apparatus arose last month, when Nashif discovered an ad on his Facebook feed explicitly calling for the assassination of American activist Paul Larudee, a co-founder of the Free Gaza Movement. Facebook’s automatic translation of the text ad read: “It’s time to assassinate Paul Larudi [sic], the anti-Semitic and ‘human rights’ terrorist from the United States.” Nashif reported the ad to Facebook, and it was taken down.

The ad had been placed by Ad Kan, a right-wing Israeli group founded by former Israel Defense Force and intelligence officers to combat “anti-Israeli organizations” whose funding comes from purportedly antisemitic sources, according to its website. (Neither Larudee nor Ad Kan immediately responded to requests for comment.)

Calling for the assassination of a political activist is a violation of Facebook’s advertising rules. That the post sponsored by Ad Kan appeared on the platform indicates Facebook approved it despite those rules. The ad likely passed through filtering by Facebook’s automated process, based on machine-learning, that allows its global advertising business to operate at a rapid clip.

“Our ad review system is designed to review all ads before they go live,” according to a Facebook ad policy overview. As Meta’s human-based moderation, which historically relied almost entirely on outsourced contractor labor, has drawn greater scrutiny and criticism, the company has come to lean more heavily on automated text-scanning software to enforce its speech rules and censorship policies.

While these technologies allow the company to skirt the labor issues associated with human moderators, they also obscure how moderation decisions are made behind secret algorithms.

Last year, an external audit commissioned by Meta found that while the company was routinely using algorithmic censorship to delete Arabic posts, the company had no equivalent algorithm in place to detect “Hebrew hostile speech” like racist rhetoric and violent incitement. Following the audit, Meta claimed it had “launched a Hebrew ‘hostile speech’ classifier to help us proactively detect more violating Hebrew content.” Content, that is, like an ad espousing murder.

Incitement to Violence on Facebook

Amid the Israeli war on Palestinians in Gaza, Nashif was troubled enough by the explicit call in the ad to murder Larudee that he worried similar paid posts might contribute to violence against Palestinians.

Large-scale incitement to violence jumping from social media into the real world is not a mere hypothetical: In 2018, United Nations investigators found violently inflammatory Facebook posts played a “determining role” in Myanmar’s Rohingya genocide. (Last year, another group ran test ads inciting against Rohingya, a project along the same lines as 7amleh’s experiment; in that case, all the ads were also approved.)

The quick removal of the Larudee post didn’t explain how the ad was approved in the first place. In light of assurances from Facebook that safeguards were in place, Nashif and 7amleh, which formally partners with Meta on censorship and free expression issues, were puzzled.

“Meta has a track record of not doing enough to protect marginalized communities.”

Curious if the approval was a fluke, 7amleh created and submitted 19 ads, in both Hebrew and Arabic, with text deliberately, flagrantly violating company rules — a test for Meta and Facebook. 7amleh’s ads were designed to test the approval process and see whether Meta’s ability to automatically screen violent and racist incitement had gotten better, even with unambiguous examples of violent incitement.

“We knew from the example of what happened to the Rohingya in Myanmar that Meta has a track record of not doing enough to protect marginalized communities,” Nashif said, “and that their ads manager system was particularly vulnerable.”

Meta’s appears to have failed 7amleh’s test.

The company’s Community Standards rulebook — which ads are supposed to comply with to be approved — prohibit not just text advocating for violence, but also any dehumanizing statements against people based on their race, ethnicity, religion, or nationality. Despite this, confirmation emails shared with The Intercept show Facebook approved every single ad.

Though 7amleh told The Intercept the organization had no intention to actually run these ads and was going to pull them before they were scheduled to appear, it believes their approval demonstrates the social platform remains fundamentally myopic around non-English speech — languages used by a great majority of its over 4 billion users. (Meta retroactively rejected 7amleh’s Hebrew ads after The Intercept brought them to the company’s attention, but the Arabic versions remain approved within Facebook’s ad system.)

Facebook spokesperson Erin McPike confirmed the ads had been approved accidentally. “Despite our ongoing investments, we know that there will be examples of things we miss or we take down in error, as both machines and people make mistakes,” she said. “That’s why ads can be reviewed multiple times, including once they go live.”

Just days after its own experimental ads were approved, 7amleh discovered an Arabic ad run by a group calling itself “Migrate Now” calling on “Arabs in Judea and Sumaria” — the name Israelis, particularly settlers, use to refer to the occupied Palestinian West Bank — to relocate to Jordan.

According to Facebook documentation, automated, software-based screening is the “primary method” used to approve or deny ads. But it’s unclear if the “hostile speech” algorithms used to detect violent or racist posts are also used in the ad approval process. In its official response to last year’s audit, Facebook said its new Hebrew-language classifier would “significantly improve” its ability to handle “major spikes in violating content,” such as around flare-ups of conflict between Israel and Palestine. Based on 7amleh’s experiment, however, this classifier either doesn’t work very well or is for some reason not being used to screen advertisements. (McPike did not answer when asked if the approval of 7amleh’s ads reflected an underlying issue with the hostile speech classifier.)

Either way, according to Nashif, the fact that these ads were approved points to an overall problem: Meta claims it can effectively use machine learning to deter explicit incitement to violence, while it clearly cannot.

“We know that Meta’s Hebrew classifiers are not operating effectively, and we have not seen the company respond to almost any of our concerns,” Nashif said in his statement. “Due to this lack of action, we feel that Meta may hold at least partial responsibility for some of the harm and violence Palestinians are suffering on the ground.”

The approval of the Arabic versions of the ads come as a particular surprise following a recent report by the Wall Street Journal that Meta had lowered the level of certainty its algorithmic censorship system needed to remove Arabic posts — from 80 percent confidence that the post broke the rules, to just 25 percent. In other words, Meta was less sure that the Arabic posts it was suppressing or deleting actually contained policy violations.

Nashif said, “There have been sustained actions resulting in the silencing of Palestinian voices.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/11/21/facebook-approved-an-israeli-ad-calling-for-assassination-of-pro-palestine-activist/feed/ 0 440950
Online Atrocity Database Exposed Thousands of Vulnerable People in Congo https://www.radiofree.org/2023/11/17/online-atrocity-database-exposed-thousands-of-vulnerable-people-in-congo/ https://www.radiofree.org/2023/11/17/online-atrocity-database-exposed-thousands-of-vulnerable-people-in-congo/#respond Fri, 17 Nov 2023 19:54:46 +0000 https://theintercept.com/?p=451664

A joint project of Human Rights Watch and New York University to document human rights abuses in the Democratic Republic of the Congo has been taken offline after exposing the identities of thousands of vulnerable people, including survivors of mass killings and sexual assaults.

The Kivu Security Tracker is a “data-centric crisis map” of atrocities in eastern Congo that has been used by policymakers, academics, journalists, and activists to “better understand trends, causes of insecurity and serious violations of international human rights and humanitarian law,” according to the deactivated site. This includes massacres, murders, rapes, and violence against activists and medical personnel by state security forces and armed groups, the site said.

But the KST’s lax security protocols appear to have accidentally doxxed up to 8,000 people, including activists, sexual assault survivors, United Nations staff, Congolese government officials, local journalists, and victims of attacks, an Intercept analysis found. Hundreds of documents — including 165 spreadsheets — that were on a public server contained the names, locations, phone numbers, and organizational affiliations of those sources, as well as sensitive information about some 17,000 “security incidents,” such as mass killings, torture, and attacks on peaceful protesters.

The data was available via KST’s main website, and anyone with an internet connection could access it. The information appears to have been publicly available on the internet for more than four years.

Experts told The Intercept that a leak of this magnitude would constitute one of the most egregious instances ever of the online exposure of personal data from a vulnerable, conflict-affected population.

“This was a serious violation of research ethics and privacy by KST and its sponsoring organizations,” said Daniel Fahey, former coordinator of the United Nations Security Council’s Group of Experts on the Democratic Republic of the Congo, after he was told about the error. “KST’s failure to secure its data poses serious risks to every person and entity listed in the database. The database puts thousands of people and hundreds of organizations at risk of retaliatory violence, harassment, and reputational damage.”

“If you’re trying to protect people but you’re doing more harm than good, then you shouldn’t be doing the work in the first place.”

“If you’re an NGO working in conflict zones with high-risk individuals and you’re not managing their data right, you’re putting the very people that you are trying to protect at risk of death,” said Adrien Ogée, the chief operations officer at the CyberPeace Institute, which provides cybersecurity assistance and threat detection and analysis to humanitarian nongovernmental organizations. Speaking generally about lax security protocols, Ogée added, “If you’re trying to protect people but you’re doing more harm than good, then you shouldn’t be doing the work in the first place.”

The dangers extend to what the database refers to as Congolese “focal points” who conducted field interviews and gathered information for the KST. “The level of risk that local KST staff have been exposed to is hard to describe,” said a researcher close to the project who asked not to be identified because they feared professional reprisal. “It’s unbelievable that a serious human rights or conflict research organization could ever throw their staff in the lion’s den just like that. Militias wanting to take revenge, governments of repressive neighboring states, ill-tempered security services — the list of the dangers that this exposes them to is very long.”

The spreadsheets, along with the main KST website, were taken offline on October 28, after investigative journalist Robert Flummerfelt, one of the authors of this story, discovered the leak and informed Human Rights Watch and New York University’s Center on International Cooperation. HRW subsequently assembled what one source close to the project described as a “crisis team.”

Last week, HRW and NYU’s Congo Research Group, the entity within the Center on International Cooperation that maintains the KST website, issued a statement that announced the takedown and referred in vague terms to “a security vulnerability in its database,” adding, “Our organizations are reviewing the security and privacy of our data and website, including how we gather and store information and our research methodology.” The statement made no mention of publicly exposing the identities of sources who provided information on a confidential basis.

In an internal statement sent to HRW employees on November 9 and obtained by The Intercept, Sari Bashi, the organization’s program director, informed staff of “a security vulnerability with respect to the KST database which contains personal data, such as the names and phone numbers of sources who provided information to KST researchers and some details of the incidents they reported.” She added that HRW had “convened a team to manage this incident,” including senior leadership, security and communications staff, and the organization’s general counsel.

The internal statement also noted that one of HRW’s partners in managing the KST had “hired a third-party cyber security company to investigate the extent of the exposure of the confidential data and to help us to better understand the potential implications.” 

“We are still discussing with our partner organizations the steps needed to fulfill our responsibilities to KST sources in the DRC whose personal information was compromised,” reads the statement, noting that HRW is working with staff in Congo to “understand, prepare for, and respond to any increase in security risks that may arise from this situation.” HRW directed staffers not to post on social media about the leak or publicly share any press stories about it due to “the very sensitive nature of the data and the possible security risks.”

The internal statement also said that “neither HRW, our partners, nor KST researchers in the DRC have received any information to suggest that anybody has been threatened or harmed as a result of this database vulnerability.”

The Intercept has not found any instances of individuals affected by the security failures, but it’s currently unknown if any of the thousands of people involved were harmed. 

“We deeply regret the security vulnerability in the KST database and share concerns about the wider security implications,” Human Rights Watch’s chief communications officer, Mei Fong, told The Intercept. Fong said in an email that the organization is “treating the data vulnerability in the KST database, and concerns around research methodology on the KST project, with the utmost seriousness.” Fong added, “Human Rights Watch did not set up or manage the KST website. We are working with our partners to support an investigation to establish how many people — other than the limited number we are so far aware of — may have accessed the KST data, what risks this may pose to others, and next steps. The security and confidentiality of those affected is our primary concern.” 

A peacekeeper of the United Nations Organization Stabilization Mission in the Democratic Republic of the Congo (MONUSCO) looks on at the force's base during a field training exercise in Sake, eastern Democratic Republic of Congo, November 06, 2023. UN peacekeepers in the Democratic Republic of Congo announced a joint operation with the national army on November 3, 2023 designed to stop M23 rebels from capturing key eastern cities. The announcement follows a surge in clashes with the M23 group since last month, which has forced 200,000 people from their homes according to the UN, after a period of relative calm. (Photo by Glody MURHABAZI / AFP) (Photo by GLODY MURHABAZI/AFP via Getty Images)

A peacekeeper of the United Nations Organization Stabilization Mission in the Democratic Republic of the Congo looks on in Sake, Democratic Republic of the Congo, on Nov. 6, 2023.

Photo: Glody Murhabzi/AFP via Getty Images

Bridgeway Foundation

Two sources associated with the KST told The Intercept that, internally, KST staff are blaming the security lapse on the Bridgeway Foundation, one of the donors that helped conceive and fund the KST and has publicly taken credit for being a “founding partner” of the project.

Bridgeway is the philanthropic wing of a Texas-based investment firm. Best known for its support for the “Kony 2012” campaign, the organization was involved in what a U.S. Army Special Operations Command’s historian called “intense activism and lobbying” that paved the way for U.S. military intervention in Central Africa. Those efforts by Bridgeway and others helped facilitate a failed $780 million U.S. military effort to hunt down Joseph Kony, the leader of a Ugandan armed group known as the Lord’s Resistance Army, or LRA.

More recently, the foundation was accused of partnering with Uganda’s security forces in an effort to drag the United States into “another dangerous quagmire” in Congo. “Why,” asked Helen Epstein in a 2021 investigation for The Nation, “is Bridgeway, a foundation that claims to be working to end crimes against humanity, involved with one of Africa’s most ruthless security agencies?”

One Congo expert said that Bridgeway has played the role of a “humanitarian privateer” for the U.S. government and employed tactics such as “private intelligence and military training.” As part of Bridgeway’s efforts to track down Kony, it helped create the LRA Crisis Tracker, a platform nearly identical to the KST that tracks attacks by the Ugandan militia. After taking an interest in armed groups in Congo, Bridgeway quietly pushed for the creation of a similar platform for Congo, partnering with NYU and HRW to launch the KST in 2017.

While NYU’s Congo Research Group oversaw the “collection and triangulation of data” for the KST, and HRW provided training and other support to KST researchers, the Bridgeway Foundation offered “technical and financial support,” according to a 2022 report by top foundation personnel, including Tara Candland, Bridgeway’s vice president of research and analysis, and Laren Poole, its chief operations officer. In a report published earlier this year, Poole and others wrote that the foundation had “no role in the incident tracking process.” 

Several sources with ties to KST staff told The Intercept that Bridgeway was responsible for contracting the companies that designed the KST website and data collection system, including a tech company called Semantic AI. Semantic’s website mentions a partnership with Bridgeway to analyze violence in Congo, referring to their product as “intelligence software” that “allows Bridgeway and their partners to take action to protect the region.” The case study adds that the KST platform helps Bridgeway “track, analyze, and counter” armed groups in Congo.

Poole said that the KST had hired a cybersecurity firm to conduct a “comprehensive security assessment of the servers and hosting environment with the goal of better understanding the nature and extent of the exposure.” But it appears that answers to the most basic questions are not yet known. “We cannot currently determine when the security vulnerability occurred or how long the data was exposed,” Poole told The Intercept via email. “As recently as last year, an audit of the site was conducted that included assessing security threats, and this vulnerability was not identified.”

Like HRW, Bridgeway disclaimed direct responsibility for management of the KST’s website, attributing that work to two web development firms, Fifty and Fifty, which built and managed the KST from its inception until 2022, and Boldcode. That year, Poole said, “Boldcode was contracted to assume management and security responsibilities of the site.” But Poole said that “KST project leadership has had oversight over firms contracted for website development and maintenance since its inception.”

The Intercept did not receive a response to multiple messages sent to Fifty and Fifty. Boldcode did not immediately respond to a request for comment.

Warnings of Harm

Experts have been sounding the alarm about the dangers of humanitarian data leaks for years. “Critical incidents – such as breaches of platforms and networks, weaponisation of humanitarian data to aid attacks on vulnerable populations, and exploitation of humanitarian systems against responders and beneficiaries – may already be occurring and causing grievous harm without public accountability,” wrote a trio of researchers from the Signal Program on Human Security and Technology at the Harvard Humanitarian Initiative in 2017, the same year the KST was launched.

A 2022 analysis by the CyberPeace Institute identified 157 “cyber incidents” that affected the not-for-profit sector between July 2020 and June 2022. In at least 60 cases, personal data was exposed, and in at least 28, it was taken. “This type of sensitive personal information can be monetized or simply used to cause further harm,” the report says. “Such exploitation has a strong potential for re-victimization of individuals as well as the organizations themselves.”

In 2021, HRW itself criticized the United Nations Refugee Agency for having “improperly collected and shared personal information from ethnic Rohingya refugees.” In some cases, according to HRW, the agency had “failed to obtain refugees’ informed consent to share their data,” exposing refugees to further risk.

Earlier this year, HRW criticized the Egyptian government and a private British company, Academic Assessment, for leaving the personal information of children unprotected on the open web for at least eight months. “The exposure violates children’s privacy, exposes them to the risk of serious harm, and appears to violate the data protection laws in both Egypt and the United Kingdom,” reads the April report.

In that case, 72,000 records — including children’s names, birth dates, phone numbers, and photo identification — were left vulnerable. “By carelessly exposing children’s private information, the Egyptian government and Academic Assessment put children at risk of serious harm,” said Hye Jung Han, children’s rights and technology researcher and advocate at HRW at the time.

The threats posed by the release of the KST information are far greater than the Egyptian breach. For decades, Congo has been beset by armed violence, from wars involving the neighboring nations of Rwanda and Uganda to attacks by machete-wielding militias. More recently, in the country’s far east, millions have been killed, raped, or driven from their homes by more than 120 armed groups.

Almost all the individuals in the database, as well as their interviewers, appear to have confidentially provided sensitive information about armed groups, militias, or state security forces, all of which are implicated in grave human rights violations. Given the lawlessness and insecurity of eastern Congo, the most vulnerable individuals — members of local civil society organizations, activists, and residents living in conflict areas — are at risk of arrest, kidnapping, sexual assault, or death at the hands of these groups.

“For an organization working with people in a conflict zone, this is the most important type of data that they have, so it should be critically protected,” said CyberPeace Institute’s Ogée, who previously worked at European cybersecurity agencies and the World Economic Forum.

The KST’s sensitive files were hosted on an open “bucket”: a cloud storage server accessible to the open internet. Because the project posted monthly public reports on the same server that contained the sensitive information, the server’s URL was often produced in search engine results related to the project.

“The primary methodology in the humanitarian sector is ‘do no harm.’ If you’re not able to come into a conflict zone and do your work without creating any more harm, then you shouldn’t be doing it,” Ogée said. “The day that database is created and uploaded on that bucket, an NGO that is security-minded and thinks about ‘do no harm’ should have every process in place to make sure that this database never gets accessed from the outside.”

The leak exposed the identities of 6,000 to 8,000 individuals, according to The Intercept’s analysis. The dataset references thousands of sources labeled “civil society” and “inhabitants” of villages where violent incidents occurred, as well as hundreds of “youth” and “human rights defenders.” Congolese health professionals and teachers are cited hundreds of times, and there are multiple references to students, lawyers, psychologists, “women leaders,” magistrates, and Congolese civil society groups, including prominent activist organizations regularly targeted by the government.

“It’s really shocking,” said a humanitarian researcher with long experience conducting interviews with vulnerable people in African conflict zones. “The most important thing to me is the security of my sources. I would rather not document a massacre than endanger my sources. So to leave their information in the open is incredibly negligent. Someone needs to take responsibility.”

Residents of Bambo in Rutshuru territory, 60 kilometers north of Goma, the capital of North Kivu, eastern Democratic Republic of Congo, flee as the M23 attacked the town on October 26, 2023. Around noon, M23 rebels, supported by the Rwandan army according to the UN, the USA and the European Union, attacked the town of Bambo with mortars, causing several thousand inhabitants to flee. Hundreds of Congolese soldiers, police officers and proxy militiamen were seen joining the population as they tried to escape the fighting. Several civilians were killed and wounded in the fighting, according to medical sources on the spot. The M23 has captured swathes of territory in North Kivu province since 2021, forcing more than a million people to flee. (Photo by ALEXIS HUGUET / AFP) (Photo by ALEXIS HUGUET/AFP via Getty Images)

Residents of Bambo in Rutshuru territory in the Democratic Republic of the Congo flee rebel attacks on Oct. 26, 2023.

Photo: Alexis Huguet/AFP via Getty Images

Breach of Ethics

Since being contacted by The Intercept, the organizations involved have sought to distance themselves from the project’s lax security protocols. 

In its internal statement to staff, HRW emphasized that it was not responsible for collecting information or supervising activities for KST, but was “involved in designing the research methodology, provided training, guidance and logistical support to KST researchers, and spot-checked some information.”

“HRW does not manage the KST website and did not set up, manage or maintain the database,” the internal statement said.

The Intercept spoke with multiple people exposed in the data leak who said they did not consent to any information being stored in a database. This was confirmed by four sources who worked closely with the KST, who said that gaining informed consent from people who were interviewed, including advising them that they were being interviewed for the KST, was not a part of the research methodology.

Sources close to the KST noted that its researchers didn’t identify who they were working for. The failure to obtain consent to collect personal information was likely an institutional oversight, they said.

“Obtaining informed consent is an undisputed core principle of research ethics,” the researcher who collaborated with the KST told The Intercept. “Not telling people who you work for and what happens to the information you provide to them amounts to lying. And that’s what has happened here at an unimaginable scale.”

In an email to NYU’s Center on International Cooperation and their Human Research Protections Program obtained by The Intercept, Fahey, the former coordinator of the Group of Experts on the Democratic Republic of the Congo, charged that KST staff “apparently failed to disclose that they were working for KST when soliciting information and did not tell sources how their information would be cataloged or used.”

In response, Sarah Cliffe, the executive director of NYU’s Center on International Cooperation, did not acknowledge Fahey’s concerns about informed consent, but noted that the institution takes “very seriously” concerns about the security of sources and KST staff exposed in the leak, according to an email seen by The Intercept. “We can assure you that we are taking immediate steps to investigate this and decide on the best course of action,” Cliffe wrote on November 1. 

Fahey told The Intercept that NYU’s Human Research Protections Program did not respond to his questions about KST’s compliance with accepted academic standards and securing informed consent from Congolese informants. That NYU office includes the university’s institutional review board, or IRB, the body comprised of faculty and staff who review research protocols to ensure protection of human subjects and compliance with state and federal regulations as well as university policies.

NYU spokesperson John Beckman confirmed that while the KST’s researchers received training on security, research methodology, and research ethics, “including the importance of informed consent,” some of the people interviewed “were not informed that their personally identifiable information would be recorded in the database and were unaware that the information was to be used for the KST.” 

Beckman added, “NYU is convening an investigative panel to review these human subject-related issues.”

Beckman also stated that the failure of Congolese “focal points” to provide informed consent tended to occur in situations that may have affected their own security. “Nevertheless, this raises troubling issues,” Beckman said, noting that all the partners involved in the KST “will be working together to review what happened, to identify what needs to be corrected going forward, and to determine how best to safeguard those involved in collecting and providing information about the incidents the KST is meant to track.”

Fong, of HRW, also acknowledged failures to provide informed consent in all instances. “We are aware that, while the KST researchers appropriately identified themselves as working for Congolese civil society organizations, some KST researchers did not in all cases identify themselves as working for KST, for security reasons,” she told The Intercept. “We are reviewing the research protocols and their implementation.”

“The partners have been working hard to try to address what happened and mitigate it,” Beckman told The Intercept, specifying that all involved were working to determine the safest method to inform those exposed in the leak.

Both NYU and HRW named their Congolese partner organization as being involved in some of the original errors and the institutional response. 

The fallout from the exposure of the data may extend far beyond the breach of academic or NGO protocols. “Given the lack of security on KST’s website, it’s possible that intelligence agencies in Rwanda, Uganda, Burundi, DRC, and elsewhere have been accessing and mining this data for years,” Fahey said. “It is also possible that Congolese armed groups and national security forces have monitored who said what to KST staff.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Robert Flummerfelt.

]]>
https://www.radiofree.org/2023/11/17/online-atrocity-database-exposed-thousands-of-vulnerable-people-in-congo/feed/ 0 439672
LexisNexis Sold Powerful Spy Tools to U.S. Customs and Border Protection https://www.radiofree.org/2023/11/16/lexisnexis-sold-powerful-spy-tools-to-u-s-customs-and-border-protection/ https://www.radiofree.org/2023/11/16/lexisnexis-sold-powerful-spy-tools-to-u-s-customs-and-border-protection/#respond Thu, 16 Nov 2023 17:42:15 +0000 https://theintercept.com/?p=451615

The popular data broker LexisNexis began selling face recognition services and personal location data to U.S. Customs and Border Protection late last year, according to contract documents obtained through a Freedom of Information Act request.

According to the documents, obtained by the advocacy group Just Futures Law and shared with The Intercept, LexisNexis Risk Solutions began selling surveillance tools to the border enforcement agency in December 2022. The $15.9 million contract includes a broad menu of powerful tools for locating individuals throughout the United States using a vast array of personal data, much of it obtained and used without judicial oversight.

“This contract is mass surveillance in hyperdrive.”

Through LexisNexis, CBP investigators gained a convenient place to centralize, analyze, and search various databases containing enormous volumes of intimate personal information, both public and proprietary.

“This contract is mass surveillance in hyperdrive,” Julie Mao, an attorney and co-founder of Just Futures Law, told The Intercept. “It’s frightening that a rogue agency such as CBP has access to so many powerful technologies at the click of the button. Unfortunately, this is what LexisNexis appears now to be selling to thousands of police forces across the country. It’s now become a one-stop shop for accessing a range of invasive surveillance tools.”

A variety of CBP offices would make use of the surveillance tools, according to the documents. Among them is the U.S. Border Patrol, which would use LexisNexis to “help examine individuals and entities to determine their admissibility to the US. and their proclivity to violate U.S. laws and regulations.”

Among other tools, the contract shows LexisNexis is providing CBP with social media surveillance, access to jail booking data, face recognition and “geolocation analysis & geographic mapping” of cellphones. All this data can be queried in “large volume online batching,” allowing CBP investigators to target broad groups of people and discern “connections among individuals, incidents, activities, and locations,” handily visualized through Google Maps.

CBP declined to comment for this story, and LexisNexis did not respond to an inquiry. Despite the explicit reference to providing “LexisNexis Facial Recognition” in the contract, a fact sheet published by the company online says, “LexisNexis Risk Solutions does not provide the Department of Homeland Security” — CBP’s parent agency — “or US Immigration and Customs Enforcement with license plate images or facial recognition capabilities.”

The contract includes a variety of means for CBP to exploit the cellphones of those it targets. Accurint, a police and counterterror surveillance tool LexisNexis acquired in 2004, allows the agency to do analysis of real-time phone call records and phone geolocation through its “TraX” software.

While it’s unclear how exactly TraX pinpoints its targets, LexisNexis marketing materials cite “cellular providers live pings for geolocation tracking.” These materials also note that TraX incorporates both “call detail records obtained through legal process (i.e. search warrant or court order) and third-party device geolocation information.” A 2023 LexisNexis promotional brochure says, “The LexisNexis Risk Solutions Geolocation Investigative Team offers geolocation analysis and investigative case assistance to law enforcement and public safety customers.”

Any CBP use of geolocational data is controversial, given the agency’s recent history. Prior reporting found that, rather than request phone location data through a search warrant, CBP simply purchased such data from unregulated brokers — a practice that critics say allows the government to sidestep Fourth Amendment protections against police searches.

According to a September report by 404 Media, CBP recently told Sen. Ron Wyden, D-Ore., it “will not be utilizing Commercial Telemetry Data (CTD) after the conclusion of FY23 (September 30, 2023),” using a technical term for such commercially purchased location information.

The agency, however, also told Wyden that it could renew its use of commercial location data if there were “a critical mission need” in the future. It’s unclear if this contract provided commercial location data to CBP, or if it was affected by the agency’s commitment to Wyden. (LexisNexis did not respond to a question about whether it provides or provided the type of phone location data that CBP had sworn off.)

The contract also shows how LexisNexis operates as a reseller for surveillance tools created by other vendors. Its social media surveillance is “powered by” Babel X, a controversial firm that CBP and the FBI have previously used.

According to a May 2023 report by Motherboard, Babel X allows users to input one piece of information about a surveillance target, like a Social Security number, and receive large amounts of collated information back. The returned data can include “social media posts, linked IP address, employment history, and unique advertising identifiers associated with their mobile phone. The monitoring can apply to U.S. persons, including citizens and permanent residents, as well as refugees and asylum seekers.”

While LexisNexis is known to provide similar data services to U.S. Immigration and Customs Enforcement, another division of the Department of Homeland Security, details of its surveillance work with CBP were not previously known. Though both agencies enforce immigration law, CBP typically focuses on enforcement along the border, while ICE detains and deports migrants inland.

In recent years, CBP has drawn harsh criticism from civil libertarians and human rights advocates for its activities both at and far from the U.S.-Mexico border. In 2020, CBP was found to have flown a Predator surveillance drone over Minneapolis protests after the murder of George Floyd; two months later, CBP agents in unmarked vehicles seized racial justice protesters off the streets of Portland, Oregon — an act the American Civil Liberties Union condemned as a “blatant demonstration of unconstitutional authoritarianism.”

Just Futures Law is currently suing LexisNexis over claims it illegally obtains and sells personal data.

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/11/16/lexisnexis-sold-powerful-spy-tools-to-u-s-customs-and-border-protection/feed/ 0 439334
Google Activists Circulated Internal Petition on Israel Ties. Only the Muslim Got a Call from HR. https://www.radiofree.org/2023/11/15/google-activists-circulated-internal-petition-on-israel-ties-only-the-muslim-got-a-call-from-hr/ https://www.radiofree.org/2023/11/15/google-activists-circulated-internal-petition-on-israel-ties-only-the-muslim-got-a-call-from-hr/#respond Wed, 15 Nov 2023 19:51:21 +0000 https://theintercept.com/?p=451208

A Google employee protesting the tech giant’s business with the Israeli government was questioned by Google’s human resources department over allegations that he endorsed terrorism, The Intercept has learned. The employee said he was the only Muslim and Middle Easterner who circulated the letter and also the only one who was confronted by HR about it.

The employee was objecting to Project Nimbus, Google’s controversial $1.2 billion contract with the Israeli government and its military to provide state-of-the-art cloud computing and machine learning tools.

Since its announcement two years ago, Project Nimbus has drawn widespread criticism both inside and outside Google, spurring employee-led protests and warnings from human rights groups and surveillance experts that it could bolster state repression of Palestinians.

Mohammad Khatami, a Google software engineer, sent an email to two internal listservs on October 18 saying Project Nimbus was implicated in human rights abuses against Palestinians — abuses that fit a 75-year pattern that had brought the conflict to the October 7 Hamas massacre of some 1,200 Israelis, mostly civilians. The letter, distributed internally by anti-Nimbus Google workers through company email lists, went on to say that Google could become “complicit in what history will remember as a genocide.”

“Strangely enough, I was the only one of us who was sent to HR over people saying I was supporting terrorism or justifying terrorism.”

Twelve days later, Google HR told Khatami they were scheduling a meeting with him, during which he says he was questioned about whether the letter was “justifying the terrorism on October 7th.”

In an interview, Khatami told The Intercept he was not only disturbed by what he considers an attempt by Google to stifle dissent on Nimbus, but also believes he was left feeling singled out because of his religion and ethnicity. The letter was drafted and internally circulated by a group of anti-Nimbus Google employees, but none of them other than Khatami were called by HR, according to Khatami and Josh Marxen, another anti-Nimbus organizer at Google who helped spread the letter. Though he declined to comment on the outcome of the HR meeting, Khatami said it left him shaken.

“It was very emotionally taxing,” Khatami said. “I was crying by the end of it.”

“I’m the only Muslim or Middle Eastern organizer who sent out that email,” he told The Intercept. “Strangely enough, I was the only one of us who was sent to HR over people saying I was supporting terrorism or justifying terrorism.”

The Intercept reviewed a virtually identical email sent by Marxen, also on October 18. Though there are a few small changes — Marxen’s email refers to “a seige [sic] upon all of Gaza” whereas Khamati’s cites “the complete destitution of Gaza” — both contain verbatim language connecting the October 7 attack to Israel’s past treatment of Palestinians.

Google spokesperson Courtenay Mencini told The Intercept, “We follow up on every concern raised, and in this case, dozens of employees reported this individual’s email – not the sharing of the petition itself – for including language that did not follow our workplace policies.” Mencini declined to say which workplace policies Khatami’s email allegedly violated, whether other organizers had gotten HR calls, or if any other company personnel had been approached by Employee Relations for comments made about the war.

The incident comes just one year after former Google employee Ariel Koren said the company attempted to force her to relocate to Brazil in retaliation for her early anti-Nimbus organizing. Koren later quit in protest and remains active in advocating against the contract. Project Nimbus, despite the dissent, remains in place, in part because of contractual terms put in place by Israel forbidding Google from cutting off service in response to political pressure or boycott campaigns.

Dark Clouds Over Nimbus

Dissent at Google is neither rare nor ineffective. Employee opposition to controversial military contracts has previously pushed the company to drop plans to help with the Pentagon’s drone warfare program and a planned Chinese version of Google Search that would filter out results unwanted by the Chinese government. Nimbus, however, has managed to survive.

In the wake of the October 7 Hamas attacks against Israel and resulting Israeli counteroffensive, now in its second month of airstrikes and a more recent ground invasion, Project Nimbus is again a flashpoint within the company.

With the rank and file disturbed by the company’s role as a defense contractor, Google has attempted to downplay the military nature of the contract.

Mencini, the Google spokesperson, said that anti-Nimbus organizers were “misrepresenting” the contract’s military role.

“This is part of a longstanding campaign by a group of organizations and people who largely don’t work at Google,” Mencini said. “We have been very clear that the Nimbus contract is for workloads running on our commercial platform by Israeli government ministries such as finance, healthcare, transportation, and education. Our work is not directed at highly sensitive or classified military workloads relevant to weapons or intelligence services.”

Nimbus training documents published by The Intercept last year, however, show the company was pitching its use for the Ministry of Defense. Moreover, the Israeli government itself is open about the military applications of Project Nimbus: A 2023 press release by the Israeli Ministry of Finance specifically names the Israel Defense Forces as a beneficiary, while an overview written by the country’s National Digital Agency describes the contract as “a comprehensive and in-depth solution to the provision of public cloud services to the Government, the defense establishment and other public organizations.”

“If we do not speak out now, we are complicit in what history will remember as a genocide.”

Against this backdrop, Khatami, in coordination with others in the worker-led anti-Nimbus campaign, sent his October 18 note to internal Arab and Middle Eastern affinity groups laying out their argument against the project and asking like-minded colleagues to sign an employee petition.

“Through Project Nimbus, Google is complicit in the mass surveillance and other human rights abuses which Palestinians have been subject to daily for the past 75 years, and which is the root cause of the violence initiated on October 7th,” the letter said. “If we do not speak out now, we are complicit in what history will remember as a genocide.”

On October 30, Khatami received an email from Google’s Employee Relations division informing him that he would soon be questioned by company representatives regarding “a concern about your conduct that has been brought to our attention.”

According to Khatami, in the ensuing phone call, Google HR pressed him about the portion of his email that made a historical connection between the October 7 Hamas attack and the 75 years of Israeli rights abuses that preceded it, claiming some of his co-workers believed he was endorsing violence. Khatami recalled being asked, “Can you see how people are thinking you’re justifying the terrorism on October 7th?”

Khatami said he and his fellow anti-Nimbus organizers were in no way endorsing the violence against Israeli civilians — just as they now oppose the deaths of more than 10,000 Palestinians, according to the latest figures from Gaza’s Ministry of Health. Rather, the Google employees wanted to provide sociopolitical context for Project Nimbus, part of a broader employee-led effort of “demilitarizing our company that was never meant to be militarized.” To point out the relevant background leading to the October 7 attack, he said, is not to approve it.

“We wrote that the root cause of the violence is the occupation,” Khatami explained. “Analysis is not justification.”

Double Standard

Khatami also objects to what he said is a double standard within Google about what speech about the war is tolerated, a source of ongoing turmoil at the company. The day after his original email, a Google employee responded angrily to the email chain: “Accusing Israel of genocide and Google of being complicit is a grave accusation!” This employee, who works at the company’s cloud computing division, itself at the core of Project Nimbus, continued:

To break it down for you, project nimbus contributes to Israel’s security. Therefore, any calls to drop it are meant to weaken Israel’s security. If Israel’s security is weak, then the prospect of more terrorist attacks, like the one we saw on October 7, is high. Terrorist attacks will result in casualties that will affect YOUR Israeli colleagues and their family. Attacks will be retaliated by Israel which will result in casualties that will affect your Palestinian colleagues and their family (because they are used as shields by the terrorists)…bottom line, a secured Israel means less lives lost! Therefore if you have the good intention to preserve human lives then you MUST support project Nimbus!

While Khatami disagrees strongly with the overall argument in the response email, he objected in particular to the co-worker’s claim that Israel is killing Palestinians “because they are used as shields by the terrorists” — a justification of violence far more explicit than the one he was accused of, he said. Khatami questioned whether widespread references to the inviolability of Israeli self-defense by Google employees have provoked treatment from HR similar to what he received after his email about Nimbus.

Internal employee communications viewed by The Intercept show tensions within Google over the Israeli–Palestinian conflict aren’t limited to debates over Project Nimbus. A screenshots viewed by The Intercept shows an Israeli Google employee repeatedly asking Middle Eastern colleagues if they support Hamas, while another shows a Google engineer suggesting Palestinians worried about the welfare of their children should simply stop having kids. Another lamented “friends and family [who] are slaughtered by the Gaza-grown group of bloodthirsty animals.”

According to a recent New York Times report, which found “at least one” instance of “overtly antisemitic” content posted through internal Google channels, “one worker had been fired after writing in an internal company message board that Israelis living near Gaza ‘deserved to be impacted.’”

Another screenshot reviewed by The Intercept, taken from an email group for Israeli Google staff, shows employees discussing a post by a colleague criticizing the Israeli occupation and encouraging donations to a Gaza relief fund.

“During this time we all need to stay strong as a nation and united,” one Google employee replied in the email group. “As if we are not going through enough suffering, we will unfortunately see many emails, comments either internally or on social media that are pro Hamas and clearly anti semitic. report immediately!” Another added: “People like that make me sick. But she is a lost cause.” A third chimed in to say they had internally reported the colleague soliciting donations. A separate post soliciting donations for the same Gaza relief fund was downvoted 139 times on an internal message board, according to another screenshot, while a post stating only “Killing civilians is indefensible” received 51 downvotes.

While Khatami says he was unnerved and disheartened by the HR grilling, he’s still committed to organizing against Project Nimbus.

“It definitely emotionally affected me, it definitely made me significantly more fearful or organizing in this space,” he said. “But I think knowing that people are dying right now and slaughtered in a genocide that’s aided and abetted by my company, remembering that makes the fear go away.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/11/15/google-activists-circulated-internal-petition-on-israel-ties-only-the-muslim-got-a-call-from-hr/feed/ 0 439024
Lawn equipment spews ‘shocking’ amount of air pollution, new data shows https://grist.org/technology/lawn-equipment-pollution-report/ https://grist.org/technology/lawn-equipment-pollution-report/#respond Mon, 30 Oct 2023 13:54:19 +0000 https://grist.org/?p=621426 Lawn care equipment — leaf-blowers, lawnmowers, and the like — doesn’t top most people’s lists of climate priorities. But a new report documents how, in aggregate, lawn care is a major source of U.S. air pollution. 

Using the latest available data from the Environmental Protection Agency’s 2020 National Emissions Inventory, the report found that the equipment released more than 68,000 tons of smog-forming nitrous oxides, which is roughly on par with the pollution from 30 million cars. Lawn equipment also spewed 30 millions tons of climate-warming carbon dioxide, which is more than the total emissions of the city of Los Angeles.

“When it comes to these small engines in lawn and garden equipment, it’s really counterintuitive,” said Kirsten Schatz, the lead author of the report and a clean air advocate at Colorado PIRG, a nonprofit environmental organization. “This stuff is really disproportionately causing a lot of air pollution, health problems and disproportionately contributing to climate change.”

Lawn equipment also contributed to a litany of other air toxics, such as formaldehyde and benzene, according to the report, which is titled “Lawn Care Goes Electric.” But perhaps the most concerning pollutant it releases is the fine particulate matter known as PM2.5. 

PM2.5 is far smaller than the width of a human hair and can lead to health problems ranging from cancer, reproductive ailments, and mental health problems to premature death. The report found that gas-powered lawn equipment belched 21,800 tons of PM2.5 in 2020 — an  amount equivalent to the pollution from 234 million typical cars over the course of a year.

That outsize impact comes because gas-powered lawn equipment runs on different types of engines than passenger cars. They are smaller — coming in two- and four-stroke versions, which reference the differences in the engines’ combustion cycles — and are generally less efficient, with two-stroke engines being particularly problematic because they run a mix of lubricating oil and gasoline.

“[This] really inefficient engine technology is pound for pound more polluting than the cars and trucks,” said Schatz. “Outdoor equipment generates a pretty shocking amount of pollution.”

Emissions also vary widely by state. California and Florida ranked highest for carbon dioxide emissions from lawn equipment, while Florida and Texas topped the list of PM2.5 pollution. While one might expect the sheer amount of lawn care in California, the most populous U.S. state, to rank it higher on PM2.5 pollution, it only comes in 29th. Lower two-stroke engine use accounts for the gap between the state’s carbon and particulate emissions, according to Tony Dunzik, a senior policy analyst at Frontier Group and contributor to the report.

He explained that nationally, two-stroke engines are responsible for 82 percent of PM2.5 from lawn equipment but in California it’s only 41 percent. Researchers are not exactly sure why the use difference is so stark, but one theory is that California’s history of regulating small engines is paying off. 

“California has consistently led on [small engine] emission standards since the mid-1990s,” said Dunzik. That leadership is ongoing: A statewide ban on small off-road engines, including lawn equipment, is set to go into effect next year. Schatz argues that the rest of the country should follow California’s lead and promote electric alternatives that run on rechargeable batteries.

“We have so many cleaner, quieter electric alternatives available now,” said Schatz. “Battery technology has come a long way.”

Many states and municipalities offer rebates on battery-powered lawn equipment, and more people are making the switch. That’s true even in the commercial lawn-care sector, which is responsible for the bulk of emissions but is more difficult to electrify because companies often need more powerful machines, with longer runtimes, than residential users. 

Kelly Giard started the Clean Air Lawn Care company in 2006, at a time when he said the technology for commercial work was “limited.” But that’s rapidly changing and it’s helped his company grow. His franchisees now serve roughly 10,000 customers across 16 states. 

“At this point,” said Girard of the performance of his electric fleet, “it’s very comparable to gas.”

This story was originally published by Grist with the headline Lawn equipment spews ‘shocking’ amount of air pollution, new data shows on Oct 30, 2023.


This content originally appeared on Grist and was authored by Tik Root.

]]>
https://grist.org/technology/lawn-equipment-pollution-report/feed/ 0 437454
Instagram Hid a Comment. It Was Just Three Palestinian Flag Emojis. https://www.radiofree.org/2023/10/28/instagram-hid-a-comment-it-was-just-three-palestinian-flag-emojis/ https://www.radiofree.org/2023/10/28/instagram-hid-a-comment-it-was-just-three-palestinian-flag-emojis/#respond Sat, 28 Oct 2023 19:01:37 +0000 https://theintercept.com/?p=449406

As Israel imposed an internet blackout in Gaza on Friday, social media users posting about the grim conditions have contended with erratic and often unexplained censorship of content related to Palestine on Instagram and Facebook.

Since Israel launched retaliatory airstrikes in Gaza after the October 7 Hamas attack, Facebook and Instagram users have reported widespread deletions of their content, translations inserting the word “terrorist” into Palestinian Instagram profiles, and suppressed hashtags. Instagram comments containing the Palestinian flag emoji have also been hidden, according to 7amleh, a Palestinian digital rights group that formally collaborates with Meta, which owns Instagram and Facebook, on regional speech issues.

Numerous users have reported to 7amleh that their comments were moved to the bottom of the comments section and require a click to display. Many of the remarks have something in common: “It often seemed to coincide with having a Palestinian flag in the comment,” 7amleh spokesperson Eric Sype told The Intercept.

Users report that Instagram had flagged and hidden comments containing the emoji as “potentially offensive,” TechCrunch first reported last week. Meta has routinely attributed similar instances of alleged censorship to technical glitches. Meta confirmed to The Intercept that the company has been hiding comments that contain the Palestinian flag emoji in certain “offensive” contexts that violate the company’s rules.

“The notion of finding a flag offensive is deeply distressing for Palestinians,” Mona Shtaya, a nonresident fellow at the Tahrir Institute for Middle East Policy who follows Meta’s policymaking on speech, told The Intercept.

“The notion of finding a flag offensive is deeply distressing for Palestinians.”

Asked about the contexts in which Meta hides the flag, Meta spokesperson Andy Stone pointed to the Dangerous Organizations and Individuals policy, which designates Hamas as a terrorist organization, and cited a section of the Community Standards rulebook that prohibits any content “praising, celebrating or mocking anyone’s death.”

It remains unclear, however, precisely how Meta determines whether the use of the flag emoji is offensive enough to suppress. The Intercept reviewed several hidden comments containing the Palestinian flag emoji that had no reference to Hamas or any other banned group. The Palestinian flag itself has no formal association with Hamas and predates the militant group by decades.

Some of the hidden comments reviewed by The Intercept only contained emojis and no other text. In one, a user commented on an Instagram video of a pro-Palestinian demonstration in Jordan with green, white, and black heart emojis corresponding to the colors of the Palestinian flag, along with emojis of the Moroccan and Palestinian flags. In another, a user posted just three Palestinian flag emojis. Another screenshot seen by The Intercept shows two hidden comments consisting only of the hashtags #Gaza, #gazaunderattack, #freepalestine, and #ceasefirenow.

“Throughout our long history, we’ve endured moments where our right to display the Palestinian flag has been denied by Israeli authorities. Decades ago, Palestinian artists Nabil Anani and Suleiman Mansour ingeniously used a watermelon as a symbol of our flag,” Shtaya said. “When Meta engages in such practices, it echoes the oppressive measures imposed on Palestinians.”

Faulty Content Moderation

Instagram and Facebook users have taken to other social media platforms to report other instances of censorship. On X, formerly known as Twitter, one user posted that Facebook blocked a screenshot of a popular Palestinian Instagram account he tried to share with a friend via private message. The message was flagged as containing nonconsensual sexual images, and his account was suspended.

On Bluesky, Facebook and Instagram users reported that attempts to share national security reporter Spencer Ackerman’s recent article criticizing President Joe Biden’s support of Israel were blocked and flagged as cybersecurity risks.

On Friday, the news site Mondoweiss tweeted a screenshot of an Instagram video about Israeli arrests of Palestinians in the West Bank that was removed because it violated the dangerous organizations policy.

Meta’s increasing reliance on automated, software-based content moderation may prevent people from having to sort through extremely disturbing and potentially traumatizing images. The technology, however, relies on opaque, unaccountable algorithms that introduce the potential to misfire, censoring content without explanation. The issue appears to extend to posts related to the Israel-Palestine conflict.

An independent audit commissioned by Meta last year determined that the company’s moderation practices amounted to a violation of Palestinian users’ human rights. The audit also concluded that the Dangerous Organizations and Individuals policy — which speech advocates have criticized for its opacity and overrepresentation of Middle Eastern, Muslim, and South Asians — was “more likely to impact Palestinian and Arabic-speaking users, both based upon Meta’s interpretation of legal obligations, and in error.”

Last week, the Wall Street Journal reported that Meta recently dialed down the level of confidence its automated systems require before suppressing “hostile speech” to 25 percent for the Palestinian market, a significant decrease from the standard threshold of 80 percent.

The audit also faulted Meta for implementing a software scanning tool to detect violent or racist incitement in Arabic, but not for posts in Hebrew. “Arabic classifiers are likely less accurate for Palestinian Arabic than other dialects … due to lack of linguistic and cultural competence,” the report found.

“Since the beginning of this crisis, we have received hundreds of submissions documenting incitement to violence in Hebrew.”

Despite Meta’s claim that the company developed a speech classifier for Hebrew in response to the audit, hostile speech and violent incitement in Hebrew are rampant on Instagram and Facebook, according to 7amleh.

“Based on our monitoring and documentation, it seems to be very ineffective,” 7amleh executive director and co-founder Nadim Nashif said of the Hebrew classifier. “Since the beginning of this crisis, we have received hundreds of submissions documenting incitement to violence in Hebrew, that clearly violate Meta’s policies, but are still on the platforms.”

An Instagram search for a Hebrew-language hashtag roughly meaning “erase Gaza” produced dozens of results at the time of publication. Meta could not be immediately reached for comment on the accuracy of its Hebrew speech classifier.

The Wall Street Journal shed light on why hostile speech in Hebrew still appears on Instagram. “Earlier this month,” the paper reported, “the company internally acknowledged that it hadn’t been using its Hebrew hostile speech classifier on Instagram comments because it didn’t have enough data for the system to function adequately.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/10/28/instagram-hid-a-comment-it-was-just-three-palestinian-flag-emojis/feed/ 0 437226
More US Controls on China’s Chip Industry https://www.radiofree.org/2023/10/28/more-us-controls-on-chinas-chip-industry/ https://www.radiofree.org/2023/10/28/more-us-controls-on-chinas-chip-industry/#respond Sat, 28 Oct 2023 14:25:37 +0000 https://dissidentvoice.org/?p=145306 This week’s News on China.

• More US sanctions against Chinese chip industry
• China tightens graphite export controls
• Industrial renaissance in northeast China
• China approves GM soybeans and corn


This content originally appeared on Dissident Voice and was authored by Dongsheng News.

]]>
https://www.radiofree.org/2023/10/28/more-us-controls-on-chinas-chip-industry/feed/ 0 437236
Backlash Looms as US Ignores Dutch Interests to Hinder China https://www.radiofree.org/2023/10/27/backlash-looms-as-us-ignores-dutch-interests-to-hinder-china/ https://www.radiofree.org/2023/10/27/backlash-looms-as-us-ignores-dutch-interests-to-hinder-china/#respond Fri, 27 Oct 2023 12:56:37 +0000 https://dissidentvoice.org/?p=145251
Illustration: Chen Xia/GT

Illustration: Chen Xia/GT

The US doesn’t seem to be hesitant for a second to sacrifice its allies so as to contain China. The tightening chip export restrictions show that it is willing to do whatever it takes to hinder China’s technological development. But that doesn’t mean its allies will unconditionally follow such an extreme approach toward China, especially when their own interests will be at greater risk.

The fact that the subject of the new US export restrictions involving ASML is under heated debate in the Netherlands is the latest example of the conflict of interests. Several Dutch lawmakers on Tuesday challenged the Netherlands’ trade minister over whether the US has acted correctly in unilaterally imposing new rules regulating the export to China of a chipmaking machine made by ASML, Reuters reported on Wednesday.

Dutch media reports disclosed that Dutch political parties CDA, D66 and Volt called for the cabinet to advocate more strongly for chip machine manufacturer ASML when dealing with the US.

The US last week announced new rules giving Washington the right to restrict the export of ASML’s Twinscan NXT1930Di machine if it contains any US parts at all.

As a result, ASML needs to apply for a license from Washington to sell these machines, even though they could be exported without issues under Dutch rules.

After Huawei Mate 60, a smartphone made by Chinese tech giant Huawei using advanced chips, alarmed the US, Western media reports emerged that the mysterious chips were produced on ASML chipmaking machines that were not on the US export restriction list. So the new US rules are clearly aimed at further tightening restrictions on technology exports to China to stem the potential for Chinese technology companies to break through the semiconductor bottleneck.

But this has also once again put the Netherlands in an awkward position, as the Dutch government now needs to come up with a reasonable justification for its response to the legitimate demand to protect the interests of domestic businesses.

AMSL has been prohibited from selling its most sophisticated chipmaking machines to China since 2019. Under US pressure this year, the Netherlands has introduced stricter export controls on high-end chipmaking equipment.

China has become a major buyer of ASML equipment. In the third quarter, China’s purchase accounted for 46 percent of ASML’s sales, partly because Chinese companies rushed to place orders ahead of looming export controls. But from 2024, when the Dutch restrictions are set to take full effect, ASML will see decreased sales to China. Under such circumstances, further strengthening export restrictions on more equipment is expected to seriously harm the company’s interests.

Indeed, ASML’s release of lower-than-expected orders and warning of flat sales next year indicates the importance of the Chinese market.

Based in the Netherlands, ASML has become an important part of the Dutch economy and a symbol of the country’s technology prowess. So the Dutch government knows clearly what a sudden and sweeping cutoff of ASML’s supplies to China would mean for the country.

So it announced the export restriction but said it would be implemented next year, with the view of taking care of its own company in a flexible way.

But the Dutch approach is anticipated to face a severe test because the US apparently won’t allow any time or opportunity for Chinese companies to achieve a breakthrough, even at the expense of hurting its allies’ interests.

Now anger and concerns about the potential damage of the new US rules to the Dutch economy has triggered disputes and debate within the Netherlands. How to protect ASML’s legitimate interests under US pressure will be a test of the Netherlands’ economic independence.

As for China, it not only needs to speed up its own research and development, but also needs to strengthen communication and cooperation with third parties, such as the Netherlands, which are constrained by US policies.

By offering them with more favorable and open market access, as well as promoting economic and trade cooperation based on international norms, China, together with other partners, can jointly tackle the US coercion.


This content originally appeared on Dissident Voice and was authored by Global Times.

]]>
https://www.radiofree.org/2023/10/27/backlash-looms-as-us-ignores-dutch-interests-to-hinder-china/feed/ 0 436989
One Year After Elon Musk Bought Twitter, His Hilarious Nightmare Continues https://www.radiofree.org/2023/10/27/one-year-after-elon-musk-bought-twitter-his-hilarious-nightmare-continues/ https://www.radiofree.org/2023/10/27/one-year-after-elon-musk-bought-twitter-his-hilarious-nightmare-continues/#respond Fri, 27 Oct 2023 10:00:00 +0000 https://theintercept.com/?p=449205
Elon Musk, chief executive officer of Tesla, speaks to members of the media following Senate bipartisan Artificial Intelligence (AI) Insight Forum on Capitol Hill in Washington, DC, US, on Wednesday, Sept. 13, 2023. The gathering is part of the Senate majority leader's strategy to give Congress more influence over the future of artificial intelligence as it takes on a growing role in the professional and personal lives of Americans. Photographer: Al Drago/Bloomberg via Getty Images

Elon Musk speaks to members of the media following the Senate AI Insight Forum on Capitol Hill in Washington, D.C., on Sept. 13, 2023.

Photo: Al Drago/Bloomberg via Getty Images

After Elon Musk finalized his purchase of Twitter on October 27, 2022, I wrote an article in which I warned, “We need to take seriously the possibility that this will end up being one of the funniest things that’s ever happened.”

Today, I have to issue an apology: I was wrong. Musk’s ownership of Twitter may well be — at least for people who manage to enjoy catastrophic human folly — the funniest thing that’s ever happened. 

Let’s take a look back and see how I was so mistaken.

Musk began his tenure as Twitter’s owner by posting this message to the company’s advertisers, in which he said, “Twitter aspires to be the most respected advertising platform in the world that strengthens your brand and grows your enterprise. … Twitter obviously cannot be a free-for-all hellscape, where anything can be said with no consequences! In addition to adhering to the laws of the land, our platform must be warm and welcoming to all.”

Musk had to say this for obvious reasons: 90 percent of Twitter’s revenues came from ads, and corporate America gets nervous about its ads appearing in an environment that’s completely unpredictable. 

I assumed that Musk would make a serious effort here. But this was based on my belief that, while he might be a deeply sincere ultra-right-wing crank, he surely had the level of self-control possessed by a 6-year-old. He does not. Big corporations now comprehend this and are understandably anxious about advertising with a company run by a man who, at any moment, may see user @JGoebbels1488 posting excerpts from “The Protocols of the Elders of Zion” and reply “concerning!”

The consequences of this have been what you’d expect. The marketing consultancy Ebiquity represents 70 of the 100 companies that spend the most on ads, including Google and General Motors. Before Musk’s takeover, 31 of their big clients bought space on Twitter. Last month, just two did. Ebiquity’s chief strategy officer told Business Insider that “this is a drop we have not seen before for any major advertising platform.” 

This is why Twitter users now largely see ads from micro-entrepreneurs who are, say, selling 1/100th scale papier-mâché models of the Eiffel Tower. The good news for Twitter is that such companies don’t worry much about brand safety. But the bad news is that their annual advertising budget is $25. Hence, Twitter’s advertising revenue in the U.S. is apparently down 60 percent year over year.

I also never imagined it possible that Musk would rename Twitter — which had become an incredibly well-known brand — to “X” just because he’s been obsessed with the idea of a company with that name since he was a kid. It’s as though he bought Coca-Cola and changed its name to that of his beloved childhood pet tortoise Zoinks. The people who try to measure this kind of thing claim that this has destroyed between $4 and $20 billion of Twitter’s value. (As you see in this article, I refuse to refer to Twitter as X just out of pure orneriness.)

Another of my mistaken beliefs was that Musk understood the basic facts about Twitter. The numbers have gone down somewhat since Musk’s purchase of the company, but right now, about 500 million people log on to Twitter at least once a month. Perhaps 120 million check it out daily; these average users spend about 15 minutes on it. A tenth of these numbers — that is, about 12 million people — are heavy users, who account for 70 percent of all the time spent by anyone on the app.

Musk is one of these heavy users. He adores Twitter, as do some other troubled souls. But this led him to wildly overestimate its popularity among normal humans. A company with 50 million fanatically devoted users could possibly survive a collapse in ad revenue by enticing them to pay a subscription fee. But Twitter does not have such users and now never will, given Musk’s relentless antagonizing of the largely progressive Twitterati. 

So how much is Twitter worth today? When Musk became involved with the company in the first months of 2022, its market capitalization was about $28 billion. He then offered to pay $44 billion for it, which was so much more than the company was worth that its executives had to accept the offer or they would have been sued by their shareholders. Now that the company’s no longer publicly traded — and so its basic financials don’t have to be disclosed — it’s more difficult to know what’s going on. However, Fidelity Investments, a financial services company, holds a stake in Twitter and has marked down its valuation of this stake by about two-thirds since Musk bought it. This implies that Twitter is now worth around $15 billion.

The significance of this is that Musk and his co-investors only put up $31 billion or so of the $44 billion purchase price. The remaining $13 billion was borrowed by Twitter at high interest rates from Wall Street. In other words, Musk and company are perilously close to having lost their entire $31 billion.

In the end, I did not understand Musk’s determination to torment himself by forcing his entire existence into an extremely painful Procrustean bed. The results have been bleak and awful for Twitter and the world, but not just bleak and awful: They have also been hilarious. Anyone who likes to laugh about human vanity and hubris has to appreciate his commitment to the bit.

Join The Conversation


This content originally appeared on The Intercept and was authored by Jon Schwarz.

]]>
https://www.radiofree.org/2023/10/27/one-year-after-elon-musk-bought-twitter-his-hilarious-nightmare-continues/feed/ 0 436912
As e-bikes grow in popularity, so to do calls for safety certification https://grist.org/technology/as-e-bikes-grow-in-popularity-so-to-do-calls-for-safety-certification/ https://grist.org/technology/as-e-bikes-grow-in-popularity-so-to-do-calls-for-safety-certification/#respond Fri, 27 Oct 2023 08:15:00 +0000 https://grist.org/?p=621222 Step into the street in most any major city and an e-bike carrying a commuter, a messenger, or a delivery is sure to whiz by. The zippy machines, which use electric motors to achieve speeds of up to 28 mph, are increasingly ubiquitous, particularly in New York City.

Their popularity has exploded, with annual sales growing roughly tenfold between 2017 and 2022, according to data provided by the industry group People for Bikes — an increase propelled in part by state and local rebates and other incentives. That growth has been accompanied by an increase in rider injuries and, in some cases, bikes literally exploding. 

The federal Consumer Protection Safety Commision, or CSPC, identified a fire hazard in almost half of its 59 e-bike investigations last year. It also estimated that there were nearly 25,000 emergency room visits for e-bike injuries more broadly in 2022. The two-wheelers also have been involved in a spate of high-profile fatalities in recent years, especially in the Big Apple. 

“​​[E-bikes] gained momentum unexpectedly,” said Matt Moore, People for Bikes’ general and policy counsel, citing the pandemic as a key accelerant. The result, he explained, was a boom of new bikes and new companies. “That rapid entry into the market really led to a huge growth in very low quality products.”

Although mishaps seem to be growing more slowly than sales, they are prompting calls for manufacturers to have their products certified by the likes of UL Solutions. Last month, New York City became the first jurisdiction in the nation to require exactly that, some 10 months after the CSPC sent a letter to e-bike companies urging them to seek such certification.

“I urge you to review your product line immediately and ensure that all micromobility devices that you manufacture, import, distribute, or sell in the United States comply with the relevant [standards],” the letter read. “Failure to do so puts U.S. consumers at risk of serious harm and may result in enforcement action.”

The industry has responded. The relevant standard in the U.S. and Canada is UL 2849, which was established in 2020, and examines a bike’s electric drive system for fire risk, charging performance, and performance in extreme cold and other conditions. (Separate standards apply to the batteries and general mechanical components). “We have seen inquiries about [UL 2849] testing and certification go up substantially,” a representative of UL Solutions told Grist. The 13 companies that have achieved certification this year is nearly twice the number seen in 2022.

The hope is that certification steers people toward safer bikes, and ultimately leads to fewer accidents. The move toward certification, however, won’t happen quickly or without bumps.

“I think everyone in the industry is aligned that we need to do something,” said Heather Mason, president of the National Bicycle Dealers Association. “The disagreements come down to what.”

One issue is that many bike manufacturers already certify their bikes to the European benchmark, EN 15194, because they sell far more of them there. And while UL 2849 was based on its European counterpart and the two standards may eventually harmonize, significant discrepancies remain. For example, the European standard has lower power limits for the motor than in the U.S.

Tweaking a design to meet the UL2849 could add time and significant costs. Moore says developing and certifying a drive system can cost $200,000 or more and take years. 

“Anytime there’s a change in regulation, and you raise that floor, there are compliance costs,” she said. “It’s a cost that the industry is more than willing to bear.” 

UL Solutions wouldn’t say what certification costs, but said it is far less than Moore’s estimate and usually takes only a month or two and once it has received all of the components. Once a company’s drive system is certified, it can theoretically use that hardware in multiple models. For a large manufacturer, the cost per bike can be relatively minimal. 

But there are also potholes on the road toward certification. 

Small but reputable manufacturers, for instance, may find the cost prohibitive. And, more immediately, it will create an inventory backlog of bikes that already are built to high standards but not UL2849 and can’t be sold in New York City, where the requirement took effect September 16. A UL Solutions or other seal of approval also won’t address every safety concern.

“The highest risk factors are crashes or falls on roads,” said Chris Cherry, a civil engineering professor and e-bike expert at the University of Tennessee. “A certified battery, or certified something else, isn’t going to solve those problems.”

But certification will allow consumers to shop more discerningly. An e-bike that meets the UL standard could be identified with a mark cast into the product or a sticker (though there have been reports of counterfeits). Bike shops should be able to identify models that meet UL 2849 as well, as would a company’s website. 

“The end goal,” said Moore, “is to remove unsafe products from the market.”

This story was originally published by Grist with the headline As e-bikes grow in popularity, so to do calls for safety certification on Oct 27, 2023.


This content originally appeared on Grist and was authored by Tik Root.

]]>
https://grist.org/technology/as-e-bikes-grow-in-popularity-so-to-do-calls-for-safety-certification/feed/ 0 436904
Vulnerabilities in Cellphone Roaming Let Spies and Criminals Track You Across the Globe https://www.radiofree.org/2023/10/26/vulnerabilities-in-cellphone-roaming-let-spies-and-criminals-track-you-across-the-globe/ https://www.radiofree.org/2023/10/26/vulnerabilities-in-cellphone-roaming-let-spies-and-criminals-track-you-across-the-globe/#respond Thu, 26 Oct 2023 18:00:00 +0000 https://theintercept.com/?p=448997

The very obscure, archaic technologies that make cellphone roaming possible also makes it possible to track phone owners across the world, according to a new investigation by the University of Toronto’s Citizen Lab. The roaming tech is riddled with security oversights that make it a ripe target for those who might want to trace the locations of phone users.

As the report explains, the flexibility that made cellphones so popular in the first place is largely to blame for their near-inescapable vulnerability to unwanted location tracking: When you move away from a cellular tower owned by one company to one owned by another, your connection is handed off seamlessly, preventing any interruption to your phone call or streaming video. To accomplish this handoff, the cellular networks involved need to relay messages about who — and, crucially, precisely where — you are.

“Notably, the methods available to law enforcement and intelligence services are similar to those used by the unlawful actors and enable them to obtain individuals’ geolocation information.”

While most of these network-hopping messages are sent to facilitate legitimate customer roaming, the very same system can be easily manipulated to trick a network into divulging your location to governments, fraudsters, or private sector snoops.

“Foreign intelligence and security services, as well as private intelligence firms, often attempt to obtain location information, as do domestic state actors such as law enforcement,” states the report from Citizen Lab, which researches the internet and tech from the Munk School of Global Affairs and Public Policy at the University of Toronto. “Notably, the methods available to law enforcement and intelligence services are similar to those used by the unlawful actors and enable them to obtain individuals’ geolocation information with high degrees of secrecy.”

The sheer complexity required to allow phones to easily hop from one network to another creates a host of opportunities for intelligence snoops and hackers to poke around for weak spots, Citizen Lab says. Today, there are simply so many companies involved in the cellular ecosystem that opportunities abound for bad actors.

Citizen Lab highlights the IP Exchange, or IPX, a network that helps cellular companies swap data about their customers. “The IPX is used by over 750 mobile networks spanning 195 countries around the world,” the report explains. “There are a variety of companies with connections to the IPX which may be willing to be explicitly complicit with, or turn a blind eye to, surveillance actors taking advantage of networking vulnerabilities and one-to-many interconnection points to facilitate geolocation tracking.”

This network, however, is even more promiscuous than those numbers suggest, as telecom companies can privately sell and resell access to the IPX — “creating further opportunities for a surveillance actor to use an IPX connection while concealing its identity through a number of leases and subleases.” All of this, of course, remains invisible and inscrutable to the person holding the phone.

Citizen Lab was able to document several efforts to exploit this system for surveillance purposes. In many cases, cellular roaming allows for turnkey spying across vast distances: In Vietnam, researchers identified a seven-month location surveillance campaign using the network of the state-owned GTel Mobile to track the movements of African cellular customers. “Given its ownership by the Ministry of Public Security the targeting was either undertaken with the Ministry’s awareness or permission, or was undertaken in spite of the telecommunications operator being owned by the state,” the report concludes.

African telecoms seem to be a particular hotbed of roaming-based location tracking. Gary Miller, a mobile security researcher with Citizen Lab who co-authored the report, told The Intercept that, so far this year, he’d tracked over 11 million geolocation attacks originating from just two telecoms in Chad and the Democratic Republic of the Congo alone.

In another case, Citizen Lab details a “likely state-sponsored activity intended to identify the mobility patterns of Saudi Arabia users who were traveling in the United States,” wherein Saudi phone owners were geolocated roughly every 11 minutes.

The exploitation of the global cellular system is, indeed, truly global: Citizen Lab cites location surveillance efforts originating in India, Iceland, Sweden, Italy, and beyond.

While the report notes a variety of factors, Citizen Lab places particular blame with the laissez-faire nature of global telecommunications, generally lax security standards, and lack of legal and regulatory consequences.

As governments throughout the West have been preoccupied for years with the purported surveillance threats of Chinese technologies, the rest of the world appears to have comparatively avoided scrutiny. “While a great deal of attention has been spent on whether or not to include Huawei networking equipment in telecommunications networks,” the report authors add, “comparatively little has been said about ensuring non-Chinese equipment is well secured and not used to facilitate surveillance activities.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/10/26/vulnerabilities-in-cellphone-roaming-let-spies-and-criminals-track-you-across-the-globe/feed/ 0 436782
What happens when solar panels wear out? https://grist.org/energy/where-go-solar-panels-when-they-die/ https://grist.org/energy/where-go-solar-panels-when-they-die/#respond Tue, 24 Oct 2023 08:30:00 +0000 https://grist.org/?p=620744 This coverage is made possible through a partnership with Grist and Interlochen Public Radio in Northern Michigan. 

In 2019, the nonprofit Michigan Energy Options had just put up a solar farm in the city of East Lansing — in a dump. 

“It was a closed dump,” said John Kinch, the solar company’s executive director. “There was grass and some flowers and weeds growing there. “

As part of the project, Kinch and his colleagues restored the land around the newly installed panels.

“We took all the junky grasses and things that were not native, got rid of it all and planted all native prairie and wildflower species to Michigan,” he said. “It’s a beautiful sight right now.”

But one day, Kinch was out there admiring the work, when a thought entered his mind: “Holy cow, when we’re done with this project, am I going to remove a thousand solar panels from a landfill and go put them underground in a landfill somewhere else?”

The world is seeing a huge push for solar power. But what happens when those panels wear out?

About 12 years ago, a woman named Annick Anctil was working at the Brookhaven National Laboratory in New York. She was researching the environmental impact of solar, and she became interested in making this renewable energy more sustainable. 

At her next job, she decided to go further: “The first thing I did when I started in academia after my postdoc was to write a proposal about looking at the end of life of solar modules and the need for recycling and sustainability.”

But, she said, other people weren’t on board.

“The response to that proposal was just, ‘Well, that’s not a problem. And it’s not going to be a problem for a long time. So we’re not going to fund that,’” she recalled.

Anctil submitted another proposal a few years later, and was rejected again.

Around that same time, interest in solar waste was starting to pick up. The country was installing panels at record rates. And in 2016, the International Renewable Energy Agency released a big report, saying that in the next few decades the world could see up to 78 million metric tons of solar waste. To put that in perspective, that’s about 5 million school buses.

That estimate has fluctuated over the years as solar has advanced. The National Renewable Energy Laboratory now estimates waste could reach between 54 and 160 million metric tons.

By 2021, Anctil’s research was finally funded. And she’s been working on that ever since as an associate professor of civil and environmental engineering at Michigan State University.

“Looking at the waste part, for me, that’s part of the full life cycle of the solar panels,” she said. “As soon as we start thinking about a product, we should think about what’s going to happen to them when we’re done with it.”

two gloved hands holding glass particles ground down to sand.
Crushed glass from a recycled solar panel, ready for reuse in new products. SolarCycle

To understand solar recycling, it’s helpful to know where the panels begin.

Most solar panels are made in China. Those blue rectangles that convert sunlight to electricity are covered in big sheets of high-quality glass and plastic polymer. Those rectangles are usually made of silicon, which is basically a pure form of sand. Panels can also contain copper, silver and other metals. An aluminum frame holds it together.

The solar life cycle is intertwined with human rights. There have been charges of abuses in mining and manufacturing for solar that gets shipped to countries including the United States. And a report by the London-based Business and Human Rights Resource Centre said the U.S. is among the countries that have failed to provide environmental and labor safeguards for the workers doing the mining, allegedly leading to a slew of violations, like polluting drinking water. 

Last year, Reuters reported that U.S. Customs and Border Patrol had seized solar equipment shipments because of concerns about ties to slave labor in Uyghur detention camps in northern China.

“There’s a lot of illegal mining,” said Anctil, who co-authored a Science Direct report on the carbon footprint of silicon production last year. “There’s also concern that some country might import high quality sand from another country using illegal mining.” 

Most solar has been installed in the last decade, and that pace is expected to continue, as it becomes cheaper due to federal incentives, new technology and higher demand. Many of those panels are meant to last for at least 25 to 30 years, and could produce power for much longer. Eventually, that will pile up and we’ll need to dispose of them.

But there are no federal requirements for recycling solar panels, and states have different regulations for what to do with them. Panels can also contain small amounts of heavy metals like lead, which makes getting rid of them more complicated. The vast majority of panels are thrown away in landfills — only about 10 percent are recycled. And people who are recycling are dealing with a patchwork system with a lot of organizations.

Solar recycling companies are part of that configuration. Some are in the Great Lakes region, but panels are also shipped to big facilities thousands of miles away.

Jesse Simons helped found the California recycling company Solarcycle last year, and is the company’s chief commercial officer. He said the first step is sending out a team to determine whether panels can be reused instead of recycled at their facility in Texas.

Once the panels arrive at the facility, they’re put on a machine.

“A robot, essentially, pops the frame off,” Simons said.

Panels are hard to take apart. They’re fused together in a kind of sandwich of glass, silicon, and plastic polymer, built to withstand decades outdoors, and specialized recycling systems are needed to recover valuable materials.

Once the glass is removed, there’s the laminate.

“It really does, at that point, roll up like a yoga mat,” Simons said. “It’s like a very thin piece. But that’s where most of the value is currently. Something like 80 percent of the value of the panel is now in the 8 percent of the weight that is in that yoga mat-like laminate.”

They put the laminate in a shredder, where it’s ground down to the size of sand.

“Then we’ve got another machine that basically uses electromagnetic processes to separate the valuable metals from the remaining plastic and glass,” he said.

At the end of the whole process, they’re left with around five pounds of plastic, which they’re trying to find a way to reuse.

So why isn’t everyone recycling? 

Well, it’s still expensive. The National Renewable Energy Laboratory estimates that it can cost between $15 to $45 to recycle a panel, but just a few dollars to throw it away.

Getting panels to recycling facilities is another factor. The company We Recycle Solar actually has regional warehouses in places like Chicago, where they store panels until there are enough to justify shipping them to their center in Arizona.

The solar recycling industry is expected to grow as technology improves, waste accumulates and demand for materials goes up. And people like John Gilkeson, from Minnesota’s Pollution Control Agency, say this transition can’t be left to the free market and industry alone.

“That’s called wish-cycling,” he said. “Because the market will drive to the cheapest option, which is going to be landfilling. We have had many conversations with larger energy providers who say, ‘We’ll do the right thing.’ And we say, ‘What is the right thing? And when it really happens, will you do it?’ And then we get no response. Because people are not going to do anything that they do not have to do.”

Gilkeson said policy is key to dealing with any kind of waste, including solar. He’d like to see reuse and recycling take-back programs that are funded ahead of time and supported by the industry, along with federal efforts. And he thinks we should start working on that now.

“Deliberate, intentional action is needed to make this happen,” he said. “Otherwise, you’ve got thousands of actors all doing whatever they think is in their own self-interest. And it’s not going to be a coordinated reuse and recycling system.”

There are efforts out there to make reuse and recycling more feasible.

The U.S. Department of Energy announced $20 million for solar sustainability this year. Washington State passed a law requiring company take-back and recycling programs that’s set to take effect in 2025. Some states have included solar in their universal waste programs, which can help streamline collection and recycling. Illinois could ban panels from being thrown away. Some companies, like Michigan Energy Options, have started collecting panels in the Great Lakes to test out reuse and recycling in the region.

One of the best ways to reduce waste is by developing panels that last longer and are more reliable, say researchers at the National Renewable Energy Laboratory or NREL. They also said it’s important to try reusing and repairing panels before recycling them.

Worries about solar power — both the recycling issues and the potential toxins — are influencing efforts to cut carbon emissions, according to a recent article in the journal Nature Physics. There, NREL researchers like Silvana Ovaitt said “unfounded” concerns about waste and toxicity are slowing solar installations. 

“There is a need to grow recycling and management practices, but it’s also not the most important thing to do right now,” Ovaitt said. “We are really facing these decarbonization needs; right now what we should really focus on is quick deployment.”

Over its lifetime, solar generally produces far fewer emissions than non-renewable energy — a 2021 NREL assessment found that solar emissions are about 4 percent of coal, 5 percent of oil, and 9 percent of natural gas. And although the projected amount of solar waste internationally may seem like a lot, it’s still much less than the amount of trash we throw out globally every year.

Annick Anctil, the professor at Michigan State, thinks now is actually a great time to figure out how to move forward. She said the main reason to keep working on this is simple.

Solar is great, she said, but what if the industry created a new design that didn’t end up in landfills? Or didn’t need so much mining for materials? Or could end up recycled as new panels?

“We could do better,” she said. 

This story was originally published by Grist with the headline What happens when solar panels wear out? on Oct 24, 2023.


This content originally appeared on Grist and was authored by Izzy Ross.

]]>
https://grist.org/energy/where-go-solar-panels-when-they-die/feed/ 0 436258
Instagram Censored Image of Gaza Hospital Bombing, Claims It’s Too Sexual https://www.radiofree.org/2023/10/18/instagram-censored-image-of-gaza-hospital-bombing-claims-its-too-sexual/ https://www.radiofree.org/2023/10/18/instagram-censored-image-of-gaza-hospital-bombing-claims-its-too-sexual/#respond Wed, 18 Oct 2023 16:44:01 +0000 https://theintercept.com/?p=448241

Instagram and Facebook users attempting to share scenes of devastation from a crowded hospital in Gaza City claim their posts are being suppressed, despite previous company policies protecting the publication of violent, newsworthy scenes of civilian death.

Late Tuesday, amid a 10-day bombing campaign by Israel, the Gaza Strip’s al-Ahli Hospital was rocked by an explosion that left hundreds of civilians killed and wounded. Footage of the flaming exterior of the hospital, as well as dead and wounded civilians, including children, quickly emerged on social media in the aftermath of the attack.

While the Palestinian Ministry of Health in the Hamas-run Gaza Strip blamed the explosion on an Israeli airstrike, the Israeli military later said the blast was caused by an errant rocket misfired by militants from the Gaza-based group Islamic Jihad.

While widespread electrical outages and Israel’s destruction of Gaza’s telecommunications infrastructure have made getting documentation out of the besieged territory difficult, some purported imagery of the hospital attack making its way to the internet appears to be activating the censorship tripwires of Meta, the social media giant that owns Instagram and Facebook.

Since Hamas’s surprise attack against Israel on October 7 and amid the resulting Israeli bombardment of Gaza, groups monitoring regional social media activity say censorship of Palestinian users is at a level not seen since May 2021, when violence flared between Israel and Gaza following Israeli police incursions into Muslim holy sites in Jerusalem.

Two years ago, Meta blamed the abrupt deletion of Instagram posts about Israeli military violence on a technical glitch. On October 15, Meta spokesperson Andy Stone again attributed claims of wartime censorship on a “bug” affecting Instagram. (Meta could not be immediately reached for comment.)

“It’s censorship mayhem like 2021. But it’s more sinister given the internet shutdown in Gaza.”

Since the latest war began, Instagram and Facebook users inside and outside of the Gaza Strip have complained of deleted posts, locked accounts, blocked searches, and other impediments to sharing timely information about the Israeli bombardment and general conditions on the ground. 7amleh, a Palestinian digital rights group that collaborates directly with Meta on speech issues, has documented over hundreds user complaints of censored posts about the war, according to spokesperson Eric Sype, far outpacing deletion levels seen two years ago.

“It’s censorship mayhem like 2021,” Marwa Fatafta, a policy analyst with the digital rights group Access Now, told The Intercept. “But it’s more sinister given the internet shutdown in Gaza.”

In other cases, usershave successfully uploaded graphic imagery from al-Ahli to Instagram, suggesting that takedowns are not due to any formal policy on Meta’s end, but a product of the company’s at times erratic combination of outsourced human moderation and automated image-flagging software.

An Instagram notification shows a story depicting a widely circulated image was removed by the platform on the basis of violating guidelines on nudity or sexual activity.

Screenshot: Obtained by The Intercept

Alleged Photo of Gaza Hospital Bombing

One image rapidly circulating social media platforms following the blast depicts what appears to be the flaming exterior of the hospital, where a clothed man is lying beside a pool of blood, his torso bloodied.

According to screenshots shared with The Intercept by Fatafta, Meta platform users who shared this image had their posts removed or were prompted to remove them themselves because the picture violated policies forbidding “nudity or sexual activity.” Mona Shtaya, nonresident fellow at the Tahrir Institute for Middle East Policy, confirmed she had also gotten reports of two instances of this same image deleted. (The Intercept could not independently verify that the image was of al-Ahli Hospital.)

One screenshot shows a user notified that Instagram had removed their upload of the photo, noting that the platform forbids “showing someone’s genitals or buttocks” or “implying sexual activity.” The underlying photo does not appear to show anything resembling either category of image.

In another screenshot, a Facebook user who shared the same image was told their post had been uploaded, “but it looks similar to other posts that were removed because they don’t follow our standards on nudity or sexual activity.” The user was prompted to delete the post. The language in the notification suggests the image may have triggered one of the company’s automated, software-based content moderation systems, as opposed to a human review.

Meta has previously distributed internal policy language instructing its moderators to not remove gruesome documentation of Russian airstrikes against Ukrainian civilians, though no such carveout is known to have been provided for Palestinians, whether today or in the past. Last year, a third-party audit commissioned by Meta found that systemic, unwarranted censorship of Palestinian users amounted to a violation of their human rights.

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/10/18/instagram-censored-image-of-gaza-hospital-bombing-claims-its-too-sexual/feed/ 0 435202
Massey University science staff, students fight for jobs and studies https://www.radiofree.org/2023/10/18/massey-university-science-staff-students-fight-for-jobs-and-studies/ https://www.radiofree.org/2023/10/18/massey-university-science-staff-students-fight-for-jobs-and-studies/#respond Wed, 18 Oct 2023 12:25:59 +0000 https://asiapacificreport.nz/?p=94752 By Jimmy Ellingham, RNZ Checkpoint reporter

Science staff and students at Massey University in Aotearoa New Zealand are fighting to save their jobs, and their studies.

The cash-strapped university is proposing to slash science courses from its Albany campus, which would hollow out a new high-tech building full of specialised labs.

It is part of Massey’s scenic grounds on Auckland’s North Shore, which are shrouded with an air of uncertainty as proposed job cuts hang over this campus.

More than 100 jobs are on the line at Massey, the Tertiary Education Union (TEU) says, including from the schools of natural sciences, and food and advanced technology — programmes that would cease to exist in Auckland.

Only a year ago, a new Innovation Complex opened its doors in Albany, reportedly costing $120 million. The university would not confirm the price.

It was to be called the Innovation and Science Complex, but the science part of the name was quietly dropped, although it remains on some signs in the building.

Professor of behavioural ecology Dianne Brunton.
Professor of behavioural ecology Dianne Brunton . . . Photo: RNZ / Marika Khabazi

Professor Dianne Brunton — a specialist in conservation biology whose job is on the line — showed RNZ what the complex had to offer this week.

Building for the future
“This space — all of these labs, the whole building, really, is a building for the future, a building for the next 20 to 40 years,” she said. “And [for the] students and the staff and the growth we’ll see in the sciences here on the North Shore, where the population is just ballooning.

“It’s not going to stop. It’s just going to keep going.”

Staff and students have until Friday to have their say on Massey’s science proposals as the university deals with an expected shortfall of about $50 million for the year.

“We were in little huts. They were temporary buildings and they were fitted out,” Professor Brunton said of the previous office and lab space.

“They were like Lockwood houses, if you remember that far back. They’re little prefabs, but they worked.

“In fact, some of the best covid work was done on that campus by researchers that were here with us then, and they’ve since gone.”

Professor Brunton said Albany staff were determined to offer solutions to the university, and work with it so they could remain, including on how they pay to use their space.

Floor space rented out
Massey effectively charges rent for floor space to its colleges, and science takes up room.

“There are some solutions to that and one of them is to have biotech companies in. We’ve had a number of biotech companies working in the molecular lab, basically leasing it out,” Professor Brunton said.

“We’ve got lots of ideas about other things, but the instability that we’re seeing at the moment makes that a bit tricky.”

The Innovation Complex is an award-winning building, and a leader in its field.

“It’s not just a science building — make that clear. There’s lots of student space, work space, flexible teaching space, but really state-of-the-art, really efficient labs,” Professor Brunton said.

Among its jewels are a chamber for detecting spider vibrations and a marine wet lab which allows for experiments using live animals thanks to a reticulated salt water system.

In the previous buildings, buckets of salt water sourced from the sea had to suffice.

Massey University's Innovation Complex
Massey University’s Innovation Complex opened its doors in Albany in 2022 . . . It houses several disciplines and contains specialised spaces and equipment. Image: RNZ/Marika Khabazi

Specialised spaces
Professor Brunton said she did not know what would happen to specialised spaces or equipment if the Massey proposal went through.

“Some of these pieces of equipment are not the kind a local company could come in and use.”

Staff had to have hope the proposal would not go through, she said.

She also raised concerns about the quality of the financial information made available on which staff and students could make submissions.

Many students are in limbo due to the threat to cut courses from the Albany campus.

Third-year food technology student Cynthia Fan, 21, said those affected were trying to prepare for exams, while worrying about where they would be next year and organising submissions.

Under the proposal, food technology students were among those who might have to continue their studies at Palmerston North, unless Massey decided to stagger the cessation of the courses in Albany.

“The thing that really sucks is I have no idea and we have no idea. The uni has said that they will not speak to students,” Fan said.

Fan would like to see the university focused on helping its students.

“I think in the first week [after the proposal was announced] everyone was hard panicking. I think a lot of people missed lectures because they didn’t have energy.”

‘Financial sustainability is urgent,’ university says
In a statement, Professor Ray Geor, pro vice-chancellor for Massey’s College of Sciences, said the university’s financial statements were inspected and approved by Audit NZ.

“During a financial year, it is expected there could be adjustments. Additionally, during the close-inspection focus of the proposal for change processes, we expect there will be refinements of information,” Professor Geor said.

“Organisational finances are never static. However, we are confident that adjustments will be minor and not substantive to the financial drivers for the need for a proposal for change,” he said.

“As we are funded by taxpayers, part of being a financially responsible organisation is exploring revenue streams, as many tertiary education providers are doing within New Zealand.

“Staff can provide avenues for exploration and the College of Sciences will consider all feedback. However, the need to reduce costs and generate income to ensure financial sustainability is urgent for this year and for the near term — 2024-2027.”

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/10/18/massey-university-science-staff-students-fight-for-jobs-and-studies/feed/ 0 435135
Why Big Tech, Cops, and Spies Were Made for One Another https://www.radiofree.org/2023/10/16/why-big-tech-cops-and-spies-were-made-for-one-another/ https://www.radiofree.org/2023/10/16/why-big-tech-cops-and-spies-were-made-for-one-another/#respond Mon, 16 Oct 2023 10:00:00 +0000 https://theintercept.com/?p=447464
Illustration: Jovana Mugosa for The Intercept

Cory Doctorow’s latest book is “The Internet Con: How to Seize the Means of Computation.

The techlash has finally reached the courts. Amazon’s in court. Google’s in court. Apple’s under EU investigation. The French authorities just kicked down Nvidia’s doors and went through their files looking for evidence of crimes against competition. People are pissed at tech: about moderation, about monopolization, about price gouging, about labor abuses, and — everywhere and always — about privacy.

From experience, I can tell you that Silicon Valley techies are pretty sanguine about commercial surveillance: “Why should I care if Google wants to show me better ads?” But they are much less cool about government spying: “The NSA? Those are the losers who weren’t smart enough to get an interview at Google.”

And likewise from experience, I can tell you that government employees and contractors are pretty cool with state surveillance: “Why would I worry about the NSA spying on me? I already gave the Office of Personnel Management a comprehensive dossier of all possible kompromat in my past when I got my security clearance.” But they are far less cool with commercial surveillance: “Google? Those creeps would sell their mothers for a nickel. To the Chinese.”

What are they both missing? That American surveillance is a public-private partnership: a symbiosis between a concentrated tech sector that has the means, motive, and opportunity to spy on every person in the world and a state that loves surveillance as much as it hates checks and balances.

Big Tech, cops, and surveillance agencies were made for one another.

The Privacy Deficit

America has a privacy law deficit. While U.S. trading rivals like the EU and even China have enacted muscular privacy laws in response to digital commercial surveillance, the U.S. has slept through a quarter-century of increasing corporate spying without any federal legislative action.

It’s really something. America has stronger laws protecting you from video store clerks who gossip about your porn rentals than we do protecting you from digital spies who nonconsensually follow you into an abortion clinic and then sell the data.

In place of democratically accountable privacy laws, we have the imperial fiat of giant tech companies. Apple unilaterally decided that in-app surveillance should be limited to instances in which users explicitly opted in. Unsurprisingly, more than 96 percent of iOS users did not opt into surveillance (presumably the remaining 4 percent were either confused, or Facebook employees, or both).

When Apple finally allowed its users to block Facebook surveillance, they cut off a torrent of valuable data that Facebook had nonconsensually acquired from Apple device owners, without those owners’ permission. But — crucially — it was Apple that decided when consent was and wasn’t needed to spy on it customers. After 96 percent of iOS device owners opted out of Facebook spying, Apple continued to spy on those users, in precisely the same way that Facebook had, without telling them, and when they were caught doing it, they lied about it.

Which raises a question: Why don’t Apple customers simply block Apple’s surveillance? Why don’t they install software that prevents their devices from ratting them out to Apple? Because that would be illegal. Very, very illegal.

One in four web users has installed an ad blocker (which also blocks commercial surveillance). It’s the “biggest boycott in world history.” The reason you can modify your browser to ignore demands from servers to fetch ads — and reveal facts about you in the process — is that the web is an “open platform.” All the major browsers have robust interfaces for aftermarket blockers to plug into, and they’re also all open source, meaning that if a browser vendor restricts those interfaces to make it harder to block ads, other companies can “fork the code” to bypass those restrictions.

By contrast, apps are encrypted, which triggers a quarter-century-old law: the Digital Millennium Copyright Act of 1998, whose Section 1201 makes it a felony to provide someone with a tool to bypass an “access control” for a copyrighted work. By encrypting apps and locking the keys away from the device owner, Apple can make it a crime for you to reconfigure your own phone to protect your privacy, with penalties of a five-year prison sentence and a $500,000 fine — for a first offense.

The Rise of Big Tech

An app is best understood as “a webpage wrapped in just enough IP to make it a crime to install an ad blocker” (or anything else the app’s shareholders disapprove of).

DMCA 1201 is only one of a slew of laws that restrict the ability of technology users to modify the tools they own and use to favor their interests over manufacturers’: laws governing cybersecurity, trademarks, patents, contracts, and other legal constructs can be woven together to block the normal activities that the tech giants themselves once pursued.

Yes, there was a time when tech companies waged guerrilla warfare upon one another: reverse-engineering, scraping, and hacking each others’ products so that disgruntled users could switch from one service to another without incurring steep switching costs. For example, Facebook offered departing MySpace users a “bot” that would impersonate them to MySpace, scrape their inboxes, and import the messages to Facebook so users could maintain contact with friends they’d left behind on the older platform.

That all changed as tech consolidated, shrinking the internet to what software developer Tom Eastman calls “five giant websites, filled with screenshots of text from the other four.” This consolidation was not unique to tech. The 40-year drawdown of antitrust has led to mass consolidation across nearly every sector of the global economy, from bottle caps to banking. Tech companies merged, gobbled up hundreds of small startups, and burned billions of investor dollars offering products and services below cost, making it impossible for anyone else to get a foothold.

Tech was the first industry born in the post-antitrust age. The Apple ][+ hit shelves the same year Ronald Reagan hit the campaign trail. When tech hit its first inter-industry squabble, jousting with the much more mature and concentrated entertainment industry during the Napster wars of the early 2000s, it was trounced, losing every court, regulatory, and legislative fight.

By all rights, tech should have won those fights. After all, the tech sector in the go-go early internet years was massive, an order of magnitude larger than the entertainment companies challenging them in the halls of power. But Big Content was well-established, having boiled itself down to seven or so companies (depending on how you count), while tech was still a rabble of hundreds of small and medium-sized companies that couldn’t agree on its legislative priorities. Tech couldn’t even agree on the catering for a meeting where these priorities might be debated. Concentrated sectors find it comparatively easy to come to agreements, including agreements about what to tell Congress and federal judges. And since those concentrated sectors also find it easy to agree on whose turf belongs to whom, they are able to avoid the “wasteful competition” that erodes their profit margins, leaving them with vast war chests with which to pursue their legislative agenda.

As tech consolidated, it began to feel its oats. Narrow interpretations of existing laws were broadened. New, absurd gambits were invented and then accepted by authorities with straight faces.

Just as important as the new laws that tech got for itself were the laws they kept at bay. Labor laws were treated as nonexistent, provided that your boss was an app. Consumer protection laws were likewise jettisoned.

And, of course, the U.S. never passed a federal privacy law, and the EU struggled to enforce its privacy law.

Slide showing companies participating in the PRISM program and the types of data they provide.

Slide showing companies participating in the Prism program and the types of data they provide.

National Security Agency, public domain, via Wikimedia Commons

Cops and Spies

Concentrated sectors of large, highly profitable firms inevitably seek to fuse their power with that of the state, securing from government forbearance for their own actions and prohibitions on the activities they disfavor. When it comes to surveillance, the tech sector has powerful allies in government: cops and spies.

It goes without saying that cops and spies love commercial surveillance. The very first Snowden revelation concerned a public-private surveillance partnership called Prism, in which the NSA plundered large internet companies’ data with their knowledge and cooperation. The subsequent revelation about the “Upstream” program revealed that the NSA was also plundering tech giants’ data without their knowledge, and using Prism as a “plausible deniability” fig leaf so that the tech firms didn’t get suspicious when the NSA acted on its stolen intelligence.

No government agency could ever hope to match the efficiency and scale of commercial surveillance. The NSA couldn’t order us to carry pocket location beacons at all times — hell, the Centers for Disease Control and Prevention couldn’t even get us to run an exposure notification app in the early days of the Covid pandemic. No government agency could order us to put all our conversations in writing to be captured, stored, and mined. And not even the U.S. government could afford to run the data centers and software development to store and make sense of it all.

Meanwhile, the private sector relies on cops and spies to go to bat for them, lobbying against new privacy laws and for lax enforcement of existing ones. Think of Amazon’s Ring cameras, which have blanketed entire neighborhoods in CCTV surveillance, which Ring shares with law enforcement agencies, sometimes without the consent or knowledge of the cameras’ owners. Ring marketing recruits cops as street teams, showering them with freebies to distribute to local homeowners.

And when local activists and town councils ponder limitations on this kind of commercial surveillance, the cops go to bat for Ring, insisting that every citizen should have the inalienable right to contribute to an off-the-books video surveillance grid that the cops can access at will.

Google, for its part, has managed to play both sides of the culture war with its location surveillance, thanks to the “reverse warrants” that cops have used to identify all the participants at both Black Lives Matter protests and the January 6 coup.

Distinguishing between state and private surveillance is a fool’s errand. Cops and spies need the surveillance industry, and the surveillance industry needs cops and spies. Since the days of the East India Company, monopolists have understood the importance of recruiting powerful state actors to go to bat for commercial interests.

AT&T — the central node in the Snowden revelations — has been playing this game for a century, foiling regulators attempts to break up its monopoly for 69 years before the Department of Justice finally eked out a win in 1982 (whereupon antitrust was promptly neutered, allowing the “Baby Bells” to merge into new monopolies like Verizon).

In the 1950s, AT&T came within a whisker of being broken up, but the Pentagon stepped up to defend Ma Bell, telling the Justice Department that America would lose the Korean War if they didn’t have an intact AT&T to supply and operate their high-tech backend. America lost the Korean War, but AT&T won: It got a 30-year reprieve.

Stumping for his eponymous antitrust law in 1890, Sen. John Sherman thundered, “If we will not endure a King as a political power we should not endure a King over the production, transportation, and sale of the necessaries of life. If we would not submit to an emperor we should not submit to an autocrat of trade.”

Today, as our snoopy tech firms hide in the skirts of our spies and law enforcement agencies, we have to get beyond the idea that this is surveillance capitalism. Truly, it’s more akin to surveillance mercantilism: a fusion of state and commercial power.

Join The Conversation


This content originally appeared on The Intercept and was authored by Cory Doctorow.

]]>
https://www.radiofree.org/2023/10/16/why-big-tech-cops-and-spies-were-made-for-one-another/feed/ 0 434584
Why Big Tech, Cops, and Spies Were Made for One Another https://www.radiofree.org/2023/10/16/why-big-tech-cops-and-spies-were-made-for-one-another-2/ https://www.radiofree.org/2023/10/16/why-big-tech-cops-and-spies-were-made-for-one-another-2/#respond Mon, 16 Oct 2023 10:00:00 +0000 https://theintercept.com/?p=447464
Illustration: Jovana Mugosa for The Intercept

Cory Doctorow’s latest book is “The Internet Con: How to Seize the Means of Computation.

The techlash has finally reached the courts. Amazon’s in court. Google’s in court. Apple’s under EU investigation. The French authorities just kicked down Nvidia’s doors and went through their files looking for evidence of crimes against competition. People are pissed at tech: about moderation, about monopolization, about price gouging, about labor abuses, and — everywhere and always — about privacy.

From experience, I can tell you that Silicon Valley techies are pretty sanguine about commercial surveillance: “Why should I care if Google wants to show me better ads?” But they are much less cool about government spying: “The NSA? Those are the losers who weren’t smart enough to get an interview at Google.”

And likewise from experience, I can tell you that government employees and contractors are pretty cool with state surveillance: “Why would I worry about the NSA spying on me? I already gave the Office of Personnel Management a comprehensive dossier of all possible kompromat in my past when I got my security clearance.” But they are far less cool with commercial surveillance: “Google? Those creeps would sell their mothers for a nickel. To the Chinese.”

What are they both missing? That American surveillance is a public-private partnership: a symbiosis between a concentrated tech sector that has the means, motive, and opportunity to spy on every person in the world and a state that loves surveillance as much as it hates checks and balances.

Big Tech, cops, and surveillance agencies were made for one another.

The Privacy Deficit

America has a privacy law deficit. While U.S. trading rivals like the EU and even China have enacted muscular privacy laws in response to digital commercial surveillance, the U.S. has slept through a quarter-century of increasing corporate spying without any federal legislative action.

It’s really something. America has stronger laws protecting you from video store clerks who gossip about your porn rentals than we do protecting you from digital spies who nonconsensually follow you into an abortion clinic and then sell the data.

In place of democratically accountable privacy laws, we have the imperial fiat of giant tech companies. Apple unilaterally decided that in-app surveillance should be limited to instances in which users explicitly opted in. Unsurprisingly, more than 96 percent of iOS users did not opt into surveillance (presumably the remaining 4 percent were either confused, or Facebook employees, or both).

When Apple finally allowed its users to block Facebook surveillance, they cut off a torrent of valuable data that Facebook had nonconsensually acquired from Apple device owners, without those owners’ permission. But — crucially — it was Apple that decided when consent was and wasn’t needed to spy on it customers. After 96 percent of iOS device owners opted out of Facebook spying, Apple continued to spy on those users, in precisely the same way that Facebook had, without telling them, and when they were caught doing it, they lied about it.

Which raises a question: Why don’t Apple customers simply block Apple’s surveillance? Why don’t they install software that prevents their devices from ratting them out to Apple? Because that would be illegal. Very, very illegal.

One in four web users has installed an ad blocker (which also blocks commercial surveillance). It’s the “biggest boycott in world history.” The reason you can modify your browser to ignore demands from servers to fetch ads — and reveal facts about you in the process — is that the web is an “open platform.” All the major browsers have robust interfaces for aftermarket blockers to plug into, and they’re also all open source, meaning that if a browser vendor restricts those interfaces to make it harder to block ads, other companies can “fork the code” to bypass those restrictions.

By contrast, apps are encrypted, which triggers a quarter-century-old law: the Digital Millennium Copyright Act of 1998, whose Section 1201 makes it a felony to provide someone with a tool to bypass an “access control” for a copyrighted work. By encrypting apps and locking the keys away from the device owner, Apple can make it a crime for you to reconfigure your own phone to protect your privacy, with penalties of a five-year prison sentence and a $500,000 fine — for a first offense.

The Rise of Big Tech

An app is best understood as “a webpage wrapped in just enough IP to make it a crime to install an ad blocker” (or anything else the app’s shareholders disapprove of).

DMCA 1201 is only one of a slew of laws that restrict the ability of technology users to modify the tools they own and use to favor their interests over manufacturers’: laws governing cybersecurity, trademarks, patents, contracts, and other legal constructs can be woven together to block the normal activities that the tech giants themselves once pursued.

Yes, there was a time when tech companies waged guerrilla warfare upon one another: reverse-engineering, scraping, and hacking each others’ products so that disgruntled users could switch from one service to another without incurring steep switching costs. For example, Facebook offered departing MySpace users a “bot” that would impersonate them to MySpace, scrape their inboxes, and import the messages to Facebook so users could maintain contact with friends they’d left behind on the older platform.

That all changed as tech consolidated, shrinking the internet to what software developer Tom Eastman calls “five giant websites, filled with screenshots of text from the other four.” This consolidation was not unique to tech. The 40-year drawdown of antitrust has led to mass consolidation across nearly every sector of the global economy, from bottle caps to banking. Tech companies merged, gobbled up hundreds of small startups, and burned billions of investor dollars offering products and services below cost, making it impossible for anyone else to get a foothold.

Tech was the first industry born in the post-antitrust age. The Apple ][+ hit shelves the same year Ronald Reagan hit the campaign trail. When tech hit its first inter-industry squabble, jousting with the much more mature and concentrated entertainment industry during the Napster wars of the early 2000s, it was trounced, losing every court, regulatory, and legislative fight.

By all rights, tech should have won those fights. After all, the tech sector in the go-go early internet years was massive, an order of magnitude larger than the entertainment companies challenging them in the halls of power. But Big Content was well-established, having boiled itself down to seven or so companies (depending on how you count), while tech was still a rabble of hundreds of small and medium-sized companies that couldn’t agree on its legislative priorities. Tech couldn’t even agree on the catering for a meeting where these priorities might be debated. Concentrated sectors find it comparatively easy to come to agreements, including agreements about what to tell Congress and federal judges. And since those concentrated sectors also find it easy to agree on whose turf belongs to whom, they are able to avoid the “wasteful competition” that erodes their profit margins, leaving them with vast war chests with which to pursue their legislative agenda.

As tech consolidated, it began to feel its oats. Narrow interpretations of existing laws were broadened. New, absurd gambits were invented and then accepted by authorities with straight faces.

Just as important as the new laws that tech got for itself were the laws they kept at bay. Labor laws were treated as nonexistent, provided that your boss was an app. Consumer protection laws were likewise jettisoned.

And, of course, the U.S. never passed a federal privacy law, and the EU struggled to enforce its privacy law.

Slide showing companies participating in the PRISM program and the types of data they provide.

Slide showing companies participating in the Prism program and the types of data they provide.

National Security Agency, public domain, via Wikimedia Commons

Cops and Spies

Concentrated sectors of large, highly profitable firms inevitably seek to fuse their power with that of the state, securing from government forbearance for their own actions and prohibitions on the activities they disfavor. When it comes to surveillance, the tech sector has powerful allies in government: cops and spies.

It goes without saying that cops and spies love commercial surveillance. The very first Snowden revelation concerned a public-private surveillance partnership called Prism, in which the NSA plundered large internet companies’ data with their knowledge and cooperation. The subsequent revelation about the “Upstream” program revealed that the NSA was also plundering tech giants’ data without their knowledge, and using Prism as a “plausible deniability” fig leaf so that the tech firms didn’t get suspicious when the NSA acted on its stolen intelligence.

No government agency could ever hope to match the efficiency and scale of commercial surveillance. The NSA couldn’t order us to carry pocket location beacons at all times — hell, the Centers for Disease Control and Prevention couldn’t even get us to run an exposure notification app in the early days of the Covid pandemic. No government agency could order us to put all our conversations in writing to be captured, stored, and mined. And not even the U.S. government could afford to run the data centers and software development to store and make sense of it all.

Meanwhile, the private sector relies on cops and spies to go to bat for them, lobbying against new privacy laws and for lax enforcement of existing ones. Think of Amazon’s Ring cameras, which have blanketed entire neighborhoods in CCTV surveillance, which Ring shares with law enforcement agencies, sometimes without the consent or knowledge of the cameras’ owners. Ring marketing recruits cops as street teams, showering them with freebies to distribute to local homeowners.

And when local activists and town councils ponder limitations on this kind of commercial surveillance, the cops go to bat for Ring, insisting that every citizen should have the inalienable right to contribute to an off-the-books video surveillance grid that the cops can access at will.

Google, for its part, has managed to play both sides of the culture war with its location surveillance, thanks to the “reverse warrants” that cops have used to identify all the participants at both Black Lives Matter protests and the January 6 coup.

Distinguishing between state and private surveillance is a fool’s errand. Cops and spies need the surveillance industry, and the surveillance industry needs cops and spies. Since the days of the East India Company, monopolists have understood the importance of recruiting powerful state actors to go to bat for commercial interests.

AT&T — the central node in the Snowden revelations — has been playing this game for a century, foiling regulators attempts to break up its monopoly for 69 years before the Department of Justice finally eked out a win in 1982 (whereupon antitrust was promptly neutered, allowing the “Baby Bells” to merge into new monopolies like Verizon).

In the 1950s, AT&T came within a whisker of being broken up, but the Pentagon stepped up to defend Ma Bell, telling the Justice Department that America would lose the Korean War if they didn’t have an intact AT&T to supply and operate their high-tech backend. America lost the Korean War, but AT&T won: It got a 30-year reprieve.

Stumping for his eponymous antitrust law in 1890, Sen. John Sherman thundered, “If we will not endure a King as a political power we should not endure a King over the production, transportation, and sale of the necessaries of life. If we would not submit to an emperor we should not submit to an autocrat of trade.”

Today, as our snoopy tech firms hide in the skirts of our spies and law enforcement agencies, we have to get beyond the idea that this is surveillance capitalism. Truly, it’s more akin to surveillance mercantilism: a fusion of state and commercial power.

Join The Conversation


This content originally appeared on The Intercept and was authored by Cory Doctorow.

]]>
https://www.radiofree.org/2023/10/16/why-big-tech-cops-and-spies-were-made-for-one-another-2/feed/ 0 434585
Israel Warns Palestinians on Facebook — But Bombings Decimated Gaza Internet Access https://www.radiofree.org/2023/10/13/israel-warns-palestinians-on-facebook-but-bombings-decimated-gaza-internet-access/ https://www.radiofree.org/2023/10/13/israel-warns-palestinians-on-facebook-but-bombings-decimated-gaza-internet-access/#respond Fri, 13 Oct 2023 00:00:08 +0000 https://theintercept.com/?p=447530

Amid a heavy retaliatory air and artillery assault by Israel against the Gaza Strip on October 10, Israel Defense Forces spokesperson Avichay Adraee posted a message on Facebook to residents of the al-Daraj neighborhood, urging them to leave their homes in advance of impending airstrikes.

It’s not clear how most people in al-Daraj were supposed to see the warning: Intense fighting and electrical shortages have strangled Palestinian access to the internet, putting besieged civilians at even greater risk.

Following Hamas’s grisly surprise attack across the Gaza border on October 7, the Israeli counterattack — a widespread and indiscriminate bombardment of the besieged Gaza Strip — left the two million Palestinians who call the area home struggling to connect to the internet at a time when access to current information is crucial and potentially lifesaving.

“Shutting down the internet in armed conflict is putting civilians at risk.”

“Shutting down the internet in armed conflict is putting civilians at risk,” Deborah Brown, a senior researcher at Human Rights Watch, told The Intercept. “It could help contribute to injury or death because people communicate around what are safe places and conditions.”

According to companies and research organizations that monitor the global flow of internet traffic, Gazan access to the internet has dramatically dropped since Israeli strikes began, with data service cut entirely for some customers.

“My sense is that very few people in Gaza have internet service,” Doug Madory of the internet monitoring firm Kentik told The Intercept. Madory said he spoke to a contact working with an internet service provider, or ISP, in Gaza who told him that internet access has been reduced by 80 to 90 percent because of a lack of fuel and power, and airstrikes.

As causes of the outages, Marwa Fatafta, a policy analyst with the digital rights group Access Now, cited Israeli strikes against office buildings housing Gazan telecommunications firms, such as the now-demolished Al-Watan Tower, as a major factor, in addition to damage to the electrical grid.

Fatafta told The Intercept, “There is a near complete information blackout from Gaza.”

Most Gaza ISPs Are Gone

With communications infrastructure left in rubble, Gazans now increasingly find themselves in a digital void at a time when data access is most crucial.

“People in Gaza need access to the internet and telecommunications to check on their family and loved ones, seek life-saving information amidst the ongoing Israeli barrage on the strip; it’s crucial to document the war crimes and human rights abuses committed by Israeli forces at a time when disinformation is going haywire on social media,” Fatafta said.

“There is some slight connectivity,” Alp Toker of the internet outage monitoring firm NetBlocks told The Intercept, but “most of the ISPs based inside of Gaza are gone.”

Though it’s difficult to be certain whether these outages are due to electrical shortages, Israeli ordnance, or both, Toker said that, based on reports he has received from Gazan internet providers, the root cause is the Israeli destruction of fiber optic cables connecting Gaza. The ISPs are generally aware of where their infrastructure is damaged or destroyed, Toker said, but ongoing Israeli airstrikes will make sending a crew to patch them too dangerous to attempt. Still, one popular Gazan internet provider, Fusion, wrote in a Facebook post to its customers that efforts to repair damaged infrastructure were ongoing.

That Gazan internet access remains in place at all, Toker said, is probably due to the use of backup generators that could soon run out of fuel in the face of an intensified Israeli military blockade. (Toker also said that, while it’s unclear if it was due to damage from Hamas rockets or a manual blackout, NetBlocks detected an internet service disruption inside Israel at the start of the attack, but that it quickly subsided.)

Amanda Meng, a research scientist at Georgia Tech who works on the university’s Internet Outage Detection and Analysis project, or IODA, estimated Gazan internet connectivity has dropped by around 55 percent in the recent days, meaning over half the networks inside Gaza have gone dark and no longer respond to the outside internet. Meng compared this level of access disruption to what’s been previously observed in Ukraine and Sudan during recent warfare in those countries. In Gaza, Border Gateway Protocol activity, an obscure system that routes data from one computer to another and undergirds the entire internet, has also seen disruptions.

“On the ground, this looks like people not being able to use networked communication devices that rely on the Internet,” Meng explained.

Organizations like NetBlocks and IODA all used varying techniques to measure internet traffic, and their results tend to vary. It’s also nearly impossible to tell from the other side of the world whether a sudden dip in service is due to an explosion or something else. In addition to methodological differences and the fog of war, however, is an added wrinkle: Like almost everything else in Gaza, ISPs connect to the broader internet through Israeli infrastructure.

“By law, Gaza internet connectivity must go through Israeli infrastructure to connect to the outside world, so there is a possibility that the Israelis could leave it up because they are able to intercept communications,” said Madory of Kentik.

Fatafta, the policy analyst, also cited Israel’s power to keep Gaza offline — but both in this war and in general. “Israel’s full control of Palestinian telecommunications infrastructure and long-standing ban on technology upgrades” is an immense impediment, she said. With the wider internet blockaded, she said, “people in Gaza can only access slow and unreliable 2G services” — a cellular standard from 1991.

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/10/13/israel-warns-palestinians-on-facebook-but-bombings-decimated-gaza-internet-access/feed/ 0 433906
TikTok, Instagram Target Outlet Covering Israel–Palestine Amid Siege on Gaza https://www.radiofree.org/2023/10/11/tiktok-instagram-target-outlet-covering-israel-palestine-amid-siege-on-gaza/ https://www.radiofree.org/2023/10/11/tiktok-instagram-target-outlet-covering-israel-palestine-amid-siege-on-gaza/#respond Wed, 11 Oct 2023 17:44:06 +0000 https://theintercept.com/?p=447300

As Israel escalates its bombardment of the Gaza Strip in retaliation for a surprise attack from Hamas, TikTok and Instagram have come after a news site dedicated to providing coverage on Palestine and Israel.

On Tuesday, a Mondoweiss West Bank correspondent’s Instagram account was suspended, while the news outlet’s TikTok account was temporarily taken down on Monday. Other Instagram users have reported restrictions on their accounts after posting about Palestine, including an inability to livestream or to comment on other’s posts. And on Instagram and Facebook (both owned by the same company, Meta), hashtags relating to Hamas and “Al-Aqsa Flood,” the group’s name for its attack on Israel, are being hidden from search. The death toll from the attack continues to rise, with Israeli officials reporting 1,200 deaths as of Wednesday afternoon.

The platforms’ targeting of accounts reporting on Palestine comes as information from people in Gaza is harder to come by amid Israel’s total siege on its 2 million residents and as Israel keeps foreign media out of the coastal enclave. Israel’s indiscriminate bombing campaign has killed more than 1,100 people and injured thousands more, Gaza’s Health Ministry said Wednesday.

Periods of Israeli–Palestinian violence have regularly resulted in the corporate suppression of Palestinian social media users. In 2021, for instance, Instagram temporarily censored posts that mentioned Jerusalem’s Al-Aqsa Mosque, one of Islam’s most revered sites. Social media policy observers have criticized Meta’s censorship policies on the grounds that they unduly affect Palestinian users while granting leeway to civilian populations in other conflict zones.

“The censorship of Palestinian voices, those who support Palestine, and alternative news media who report on the crimes of Israel’s occupation, by social media networks and giants like Meta and TikTok is well documented,” said Yumna Patel, Palestine news director of Mondoweiss, noting that it includes account bans, content removal, and even limiting the reach of posts. “We often see these violations become more frequent during times like this, where there is an uptick in violence and international attention on Palestine. We saw it with the censorship of Palestinian accounts on Instagram during the Sheikh Jarrah protests in 2021, the Israeli army’s deadly raids on Jenin in the West Bank in 2023, and now once again as Israel declares war on Gaza.”

Instagram and TikTok did not respond to requests for comment. 

Mondoweiss correspondent Leila Warah, who is based in the West Bank, reported on Tuesday that Instagram suspended her account and gave her 180 days to appeal, with the possibility of permanent suspension. After Mondoweiss publicized the suspension, her account was quickly reinstated. Later in the day, however, Mondoweiss reported that Warah’s account was suspended once again, only to be reinstated on Wednesday. 

The news outlet tweeted that the first suspension came “after several Israeli soldiers shared Leila’s account on Facebook pages, asking others to submit fraudulent reports of guideline violations.” 

A day earlier, the outlet tweeted that its TikTok account was “permanently banned” amid its “ongoing coverage of the events in Palestine.” Since the outbreak of war on Saturday, the outlet had posted a viral video about Hamas’s attack on Israel and another about Hamas’s abduction of Israeli civilians. Again, within a couple of hours, and after Mondoweiss publicized the ban, the outlet’s account was back up. 

“We have consistently reviewed all communication from TikTok regarding the content we publish there and made adjustments if necessary,” the outlet wrote. The magazine’s staff did not believe they violated any TikTok guidelines in their coverage in recent days. “This can only be seen as censorship of news coverage that is critical of the prevailing narratives around the events unfolding in Palestine.”

Even though the account has been reinstated, Mondoweiss’s first viral TikTok about the eruption of violence cannot be viewed in the West Bank and some parts of Europe, according to the outlet. Other West Bank residents independently confirmed to The Intercept that they could not access the video, in which Warah describes Hamas’s attack and Israel’s bombing of Gaza as a result, connecting the assault to Israel’s ongoing 16-year siege of Gaza. TikTok did not respond to The Intercept’s questions about access to the video. 

On Instagram, meanwhile, Palestinian creator Adnan Barq reported that the platform blocked him from livestreaming, removed his content, and even prevented his account from being shown to users who don’t follow him. Also on Instagram, hashtags including #alqsaflood and #hamas are being suppressed; Facebook is suppressing Arabic-language hashtags of the operation’s name too. On paper, Meta’s rules prohibit glorifying Hamas’s violence, but they do not bar users from discussing the group in the context of the news, though the distinction is often collapsed in the real world.

Last year, following a spate of Israeli airstrikes against the Gaza Strip, Palestinian users who photographed the destruction on Instagram complained that their posts were being removed for violating Meta’s “community standards,” while Ukrainian users had received a special carve-out to post similar imagery on the grounds it was “newsworthy.” 

A September 2022 external audit commissioned by Meta found the company’s rulebook “had an adverse human rights impact … on the rights of Palestinian users to freedom of expression, freedom of assembly, political participation, and non-discrimination, and therefore on the ability of Palestinians to share information and insights about their experiences as they occurred.” Similarly, Meta’s Dangerous Organizations and Individuals policy, which maintains a secret blacklist of banned organizations and people, is disproportionately made up of Muslim, Middle Eastern, and South Asian entities, a factor that contributed to over-enforcement against Palestinians.

Big Tech’s content moderation during conflict is increasingly significant as unverified information runs rampant on X, Elon Musk’s information free-for-all diluted version of Twitter, once a crucial source during breaking news events. Musk himself has led his 160 million followers astray, encouraging users on Sunday to follow @WarMonitors and @sentdefender to learn about the war “in real-time.” The former account had posted things like “mind your own business, jew,” while the latter mocked Palestinian civilians trapped from Israel’s siege, writing, “Better find a Boat or get to Swimming lol.” And both have previously circulated fake news, such as false reports of an explosion at the Pentagon in May.

Musk later deleted his post endorsing the accounts.

For now, Musk’s innovative Community Notes fact-checking operation is leaving lies unchallenged for days during a time when decisions and snap judgments are made by the minute. And that says nothing of inflammatory content on X and elsewhere. “In the past few days we have seen open calls for genocide and mass violence against [Palestinians] and Arabs made by official Israeli social media accounts, and parroted by Zionist accounts and pro-Israel bots on platforms like X with absolutely no consequence,” Mondoweiss’s Patel said. “Meanwhile Palestinian journalists & news outlets have had their accounts outright suspended on Instagram and Tiktok simply for reporting the news.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Prem Thakker.

]]>
https://www.radiofree.org/2023/10/11/tiktok-instagram-target-outlet-covering-israel-palestine-amid-siege-on-gaza/feed/ 0 433569
Southeast Asian Casinos Emerge as Major Enablers of Global Cybercrime https://www.radiofree.org/2023/10/05/southeast-asian-casinos-emerge-as-major-enablers-of-global-cybercrime/ https://www.radiofree.org/2023/10/05/southeast-asian-casinos-emerge-as-major-enablers-of-global-cybercrime/#respond Thu, 05 Oct 2023 09:00:00 +0000 https://www.propublica.org/article/casinos-cambodia-myanmar-laos-southeast-asia-fraud-cybercrime by Cezary Podkul

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Mr. Big had a problem. He needed to move what he called “fraud funds” back to China, but a crackdown was making that difficult. So in August, Mr. Big, who, needless to say, did not list his real name, posted an ad on a Telegram channel. He sought a “group of smuggling teams” to, as he put it, “complete the final conversion” of the stolen money by smuggling gold and precious stones from Myanmar into southern China, in exchange for a 10% cut.

It’s unclear whether Mr. Big ultimately succeeded; his ad has since been deleted, and ProPublica was unable to reach him. But the online forum where he posted his ad says a lot about why Americans and people around the world have found themselves targeted by an unprecedented wave of fraud originating out of Southeast Asia, whose vast scale is now becoming apparent. In a single recent criminal investigation, Singapore police seized more than $2 billion in money laundered from a syndicate with alleged ties to organized crime, including “scams and online gambling.”

The Telegram channel that featured Mr. Big’s plea for assistance was a Chinese-language forum offering access to “white capital” — money that has been laundered — “guaranteed” by a casino operator in Myanmar, Fully Light Group, that purports to ensure that deals struck on the forum go through. Fully Light also operates its own Telegram channels that advertise similar services. One such channel, with 117,000 participants, featured offers to swap cryptocurrency for “pure white” Chinese renminbi or “white capital” Singaporean dollars. (Telegram took down that channel after ProPublica inquired about it. Fully Light did not respond to requests for comment.)

The presence of a casino in facilitating such deals is no coincidence. A growing number of gambling operations across Southeast Asia have become key pillars in a vast underground banking system serving organized criminal groups, according to new research by the United Nations Office on Drugs and Crime. The research has not been published, but the agency shared its findings with ProPublica.

There are now over 340 physical casinos across Southeast Asia (as well as countless online ones), and many of them show accelerating levels of infiltration by organized crime, according to the UNODC. The casinos function as “a shadow banking system that allows people to move money quickly, seamlessly, jurisdiction-to-jurisdiction, with almost no restriction,” Jeremy Douglas, UNODC’s top official in Southeast Asia, told ProPublica in September. That has made money laundering “easier than ever before,” he said, and it’s been “fundamental to the expansion of the transnational criminal economy” in the region — especially cybercrime.

As ProPublica reported in detail last year, Southeast Asia has become a major hub for cryptocurrency investment scams that often start as innocent-sounding “wrong number”-type text messages. The messages frequently originate from seedy casino towns in Cambodia, Laos and Myanmar, where criminal syndicates lure workers with the promise of lucrative jobs, only to force them to work as online scammers. UNODC’s map of known or suspected scam compounds shows a clear overlap with gambling hubs in Laos, Myanmar and Cambodia, where allegations of forced online scam labor have become so widespread that they recently prompted Interpol to issue a global warning about the problem, which the international police agency said was occurring on “an industrial scale.”

Gambling has long attracted organized crime, but never more than in Myanmar, Cambodia, Laos and the Philippines, where loose regulations and endemic corruption allow casinos to operate with little oversight or responsibility to report suspicious transactions. Before the COVID-19 pandemic began, officials in those countries wooed Chinese casino operators in an effort to attract foreign direct investment. Criminal bosses, facing a crackdown in China and sanctions imposed by the U.S., began investing in casinos and cutting deals to run their own special economic zones in Myanmar and elsewhere where they could operate unfettered.

When the pandemic struck in 2020, travel restrictions emptied newly built casinos, hotels and offices of workers and visitors across the region. Criminal syndicates repurposed the facilities to house online fraud operations and turned to human smugglers to staff them up. (For example, when Philippine authorities raided several online gambling operators between May and August, they discovered more than 4,400 laborers, most of them human trafficking victims forced to perpetrate online fraud.)

Online casinos can be easily used for money laundering: They often accept cryptocurrency deposits that can be converted to virtual chips and placed in bets or cashed out in currency, making them seem like proceeds of legitimate gambling. That method of money laundering is becoming increasingly common in Southeast Asia.

Physical casinos have their own attractions for money laundering. They have become a draw for a parallel industry of junket operators, who organize gambling trips for high-rollers. Those junkets also attract organized criminal groups that need to move money across borders and do so using junkets’ gambling accounts, according to recent prosecutions by Chinese authorities. Last year, 36 individuals connected to Suncity Group, once one of the biggest junket operators in the world, were convicted in China of facilitating about $160 million in illegal cross-border payments and transactions. The company’s ex-CEO, Alvin Chau, is in jail for running a criminal syndicate and other charges.

In northeast Myanmar, Fully Light Group has emerged as a “multi-billion-dollar business conglomerate and a key player” in casinos and illegal online gambling, according to research by Jason Tower, Myanmar country director for the United States Institute of Peace. “These are not normal casinos in any way,” Tower said, because they’re located in what he calls “criminal enclaves” that are more under the control of organized crime than any government authority. For instance, Tower found hundreds of criminal convictions by Chinese courts related to illegal casinos, fraud, kidnapping, drugs and weapons charges in the Kokang Special Administrative Zone, near Myanmar’s border with China, where Fully Light is based. In its review, UNODC found Kokang casinos — both those owned by Fully Light and by others — also played a major role in money laundering. They operate Telegram channels that openly advertise money laundering services, including some that link back to official Fully Light channels and offer the company’s guarantee to cross-border exchanges of cryptocurrencies. Some Fully Light-affiliated Telegram channels include solicitations to participate in what are known as money mule “motorcades” that move funds through multiple cryptocurrency wallets or bank accounts.

Billions of dollars more are likely flowing into the region, thanks to online scams that show no signs of abating. Nick Smart of the cryptocurrency analytics firm Crystal Blockchain has been tracing the flows of crypto funds deposited into online platforms that are set up to look like investing sites in order to fleece victims. Following the money trail from just one such website, which he suspects to be linked to criminal organizations in Myanmar, led him to a wallet that also pooled funds from 14 other known crypto scams. The wallet received about $44 million in various cryptocurrencies between December and July, when it ceased activity. With thousands of such websites popping up every day, victims’ losses are easily “in the billions,” said Smart, the director of blockchain intelligence at Crystal.

The global cybercrime spree has prompted countries across the region to take a bolder tack. In June, Thailand cut off electricity to two cyberfraud hot spots across its border with Myanmar (with disappointing results). More recently, Thai officials shut down six illegal cellular towers suspected of providing internet service to scam compounds in Myanmar. Chinese authorities have also arrested thousands of their own citizens in dramatic operations that included a humiliating perp walk of hundreds of suspected cybercriminals across a border crossing from Myanmar to China’s southern Yunnan Province on Sept. 6.

On Sept. 26, UNODC unveiled an agreement with China and the 10-member Association of Southeast Asian Nations to jointly combat organized crime and human trafficking linked with casinos and scams. An action plan accompanying the agreement calls on the countries to “make anti-money laundering and wider anti-corruption efforts a higher priority.”

But the challenge is steep. Even as multiple countries crack down, Laos, one of the poorest nations in the region, is getting ready to allow online gambling operators to set up shop within its borders and target foreigners.

And governments need to broaden their focus. Anti-money-laundering regulations often zero in on bank cash transfers of $10,000 or more. The UNODC’s Douglas said governments will need to turn their attention to casinos and other nontraditional financial players. “Everyone’s been focusing on transactions of $10,000 going through banks and flagging suspicious transactions,” Douglas said, “and these guys are moving millions around the corner through the casino, laughing at the system.”


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Cezary Podkul.

]]>
https://www.radiofree.org/2023/10/05/southeast-asian-casinos-emerge-as-major-enablers-of-global-cybercrime/feed/ 0 432099
The rise of ‘dadvocacy’? Inside Seattle’s first Climate Papa playdate https://grist.org/culture/climate-papa-playdate-seattle-parenting-dadvocacy/ https://grist.org/culture/climate-papa-playdate-seattle-parenting-dadvocacy/#respond Wed, 04 Oct 2023 08:30:00 +0000 https://grist.org/?p=619596 Bananas, clementines, and string cheese decorated the table, alongside coloring pages and markers. As half a dozen kids took to the snacks and the nearby playpen, parents stuck name tags on their shirts then quickly fell into deep discussions of what they could do about the unsettling global catastrophe that poses a risk to their children’s well-being and kids everywhere: climate change.

It was the first “Climate Papa” playdate, held at the end of September under the high wooden ceiling of Stoup Brewing, uphill from downtown Seattle. The invitation suggested that the conversation, part of Pacific Northwest Climate Week, might cover “heat pumps and parenthood,” “home electrification and nap schedules,” and “batteries and bottles.” It inspired the attendance of about a dozen adults, divided roughly equally between moms and dads. Anyone was welcome to come to the meetup, provided they weren’t turned off by the labels in the invitation — climate grandpa, climate aunt, climate human.

Also present was the Climate Papa himself, otherwise known as Ben Eidelson. He currently advises climate tech startups and is raising money for Stepchange, a venture fund that invests in software products aimed at tackling climate change. His own startups have been acquired by Stripe and Google, and he spent years working as a product manager for both companies. Eidelson had claimed the domain climatepapa.com in May sort of as a joke, inspired by a group of concerned parents called Climate Dads. But his two children, 2 and 5 years old, don’t call him Dad. They call him Papa, a remnant of his wife Anna’s Russian heritage.

Soon enough, what had started in jest revealed itself to be a mission. Eidelson realized that his son and daughter were his real motivation for doing something about global warming. Climate Papa became a home for his newsletter and podcast, venturing from nerdy (methane removal and financial technology) to cutesy (interviewing a 7-year-old about climate change). It had sparked enough interest to merit an in-person playdate. 

Eidelson makes the case that parenthood is often missing from how people in the tech world talk about climate change. “These things are not separate,” he told me across the table. “The more we separate them, the more we’re dismissing the inherent motivation people have.”

He pointed to groups such as Mothers Against Drunk Driving, founded in 1980 by Candy Lightner, whose daughter had been killed by a drunk driver. Since then, the group has helped cut the number of drunk driving deaths in half — saving an estimated 400,000 lives — by raising awareness that such “accidents” were avoidable and working to pass roughly 1,000 local and national laws related to driving under the influence, playing a role in getting Congress to raise the national drinking age to 21 in 1981.

Moms have long been seen as a force in the climate movement — not necessarily a surprise, since women still tend to be the primary caregivers in the family, and are more likely to embrace environmental causes than men. While dads have been on board behind-the-scenes for a while, they’ve started getting more attention this year. The advocacy group Climate Dads, founded in 2018 by Ben Block and Jason Sandman in Philadelphia, got a wave of attention after a feature in Bloomberg in August. At least 800 dads around the country have joined. (The signup page says: “Interested in getting involved in our dadvocacy for the planet?”) Earlier this year, a poll from Heatmap News found that fathers were particularly amenable to taking public transportation or trying to eat less beef compared to the rest of the population, though the sample size was admittedly small, at around 1,000 people.

It’s widely known that young people are distressed about climate change — an international poll in 2021 found that 45 percent of teens and young adults say anxiety about the warming planet affects their daily lives and ability to function. Of course such concerns touch their parents too, sometimes prompting a twinge of guilt or fear for what the future holds for their children. They might imagine the prospect of their kids confronting them one day, asking them what they did to quell the climate crisis.

The conversation at Stoup Brewing leaned into the kinds of topics you’d expect from climate dads — heat pumps, e-bikes, artificial intelligence. Some at the meetup had recently been laid off from tech companies and were pondering a career path that included climate action. 

Photo of a table with markers, clementines, and a climate papa nametag
Clementines, markers, and a used name tag sit on the table at Seattle’s first Climate Papa meetup, September 27, 2023. Grist / Kate Yoder

Patrick Gold, the director of engineering at the nonprofit Climate Neutral, remarked how rare it was to find a work-related event he could take his daughter to, as his 13-month-old attempted to climb out of his arms and onto the wooden table, perhaps in search of something interesting, like a snack. Everyone here had two things in common, Gold remarked: climate change and babies. For him, that made it worth the drive from Federal Way, half an hour south of Seattle.

Mike Cozart, a father of two from Bainbridge Island, hadn’t thought of himself as a “climate dad” until a few months ago, when he decided to do something about climate change and found Climate Papa online. He thought the idea of the meetup made intuitive sense: Millennials, who have long been lumped into the “younger people who care about climate change” category, are older now, in their 30s and 40s, many with children. 

After recently looking around for a new job, Cozart wasn’t finding roles that excited him. Thinking of his kids, he wanted to find something with a mission and a positive impact, but was having trouble figuring out the details of how to make that transition. “I think there are a number of folks that don’t think there’s a role for them,” he said. Climate change felt like a challenge for scientists or mechanical engineers, the producers of climate models and wind turbines, not for someone in software like him. 

Part of Cozart’s inspiration was finding a guide to software in climate tech, co-written by Eidelson, which makes the case that software engineers are uniquely positioned to address climate change, even though most of them don’t realize it. The idea is that software touches everything, from transportation to groceries, and that innovations in design tools, accounting tools, and data can contribute to decarbonization. 

“[E]very solar engineer needs a tool for designing custom solar systems,” they wrote. “What else is like this? EV charging infrastructure, utility grid design, commercial HVAC systems, battery storage systems, farm management, and so much more!” The guide has been viewed by more than 11,000 people since its publication in June, according to Eidelson.

Eidelson said that he would consider holding another Climate Papa playdate in Seattle — perhaps it could be a quarterly gathering, he suggested — and pondered the idea of trying to get similar meetups started in Portland or the Bay Area, run by his connections in those places. 

Looking back at the event, Eidelson marveled at the fact that he got to talk about working on climate change with people at the same time as meeting their 2-year-old and watching their kids play together. “To me, it’s kind of a dream come true, to have people showing up as their full selves,” he said. “Like, you’re distracted by your kids, they need help peeling an orange, but we’re all in that mode all the time.”

This story was originally published by Grist with the headline The rise of ‘dadvocacy’? Inside Seattle’s first Climate Papa playdate on Oct 4, 2023.


This content originally appeared on Grist and was authored by Kate Yoder.

]]>
https://grist.org/culture/climate-papa-playdate-seattle-parenting-dadvocacy/feed/ 0 431784
NZ election 2023: ‘Too cavalier’ – scientists call out Peters over climate change claims https://www.radiofree.org/2023/10/02/nz-election-2023-too-cavalier-scientists-call-out-peters-over-climate-change-claims/ https://www.radiofree.org/2023/10/02/nz-election-2023-too-cavalier-scientists-call-out-peters-over-climate-change-claims/#respond Mon, 02 Oct 2023 23:23:04 +0000 https://asiapacificreport.nz/?p=93978 By Anneke Smith, RNZ News political reporter

New Zealand First leader Winston Peters has been spreading misleading climate information at public meetings during the Aotearoa general election campaign.

Climate change has been topical during the campaign, with extreme weather events like the Hawke’s Bay floods still fresh in people’s minds.

Both major parties have made clear commitments to New Zealand’s climate targets, while Peters has been questioning the science and sharing incorrect climate information at public meetings.

At a gathering in Remuera last month Peters told voters, “Carbon dioxide is 0.04 percent of the Earth’s atmosphere and of that 0.04 percent, human effect is 3 percent.”

Three climate analysts, including NIWA’s principal climate scientist Dr Sam Dean, have told RNZ this figure is incorrect.

“It is not 3 percent. Humans are responsible for 33 percent of the carbon dioxide that is in the atmosphere now,” Dr Dean said.

Peters also told voters New Zealand was a low-emitting country and tried to link tsunamis to climate change.

“We are 0.17 percent of the emissions in this world and China and India and the United States and Russia are not listening . . .  The biggest tsunami the world ever had was 1968 in recent times.

“We’ve only been keeping stats for the last 100 years, but you’ve got all these people out there saying these are unique circumstances and they haven’t got the scientific evidence to prove that.”

New Zealand First leader Winston Peters speaks at a public meeting at Napier Sailing Club in Napier on 29 September 2023.
Winston Peters is also trying to link tsunamis to climate change . . . “We’ve only been keeping stats for the last 100 years.” Image: RNZ/Samuel Rillstone

Dr Dean said New Zealand might have low net emissions compared to other countries but there was no doubt Aotearoa was a “dirty polluter” — and tsunamis had nothing to do with climate change.

“Proportionately on a per person basis, our emissions are very high and we produce more than our fair share of the pollution that is currently in the planet,” he said.

“As far as we know, tsunamis have nothing to do with climate change whatsoever.”

RNZ put some of Peters’ claims to him, asking him where he got the 3 percent figure he cited about the human impact on CO2.

“Oh, we’ve got somebody now that’s arguing about the basic science . . .  I get it from experts internationally and if you want me to do all your homework, put me on a payroll,” Peters replied.

Dr Dean who is an international expert is not the only scientist to debunk Peters’ climate claims.

University of Waikato environmental science senior lecturer Dr Luke Harrington
University of Waikato environmental science senior lecturer Dr Luke Harrington . . . “Events of such intensity will become more common and events of such rarity will become more intense as the world continues to warm.” Image: University of Waikato/RNZ News

Waikato University’s Dr Luke Harrington and Canterbury University’s Dr David Frame have both looked at Peters’ comments.

They describe his questions about the link between climate change and extreme weather events as “too cavalier” and “disingenuous”.

“Climate change doesn’t cause extreme flooding events in a vacuum — a whole range of natural ingredients need to come together in just the right way for an individual event to occur,” Dr Harrington said.

“What climate change does is intensify the wind and rain which results when these natural factors combine and an ex-tropical cyclone passes nearby. Events of such intensity will become more common and events of such rarity will become more intense as the world continues to warm.”

Dr Harrington suggested Peters “peruse” the Intergovernmental Panel on Climate Change’s Sixth Assessment Report if he needed any evidence.

Dr Frame also referred to this report, saying there are strong links between (cumulative) anthropogenic emissions of CO2 and extreme rainfall events.

Dr Dean said inaccuracies aside, Peters’ figures ignore methane emissions, making the problem seem much smaller than it really is.

“That sort of story comes from the climate sceptic community and it’s a common tactic to phrase things in terms of very small numbers and then mix them up to trivialise the subject.”

Other political parties may have vastly different approaches to emissions reduction but they all accept the climate science.

National Party leader Chris Luxon — who may well have to work with Peters — had been clear there was no room for climate scepticism in this election.

“Give it up, I mean we’re in 2023. There’s no doubt about it. You can’t be climate denier or a climate minimalist,” Luxon said.

This may be a big ask if Winston Peters is not on board with the science.

Early voting began yesterday in the general election and polling day is on October 14.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/10/02/nz-election-2023-too-cavalier-scientists-call-out-peters-over-climate-change-claims/feed/ 0 431477
NZ election 2023: How a better funding model can help media strengthen social cohesion https://www.radiofree.org/2023/10/02/nz-election-2023-how-a-better-funding-model-can-help-media-strengthen-social-cohesion/ https://www.radiofree.org/2023/10/02/nz-election-2023-how-a-better-funding-model-can-help-media-strengthen-social-cohesion/#respond Mon, 02 Oct 2023 13:01:16 +0000 https://asiapacificreport.nz/?p=93956 ANALYSIS: By Myles Thomas

Kia ora koutou. Ko Ngāpuhi tōku iwi. Ko Ngāti Manu toku hapu. Ko Karetu tōku marae. Ko Myles Thomas toku ingoa.

I grew up with David Beatson, on the telly. Back in the 1970s, he read the late news which I watched in bed with my parents. Later, David and I worked together to save TVNZ 7 and also regional TV stations.

The Better Public Media (BPM) trust honours David each year with our memorial address, because his fight for non-commercial TV was an honourable one. He wasn’t doing it for himself.

He wasn’t doing it so he could get a job or because it would benefit him. He fought for public media because he knew it was good for Aotearoa NZ.

Like us at Better Public Media, he recognised the benefits to our country from locally produced public media.

David knew, from a long career in media, including as editor of The Listener and as Jim Bolger’s press secretary, that NZ’s media plays an important role in our nation’s culture, social cohesion, and democracy.

NZ culture is very important. NZ culture is so unique and special, yet it has always been at risk of being swamped by content from overseas. The US especially with its crackpot conspiracies, extreme racial tensions, and extreme tensions about everything to be honest.

Local content the antidote
Local content is the antidote to this. It reflects us, it portrays us, it defines New Zealand, and whether we like it or not, it defines us. But it’s important to remember that what we see reflected back to us comes through a filter.

This speech is coming to you through a filter, called Myles Thomas.

Better Public Media trustee Myles Thomas
Better Public Media trustee Myles Thomas speaking beside the panel moderator and BPM chair Dr Peter Thompson (seated from left); Jenny Marcroft, NZ First candidate for Kaipara ki Mahurangi; Ricardo Menéndez March, Green Party candidate for Mt Albert; and Willie Jackson, Labour Party list candidate and Minister for Broadcasting and Media. Image: David Robie/APR

Commercial news reflects our world through a filter of sensation and danger to hold our attention. That makes NZ seem more shallow, greedy, fearful and dangerous.

The social media filter makes the world seem more angry, reactive and complaining.
RNZ’s filter is, I don’t know, thoughtful, a bit smug, middle class.

The New Zealand Herald filter makes us think every dairy is being ram-raided every night.

And The Spinoff filter suggests NZ is hip, urban and mildly infatuated with Winston Peters.

These cultural reflections are very important actually because they influence us, how we see NZ and its people.

It is not a commodity
That makes content, cultural content, special. It is not a commodity. It’s not milk powder.

We don’t drink milk and think about flooding in Queenstown, drinking milk doesn’t make us laugh about the Koiwoi accent, we don’t drink milk and identify with a young family living in poverty.

Local content is rich and powerful, and important to our society.

When the government supports the local media production industry it is actually supporting the audiences and our culture. Whether it is Te Mangai Paho, or NZ On Air or the NZ Film Commission, and the screen production rebate, these organisations fund New Zealand’s identity and culture, and success.

Don’t ask Treasury how to fund culture. Accountants don’t understand it, they can’t count it and put it in a spreadsheet, like they can milk solids. Of course they’ll say such subsidies or rebates distort the “market”, that’s the whole point. The market doesn’t work for culture.

Moreover, public funding of films and other content fosters a more stable long-term industry, rather than trashy short-termism that is completely vulnerable to outside pressures, like the US writer’s strike.

We have a celebrated content production industry. Our films, video, audio, games etc. More local content brings stability to this industry, which by the way also brings money into the country and fosters tourism.

BPM trust chair Dr Peter Thompson
BPM trust chair Dr Peter Thompson, senior lecturer in media studies at Victoria University, welcomes the panel and audience for the 2023 media policy debate at Grey Lynn Library Hall in Auckland last night. Image: Del Abcede/Asia Pacific Report

We cannot use quota
New Zealand needs more local content.

And what’s more, it needs to be accessible to audiences, on the platforms that they use.

But in NZ we do have one problem. Unlike Australia, we can’t use a quota because our GATT agreement does not include a carve out for local music or media quotas.

In the 1990s when GATT was being negotiated, the Aussies added an exception to their GATT agreement allowing a quota for Aussie cultural content. So they can require radio stations to play a certain amount of local music. Now they’re able to introduce a Netflix quota for up to 20 percent of all revenue generated in Aussie.

We can’t do that. Why? Because back in the 1990s the Bolger government and MFAT decided against putting the same exception into NZ’s GATT agreement.

But there is another way of doing it, if we take a lead from Denmark and many European states. Which I’ll get to in a minute.

The second important benefit of locally produced public media is social cohesion, how society works, the peace and harmony and respect that we show each other in public, depends heavily on the “public sphere”, of which, media is a big part.

Power of media to polarise
Extensive research in Europe and North America shows the power of media to polarise society, which can lead to misunderstanding, mistrust and hatred.

But media can also strengthen social cohesion, particularly for minority communities, and that same research showed that public media, otherwise known as public service media, is widely regarded to be an important contributor to tolerance in society, promoting social cohesion and integrating all communities and generations.

The third benefit is democracy. Very topical at the moment. I’ve already touched on how newsmedia affect our culture. More directly, our newsmedia influences the public dialogue over issues of the day.

It defines that dialogue. It is that dialogue.

So if our newsmedia is shallow and vacuous ignoring policies and focussing on the polls and the horse-race, then politicians who want to be elected, tailor their messages accordingly.

There’s plenty of examples of this such as National’s bootcamp policy, or Labour’s removing GST on food. As policies, neither is effective. But in the simplified 30 seconds of commercial news and headlines, these policies resonate.

Is that a good thing, that policies that are known to fail are nonetheless followed because our newsmedia cater to our base instincts and short attention spans?

Disaster for democracy
In my view, commercial media is actually disaster for democracy. All over the world.

But of course, we can’t control commercial media. No-one’s suggesting that.

The only rational reaction is to provide stronger locally produced public media.

And unfortunately, NZ lacks public media.

Obviously Australia, the UK, Canada have more public media than us, they have more people, they can afford it. But what about countries our size, Ireland? Smaller population, much more public media.

Denmark, Norway, Finland, all with roughly 5 million people, and all have significantly better public media than us. Even after the recent increases from Willie Jackson, NZ still spends just $44 per person on public media. $44 each year.

When we had a licence fee it was $110. Jim Bolger’s government got rid of that and replaced it with funding from general taxation — which means every year the Minister of Finance, working closely with Treasury, decides how much to spend on public media for that year.

This is what I call the curse of annual funding, because it makes funding public media a very political decision.

National, let us be honest, the National Party hates public media, maybe because they get nicer treatment on commercial news. We see this around the world — the Daily Mail, Sky News Australia, Newstalk ZB . . . most commercial media quite openly favours the right.

Systemic bias
This is a systemic bias. Because right-wing newsmedia gets more clicks.

Right-wing politicians are quite happy about that. Why fund public to get in the way? Even if it it benefits our culture, social cohesion, and democracy.

New Zealand is the same, the last National government froze RNZ funding for nine years.

National Party spokesperson on broadcasting Melissa Lee fought against the ANZPM merger, and now she’s fighting the News Bargaining Bill. As minister she could cut RNZ and NZ On Air’s budget.

But it wouldn’t just be cost-cutting. It would actually be political interference in our newsmedia, an attempt to skew the national conversation in favour of the National Party, by favouring commercial media.

So Aotearoa NZ needs two things. More money to be spent on public media, and less control by the politicians. Sustainable funding basically.

The best way to achieve it is a media levy.

Highly targeted tax
For those who don’t know, a levy is a tax that is highly targeted, and we have a lot of them, like the Telecommunications Development Levy (or TDL) which currently gathers $10 million a year from internet service providers like Spark and 2 Degrees to pay for rural broadband.

We’re all paying for better internet for farmers basically. When first introduced by the previous National government it collected $50 million but it’s dropped down a bit lately.

This is one of many levies that we live with and barely notice. Like the levy we pay on our insurance to cover the Earthquake Commission and the Fire and Emergency Levy. There are maritime levies, energy levies to fund EECA and Waka Kotahi, levies on building consents for MBIE, a levy on advertising pays for the ASA, the BSA is funded by a levy.

Lots of levies and they’re very effective.

So who could the media levy, levy?

ISPs like the TDL? Sure, raise the TDL back up to $50 million or perhaps higher, and it only adds a dollar onto everyone’s internet bill. There’s $50 million.

But the real target should be Big Tech, social media and large streaming services. I’m talking about Facebook, Google, Netflix, YouTube and so on. These are the companies that have really profited from the advent of online media, and at the expense of locally produced public media.

Funding content creation
We need a way to get these companies to make, or at least fund, content creation here in Aotearoa. Denmark recently proposed a solution to this problem with an innovative levy of 2 percent on the revenue of streaming services like Netflix, Amazon Prime and Disney.

But that 2 percent rises to 5 percent if the streaming company doesn’t spend at least 5 percent of their revenue on making local Danish content. Denmark joins many other European countries already doing this — Germany, Poland, Spain, Italy, the Netherlands, France and even Romania are all about to levy the streamers to fund local production.

Australia is planning to do so as well.

But that’s just online streaming companies. There’s also social media and search engines which contribute nothing and take almost all the commercial revenue. The Fair Digital News Bargaining Bill will address that to a degree but it’s not open and we won’t know if the amounts are fair.

Another problem is that it’s only for news publishers — not drama or comedy producers, not on-demand video, not documentary makers or podcasters. Social media and search engines frequently feature and put advertising around these forms of content, and hoover up the digital advertising that would otherwise help fund them, so they should also contribute to them.

A Media Levy can best be seen as a levy on those companies that benefit from media on the internet, but don’t contribute to the public benefits of media — culture, social cohesion and democracy. And that’s why the Media Levy can include internet service providers, and large companies that sell digital advertising and subscriptions.

Note, this would target large companies over a certain size and revenue, and exclude smaller platforms, like most levies do.

Separate from annual budget
The huge benefit of a levy is that it is separate from the annual budget, so it’s fiscally neutral, and politicians can’t get their mits on it. It removes the curse of annual funding.

It creates a funding stream derived from the actual commercial media activities which produce the distribution gaps in the first place, for which public media compensates. That’s why the proceeds would go to the non-commercial platform and the funding agencies — Te Mangai Paho, NZ On Air and the Film Commission.

One final point. This wouldn’t conflict with the new Digital Services Tax proposed by the government because that’s a replacement for Income Tax. A Media Levy, like all levies, sits over and above income tax.

So there we go. I’ve mentioned Jim Bolger three times! I’ve also outlined some quite straight-forward methods to fund public media sustainably, and to fund a significant increase in local content production, video, film, audio and journalism.

None of it needs to be within the grasp of Melissa Lee or Willie Jackson, or David Seymour.

All of it can be used to create local content that improves democracy, social cohesion and Kiwi culture.

Myles Thomas is a trustee of the Better Public Media Trust (BPM). He is a former television producer and director who in 2012 established the Save TVNZ 7 campaign. Thomas is now studying law. This commentary was this year’s David Beatson Memorial Address at a public meeting in Grey Lynn last night on broadcast policy for the NZ election 2023.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2023/10/02/nz-election-2023-how-a-better-funding-model-can-help-media-strengthen-social-cohesion/feed/ 0 431287
New Group Attacking iPhone Encryption Backed by U.S. Political Dark-Money Network https://www.radiofree.org/2023/10/01/new-group-attacking-iphone-encryption-backed-by-u-s-political-dark-money-network/ https://www.radiofree.org/2023/10/01/new-group-attacking-iphone-encryption-backed-by-u-s-political-dark-money-network/#respond Sun, 01 Oct 2023 10:00:00 +0000 https://theintercept.com/?p=446051

The Heat Initiative, a nonprofit child safety advocacy group, was formed earlier this year to campaign against some of the strong privacy protections Apple provides customers. The group says these protections help enable child exploitation, objecting to the fact that pedophiles can encrypt their personal data just like everyone else.

When Apple launched its new iPhone this September, the Heat Initiative seized on the occasion, taking out a full-page New York Times ad, using digital billboard trucks, and even hiring a plane to fly over Apple headquarters with a banner message. The message on the banner appeared simple: “Dear Apple, Detect Child Sexual Abuse in iCloud” — Apple’s cloud storage system, which today employs a range of powerful encryption technologies aimed at preventing hackers, spies, and Tim Cook from knowing anything about your private files.

Something the Heat Initiative has not placed on giant airborne banners is who’s behind it: a controversial billionaire philanthropy network whose influence and tactics have drawn unfavorable comparisons to the right-wing Koch network. Though it does not publicize this fact, the Heat Initiative is a project of the Hopewell Fund, an organization that helps privately and often secretly direct the largesse — and political will — of billionaires. Hopewell is part of a giant, tightly connected web of largely anonymous, Democratic Party-aligned dark-money groups, in an ironic turn, campaigning to undermine the privacy of ordinary people.

“None of these groups are particularly open with me or other people who are tracking dark money about what it is they’re doing.”

For experts on transparency about money in politics, the Hopewell Fund’s place in the wider network of Democratic dark money raises questions that groups in the network are disinclined to answer.

“None of these groups are particularly open with me or other people who are tracking dark money about what it is they’re doing,” said Robert Maguire, of Citizens for Responsibility and Ethics in Washington, or CREW. Maguire said the way the network operated called to mind perhaps the most famous right-wing philanthropy and dark-money political network: the constellation of groups run and supported by the billionaire owners of Koch Industries. Of the Hopewell network, Maguire said, “They also take on some of the structural calling cards of the Koch network; it is a convoluted group, sometimes even intentionally so.”

The decadeslong political and technological campaign to diminish encryption for the sake of public safety — known as the “Crypto Wars” — has in recent years pivoted from stoking fears of terrorists chatting in secret to child predators evading police scrutiny. No matter the subject area, the battle is being waged between those who think privacy is an absolute right and those who believe it ought to be limited for expanded oversight from law enforcement and intelligence agencies. The ideological lines pit privacy advocates, computer scientists, and cryptographers against the FBI, the U.S. Congress, the European Union, and other governmental bodies around the world. Apple’s complex 2021 proposal to scan cloud-bound images before they ever left your phone became divisive even within the field of cryptography itself.

While the motives on both sides tend to be clear — there’s little mystery as to why the FBI doesn’t like encryption — the Heat Initiative, as opaque as it is new, introduces the obscured interests of billionaires to a dispute over the rights of ordinary individuals. 

“I’m uncomfortable with anonymous rich people with unknown agendas pushing these massive invasions of our privacy,” Matthew Green, a cryptographer at Johns Hopkins University and a critic of the plan to have Apple scan private files on its devices, told The Intercept. “There are huge implications for national security as well as consumer privacy against corporations. Plenty of unsavory reasons for people to push this technology that have nothing to do with protecting children.”

Apple’s Aborted Scanning Scheme

Last month, Wired reported the previously unknown Heat Initiative was pressing Apple to reconsider its highly controversial 2021 proposal to have iPhones constantly scan their owners’ photos as they were uploaded to iCloud, checking to see if they were in possession of child sexual abuse material, known as CSAM. If a scan turned up CSAM, police would be alerted. While most large internet companies check files their users upload and share against a centralized database of known CSAM, Apple’s plan went a step further, proposing to check for illegal files not just on the company’s servers, but directly on its customers’ phones.

“In the hierarchy of human privacy, your private files and photos should be your most important confidential possessions,” Green said. “We even wrote this into the U.S. Constitution.”

The backlash was swift and effective. Computer scientists, cryptographers, digital rights advocates, and civil libertarians immediately protested, claiming the scanning would create a deeply dangerous precedent. The ability to scan users’ devices could open up iPhones around the world to snooping by authoritarian governments, hackers, corporations, and security agencies. A year later, Apple reversed course and said it was shelving the idea.

Green said that efforts to push Apple to monitor the private files of iPhone owners are part of a broader effort against encryption, whether used to safeguard your photographs or speak privately with others — rights that were taken for granted before the digital revolution. “We have to have some principles about what we’ll give up to fight even heinous crime,” he said. “And these proposals give up everything.”

“We have to have some principles about what we’ll give up to fight even heinous crime. And these proposals give up everything.”

In an unusual move justifying its position, Apple provided Wired with a copy of the letter it sent to the Heat Initiative in reply to its demands. “Scanning every user’s privately stored iCloud data would create new threat vectors for data thieves to find and exploit,” the letter read. “It would also inject the potential for a slippery slope of unintended consequences. Scanning for one type of content, for instance, opens the door for bulk surveillance and could create a desire to search other encrypted messaging systems across content types.”

The strong encryption built into iPhones, which shields sensitive data like your photos and iMessage conversations even from Apple itself, is frequently criticized by police agencies and national security hawks as providing shelter to dangerous criminals. In a 2014 speech, then-FBI Director James Comey singled out Apple’s encryption specifically, warning that “encryption threatens to lead all of us to a very dark place.”

Some cryptographers respond that it’s impossible to filter possible criminal use of encryption without defeating the whole point of encryption in the first place: keeping out prying eyes.

Similarly, any attempt to craft special access for police to use to view encrypted conversations when they claim they need to — a “backdoor” mechanism for law enforcement access — would be impossible to safeguard against abuse, a stance Apple now says it shares.

LOS ANGELES CA - SEPTEMBER 01, 2023: Apple is facing pressure from child safety advocates and shareholders to improve its policies for policing child sexual abuse material in iCloud. Photographed here is Sarah Gardner, head of the Heat Initiative, who is leading the campaign. CREDIT: Jessica Pons for The New York Times

Sarah Gardner, head of the Heat Initiative, on Sept. 1, 2023, in Los Angeles.

Photo: Jessica Pons for the New York Times

Dark-Money Network

For an organization demanding that Apple scour the private information of its customers, the Heat Initiative discloses extremely little about itself. According to a report in the New York Times, the Heat Initiative is armed with $2 million from donors including the Children’s Investment Fund Foundation, an organization founded by British billionaire hedge fund manager and Google activist investor Chris Cohn, and the Oak Foundation, also founded by a British billionaire. The Oak Foundation previously provided $250,000 to a group attempting to weaken end-to-end encryption protections in EU legislation, according to a 2020 annual report.

The Heat Initiative is helmed by Sarah Gardner, who joined from Thorn, an anti-child trafficking organization founded by actor Ashton Kutcher. (Earlier this month, Kutcher stepped down from Thorn following reports that he’d asked a California court for leniency in the sentencing of convicted rapist Danny Masterson.) Thorn has drawn scrutiny for its partnership with Palantir and efforts to provide police with advanced facial recognition software and other sophisticated surveillance tools. Critics say these technologies aren’t just uncovering trafficked children, but ensnaring adults engaging in consensual sex work.

In an interview, Gardner declined to name the Heat Initiative’s funders, but she said the group hadn’t received any money from governmental or law enforcement organizations. “My goal is for child sexual abuse images to not be freely shared on the internet, and I’m here to advocate for the children who cannot make the case for themselves,” Gardner added.

She said she disagreed with “privacy absolutists” — a group now apparently including Apple — who say CSAM-scanning iPhones would have imperiled user safety. “I think data privacy is vital,” she said. “I think there’s a conflation between user privacy and known illegal content.”

Heat Initiative spokesperson Kevin Liao told The Intercept that, while the group does want Apple to re-implement its 2021 plan, it would be open to other approaches to screening everyone’s iCloud storage for CSAM. Since Apple began allowing iCloud users to protect their photos with end-to-end encryption last December, however, this objective is far trickier now than it was back in 2021; to scan iCloud images today would still require the mass-scrutinizing of personal data in some manner. As Apple put it in its response letter, “Scanning every user’s privately stored iCloud content would in our estimation pose serious unintended consequences for our users.”

Both the Oak Foundation and Thorn were cited in a recent report revealing the extent to which law enforcement and private corporate interests have influenced European efforts to weaken encryption in the name of child safety.

Beyond those groups and a handful of names, however, there is vanishingly little information available about what the Heat Initiative is, where it came from, or who exactly is paying its bills and why. Its website, which describes the group only as a “collective effort of concerned child safety experts and advocates” — who go unnamed — contains no information about funding, staff, or leadership.

One crucial detail, however, can be found buried in the “terms of use” section of the Heat Initiative’s website: “THIS WEBSITE IS OWNED AND OPERATED BY Hopewell Fund AND ITS AFFILIATES.” Other than a similarly brief citation in the site’s privacy policy, there is no other mention of the Hopewell Fund or explanation of its role. The omission is significant, given Hopewell’s widely reported role as part of a shadowy cluster of Democratic dark-money groups that funnel billions from anonymous sources into American politics.

Hopewell is part of a labyrinthine billionaire-backed network that receives and distributes philanthropic cash while largely obscuring its origin. The groups in this network include New Venture Fund (which has previously paid salaries at Hopewell), the Sixteen Thirty Fund, and Arabella Advisors, a for-profit company that helps administer these and other Democratic-leaning nonprofits and philanthropies. The groups have poured money into a wide variety of causes ranging from abortion access to opposing Republican tax policy, along the way spending big on elections — about $1.2 billion total in 2020 alone, according to a New York Times investigation.

The deep pockets of this network and mystery surrounding the ultimate source of its donations have drawn comparisons — by Maguire, the Times, and others — to the Koch brothers’ network, whose influence over electoral politics from the right long outraged Democrats. When asked by The Atlantic in 2021 whether she felt good “that you’re the left’s equivalent of the Koch brothers,” Sampriti Ganguli, at the time the CEO of Arabella Advisors, replied in the affirmative.

“Sixteen Thirty Fund is the largest network of liberal politically active nonprofits in the country. We’re talking here about hundreds of millions of dollars.”

“Sixteen Thirty Fund is the largest network of liberal politically active nonprofits in the country,” Maguire of CREW told The Intercept. “We’re talking here about hundreds of millions of dollars.”

Liao told The Intercept that Hopewell serves as the organization’s “fiscal sponsor,” an arrangement that allows tax-deductible donations to pass through a registered nonprofit on its way to an organization without tax-exempt status. Liao declined to provide a list of the Heat Initiative’s funders beyond the two mentioned by the New York Times. Owing to this fiscal sponsorship, Liao continued, “the Hopewell Fund’s board is Heat Initiative’s board.” Hopewell’s board includes New Venture Fund President Lee Bodner and Michael Slaby, a veteran of Barack Obama’s 2008 and 2012 campaigns and former chief technology strategist at an investment fund operated by ex-Google chair Eric Schmidt.

When asked who exactly was leading the Heat Initiative, Liao told The Intercept that “it’s just the CEO Sarah Gardner.” According to LinkedIn, however, Lily Rhodes, also previously with Thorn, now works as Heat Initiative’s director of strategic operations. Liao later said Rhodes and Gardner are the Heat Initiative’s only two employees. When asked to name the “concerned child safety experts and advocates” referred to on the Heat Initiative’s website, Liao declined.

“When you take on a big corporation like Apple,” he said, “you probably don’t want your name out front.”

Hopewell’s Hopes

Given the stakes — nothing less than the question of whether people have an absolute right to communicate in private — the murkiness surrounding a monied pressure campaign against Apple is likely to concern privacy advocates. The Heat Initiative’s efforts also give heart to those aligned with law enforcement interests. Following the campaign’s debut, former Georgia Bureau of Investigations Special Agent in Charge Debbie Garner, who has also previously worked for iPhone-hacking tech firm Grayshift, hailed the Heat Initiative’s launch in a LinkedIn group for Homeland Security alumni, encouraging them to learn more.

The larger Hopewell network’s efforts to influence political discourse have attracted criticism and controversy in the past. In 2021, OpenSecrets, a group that tracks money in politics, reported that New Venture Fund and the Sixteen Thirty Fund were behind a nationwide Facebook ad campaign pushing political messaging from Courier News, a network of websites designed to look like legitimate, independent political news outlets.

Despite its work with ostensibly progressive causes, Hopewell has taken on conservative campaigns: In 2017, Deadspin reported with bemusement an NFL proposal in which the league would donate money into a pool administered by the Hopewell Fund as part of an incentive to get players to stop protesting the national anthem.

Past campaigns connected to Hopewell and its close affiliates have been suffused with Big Tech money. Hopewell is also the fiscal sponsor of the Economic Security Project, an organization that promotes universal basic income founded by Facebook co-founder Chris Hughes. In 2016, SiliconBeat reported that New Venture Fund, which is bankrolled in part by major donations from the Bill and Melinda Gates Foundation and William and Flora Hewlett Foundation, was behind the Google Transparency Project, an organization that publishes unflattering research relating to Google. Arabella has also helped Microsoft channel money to its causes of choice, the report noted. Billionaire eBay founder Pierre Omidyar has also provided large cash gifts to both Hopewell and New Venture Fund, according to the New York Times (Omidyar is a major funder of The Intercept).

According to Riana Pfefferkorn, a research scholar at Stanford University’s Internet Observatory program, the existence of the Heat Initiative is ultimately the result of an “unforced error” by Apple in 2021, when it announced it was exploring using CSAM scanning for its cloud service.

“And now they’re seeing that they can’t put the genie back in the bottle,” Pfefferkorn said. “Whatever measures they take to combat the cloud storage of CSAM, child safety orgs — and repressive governments — will remember that they’d built a tool that snoops on the user at the device level, and they’ll never be satisfied with anything less.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/10/01/new-group-attacking-iphone-encryption-backed-by-u-s-political-dark-money-network/feed/ 0 431174
Syrian President Returns to China after almost 20 Years https://www.radiofree.org/2023/09/30/syrian-president-returns-to-china-after-almost-20-years/ https://www.radiofree.org/2023/09/30/syrian-president-returns-to-china-after-almost-20-years/#respond Sat, 30 Sep 2023 15:07:35 +0000 https://dissidentvoice.org/?p=144415 This week’s News on China.

• Syrian president returns to China after almost 20 years
• 19th Asian Games started in Hangzhou
• Particle accelerator to produce semiconductors
• ‘Comfort women’ film debuts in Japan


This content originally appeared on Dissident Voice and was authored by Dongsheng News.

]]>
https://www.radiofree.org/2023/09/30/syrian-president-returns-to-china-after-almost-20-years/feed/ 0 431094
Artist and technologist Tim Schwartz on balancing art and work https://www.radiofree.org/2023/09/29/artist-and-technologist-tim-schwartz-on-balancing-art-and-work/ https://www.radiofree.org/2023/09/29/artist-and-technologist-tim-schwartz-on-balancing-art-and-work/#respond Fri, 29 Sep 2023 07:00:00 +0000 https://thecreativeindependent.com/people/artist-and-technologist-tim-schwartz-on-balancing-art-and-work You have such a wide and unique array of projects. Where do you come up with your ideas, and how do you decide which projects to pursue and which ideas are worth following through on?

I think an overarching theme for all the things I do tends to be taking ideas in technology or the digital space and translating them into physical form, whether that’s book or print or sculpture. How artists get ideas, that’s a long process. I went to grad school in 2007, and when I started that, I did not have a process for how I came up with ideas. I’m not sure I have a process now, but I feel more comfortable in not having a process and definitely have a better gut sense of when things are interesting to me and when they’re not.

I think I am someone that works through obsession as an underlying theme. I think that resonates with a lot of people. I grew up in the ADD nation and on Ritalin, and back then, I had to be medicated to be able to focus in on an idea. As I grew up, I figured out what I would call “hyper-focus through obsession,” and that’s how I operate now. So as long as I get excited about something, I can just nerd out on it for a long, long, long time.

I think a lot of people don’t feel comfortable talking about that type of disability. For me, it was a real transition. I came off drugs when I was in high school and then in college figured out my own techniques for how to be obsessed with ideas and get a lot of shit done. So in my art practice, when I get super excited about something, I will just deep dive and spend weeks on it, or however long it takes.

Do you always have something that you’re excited about?

It comes and goes, and I think part of being an artist or a creator is being comfortable with letting it go when you don’t have it and coming back to it when you do. I think I’ve been in it long enough to know that it’ll come back. So I’m not that worried about it.

What constitutes success for your work?

I’m old enough now to understand what I consider success in my work. For me, it’s about finding a home for the conversations around it. I think that is what really charges most artists. If you tie it to fame or money, it will in 99% of the time be fleeting. So for me, it’s really about, where’s the home for the conversation? Who do I want to be in dialogue with? First it was the digital media ghetto of the late-mid aughts, and now I’m feeling more affinity with fine press bookmakers. The conversations are great, and the communities are really giving. It’s fun.

I do overlap into the traditional fine art worlds and those gallery spaces. It’s fun to go have a big party and have people walk around and drink beers at an opening and have people geek out on work. But I find the long-term recurring conversations tend to be, for me, in digital media arts worlds and in fine press book nerd worlds. So I’ve been super lucky to find those conversations.

How did you get involved in book arts, and what about it is most fitting for the ideas that you’re exploring?

What’s nice about the fine press book world or book arts world is that the stakes are low. It would be hard to imagine that the rockstars [in this world] are making more than 100 grand a year, selling out baller books, working all year. The spaces [book arts] occupies are really niche. So because the competition is so low, everybody tends to be very giving, and that is super nice.

I came into it because I was in grad school in a very conceptual program, and I wanted to make this book. I ended up working with this guy, John DeMerritt in San Francisco. I don’t want to offend any other book binders, but I think on the West Coast, he’s the person. And Amy Borezo is the person on the East Coast. Anyway, I got this chance to work with John, and we just hit it off. Aside from enjoying making books, I just want to work with John DeMerritt more, so I tend to make books so I can collaborate with him.

The translation from the digital to the physical and vice versa is a theme in a lot of your work. What is lost and what is gained in doing that kind of translation?

A lot of my work for years was about what’s lost as archives become digital. Having a physical thing to hold in front of you, particularly a book form or an object that can be engaged with, is just inherently different from digital forms. I am a digital native all the way, but there’s something about the physical book that lends itself to a processing, a thinking, that’s just different. Maybe it’s just that I’m of a certain age and grew up around books and newspapers. It could be my own perception, but I think it resonates with a lot of people.

Your work engages this idea of using a physical means to alter a digital presence. ​​Resistant Systems specifically comes to mind, which was an exhibition you did around a digital-focused wellness brand you conceptualized, offering analog products to “purify your digital life.” What is your personal relationship to being online like today?

The idea that we can renegotiate our engagement with privacy, security, how we use technology in more of a wellness aesthetic, I think is really important and interesting, because right now everything we learn about technology is in this [geeky, boring] aesthetic, especially around the guts of data backup or passwords.

When I’m not being an artist, I build websites. Right now, I’m a chief technology officer for a media startup, and that’s how I make money, not by making books.

I think that is an important thing to acknowledge as an artist, because I feel like most artists are not making a full living based off of their work. How do you balance those two parts of your life?

For 10 years now, I’ve been fully remote, and I’ve tried to negotiate 30-hour a week full-time work. That leaves me time to be an artist. I’m very lucky that I have enough skills and background that I can get a job where I only have to work 30 hours a week. Obviously, it bleeds over at different times, and it’s a job. But that’s been a sustaining pillar that I hold myself to over the years.

So much of technology and digital security and privacy, that whole space honestly, is really overwhelming to me. I think it’s interesting that you’re trying to make that a little bit more palatable. How do you think about getting people over that complacency or fear?

So all of those things are true across the board for basically everybody. How you get over the overwhelm is to just chip away at it. My dad’s on 1Password now and uses his thumb on his phone to get his passwords. That took a lot of work. My partner, who is not technology-oriented, just needed some basic ground rules set up. A lot of this is just setting up basic systems, and then once you adopt them and adhere to them, it’s easy. But it’s figuring out, what is the system? How do I implement it? Am I doing it right? All those things are just hard.

I wish that personal finance and personal computer hygiene was taught in schools. I really link it directly to personal finance, because no one teaches you how to fill out your taxes in school. That’s the first goddamn thing you have to do as an adult. In the same way, to be online, you need to have passwords and store them safely and back up your shit so you don’t lose it. Literally everybody loses their stuff once in their life. Then they’ve learned, and they’ve had to deal with it. But what if we didn’t have to have that loss in the first place?

I’m always wishing that somebody had taught me more finance stuff, because there’s no baseline education on how to do it. It’s really interesting to see this topic approached via an art book, which is such a precious object and such a labor of care in so many ways, especially contrasted with the infiniteness and carelessness of content on the internet.

I’ve done [crypto therapy sessions] a number of times with LA Crypto Party, this group that I’ve co-run for a while, where people come in and basically just lie on a couch and tell us all their digital problems. Then we write up little digital prescriptions for them of how they’re going to fix this. I’ve also done five-minute cleansings with people where we talk about their passwords, their habits, like, “Do you have any bad passwords? Let’s write it down, burn it, get rid of it, and then generate a new one.” Taking these processes and rituals is a way to have a new engagement with all that messy stuff you don’t feel like dealing with.

While we’re on the topic of technological fears, I have to ask if you’re thinking at all about AI and how that is impacting artists and workers and digital security as well.

The ChatGPT stuff, I think we’ll come up with a model of how it’s integrated as a tool. I liken it to when the web started and search became a thing. We all changed how we engaged with that. We are all really good searchers now with keywords and how we type things in. I think it’ll be the same way with ChatGPT, where we’ve found ways to include it.

I just wrote an article the other day, and I was having trouble with the last paragraph. I was actually writing about ChatGPT. I was like, “Let’s just put it in and see.” I got a couple phrases that I thought were novel that I hadn’t thought of. Not that novel, but it was good enough to get me through my spot where I couldn’t get it farther.

If we go beyond ChatGPT into just large machine learning systems, for sure human labor will continue to be replaced, as it always has, by technology changes. I have a long-term project that’s basically about unionization in the printing industry, the history of it, and then how that can be a lens for unionization contemporarily and the reaction to Amazon. I’m going to be reprinting primary source documents and doing it all by hand as a way to look at this evolution. But interestingly, in the newspaper industry in New York City in the seventies, there were a series of huge strikes as basically all of the Linotype machines went out for making the papers. It basically changed to people on typewriters doing all the copy, and then it would be photo-transferred into lead.

All those people went on strike because they were all in these big unions. The scabs that got hired or moved up were all of the female secretaries that knew how to type. It moved a whole lot of women into the workforce in this technology change, even though all these people that were in the labor and were controlling the newspapers were losing jobs and losing wages. So it’s messy. All these changes are messy, and you never quite know the outcomes and the ramifications in all the different pockets. I think that’s something to just hold onto for us, is all of the Luddite reactions and how evil the change in technology is, there could be these other changes that come out of it that we just aren’t aware of that might be not horrible.

I’ve used a letterpress a number of times. It’s painstaking, and it’s slow. It forces your brain to work in a totally different way in terms of intention and attention. What interests you about that as a medium?

Let me pull out an example that’s right here. This is my first letterpress project, and it’s called Data Transmissions. This is where I laid [out] my manifesto of how I think about letterpress. It’s just redoing cell phone screenshots by hand in metal type. For me, this is a manual process of data processing. So if you think about it, the value of data when it’s digital on a phone is zero, and then if you add your manual labor, as used to happen for producing data or information, the value of it is drastically different. The reprocessing of data by hand I think is an important thing to think about.

There’s a level of satire and humor that’s apparent in some of your work. The Paris meter stands out as an example, in which you track and compare the prevalence of searches and news results for Paris, France versus Paris Hilton. What do you think is the role of that sort of playfulness in your art?

That humor isn’t in all of my work, but certainly a number of my pieces. I think it’s like, “Would you rather look at a boring chart or a fun chart?” It’s the same as when I’m making aesthetic choices in a conceptual piece. I’m going to make aesthetic choices that I like, that I think are nice to look at.

If I’m going to do a Paris Hilton meter, if I just make some boring juxtaposition of terms, it’s not that interesting. But also, with Paris Hilton versus Paris, France, you’re looking at two different versions of culture—of pop and a long-term culture—over time. It’s been running for 12 years. The gauge is slowly going towards Paris, France. It popped back up to Paris Hilton for a little while. She had a little action last year, two years ago.

Is there anything you’d want to say about your work or your process or your creative spirit before we wrap up?

I’ve been very lucky that I’ve figured out a way to make money concurrently with making art. Anybody that’s going back to school or early on in your career, even if you want to make it as a superstar—which is totally cool, valid, great, and it will happen to, I don’t know, 10% of the people that go to grad school or try to do it all—just have something in your back pocket. I’ve been very lucky to have that. It can be related to your art, and don’t be shy about saying so, because I think we do cover it up so much in the art world and it’s only in my later age that I feel comfortable with sharing my whole self.

Tim Schwartz Recommends:

Suso Saiz

Jacob Mann

Custom ergonomic split keyboards

Openback headphones

Being in the ocean


This content originally appeared on The Creative Independent and was authored by Kate Silzer.

]]>
https://www.radiofree.org/2023/09/29/artist-and-technologist-tim-schwartz-on-balancing-art-and-work/feed/ 0 430658
Cleaning up aluminum will be critical to a low-carbon future https://grist.org/regulation/cleaning-up-aluminum-will-be-critical-to-a-low-carbon-future/ https://grist.org/regulation/cleaning-up-aluminum-will-be-critical-to-a-low-carbon-future/#respond Thu, 28 Sep 2023 08:15:00 +0000 https://grist.org/?p=619037 Aluminum isn’t just for soda cans — it’s a critical clean energy material. The metal’s exceptionally light weight and durability make it an essential component of solar panels, wind turbines, and electric vehicles. As the world scales up these green technologies, demand for aluminum is expected to grow by as much as 40 percent by 2030, compared to a 2020 baseline. 

But aluminum production isn’t environmentally benign. As noted in a new report from the nonprofit Environmental Integrity Project, the global aluminum industry causes some 1.2 billion tons of greenhouse gas emissions every year — a little less than three times Australia’s annual emissions — as well as widespread air and water contamination. 

To ensure that the harms of aluminum expansion don’t outweigh the benefits, the report calls for stricter pollution standards from the U.S. government, an acceleration of of less-polluting smelting technologies, and an increase in aluminum recycling rates — so that less new aluminum needs to be made in the first place.

“Without strong action, the promise of aluminum in attaining a lower-carbon world will prove to be a false one,”  said Nadia Steinzor, a policy and research analyst with the Environmental Integrity Project and lead author of the report, in a statement. 

Before aluminum becomes foil or a car part, it has to be extracted from bauxite, a kind of ore that contains aluminum in its mineral form. Strip-mining for bauxite requires extensive land-clearing that displaces communities, destroys forests and topsoil, and releases mercury into the air and water. This mining happens all over the world, but some of the largest mines are in Australia, Brazil, Guinea, Indonesia, Jamaica, and Vietnam. According to the Environmental Integrity Project’s estimate, about 7,600 acres of land is cleared globally every year for bauxite mining — an area half the size of Manhattan.

A strip mine with yellow machinery
Bauxite mining in western Australia. Universal Images Group via Getty Images

The complicated industrial process that follows turns bauxite ore into aluminum — but not without creating some nasty byproducts. For example, refining bauxite into alumina powder — aluminum’s precursor — creates a waste residue known as “red mud,” which contains contaminants including arsenic, lead, and the radioactive elements uranium and thorium. Smelting, which turns alumina into aluminum, releases more pollutants into the air and water, most significantly sulfur dioxide but also carbonyl sulfide, hydrogen fluoride, and the human carcinogen benzo(ghi)perylene.

In the U.S., which produces about 1 percent of the world’s new aluminum, the Clean Air Act and Clean Water Act are meant to limit the release of these pollutants — but parts of these laws related to alumina refining and smelting have not been revised for decades, and the Environmental Integrity Project says they don’t reflect what’s possible using the most modern pollution-controlling technologies. For instance, sulfur dioxide scrubbers — filtration chambers that can remove sulfur dioxide from the air going out of a facility’s smokestack — could dramatically reduce emissions of the pollutant if installed at smelting facilities, but they aren’t currently required.

Smelting is also where most of the aluminum industry’s climate damages stem from. It takes a lot of energy to reach the 1,800-degree-Fahrenheit temperatures under which alumina can be converted to aluminum, and most smelting facilities get this energy from fossil fuel sources. The carbon-based anodes that conduct electricity for this process also release perfluorocarbons, greenhouse gases that can be thousands of times more potent than CO2 over a 100-year time frame.

To mitigate this climate pollution, the Environmental Integrity Project report says that states should dramatically expand the supply of renewable energy and that companies should commit to decarbonizing their aluminum production. Facilities in Iceland and Canada have already shown that aluminum production is possible using hydropower, and the United Arab Emirates in 2021 announced the world’s first commercial production of aluminum using solar power

Man walking in foreground with factory in background
A bauxite factory north of the Guinean capital of Conakry. Georges Gobet / AFP via Getty Images

Replacing today’s anodes with carbon-free “inert” ones would also reduce aluminum’s climate impact, although inert anode technologies aren’t yet fully developed.

Greeshma Gadikota, an associate professor of civil and environmental engineering at Cornell University, called the report “timely,” since booming demand for aluminum is already causing pollution and energy consumption challenges around the world.. “There is urgency in creating solutions to address this,” she said.

In particular, she praised the report’s recommendation to expand aluminum recycling CK, which uses 95 percent less energy than new aluminum production and preempts the harms of bauxite mining. According to the World Economic Forum, about 73 percent of used aluminum currently gets recycled, but raising that rate to 95 percent would reduce demand for primary aluminum by 15 percent and prevent 250 million metric tons of CO2 emissions every year — about as much climate pollution as Spain produced in 2022.

One priority area identified by the Environmental Integrity Project is increasing the amount of aluminum recycled from used cars, planes, appliances, and products, rather than relying on industrial scrap. In the U.S., less than half of today’s recycled aluminum comes from those non-industrial sources. 

Still, Gadikota noted that, in the near term, recycled aluminum may not be able to keep up with rising demand for the material, meaning more primary production will be needed.

The report notes that manufacturers and consumers can also help drive down unnecessary demand for aluminum — for example, by favoring smaller cars. Americans’ taste for big trucks and cars is a “key factor” driving aluminum demand within the automotive industry, the report says, but compact vehicles can contain less than half as much aluminum. 

This story was originally published by Grist with the headline Cleaning up aluminum will be critical to a low-carbon future on Sep 28, 2023.


This content originally appeared on Grist and was authored by Joseph Winters.

]]>
https://grist.org/regulation/cleaning-up-aluminum-will-be-critical-to-a-low-carbon-future/feed/ 0 430392
Bid to protect Pacific indigenous knowledge in the global digital space https://www.radiofree.org/2023/09/26/bid-to-protect-pacific-indigenous-knowledge-in-the-global-digital-space/ https://www.radiofree.org/2023/09/26/bid-to-protect-pacific-indigenous-knowledge-in-the-global-digital-space/#respond Tue, 26 Sep 2023 10:08:09 +0000 https://asiapacificreport.nz/?p=93612 By Ema Ganivatu and Brittany Nawaqatabu in Suva

A recent webinar hosted by the Pacific Network on Globalisation (PANG) brought together minds from across the region to delve into the intricate issues of the digital economy and data value.

The webinar’s focus was clear — shed light on who was shaping the rules of the digital landscape and how these rules were taking form.

At the forefront of the discussion was the delicate matter of valuing and protecting indigenous knowledge.

PANG’s deputy coordinator, Adam Wolfenden, emphasised the need for open conversations spanning various sectors.

“It is a call to understand and safeguard the wisdom embedded in Pacific worldviews and indigenous knowledge systems as we venture into the digital world,” he said.

But amid the promise of the digital age, challenges persisted.

Wolfenden said the Pacific’s scattered islands faced the formidable obstacle of connectivity.

“Communities yearn to tap into online technologies, yet structural barriers stand tall. The connectivity challenges and structural barriers that are faced by the Pacific region are substantial and there is no easy, cheap fix,” he said.

He underscored the necessity of regional partnerships, even beyond the Pacific.

“As they sought to build advanced digital infrastructures, they realised that strength lay in unity. The journey towards progress means joining hands with fellow developing nations.

“It is a testament to the shared dream of progress that transcends geographical boundaries.”

The first step, Wolfenden believed, was awareness.

He said the Pacific region needed to be fully informed about ongoing negotiations, what rules were being carved, and how these might affect the region’s autonomy and data sovereignty.

“Often, these negotiations remain hidden from public view, shrouded in secrecy until agreements were reached. This has to change; transparency is vital,” Wolfenden said.

Beyond this, there was a call for broader discussions during the webinar. The digital economy was not just about buyers and sellers in a virtual marketplace.

It was about preserving culture, empowering communities, and ensuring that indigenous knowledge was never left vulnerable to the whims of the digital age.

Ema Ganivatu and Brittany Nawaqatabu are final year journalism students at The University of the South Pacific. They are also senior editors for Wansolwara, USP Journalism’s student training newspaper and online publications. Republished in a collaborative partnership with Asia Pacific Report.


This content originally appeared on Asia Pacific Report and was authored by Wansolwara.

]]>
https://www.radiofree.org/2023/09/26/bid-to-protect-pacific-indigenous-knowledge-in-the-global-digital-space/feed/ 0 429818
Biochar is a “shovel-ready” climate technology, but can it scale up? https://grist.org/agriculture/biochar-climate-technology-scale-up-pigs/ https://grist.org/agriculture/biochar-climate-technology-scale-up-pigs/#respond Thu, 21 Sep 2023 08:45:00 +0000 https://grist.org/?p=618671 When Beauregard Burgess and three friends decided to start a hog and poultry farm in 2015, they chose an odd location: 20 acres of swampy land on the east side of Homer, Alaska, a coastal hamlet south of Anchorage. The land, logged years ago, was in an industrial part of town, and its soil was in poor health. That anemia was part of the appeal for Burgess and his colleagues, who wanted to raise livestock in a way that would add nutrients and beneficial microbes to the ground, restore the local ecosystem, and improve the local food scene. 

Today, Blood, Sweat, and Food Farms is something of an oasis. Its lush pastures are just down the road from auto shops, lots crowded with heavy equipment, and heaps of gravel. Burgess and his partners have turned the lot’s acidic, water-logged earth into a rich humus, and they’ve done so in an organic, regenerative way — that is, without synthetic chemicals. Such an achievement has involved a number of innovations and tactics, from building bioswales that limit flooding to spreading nutrient-rich compost across fields. But one tool in particular stands out: biochar — a jet-black substance made by roasting plant matter, like wood, in an oxygen-deprived environment. 

The glorified charcoal is rare on American farms, yet it has become a focal point in the movement to turn agriculture into a climate solution. Biochar can lock up planet-warming carbon for hundreds, sometimes thousands of years, and unlike other, higher-tech technologies that suck carbon out of the air, it’s relatively straightforward and accessible. 

“Look at the playing field. What else is out there that’s commercially viable right now?” said Kathleen Draper, board chair at the International Biochar Initiative. “The reality is: It’s a shovel-ready technology.” 

A farmer sticks his hand in a bucket of biochar at his farm in Alaska
Beau Burgess holds a clump of biochar at Blood, Sweat, and Food Farms in Homer, Alaska. Grist / Max Graham

As a result, Microsoft, JPMorgan Chase, Shopify, and other corporations trying to burnish their image as climate-conscious are paying biochar producers millions of dollars so that they can claim credit for the carbon that’s locked up in the soot and not in the atmosphere heating the Earth. Biochar now accounts for the vast majority of the carbon dioxide that has supposedly been removed from the air after being purchased by companies seeking to offset their planet-warming emissions, according to cdr.fyi, a website that tracks carbon removal data. Still, it could be years before biochar fulfills its promise, if it ever does; only a small fraction of the amount that would meaningfully chip away at global emissions is currently being produced. And there’s no easy answer for how to scale it up. 

Farmers have used charred plant matter for millennia to improve soils. In the Amazon rainforest, known for its nutrient-poor dirt, archeologists have dug up pockets of unusually dark, fecund earth, commonly referred to as terra preta. Those soils likely were made fertile thanks to intentional burning and the proliferation of a biochar-like substance thousands of years ago. The porous, sponge-like material can act like a steroid for soil. It gives dirt structure, which helps bacteria and fungi latch onto it and make nutrients available for plants. And when it rains, biochar keeps soil from shedding off fields.

But that’s not why it has seen a resurgence in the United States. Two decades ago, when the world was awakening to the dangers of climate change, scientists became interested in the soil soot as a tool for carbon sequestration. The carbon that plants pull out of the air typically winds up back in the atmosphere, where it traps heat and warms the planet. Generally, plant matter either decomposes — say, as corn husks left in farm fields or food waste in a landfill — in which case microbes convert carbon into carbon dioxide; or it gets burned, sometimes for fuel or to get rid of waste wood. Researchers have found that the process of turning wood, twigs, or leaves into biochar, through a procedure called pyrolysis, could turn about half of that matter’s original carbon content into a stable form that could stay in the ground for centuries. A study published in March in the Journal of Environmental Quality also found that using biochar, which helps keep nutrients like nitrogen in the ground, could cut planet-warming nitrous oxide emissions from agriculture by almost one-fifth.  

“Our objective is to try to use biomass that would otherwise be rapidly decomposing [and] doesn’t have other utility,” said Charlotte Levy, a science advisor at Carbon180, a nonprofit that advocates for carbon removal. “One opportunity we see for that is to use corn stubble that gets left in the field.” The United States produces some 14 billion bushels of corn every year. Some of the husks, stems, and cobs left over could be turned into biochar and added back into the soil. 

Burgess’s team at the farm in Alaska makes their biochar out of waste wood, rather than inedible corn parts, in a cylindrical steel tank the size of a small car. The wood comes from a local land-clearing company, co-owned by Burgess, that supplies logs that can’t be used for construction or firewood. “The things that end up as biochar on our farm were the things that could achieve no other higher purpose,” Burgess said. 

A farmer stands in front of a biochar maker, stuffed with wood, at his farm in Homer, Alaska.
Beau Burgess stands in front of the biochar retort, an airtight tank, at Blood, Sweat, and Food Farms. Grist / Max Graham

Blood, Sweat, and Food has the capacity to roast wood into about 200 pounds of biochar each day. While they mainly mix the finished product with feed for their chickens and pigs, which do the work of spreading the char around fields by pooping it, they’re also starting to sell it to nurseries, greenhouses, and other farmers around Alaska, Burgess said. 

Making biochar a global climate solution — the sort hoped for by the United Nations’ Intergovernmental Panel on Climate Change  — will require producing it on a much larger scale. The amount of biochar being produced in the U.S. — 100,000 metric tons — is tiny compared to the amount needed to sequester carbon in a globally significant way.  By one estimate, biochar could offset the equivalent of up to three gigatons of carbon dioxide each year by 2050. That’s roughly the same as shutting down 800 coal plants. To get there, producers would have to ramp up worldwide production drastically.

And even if producers do manage to ramp up production that much, there’s the risk that it would undo some of its benefits, particularly if the industry shifts to growing plants specifically for the purpose of making biochar. That could lead down a path paved by biofuels like corn ethanol, which has morphed into such a big business that much of the corn grown in the United States never ends up on dinner tables. As soon as you start converting forests or fields into rows of crops with the aim of producing biochar, “you get into a lot more complicated questions,” said Levy. At that point, if you factor in the greenhouse gas emissions caused by the changes in land use (say, logging), then biochar may help worsen climate change, not solve it. 

But the nascent industry isn’t anywhere near that point, Draper said. At the moment, she said, there’s enough plant waste already out there to make a dent in emissions without growing more crops. While there’s significant demand for biochar on the carbon market, industry proponents are trying to generate more interest among farmers and other businesses, like concrete companies that are adding the soot to asphalt to make their product less carbon intensive or governments that could pour it into abandoned oil and gas wells. There aren’t enough farmers actually using biochar to meet the demand generated by companies keen on buying the carbon credits associated with the charcoal. “The hiccup right now,” Draper said, “is that all of the investors want to know who’s buying the biochar and for how much.”

A pig roams a small pasture at a farm in Alaska.
A pig works the soil at Blood, Sweat, and Food Farms. Grist / Max Graham

Part of the challenge is that biochar doesn’t exactly fit into the standard American farming curriculum. It’s neither a fertilizer nor a pesticide, and it doesn’t supercharge crop production. “It’s not something that’s likely to double yield,” said Milton McGiffen, a cooperative extension specialist and agricultural researcher at the University of California, Riverside. Still, McGiffen said, biochar’s benefits are clear, particularly when it’s added to soils that have a lot of sand or clay and struggle to hold onto water and nutrients.

Another challenge is that not all biochar is equal. How it’s made, and how it’s applied to soil, can affect how it works, said Rachel Seman-Varner, a soil scientist at the American Farmland Trust. “Biochar started to be promoted as a single solution and a silver bullet, and it’s much more nuanced than that,” she said. “A lot of people are trying to shift toward understanding that biochar is a class of products.” 

Char made by roasting corn husks at 900 degrees Fahrenheit, for instance, won’t have the same properties as wood that’s broiled at 1,400 degrees F. Researchers at the U.S. Department of Agriculture are putting together a national database to help farmers choose from the many different types of biochar and connect them with local producers, and Congress is weighing legislation with bipartisan support – the Biochar Research Network Act – that would increase funding for similar research.      

As proponents work to make the advantages of biochar more widely known to farmers,  Burgess’s approach might offer some realism, and hope.

“For us, it’s not so much that biochar or pasture-based livestock or any of this is a panacea,” he said. It’s just a small way to limit waste, produce local food, and perhaps keep some carbon in the ground, too. 

This story was originally published by Grist with the headline Biochar is a “shovel-ready” climate technology, but can it scale up? on Sep 21, 2023.


This content originally appeared on Grist and was authored by Max Graham.

]]>
https://grist.org/agriculture/biochar-climate-technology-scale-up-pigs/feed/ 0 428704
Pentagon’s Budget Is So Bloated That It Needs an AI Program to Navigate It https://www.radiofree.org/2023/09/20/pentagons-budget-is-so-bloated-that-it-needs-an-ai-program-to-navigate-it/ https://www.radiofree.org/2023/09/20/pentagons-budget-is-so-bloated-that-it-needs-an-ai-program-to-navigate-it/#respond Wed, 20 Sep 2023 16:35:46 +0000 https://theintercept.com/?p=445349

As tech luminaries like Elon Musk issue solemn warnings about artificial intelligence’s threat of “civilizational destruction,” the U.S. military is using it for a decidedly more mundane purpose: understanding its sprawling $816.7 billion budget and figuring out its own policies.

Thanks to its bloat and political wrangling, the annual Department of Defense budget legislation includes hundreds of revisions and limitations telling the Pentagon what it can and cannot do. To make sense of all those provisions, the Pentagon created an AI program, codenamed GAMECHANGER. 

“In my comptroller role, I am, of course, the most excited about applying GAMECHANGER to gain better visibility and understanding across our various budget exhibits,” said Gregory Little, the deputy comptroller of the Pentagon, shortly after the program’s creation last year. 

“The fact that they have to go to such extraordinary measures to understand what their own policies are is an indictment of how they operate.”

“The fact that they have to go to such extraordinary measures to understand what their own policies are is an indictment of how they operate,” said William Hartung, a senior research fellow at the Quincy Institute for Responsible Statecraft and expert on the defense budget. “It’s kind of similar to the problem with the budget as a whole: They don’t make tough decisions, they just layer on more policies, more weapons systems, more spending. Between the Pentagon and Congress, they’re not really getting rid of old stuff, they’re just adding more.”

House Republicans reportedly aim to pass their defense budget later this week. They had planned to vote on an $826 billion proposal last week before the far-right Freedom Caucus blocked the proposal, demanding cuts to non-defense spending.

“The fact that the Pentagon developed an AI program to navigate its own policies should be a stark wake-up call for lawmakers who throw more money at the department than it even asks for nearly every year,” said Julia Gledhill, an analyst at the Project on Government Oversight’s Center for Defense Information. “It’s unsurprising, though: The DOD couldn’t adequately account for 61 percent of its $3.5 trillion in assets in the most recent audit, and those are physical!”

The Pentagon did not respond to a request for comment.

Military brass use GAMECHANGER to help them navigate what the Defense Department itself points to as an absurd amount of “tedious” policies. The program contains over 15,000 policy documents governing how the Pentagon operates, according to its GitHub entry.

“Did you know that if you read all the Department of Defense’s policies, it would be the equivalent of reading through ‘War and Peace’ more than 100 times?” a press release about GAMECHANGER from the Defense Intelligence Agency, the military’s spy wing, says. “For most people, policy is a tedious and [elusive] concept, making the idea of understanding and synthesizing tens of thousands of policy requirements a daunting task. But in the midst of the chaos that is the policy world, one DIA officer and a team at the Office of the Undersecretary of Defense for Intelligence & Security saw an opportunity.” 

The press release went on to decry the Pentagon’s “mountain of policies and requirements.” 

As unusual as it is for the military to publicly air its contempt for its own sprawling bureaucracy, members of Congress have been similarly harsh. In its portrayal of U.S. military policy — which it also had a hand in creating — the Senate Armed Services Committee called rules governing the department “byzantine” and “labyrinthine.”

“The committee notes that the Joint Artificial Intelligence Center developed an artificial intelligence-enabled tool, GAMECHANGER, to make sense of the byzantine and labyrinthine ecosystem of Department guidance,” the committee said in a report for National Defense Authorization Act — the law that appropriates cash for the Pentagon budget — for fiscal year 2023. (Amid the critique of the Pentagon’s bloated bureaucracy, the NDAA would later become law, authorizing $802.4 billion in funding for the defense budget.)

Though announced in February of last year, GAMECHANGER has received scant media attention. The military’s Joint Artificial Intelligence Center, a subdivision of the U.S. Air Force created in 2018, developed the program. Upon its completion, the Joint Artificial Intelligence Center transferred ownership of it to the office of the Defense Department comptroller, which handles budgetary and fiscal matters for the Pentagon. 

Shortly after its release, GAMECHANGER was already used by over 6,000 Defense Department users conducting over 100,000 queries, according to the Defense Intelligence Agency. 

Described as a natural language processing application — a broad term in computer science generally referring the use of machine learning to allow computers to interpret human speech and writing — GAMECHANGER is just one of a vast suite of AI programs bankrolled by the Pentagon in recent months. 

The Pentagon is currently funding 686 such AI projects, according to the National Academy of Sciences, a nonprofit that frequently conducts research into the government. The figure does not include the Department of Defense’s classified efforts.

Before it was formally released, GAMECHANGER was granted an award by the Office of Personnel Management, the federal government’s human resources agency for civil servants.

“GAMECHANGER is an ironic name: They’re patting themselves on the back for, in the best case, figuring out what they’ve said in the past, which is pretty modest,” said Hartung, the Quincy Institute defense budget expert. “It’s more a problem of how they make policy and not a problem of how to surf through it.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Ken Klippenstein.

]]>
https://www.radiofree.org/2023/09/20/pentagons-budget-is-so-bloated-that-it-needs-an-ai-program-to-navigate-it/feed/ 0 428514
A Nation of Snitches: DHS is Grooming Americans to Report on Each Other https://www.radiofree.org/2023/09/19/a-nation-of-snitches-dhs-is-grooming-americans-to-report-on-each-other/ https://www.radiofree.org/2023/09/19/a-nation-of-snitches-dhs-is-grooming-americans-to-report-on-each-other/#respond Tue, 19 Sep 2023 13:44:09 +0000 https://dissidentvoice.org/?p=144088

There were relatively few secret police, and most were just processing the information coming in. I had found a shocking fact. It wasn’t the secret police who were doing this wide-scale surveillance and hiding on every street corner. It was the ordinary German people who were informing on their neighbors.

— Professor Robert Gellately, author of Backing Hitler, March 2002

Are you among the 41% of Americans who regularly attend church or some other religious service?

Do you believe the economy is about to collapse and the government will soon declare martial law?

Do you display an unusual number of political and/or ideological bumper stickers on your car?

Are you among the 44% of Americans who live in a household with a gun? If so, are you concerned that the government may be plotting to confiscate your firearms?

If you answered yes to any of the above questions, you may be an anti-government extremist (a.k.a. domestic terrorist) in the eyes of the government and flagged for heightened surveillance and preemptive intervention.

Let that sink in a moment.

If you believe in and exercise your rights under the Constitution (namely, your right to speak freely, worship freely, associate with like-minded individuals who share your political views, criticize the government, own a weapon, demand a warrant before being questioned or searched, or any other activity viewed as potentially anti-government, racist, bigoted, anarchic or sovereign), you have just been promoted to the top of the government’s terrorism watch list.

I assure you I’m not making this stuff up.

So what is the government doing about these so-called American “extremists”?

The government is grooming the American people to spy on each other as part of its Center for Prevention Programs and Partnerships, or CP3 program.

According to journalist Leo Hohmann, the government is handing out $20 million in grants to police, mental health networks, universities, churches and school districts to enlist their help in identifying Americans who might be political dissidents or potential “extremists.”

As Hohmann explains:

Whether it’s COVID and vaccines, the war in Ukraine, immigration, the Second Amendment, LGBTQ ideology and child-gender confusion, the integrity of our elections, or the issue of protecting life in the womb, you are no longer allowed to hold dissenting opinions and voice them publicly in America. If you do, your own government will take note and consider you a potential ‘violent extremist’ and terrorist.

Cue the dawning of the Snitch State.

This new era of snitch surveillance is the lovechild of the government’s post-9/11 “See Something, Say Something” programs combined with the self-righteousness of a politically correct, hyper-vigilant, technologically-wired age.

For more than two decades, the Department of Homeland Security has plastered its “See Something, Say Something” campaign on the walls of metro stations, on billboards, on coffee cup sleeves, at the Super Bowl, even on television monitors in the Statue of Liberty. Colleges, universities and even football teams and sporting arenas have lined up for grants to participate in the program.

The government has even designated September 25 as National “If You See Something, Say Something” Awareness Day.

If you see something suspicious, says the DHS, say something about it to the police, call it in to a government hotline, or report it using a convenient app on your smart phone.

This DHS slogan is nothing more than the government’s way of indoctrinating “we the people” into the mindset that we’re an extension of the government and, as such, have a patriotic duty to be suspicious of, spy on, and turn in our fellow citizens.

This is what is commonly referred to as community policing.

Yet while community policing and federal programs such as “See Something, Say Something” are sold to the public as patriotic attempts to be on guard against those who would harm us, they are little more than totalitarian tactics dressed up and repackaged for a more modern audience as well-intentioned appeals to law and order and security.

The police state could not ask for a better citizenry than one that carries out its own policing.

After all, the police can’t be everywhere. So how do you police a nation when your population outnumbers your army of soldiers? How do you carry out surveillance on a nation when there aren’t enough cameras, let alone viewers, to monitor every square inch of the country 24/7? How do you not only track but analyze the transactions, interactions and movements of every person within the United States?

The answer is simpler than it seems: You persuade the citizenry to be your eyes and ears. You hype them up on color-coded “Terror alerts,” keep them in the dark about the distinctions between actual threats and staged “training” drills so that all crises seem real, desensitize them to the sight of militarized police walking their streets, acclimatize them to being surveilled “for their own good,” and then indoctrinate them into thinking that they are the only ones who can save the nation from another 9/11.

Consequently, we now live in a society in which a person can be accused of any number of crimes without knowing what exactly he has done. He might be apprehended in the middle of the night by a roving band of SWAT police. He might find himself on a no-fly list, unable to travel for reasons undisclosed. He might have his phones or internet tapped based upon a secret order handed down by a secret court, with no recourse to discover why he was targeted.

This Kafkaesque nightmare has become America’s reality.

This is how you turn a people into extensions of the omniscient, omnipotent, omnipresent police state, and in the process turn a citizenry against each other.

It’s a brilliant ploy, with the added bonus that while the citizenry remains focused on and distrustful of each other and shadowy forces from outside the country, they’re incapable of focusing on more definable threats that fall closer to home—namely, the government and its cabal of Constitution-destroying agencies and corporate partners.

Community policing did not come about as a feel-good, empowering response to individuals trying to “take back” their communities from crime syndicates and drug lords.

Rather, “Community-Oriented Policing” or COPS (short for Community Partnerships, Organizational Transformation, and Problem Solving) is a Department of Justice program designed to foster partnerships between police agencies and members of the community.

To this end, the Justice Department identifies five distinct “partners” in the community policing scheme: law enforcement and other government agencies, community members and groups, nonprofits, churches and service providers, private businesses and the media.

Together, these groups are supposed to “identify” community concerns, “engage” the community in achieving specific goals, serve as “powerful” partners with the government, and add their “considerable resources” to the government’s already massive arsenal of technology and intelligence. The mainstream media’s role, long recognized as being a mouthpiece for the government, is formally recognized as “publicizing” services from government or community agencies or new laws or codes that will be enforced, as well as shaping public perceptions of the police, crime problems, and fear of crime.

Inevitably, this begs the question: if there’s nothing wrong with community engagement, if the police can’t be everywhere at once, if surveillance cameras do little to actually prevent crime, and if we need to “take back our communities” from the crime syndicates and drug lords, then what’s wrong with community policing and “See Something, Say Something”?

What’s wrong is that these programs are not, in fact, making America any safer while turning us into a legalistic, intolerant, squealing, bystander nation.

We are now the unwitting victims of an interconnected, tightly woven, technologically evolving web of real-time, warrantless, wall-to-wall, widening mass surveillance dragnet comprised of fusion centers, red flag laws, behavioral threat assessments, terror watch lists, facial recognition, snitch tip lines, biometric scanners, pre-crime programs, DNA databases, data mining, precognitive technology and contact tracing apps, to name just a few.

This is how the government keeps us under control and in its crosshairs.

By the time you combine the DHS’ “See Something, Say Something” with CP3 and community policing, which has gone global in the guise of the Strong Cities Network program, you’ve got a formula for enabling the government to not only flag distinct “anti-government” segments of the population but locking down the entire nation.

Under the guise of fighting violent extremism “in all of its forms and manifestations” in cities and communities across the world, the Strong Cities Network program works with the UN and the federal government to train local police agencies across America in how to identify, fight and prevent extremism, as well as address intolerance within their communities, using all of the resources at their disposal.

What this program is really all about, however, is community policing on a global scale with the objective being to prevent violent extremism by targeting its source: racism, bigotry, hatred, intolerance, etc. In other words, police will identify, monitor and deter individuals who could be construed as potential extremist “threats,” violent or otherwise, before they can become actual threats.

The government’s war on extremists has been sold to Americans in much the same way that the USA Patriot Act was sold to Americans: as a means of combatting terrorists who seek to destroy America.

However, as we now know, the USA Patriot Act was used as a front to advance the surveillance state, allowing the government to establish a far-reaching domestic spying program that has turned every American citizen into a criminal suspect.

Similarly, the concern with the government’s ongoing anti-extremism program is that it will, in many cases, be utilized to render otherwise lawful, nonviolent activities as potentially extremist.

Keep in mind that the government agencies involved in ferreting out American “extremists” will carry out their objectives—to identify and deter potential extremists—in concert with fusion centers, data collection agencies, behavioral scientists, corporations, social media, and community organizers and by relying on cutting-edge technology for surveillance, facial recognition, predictive policing, biometrics, and behavioral epigenetics (in which life experiences alter one’s genetic makeup).

This is pre-crime on an ideological scale and it’s been a long time coming.

For example, in 2009, the Department of Homeland Security (DHS) released two reports, one on “Rightwing Extremism,” which broadly defines rightwing extremists as individuals and groups “that are mainly antigovernment, rejecting federal authority in favor of state or local authority, or rejecting government authority entirely,” and one on “Leftwing Extremism,” which labeled environmental and animal rights activist groups as extremists.

These reports, which use the words terrorist and extremist interchangeably, indicate that for the government, anyone seen as opposing the government—whether they’re Left, Right or somewhere in between—can be labeled an extremist.

Fast forward a few years, and you have the National Defense Authorization Act (NDAA), which each successive presidential administration has continually re-upped, that allows the military to take you out of your home, lock you up with no access to friends, family or the courts if you’re seen as an extremist.

Now connect the dots, from the 2009 Extremism reports to the NDAA and the far-reaching data crime fusion centers that collect and share surveillance data between local, state and federal police agencies.

Add in tens of thousands of armed, surveillance drones that will soon blanket American skies, facial recognition technology that identifies and tracks you wherever you go and whatever you do. And then to complete the circle, toss in the real-time crime centers which are attempting to “predict” crimes and identify criminals before they happen based on widespread surveillance, complex mathematical algorithms and prognostication programs.

If you can’t read the writing on the wall, you need to pay better attention.

As I point out in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, unless we can put the brakes on this dramatic expansion and globalization of the government’s powers, we’re not going to recognize this country five, ten—even twenty—years from now.

As long as “we the people” continue to allow the government to trample our rights in the so-called name of national security, things will get worse, not better.

It’s already worse.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2023/09/19/a-nation-of-snitches-dhs-is-grooming-americans-to-report-on-each-other/feed/ 0 428193
Junta ambassador asks China to share advanced nuclear technology https://www.rfa.org/english/news/myanmar/nuclear-technology-09182023154859.html https://www.rfa.org/english/news/myanmar/nuclear-technology-09182023154859.html#respond Mon, 18 Sep 2023 19:57:38 +0000 https://www.rfa.org/english/news/myanmar/nuclear-technology-09182023154859.html The Myanmar junta’s ambassador to Beijing asked Chinese officials at a weekend ASEAN forum to share advanced nuclear technology, according to a statement from the junta’s Ministry of Foreign Affairs.

The technology would be used to help Myanmar’s agriculture, health and energy sectors, the ministry said in a statement on Sunday.

The ambassador, Tin Maung Swe, made the request on Saturday at the China-ASEAN Forum for Peaceful Uses of Nuclear Technology in Nanning, China.

But political analyst Than Soe Naing said the junta is also trying to achieve its dream of owning nuclear weapons.

“They must be trying to get nuclear weapons, now that Myanmar is helpless and doesn’t have international leverage,” he told Radio Free Asia. “Therefore, they are looking for a way to own nuclear power under the pretext of the peaceful use of nuclear energy as a first step.”

The junta announced on Sept. 11 that it had re-established relations with North Korea – one of the few countries in the world that possess nuclear weapons – and was appointing Tin Maung Swe to also serve as envoy to Pyongyang. 

ENG_BUR_ChinaNukeTech_09192023_02.JPG
Representatives of ASEAN and China clap as they pose for a group photo during ASEAN-China forum on peaceful application of nuclear technology in Nanning, China, on Sept. 16. Credit: Myanmar Ministry of Foreign Affairs

Myanmar’s civilian government cut ties with North Korea five years ago, citing U.N. sanctions over the North’s nuclear weapons program. The junta took power from the civilian government in a coup d’etat on Feb. 1, 2021. 

In September 2022, the junta signed an agreement with Russia’s State Atomic Energy Corporation to jointly assess building a small reactor in Myanmar. 

The junta announced at the time that it would use nuclear energy for civilian purposes, but Myanmar’s political opposition and military analysts expressed concern that the technology would be leveraged militarily, given the country’s ongoing internal armed conflict and widespread popular opposition to the junta following the coup.

In February, the junta established a “Nuclear Technology and Information Center,” in cooperation with Russian energy firm Rosatom State Corp., in Myanmar’s commercial capital Yangon. That announcement came amid enduring suspicions that the military regime has ambitions to acquire nuclear weapons.

Translated by Myo Min Aung. Edited by Matt Reed.


This content originally appeared on Radio Free Asia and was authored by By RFA Burmese.

]]>
https://www.rfa.org/english/news/myanmar/nuclear-technology-09182023154859.html/feed/ 0 428033
New York Times Doesn’t Want Its Stories Archived https://www.radiofree.org/2023/09/17/new-york-times-doesnt-want-its-stories-archived/ https://www.radiofree.org/2023/09/17/new-york-times-doesnt-want-its-stories-archived/#respond Sun, 17 Sep 2023 10:00:00 +0000 https://theintercept.com/?p=444418

The New York Times tried to block a web crawler that was affiliated with the famous Internet Archive, a project whose easy-to-use comparisons of article versions has sometimes led to embarrassment for the newspaper.

In 2021, the New York Times added “ia_archiver” — a bot that, in the past, captured huge numbers of websites for the Internet Archive — to a list that instructs certain crawlers to stay out of its website.

Crawlers are programs that work as automated bots to trawl websites, collecting data and sending it back to a repository, a process known as scraping. Such bots power search engines and the Internet Archive’s Wayback Machine, a service that facilitates the archiving and viewing of historic versions of websites going back to 1996.

The New York Times has, in the past, faced public criticisms over some of its stealth edits.

The Internet Archive’s Wayback Machine has long been used to compare webpages as they are updated over time, clearly delineating the differences between two iterations of any given page. Several years ago, the archive added a feature called “Changes” that lets users compare two archived versions of a website from different dates or times on a single display. The tool can be used to uncover changes in news stories that have been made without any accompanying editorial notes, so-called stealth edits.

The Times has, in the past, faced public criticisms over some of its stealth edits. In a notorious 2016 incident, the paper revised an article about then-Democratic presidential candidate Sen. Bernie Sanders, I-Vt., so drastically after publication — changing the tone from one of praise to skepticism — that it came in for a round of opprobrium from other outlets as well as the Times’s own public editor. The blogger who first noticed the revisions and set off the firestorm demonstrated the changes by using the Wayback Machine.

More recently, the Times stealth-edited an article that originally listed “death” as one of six ways “you can still cancel your federal student loan debt.” Following the edit, the “death” section title was changed to a more opaque heading of “debt won’t carry on.”

A service called NewsDiffs — which provides a similar comparative service but focuses on news outlets such as the New York Times, CNN, the Washington Post, and others — has also chronicled a long list of significant examples of articles that have undergone stealth edits, though the service appears to not have been updated in several years.

The New York Times declined to comment on why it is barring the ia_archiver bot from crawling its website.

Robots.txt Files

The mechanism that websites use to block certain crawlers is a robots.txt file. If website owners want to request that a particular search engine or other automated bot not scan their website, they can add the crawler’s name to the file, which the website owner then uploads to their site where it can be publicly accessed.

Based on a web standard known as the Robots Exclusion Protocol, a robots.txt file allows site owners to specify whether they want to allow a bot to crawl either part of or their whole websites. Though bots can always choose to ignore the presence of the file, many crawler services respect the requests.

The current robots.txt file on the New York Times’s website includes an instruction to disallow all site access to the ia_archiver bot.

The relationship between ia_archiver and the Internet Archive is not completely straightforward. While the Internet Archive crawls the web itself, it also receives data from other entities. Ia_archiver was, for more than a decade, a prolific supplier of website data to the archive.

The bot belonged to Alexa Internet, a web traffic analysis company co-founded by Brewster Kahle, who went on to create the Internet Archive right after Alexa. Alexa Internet went on to be acquired by Amazon in 1999 — its trademark name was later used for Amazon’s signature voice-activated assistant — and was eventually sunset in 2022.

Throughout its existence, Alexa Internet was intricately intertwined with the Internet Archive. From 1996 to the end of 2020, the Internet Archive received over 3 petabytes — more than 3,000 terabytes — of crawled website data from Alexa. Its role in helping to fill the archive with material led users to urge website owners not to block ia_archiver under the mistaken notion that it was unrelated to the Internet Archive.

As late as 2015, the Wayback Machine offered instructions for preventing a site from being ingested into the Wayback Machine — by using the site’s robots.txt file. News websites such as the Washington Post proceeded to take full advantage of this and disallowed the ia_archiver bot.

By 2017, however, the Internet Archive announced its intention to stop abiding by the dictates of a site’s robots.txt. While the Internet Archive had already been disregarding the robots.txt for military and government sites, the new update expanded the move to disregard robots.txt for all sites. Instead, website owners could make manual exclusion requests by email.

Reputation management firms, for one, are keenly aware of the change. The New York Times, too, appears to have mobilized the more selective manual exclusion process, as certain Times stories are not available via the Wayback Machine.

Some news sites such as the Washington Post have since removed ia_archiver from their list of blocked crawlers. While other websites removed their ia_archiver blocks, however, in 2021, the New York Times decided to add it.

Join The Conversation


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/09/17/new-york-times-doesnt-want-its-stories-archived/feed/ 0 427774
Tech Companies and Governments Are Censoring the Journalist Collective DDoSecrets https://www.radiofree.org/2023/09/12/tech-companies-and-governments-are-censoring-the-journalist-collective-ddosecrets/ https://www.radiofree.org/2023/09/12/tech-companies-and-governments-are-censoring-the-journalist-collective-ddosecrets/#respond Tue, 12 Sep 2023 19:45:10 +0000 https://theintercept.com/?p=444440

Distributed Denial of Secrets — the nonprofit transparency collective that hosts an ever-growing public library of leaked and hacked datasets for journalists and researchers to investigate — has been a major source of news for organizations like the New York Times, the Washington Post, the Wall Street Journal, The Guardian, BBC News, Al Jazeera, the Associated Press, Reuters, and Fox News, among others.

It has published datasets that shed light on law enforcement fusion centers spying on Black Lives Matter activists, revealed Oath Keepers supporters among law enforcement and elected officials, and exposed thousands of videos from January 6 rioters, including many that were used as evidence in Donald Trump’s second impeachment inquiry. (Disclosure: I’m an adviser to DDoSecrets.)

But not everyone is a fan. DDoSecrets has powerful enemies and has found itself censored by some of the world’s biggest tech companies, including X (formerly Twitter) and Reddit. The governments of Russia and Indonesia are also censoring access to its website.

Shortly before the 2020 election, Twitter prevented users from posting links to a New York Post article based on documents stolen from Hunter Biden’s laptop, citing a violation of the company’s hacked materials policy. After intense pressure from Republicans, Twitter reversed course two days later. This was widely covered in the media and even led to congressional hearings.

What’s less well known is that earlier in 2020, in the midst of the Black Lives Matter uprising, Twitter used the same hacked materials policy to not only permanently ban the @DDoSecrets account, but also prevent users from posting any links to ddosecrets.com. This was in response to the collective publishing the BlueLeaks dataset, a collection of 270GB of documents from over 200 law enforcement agencies. (German authorities also seized a DDoSecrets server after the release of BlueLeaks, bringing the collective’s data server temporarily offline.)

When Elon Musk bought Twitter, which he has since renamed X, he promised that he would restore “free speech” to the platform. But Musk’s company is still censoring DDoSecrets; links to the website have been blocked on the platform for over three years. Lorax Horne, an editor at DDoSecrets, told The Intercept that they are “not surprised” that Musk isn’t interested in ending the censorship. “We afflict the comfortable, and we include a lot of trans people,” they said. “Transparency is not comforting to the richest people in the world.”

DDoSecrets censorship

X prevents users from posting links to the DDoSecrets website.

Screenshot: The Intercept

If you try to post a DDoSecrets link to X, you’ll receive an error message stating, “We can’t complete this request because this link has been identified by Twitter or our partners as being potentially harmful.” The same thing happens if you try sending a DDoSecrets link in a direct message. X did not respond to a request for comment.

“There’s no doubt that ddosecrets.com being blocked on Twitter impacts our ability to connect with journalists,” Horne told The Intercept. “In the last week, I’ve had to explain to new reporters why they can’t post our link.”

Reddit Shadow-Bans DDoSecrets

X isn’t the only company that has been censoring DDoSecrets since it published BlueLeaks in 2020. The popular social news aggregator Reddit has been doing the same, only more subtly.

As an example, I posted a link to the DDoSecrets website in the r/journalism subreddit. I also posted two comments on that post, one that included a link to the DDoSecrets BlueLeaks page and another that didn’t. While logged in to my Reddit account, I can see my post in the subreddit, and I can view both comments.

DDoSecrets censorship

Users can see their own Reddit posts with links to the DDoSecrets website.

Screenshot: The Intercept

However, when I view the r/journalism subreddit while logged in to a different Reddit account, or while not logged in at all, my post isn’t displayed. If I load the post link directly, I can see it, but the link to ddosecrets.com isn’t there, and the comment that included the link to BlueLeaks is hidden.

DDoSecrets censorship

Other Reddit users are prevented from seeing links to the DDoSecrets website.

Screenshot: The Intercept

“People can link to news articles that use our documents but can’t link to the source,” Horne said when asked about Reddit’s censorship, which “impedes people finding verified links to our archive” and “inevitably will stop some people from finding us.”

In October 2020, while I was in the midst of reporting on BlueLeaks, I did a Reddit “ask me anything,” an open conversation for members of the r/privacy community to ask about my work. At the time, we had trouble getting the AMA started because of Reddit’s censorship of DDoSecrets. Eventually, we had to start the AMA over with a new post that did not include any DDoSecrets links in the description, and I had to refrain from posting links in the comments.

“Reddit’s sitewide policies strictly prohibit posting someone’s personal information,” a Reddit spokesperson told The Intercept. “Our dedicated internal Safety teams enforce these policies through a combination of automated tooling and human review. This includes blocking links to offsite domains that break our policies.”

Like X, Reddit is inconsistent in enforcing its policy. After receiving Reddit’s statement, I posted a link in the r/journalism subreddit to the WikiLeaks website. Unlike DDoSecrets, which distributes most datasets that contain people’s private information only to journalists and researchers who request access, WikiLeaks published everything for anyone to download. In 2016, for example, the group published a dataset that included private information, including addresses and cellphone numbers, for 20 million female voters in Turkey.

But Reddit doesn’t censor links to WikiLeaks like it does with DDoSecrets; if I view the r/journalism subreddit while not logged in to a Reddit account, my post with the link shows up.

DDoSecrets censorship

Reddit users can freely post links to the WikiLeaks website.

Screenshot: The Intercept

Russia and Indonesia Bar Access

After Russia invaded Ukraine in February 2022, hackers, most claiming to be hacktivists, compromised dozens of Russian organizations, including government agencies, oil and gas companies, and financial institutions. They flooded DDoSecrets with terabytes of Russian data, which the collective published.

One of the hacked organizations was Roskomnadzor, the Russian government agency responsible for spying on and censoring the internet and other mass media in Russia. The most recent leak of data from this agency (DDoSecrets hosts three separate leaks) includes information about Russia censoring DDoSecrets itself.

“Colleagues, good morning! Please include links in the register of violators,” a Russian censor wrote in an August 2022 email buried in a collection of 335GB of data from the General Radio Frequency Center of Roskomnadzor. A scanned court document adding ddosecrets.com to Russia’s censorship list was attached to the email.

“It was only a matter of time,” Horne said of Russia blocking access to DDoSecrets. “Our partners like IStories, OCCRP, and Meduza have it worse and have been placed on the undesirable organizations list. We are lucky that we have no staff in Russia and haven’t had to move anyone out of the country.”

Roskomnadzor did not respond to a request for comment.

Indonesia has also blocked access to the DDoSecrets website since July 21, 2023, according to data collected by the Open Observatory of Network Interference, a project that monitors internet censorship by analyzing data from probes located around the world.

Indonesia’s Ministry of Communication and Informatics, the government agency responsible for internet censorship, did not respond to a request for comment.

On July 18, three days before the block went into effect, DDoSecrets published over half a million emails from the Jhonlin Group, a coal mining and palm oil conglomerate that has been criticized by Reporters Without Borders and Human Rights Watch for using police to jail journalists.

Join The Conversation


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2023/09/12/tech-companies-and-governments-are-censoring-the-journalist-collective-ddosecrets/feed/ 0 426673
Stuff joins global media groups curbing Open AI from using news sites https://www.radiofree.org/2023/09/11/stuff-joins-global-media-groups-curbing-open-ai-from-using-news-sites/ https://www.radiofree.org/2023/09/11/stuff-joins-global-media-groups-curbing-open-ai-from-using-news-sites/#respond Mon, 11 Sep 2023 11:54:38 +0000 https://asiapacificreport.nz/?p=92933 Stuff

New Zealand’s Stuff media group has joined other leading news organisations around the world in restricting Open AI from using its content to power artificial intelligence tool Chat GPT.

A growing number of media companies globally have taken action to block access to Open AI bots from crawling and scraping content from their news sites.

Open AI is behind the most well-known and fastest-growing artificial intelligence chatbots, Chat GPT, released late 2022.

“The scraping of any content from Stuff or its news masthead sites for commercial gain has always been against our policy,” says Stuff CEO Laura Maxwell. “But it is important in this new era of Generative AI that we take further steps to protect our intellectual property.”

Generative Artificial Intelligence (Gen AI) is the name given to technologies that use vast amounts of information scraped from the internet to train large language models (LLMs).

This enables them to generate seemingly original answers — in text, visuals or other media — to queries based on mathematically predicting the most likely right answer to a prompt or dialogue.

Some of the most well-known Gen AI tools include Open AI’s ChatGPT and Dall-E, and Google’s Bard.

Surge of unease
There has been a surge of unease from news organisations, artists, writers and other creators of original content that their work has already been harvested without permission, knowledge or compensation by Open AI or other tech companies seeking to build new commercial products through Gen AI technology.

“High quality, accurate and credible journalism is of great value to these businesses, yet the business model of journalism has been significantly weakened as a result of their growth off the back of that work,” said Maxwell.

“The news industry must learn from the mistakes of the past, namely what happened in the era of search engines and social media, where global tech giants were able to build businesses of previously unimaginable scale and influence off the back of the original work of others.

“We recognise the value of our work to Open AI and others, and also the huge risk that these new tools pose to our existence if we do not protect our IP now.”

There is also increasing concern these tools will exacerbate the spread of disinformation and misinformation globally.

“Content produced by journalists here and around the world is the cornerstone of what makes these Gen AI tools valuable to the user,” Maxwell said.

“Without it, the models would be left to train on a sea of dross, misinformation and unverified information on the internet — and increasingly that will become the information that has itself been already generated by AI.

Risk of ‘eating itself’
“There is a risk the whole thing will end up eating itself.”

Stuff and other news companies have been able to block Open AI’s access to their content because its web crawler, GPTBot, is identifiable.

But not all crawlers are clearly labelled.

Stuff has also updated its site terms and conditions to expressly bar the use of its content to train AI models owned by any other company, as well as any other unauthorised use of its content for commercial use.

Earlier this year The Washington Post published a tool that detailed all major New Zealand news websites were already being used by OpenAI.

OpenAI has entered into negotiations with some news organisations in the United States, notably Associated Press, to license their content to train ChatGPT.

So far these agreements have not been widespread although a number of news companies globally are seeking licensing arrangements.

Maxwell said Stuff was looking forward to holding conversations around licensing its content in due course.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2023/09/11/stuff-joins-global-media-groups-curbing-open-ai-from-using-news-sites/feed/ 0 426319
Huawei Surpasses US Sanctions https://www.radiofree.org/2023/09/10/huawei-surpasses-us-sanctions/ https://www.radiofree.org/2023/09/10/huawei-surpasses-us-sanctions/#respond Sun, 10 Sep 2023 14:23:32 +0000 https://dissidentvoice.org/?p=143911 This week’s News on China.

• Huawei overcomes US sanctions
• Giant hybrid rice yields up to 9,000 kg/h
• War on pollution increases life expectancy by two years
• Chinese study reveals near-extinction of humans one million years ago


This content originally appeared on Dissident Voice and was authored by Dongsheng News.

]]>
https://www.radiofree.org/2023/09/10/huawei-surpasses-us-sanctions/feed/ 0 426212
Vice Pulled a Documentary Critical of Saudi Arabia. But Here It Is. https://www.radiofree.org/2023/09/09/vice-pulled-a-documentary-critical-of-saudi-arabia-but-here-it-is/ https://www.radiofree.org/2023/09/09/vice-pulled-a-documentary-critical-of-saudi-arabia-but-here-it-is/#respond Sat, 09 Sep 2023 11:00:00 +0000 https://theintercept.com/?p=444000

In the past, Vice has documented the history of censorship on YouTube. More recently, since the company’s near implosion, it became an active participant in making things disappear.

In June, six months after announcing a partnership deal with a Saudi Arabian government-owned media company, Vice uploaded but then quickly removed a documentary critical of the Persian Gulf monarchy’s notorious dictator, Crown Prince Mohammed bin Salman, or MBS.

The nearly nine-minute film, titled “Inside Saudi Crown Prince’s Ruthless Quest for Power,” was uploaded to the Vice News YouTube channel on June 19, 2023. It garnered more than three-quarters of a million views before being set to “private” within four days of being posted. It can no longer be seen at its original link on Vice’s YouTube channel; visitors see a message that says “video unavailable.” Vice did not respond to a request for comment on why the video was published and then made private or if there are any plans to make the video public again.

The Guardian first reported that a “film in the Vice world news Investigators series about Saudi crown prince Mohammed bin Salman was deleted from the internet after being uploaded.” Though Vice did remove the film from its public YouTube channel, it is, in fact, not “deleted from the internet” and presently remains publicly accessible via web archival services.

Vice’s description of the video, now also unavailable on YouTube, previously stated that Saudi Crown Prince Mohammed “orchestrates The Ritz Purge, kidnaps Saudi’s elites and royal relatives with allegations of torture inside, and his own men linked to the brutal hacking of Journalist Khashoggi – a murder that stunned the world.” The description goes on to state that Wall Street Journal reporters Bradley Hope and Justin Scheck “attempt to unfold the motivations of the prince’s most reckless decision-making.” Hope and Scheck are the co-authors of the 2020 book “Blood and Oil: Mohammed bin Salman’s Ruthless Quest for Global Power.”

A screenshot from the documentary “Inside Saudi Crown Prince’s Ruthless Quest for Power,” which Vice News deleted from its YouTube channel.

Image: The Intercept; Source: Vice News

In the documentary, Hope states that Crown Prince Mohammed is “disgraced internationally” owing to the Jamal Khashoggi murder, a topic which Vice critically covered at length in the past. More recently, however, Vice has shifted its coverage of Saudi Arabia, apparently due to the growth of its commercial relationship with the kingdom. The relationship appears to have begun in 2017, owing to MBS’s younger brother, Khalid bin Salman, being infatuated with the brand; bin Salman reportedly set up a meeting between Vice co-founder Shane Smith and MBS.

By the end of 2018, Vice had worked with the Saudi Research and Media Group to produce promotional videos for Saudi Arabia. A few days after the Guardian piece detailing the deal came out, an “industry source” told Variety (whose parent company, Penske Media Corporation, received $200 million from the Saudi sovereign wealth fund earlier that year) that Vice was “reviewing” its contract with SRMG.

A subsequent Guardian investigation revealed that in 2020, Vice helped organize a Saudi music festival subsidized by the Saudi government. Vice’s name was not listed on publicity materials for the event, and contractors working on the event were presented with nondisclosure agreements.

In 2021, Vice opened an office in Riyadh, Saudi Arabia. The media company has gone from being “banned from filming in Riyadh” in 2018 to now actively recruiting for a producer “responsible for developing and assisting the producing of video content from short form content to long-form for our new media brand, headquartered in Riyadh.” The company lists 11 other Riyadh-based openings.

Commenting on the opening of the Riyadh office, a Vice spokesperson told the Guardian that “our editorial voice has and always will report with complete autonomy and independence.” In response to the Guardian recently asking about the rationale for the removal of the film, a Vice source stated that this was partially owing to concerns about the safety of Saudi-based staff.

In September 2022, the New York Times reported that Vice was considering engaging in a deal with the Saudi media company MBC. The deal was officially announced at the start of 2023. Most recently, the Guardian reported that Vice shelved a story which stated that the “Saudi state is helping families to harass and threaten transgender Saudis based overseas.” In response to this latest instance of apparent capitulation to advancing Saudi interests, the Vice Union issued a statement saying that it was “horrified but not shocked.” It added, “We know the company is financially bankrupt, but it shouldn’t be morally bankrupt too.”

Meanwhile, a map of Saudi Arabia reportedly hangs on a wall in Vice’s London office.

Join The Conversation


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/09/09/vice-pulled-a-documentary-critical-of-saudi-arabia-but-here-it-is/feed/ 0 426094
U.S. Spy Agency Dreams of Surveillance Underwear It’s Calling “SMART ePANTS” https://www.radiofree.org/2023/09/02/u-s-spy-agency-dreams-of-surveillance-underwear-its-calling-smart-epants/ https://www.radiofree.org/2023/09/02/u-s-spy-agency-dreams-of-surveillance-underwear-its-calling-smart-epants/#respond Sat, 02 Sep 2023 10:00:00 +0000 https://theintercept.com/?p=443504

The future of wearable technology, beyond now-standard accessories like smartwatches and fitness tracking rings, is ePANTS, according to the intelligence community. 

The federal government has shelled out at least $22 million in an effort to develop “smart” clothing that spies on the wearer and its surroundings. Similar to previous moonshot projects funded by military and intelligence agencies, the inspiration may have come from science fiction and superpowers, but the basic applications are on brand for the government: surveillance and data collection.

Billed as the “largest single investment to develop Active Smart Textiles,” the SMART ePANTS — Smart Electrically Powered and Networked Textile Systems — program aims to develop clothing capable of recording audio, video, and geolocation data, the Office of the Director of National Intelligence announced in an August 22 press release. Garments slated for production include shirts, pants, socks, and underwear, all of which are intended to be washable.

The project is being undertaken by the Intelligence Advanced Research Projects Activity, the intelligence community’s secretive counterpart to the military’s better-known Defense Advanced Research Projects Agency, or DARPA. IARPA’s website says it “invests federal funding into high-risk, high reward projects to address challenges facing the intelligence community.” Its tolerance for risk has led to both impressive achievements, like a Nobel Prize awarded to physicist David Wineland for his research on quantum computing funded by IARPA, as well as costly failures.

“A lot of the IARPA and DARPA programs are like throwing spaghetti against the refrigerator,” Annie Jacobsen, author of a book about DARPA, “The Pentagon’s Brain,” told The Intercept. “It may or may not stick.”

According to the Office of the Director of National Intelligence’s press release, “This eTextile technology could also assist personnel and first responders in dangerous, high-stress environments, such as crime scenes and arms control inspections without impeding their ability to swiftly and safely operate.”

IARPA contracts for the SMART ePANTS program have gone to five entities. As the Pentagon disclosed this month along with other contracts it routinely announces, IARPA has awarded $11.6 million and $10.6 million to defense contractors Nautilus Defense and Leidos, respectively. The Pentagon did not disclose the value of the contracts with the other three: Massachusetts Institute of Technology, SRI International, and Areté. “IARPA does not publicly disclose our funding numbers,” IARPA spokesperson Nicole de Haay told The Intercept.

Dawson Cagle, a former Booz Allen Hamilton associate, serves as the IARPA program manager leading SMART ePANTS. Cagle invoked his time serving as a United Nations weapons inspector in Iraq between 2002 and 2006 as important experience for his current role.

“As a former weapons inspector myself, I know how much hand-carried electronics can interfere with my situational awareness at inspection sites,” Cagle recently told Homeland Security Today. “In unknown environments, I’d rather have my hands free to grab ladders and handrails more firmly and keep from hitting my head than holding some device.”

SMART ePANTS is not the national security community’s first foray into high-tech wearables. In 2013, Adm. William McRaven, then-commander of U.S. Special Operations Command, presented the Tactical Assault Light Operator Suit. Called TALOS for short, the proposal sought to develop a powered exoskeleton “supersuit” similar to that worn by Matt Damon’s character in “Elysium,” a sci-fi action movie released that year. The proposal also drew comparisons to the suit worn by Iron Man, played by Robert Downey Jr., in a string of blockbuster films released in the run-up to TALOS’s formation.

“Science fiction has always played a role in DARPA,” Jacobsen said.

The TALOS project ended in 2019 without a demonstrable prototype, but not before racking up $80 million in costs.

As IARPA works to develop SMART ePANTS over the next three and a half years, Jacobsen stressed that the advent of smart wearables could usher in troubling new forms of government biometric surveillance.

“They’re now in a position of serious authority over you. In TSA, they can swab your hands for explosives,” Jacobsen said. “Now suppose SMART ePANTS detects a chemical on your skin — imagine where that can lead.” With consumer wearables already capable of monitoring your heartbeat, further breakthroughs could give rise to more invasive biometrics.

“IARPA programs are designed and executed in accordance with, and adhere to, strict civil liberties and privacy protection protocols. Further, IARPA performs civil liberties and privacy protection compliance reviews throughout our research efforts,” de Haay, the spokesperson, said.

There is already evidence that private industry outside of the national security community are interested in smart clothing. Meta, Facebook’s parent company, is looking to hire a researcher “with broad knowledge in smart textiles and garment construction, integration of electronics into soft and flexible systems, and who can work with a team of researchers working in haptics, sensing, tracking, and materials science.”

The spy world is no stranger to lavish investments in moonshot technology. The CIA’s venture capital arm, In-Q-Tel, recently invested in Colossal Biosciences, a wooly mammoth resurrection startup, as The Intercept reported last year.

If SMART ePANTS succeeds, it’s likely to become a tool in IARPA’s arsenal to “create the vast intelligence, surveillance, and reconnaissance systems of the future,” said Jacobsen. “They want to know more about you than you.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Ken Klippenstein.

]]>
https://www.radiofree.org/2023/09/02/u-s-spy-agency-dreams-of-surveillance-underwear-its-calling-smart-epants/feed/ 0 424681
Meta Overhauls Controversial “Dangerous Organizations” Censorship Policy https://www.radiofree.org/2023/08/30/meta-overhauls-controversial-dangerous-organizations-censorship-policy/ https://www.radiofree.org/2023/08/30/meta-overhauls-controversial-dangerous-organizations-censorship-policy/#respond Wed, 30 Aug 2023 16:32:15 +0000 https://theintercept.com/?p=442999

The social media giant Meta recently updated the rulebook it uses to censor online discussion of people and groups it deems “dangerous,” according to internal materials obtained by The Intercept. The policy had come under fire in the past for casting an overly wide net that ended up removing legitimate, nonviolent content.

The goal of the change is to remove less of this material. In updating the policy, Meta, the parent company of Facebook and Instagram, also made an internal admission that the policy has censored speech beyond what the company intended.

Meta’s “Dangerous Organizations and Individuals,” or DOI, policy is based around a secret blacklist of thousands of people and groups, spanning everything from terrorists and drug cartels to rebel armies and musical acts. For years, the policy prohibited the more than one billion people using Facebook and Instagram from engaging in “praise, support or representation” of anyone on the list.

Now, Meta will provide a greater allowance for discussion of these banned people and groups — so long as it takes place in the context of “social and political discourse,” according to the updated policy, which also replaces the blanket prohibition against “praise” of blacklisted entities with a new ban on “glorification” of them.

The updated policy language has been distributed internally, but Meta has yet to disclose it publicly beyond a mention of the “social and political discourse” exception on the community standards page. Blacklisted people and organizations are still banned from having an official presence on Meta’s platforms.

The revision follows years of criticism of the policy. Last year, a third-party audit commissioned by Meta found the company’s censorship rules systematically violated the human rights of Palestinians by stifling political speech, and singled out the DOI policy. The new changes, however, leave major problems unresolved, experts told The Intercept. The “glorification” adjustment, for instance, is well intentioned but likely to suffer from the same ambiguity that created issues with the “praise” standard.

“Changing the DOI policy is a step in the right direction, one that digital rights defenders and civil society globally have been requesting for a long time,” Mona Shtaya, nonresident fellow at the Tahrir Institute for Middle East Policy, told The Intercept.

Observers like Shtaya have long objected to how the DOI policy has tended to disproportionately censor political discourse in places like Palestine — where discussing a Meta-banned organization like Hamas is unavoidable — in contrast to how Meta rapidly adjusted its rules to allow praise of the Ukrainian Azov Battalion despite its neo-Nazi sympathies.

“The recent edits illustrate that Meta acknowledges the participation of certain DOI members in elections,” Shtaya said. “However, it still bars them from its platforms, which can significantly impact political discourse in these countries and potentially hinder citizens’ equal and free interaction with various political campaigns.”

Acknowledged Failings

Meta has long maintained the original DOI policy is intended to curtail the ability of terrorists and other violent extremists from causing real-world harm. Content moderation scholars and free expression advocates, however, maintain that the way the policy operates in practice creates a tendency to indiscriminately swallow up and delete entirely nonviolent speech. (Meta declined to comment for this story.)

In the new internal language, Meta acknowledged the failings of its rigid approach and said the company is attempting to improve the rule. “A catch-all policy approach helped us remove any praise of designated entities and individuals on the platform,” read an internal memo announcing the change. “However, this approach also removes social and political discourse and causes enforcement challenges.”

Meta’s proposed solution is “recategorizing the definition of ‘Praise’ into two areas: ‘References to a DOI,’ and ‘Glorification of DOIs.’ These fundamentally different types of content should be treated differently.” Mere “references” to a terrorist group or cartel kingpin will be permitted so long as they fall into one of 11 new categories of discourse Meta deems acceptable:

Elections, Parliamentary and executive functions, Peace and Conflict Resolution (truce/ceasefire/peace agreements), International agreements or treaties, Disaster response and humanitarian relief, Human Rights and humanitarian discourse, Local community services, Neutral and informative descriptions of DOI activity or behavior, News reporting, Condemnation and criticism, Satire and humor.

Posters will still face strict requirements to avoid running afoul of the policy, even if they’re attempting to participate in one of the above categories. To stay online, any Facebook or Instagram posts mentioning banned groups and people must “explicitly mention” one of the permissible contexts or face deletion. The memo says “the onus is on the user to prove” that they’re fitting into one of the 11 acceptable categories.

According to Shtaya, the Tahrir Institute fellow, the revised approach continues to put Meta’s users at the mercy of a deeply flawed system. She said, “Meta’s approach places the burden of content moderation on its users, who are neither language experts nor historians.”

Unclear Guidance

Instagram and Facebook users will still have to hope their words aren’t interpreted by Meta’s outsourced legion of overworked, poorly paid moderators as “glorification.” The term is defined internally in almost exactly the same language as its predecessor, “praise”: “Legitimizing or defending violent or hateful acts by claiming that those acts or any type of harm resulting from them have a moral, political, logical, or other justification that makes them appear acceptable or reasonable.” Another section defines glorification as any content that “justifies or amplifies” the “hateful or violent” beliefs or actions of a banned entity, or describes them as “effective, legitimate or defensible.”

Though Meta intends this language to be universal, equitably and accurately applying labels as subjective as “legitimate” or “hateful” to the entirety of global online discourse has proven impossible to date.

“Replacing ‘praise’ with ‘glorification’ does little to change the vagueness inherent to each term,” according to Ángel Díaz, a professor at University of Southern California’s Gould School of Law and a scholar of social media content policy. “The policy still overburdens legitimate discourse.”

“Replacing ‘praise’ with ‘glorification’ does little to change the vagueness inherent to each term. The policy still overburdens legitimate discourse.”

The notions of “legitimization” or “justification” are deeply complex, philosophical matters that would be difficult to address by anyone, let alone a contractor responsible for making hundreds of judgments each day.

The revision does little to address the heavily racialized way in which Meta assesses and attempts to thwart dangerous groups, Díaz added. While the company still refuses to disclose the blacklist or how entries are added to it, The Intercept published a full copy in 2021. The document revealed that the overwhelming majority of the “Tier 1” dangerous people and groups — who are still subject to the harshest speech restrictions under the new policy — are Muslim, Arab, or South Asian. White, American militant groups, meanwhile, are overrepresented in the far more lenient “Tier 3” category.

Díaz said, “Tier 3 groups, which appear to be largely made up of right-wing militia groups or conspiracy networks like QAnon, are not subject to bans on glorification.”

Meta’s own internal rulebook seems unclear about how enforcement is supposed to work, seemingly still dogged by the same inconsistencies and self-contradictions that have muddled its implementation for years.

For instance, the rule permits “analysis and commentary” about a banned group, but a hypothetical post arguing that the September 11 attacks would not have happened absent U.S. aggression abroad is considered a form of glorification, presumably of Al Qaeda, and should be deleted, according to one example provided in the policy materials. Though one might vehemently disagree with that premise, it’s difficult to claim it’s not a form of analysis and commentary.

Another hypothetical post in the internal language says, in response to Taliban territorial gains in the Afghanistan war, “I think it’s time the U.S. government started reassessing their strategy in Afghanistan.” The post, the rule says, should be labeled as nonviolating, despite what appears to be a clear-cut characterization of the banned group’s actions as “effective.”

David Greene, civil liberties director at the Electronic Frontier Foundation, told The Intercept these examples illustrate how difficult it will be to consistently enforce the new policy. “They run through a ton of scenarios,” Greene said, “but for me it’s hard to see a through-line in them that indicates generally applicable principles.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/08/30/meta-overhauls-controversial-dangerous-organizations-censorship-policy/feed/ 0 423926
We the Targeted: How the Government Weaponizes Surveillance to Silence Its Critics https://www.radiofree.org/2023/08/29/we-the-targeted-how-the-government-weaponizes-surveillance-to-silence-its-critics/ https://www.radiofree.org/2023/08/29/we-the-targeted-how-the-government-weaponizes-surveillance-to-silence-its-critics/#respond Tue, 29 Aug 2023 20:59:35 +0000 https://dissidentvoice.org/?p=143564 Ever since Martin Luther King Jr. delivered his groundbreaking “I Have a Dream” speech during the March on Washington for Jobs and Freedom on August 28, 1963, the Deep State has been hard at work turning King’s dream into a living nightmare.

The end result of the government’s efforts over the past 60 years is a country where nothing ever really changes, and everyone lives in fear.

Race wars are still being stoked by both the Right and the Left; the military-industrial complex is still waging profit-driven wars at taxpayer expense; the oligarchy is still calling the shots in the seats of government power; and the government is still weaponizing surveillance in order to muzzle anti-government sentiment, harass activists, and terrorize Americans into compliance.

This last point is particularly disturbing.

Starting in the 1950s, the government relied on COINTELPRO, its domestic intelligence program, to neutralize domestic political dissidents. Those targeted by the FBI under COINTELPRO for its intimidation, surveillance and smear campaigns included: Martin Luther King Jr., Malcom X, the Black Panther Party, John Lennon, Billie Holiday, Emma Goldman, Aretha Franklin, Charlie Chaplin, Ernest Hemingway, Felix Frankfurter, and hundreds more.

In more recent decades, the powers-that-be have expanded their reach to target anyone who opposes the police state, regardless of their political leanings.

Advances in technology have enabled the government to deploy a veritable arsenal of surveillance weapons in order to “expose, disrupt, misdirect, discredit, or otherwise neutralize” perceived threats to the government’s power.

What this adds up to is a world in which, on any given day, the average person is now monitored, surveilled, spied on and tracked in more than 20 different ways by both government and corporate eyes and ears.

Consider just a small sampling of the ways in which the government is weaponizing its 360 degree surveillance technologies to flag you as a threat to national security, whether or not you’ve done anything wrong.

Flagging you as a danger based on your feelings. Customs and Border Protection is reportedly using an artificial intelligence surveillance program that can detect “sentiment and emotion” in social media posts in order to identify travelers who may be “a threat to public safety, national security, or lawful trade and travel.”

Flagging you as a danger based on your phone and movements. Cell phones have become de facto snitches, offering up a steady stream of digital location data on users’ movements and travels.

Flagging you as a danger based on your DNA. By accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc.

Flagging you as a danger based on your face. Facial recognition software aims to create a society in which every individual who steps out into public is tracked and recorded as they go about their daily business.

Flagging you as a danger based on your behavior. Rapid advances in behavioral surveillance are not only making it possible for individuals to be monitored and tracked based on their patterns of movement or behavior, including gait recognition (the way one walks), but have given rise to whole industries that revolve around predicting one’s behavior based on data and surveillance patterns and are also shaping the behaviors of whole populations.

Flagging you as a danger based on your spending and consumer activities. With every dollar we spend, we’re helping Corporate America build a dossier for its government counterparts on who we know, what we think, how we spend our money, and how we spend our time.

Flagging you as a danger based on your public activities. Private corporations in conjunction with police agencies throughout the country have created a web of surveillance that encompasses all major cities in order to monitor large groups of people seamlessly, as in the case of protests and rallies.

Flagging you as a danger based on your social media activities. As The Intercept reported, the FBI, CIA, NSA and other government agencies are increasingly investing in and relying on corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior.

Flagging you as a danger based on your social network. Not content to merely spy on individuals through their online activity, government agencies are now using surveillance technology to track one’s social network, the people you might connect with by phone, text message, email or through social message, in order to ferret out possible criminals.

Flagging you as a danger based on your car. License plate readers are mass surveillance tools that can photograph over 1,800 license tag numbers per minute, take a picture of every passing license tag number and store the tag number and the date, time, and location of the picture in a searchable database, then share the data with law enforcement, fusion centers and private companies to track the movements of persons in their cars.

Flagging you as a danger based on your political views. The Church Committee, the Senate task force charged with investigating COINTELPRO abuses in 1975, concluded that the government had carried out “secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power.” The report continued: “Groups and individuals have been harassed and disrupted because of their political views and their lifestyles… Intelligence agencies have served the political and personal objectives of presidents and other high officials.” Nothing has changed since then.

Now the government wants us to believe that we have nothing to fear from these mass spying programs as long as we’ve done nothing wrong.

Don’t believe it.

The government’s definition of a “bad” guy is extraordinarily broad, and it results in the warrantless surveillance of innocent, law-abiding Americans on a staggering scale.

Moreover, there is a repressive, suppressive effect to surveillance that not only acts as a potentially small deterrent on crime but serves to monitor and chill lawful First Amendment activity, and that is the whole point.

Weaponized surveillance is re-engineering a society structured around the aesthetic of fear.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, the police state wants us silent, servile and compliant.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2023/08/29/we-the-targeted-how-the-government-weaponizes-surveillance-to-silence-its-critics/feed/ 0 423680
Rabuka’s nuclear wastewater discharge stance splits Fiji coalition opinion https://www.radiofree.org/2023/08/28/rabukas-nuclear-wastewater-discharge-stance-splits-fiji-coalition-opinion/ https://www.radiofree.org/2023/08/28/rabukas-nuclear-wastewater-discharge-stance-splits-fiji-coalition-opinion/#respond Mon, 28 Aug 2023 08:12:21 +0000 https://asiapacificreport.nz/?p=92410 RNZ Pacific

One of Fiji’s three deputy prime ministers, Viliame Gavoka, has appealed to the country’s prime minister to review his stance on Japan’s disposal of treated nuclear wastewater into the Pacific Ocean.

Prime Minister Sitiveni Rabuka supports Japan’s compliance with safety protocols outlined by the UN’s International Atomic Energy Agency.

However, Rabuka also spoke about the need for an independent scientific assessment.

He has also signed off on the Melanesian Spearhead Group’s Udaune Declaration on Climate Change, in which his fellow prime ministers of Papua New Guinea, Solomon Oslands and Vanuatu, and spokersperson of FLNKS of New Caledonia, “strongly urged Japan “not to discharge the treated water into the Pacific Ocean until and unless the treated water is incontrovertibly proven scientifically to be safe to do so and seriously consider other options like use in concrete”.

Japan has, however, already begun the release of the treated nuclear wastewater in spite of strong condemnation from the region and across the world.

Gavoka, who is also leader of the Social Democratic Liberal Party (SODELPA), further highlighted the concerns of his party’s Youth section which also implored Rabuka to reconsider his position.

Sitiveni Rabuka, sitting middle, signs up to the Udaune Declaration on Climate Change in Port Vila (24 August 2023)
Fiji Prime Minister Sitiveni Rabuka (sitting middle, flanked by host Vanuatu PM Ishmael Kalsakau, left, and Solomon Islands PM Manasseh Sogavare) signs up to the Udaune Declaration on Climate Change and the Efate Declaration on Security at the 22nd Melanesian Spearhead Group Leader’s Summit in Port Vila. last week. Image: RNZ Pacific/Kelvin Anthony

The SODELPA leader acknowledged the diversity of opinions within the coalition government and the allowance for conscience votes, underlining the dynamics of political relationships.

SODELPA general-secretary Viliame Takayawa is also concerned, particularly noting the view that Rabuka has taken on the role of a national leader.

He confirmed that the party intends to communicate directly with the prime minister on Tuesday to raise this pressing issue.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/08/28/rabukas-nuclear-wastewater-discharge-stance-splits-fiji-coalition-opinion/feed/ 0 423111
In a historic about-face, Apple publicly supports right-to-repair bill https://grist.org/technology/in-a-historic-about-face-apple-publicly-supports-right-to-repair-bill/ https://grist.org/technology/in-a-historic-about-face-apple-publicly-supports-right-to-repair-bill/#respond Thu, 24 Aug 2023 18:24:09 +0000 https://grist.org/?p=616904 After years spent fighting independent repair, Apple appears to be throwing in the towel. 

On Tuesday, the most valuable company in the world delivered a letter to California Senator Susan Eggman expressing its support for SB 244, a “right-to-repair” bill that would make it easier for the public to access the spare parts, tools, and repair documentation needed to fix devices.

“Today, Apple writes in support of SB 244, and urges members of the California legislature to pass the bill as currently drafted,” D. Michael Foulkes, Apple’s director of state and local government affairs, wrote in the letter.

It was a dramatic turnaround for a company that has played a key role in quashing right-to-repair bills in statehouses around the country, including California. As recently as 2022, Apple asked New York Governor Kathy Hochul to veto a right-to-repair bill. (Hochul wound up signing that bill into law, but not before revising the text to make it more corporate friendly.) But advocates say that Apple recognized it was on the losing side of the fight over repair access. Its decision to support a right-to-repair bill in its home state reflects the growing pressure Apple faces from shareholders, lawmakers, federal regulators, and the public to end monopolistic restrictions that limit consumers’ ability to fix their devices.

“Right to repair is here to stay, and they know it,” Nathan Proctor, who heads the U.S. Public Research Interest Group’s right-to-repair campaign, told Grist. 

That wasn’t always the case. For years, Apple’s position was that making parts and repair tools available to the public is a bad idea. Over the years, the company has repeatedly claimed that right-to-repair laws create safety and cybersecurity risks and could force manufacturers to divulge trade secrets. Despite the U.S. Federal Trade Commission concluding in 2021 that there was “scant evidence” to support these claims, Apple, along with trade associations it’s a member of, continued making them. In a letter to Hochul last August, the company wrote that New York’s electronics right-to-repair bill, which had recently passed the state legislature, would “harm consumer security, privacy, safety and transparency … and do nothing to advance New York’s environmental goals.”

Iphones on display in an apple store
IPhones are displayed at an Apple Store in Yichang, China. CFOTO / Future Publishing via Getty Images

Repair advocates counter these arguments by pointing out that it is in Apple’s financial interest to ensure its customers only get their devices fixed on the company’s terms. When consumers have limited ways to repair damaged or malfunctioning gadgets, they often choose to replace them, ensuring a steady stream of sales for manufacturers like Apple. Greater access to independent repair, advocates say, benefits consumers, who often are able to fix things more conveniently and more affordably at home or via an independent shop. According to both advocates and tech industry-backed research, it also benefits the planet: With more repair options, consumers are able to keep their current devices in use for longer, reducing electronic waste and the carbon emissions tied to manufacturing new ones.

Apparently, Apple now agrees with repair advocates. “In recent years, Apple has taken significant steps to expand options for consumers to repair their devices which we know is good for consumers’ budgets and good for the environment,” Foulkes wrote in the letter.

Apple’s about-face didn’t come out of nowhere. As Foulkes’ letter points out, the company began shifting its public position on independent repair a few years back, as the right-to-repair movement was garnering national media attention and high-level support

In 2019, Apple launched its “Independent Repair Provider” program, granting independent shops access to the repair documentation and original parts that were previously only available to Apple “authorized” repair partners. In 2022, it announced “Self Service Repair,” a program that allows customers to purchase genuine Apple parts and tools to make common repairs on newer iPhones and Macs. Both programs have their flaws — the Independent Repair Provider program required independent shops to sign an onerous contract, while Self Service Repair, by many accounts, is an expensive and clunky way to fix a device. But advocates also hailed both as symbolic victories, considering Apple’s influence on the broader consumer tech industry.

Voicing support for a right-to-repair bill in California, the largest economy in the country and the central nervous system of Big Tech, may be Apple’s biggest symbolic concession yet. Unlike in the past, when Apple has simply asked lawmakers to shoot down right-to-repair bills, Proctor said that this time the company came to the negotiating table. Working with the office of bill author Eggman, Apple pushed for some changes to the text. Ultimately, the bill reached a place where the company was comfortable supporting it. 

The bill requires that manufacturers of electronics and appliances make parts, repair tools, and documentation available to the general public, for devices first sold on or after July 1, 2021. For devices costing between $50 and $99.99, manufacturers must provide repair access for at least three years after the product is no longer manufactured; for those costing more than $100, that number rises to seven years. In its letter, Apple lists a few bill provisions that were crucial for the company’s support, including language that clearly states manufacturers only have to offer the public the same parts, tools, and manuals available to authorized repair partners, and the bill’s exclusive focus on newer devices. 

Overhead view of a man taking apart an iphone
A repair technician takes apart an iPhone to fix a cracked screen in May 2016. Liz Hafalia / The San Francisco Chronicle via Getty Images

“Apple’s support for California’s Right to Repair Act demonstrates the power of the movement that has been building for years and the ability for industries to partner with us to make good policy to benefit the people of California,” Eggman told Grist in an emailed statement. “I’m grateful for their engagement on this issue and for leading among their peers when it comes to supporting access to repair.”

By choosing to work with lawmakers on SB 244, Apple is following in the footsteps of Microsoft, which negotiated the details of a recent Washington state right-to-repair bill before supporting it publicly. (Ironically, that bill stalled out in the state Senate after failing to gain the support of a key Democrat who is a former Apple executive.) While it’s unclear whether Microsoft’s cooperative approach on right to repair in Washington directly influenced the iPhone maker’s strategy in California, advocates previously told Grist that Microsoft’s leadership helped bring the entire tech industry to the negotiating table. Apple didn’t respond to a request for comment.

The California Senate passed SB 244 by a vote of 38-0 in May. The state Assembly’s appropriations committee is expected to vote on the bill next week, after which it could go to the Assembly floor for a vote.

California appears to have a good shot at becoming the fourth state to sign a right-to-repair bill into law over the past year, following New York, Colorado, and Minnesota. A strong right-to-repair law in California has the potential to become the de facto standard, potentially leading to a national agreement between Big Tech and the repair community similar to what happened in the auto industry after Massachusetts passed a right-to-repair law for cars

But regardless of this bill’s fate, advocates are taking a moment to celebrate their latest victory.

“It’s a huge win for the whole coalition that were dogged in their pursuit of legislation, and a proud moment for all of us watching the big guns fall,” Repair.org executive director Gay Gordon-Byrne said in a statement.

This story was originally published by Grist with the headline In a historic about-face, Apple publicly supports right-to-repair bill on Aug 24, 2023.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/technology/in-a-historic-about-face-apple-publicly-supports-right-to-repair-bill/feed/ 0 421754
We’re All Suspects in a DNA Lineup, Waiting to be Matched with a Crime https://www.radiofree.org/2023/08/23/were-all-suspects-in-a-dna-lineup-waiting-to-be-matched-with-a-crime/ https://www.radiofree.org/2023/08/23/were-all-suspects-in-a-dna-lineup-waiting-to-be-matched-with-a-crime/#respond Wed, 23 Aug 2023 07:43:18 +0000 https://dissidentvoice.org/?p=143379

Make no mistake about it…your DNA can be taken and entered into a national DNA database if you are ever arrested, rightly or wrongly, and for whatever reason.”

— Justice Antonin Scalia dissenting in Maryland v. King

Be warned: the DNA detectives are on the prowl.

Whatever skeletons may be lurking on your family tree or in your closet, whatever crimes you may have committed, whatever associations you may have with those on the government’s most wanted lists: the police state is determined to ferret them out.

In an age of overcriminalization, round-the-clock surveillance, and a police state eager to flex its muscles in a show of power, we are all guilty of some transgression or other.

No longer can we consider ourselves innocent until proven guilty.

Now we are all suspects in a DNA lineup waiting to be matched up with a crime.

Suspect State, meet the Genetic Panopticon.

DNA technology in the hands of government officials will complete our transition to a Surveillance State in which prison walls are disguised within the seemingly benevolent trappings of technological and scientific progress, national security and the need to guard against terrorists, pandemics, civil unrest, etc.

By accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc.

It’s getting harder to hide, even if you think you’ve got nothing to hide.

Armed with unprecedented access to DNA databases amassed by the FBI and ancestry websites, as well as hospital newborn screening programs, police are using forensic genealogy, which allows police to match up an unknown suspect’s crime scene DNA with that of any family members in a genealogy database, to solve cold cases that have remained unsolved for decades.

As reported by The Intercept, forensic genetic genealogists are “combing through the genetic information of hundreds of thousands of innocent people in search of a perpetrator.”

By submitting your DNA to a genealogical database such as Ancestry and 23andMe, you’re giving the police access to the genetic makeup, relationships and health profiles of every relative—past, present and future—in your family, whether or not you or they ever agreed to be part of such a database.

Indeed, relying on a loophole in a commercial database called GEDmatch, genetic genealogists are able to sidestep privacy rules that allow people to opt out of sharing their genetic information with police. The end result? Police are now able to identify and target those very individuals who explicitly asked to keep their DNA results private.

In this way, merely choosing to exercise your right to privacy makes you a suspect and puts you in the police state’s crosshairs.

It no longer even matters if you’re among the tens of millions of people who have added their DNA to ancestry databases. As Brian Resnick reports, public DNA databases have grown so massive that they can be used to find you even if you’ve never shared your own DNA.

That simple transaction—a spit sample or a cheek swab in exchange for getting to learn everything about one’s ancestral makeup, where one came from, and who is part of one’s extended family—is the price of entry into the Suspect State for all of us.

After all, a DNA print reveals everything about “who we are, where we come from, and who we will be.” It can also be used to predict the physical appearance of potential suspects.

It’s what police like to refer to a “modern fingerprint.”

Yet in the police state’s pursuit of criminals, anyone who comes up as a possible DNA match—including distant family members—suddenly becomes part of a circle of suspects that must be tracked, investigated and ruled out.

In this way, “guilt by association” has taken on new connotations in a technological age in which one is just a DNA sample away from being considered a person of interest in a police investigation.

Indeed, the government has been relentless in its efforts to get hold of our DNA, either through mandatory programs carried out in connection with law enforcement and corporate America, by warrantlessly accessing our familial DNA shared with genealogical services such as Ancestry and 23andMe, or through the collection of our “shed” or “touch” DNA.

Get ready, folks, because the government has embarked on a diabolical campaign to create a nation of suspects predicated on a massive national DNA database.

All 50 states now maintain their own DNA government databases, although the protocols for collection differ from state to state. Increasingly, many of the data from local databanks are being uploaded to CODIS, the FBI’s massive DNA database, which has become a de facto way to identify and track the American people from birth to death.

Even hospitals have gotten in on the game by taking and storing newborn babies’ DNA, often without their parents’ knowledge or consent. It’s part of the government’s mandatory genetic screening of newborns. In many states, the DNA is stored indefinitely.

What this means for those being born today is inclusion in a government database that contains intimate information about who they are, their ancestry, and what awaits them in the future, including their inclinations to be followers, leaders or troublemakers.

The ramifications of this kind of DNA profiling are far-reaching.

At a minimum, these DNA databases do away with any semblance of privacy or anonymity.

These genetic databases and genomic technology also make us that much more vulnerable to creeps and cyberstalkers, genetic profiling, and those who would weaponize the technology against us.

Unfortunately, the debate over genetic privacy—and when one’s DNA becomes a public commodity outside the protection of the Fourth Amendment’s prohibition on warrantless searches and seizures—continues to lag far behind the government and Corporate America’s encroachments on our rights.

What this amounts to is a scenario in which we have little to no defense against charges of wrongdoing, especially when “convicted” by technology, and even less protection against the government sweeping up our DNA in much the same way it sweeps up our phone calls, emails and text messages.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, it’s only a matter of time before the police state’s pursuit of criminals from the past expands into genetic profiling and a preemptive hunt for criminals of the future.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2023/08/23/were-all-suspects-in-a-dna-lineup-waiting-to-be-matched-with-a-crime/feed/ 0 421077
We’re All Suspects in a DNA Lineup, Waiting to be Matched with a Crime https://www.radiofree.org/2023/08/23/were-all-suspects-in-a-dna-lineup-waiting-to-be-matched-with-a-crime-2/ https://www.radiofree.org/2023/08/23/were-all-suspects-in-a-dna-lineup-waiting-to-be-matched-with-a-crime-2/#respond Wed, 23 Aug 2023 07:43:18 +0000 https://dissidentvoice.org/?p=143379

Make no mistake about it…your DNA can be taken and entered into a national DNA database if you are ever arrested, rightly or wrongly, and for whatever reason.”

— Justice Antonin Scalia dissenting in Maryland v. King

Be warned: the DNA detectives are on the prowl.

Whatever skeletons may be lurking on your family tree or in your closet, whatever crimes you may have committed, whatever associations you may have with those on the government’s most wanted lists: the police state is determined to ferret them out.

In an age of overcriminalization, round-the-clock surveillance, and a police state eager to flex its muscles in a show of power, we are all guilty of some transgression or other.

No longer can we consider ourselves innocent until proven guilty.

Now we are all suspects in a DNA lineup waiting to be matched up with a crime.

Suspect State, meet the Genetic Panopticon.

DNA technology in the hands of government officials will complete our transition to a Surveillance State in which prison walls are disguised within the seemingly benevolent trappings of technological and scientific progress, national security and the need to guard against terrorists, pandemics, civil unrest, etc.

By accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc.

It’s getting harder to hide, even if you think you’ve got nothing to hide.

Armed with unprecedented access to DNA databases amassed by the FBI and ancestry websites, as well as hospital newborn screening programs, police are using forensic genealogy, which allows police to match up an unknown suspect’s crime scene DNA with that of any family members in a genealogy database, to solve cold cases that have remained unsolved for decades.

As reported by The Intercept, forensic genetic genealogists are “combing through the genetic information of hundreds of thousands of innocent people in search of a perpetrator.”

By submitting your DNA to a genealogical database such as Ancestry and 23andMe, you’re giving the police access to the genetic makeup, relationships and health profiles of every relative—past, present and future—in your family, whether or not you or they ever agreed to be part of such a database.

Indeed, relying on a loophole in a commercial database called GEDmatch, genetic genealogists are able to sidestep privacy rules that allow people to opt out of sharing their genetic information with police. The end result? Police are now able to identify and target those very individuals who explicitly asked to keep their DNA results private.

In this way, merely choosing to exercise your right to privacy makes you a suspect and puts you in the police state’s crosshairs.

It no longer even matters if you’re among the tens of millions of people who have added their DNA to ancestry databases. As Brian Resnick reports, public DNA databases have grown so massive that they can be used to find you even if you’ve never shared your own DNA.

That simple transaction—a spit sample or a cheek swab in exchange for getting to learn everything about one’s ancestral makeup, where one came from, and who is part of one’s extended family—is the price of entry into the Suspect State for all of us.

After all, a DNA print reveals everything about “who we are, where we come from, and who we will be.” It can also be used to predict the physical appearance of potential suspects.

It’s what police like to refer to a “modern fingerprint.”

Yet in the police state’s pursuit of criminals, anyone who comes up as a possible DNA match—including distant family members—suddenly becomes part of a circle of suspects that must be tracked, investigated and ruled out.

In this way, “guilt by association” has taken on new connotations in a technological age in which one is just a DNA sample away from being considered a person of interest in a police investigation.

Indeed, the government has been relentless in its efforts to get hold of our DNA, either through mandatory programs carried out in connection with law enforcement and corporate America, by warrantlessly accessing our familial DNA shared with genealogical services such as Ancestry and 23andMe, or through the collection of our “shed” or “touch” DNA.

Get ready, folks, because the government has embarked on a diabolical campaign to create a nation of suspects predicated on a massive national DNA database.

All 50 states now maintain their own DNA government databases, although the protocols for collection differ from state to state. Increasingly, many of the data from local databanks are being uploaded to CODIS, the FBI’s massive DNA database, which has become a de facto way to identify and track the American people from birth to death.

Even hospitals have gotten in on the game by taking and storing newborn babies’ DNA, often without their parents’ knowledge or consent. It’s part of the government’s mandatory genetic screening of newborns. In many states, the DNA is stored indefinitely.

What this means for those being born today is inclusion in a government database that contains intimate information about who they are, their ancestry, and what awaits them in the future, including their inclinations to be followers, leaders or troublemakers.

The ramifications of this kind of DNA profiling are far-reaching.

At a minimum, these DNA databases do away with any semblance of privacy or anonymity.

These genetic databases and genomic technology also make us that much more vulnerable to creeps and cyberstalkers, genetic profiling, and those who would weaponize the technology against us.

Unfortunately, the debate over genetic privacy—and when one’s DNA becomes a public commodity outside the protection of the Fourth Amendment’s prohibition on warrantless searches and seizures—continues to lag far behind the government and Corporate America’s encroachments on our rights.

What this amounts to is a scenario in which we have little to no defense against charges of wrongdoing, especially when “convicted” by technology, and even less protection against the government sweeping up our DNA in much the same way it sweeps up our phone calls, emails and text messages.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, it’s only a matter of time before the police state’s pursuit of criminals from the past expands into genetic profiling and a preemptive hunt for criminals of the future.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2023/08/23/were-all-suspects-in-a-dna-lineup-waiting-to-be-matched-with-a-crime-2/feed/ 0 421078
Latest 3D Printing Technology Speeds Construction Of New Homes For Ukrainians https://www.radiofree.org/2023/08/22/latest-3d-printing-technology-speeds-construction-of-new-homes-for-ukrainians/ https://www.radiofree.org/2023/08/22/latest-3d-printing-technology-speeds-construction-of-new-homes-for-ukrainians/#respond Tue, 22 Aug 2023 16:05:39 +0000 http://www.radiofree.org/?guid=45e712cc9bf69b7b795af2e81295a9de
This content originally appeared on Radio Free Europe/Radio Liberty and was authored by Radio Free Europe/Radio Liberty.

]]>
https://www.radiofree.org/2023/08/22/latest-3d-printing-technology-speeds-construction-of-new-homes-for-ukrainians/feed/ 0 420938
NZ women’s peace group protests over imminent Fukushima nuclear wastewater release https://www.radiofree.org/2023/08/22/nz-womens-peace-group-protests-over-imminent-fukushima-nuclear-wastewater-release/ https://www.radiofree.org/2023/08/22/nz-womens-peace-group-protests-over-imminent-fukushima-nuclear-wastewater-release/#respond Tue, 22 Aug 2023 10:00:06 +0000 https://asiapacificreport.nz/?p=92123 Asia Pacific Report

The Women’s International League for Peace and Freedom (WILPF) Aotearoa, the longest running women’s peace group in New Zealand, has called on the Japanese government to change its plan to release treated nuclear wastewater from the Fukushima Daiichi nuclear power station into the Pacific Ocean.

The protest comes as Pacific leaders remain undecided over the controversial — and widely condemned — Japanese move as reports suggest the start of the wastewater release could begin in the next few days.

“Releasing more radioactive materials is a wilful act of harm that will spread further radioactive contamination into the global environment,”said WILPF in its protest letter sent to Japanese Ambassador Ito Koichi last weekend.

“The treated water contains tritium, which cannot be removed. Tritium will be dumped into the ocean for several decades.

“There has been no assessment of future biological impacts. Nor has there been a review of less expensive and safer alternatives.”

An RNZ Pacific report said today that the past, present and future Pacific Islands Forum (PIF) chairs — known as “the Troika” — had not decided if they were for or against the imminent discharge.

The Melanesian Spearhead Group (MSG) meeting in Port Vila, Vanuatu, this week has been urged to call on Japan to drop plans for the wastewater release.

Accident reminder
WILPF reminded the Japanese government in its protest letter that after the 2011 earthquake and tsunami which caused the accident at the power station, the radioactive contaminated water was treated by a multi-nuclide removal system (ALPS) and stored in more than 1000 tanks on the power plant site.

It also reminded Tokyo of its pledge about Fukushima at the time.

The Japanese government and the operating company, TEPCO, stated that this water would not be disposed of in any way without the understanding of the concerned parties and would be stored on land.

The London Convention, which Japan ratified in 1980, strictly regulates the dumping of radioactive waste into the ocean.

“Therefore,” said the protest letter, “the release of treated water is a violation of international law.

“Such an action would also damage the trust between Japan and its neighbours and the Pacific Islands.”


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/08/22/nz-womens-peace-group-protests-over-imminent-fukushima-nuclear-wastewater-release/feed/ 0 420883
China Doubles Investment in R&D in 5 Years https://www.radiofree.org/2023/08/21/china-doubles-investment-in-rd-in-5-years/ https://www.radiofree.org/2023/08/21/china-doubles-investment-in-rd-in-5-years/#respond Mon, 21 Aug 2023 14:58:47 +0000 https://dissidentvoice.org/?p=143341 This week’s News on China.

• Restrictions on US investment China’s tech sector
• Investment in R&D doubled in the last 5 years
• Anti-corruption campaign in healthcare
• Provincial renewable energy targets


This content originally appeared on Dissident Voice and was authored by Dongsheng News.

]]>
https://www.radiofree.org/2023/08/21/china-doubles-investment-in-rd-in-5-years/feed/ 0 420700
AI Isn’t Banning Books in Iowa Schools. Republicans Are. https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/ https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/#respond Wed, 16 Aug 2023 17:29:55 +0000 https://theintercept.com/?p=441593
DES MOINES, IOWA - MARCH 10: Iowa Gov. Kim Reynolds and Florida Gov. Ron DeSantis speak on a book tour in Des Moines on March 10, 2023. (Photo by Rachel Mummey for The Washington Post via Getty Images)

Iowa Gov. Kim Reynolds and Florida Gov. Ron DeSantis speak on a book tour in Des Moines on March 10, 2023.

Photo: Rachel Mummey for The Washington Post via Getty Images

It reads like a headline pulled from a dystopian near future: Artificial intelligence is being used to ban books by Toni Morrison, Alice Walker, and Maya Angelou from schools. To comply with recently enacted state legislation that censors school libraries, Iowa’s Mason City Community School District used ChatGPT to scan a selection of books and flag them for “descriptions or visual depictions of a sex act.” Nineteen books — including Morrison’s “Beloved,” Margaret Atwood’s “The Handmaid’s Tale,” and Khaled Hosseini’s “The Kite Runner” — will be pulled from school library collections prior to the start of the school year.

This intersection of generative AI and Republican authoritarianism is indeed disturbing. It is not, however, the presage of a future ruled by censorious machines. These are the banal operations of reactionary social control and bureaucratic appeasement today. Unremarkable algorithmic systems have long been used to carry out the plans of the power structures deploying them.

AI is not banning books. Republicans are. The law with which the school district is complying, signed by Iowa Gov. Kim Reynolds in May, is yet another piece of astroturfed right-wing legislation aimed at eliminating gender nonconformity, anti-racism, and basic reproductive education from schools, while solidifying the power of the conservative family unit.

Bridgette Exman, assistant superintendent of curriculum and instruction at the Mason City Community School District, noted in a statement that AI will not replace the district’s standard book banning methods. “We will continue to rely on our long-established process that allows parents to have books reconsidered,” Exman said.

At most, the application of ChatGPT here is an example of an already common problem: the use of existing technologies to give a gloss of neutrality to political actions. It’s well established that predictive policing algorithms repeat the same racist patterns of criminalization as the data on which they’re trained — they’re taught to treat as potentially criminal those demographics the police have already deemed criminal.

In Iowa’s book ban, the algorithmic tool — a large language model, or LLM — followed a simplistic prompt. It didn’t process for context. The situation in which a school district is looking to ban texts with descriptions of sex acts had already shaped the outcome.

As Iowa newspaper The Gazette reported, the school district compiled a long list of “commonly challenged” books to feed to the AI program. These are books that fundamentalist Republicans taking over school boards and leading state houses have already sought to ban. Little surprise, then, that books dealing with white supremacy, slavery, gendered oppression, and sexual autonomy were included in the algorithm’s selection.

Further comments from Exman reveal more about the operations of authority at play, which have little to do with powerful AI control. As she told Popular Science, “Frankly, we have more important things to do than spend a lot of time trying to figure out how to protect kids from books. At the same time, we do have a legal and ethical obligation to comply with the law. Our goal here really is a defensible process.” 

Focusing on concerns about generative AI as a potentially all-powerful force ultimately serves Silicon Valley interests.

Both casually dismissive of the Republican legislation, yet willing to scramble with tech shortcuts to appear in swift compliance, Exman’s approach reflects both cowardice and complicity on the part of the school district. Surely, protecting students’ access to, rather than protecting them from, a rich variety of books is what school systems should be doing with their time. But the myth of algorithmic neutrality makes the book selection “defensible” in Exman’s terms, both to right-wing enforcers and critics of their pathetic law.

The use of ChatGPT in this case might prompt tech doomerism fears. Yet focusing on concerns about generative AI as a potentially all-powerful force ultimately serves Silicon Valley interests. Both concerns about AI safety and dreams of AI power fuel companies like OpenAI, the developer of ChatGPT, with millions of dollars going into researching AI as an allegedly existential risk to humanity. As critics like Edward Ongweso Jr. have pointed out, such narratives look, either fearfully or hopefully, to a future of AI almighty, while overlooking the way current AI tools, although regularly shoddy and inaccurate, are already hurting workers and aiding harmful state functions.

“From management devaluing labor to reactionaries censoring books ‘AI’ doesn’t have to be intelligent, work, or even exist,” wrote Patrick Blanchfield of the Brooklyn Institute for Social Research on Twitter. “Its real function is just to mystify / automate / justify what the powerful were always doing and always going to do anyways.”

To underline Blanchfield’s point, the ChatGPT book selection process was found to be unreliable and inconsistent when repeated by Popular Science. “A repeat inquiry regarding ‘The Kite Runner,’ for example, gives contradictory answers,” the Popular Science reporters noted. “In one response, ChatGPT deems Khaled Hosseini’s novel to contain ‘little to no explicit sexual content.’ Upon a separate follow-up, the LLM affirms the book ‘does contain a description of a sexual assault.’”

Yet accuracy and reliability were not the point here, any more than “protecting” children is the point of Republican book bans. The myth of AI efficiency and neutrality, like the lie of protecting children, simply offers, as the assistant superintendent herself put it, a “defensible process” for fascist creep.

Join The Conversation


This content originally appeared on The Intercept and was authored by Natasha Lennard.

]]>
https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/feed/ 0 419695
AI Isn’t Banning Books in Iowa Schools. Republicans Are. https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/ https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/#respond Wed, 16 Aug 2023 17:29:55 +0000 https://theintercept.com/?p=441593
DES MOINES, IOWA - MARCH 10: Iowa Gov. Kim Reynolds and Florida Gov. Ron DeSantis speak on a book tour in Des Moines on March 10, 2023. (Photo by Rachel Mummey for The Washington Post via Getty Images)

Iowa Gov. Kim Reynolds and Florida Gov. Ron DeSantis speak on a book tour in Des Moines on March 10, 2023.

Photo: Rachel Mummey for The Washington Post via Getty Images

It reads like a headline pulled from a dystopian near future: Artificial intelligence is being used to ban books by Toni Morrison, Alice Walker, and Maya Angelou from schools. To comply with recently enacted state legislation that censors school libraries, Iowa’s Mason City Community School District used ChatGPT to scan a selection of books and flag them for “descriptions or visual depictions of a sex act.” Nineteen books — including Morrison’s “Beloved,” Margaret Atwood’s “The Handmaid’s Tale,” and Khaled Hosseini’s “The Kite Runner” — will be pulled from school library collections prior to the start of the school year.

This intersection of generative AI and Republican authoritarianism is indeed disturbing. It is not, however, the presage of a future ruled by censorious machines. These are the banal operations of reactionary social control and bureaucratic appeasement today. Unremarkable algorithmic systems have long been used to carry out the plans of the power structures deploying them.

AI is not banning books. Republicans are. The law with which the school district is complying, signed by Iowa Gov. Kim Reynolds in May, is yet another piece of astroturfed right-wing legislation aimed at eliminating gender nonconformity, anti-racism, and basic reproductive education from schools, while solidifying the power of the conservative family unit.

Bridgette Exman, assistant superintendent of curriculum and instruction at the Mason City Community School District, noted in a statement that AI will not replace the district’s standard book banning methods. “We will continue to rely on our long-established process that allows parents to have books reconsidered,” Exman said.

At most, the application of ChatGPT here is an example of an already common problem: the use of existing technologies to give a gloss of neutrality to political actions. It’s well established that predictive policing algorithms repeat the same racist patterns of criminalization as the data on which they’re trained — they’re taught to treat as potentially criminal those demographics the police have already deemed criminal.

In Iowa’s book ban, the algorithmic tool — a large language model, or LLM — followed a simplistic prompt. It didn’t process for context. The situation in which a school district is looking to ban texts with descriptions of sex acts had already shaped the outcome.

As Iowa newspaper The Gazette reported, the school district compiled a long list of “commonly challenged” books to feed to the AI program. These are books that fundamentalist Republicans taking over school boards and leading state houses have already sought to ban. Little surprise, then, that books dealing with white supremacy, slavery, gendered oppression, and sexual autonomy were included in the algorithm’s selection.

Further comments from Exman reveal more about the operations of authority at play, which have little to do with powerful AI control. As she told Popular Science, “Frankly, we have more important things to do than spend a lot of time trying to figure out how to protect kids from books. At the same time, we do have a legal and ethical obligation to comply with the law. Our goal here really is a defensible process.” 

Focusing on concerns about generative AI as a potentially all-powerful force ultimately serves Silicon Valley interests.

Both casually dismissive of the Republican legislation, yet willing to scramble with tech shortcuts to appear in swift compliance, Exman’s approach reflects both cowardice and complicity on the part of the school district. Surely, protecting students’ access to, rather than protecting them from, a rich variety of books is what school systems should be doing with their time. But the myth of algorithmic neutrality makes the book selection “defensible” in Exman’s terms, both to right-wing enforcers and critics of their pathetic law.

The use of ChatGPT in this case might prompt tech doomerism fears. Yet focusing on concerns about generative AI as a potentially all-powerful force ultimately serves Silicon Valley interests. Both concerns about AI safety and dreams of AI power fuel companies like OpenAI, the developer of ChatGPT, with millions of dollars going into researching AI as an allegedly existential risk to humanity. As critics like Edward Ongweso Jr. have pointed out, such narratives look, either fearfully or hopefully, to a future of AI almighty, while overlooking the way current AI tools, although regularly shoddy and inaccurate, are already hurting workers and aiding harmful state functions.

“From management devaluing labor to reactionaries censoring books ‘AI’ doesn’t have to be intelligent, work, or even exist,” wrote Patrick Blanchfield of the Brooklyn Institute for Social Research on Twitter. “Its real function is just to mystify / automate / justify what the powerful were always doing and always going to do anyways.”

To underline Blanchfield’s point, the ChatGPT book selection process was found to be unreliable and inconsistent when repeated by Popular Science. “A repeat inquiry regarding ‘The Kite Runner,’ for example, gives contradictory answers,” the Popular Science reporters noted. “In one response, ChatGPT deems Khaled Hosseini’s novel to contain ‘little to no explicit sexual content.’ Upon a separate follow-up, the LLM affirms the book ‘does contain a description of a sexual assault.’”

Yet accuracy and reliability were not the point here, any more than “protecting” children is the point of Republican book bans. The myth of AI efficiency and neutrality, like the lie of protecting children, simply offers, as the assistant superintendent herself put it, a “defensible process” for fascist creep.

Join The Conversation


This content originally appeared on The Intercept and was authored by Natasha Lennard.

]]>
https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/feed/ 0 419696
AI Isn’t Banning Books in Iowa Schools. Republicans Are. https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/ https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/#respond Wed, 16 Aug 2023 17:29:55 +0000 https://theintercept.com/?p=441593
DES MOINES, IOWA - MARCH 10: Iowa Gov. Kim Reynolds and Florida Gov. Ron DeSantis speak on a book tour in Des Moines on March 10, 2023. (Photo by Rachel Mummey for The Washington Post via Getty Images)

Iowa Gov. Kim Reynolds and Florida Gov. Ron DeSantis speak on a book tour in Des Moines on March 10, 2023.

Photo: Rachel Mummey for The Washington Post via Getty Images

It reads like a headline pulled from a dystopian near future: Artificial intelligence is being used to ban books by Toni Morrison, Alice Walker, and Maya Angelou from schools. To comply with recently enacted state legislation that censors school libraries, Iowa’s Mason City Community School District used ChatGPT to scan a selection of books and flag them for “descriptions or visual depictions of a sex act.” Nineteen books — including Morrison’s “Beloved,” Margaret Atwood’s “The Handmaid’s Tale,” and Khaled Hosseini’s “The Kite Runner” — will be pulled from school library collections prior to the start of the school year.

This intersection of generative AI and Republican authoritarianism is indeed disturbing. It is not, however, the presage of a future ruled by censorious machines. These are the banal operations of reactionary social control and bureaucratic appeasement today. Unremarkable algorithmic systems have long been used to carry out the plans of the power structures deploying them.

AI is not banning books. Republicans are. The law with which the school district is complying, signed by Iowa Gov. Kim Reynolds in May, is yet another piece of astroturfed right-wing legislation aimed at eliminating gender nonconformity, anti-racism, and basic reproductive education from schools, while solidifying the power of the conservative family unit.

Bridgette Exman, assistant superintendent of curriculum and instruction at the Mason City Community School District, noted in a statement that AI will not replace the district’s standard book banning methods. “We will continue to rely on our long-established process that allows parents to have books reconsidered,” Exman said.

At most, the application of ChatGPT here is an example of an already common problem: the use of existing technologies to give a gloss of neutrality to political actions. It’s well established that predictive policing algorithms repeat the same racist patterns of criminalization as the data on which they’re trained — they’re taught to treat as potentially criminal those demographics the police have already deemed criminal.

In Iowa’s book ban, the algorithmic tool — a large language model, or LLM — followed a simplistic prompt. It didn’t process for context. The situation in which a school district is looking to ban texts with descriptions of sex acts had already shaped the outcome.

As Iowa newspaper The Gazette reported, the school district compiled a long list of “commonly challenged” books to feed to the AI program. These are books that fundamentalist Republicans taking over school boards and leading state houses have already sought to ban. Little surprise, then, that books dealing with white supremacy, slavery, gendered oppression, and sexual autonomy were included in the algorithm’s selection.

Further comments from Exman reveal more about the operations of authority at play, which have little to do with powerful AI control. As she told Popular Science, “Frankly, we have more important things to do than spend a lot of time trying to figure out how to protect kids from books. At the same time, we do have a legal and ethical obligation to comply with the law. Our goal here really is a defensible process.” 

Focusing on concerns about generative AI as a potentially all-powerful force ultimately serves Silicon Valley interests.

Both casually dismissive of the Republican legislation, yet willing to scramble with tech shortcuts to appear in swift compliance, Exman’s approach reflects both cowardice and complicity on the part of the school district. Surely, protecting students’ access to, rather than protecting them from, a rich variety of books is what school systems should be doing with their time. But the myth of algorithmic neutrality makes the book selection “defensible” in Exman’s terms, both to right-wing enforcers and critics of their pathetic law.

The use of ChatGPT in this case might prompt tech doomerism fears. Yet focusing on concerns about generative AI as a potentially all-powerful force ultimately serves Silicon Valley interests. Both concerns about AI safety and dreams of AI power fuel companies like OpenAI, the developer of ChatGPT, with millions of dollars going into researching AI as an allegedly existential risk to humanity. As critics like Edward Ongweso Jr. have pointed out, such narratives look, either fearfully or hopefully, to a future of AI almighty, while overlooking the way current AI tools, although regularly shoddy and inaccurate, are already hurting workers and aiding harmful state functions.

“From management devaluing labor to reactionaries censoring books ‘AI’ doesn’t have to be intelligent, work, or even exist,” wrote Patrick Blanchfield of the Brooklyn Institute for Social Research on Twitter. “Its real function is just to mystify / automate / justify what the powerful were always doing and always going to do anyways.”

To underline Blanchfield’s point, the ChatGPT book selection process was found to be unreliable and inconsistent when repeated by Popular Science. “A repeat inquiry regarding ‘The Kite Runner,’ for example, gives contradictory answers,” the Popular Science reporters noted. “In one response, ChatGPT deems Khaled Hosseini’s novel to contain ‘little to no explicit sexual content.’ Upon a separate follow-up, the LLM affirms the book ‘does contain a description of a sexual assault.’”

Yet accuracy and reliability were not the point here, any more than “protecting” children is the point of Republican book bans. The myth of AI efficiency and neutrality, like the lie of protecting children, simply offers, as the assistant superintendent herself put it, a “defensible process” for fascist creep.

Join The Conversation


This content originally appeared on The Intercept and was authored by Natasha Lennard.

]]>
https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/feed/ 0 419697
AI Isn’t Banning Books in Iowa Schools. Republicans Are. https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/ https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/#respond Wed, 16 Aug 2023 17:29:55 +0000 https://theintercept.com/?p=441593
DES MOINES, IOWA - MARCH 10: Iowa Gov. Kim Reynolds and Florida Gov. Ron DeSantis speak on a book tour in Des Moines on March 10, 2023. (Photo by Rachel Mummey for The Washington Post via Getty Images)

Iowa Gov. Kim Reynolds and Florida Gov. Ron DeSantis speak on a book tour in Des Moines on March 10, 2023.

Photo: Rachel Mummey for The Washington Post via Getty Images

It reads like a headline pulled from a dystopian near future: Artificial intelligence is being used to ban books by Toni Morrison, Alice Walker, and Maya Angelou from schools. To comply with recently enacted state legislation that censors school libraries, Iowa’s Mason City Community School District used ChatGPT to scan a selection of books and flag them for “descriptions or visual depictions of a sex act.” Nineteen books — including Morrison’s “Beloved,” Margaret Atwood’s “The Handmaid’s Tale,” and Khaled Hosseini’s “The Kite Runner” — will be pulled from school library collections prior to the start of the school year.

This intersection of generative AI and Republican authoritarianism is indeed disturbing. It is not, however, the presage of a future ruled by censorious machines. These are the banal operations of reactionary social control and bureaucratic appeasement today. Unremarkable algorithmic systems have long been used to carry out the plans of the power structures deploying them.

AI is not banning books. Republicans are. The law with which the school district is complying, signed by Iowa Gov. Kim Reynolds in May, is yet another piece of astroturfed right-wing legislation aimed at eliminating gender nonconformity, anti-racism, and basic reproductive education from schools, while solidifying the power of the conservative family unit.

Bridgette Exman, assistant superintendent of curriculum and instruction at the Mason City Community School District, noted in a statement that AI will not replace the district’s standard book banning methods. “We will continue to rely on our long-established process that allows parents to have books reconsidered,” Exman said.

At most, the application of ChatGPT here is an example of an already common problem: the use of existing technologies to give a gloss of neutrality to political actions. It’s well established that predictive policing algorithms repeat the same racist patterns of criminalization as the data on which they’re trained — they’re taught to treat as potentially criminal those demographics the police have already deemed criminal.

In Iowa’s book ban, the algorithmic tool — a large language model, or LLM — followed a simplistic prompt. It didn’t process for context. The situation in which a school district is looking to ban texts with descriptions of sex acts had already shaped the outcome.

As Iowa newspaper The Gazette reported, the school district compiled a long list of “commonly challenged” books to feed to the AI program. These are books that fundamentalist Republicans taking over school boards and leading state houses have already sought to ban. Little surprise, then, that books dealing with white supremacy, slavery, gendered oppression, and sexual autonomy were included in the algorithm’s selection.

Further comments from Exman reveal more about the operations of authority at play, which have little to do with powerful AI control. As she told Popular Science, “Frankly, we have more important things to do than spend a lot of time trying to figure out how to protect kids from books. At the same time, we do have a legal and ethical obligation to comply with the law. Our goal here really is a defensible process.” 

Focusing on concerns about generative AI as a potentially all-powerful force ultimately serves Silicon Valley interests.

Both casually dismissive of the Republican legislation, yet willing to scramble with tech shortcuts to appear in swift compliance, Exman’s approach reflects both cowardice and complicity on the part of the school district. Surely, protecting students’ access to, rather than protecting them from, a rich variety of books is what school systems should be doing with their time. But the myth of algorithmic neutrality makes the book selection “defensible” in Exman’s terms, both to right-wing enforcers and critics of their pathetic law.

The use of ChatGPT in this case might prompt tech doomerism fears. Yet focusing on concerns about generative AI as a potentially all-powerful force ultimately serves Silicon Valley interests. Both concerns about AI safety and dreams of AI power fuel companies like OpenAI, the developer of ChatGPT, with millions of dollars going into researching AI as an allegedly existential risk to humanity. As critics like Edward Ongweso Jr. have pointed out, such narratives look, either fearfully or hopefully, to a future of AI almighty, while overlooking the way current AI tools, although regularly shoddy and inaccurate, are already hurting workers and aiding harmful state functions.

“From management devaluing labor to reactionaries censoring books ‘AI’ doesn’t have to be intelligent, work, or even exist,” wrote Patrick Blanchfield of the Brooklyn Institute for Social Research on Twitter. “Its real function is just to mystify / automate / justify what the powerful were always doing and always going to do anyways.”

To underline Blanchfield’s point, the ChatGPT book selection process was found to be unreliable and inconsistent when repeated by Popular Science. “A repeat inquiry regarding ‘The Kite Runner,’ for example, gives contradictory answers,” the Popular Science reporters noted. “In one response, ChatGPT deems Khaled Hosseini’s novel to contain ‘little to no explicit sexual content.’ Upon a separate follow-up, the LLM affirms the book ‘does contain a description of a sexual assault.’”

Yet accuracy and reliability were not the point here, any more than “protecting” children is the point of Republican book bans. The myth of AI efficiency and neutrality, like the lie of protecting children, simply offers, as the assistant superintendent herself put it, a “defensible process” for fascist creep.

Join The Conversation


This content originally appeared on The Intercept and was authored by Natasha Lennard.

]]>
https://www.radiofree.org/2023/08/16/ai-isnt-banning-books-in-iowa-schools-republicans-are/feed/ 0 419698
Gulf Coast carbon capture gets $1 billion boost from Biden administration https://grist.org/cities/biden-1-billion-carbon-capture-texas-louisiana/ https://grist.org/cities/biden-1-billion-carbon-capture-texas-louisiana/#respond Mon, 14 Aug 2023 08:15:00 +0000 https://grist.org/?p=615726 The Biden administration announced its biggest effort yet last week to scrub carbon dioxide out of the air, with more than $1 billion going to two facilities on the Gulf Coast that will use  “direct air” carbon capture technology.

Direct air capture, or DAC, is a process which separates carbon from oxygen, and reduces CO2 in the atmosphere. The trapped CO2 can then be safely stored underground, deep in the ocean or converted into useful carbon products like concrete, which would prevent its release back into the air.

Project Cypress will be built in Calcasieu Parish, Louisiana and the South Texas DAC is planned for Kleberg County, Texas. Both sites are designed to capture up to 1 million metric tons of carbon dioxide per year initially. Officials said the projects will create over 4,500 jobs for local workers and people formerly employed in the fossil fuel industry.

The process of direct air capture is a great way to mitigate the global warming crisis, said  Daniel Sigman, Dusenbury Professor of Geological and Geophysical Sciences at Princeton University.

“This carbon capture and sequestration involves stripping CO2 out of the air and putting it somewhere,” Sigman said. “Carbon capture is something that people become interested in when it’s too late to prevent carbon dioxide emissions. “

However, some scientists think the initiative is a waste of money because DAC requires a significant amount of energy to purify CO2 and store it, making it one of the most expensive and inefficient ways to sequester carbon.

The initiative is being funded through the Bipartisan Infrastructure Law of 2021 and is part of a Department of Energy initiative which aims to build a nationwide network of large-scale carbon removal sites to mitigate the climate crisis.

“Cutting back on our carbon emissions alone won’t reverse the growing impacts of climate change; we also need to remove the CO2 that we’ve already put in the atmosphere—which nearly every climate model makes clear is essential to achieving a net-zero global economy by 2050,” said U.S. Secretary of Energy Jennifer M. Granholm in a statement.

The funding for the project was noted as the world’s largest-ever investment in engineered carbon removal, with each new hub expected to clear more than 250 times more carbon dioxide from the air than the largest direct air capturing facility currently operating.

Sigman said getting the technology right for something of this magnitude is tricky. With carbon dioxide making up around 420 parts per million of molecules it’s a challenge to come up with chemical means to strip those molecules out of the air, he said.

 “Carbon dioxide is throughout our whole atmosphere,” said Sigman. “So we have to think about how much our atmosphere is going to be passing through Texas and Louisiana, we have to think about how much of our atmosphere will be passing through these areas.”

This story was originally published by Grist with the headline Gulf Coast carbon capture gets $1 billion boost from Biden administration on Aug 14, 2023.


This content originally appeared on Grist and was authored by Lyric Aquino.

]]>
https://grist.org/cities/biden-1-billion-carbon-capture-texas-louisiana/feed/ 0 418982
Out of the shadows: why making NZ’s security threat assessment public is timely https://www.radiofree.org/2023/08/13/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-is-timely/ https://www.radiofree.org/2023/08/13/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-is-timely/#respond Sun, 13 Aug 2023 00:35:43 +0000 https://asiapacificreport.nz/?p=91753 ANALYSIS: By Alexander Gillespie, University of Waikato

The release of the threat assessment by the New Zealand Security Intelligence Service (SIS) this week is the final piece in a defence and security puzzle that marks a genuine shift towards more open and public discussion of these crucial policy areas.

Together with July’s strategic foreign policy assessment from the Ministry of Foreign Affairs, and the national security strategy released last week, it rounds out the picture of New Zealand’s place in a fast-evolving geopolitical landscape.

From increased strategic competition between countries, to declining social trust within them, as well as rapid technological change, the overall message is clear: business as usual is no longer an option.

By releasing the strategy documents in this way, the government and its various agencies clearly hope to win public consent and support — ultimately, the greatest asset any country possesses to defend itself.

Low threat of violent extremism
If there is good news in the SIS assessment, it is that the threat of violent extremism is still considered “low”. That means no change since the threat level was reassessed last year, with a terror attack considered “possible” rather than “probable”.

It is a welcome development since the threat level was lifted to “high” in the
immediate aftermath of the Christchurch terror attack in 2019.

This was lowered to “medium” about a month later — where it sat in September 2021, when another extremist attacked people with a knife in an Auckland mall, seriously
wounding five.

The threat level stayed there during the escalating social tension resulting from the government’s covid response. This saw New Zealand’s first conviction for sabotage and increasing threats to politicians, with the SIS and police intervening in at least one case to mitigate the risk.

After protesters were cleared from the grounds of Parliament in early 2022, it was
still feared an act of extremism by a small minority was likely.

These risks now seem to be receding. And while the threat assessment notes that the online world can provide havens for extremism, the vast majority of those expressing vitriolic rhetoric are deemed unlikely to carry through with violence in the real world.

Changing patterns of extremism
Assessments like this are not a crystal ball; threats can emerge quickly and be near-invisible before they do. But right now, at least publicly, the SIS is not aware of any specific or credible attack planning.

New Zealand's Security Threat Environment 2023 report
New Zealand’s Security Threat Environment 2023 report. Image: APR screenshot

Many extremists still fit well-defined categories. There are the politically motivated, potentially violent, anti-authority conspiracy theorists, of which there is a “small number”.

And there are those motivated by identity (with white supremacist extremism the dominant strand) or faith (such as support for Islamic State, a decreasing and “very small number”).

However, the SIS describes a noticeable increase in individuals who don’t fit within those traditional boundaries, but who hold mixed, unstable or unclear ideologies they may tailor to fit some other violent or extremist impulse.

Espionage and cyber-security risks

There also seems to be a revival of the espionage and spying cultures last seen during the Cold War. There is already the first military case of espionage before the courts, and the SIS is aware of individuals on the margins of government being cultivated and offered financial and other incentives to provide sensitive information.

The SIS says espionage operations by foreign intelligence agencies against New Zealand, both at home and abroad, are persistent, opportunistic and increasingly wide ranging.

While the government remains the main target, corporations, research institutions and state contractors are now all potential sources of sensitive information. Because non-governmental agencies are often not prepared for such threats, they pose a significant security risk.

Cybersecurity remains a particular concern, although the Government Communications Security Bureau (GCSB) recorded 350 incidents in 2021-22, which was a decline from 404 incidents recorded in the previous 12-month period.

On the other hand, a growing proportion of cyber incidents affecting major New Zealand institutions can be linked to state-sponsored actors. Of the 350 reported major incidents, 118 were connected to foreign states (34 percent of the total, up from 28 percent the previous year).

Russia, Iran and China
Although the SIS recorded that only a “small number” of foreign states engaged in deceptive, corruptive or coercive attempts to exert political or social influence, the potential for harm is “significant”.

Some of the most insidious examples concern harassment of ethnic communities within New Zealand who speak out against the actions of a foreign government.

The SIS identifies Russia, Iran and China as the three offenders. Iran was recorded as reporting on Iranian communities and dissident groups in New Zealand. In addition, the assessment says:

Most notable is the continued targeting of New Zealand’s diverse ethnic Chinese communities. We see these activities carried out by groups and individuals linked to the intelligence arm of the People’s Republic of China.

Overall, the threat assessment makes for welcome – if at times unsettling – reading. Having such conversations in the open, rather than in whispers behind closed doors, demystifies aspects of national security.

Most importantly, it gives greater credibility to those state agencies that must increase their transparency in order to build public trust and support for their unique roles within a working democracy.The Conversation

Dr Alexander Gillespie, Professor of Law, University of Waikato. This article is republished from The Conversation under a Creative Commons license. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/08/13/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-is-timely/feed/ 0 418878
False Arrest of Pregnant Woman in Detroit Highlights Racial Bias in Facial Recognition Technology https://www.radiofree.org/2023/08/09/false-arrest-of-pregnant-woman-in-detroit-highlights-racial-bias-in-facial-recognition-technology/ https://www.radiofree.org/2023/08/09/false-arrest-of-pregnant-woman-in-detroit-highlights-racial-bias-in-facial-recognition-technology/#respond Wed, 09 Aug 2023 12:00:00 +0000 http://www.radiofree.org/?guid=c82cd94c79d4abc44cc9b87522991017
This content originally appeared on Democracy Now! Audio and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2023/08/09/false-arrest-of-pregnant-woman-in-detroit-highlights-racial-bias-in-facial-recognition-technology/feed/ 0 418048
Pregnant Woman’s False Arrest Shows "Racism Gets Embedded" in Facial Recognition Technology https://www.radiofree.org/2023/08/07/pregnant-womans-false-arrest-shows-racism-gets-embedded-in-facial-recognition-technology/ https://www.radiofree.org/2023/08/07/pregnant-womans-false-arrest-shows-racism-gets-embedded-in-facial-recognition-technology/#respond Mon, 07 Aug 2023 14:57:24 +0000 http://www.radiofree.org/?guid=b165da270bc6facae2f36f336228cc52
This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2023/08/07/pregnant-womans-false-arrest-shows-racism-gets-embedded-in-facial-recognition-technology/feed/ 0 417504
Pregnant Woman’s False Arrest in Detroit Shows “Racism Gets Embedded” in Facial Recognition Technology https://www.radiofree.org/2023/08/07/pregnant-womans-false-arrest-in-detroit-shows-racism-gets-embedded-in-facial-recognition-technology/ https://www.radiofree.org/2023/08/07/pregnant-womans-false-arrest-in-detroit-shows-racism-gets-embedded-in-facial-recognition-technology/#respond Mon, 07 Aug 2023 12:36:46 +0000 http://www.radiofree.org/?guid=95742a703df04df22d070d6d1155b630 Booksplitv2

A shocking story of wrongful arrest in Detroit has renewed scrutiny of how facial recognition software is being deployed by police departments, despite major flaws in the technology. Porcha Woodruff was arrested in February when police showed up at her house accusing her of robbery and carjacking. Woodruff, who was eight months pregnant at the time, insisted she had nothing to do with the crime, but police detained her for 11 hours, during which time she had contractions. She was eventually released on a $100,000 bond before prosecutors dropped the case a month later, admitting that her arrest was based in part on a false facial recognition match. Woodruff is the sixth known person to be falsely accused of a crime because of facial recognition, and all six victims have been Black. “That’s not an accident,” says Dorothy Roberts, director of the University of Pennsylvania Program on Race, Science and Society, who says new technology often reflects societal biases when built atop flawed systems. “Racism gets embedded into the technologies.”


This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2023/08/07/pregnant-womans-false-arrest-in-detroit-shows-racism-gets-embedded-in-facial-recognition-technology/feed/ 0 417444
Why e-bike companies are embracing recycling while fighting repair https://grist.org/transportation/why-e-bike-companies-love-battery-recycling-but-hate-independent-repair/ https://grist.org/transportation/why-e-bike-companies-love-battery-recycling-but-hate-independent-repair/#respond Mon, 07 Aug 2023 08:45:00 +0000 https://grist.org/?p=615236 E-bikes have been in the news recently for a reason nobody wants: Their batteries are sparking dangerous fires. One conflagration burned down homes and businesses in the Bronx, in New York City, in March, and another blaze at an e-bike store in Manhattan killed four people in June. Those fires are bringing additional scrutiny and regulation to a mode of transportation that’s been hailed as a promising climate solution. But they are also having an unexpected impact on conversations about the right to repair a bicycle, something generations of bicycle owners have taken for granted.

In recent months, People for Bikes, the national trade organization representing bicycle manufacturers, has reached out to lawmakers and officials in several states to request that e-bikes be exempted from right-to-repair bills. Those bills aim to make it easier for members of the public to access the parts, tools, and information they need to fix their stuff. The industry claims it’s a matter of safety, and that people without the proper training should not attempt to repair e-bikes — especially not the batteries. Instead, manufacturers want to see dead and broken batteries recycled, which is why they recently launched a public education campaign encouraging consumers to do so.

Recycling is a crucial step for dealing with battery waste sustainably. It keeps batteries out of landfills and it can reduce the need for additional mining of critical battery metals like lithium, cobalt, and nickel. But for the e-bike industry to be sustainable over the long term, e-bikes also need to be repairable, since repair prevents waste and conserves the resources that go into making new stuff. To right-to-repair advocates, the claim that it’s unsafe for consumers to fix them is familiar: Consumer tech companies like Apple have said the same thing about repairing smartphones for years. When it comes to e-bikes, advocates worry that safe battery handling is being used to distract from another problem they say right-to-repair would help solve: Cheap, hard-to-repair e-bikes are flooding into cities around the country. These are the same bikes that sometimes have substandard batteries that experts suspect are at the root of the fire crisis.

“I too want people to go to safe repairers,” Nathan Proctor, who heads the national right-to-repair campaign at the US Public Research Interest Group, told Grist in an email. “But I don’t think monopolizing access helps at all.”

E-bikes are soaring in popularity, and for good reason. These battery-powered bicycles allow people to travel farther and faster than they can using an analog bike. They cost less than cars to buy and to own, take up far less space, and can be parked for free. Compared with gas-powered cars, e-bikes are incredibly climate friendly: A recent analysis by the National Renewable Energy Laboratory found that the typical e-bike rider emits zero to three grams of carbon dioxide per mile pedaled, compared with 350 grams per mile driven in a crossover SUV. E-bikes also have sustainability and safety advantages over EVs, including smaller batteries that require less lithium mining and pose less of a danger to pedestrians

A man in a black t-shirt stands behind a white e-bike on a pedestal in front of a screen showing a cargo bike
An e-bike being prepared for display at the Eurobike bicycle trade show in Frankfurt, Germany, in June. Andreas Arnold / picture alliance via Getty Images

But while e-bikes are clearly a sustainable choice compared with driving, many e-bike advocates want to see the industry become a model of affordable, accessible, and environmentally friendly transit. For that to happen, consumers need to be able to repair their e-bikes to ensure they last a long time. In addition to a bicycle frame, wheels, and a battery, e-bikes include various electronic displays and sensors, as well as a motor that powers the pedal-assist system. All of these components can break down and require repairs or replacement. 

On battery recycling, the U.S. e-bike industry has made good progress. About five years back, a group of bicycle manufacturers came together to lay the groundwork for an industry-wide battery recycling program. That program was launched on a pilot scale in late 2021. Less than two years later, it has 54 participating bicycle brands and more than 1,800 retail stores serving as drop-off locations for end-of-life batteries nationwide. (An e-bike battery is considered at the “end of its life” when it no longer holds a charge well, which might occur after as few as two or as many as 10 years of use.) 

The e-bike battery recycling initiative is funded like an escrow program, according to Eric Frederickson of Call2Recycle, the recycling logistics nonprofit that runs it. Participating brands pay a fee into a fund for every e-bike battery they import. Call2Recycle uses those funds to administer the collection, transportation, and recycling of e-bike batteries at several locations around the country. Recycling partners include Canada-based Li-Cycle, which has a battery recycling hub in Rochester, New York; Redwood Materials, headquartered in northern Nevada; and Cirba Solutions, a battery logistics company that is expanding into lithium-ion battery recycling. Call2Recycle also trains participating retail shops on how to safely handle the batteries, including identifying any damaged batteries to pack in secure containers.

To date, Frederickson said, the program has recycled nearly 6,000 e-bike batteries, or 37,000 pounds of them. Ash Lovell, the electric bicycle policy and campaign director for People for Bikes, which endorses the program, hopes to see that number grow. In May, People for Bikes launched Hungry for Batteries, a new public education campaign that seeks to raise awareness of how to properly recycle e-bike batteries.

While the recycling program started out with a sustainability focus, as e-bike battery fires in New York City and elsewhere started making national headlines, it became “very much a safety focused campaign,” Lovell said. “​​That’s been People for Bikes’ big push over the last few months.”

Several firefighters wearing helmets and black fireproof gear stand on a sidewalk in between a shuttered storefront, some junk, and some cylindrical bins
Firefighters respond after e-bike batteries sparked a fire at 80 Madison Street in Chinatown, Manhattan, New York, in June. Gardiner Anderson for NY Daily News via Getty Images

But those same battery safety concerns are now placing bicycle manufacturers at loggerheads with advocates for independent repair.

In a letter sent to New York Governor Kathy Hochul in December, People for Bikes asked that e-bikes be excluded from the state’s forthcoming digital right-to-repair law, which granted consumers the right to fix a wide range of electronic devices. The letter cited “an unfortunate increase in fires, injuries and deaths attributable to personal e-mobility devices” including e-bikes. Many of these fires, People for Bikes claimed in the letter, “appear to be caused by consumers and others attempting to service these devices themselves,” including tinkering with the batteries at home. Before Hochul signed the right-to-repair bill, it was revised to exempt e-bikes.

Asked for data to back up the claim that e-bike fires were being caused by unauthorized repairs, Lovell said that it was “anecdotal, from folks that are on the ground in New York.” A spokesperson for the U.S. Consumer Product Safety Commission, or CPSC, told Grist that battery fires can be the result of physical, electrical, or thermal damage to the battery, as well as “manufacturing defects.” Last December, the CPSC sent a letter to numerous e-bike manufacturers calling on them to ensure their products comply with voluntary industry safety standards for batteries and other electronic systems. 

The CPSC spokesperson declined to comment on the role that e-bike, or e-bike battery, repair might be playing in the recent fires. The New York City Fire Department did not respond to a request for comment. 

Though People for Bikes’ letter implied otherwise, the intent of New York’s right-to-repair law was not to give people special tools to pry open their batteries at home. The law stipulates that manufacturers must give independent shops and device owners access to the same parts, tools, and documentation they provide to their authorized repair partners. And when there’s a problem with an e-bike battery, most manufacturers offer consumers one option: Replacing it.

“There’s no training on battery repair, that I know of, within the bike industry,” said Ryan Waddell, who recently worked as a lead mechanic at the nonprofit e-bike shop GoodTurnCycles, based in Colorado. “If something happens with a name brand manufacturer [battery], they’ll usually want the battery shipped back” so it can be replaced.

What New York’s right-to-repair law would have done is increase access to parts, tools and information that manufacturers only make available to select e-bike dealers. For example, e-bike component manufacturer Bosch produces a diagnostic reader that helps identify components that require a reset or replacement, but you have to be a Bosch-certified repair shop to purchase it. Some manufacturers also offer authorized shops, but not consumers, the ability to do major software updates on their systems. And e-bike brands often only sell components, like the motor controller that manages the amount of voltage going to the motor, to dealers of their choosing.

“There’s huge interest” in fixing e-bikes, said Kyle Wiens, CEO of the online repair guide site iFixit. But outside of manufacturers and specialized shops, “no one knows how.”

Wiens said that in addition to making spare parts and repair guides available, the e-bike industry needs to do a better job designing its products to be repairable. Across the industry, he says, there’s very little standardization in terms of parts. Waddell agreed.

“With e-bikes, nothing’s really standardized,” he said. That means that when a crucial component, like the controller, breaks down, it can be tough to find replacements — especially if that model of e-bike is no longer made. 

A man wearing glasses leans over to work on the frame of an e-bike with a tool
An employee works on an electric bicycle at a workshop in Jakarta, Indonesia, in October 2022. Garry Lotulung / Anadolu Agency via Getty Images

Right-to-repair laws could also help remediate what several industry observers described as a dismal repair scene for the direct-to-consumer e-bikes being sold online. These bikes tend to be cheaper than those made by industry leading brands like Trek and Rad Power Bikes, and they tend to break down more quickly. These are often the same bikes whose batteries don’t meet industry safety standards and may pose a greater fire risk. John Mathna, who runs the e-bike repair shop Chattanooga Electric Bike Co., says that many online e-bike companies offer “virtually no support” when there’s a problem. 

“I’ve never seen a repair manual for any online bike,” Mathna said. “Many independent repair shops won’t touch them.”

Right-to-repair bills won’t solve all of the e-bike industry’s repairability issues, and they won’t end the debate over safe battery repair. But Wiens believes these bills would be a “big help” in terms of forcing out information the public needs to repair their e-bikes. 

E-bike riders in Minnesota may soon find out if that’s true: In May, governor Tim Waltz signed the nation’s broadest right-to-repair bill yet. Unlike in New York, Minnesota’s version of the law, which goes into effect in 2024, does not exempt e-bikes.

Lovell, of People for Bikes, said she believes the bill’s sponsors “weren’t totally aware of the issues of including e-bikes in right to repair,” and that the organization is “speaking to some of the legislators about the issue currently.” Minnesota representative and bill sponsor Peter Fischer confirmed in an email to Grist that industry advocates reached out to him after the bill became law “asking for an exemption for e-bikes.”

“I did tell the folks I am open to meeting with them and hearing what they had to say,” Fischer said. “This does not mean I would support an exemption for them.”

Wiens, from iFixit, had a stern warning for e-bike manufacturers about attempting to evade compliance with the bill. “If they get a carveout in Minnesota,” he said, “we’ll introduce five bills next year targeting them specifically. It’s unacceptable.”

This story was originally published by Grist with the headline Why e-bike companies are embracing recycling while fighting repair on Aug 7, 2023.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/transportation/why-e-bike-companies-love-battery-recycling-but-hate-independent-repair/feed/ 0 417394
A Pro-Putin Facebook Network Is Pumping French-Language Propaganda Into Africa https://www.radiofree.org/2023/08/03/a-pro-putin-facebook-network-is-pumping-french-language-propaganda-into-africa/ https://www.radiofree.org/2023/08/03/a-pro-putin-facebook-network-is-pumping-french-language-propaganda-into-africa/#respond Thu, 03 Aug 2023 10:00:00 +0000 https://production.public.theintercept.cloud/?p=440398

As Russia strengthens ties with governments across French-speaking parts of West and Central Africa, social media users in the region have faced a well-documented barrage of pro-Moscow influence campaigns: a swarm of videos, images, and news stories depicting Russia in a positive light — typically at the expense of France, the region’s former colonial power.

A report shared with The Intercept shines a light on one such campaign in action — and it appears to be reaching an especially large audience.

According to an Intercept review of investigations conducted by the tech watchdog group Reset, a network of 53 Facebook pages has been amplifying French-language videos promoting the Kremlin’s line on the war in Ukraine, starting in March. According to Reset, the pages share the common traits of “coordinated inauthentic behavior,” a term used by Meta, Facebook’s parent company, to describe when pages misrepresent themselves and work together in pursuit of specific political or financial goals. Together, the accounts have a combined 4.3 million followers, more than that of similar high-profile networks in Africa such as “Russosphère,” a web of Francophone pages operating across social media platforms that was exposed earlier this year, as well as scores of pro-Russia pages shut down by Facebook in 2019 and 2020.

The report also comes amid warnings from employees that Meta’s plans to cut 10,000 jobs this year may hamper its ability to detect harmful false information spread unintentionally (misinformation) or intentionally (disinformation) on its platforms. In April, the company laid off “the majority” of its 50-person engineering team focused on misinformation. In May, a separate round of cuts hit business and tech divisions covering content moderation, while in July, it was reported that Meta quietly slashed jobs from teams investigating election disinformation and coordinated troll campaigns, heightening concerns around upcoming 2024 elections across the globe.

In addition to the job cuts, Meta critics have long claimed the company does not devote enough resources to monitoring content published in languages other than English, such as in sub-Saharan Africa — in other words, pages misrepresenting their identities to achieve common goals are more likely to go undetected. 

“African countries are not at all considered priority zones for geopolitical reasons, for resource-related reasons, but also because of the difficulties that can exist with [language barriers],” said Asma Mhalla, a French researcher specializing in tech and digital regulation.

Debates over content moderation are inherently complex — and particularly in the United States, with its deep attachment to freedom of speech. But advocates calling on Meta to beef up self-regulation point to the platform’s massive global reach, its role in public debate, and the consequences of allowing troll campaigns to act freely — with calls to take violence against certain groups and efforts to share false medical advice presenting fatal risks.

A Meta spokesperson said the company is committed to monitoring content in Africa and pointed to the company’s record of breaking up foreign influence campaigns in languages other than English, including in French-speaking Africa. Earlier this year, the firm shut down a group of accounts in Burkina Faso with 65,000 followers.

Pro-Russian content has flooded social media as African governments bolster links with the Kremlin and turn away from France, which finished a nearly decadelong counterterror military operation in the Sahel region last year. Burkina Faso’s new president has lauded Moscow as a “strategic ally,” while the Russia-linked Wagner Group provides security to the Central African Republic and new authorities in Mali. (The mercenary group’s founder Yevgeny Prigozhin also cheered last week’s coup d’état in Niger, whose deposed president was one of France’s last remaining allies in the region.) Tapping into deep-seated resentment against the former colonial authority, pro-Russia narratives on social media depict Vladimir Putin’s government as a friendly guarantor of national sovereignty. 

Russia is portraying itself as an inheritor of the Soviet Union’s anti-colonial past, said Kevin Limonier, a Slavic studies and geography professor at Paris 8 University who has written about Russia’s growing influence in sub-Saharan Africa. “The Russian media have known how to play on this mythology, on this anti-colonial nostalgia, and on this totally fantasized vision of the Soviet Union as the protector of colonized peoples.”

According to Limonier, the “conquest” of Ukraine has done little to detract from Russia’s anti-colonial image. “The underlying discourse linking radical pan-Africanists, the Kremlin, and Russian intellectuals close to the government is the notion that imperialism only exists if it’s Western,” he said.

Supporters of mutinous soldiers hold a Russian flag as they demonstrate in Niamey, Niger, Thursday July 27 2023. Governing bodies in Africa condemned what they characterized as a coup attempt Wednesday against Niger's President Mohamed Bazoum, after members of the presidential guard declared they had seized power in a coup over the West African country's deteriorating security situation. (AP Photo/Sam Mednick)

Supporters of mutinous soldiers hold a Russian flag as they demonstrate in Niamey, Niger, on July 27, 2023.

Photo: Sam Mednick/AP

At the heart of the network identified by Reset is Ebene Media, a Francophone news outlet based in Cameroon whose home page is littered with advertisements and formatting errors. While the main website features a mix of international news stories, its two Facebook pages, Ebene Media TV and Ebene Media TV+, have focused singularly on the war in Ukraine since January, regularly publishing videos one after the other sympathetic to the Russian cause and critical of Kyiv and its Western allies. 

Narrated with text-to-speech technology and interspersed with quotes, the clips are overlaid with footage from other sources, including from Russian state-funded media like RT and Sputnik. Among the headlines: “There is no space left to bury the soldiers killed by Zelenskyy”; “EU-Latin American summit: The worst has happened. Zelenskyy banned in Brussels”; and “Ukraine’s counteroffensive sours.”

While Ebene Media TV’s pages count only 20,000 followers, its videos have been amplified by multiple accounts. That includes “MR WolfSon,” a German-administered page with 302,000 followers that claims to be a journalist; “Lumière De L’info,” another German-administered page with 14,000 followers that purports to be a news site; and “Stéphane comédie Tv,” a “personal blog” administered from Cameroon and Côte d’Ivoire with 10,000 followers that has changed names multiple times since it was first launched as a comedy page in 2021. This week, “LEGEOGRAPHE221,” an account with 62,000 followers administered from Senegal, shared an Ebene clip on the coup in Niger claiming that French forces fired live ammunition into a crowd protesting outside the country’s embassy in the capital Niamey — an allegation denied by Paris. 

Not all the videos come from Ebene Media TV. The Cameroonian-administered “Infos Global” — an account with 285,000 followers launched last October as “Liberté Africaine” — has also shared clips originally broadcast on more reputable news outlets like France 24 that reflect positively on Russia’s war effort: for example, a discussion about Volodymyr Zelenskyy’s struggles to win support from African governments and outdated coverage about Russian tanks moving toward Kyiv. Like “Torche Mondial” (46,000 followers) and “Magasin de L’info” (17,000 followers), “Infos Global” also posts videos from Florian Philippot, a far-right French politician and former second-in-command of Marine Le Pen’s National Front who now leads a marginal party calling on France to leave the European Union. 

In addition to frequent name changes, many of the pages regularly repost each other’s content, boosting their collective reach. A few have identical usernames and share the same contact details. Many have gone dormant for weeks at a time, “possibly to avoid detection of the network,” according to Reset. Some have engaged in apparent baiting techniques, sharing apolitical memes and cartoons to generate attention before posting about the war in Ukraine. 

For instance, the page “Bãrøn,” which has 75,000 followers, was posting memes and crude sex jokes for much of the year, sometimes racking up hundreds of likes per post. Then in May, it shared a slew of videos from Ebene Media TV with titles like, “The United States is running out of money to continue supporting the Ukrainian army,” and “The Russian army is inflicting heavy losses on Ukrainian armed forces.” It has not posted since then. 

Stéphane Akoa, a political scientist and researcher in the Cameroonian capital of Yaoundé, said there is a broad audience receptive to the kinds of videos shared by Ebene Media TV, owing to France’s colonial history in the region. “The anti-French sentiment in Cameroon is very, very strong,” he said, “and so anything that can be said or done that would go against France or show one’s opposition to France, you’ll find a lot of Cameroonians willing to repeat it and share it.”

Cameroon’s government maintains friendly relations with France. But last April, it signed a military cooperation pact with Moscow, and, like many African nations, it did not vote to condemn Russia’s invasion of Ukraine at the United Nations. Contacted by phone, an official from the Russian Embassy in Cameroon referred The Intercept to email but did not respond to questions.

This undated photograph handed out by French military shows Russian mercenaries, in northern Mali. Russia has engaged in under-the-radar military operations in at least half a dozen countries in Africa in the last five years using a shadowy mercenary force analysts say is loyal to President Vladimir Putin. The analysts say the Wagner Group of mercenaries is also key to Putin's ambitions to re-impose Russian influence on a global scale. (French Army via AP)

This undated photograph handed out by the French military shows Russian mercenaries in northern Mali.

Photo: French Army via AP

Since 2019, Meta has shut down multiple pro-Russia networks of “coordinated inauthentic behavior” targeting users in Africa. (It also shut down a pro-France network in December 2020, ahead of a crucial election in the Central African Republic.) Last month, France’s foreign ministry decried a video spread by a web of Facebook and Twitter accounts that accused Paris of ordering a fatal attack on Chinese nationals at a gold mine in the Central African Republic. And in February, the BBC and tech group Logically revealed a self-described Stalinist from Belgium was at the helm of “Russosphère”: a group of social media accounts praising Russian military operations in Ukraine and Africa, with over 80,000 followers.

It remains unclear who is behind Ebene Media TV or the broader network of pages identified by Reset. Contacted by email, Ebene Media did not respond to a request for comment. A man who responded to a phone number listed for “Monde Actu,” a page with 15,000 followers that shared videos from Ebene Media TV in April and May, told The Intercept that he managed the page from Cameroon but that he had lost his contract with Ebene Media TV and had stopped publishing its videos. He did not provide further details and ended the conversation.

Limonier, the Slavic studies and geography professor, stressed that it can be difficult to identify the people behind influence networks online. While the pages revolving around Ebene Media TV could be the product of a centralized strategy, Limonier said they could also be the working of a more diffuse, lower grade of actors that he calls “entrepreneurs of influence”: individuals taking initiative on their own in the hopes of winning attention or future rewards from the Russian government.

Lou Osborn, a researcher for the monitoring group All Eyes on Wagner, said the group of pages resembled previous pro-Russia influence campaigns in sub-Saharan Africa. Earlier this year, Osborn contributed to a report on Burkina Faso, documenting how a collection of Facebook pages promoted Russian interests in the country. While the report did not establish the identity of the network’s instigator, Osborn told The Intercept it was “highly likely” to have been ordered by the Wagner Group.

“One of the ways that Prigozhin’s organization works is by creating fake digital infrastructure on Facebook,” she said, referring to the leader of the Wagner Group, also indicted in the U.S. for interfering in the 2016 presidential election. “We also know that Prigozhin has worked in the African digital space using third parties, without direct links, but with companies or people that are based in Africa. … At the same time, it’s very hard to be able to say this or that page or this or that network on Facebook belongs to this organization and that this person is behind it.”

The Wagner Group did not respond to a request for comment.

The political effects of disinformation on social media can be notoriously hard to measure, but campaigns could find hospitable footholds in African countries facing political instability and various security threats. In any case, Mhalla, the tech researcher in France, stressed that architects of effective online influence campaigns understand the grievances of their audiences. “You need to tailor narratives and content based on your target,” she said. “A good disinformation campaign can’t just be built from scratch.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Cole Stangler.

]]>
https://www.radiofree.org/2023/08/03/a-pro-putin-facebook-network-is-pumping-french-language-propaganda-into-africa/feed/ 0 416616
The Online Christian Counterinsurgency Against Sex Workers https://www.radiofree.org/2023/07/29/the-online-christian-counterinsurgency-against-sex-workers/ https://www.radiofree.org/2023/07/29/the-online-christian-counterinsurgency-against-sex-workers/#respond Sat, 29 Jul 2023 10:00:00 +0000 https://production.public.theintercept.cloud/?p=439801

The most popular video on Vaught Victor Marx’s YouTube now has more than 15 million views. Standing solemnly in a dark blue karate gi while his son Shiloh Vaughn Marx smiles and points a gun at his face, Marx uses his expertise as a seventh-degree black belt in “Cajun Karate Keichu-Do” to perform what he claims was the world’s fastest gun disarm. Over a period of just 80 milliseconds — according to Marx’s measurement — he snatches the gun from his son and effortlessly ejects the magazine. It’s a striking display, one that unequivocally shouts: I am here to stop bad guys.

Marx is more than just a competitive gun-disarmer and martial artist. He is also a former Marine, a self-proclaimed exorcist, and an author and filmmaker. He also helped launch the Skull Games, a privatized intelligence outfit that purports to hunt pedophiles, sex traffickers, and other “demonic activity” using a blend of sock-puppet social media accounts and commercial surveillance tools — including face recognition software.

The Skull Games events have attracted notable corporate allies. Recent games have been “powered” by the internet surveillance firm Cobwebs, and an upcoming competition is partnered with cellphone-tracking data broker Anomaly Six.

The moral simplicity of Skull Games’s mission is emblazoned across its website in fierce, all-caps type: “We hunt predators.” And Marx has savvily ridden recent popular attention to the independent film “Sound of Freedom,” a dramatization of the life of fellow anti-trafficking crusader Tim Ballard. In the era of QAnon and conservative “groomer” panic, vowing to take down shadowy — and frequently exaggerated — networks of “traffickers” under the aegis of Christ is an exercise in shrewd branding.

Although its name is a reference to the mind games played by pimps and traffickers, Skull Games, which Marx’s church is no longer officially involved in, is itself a form of sport for its participants: a sort of hackathon for would-be Christian saviors, complete with competition. Those who play are awarded points based on their sleuthing. Finding a target’s high school diploma or sonogram imagery nets 15 points, while finding the same tattoo on multiple women would earn a whopping 300. On at least one occasion, according to materials reviewed by The Intercept and Tech Inquiry, participants competed for a chance at prizes, including paid work for Marx’s California church and one of its surveillance firm partners.

While commercially purchased surveillance exists largely outside the purview of the law, Skull Games was founded to answer to a higher power. The event started under the auspices of All Things Possible Ministries, the Murrieta, California, evangelical church Marx founded in 2003.

Marx has attributed his conversion to Christianity to becoming reunited with his biological father — according to Marx, formerly a “practicing warlock” — toward the end of his three years in the Marine Corps. Marx’s tendency to blame demons and warlocks would become the central cause of controversy of his own ministry, largely as a result of his focus on exorcisms as the solutions to issues ranging from pornography to veteran suicides. As Marx recently told “The Spillover” podcast, “I hunt pedophiles, but I also hunt demons.”

Skull Games also ends up being a hunt for sex workers, conflating them with trafficking victims as they prepare intelligence dossiers on women before turning them over to police.

Groups seeking to rescue sex workers — whether through religion, prosecution, or both — are nothing new, said Kristen DiAngelo, executive director of the advocacy group Sex Workers Outreach Project Sacramento. What Skull Games represents — the technological outsourcing of police work to civilian volunteers — presents a new risk to sex workers, she argued.

“I think it’s dangerous because you set up people to have that vigilante mentality.”

“I think it’s dangerous because you set up people to have that vigilante mentality — that idea that, we’re going to go out and we’re going to catch somebody — and they probably really believe that they are going to ‘save someone,’” DiAngelo told The Intercept and Tech Inquiry. “And that’s that savior complex. We don’t need saving; we need support and resources.”

The eighth Skull Games, which took place over the weekend of July 21, operated out of a private investigation firm headquartered in a former church in Wanaque, New Jersey. A photo of the event shared by the director of intelligence of Skull Games showed 57 attendees — almost all wearing matching black T-shirts — standing in front of corporate due diligence firm Hetherington Group’s office with a Skull Games banner unfurled across its front doors. Hetherington Group’s address is simple to locate online, but their office signage doesn’t mention the firm’s name, only saying “593 Ringwood LLC” above the words “In God We Trust.” (Cynthia Hetherington, the CEO of Hetherington Group and a board member of Skull Games, distanced her firm from the surveillance programs normally used at the events. “Cobwebs brought the bagels, which I’m still trying to digest,” she said. “I didn’t see their software anywhere in the event.”)

The attempt to merge computerized counterinsurgency techniques with right-wing evangelism has left some Skull Games participants uncomfortable. One experienced attendee of the January 2023 Skull Games was taken aback by an abundance of prayer circles and paucity of formal training. “Within the first 10 minutes,” the participant recalled of a training webinar, “I was like, ‘What the fuck is this?’”

2M69C9D Jeff Tiegs, chief operations officer of All Things Possible Ministries, blesses U.S. Army Soldiers and explains to them the religious origins of a popular hand gesture on Joint Base Elmendorf-Richardson, Alaska, April 20, 2022. Tiegs said the hand gesture popularized by Star Trek originated as a blessing of the descendants of Aaron, a Jewish High Priest in the Torah.

Jeff Tiegs blesses U.S. Army Soldiers and explains to them the religious origins of a popular hand gesture on Joint Base Elmendorf-Richardson, Alaska, on April 20, 2022.

Photo: Alamy

Delta Force OSINT

The numbers of nongovernmental surveillance practitioners has risen in tandem with the post-9/11 boom in commercial tools for social media surveillance, analyzing private chat rooms, and tracking cellphone pings.

Drawing on this abundance of civilian expertise, Skull Games brings together current and former military and law enforcement personnel, along with former sex workers and even employees of surveillance firms themselves. Both Skull Games and the high-profile, MAGA-beloved Operation Underground Railroad have worked with Cobwebs, but Skull Games roots its branding in counterinsurgency and special operations rather than homeland security.

“I fought the worst of the worst: ISIS, Al Qaeda, the Taliban,” Skull Games president and former Delta Force soldier Jeff Tiegs has said. “But the adversary I despise the most are human traffickers.” Tiegs has told interviewers that he takes “counterterrorism / counterinsurgency principles” and applies them to these targets.

“I fought the worst of the worst: ISIS, Al Qaeda, the Taliban. But the adversary I despise the most are human traffickers.”

The plan broadly mimicked a widely praised Pentagon effort to catch traffickers that was ultimately shut down this May due to a lack of funding. In a training session earlier this month, Tiegs noted that active-duty military service members take part in the hunts; veterans like Tiegs himself are everywhere. The attendee list for a recent training event shows participants with day jobs at the Department of Defense, Portland Police Bureau, and Air Force, as well as a lead contracting officer from U.S. Citizenship and Immigration Services.

Skull Games employs U.S. Special Forces jargon, which dominates the pamphlets handed out to volunteers. Each volunteer is assigned the initial informal rank of private and works out of a “Special Operations Coordination Center.” Government acronyms abound: Participants are asked to keep in mind CCIRs — Commander’s Critical Information Requirements — while preventing EEFIs — Essential Elements of Friendly Information— from falling into the hands of the enemy.

Tiegs’s transition from counterinsurgency to counter-human-trafficking empresario came after he met Jeff Keith, the founder of the anti-trafficking nonprofit Guardian Group, where Tiegs was an executive for nearly five years. While Tiegs was developing Guardian Group’s tradecraft for identifying victims, he was also beginning to work more closely with Marx, whom he met on a trip to Iraq in 2017. By the end of 2018, Marx and Tiegs had joined each others’ boards.

Beyond the Special Forces acumen of its leadership, what sets Skull Games apart from other amateur predator-hunting efforts is its reliance on “open-source intelligence.” OSINT, as it’s known, is a military euphemism popular among its practitioners that refers to a broad amalgam of intelligence-gathering techniques, most relying on surveilling the public internet and purchasing sensitive information from commercial data brokers.

Sensitive personal information is today bought and sold so widely, including by law enforcement and spy agencies, that the Office of the Director of National Intelligence recently warned that data “that could be used to cause harm to an individual’s reputation, emotional well-being, or physical safety” is available on “nearly everyone.”

Skull Games’s efforts to tap this unregulated sprawl of digital personal data function as sort of vice squad auxiliaries. Participants scour the U.S. for digital evidence of sex work before handing their findings over to police — officers the participants often describe as friends and collaborators.

After publicly promoting 2020 as the year Guardian Group would “scale” its tradecraft up to tackling many more cases, Tiegs abruptly jumped from his role as chief operating officer of the organization into the same title at All Things Possible — Marx’s church. By December 2021, Tiegs had launched the first Skull Games under the umbrella of All Things Possible. The event was put together in close partnership with Echo Analytics, which had been acquired earlier that year by Quiet Professionals, a surveillance contractor led by a former Delta Force sergeant major. The first Skull Games took place in the Tampa offices of Echo Analytics, just 13 miles from the headquarters of U.S. Special Operations Command.

As of May 2023, Tiegs has separated from All Things Possible and leads the Skull Games as a newly independent, tax-exempt nonprofit. “Skull Games is separate and distinct from ATP,” he said in an emailed statement. “There is no role for ATP or Marx in Skull Games.”

The Hunt

Reached by phone, Tiegs downplayed the role of powerful surveillance tools in Skull Games’s work while also conceding he wasn’t always aware of what technologies were being used in the hunt for predators — or how.

Despite its public emphasis on taking down traffickers, much of Skull Games’s efforts boil down to scrolling through sex worker ad listings and attempting to identify the women. Central to the sleuthing, according to Tiegs and training materials reviewed by The Intercept and Tech Inquiry, is the search for visual indicators in escort ads and social media posts that would point to a woman being trafficked. An October 2022 report funded by the research and development arm of the U.S. Department of Justice, however, concluded that the appearance of many such indicators — mostly emojis and acronyms — was statistically insignificant.

Tiegs spoke candidly about the centrality of face recognition to Skull Games. “So here’s a girl, she’s being exploited, we don’t know who she is,” he said. “All we have is a picture and a fake name, but, using some of these tools, you’re able to identify her mugshot. Now you know everything about her, and you’re able to start really putting a case together.”

According to notes viewed by The Intercept and Tech Inquiry, the competition recommended that volunteers use FaceCheck.id and PimEyes, programs that allow users to conduct reverse image searches for an uploaded picture of face. In a July Skull Games webinar, one participant noted that they had been able to use PimEyes to find a sex worker’s driver’s license posted to the web.

In January, Cobwebs Technologies, an Israeli firm, announced it would provide Skull Games with access to its Tangles surveillance platform. According to Tiegs, the company is “one of our biggest supporters.” Previous reporting from Motherboard detailed the IRS Criminal Investigation unit’s usage of Cobwebs for undercover investigations.

Skull Games training materials provided to The Intercept and Tech Inquiry provide detailed instructions on the creation of “sock puppet” social media accounts: fake identities for covert research and other uses. Tiegs denied recommending the creation of such pseudonymous accounts, but on the eve of the eighth Skull Games, team leader Joe Labrozzi told fellow volunteers, “We absolutely recommend sock puppets,” according to a training seminar transcript reviewed by The Intercept and Tech Inquiry. Other volunteers shared tips on creating fake social media accounts, including the use of ChatGPT and machine learning-based face-generation tools to build convincing social media personas.

Tiegs also denied a participant’s assertion that Clearview AI’s face recognition software was heavily used in the January 2023 Skull Games. Training materials obtained by Tech Inquiry and The Intercept, however, suggest otherwise. At one point in a July training webinar, a Virginia law enforcement volunteer who didn’t give their name asked what rules were in place for using their official access to face recognition and other law enforcement databases. “It’s easier to ask for forgiveness than permission,” replied another participant, adding that some police Skull Games volunteers had permission to tap their departmental access to Clearview AI and Spotlight, an investigative tool that uses Amazon’s Rekognition technology to identify faces.

Cobwebs — which became part of the American wiretapping company PenLink earlier this month — provides a broad array of surveillance capabilities, according to a government procurement document obtained through a Freedom of Information Act request. Cobwebs provides investigators with the ability to continuously monitor the web for certain keyphrases. The Tangles platform can also provide face recognition; fuse OSINT with personal account data collected from search warrants; and pinpoint individuals through the locations of their phones — granting the ability to track a person’s movements going back as many as three years without judicial oversight.

When reached for comment, Cobwebs said, “Only through collaboration between all sectors of society — government, law enforcement, academia — and the proper tools, can we combat human trafficking.” The company did not respond to detailed questions about how its platform is used by Skull Games.

According to a source who previously attended a Skull Games event, and who asked for anonymity because of their ongoing role in counter-trafficking, only one member of the “task force” of participants had access to the Tangles platform: a representative from Cobwebs itself who could run queries from other task force analysts when requested. The rest of the group was equipped with whatever OSINT-gathering tools they already had access to outside of Skull Games, creating a lopsided exercise in which some participants were equipped with little more than their keyboards and Google searches, while others tapped tools like Clearview or Thomson Reuters CLEAR, an analytics tool used by U.S. Immigration and Customs Enforcement.

Tiegs acknowledged that most Skull Games participants likely have some professional OSINT expertise. By his account, they operate on a sort of BYO-intelligence-gathering-tool basis and, owing to Skull Games’s ad hoc use of technology, said he couldn’t confirm how exactly Cobwebs may have been used in the past. Despite Skull Games widely advertising its partnership with another source of cellphone location-tracking data — the commercial surveillance company Anomaly Six — Tiegs said, “We’re not pinpointing the location of somebody.” He claimed Skull Games uses less sophisticated techniques to generate leads for police who may later obtain a court order for, say, geolocational data. (Anomaly Six said that it is not providing its software or data to Skull Games.)

Tiegs also expressed frustration with the notion that deploying surveillance tools to crack down on sex work would be seen as impermissible. “We allow Big Data to monitor everything you’re doing to sell you iPods or sunglasses or new socks,” he said, “but if you need to leverage some of the same technology to protect women and children, all of the sudden everybody’s up in arms.”

Tiegs added, “I’m really conflicted how people rationalize that.”

People march in support of sex workers, Sunday, June 2, 2019, in Las Vegas. People marched in support of decriminalizing sex work and against the Fight Online Sex Trafficking Act and the Stop Enabling Sex Traffickers Act, among other issues. (AP Photo/John Locher)

People march in support of sex workers and decriminalizing sex work on June 2, 2019, in Las Vegas.

Photo: John Locher/AP

“Pure Evil”

A potent strain of anti-sex work sentiment — not just opposition to trafficking — has pervaded Skull Games since its founding. Although the events are no longer affiliated with a church, Tiegs and his lieutenants’ devout Christianity suggests the digital hunt for pedophiles and pimps remains a form of spiritual warfare.

Michele Block, a Canadian military intelligence veteran who has worked as Skull Games’s director of intelligence since its founding at All Things Possible, is open about her belief that their surveillance efforts are part of a battle against Satan. In a December 2022 interview at America Fest, a four-day conference organized by the right-wing group Turning Point USA, Block described her work as a fight against “pure evil,” claiming that many traffickers are specifically targeting Christian households.

Tiegs argued that “100 percent” of sex work is human trafficking and that “to legalize the purchasing of women is a huge mistake.”

The combination of digital surveillance and Christian moralizing could have serious consequences not only for “predators,” but also their prey: The America Fest interview showed that Skull Games hopes to take down alleged traffickers by first going after the allegedly trafficked.

“So basically, 24/7, our intelligence department identifies victims of sex trafficking.”

“So basically, 24/7,” Block explained, “our intelligence department identifies victims of sex trafficking.” All of this information — both the alleged trafficker and alleged victim — is then handed over to police. Although Tiegs says Skull Games has provided police with “a couple hundred” such OSINT leads since its founding, he conceded the group has no information about how many have resulted in prosecutions or indictments of actual traffickers.

When asked about Skull Games’s position on arresting victims, Tiegs emphasized that “arresting is different from prosecuting” and argued, “Sometimes they do need to make the arrest, because of the health and welfare of that person. She needs to get clean, maybe she’s high. … Very rarely, in my opinion, is it right to charge and prosecute a girl.”

Sex worker advocates, however, say any punitive approach is not only ungrounded in the reality of the trade, but also hurts the very people it purports to help. Although exploitation and coercion are dire realities for many sex workers, most women choose to go into sex work either out of personal preference or financial necessity, according to DiAngelo, of Sex Workers Outreach Project Sacramento. (The Chicago branch of SWOP was a plaintiff in the American Civil Liberties Union’s successful 2020 lawsuit against Clearview AI in Illinois.)

Referring to research she had conducted with the University of California, Davis, DiAngelo explained that socioeconomic desperation is the most common cause of trafficking, a factor only worsened by a brush with the law. “The majority of the people we interview, even if we removed the person who was exploiting them from their life, they still wanted to be in the sex trade,” DiAngelo explained.

Both DiAngelo and Savannah Sly of the nonprofit New Moon Network, an advocacy group for sex workers, pointed to flaws in the techniques that police claim detect trafficking from coded language in escort ads. “You can’t tell just by looking at a picture whether someone’s trafficked or not,” Sly said. The “dragnet” surveillance of sex workers performed by groups like Skull Games, she claimed, imperils their human rights. “If I become aware I’m being surveilled, that’s not helping my situation,” Sly said, “Sex workers live with a high degree of paranoia.”

Rather than “rescuing” women from trafficking, DiAngelo argued Skull Games’s collaboration with police risks driving women into the company of people seeking to take advantage of them — particularly if they’ve been arrested and face diminished job prospects outside of sex work. DiAngelo said, “They’re going to lock them into sex work, because once you get the scarlet letter, nobody wants you anymore.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Jack Poulson.

]]>
https://www.radiofree.org/2023/07/29/the-online-christian-counterinsurgency-against-sex-workers/feed/ 0 415603
Texas State Police Purchased Israeli Phone-Tracking Software for “Border Emergency” https://www.radiofree.org/2023/07/26/texas-state-police-purchased-israeli-phone-tracking-software-for-border-emergency/ https://www.radiofree.org/2023/07/26/texas-state-police-purchased-israeli-phone-tracking-software-for-border-emergency/#respond Wed, 26 Jul 2023 19:03:26 +0000 https://production.public.theintercept.cloud/?p=436563

The Texas Department of Public Safety purchased access to powerful software capable of locating and following people through their phones as part of Republican Gov. Greg Abbott’s “border security disaster” efforts, according to documents reviewed by The Intercept.

In 2021, Abbott proclaimed that the “surge of individuals unlawfully crossing the Texas-Mexico border posed an ongoing and imminent threat of disaster” to the state and its residents. Among other effects, the disaster declaration opened a spigot of government money to a variety of private firms ostensibly paid to help patrol and blockade the state’s border with Mexico.

One of the private companies that got in on the cash disbursements was Cobwebs Technologies, a little-known Israeli surveillance contractor. Cobwebs’s marquee product, the surveillance platform Tangles, offers its users a bounty of different tools for tracking people as they navigate both the internet and the real world, synthesizing social media posts, app activity, facial recognition, and phone tracking.

“As long as this broken consumer data industry exists as it exists today, shady actors will always exploit it.”

News of the purchase comes as Abbott’s border crackdown escalated to new heights, following a Department of Public Safety whistleblower’s report of severe mistreatment of migrants by state law enforcement and a Justice Department lawsuit over the governor’s deployment of razor wire on the Rio Grande. The Cobwebs documents show that Abbott’s efforts to usurp the federal government’s constitutional authority to conduct immigration enforcement have extended into the electronic realm as well. The implications could reach far beyond the geographic bounds of the border and into the private lives of citizens and noncitizens alike.

“Government agencies systematically buying data that has been originally collected to provide consumer services or digital advertising represents the worst possible kind of decontextualized misuse of personal information,” Wolfie Christl, a privacy researcher who tracks data brokerages, told The Intercept. “But as long as this broken consumer data industry exists as it exists today, shady actors will always exploit it.”

Like its competitors in the world of software tracking tools, Cobwebs — which sells its services to the Department of Homeland Security, the IRS, and a variety of undisclosed corporate customers — lets its clients track the movements of private individuals without a court order. Instead of needing a judge’s sign-off, these tracking services rely on bulk-purchasing location pings pulled from smartphones, often through unscrupulous mobile apps or in-app advertisers, an unregulated and increasingly pervasive form of location tracking.

In August 2021, the Texas Department of Public Safety’s Intelligence and Counterterrorism division purchased a year of Tangles access for $198,000, according to contract documents, obtained through a public records request by Tech Inquiry, a watchdog and research organization, and shared with The Intercept. The state has renewed its Tangles subscription twice since then, though the discovery that Cobwebs failed to pay taxes owed in Texas briefly derailed the renewal last April, according to an email included in the records request. (Cobwebs declined to comment for this story.)

A second 2021 contract document shared with The Intercept shows DPS purchased “unlimited” access to Clearview AI, a controversial face recognition platform that matches individuals to tens of billions of photos scraped from the internet. The purchase, according to the document, was made “in accordance/governed by the Texas Governor’s Disaster Declaration for the Texas-Mexico border for ongoing and imminent threats.” (Clearview did not respond to a request for comment.)

Each of the three yearlong subscriptions notes Tangles was purchased “in accordance to the provisions outlined in the Texas Governor-Proclaimed Border Disaster Declaration signed May 22, 2022, per Section 418.011 of the Texas Government Code.”

The disaster declaration, which spans more than 50 counties, is part of an ongoing campaign by Abbott that has pushed the bounds of civil liberties in Texas, chiefly through the governor’s use of the Department of Public Safety.

Under Operation Lone Star, Abbott has spent $4.5 billion surging 10,000 Department of Public Safety troopers and National Guard personnel to the border as part of a stated effort to beat back a migrant “invasion,” which he claims is aided and abetted by President Joe Biden. The resulting project has been riddled with scandal, including migrants languishing for months in state jails without charges and several suicides among personnel deployed on the mission. Just this week, the Houston Chronicle obtained an internal Department of Public Safety email revealing that troopers had been “ordered to push small children and nursing babies back into the Rio Grande” and “told not to give water to asylum seekers even in extreme heat.”

On Monday, the U.S. Justice Department sued Texas over Abbott’s deployment of floating barricades on the Rio Grande. Abbott, having spent more than two years angling for a states’ rights border showdown with the Biden administration, responded last week to news of the impending lawsuit by tweeting: “I’ll see you in court, Mr. President.”

Despite Abbott’s repeated claims that Operation Lone Star is a targeted effort focused specifically on crimes at the border, a joint investigation by the Texas Tribune, ProPublica, and the Marshall Project last year found that the state was counting arrests and drug charges far from the U.S-Mexico divide and unrelated to the Operation Lone Star mandate. Records obtained by the news organizations last summer showed that the Justice Department opened a civil rights investigation into Abbott’s operation. The status of the investigation has not been made public.

Where the Department of Public Safety’s access to Tangles’s powerful cellphone tracking software will fit into Abbott’s controversial border enforcement regime remains uncertain. (The Texas Department of Public Safety did not respond to a request for comment.)

Although Tangles provides an array of options for keeping tabs on a given target, the most powerful feature obtained by the Department of Public Safety is Tangles’s “WebLoc” feature: “a cutting-edge location solution which automatically monitors and analyzes location-based data in any specified geographic location,” according to company marketing materials. While Cobwebs claims it sources device location data from multiple sources, the Texas Department of Public Safety contract specifically mentions “ad ID,” a reference to the unique strings of text used to identify and track a mobile phone in the online advertising ecosystem.

“Every second, hundreds of consumer data brokers most people never heard of collect and sell huge amounts of personal information on everyone,” explained Christl, the privacy researcher. “Most of these shady and opaque data practices are systematically enabled by today’s digital marketing and advertising industry, which has gotten completely out of control.”

While advertisers defend this practice on the grounds that the device ID itself doesn’t contain a person’s name, Christl added that “several data companies sell information that helps to link mobile device identifiers to email addresses, phone numbers, names and postal addresses.” Even without extra context, tying a real name to an “anonymized” advertising identifier’s location ping is often trivial, as a person’s daily movement patterns typically quickly reveal both where they live and work.

Cobwebs advertises that WebLoc draws on “huge sums of location-based data,” and it means huge: According to a WebLoc promotional brochure, it affords customers “worldwide coverage” of smartphone pings based on “billions of data points to ensure maximum location based data coverage.” WebLoc not only provides the exact locations of smartphones, but also personal information associated with their owners, including age, gender, languages spoken, and interests — “e.g., music, luxury goods, basketball” — according to a contract document from the Office of Naval Intelligence, another Cobwebs customer.

The ability to track a person wherever they go based on an indispensable object they keep on or near them every hour of every day is of obvious appeal to law enforcement officials, particularly given that no judicial oversight is required to use a tool like Tangles. Critics of the technology have argued that a legislative vacuum allows phone-tracking tools, fed by the unregulated global data broker market, to give law enforcement agencies a way around Fourth Amendment protections.

The power to track people through Tangles, however, is valuable even in countries without an ostensible legal prohibition against unreasonable searches. In 2021, Facebook announced it had removed 200 accounts used by Cobwebs to track its users in Bangladesh, Saudi Arabia, Poland, and several other countries.

“In addition to targeting related to law enforcement activities,” the company explained, “we also observed frequent targeting of activists, opposition politicians and government officials in Hong Kong and Mexico.”

Beryl Lipton, an investigative researcher with the Electronic Frontier Foundation, told The Intercept that bolstering surveillance powers under the aegis of an emergency declaration adds further risk to an already fraught technology. “We need to be very skeptical of any expansion of surveillance that occurs under disaster declarations, particularly open-ended claims of emergency,” Lipton said. “They can undermine legislative checks on the executive branch and obviate bounds on state behavior that exist for good reason.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/07/26/texas-state-police-purchased-israeli-phone-tracking-software-for-border-emergency/feed/ 0 414823
How to make educational technology accessible to all https://www.radiofree.org/2023/07/26/how-to-make-educational-technology-accessible-to-all/ https://www.radiofree.org/2023/07/26/how-to-make-educational-technology-accessible-to-all/#respond Wed, 26 Jul 2023 16:28:17 +0000 https://news.un.org/feed/view/en/audio/2023/07/1139117 As technology becomes increasingly accessible across the globe, more must be done to ensure its use in education remains equitable, scalable, and sustainable.

That’s according to Manos Antoninis, Director of the Global Education Monitoring (GEM) Report, produced by the UN agency specializing in education, science and culture, UNESCO.

In an interview for UN News, he’s been outlining the advantages and disadvantages of using technology in education, how to improve safety online, the future of artificial intelligence (AI), and describing how online education resources can be tailored to a more diverse, global audience.

Jordan Larrabee spoke with Mr. Antoninis just ahead of the launch of this year’s GEM Report in Uruguay on Wednesday.


This content originally appeared on UN News - Global perspective Human stories and was authored by Jordan Larrabee.

]]>
https://www.radiofree.org/2023/07/26/how-to-make-educational-technology-accessible-to-all/feed/ 0 414776
Senator Elizabeth Warren Probes Google’s Quest for Soldiers’ Medical Data https://www.radiofree.org/2023/07/26/senator-elizabeth-warren-probes-googles-quest-for-soldiers-medical-data/ https://www.radiofree.org/2023/07/26/senator-elizabeth-warren-probes-googles-quest-for-soldiers-medical-data/#respond Wed, 26 Jul 2023 10:00:00 +0000 https://www.propublica.org/article/warren-probes-google-quest-soldiers-medical-data by James Bandler

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Reflecting rising concerns that Big Tech’s infatuation with artificial intelligence threatens privacy and economic competition, Sen. Elizabeth Warren has begun investigating Google’s efforts to swoop up medical information derived from biopsy specimens of millions of military service members.

Warren, a Massachusetts Democrat and the chair of the Senate Armed Services Subcommittee on Personnel, wrote on Tuesday to Google and the Department of Defense, seeking information and records related to the company’s pursuit of a vast trove of medical data overseen by the military’s Joint Pathology Center. The archive represents a largely untapped gold mine for AI and health care companies, because computers can use the data to develop algorithms that detect patterns, like telltale signs of tumors, faster and often better than humans can.

In her letters, Warren accused Google of “aggressive attempts” to gain service members’ medical information and Defense Department officials of “favoritism” toward the tech giant. “I am alarmed by reports that Google tried to privately broker a deal to secure exclusive access to JPC data,” Warren wrote to Sundar Pichai, CEO of both Google and its parent company, Alphabet.

Warren was referring to a ProPublica report published last December, which revealed that at least a dozen Defense Department staff members pushed back against Google’s campaign for the medical data. ProPublica found that Google began in late 2015 to gather medical information at military installations and hospitals around the country, which it planned to use to build AI tools. Such software, the company hoped, would give it an edge in the race to develop algorithms that could help pathologists diagnose illnesses more quickly and accurately, predict prognoses and, eventually, Google scientists hoped, find new treatments for diseases, including cancers.

Google’s allies in the Defense Department and on the staff of the House Armed Services Committee tried to help the company, ProPublica reported. In exchange for exclusive access to the archive, the company offered to digitize the collection of pathology slides that are stored at a sprawling warehouse in Silver Spring, Maryland. But staff at the JPC and elsewhere expressed dismay about risks to the privacy of service members’ tissue specimens and about the use of a sensitive government resource by a corporation to develop unproven AI tools. In 2021, Google was not selected for a pilot project to begin digitizing the collection.

“The public deserves a full accounting of DoD’s secretive interactions with Google regarding private health data contained at the JPC and complete transparency surrounding DoD’s blatant favoritism towards Google,” Warren wrote to Defense Secretary Lloyd Austin III. She has asked both Google and the Defense Department to respond by Aug. 8.

A Warren spokesperson characterized the letters as a “prelude to inform a potential Senate investigation and potential future legislation.” The senator said in a statement on Tuesday that the JPC “has millions of tissue samples from servicemembers and veterans that are meant to support the public good — but Google came dangerously close to landing an exclusive monopoly on these samples and the right to charge DoD for access to this data.”

A Google spokesperson declined to comment but referred ProPublica to statements and a blog post that the company published in response to the December story. “We had hoped to enable the JPC to digitize its data and, with its permission, develop computer models that would enable researchers and clinicians to improve diagnosis for cancers and other illnesses,” the company said then. “Despite efforts from Google and many at the Department of Defense, our work with JPC unfortunately never got off the ground, and the physical repository of pathology slides continues to deteriorate.”

A Defense Department spokesperson declined to comment, saying the agency doesn’t discuss communications with members of Congress. The JPC has said that its highest priority is to ensure that any medical information shared with outside parties is “used ethically and in a manner that protects patient privacy and military security.”

Since the Civil War, the U.S. military has been collecting and studying human tissue of armed service members in an effort to reduce the toll of injuries, diseases and fatalities suffered in wartime and peace. The collection has spurred numerous advances in medicine and science, including the first genetic sequencing of the 1918 flu virus. Today, the repository holds more than 31 million matchbook-sized blocks of human tissue and 55 million pathology slides.

Pathology is ripe for the AI revolution. A single pathology slide, which can be scanned and digitized, holds vast amounts of visual information. In 2021, Google told the military that the JPC collection of veterans’ skin samples, tumor biopsies and slices of organs holds the “raw materials” for the most significant biotechnology breakthroughs of this decade — “on par with the Human Genome Project in its potential for strategic, clinical, and economic impact.”

But lawmakers, regulators and ethicists have struggled to keep pace with developments in AI. Some models can process information now at a scale that’s beyond human comprehension.

The corporate use of the JPC collection is particularly delicate. Most of the specimens come from military service members who did not consent to the use of their tissue for research. In addition, there are national security ramifications. China has already collected huge health care data sets from the U.S., both legally and illegally, as it seeks to develop its own AI capabilities, according to the National Counterintelligence and Security Center.

Warren has emerged as one of Google and Big Tech’s most vocal critics on Capitol Hill. In 2019, she assailed the company’s efforts to amass millions of patient records in a partnership with the Catholic health care system Ascension, dubbed “Project Nightingale.”

Doris Burke contributed research.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by James Bandler.

]]>
https://www.radiofree.org/2023/07/26/senator-elizabeth-warren-probes-googles-quest-for-soldiers-medical-data/feed/ 0 414660
Dotty Domains: The Pentagon’s Mali Typo Leak Affair https://www.radiofree.org/2023/07/26/dotty-domains-the-pentagons-mali-typo-leak-affair/ https://www.radiofree.org/2023/07/26/dotty-domains-the-pentagons-mali-typo-leak-affair/#respond Wed, 26 Jul 2023 02:27:06 +0000 https://dissidentvoice.org/?p=142471 Fleet-footed agility and sharp thinking rarely characterise the plodding bureaucrat.  An argument can be made that different attributes are prized: cherished incompetence, spells of inattentiveness, and dedication to keeping things secret with severity.  What matters is not what you did, but what you pretended to do.

Even with maintaining secrecy, the plodding desk-job hack can face problems, all falling under the umbrella term of “human error”.  Papers and files can stray.  The occasional USB stick can find its way into unwanted hands. And then there is that damnable business about the cloud and who can access it.

Despite repeated warnings over a decade by the Amsterdam-based Mali Dili, contracted to manage email accounts of the West African state, traffic from the US military continued to find its way to the .ml domain, the country identifier of Mali.  (For all we know, this may still be happening.)  This arose because of a typing error, with .mil being the suffix for US military email addresses.

Other countries also seemed caught up in the domain confusion.  Over a dozen emails intended for the Dutch military also found their way into the Johannes Zuurbier with .ml being confused with .nl.  Eight emails from the Australian Department of Defence, intended for US military consumption, also met the same fate.  These include problems about corrosion in Australia’s F-35 and an artillery manual “carried by command post officers for each battery”.

The man most bemused by this is not, it would seem, in the Pentagon, but a certain Dutch entrepreneur who was given the task of managing the domain.  Johannes Zuurbier has found himself inconvenienced by the whole matter for some years.  In 2023, he decided to gather the misdirected messages.  He currently holds 117,000 of them, though he has received anywhere up to 1,000 messages a day.  He has been good enough to badger individuals in the US national cyber security service, the White House, and the local defence attaché in Mali.

The Financial Times reports that the contents of such messages vary.  Much of it is spam; a degree of it comprises X-Rays, medical data, identity documents, crew lists for ships, staffing names at bases, mapping on installations, base photos, naval inspection reports, contracts, criminal complaints against various personnel, internal investigations on bullying claims, official travel itineraries, bookings, tax and financial records.

While not earth shaking, one of the misdirected emails featured the travel itinerary of General James McConville, the US Army’s Chief of Staff, whose visit to Indonesia was noted, alongside a “full list of room numbers”, and “details of the collection of McConville’s room key at the Grand Hyatt Jakarta.”  Not the sort of thing you necessarily wish your adversaries to know.

Another email from the Zuurbier trove came from an FBI agent and was intended for a US Navy official, requesting personal information to process a visitor from the Navy to an FBI facility.

Lt. Commander Tim Gorman, a spokesperson from the Office of the Secretary of Defense, has put a brave face on it.  “The Department of Defense (DoD) is aware of this issue and takes all unauthorized disclosures of Controlled National Security Information or Controlled Unclassified Information Seriously,” he outlined in a statement to The Verge.  He further claimed, without giving much away, that emails sent from a .mil domain to Mali are “blocked”, with a notification being sent to the sender “that they must validate the email addresses of the intended recipients.”

To keep things interesting, however, Gorman confesses that there was nothing stopping other government agencies or entities working with the US government from making the mistake and passing on material in error.  His focus, rather, was on the Pentagon personnel, who continued to receive “direction and training”.  The Defense Department “has implemented policy, training, and technical controls to ensure that emails from the ‘.mil’ domain are not delivered to incorrect domains.”

The whole affair is becoming a thick parody of administrative dunderheadedness.  It follows a pattern of inadvertent exposure of data, the sort that would, if published, probably lead to harassment and prosecution by the Department of Justice.  But the incompetent are almost never found wanting; only the well-intentioned deserve punishment.  Instead, IT misconfigurations are blamed for what happened, for instance, in February, when three terabytes of US Special Operation Command unclassified emails were made available for public consumption for some two weeks.

Even as the typo-leaks continue, the United States has imposed sanctions against, of all individuals, Mali’s own defence officials, including the defence minister, Colonel Sadio Camara.  The two other individuals in question are Air Force Chief of Staff Colonel Alou Boi Diarra and Deputy Chief of Staff Lieutenant Colonel Adama Bagayoko.  In one of his tedious moral fits, US Secretary of State Antony Blinken accused the trio of facilitating and expanding “Wagner’s presence in Mali since December 2021”, claiming an increase of civilian fatalities by 278 percent since the Russian mercenary group established itself in the country.

The Mali authorities, as of July 25, should have assumed control of the domain.  This worries retired US admiral and former director of the National Security Agency and US Army’s Cyber Command, Mike Rogers.  “It’s one thing when you are dealing with a domain administrator who is trying, even unsuccessfully, to articulate the concern.  It’s another when it’s a foreign government that … sees it as an advantage that they can use.”

Zuurbier, at the conclusion of his decade-long contract, may still have a few juicy numbers for safe keeping, though he will be mindful about what happens when such contents are published, namely, the Assange-WikiLeaks precedent.  Mali’s officials, in the meantime, will simply anticipate the dotty domain business to continue.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2023/07/26/dotty-domains-the-pentagons-mali-typo-leak-affair/feed/ 0 414547
As Actors Strike for AI Protections, Netflix Lists $900,000 AI Job https://www.radiofree.org/2023/07/25/as-actors-strike-for-ai-protections-netflix-lists-900000-ai-job/ https://www.radiofree.org/2023/07/25/as-actors-strike-for-ai-protections-netflix-lists-900000-ai-job/#respond Tue, 25 Jul 2023 16:32:38 +0000 https://production.public.theintercept.cloud/?p=436995

As Hollywood executives insist it is “just not realistic” to pay actors — 87 percent of whom earn less than $26,000 — more, they are spending lavishly on AI programs.

While entertainment firms like Disney have declined to go into specifics about the nature of their investments in artificial intelligence, job postings and financial disclosures reviewed by The Intercept reveal new details about the extent of these companies’ embrace of the technology.

In one case, Netflix is offering as much as $900,000 for a single AI product manager. 

Hollywood actors and writers unions are jointly striking this summer for the first time since 1960, calling for better wages and regulations on studios’ use of artificial intelligence. 

Just after the actors’ strike was authorized, the Alliance of Motion Picture and Television Producers — the trade association representing the TV and film companies negotiating with the actors and writers unions — announced “a groundbreaking AI proposal that protects actors’ digital likenesses for SAG-AFTRA members.” 

The offer prompted comparisons to an episode of the dystopian sci-fi TV series “Black Mirror,” which depicted actress Salma Hayek locked in a Kafkaesque struggle with a studio which was using her scanned digital likeness against her will. 

“Having been poor and rich in this business, I can assure you there’s enough money to go around; it’s just about priorities.”

“So $900k/yr per soldier in their godless AI army when that amount of earnings could qualify thirty-five actors and their families for SAG-AFTRA health insurance is just ghoulish,” actor Rob Delaney, who had a lead role in the the “Black Mirror” episode, told The Intercept. “Having been poor and rich in this business, I can assure you there’s enough money to go around; it’s just about priorities.”

Among the striking actors’ demands are protections against their scanned likeness being manipulated by AI without adequate compensation for the actors. 

“They propose that our background performers should be able to be scanned, get paid for one day’s pay and their company should own that scan, their image, their likeness, and to be able to use it for the rest of eternity in any project they want with no consent and no compensation,” Duncan Crabtree-Ireland, chief negotiator for the actors’ union, SAG AFTRA, said

Entertainment writers, too, must contend with their work being replaced by AI programs like ChatGPT that are capable of generating text in response to queries. Writers represented by the Writers Guild of America have been on strike since May 7 demanding, among other things, labor safeguards against AI. John August, a screenwriter for films like “Big Fish” and “Charlie’s Angels,” explained that the WGA wants to make sure that “ChatGPT and its cousins can’t be credited with writing a screenplay.”

Actor Rob Delaney gives a speech during the demonstration. Performing arts and entertainment industries union Equity staged a rally in Leicester Square in solidarity with the SAG-AFTRA (Screen Actors Guild – American Federation of Television and Radio Artists) strike. (Photo by Vuk Valcic / SOPA Images/Sipa USA)(Sipa via AP Images)

Actor Rob Delaney gives a speech during a demonstration on July 21, 2023. Performing arts and entertainment industries union Equity staged a rally in London’s Leicester Square in solidarity with the SAG-AFTRA strike.

Photo: Vuk Valcic/Sipa via AP Images

Protecting Actors’ Likenesses

The daily rate for background actors can be around $200, per the SAG-AFTRA contract. A job posting by the company Realeyes offers slightly more than that: $300 for two hours of work “express[ing] different emotions” and “improvis[ing] brief scenes” to “train an AI database to better express human emotions.”

Realeyes develops technology to measure attention and reactions by users to video content. While the posting doesn’t mention work with streaming companies, a video on Realeyes’s website prominently features the logos for Netflix and Hulu. 

The posting is specially catered to attract striking workers, stressing that the gig is for “research” purposes and therefore “does not qualify as struck work”: “Please note that this project does not intend to replace actors, but rather requires their expertise,” Realeyes says, emphasizing multiple times that training AI to create “expressive avatars” skirts strike restrictions.

“The ‘research’ side of this is largely a red herring. Industry research goes into commercial products.”

Experts question whether the boundary between research and commercial work is really so clear. “It’s almost a guarantee that the use of this ‘research,’ when it gets commercialized, will be to build digital actors that replace humans,” said Ben Zhao, professor of computer science at the University of Chicago. “The ‘research’ side of this is largely a red herring.” He added, “Industry research goes into commercial products.”

“This is the same bait-switch that LAION and OpenAI pulled years ago,” Zhao said, referring to the Large-scale Artificial Intelligence Open Network, a German nonprofit that created the AI chatbot OpenAssistant; OpenAI is the nonprofit that created AI programs like ChatGPT and DALL-E. “Download everything on the internet and no worries about copyrights, because it’s a nonprofit and research. The output of that becomes a public dataset, then commercial companies (who supported the nonprofit) then take it and say, ‘Gee thanks! How convenient for our commercial products!’”

Netflix AI Manager

Netflix’s posting for a $900,000-a-year AI product manager job makes clear that the AI goes beyond just the algorithms that determine what shows are recommended to users. 

The listing points to AI’s uses for content creation:“Artificial Intelligence is powering innovation in all areas of the business,” including by helping them to “create great content.” Netflix’s AI product manager posting alludes to a sprawling effort by the business to embrace AI, referring to its “Machine Learning Platform” involving AI specialists “across Netflix.” (Netflix did not immediately respond to a request for comment.)

A research section on Netflix’s website describes its machine learning platform, noting that while it was historically used for things like recommendations, it is now being applied to content creation. “Historically, personalization has been the most well-known area, where machine learning powers our recommendation algorithms. We’re also using machine learning to help shape our catalog of movies and TV shows by learning characteristics that make content successful. We use it to optimize the production of original movies and TV shows in Netflix’s rapidly growing studio.”

Netflix is already putting the AI technology to work. On July 6, the streaming service premiered a new Spanish reality dating series, “Deep Fake Love,” in which scans of contestants’ faces and bodies are used to create AI-generated “deepfake” simulations of themselves. 

In another job posting, Netflix seeks a technical director for generative AI in its research and development tech lab for its gaming studio. (Video games often employ voice actors and writers.)

Generative AI is the type of AI that can produce text, images, and video from input data — a key component of original content creation but which can also be used for other purposes like advertising. Generative AI is distinct from older, more familiar AI models that provide things like algorithmic recommendations or genre tags. 

“All those models are typically called discriminatory models or classifiers: They tell you what something is,” Zhao explained. “They do not generate content like ChatGPT or image generator models.” 

“Generative models are the ones with the ethics problems,” he said, explaining how classifiers are based on carefully using limited training data — such as a viewing history — to generate recommendations. 

Netflix offers up to $650,000 for its generative AI technical director role. 

Video game writers have expressed concerns about losing work to generative AI, with one major game developer, Ubisoft, saying that it is already using generative AI to write dialogue for nonplayer characters.

Netflix, for its part, advertises that one of its games, a narrative-driven adventure game called “Scriptic: Crime Stories,” centered around crime stories, “uses generative AI to help tell them.”

Disney’s AI Operations

Disney has also listed job openings for AI-related positions. In one, the entertainment giant is looking for a senior AI engineer to “drive innovation across our cinematic pipelines and theatrical experiences.” The posting mentions several big name Disney studios where AI is already playing a role, including Marvel, Walt Disney Animation, and Pixar.

In a recent earnings call, Disney CEO Bob Iger alluded to the challenges that the company would have in integrating AI into their current business model. 

“In fact, we’re already starting to use AI to create some efficiencies and ultimately to better serve consumers,” Iger said, as recently reported by journalist Lee Fang. “But it’s also clear that AI is going to be highly disruptive, and it could be extremely difficult to manage, particularly from an IP management perspective.”

Iger added, “I can tell you that our legal team is working overtime already to try to come to grips with what could be some of the challenges here.” Though Iger declined to go into specifics, Disney’s Securities and Exchange Commission filings provide some clues.

“It seems clear that the entertainment industry is willing to make massive investments in generative AI.”

“Rules governing new technological developments, such as developments in generative AI, remain unsettled, and these developments may affect aspects of our existing business model, including revenue streams for the use of our IP and how we create our entertainment products,” the filing says. 

While striking actors are seeking to protect their own IP from AI — among the union demands that Iger deemed “just not realistic” — so is Disney. 

“It seems clear that the entertainment industry is willing to make massive investments in generative AI,” Zhao said, “not just potentially hundreds of millions of dollars, but also valuable access to their intellectual property, so that AI models can be trained to replace human creatives like actors, writers, journalists for a tiny fraction of human wages.”

For some actors, this is not a struggle against the sci-fi dystopia of AI itself, but just a bid for fair working conditions in their industry and control over their own likenesses, bodies, movements, and speech patterns.

“AI isn’t bad, it’s just that the workers (me) need to own and control the means of production!” said Delaney. “My melodious voice? My broad shoulders and dancer’s undulating buttocks? I decide how those are used! Not a board of VC angel investor scumbags meeting in a Sun Valley conference room between niacin IV cocktails or whatever they do.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Ken Klippenstein.

]]>
https://www.radiofree.org/2023/07/25/as-actors-strike-for-ai-protections-netflix-lists-900000-ai-job/feed/ 0 414402
The Biggest Enslaver https://www.radiofree.org/2023/07/25/the-biggest-enslaver/ https://www.radiofree.org/2023/07/25/the-biggest-enslaver/#respond Tue, 25 Jul 2023 16:10:23 +0000 https://dissidentvoice.org/?p=142461


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2023/07/25/the-biggest-enslaver/feed/ 0 414406
‘Grassroots action’ could address climate change in Micronesia https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/ https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/#respond Sat, 22 Jul 2023 00:48:59 +0000 https://asiapacificreport.nz/?p=90989 By Eleisha Foon, RNZ journalist

A new report has found practical solutions to address climate change in the Federated States of Micronesia (FSM), including raising roads and using mangrove forests.

Decision-makers have been urged to prepare for major changes.

These include heatwaves, stronger typhoons, a declining ecosystem, threatened food security and increased health issues.

The research is part of a series of reports by the Pacific Islands Regional Climate Assessment, with support of several government, NGO, and research entities.

Climate variability and extreme events have brought unprecedented challenges to remote atoll communities of Micronesia, especially in the state of Yap.

The report highlighted key issues for health, food security, agriculture, agroforestry, marine and disaster management sectors.

It also looked at the importance of using local knowledge and pairing this with new technology and science to help Micronesia adapt to climate change.

Hope for action
Coordinating lead author Zena Grecni hopes the findings will help policy-makers take action.

“We could see a 20-50 percent decrease in coral reef fish by 2050,” Grecni warned.

Climate proofing

Coordinating lead author Zena Grecni
Coordinating lead author Zena Grecni . . . “We could see a 20-50 percent decrease in coral reef fish by 2050.” Image: RNZ Pacific

The findings pushed for change at a “grass roots level,” and for state agencies to recognise the need for traditional knowledge and cultural resources in coastal adaptation measures.

About 89 percent of the FSM’s population lives within one kilometre of the coast, and buildings and infrastructure are vulnerable to coastal climate impacts.

The report looked at “climate proofing” interventions such as raising roads and using natural barriers like mangrove forests.

Mangroves have been shown to mitigate the effects of rising sea levels and are more effective long-term for sea level rise, instead of hard structures.

Another key priority was strengthening infrastructure like schools and medical centres.

Climate change in curricula
The report suggested climate change be included in school curricula to help inform future generations.

It highlighted the importance of learning from local knowledge and historical experiences to inform the future of local food supply.

Indigenous practices such as stone-lined enclosures, taro plantings raised above coastal groundwater, and replanted mangroves, were set to respond to sea level rise.

In the past, these reports have been used by other Pacific Islands “as a tool for negotiation,” Grecni said.

The report authors hoped it would help Micronesia in the same way.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/feed/ 0 413776
‘Grassroots action’ could address climate change in Micronesia https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/ https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/#respond Sat, 22 Jul 2023 00:48:59 +0000 https://asiapacificreport.nz/?p=90989 By Eleisha Foon, RNZ journalist

A new report has found practical solutions to address climate change in the Federated States of Micronesia (FSM), including raising roads and using mangrove forests.

Decision-makers have been urged to prepare for major changes.

These include heatwaves, stronger typhoons, a declining ecosystem, threatened food security and increased health issues.

The research is part of a series of reports by the Pacific Islands Regional Climate Assessment, with support of several government, NGO, and research entities.

Climate variability and extreme events have brought unprecedented challenges to remote atoll communities of Micronesia, especially in the state of Yap.

The report highlighted key issues for health, food security, agriculture, agroforestry, marine and disaster management sectors.

It also looked at the importance of using local knowledge and pairing this with new technology and science to help Micronesia adapt to climate change.

Hope for action
Coordinating lead author Zena Grecni hopes the findings will help policy-makers take action.

“We could see a 20-50 percent decrease in coral reef fish by 2050,” Grecni warned.

Climate proofing

Coordinating lead author Zena Grecni
Coordinating lead author Zena Grecni . . . “We could see a 20-50 percent decrease in coral reef fish by 2050.” Image: RNZ Pacific

The findings pushed for change at a “grass roots level,” and for state agencies to recognise the need for traditional knowledge and cultural resources in coastal adaptation measures.

About 89 percent of the FSM’s population lives within one kilometre of the coast, and buildings and infrastructure are vulnerable to coastal climate impacts.

The report looked at “climate proofing” interventions such as raising roads and using natural barriers like mangrove forests.

Mangroves have been shown to mitigate the effects of rising sea levels and are more effective long-term for sea level rise, instead of hard structures.

Another key priority was strengthening infrastructure like schools and medical centres.

Climate change in curricula
The report suggested climate change be included in school curricula to help inform future generations.

It highlighted the importance of learning from local knowledge and historical experiences to inform the future of local food supply.

Indigenous practices such as stone-lined enclosures, taro plantings raised above coastal groundwater, and replanted mangroves, were set to respond to sea level rise.

In the past, these reports have been used by other Pacific Islands “as a tool for negotiation,” Grecni said.

The report authors hoped it would help Micronesia in the same way.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/feed/ 0 413777
‘Grassroots action’ could address climate change in Micronesia https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/ https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/#respond Sat, 22 Jul 2023 00:48:59 +0000 https://asiapacificreport.nz/?p=90989 By Eleisha Foon, RNZ journalist

A new report has found practical solutions to address climate change in the Federated States of Micronesia (FSM), including raising roads and using mangrove forests.

Decision-makers have been urged to prepare for major changes.

These include heatwaves, stronger typhoons, a declining ecosystem, threatened food security and increased health issues.

The research is part of a series of reports by the Pacific Islands Regional Climate Assessment, with support of several government, NGO, and research entities.

Climate variability and extreme events have brought unprecedented challenges to remote atoll communities of Micronesia, especially in the state of Yap.

The report highlighted key issues for health, food security, agriculture, agroforestry, marine and disaster management sectors.

It also looked at the importance of using local knowledge and pairing this with new technology and science to help Micronesia adapt to climate change.

Hope for action
Coordinating lead author Zena Grecni hopes the findings will help policy-makers take action.

“We could see a 20-50 percent decrease in coral reef fish by 2050,” Grecni warned.

Climate proofing

Coordinating lead author Zena Grecni
Coordinating lead author Zena Grecni . . . “We could see a 20-50 percent decrease in coral reef fish by 2050.” Image: RNZ Pacific

The findings pushed for change at a “grass roots level,” and for state agencies to recognise the need for traditional knowledge and cultural resources in coastal adaptation measures.

About 89 percent of the FSM’s population lives within one kilometre of the coast, and buildings and infrastructure are vulnerable to coastal climate impacts.

The report looked at “climate proofing” interventions such as raising roads and using natural barriers like mangrove forests.

Mangroves have been shown to mitigate the effects of rising sea levels and are more effective long-term for sea level rise, instead of hard structures.

Another key priority was strengthening infrastructure like schools and medical centres.

Climate change in curricula
The report suggested climate change be included in school curricula to help inform future generations.

It highlighted the importance of learning from local knowledge and historical experiences to inform the future of local food supply.

Indigenous practices such as stone-lined enclosures, taro plantings raised above coastal groundwater, and replanted mangroves, were set to respond to sea level rise.

In the past, these reports have been used by other Pacific Islands “as a tool for negotiation,” Grecni said.

The report authors hoped it would help Micronesia in the same way.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/07/22/grassroots-action-could-address-climate-change-in-micronesia/feed/ 0 413778
Tracking https://www.radiofree.org/2023/07/20/tracking/ https://www.radiofree.org/2023/07/20/tracking/#respond Thu, 20 Jul 2023 14:46:23 +0000 https://dissidentvoice.org/?p=142286

Your Smartphone Is Worse Than a Spy in Your Pocket: Edward Snowden


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2023/07/20/tracking/feed/ 0 413228
“At What Point Does Profit Trump Safety?” Ex-National Cyber Director Presses Software Regulation Amid High-Profile Hacks https://www.radiofree.org/2023/07/19/at-what-point-does-profit-trump-safety-ex-national-cyber-director-presses-software-regulation-amid-high-profile-hacks/ https://www.radiofree.org/2023/07/19/at-what-point-does-profit-trump-safety-ex-national-cyber-director-presses-software-regulation-amid-high-profile-hacks/#respond Wed, 19 Jul 2023 10:00:00 +0000 https://www.propublica.org/article/cybersecurity-expert-software-regulation-amid-hacks by Renee Dudley

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

In 2019, hackers launched one of the largest cybersecurity attacks in U.S. history, eventually infiltrating various government agencies, as well as scores of private sector companies. The White House later attributed the attack, known as the SolarWinds hack, to Russia’s Foreign Intelligence Service. But as U.S. officials scrambled to respond to this spying, they realized they were missing key information: critical log files, the digital records of activity on users' computers.

The feature, which allows users to detect and investigate suspicious activity in their networks, is included in high-end Microsoft 365 plans but not in the basic version then used by some government agencies. Other agencies didn't retain sufficient log data over a long enough time frame. Had logging been more widely deployed, it might have tipped off officials to the intrusion sooner and enabled them to better investigate after it had been discovered.

Against this backdrop, President Biden nominated Chris Inglis to become the country’s first National Cyber Director. Inglis, a former National Security Agency official who began his career as a computer scientist, would go on to oversee the development of the administration’s National Cybersecurity Strategy. And as he and his team at the White House drafted that document, he kept returning to the SolarWinds hack. Known as a supply chain attack, this far-reaching breach started with compromised software that was used by many high-profile customers. “Everyone along that supply chain assumed that security was built in at the factory and sustained along the supply chain,” Inglis said of the SolarWinds attack. “We now know that wasn’t the case.”

The issue emerged again this month when some victims of a cyberattack linked to China were unable to detect the intrusion because they held basic Microsoft licenses rather than the premium ones that include logging. Hackers had exploited a flaw in Microsoft’s cloud computing service to break into about two dozen organizations globally, including the U.S. State Department.

These types of incidents reflect a larger trend, Inglis said: Computer users find themselves bearing a disproportionately large share of the burden of defending against cyberattacks. In response, the new strategy proposes shifting more of that burden to software makers themselves. Indeed, following the most recent cyberattack by Chinese hackers, Biden administration officials called on Microsoft last week to make security features like logging standard for all users.

Microsoft said it is engaging with the administration on the issue. “We are evaluating feedback and are open to other models,” a company spokesman said in a statement.

Although the Biden strategy, which was announced in March, is not binding, it represents a significant change in the government’s approach. Among its proposals: advancing legislation that would hold tech firms liable for data losses and harm caused by insecure products. Inglis, who stepped down from his role as director earlier this year, recently spoke with ProPublica about the national strategy document and the administration’s push to make technology providers do more to protect users from cyberattacks. The conversation has been edited for length and clarity.

The Biden administration is talking about regulating cybersecurity. What would that look like in practice?

If you look at regulation of cyberspace at the moment, it’s mostly focused on operators. It’s not focused on those who build the cloud or major pieces of software. Governments need to consult with the private sector to understand what’s critical in those systems. We can use regulatory authorities that exist already, whether it’s the Department of Commerce, the FCC, the Treasury Department. When something is life- or safety-critical, you get to a place where you have to actually specify those things that you say are not discretionary. We did this with drugs and therapeutics. We did this with transportation systems. We need to do the same thing in cyberspace.

I’m reminded of a book I’m sure you’re familiar with, “The Cuckoo’s Egg,” Cliff Stoll’s story about the sprawling intrusion into U.S. government and military computer systems in the 1980s. Eventually, the trail led to West German hackers paid by the Soviet Union’s intelligence service, the KGB. These issues are not exactly new. Why has regulation never come up in this conversation before?

Well, I think it’s been brought up, but two things prevented it. First, we’ve thought about the idea that security is something that the technologists, the innovators, would actually take care of. They’ve always been of the mind that they would take care of it when they get around to it. But they’re always on to the next new innovation. So they never get around to it. We never double back to essentially build something in that wasn’t there at the start.

Two, we worried that too much regulation will actually suppress innovation and deny us the full benefit of technology. We still need to think about that. But it turns out that innovation is not a free lunch. I won’t cite any particular sources, but if you’re a good business person, you want to avoid any unnecessary cost. And so you’re always going to point out the downside of regulation.

You have alluded in this discussion to making products secure by design — the concept, which also is a focus of the national strategy document, that security should be built into digital products. What are some examples of this?

It’s pretty straightforward: Are the software or hardware systems meeting security expectations under reasonably foreseeable conditions? We’ve done that with automobiles. We have airbags, we have seat belts, we have anti-lock brakes. So what are the basic cybersecurity features that should be there at the get-go? Multifactor authentication or some reasonable equivalent to that. Some degree of segmentation so that if something gets into your system, it doesn’t rapidly race across. An easy way to patch vulnerabilities. The magic in the middle of that is that the vendor actually says, ‘I will take that responsibility.’ As opposed to saying, ‘Let the buyer beware. I’ll sell you the basic version. But if you want security features, then I’ll sell you a package on top of that.’ That’s nonsense.

That sounds like the whole Microsoft licensing debate in the wake of the SolarWinds attack, where the government lacked logging, a key security feature.

That’s right. Now, if you have an extraordinary security situation — you’re in the darknet, or you’re doing business in places where there’s very little jurisdictional authority exercised by the local police forces or the diplomatic cadre — then you ought to expect to pay more. But if you’re just an ordinary consumer, security ought to come along, built in.

I’m wondering how things are going to move ahead with this, given what seems to be the historic corporate outlook. When Microsoft President Brad Smith testified before Congress in early 2021, then-Rep. Jim Langevin of Rhode Island questioned him about charging extra for logging. Smith replied, “We are a for-profit company. Everything we do is designed to generate a return.”

So is Ford Motor Co. So is Tesla. It’s a pretty simple formulation, which is: At what point does profit trump safety? And the answer is, there is some reasonable alignment of the two. You can’t have all of one and none of the other. The businesses have to be able to sustain themselves; profit needs to be in the bargain. But they cannot deploy technologies that they know to be injurious to the welfare, health and safety of their customers. That is simply not the way this society works. I just think that companies that deploy products that have a detrimental effect on their customers either will find themselves [improving security] through self-enlightenment or market forces, or they should expect that they will be compelled to do that.

We should be pro-business. But business over the interest of the customers that it serves is essentially a graveyard spiral. It’s a race to the bottom. And so this is yet another moment where you have to align the interest of business with the interest of consumers that they will serve.

Help Our Journalists Report Important Stories About the Technology Industry


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Renee Dudley.

]]>
https://www.radiofree.org/2023/07/19/at-what-point-does-profit-trump-safety-ex-national-cyber-director-presses-software-regulation-amid-high-profile-hacks/feed/ 0 412864
Pentagon Joins Elon Musk’s War Against Plane Tracking https://www.radiofree.org/2023/07/18/pentagon-joins-elon-musks-war-against-plane-tracking/ https://www.radiofree.org/2023/07/18/pentagon-joins-elon-musks-war-against-plane-tracking/#respond Tue, 18 Jul 2023 14:49:46 +0000 https://production.public.theintercept.cloud/?p=436252

A technology wish list circulated by the U.S. military’s elite Joint Special Operations Command suggests the country’s most secretive war-fighting component shares an anxiety with the world’s richest man: Too many people can see where they’re flying their planes.

The Joint Special Operations Air Component, responsible for ferrying commandos and their gear around the world, is seeking help keeping these flights out of the public eye through a “‘Big Data’ Analysis & Feedback Tool,” according to a procurement document obtained by The Intercept. The document is one of a series of periodic releases of lists of technologies that special operations units would like to see created by the private sector.

The listing specifically calls out the risk of social media “tail watchers” and other online observers who might identify a mystery plane as a military flight. According to the document, the Joint Special Operations Air Component needs software to “leverage historical and real-time data, such as the travel histories and details of specific aircraft with correlation to open-source information, social media, and flight reporting.”

Armed with this data, the tool would help the special operations gauge how much scrutiny a given plane has received in the past and how likely it is to be connected to them by prying eyes online.

“It just gives them better information on how to blend in. It’s like the police deciding to use the most common make of local car as an undercover car.”

Rather than providing the ability to fake or anonymize flight data, the tool seems to be aimed at letting sensitive military flights hide in plain sight. “It just gives them better information on how to blend in,” Scott Lowe, a longtime tail watcher and aviation photographer told The Intercept. “It’s like the police deciding to use the most common make of local car as an undercover car.”

While plane tracking has long been a niche hobby among aviation enthusiasts who enjoy cataloging the comings and goings of aircraft, the public availability of midair transponder data also affords journalists, researchers, and other observers an effective means of tracking the movements and activities of the world’s richest and most powerful. The aggregation and analysis of public flight data has shed light on CIA torture flights, movements of Russian oligarchs, and Google’s chummy relationship with NASA.

More recently, these sleuthing techniques gained international attention after they drew the ire of Elon Musk, the world’s richest man. After he purchased the social media giant Twitter, Musk banned an account that shared the movements of his private jet. Despite repeated promises to protect free speech — and a specific pledge to not ban the @ElonJet account — on the platform, Musk proceeded to censor anyone sharing his plane’s whereabouts, claiming the entirely legally obtained and fully public data amounted to “assassination coordinates.”

The Joint Special Operations Air Component’s desire for more discreet air travel, published six months after Musk’s jet data meltdown, is likely more firmly grounded in reality.

The Joint Special Operations Air Component provides a hypothetical scenario in which special forces need to travel with a “reduced profile” — that is to say, quietly — and use this tool.

“When determining if the planned movement is suitable and appropriate,” the procurement document says, “the ‘Aircraft Flight Profile Management Database Tool’ reveals that the aircraft is primarily associated with a distinctly different geographic area” — a frequent tip-off to civilian plane trackers that something interesting is afoot. “Additionally, ‘tail watchers’ have posted on social media pictures of the aircraft at various airfields. Based on the information available, the commander decides to utilize a different airframe for the mission. With the aircraft in flight, the tool is monitored for any indication of increased scrutiny or mission compromise.”

The request is part of a broad-ranging list of technologies sought by the Joint Special Operations Command, from advanced radios and portable blood pumps to drones that can fly months at a time. The 85-page list essentially advertises these technologies for private-sector contractors, who may be able to sell them to the Pentagon in the near future.

“What will be interesting is seeing how they change their operations after having this information.”

The document — marked unclassified but for “Further dissemination only as directed by the Office of the Secretary of Defense (OSD) Joint Capability and Technology Expo (JCTE) Team” — is part of an annual effort by Joint Special Operations Command to “inform and influence industry’s internal investment decisions in areas that address SOF’s most sensitive and urgent interest areas.”

The anti-plane-tracking tool fits into a broader pattern of the military attempting to minimize the visibility of its flights, according to Ian Servin, a pilot and plane-tracking enthusiast. In March, the military removed tail numbers and other identifying marks from its planes.

“What will be interesting is seeing how they change their operations after having this information,” Servin said. From a transparency standpoint, he added, “Those changes could be problematic or concerning.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/07/18/pentagon-joins-elon-musks-war-against-plane-tracking/feed/ 0 412574
Your next barbecue could feature an electric grill https://grist.org/energy/your-next-barbecue-could-feature-an-electric-grill/ https://grist.org/energy/your-next-barbecue-could-feature-an-electric-grill/#respond Sat, 15 Jul 2023 13:00:00 +0000 https://grist.org/?p=613120 This story was originally published by Canary Media and is republished with permission.

Mark Begansky loves his electric grill. This isn’t your indoor, panini-press-style electric grill; this is an outdoor grill fit for sumptuous summer cookouts on the Fourth of July. Begansky loves to cook mouthwatering kebabs and barbecue chicken, corn and asparagus, getting the edges crisp and making those characteristic sear marks where the food’s caramelized. The look, and, more importantly, the taste are ​“the same as what you’d get from a gas grill,” said Begansky, who works in the healthcare industry and lives in New Jersey.

Switching to an electric grill is a way to jettison yet one more foothold of the fossil fuel industry out of people’s homes and lives. Yet despite their climate advantages and on-par performance, electric grills haven’t yet broken into the public imagination in the U.S. Of grillers surveyed every two years from 2015 to 2021 by the Hearth, Patio & Barbecue Association, only 3 to 4 percent owned an electric grill.

Most people instead cook with grills that burn something: usually charcoal or fossil fuels, namely fossil gas (mostly methane, or CH4) or propane (C3H8). Grills that consume methane gas require owners to keep a gas line to their homes that they can run out to the grill. For propane grills, cooks purchase propane tanks and switch the gas connection every time the tank runs empty.

As carbon-based fuels, burning methane and propane releases planet-warming CO2 into the atmosphere. What’s worse, fossil gas lines that are fitted incorrectly can leak their methane, a greenhouse gas that’s shorter-lived than CO2 but has a climate impact that’s a striking 84 to 87 times more potent over a 20-year timeframe.

Instead of that pollution, Begansky’s choosing clean energy and electrifying his lifestyle — including, of course, his love for grilling. In 2019, Begansky signed on to an energy plan with 100 percent wind and solar through his utility, Jersey Central Power & Light. Since then, he’s switched to an electric vehicle, gotten a home energy audit and replaced his old propane Char-Broil grill last year with an electric Weber Q 2400. It plugs into a standard 120-volt outlet and ​“looks just like a regular grill,” he said. 

Begansky said he uses his electric grill once or twice a week when the weather’s warm. It’s perfect for his family of four, spacious with enough room to cook 12 burger patties at a time, and can heat up to 550˚F, albeit in about 20 minutes. Begansky is thrilled he doesn’t have to lug around a 37-pound propane tank anymore and can ditch the worries that come from using gas: that he might accidentally burn something down or run out of fuel when the chicken’s half done.

Mark Begansky says his electric grill works just as well as the gas version it replaced. Courtesy of Mark Begansky

The electric grill he bought was more expensive upfront — it’s currently listed for $399, whereas the comparable Weber Q 2200 propane gas grill costs $329. But the operating costs are lower. Begansky doesn’t have to spend $50-plus on propane for a summer of grilling, and, at the same time, said he hasn’t seen any increase in his electric bill. That fits what Weber, the best-selling U.S. grill maker, has found: that it only costs about 10 to 14 cents to run one of its electric grills for a 45-minute cooking session.

Though outdoor electric grills might sound obscure, manufacturers abound, including Char-Broil, Kenyon and George Foreman — maker of the 1990s’ wildly popular ​“lean, mean fat-reducing grilling machine.” For its part, Weber has been making electric grills since 1972 and today has three lines, including one launched just this February called the Lumin. And while electric grills may be less popular than gas grills, there are still — of course — many listicles weighing the strengths and weaknesses of the models available.

Electric grills match on flavor, take up less space

Despite electric grills’ small market share, sales are ticking upward. The market grew 21 percent from September 2021 to 2022, according to U.S. retail sales information from analytics firm Circana.

Still, despite growing interest and its new electric grill design, Weber plans to continue to sell gas and charcoal models, according to Director of Product Brian Atinaja. The company declined to share specific sales targets for its electric grills, but Atinaja said he thinks they will get a lot more popular in the U.S. — if they can overcome two big hurdles, that is.

First, few people know they exist. Second, those who do know about electric grilling think only of the small, indoor options that don’t deliver the ​“flavor experience that people associate with gas grills.”

But he (and enthusiasts like Begansky) claims electric can deliver that characteristic grilled goodness. What makes grilled food so delicious? With gas grills, Atinaja explained, it’s the food’s juices and grease falling into the flame, sizzling and vaporizing. Inside a closed grill, this smoky cloud bathes the food in flavor.

Electric grills can be tuned to create this flavor sauna too, according to Atinaja. Weber’s engineers, he said, have tweaked the electric grills’ designs in pursuit of this effect, including figuring out the grate spacings to let the right amount of juice drip onto the heating element and how fast to ventilate away the vaporized drippings so they don’t make the food too greasy.

And beyond matching on taste, electric grills tend to take up less space, Atinaja said, making them a better fit for people who live in dense cities or lack a backyard. And for families who live in apartment buildings or condos that don’t allow cooking on an open flame, electric might be the only way to grill. These reasons, along with more expensive fossil fuel costs, have in fact already made electric grills much more popular in Europe than in the U.S., according to Atinaja.

Still, electric grills can’t get as big as gas ones can, he noted. Electric versions are currently limited by an electrical outlet’s power. While a Weber Genesis gas grill can operate with an input of about 44,000 Btus per hour, a Weber electric grill drawing on a 120-volt socket can only pull an equivalent of 6,000 Btus per hour, according to Atinaja.

“Unless you use that power very efficiently, it’s not going to cook your food as you would expect it to. So that’s why we’ve focused on being super-efficient about the energy,” he said. Weber uses double-wall insulation on the top and the bottom of its newest electric grill to trap in the heat, he said.

But Weber is toying with additional solutions, including adding batteries. That’s a route some companies are already pursuing for induction stoves.

For Begansky, though, the difference in power isn’t an issue. As he sees it, the electric grill’s ease of operation and clear climate advantage outweigh its limitations. Plus, he underscored that electric grills deliver on arguably what matters most — flavor: ​“The food tastes just as good.”

This story was originally published by Grist with the headline Your next barbecue could feature an electric grill on Jul 15, 2023.


This content originally appeared on Grist and was authored by Alison F. Takemura, Canary Media.

]]>
https://grist.org/energy/your-next-barbecue-could-feature-an-electric-grill/feed/ 0 412050
EV sales hit record. So why do some experts predict a slowdown? https://grist.org/transportation/ev-sales-hit-record-so-why-do-some-experts-predict-a-slowdown/ https://grist.org/transportation/ev-sales-hit-record-so-why-do-some-experts-predict-a-slowdown/#respond Fri, 14 Jul 2023 17:30:00 +0000 https://grist.org/?p=613737 Electric vehicle sales in the United States set a record this past quarter and are on track to break the 1 million mark in 2023, which would be an unprecedented figure and a milestone for the industry. This surge comes even as many vehicle models have lost their eligibility for federal, and some state, incentives. 

Analysts at both Wards Intelligence and Cox Automotive reported that consumers bought nearly 300,000 EVs between the beginning of April and the end of June. That represents a year-over-year jump of roughly 50 percent, and included growth in May and June, the first two months after federal tax credit rules became more stringent. Plug-in hybrid sales climbed as well. 

“​​There are some vehicles that are intriguing enough to buyers that you don’t need a rebate,” Christie Schweinsberg, a sustainability analyst at Wards, said, noting the ever-increasing range of EVs and options for consumers to choose from. “People will still want to buy.”

But there are signs that the torrential pace of sales growth may not be sustainable. According to Cox, at the end of June dealers had, on average, about a 53 day supply of internal combustion vehicles in stock. The inventory runway for EVs, on the other hand, was more than double that. Overall, there were more than 92,000 electric vehicles available in the second quarter, compared to about 20,000 a year prior.

“The demand is not keeping up with production, which is the opposite story of a year ago,” Michelle Krebs, executive analyst at Cox Automotive, said about electric vehicles. “We call it the ‘Field of Dreams’ moment. Automakers are building more but not enough consumers have come to the field.”

Krebs attributes the glut to both a post-pandemic boost in production and traditional consumer hesitations about buying electric vehicles. Price, she said, is the primary barrier among buyers that Cox surveys, because EVs remain generally more expensive than a similar gas-powered model. Concerns about charging infrastructure is another reason that would-be-owners stay on the sidelines. 

The landscape for incentives on electric vehicles has become more confusing as well, said Krebs. At this time last year, dozens of models qualified for a federal tax credit of up to $7,500, with many cities and states offering additional incentives. Since then, some places, such as Oregon and New Jersey, have run out of money for their rebate programs. The Inflation Reduction Act that Congress passed last year established manufacturing standards aimed at encouraging automakers to invest in U.S. production facilities and battery supply chains. That legislation has, at least in the short-term, significantly trimmed the list of models eligible for a tax credit.  

“We certainly see an impact because of it,” said Michael Stewart, a spokesperson for Hyundai, which saw its vehicles, which don’t currently meet the new requirements, drop off the federal list. While sales of all of Hyundai’s EV models grew despite losing the credit, he believes that progress toward the company’s, and country’s, ambitious EV sales targets could have been even greater with them. 

Still, the Hyundai Kona and BMW i4, which also does not qualify for federal tax credits, saw sales nearly triple. Market leader Tesla benefited from having recently regained access to tax credits and saw a 76 percent jump in sales of its popular Model Y.

Companies have combated the gaining EV headwinds in part by lowering prices – the average cost of an electric vehicle has dropped almost 20 percent, to $53,438, in the last year alone. Manufacturers have also utilized a loophole in the Inflation Reduction Act that allows them to claim a credit on vehicles they lease rather than sell. Hyundai has been particularly aggressive about promoting leases, which Stewart says have gone from accounting for around 5 percent of the cars the company moves off the lot to about 30 percent. 

In the wake of the Inflation Reduction Act, Hyundai and other companies have announced plans to produce more electric vehicles in the United States and source more battery components domestically. This would make more models eligible for federal tax credits in the future. But, for now, both Schweinsberg and Krebs say the growing inventory indicates that the growth of electric vehicle sales could start to drop. 

One factor, said Schweinsberg, is that cars often see a decline in sales within a year or two of a new model being introduced – a threshold that some EVs are reaching. “Typically it does well when the new generation comes out,” she said, adding that it’s probably too early to tell exactly what the trajectory for electric vehicles might look like.

Krebs predicts that EV sales will continue to grow, though “maybe not at the pace that a lot of people had hoped for.” To her, that’s not necessarily surprising given the dramatic shift the industry is attempting to make. 

“It’s the biggest change in the industry since Henry Ford’s moving assembly line,” she said. “There are going to be bumps in the road.”

This story was originally published by Grist with the headline EV sales hit record. So why do some experts predict a slowdown? on Jul 14, 2023.


This content originally appeared on Grist and was authored by Tik Root.

]]>
https://grist.org/transportation/ev-sales-hit-record-so-why-do-some-experts-predict-a-slowdown/feed/ 0 411901
The French Revolution executed royals and nobles, yes – but most people killed were commoners https://www.radiofree.org/2023/07/14/the-french-revolution-executed-royals-and-nobles-yes-but-most-people-killed-were-commoners/ https://www.radiofree.org/2023/07/14/the-french-revolution-executed-royals-and-nobles-yes-but-most-people-killed-were-commoners/#respond Fri, 14 Jul 2023 04:45:50 +0000 https://asiapacificreport.nz/?p=90686 ANALYSIS: By Claire Rioult, Monash University and Romain Fathi, Flinders University

For a lot of people, mention of the French Revolution conjures up images of wealthy nobles being led to the guillotine.

Thanks to countless movies, books and half-remembered history lessons, many have been left with the impression the revolution was chiefly about chopping off the heads of kings, queens, dukes and other cashed-up aristocrats.

But today what’s known in English as Bastille Day and in French as Quatorze Juillet — a date commemorating events of July 14 in 1789 that came to symbolise the French Revolution — it is worth correcting this common misconception.

In fact, most people executed during the French Revolution — and particularly in its perceived bloodiest era, the nine-month “Reign of Terror” between autumn 1793 and summer 1794 — were commoners.

As historian Donald Greer wrote:

[…] more carters than princes were executed, more day labourers than dukes and marquises, three or four times as many servants than parliamentarians. The Terror swept French society from base to comb; its victims form a complete cross section of the social order of the Ancien régime.

The ‘national razor’
The guillotine was first put to use on April 15 1792 when a common thief called Pelletier was executed. Initially seen as an instrument of equality, however, the guillotine soon acquired a grim reputation for its list of famous victims.

Miniature guillotine, French revolution era,
Miniature guillotine, French revolution era, Musée Carnavalet. Image: Les musées de la ville de Paris/The Conversation

Among those who died under the “national razor” (the guillotine’s nickname) were King Louis XVI and Queen Marie Antoinette, many revolutionary leaders such as Georges Danton, Louis de Saint-Just and Maximilien Robespierre. Scientist Antoine Lavoisier, pre-romantic poet André Chénier, feminist Olympe de Gouges and legendary lovers Camille and Lucie Desmoulins were among its victims.

But it wasn’t just “celebrities” executed at the guillotine.

While reliable figures on the definitive number of people guillotined during the Revolution are hard to find, historians commonly project between 15,000 and 17,000 people were guillotined across France.

The bulk of it occurred during the the Reign of Terror.

When the decision was made to centralise all (legal) executions in Paris, 1376 people were guillotined over just 47 days, between June 10 and July 27, 1794. That is about 30 a day.

The bulk of the executions occurred during the the Reign of Terror.
The bulk of the executions occurred during the the Reign of Terror. Image: Bibliothèque nationale de France/The Conversation

The guillotine wasn’t the only method
However, the guillotine represents just one way people were executed.

Historians estimate around 20,000 men and women were summarily killed — either shot, stabbed or drowned — during the Terror across France.

They also estimate that in just under five days, 1500 people died at the hands of Parisian mobs during the 1792 September massacres.

More broadly, around 170,000 civilians died in the civil Wars of the Vendée, while more than 700,000 French soldiers lost their lives across the 1792-1815 period.

The vast majority of these people killed were ordinary French men and women, not members of the elite.

Overall, Greer estimates 8.5 percent of the Terror’s victims belonged to the nobility, 6.5 percent to the clergy, and 85 percent to the Third Estate (meaning non-clerics and non-nobles). Women represented 9 percent of the total (but 20 percent and 14 pecent of the noble and clerical categories, respectively).

Priests who had refused to take the oath of loyalty to the Revolution, émigrés who had fled the country, hoarders and profiteers who made the price of bread much dearer, or political opponents of the moment, all were deemed “enemies of the Revolution”.

Why was so much blood shed during the Reign of Terror?
The paranoia of the regime in 1793–94 was the result of various factors.

France fought at its borders against a coalition led by Europe’s monarchs to nip the revolution in the bud before it could threaten their thrones.

Meanwhile, civil war ravaged the west and south of France, conspiracy rumours circulated across the country, and political infighting intensified in Paris between opposing factions.

All these factors led to a series of laws voted up in late 1793 that enabled the expedited judgment of thousands of people suspected of counterrevolutionary beliefs.

The measures contained in the infamous “Law of Suspects” were, however, relaxed in the summer of 1794 and completely abolished in October 1795.

Queen Marie Antoinette led to her execution on a horse-cart on the 16th of October 1793.
The fate of Queen Marie-Antoinette and its many depictions in pop culture has influenced how many people think of the Revolution. Image: Aquatint with engraving by C. Silanio after Aloisin, 1793/Wellcome Collection/The Conversation

How the focus came to be on beheaded nobility
For many people, however, mention of this period of French history leads to the vision of a bloodthirsty Revolution indiscriminately sending to their death thousands of nobles.

This is largely influenced by the fate of Queen Marie-Antoinette and its many depictions in pop culture.

British counter-revolutionary propaganda in the 1790s and 1800s also helped popularise the idea that aristocrats were martyrs and the main victims of revolution executioners.

This representation was mostly forged via the abundant publication in the 19th century of memoirs and diaries of survivors and relatives of victims, usually from the social and economic elite fiercely opposed to the Revolution and its legacy.

A broader legacy
Beyond the guillotine and the Reign of Terror, the legacies of the revolution run far deeper.

The revolution abolished entrenched privileges based on birth, imposed equality before the law and opened the door to emerging forms of democratic involvement for everyday citizens.

The Revolution ushered in a time of reforms in France, across Europe and indeed across the world.The Conversation

Claire Rioult, is PhD candidate in early modern history, Monash University, and Dr Romain Fathi, senior lecturer, History, Flinders University.  This article is republished from The Conversation under a Creative Commons licence. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/07/14/the-french-revolution-executed-royals-and-nobles-yes-but-most-people-killed-were-commoners/feed/ 0 411792
The French Revolution executed royals and nobles, yes – but most people killed were commoners https://www.radiofree.org/2023/07/14/the-french-revolution-executed-royals-and-nobles-yes-but-most-people-killed-were-commoners-2/ https://www.radiofree.org/2023/07/14/the-french-revolution-executed-royals-and-nobles-yes-but-most-people-killed-were-commoners-2/#respond Fri, 14 Jul 2023 04:45:50 +0000 https://asiapacificreport.nz/?p=90686 ANALYSIS: By Claire Rioult, Monash University and Romain Fathi, Flinders University

For a lot of people, mention of the French Revolution conjures up images of wealthy nobles being led to the guillotine.

Thanks to countless movies, books and half-remembered history lessons, many have been left with the impression the revolution was chiefly about chopping off the heads of kings, queens, dukes and other cashed-up aristocrats.

But today what’s known in English as Bastille Day and in French as Quatorze Juillet — a date commemorating events of July 14 in 1789 that came to symbolise the French Revolution — it is worth correcting this common misconception.

In fact, most people executed during the French Revolution — and particularly in its perceived bloodiest era, the nine-month “Reign of Terror” between autumn 1793 and summer 1794 — were commoners.

As historian Donald Greer wrote:

[…] more carters than princes were executed, more day labourers than dukes and marquises, three or four times as many servants than parliamentarians. The Terror swept French society from base to comb; its victims form a complete cross section of the social order of the Ancien régime.

The ‘national razor’
The guillotine was first put to use on April 15 1792 when a common thief called Pelletier was executed. Initially seen as an instrument of equality, however, the guillotine soon acquired a grim reputation for its list of famous victims.

Miniature guillotine, French revolution era,
Miniature guillotine, French revolution era, Musée Carnavalet. Image: Les musées de la ville de Paris/The Conversation

Among those who died under the “national razor” (the guillotine’s nickname) were King Louis XVI and Queen Marie Antoinette, many revolutionary leaders such as Georges Danton, Louis de Saint-Just and Maximilien Robespierre. Scientist Antoine Lavoisier, pre-romantic poet André Chénier, feminist Olympe de Gouges and legendary lovers Camille and Lucie Desmoulins were among its victims.

But it wasn’t just “celebrities” executed at the guillotine.

While reliable figures on the definitive number of people guillotined during the Revolution are hard to find, historians commonly project between 15,000 and 17,000 people were guillotined across France.

The bulk of it occurred during the the Reign of Terror.

When the decision was made to centralise all (legal) executions in Paris, 1376 people were guillotined over just 47 days, between June 10 and July 27, 1794. That is about 30 a day.

The bulk of the executions occurred during the the Reign of Terror.
The bulk of the executions occurred during the the Reign of Terror. Image: Bibliothèque nationale de France/The Conversation

The guillotine wasn’t the only method
However, the guillotine represents just one way people were executed.

Historians estimate around 20,000 men and women were summarily killed — either shot, stabbed or drowned — during the Terror across France.

They also estimate that in just under five days, 1500 people died at the hands of Parisian mobs during the 1792 September massacres.

More broadly, around 170,000 civilians died in the civil Wars of the Vendée, while more than 700,000 French soldiers lost their lives across the 1792-1815 period.

The vast majority of these people killed were ordinary French men and women, not members of the elite.

Overall, Greer estimates 8.5 percent of the Terror’s victims belonged to the nobility, 6.5 percent to the clergy, and 85 percent to the Third Estate (meaning non-clerics and non-nobles). Women represented 9 percent of the total (but 20 percent and 14 pecent of the noble and clerical categories, respectively).

Priests who had refused to take the oath of loyalty to the Revolution, émigrés who had fled the country, hoarders and profiteers who made the price of bread much dearer, or political opponents of the moment, all were deemed “enemies of the Revolution”.

Why was so much blood shed during the Reign of Terror?
The paranoia of the regime in 1793–94 was the result of various factors.

France fought at its borders against a coalition led by Europe’s monarchs to nip the revolution in the bud before it could threaten their thrones.

Meanwhile, civil war ravaged the west and south of France, conspiracy rumours circulated across the country, and political infighting intensified in Paris between opposing factions.

All these factors led to a series of laws voted up in late 1793 that enabled the expedited judgment of thousands of people suspected of counterrevolutionary beliefs.

The measures contained in the infamous “Law of Suspects” were, however, relaxed in the summer of 1794 and completely abolished in October 1795.

Queen Marie Antoinette led to her execution on a horse-cart on the 16th of October 1793.
The fate of Queen Marie-Antoinette and its many depictions in pop culture has influenced how many people think of the Revolution. Image: Aquatint with engraving by C. Silanio after Aloisin, 1793/Wellcome Collection/The Conversation

How the focus came to be on beheaded nobility
For many people, however, mention of this period of French history leads to the vision of a bloodthirsty Revolution indiscriminately sending to their death thousands of nobles.

This is largely influenced by the fate of Queen Marie-Antoinette and its many depictions in pop culture.

British counter-revolutionary propaganda in the 1790s and 1800s also helped popularise the idea that aristocrats were martyrs and the main victims of revolution executioners.

This representation was mostly forged via the abundant publication in the 19th century of memoirs and diaries of survivors and relatives of victims, usually from the social and economic elite fiercely opposed to the Revolution and its legacy.

A broader legacy
Beyond the guillotine and the Reign of Terror, the legacies of the revolution run far deeper.

The revolution abolished entrenched privileges based on birth, imposed equality before the law and opened the door to emerging forms of democratic involvement for everyday citizens.

The Revolution ushered in a time of reforms in France, across Europe and indeed across the world.The Conversation

Claire Rioult, is PhD candidate in early modern history, Monash University, and Dr Romain Fathi, senior lecturer, History, Flinders University.  This article is republished from The Conversation under a Creative Commons licence. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/07/14/the-french-revolution-executed-royals-and-nobles-yes-but-most-people-killed-were-commoners-2/feed/ 0 411793
Right-Wing Websites Connected to Former Trump Lawyer Are Scamming Loyal Followers With Phony Celebrity Pitches https://www.radiofree.org/2023/07/10/right-wing-websites-connected-to-former-trump-lawyer-are-scamming-loyal-followers-with-phony-celebrity-pitches/ https://www.radiofree.org/2023/07/10/right-wing-websites-connected-to-former-trump-lawyer-are-scamming-loyal-followers-with-phony-celebrity-pitches/#respond Mon, 10 Jul 2023 04:00:00 +0000 https://www.propublica.org/article/right-wing-websites-scam-readers-phony-celebrity-pitches by Craig Silverman

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Oprah Winfrey looked upset.

The photo caught her midsentence, her left hand jabbing at the camera.

“They are twisting everything,” the TV icon was quoted as saying, under a red “BREAKING NEWS” banner.

The ad featuring the Winfrey image and quote ran on the conservative website DC Swamp Tales. It directed readers to a webpage that resembled a news article. The text spun a narrative about a television interviewer who unfairly berated Winfrey for promoting a revolutionary product that could “reverse Dementia instantly & for good.”

But there was no such dispute. Winfrey’s quote was fake, and her name and likeness were used without permission. The product, a low-dose, cannabis-derived gummy supplement, does not treat dementia, let alone reverse it.

“These ads are false. Oprah Winfrey does not have anything to do with these products,” Nicole Nichols, a spokesperson for Winfrey’s company Harpo Inc., told ProPublica.

Oprah Winfrey had nothing to do with this ad or the anti-dementia product it was touting, her spokesperson said. (Screenshot by ProPublica)

Such scam ads have proliferated on right-wing websites worldwide in the past eight months. They use fake endorsements from celebrities including Winfrey, country music singers Dolly Parton and Reba McEntire, Twitter and Tesla owner Elon Musk, actor Ryan Reynolds, Canadian prime minister Justin Trudeau and former German chancellor Gerhard Schröder to promote dubious medicines and cryptocurrency frauds. Conservative publishers make money from each click on a deceptive ad, exploiting their like-minded readers.

The ads were placed by AdStyle, an ad network whose corporate website lists it as being registered in Delaware with an office in Boca Raton, Florida. Its website said it is “trusted by” major brands including Toyota, Ikea, EA Games and L’Oréal. But Florida and Delaware corporate registries have no record of AdStyle, which appears to be operated by a Latvian couple living in Italy. Spokespeople for Toyota and Ikea said they could not find any records of those companies working with AdStyle. EA Games and L’Oréal did not respond to queries.

“These ads are certainly terrible,” said Kirsten Grenier Burnett, a spokesperson for McEntire. Spokespeople for Trudeau, Musk, Reynolds, Shröder and Parton either did not respond or declined to comment.

This month, after reporters contacted AdStyle, the “trusted by” assertion and the brand logos were removed from the company’s website.

Since November, reporters for ProPublica, Sweden’s Expressen newspaper, the Organized Crime and Corruption Reporting Project, and Paper Trail Media in Germany have viewed hundreds of AdStyle ads across scores of right-wing websites. The vast majority of the ads were outright scams or made seemingly exaggerated claims. “This 197-Year-Old Man’s Longevity Secret Makes Your Cells 4 TIMES Younger,” one pitch proclaimed.

AdStyle ads are often displayed on a network of more than a dozen U.S. conservative outlets connected to a lawyer whose clients have included former President Donald Trump. Advertisers pay AdStyle to show their ads to web users, and the company splits the revenue with its publisher partners. Its ads are easy to spot because they carry the AdStyle logo.

The prevalence of scam ads on AdStyle and its many partnerships with right-wing sites around the world exemplify how conservative publishers, politicians and operatives profit from fleecing their fellow right-wingers — and how some players take the strategy global. Even the editorially conservative National Review has acknowledged “the right’s grifter problem.”

Deceptive ads abound on Trump’s Truth Social network, while his former campaign chair Steve Bannon and other supporters face federal charges for running an alleged fraudulent donation scheme to build a privately funded border wall. (Bannon has pleaded not guilty to money laundering, fraud and conspiracy charges. Two other people have pleaded guilty.)

A recent New York Times investigation revealed how a group of conservative operatives had raised close to $100 million using robocalls that asked for money to help veterans and first responders. Only 1% of the money went to those causes. And this month ProPublica reported on an IRS whistleblower complaint alleging that leaders of 2020 election denialist nonprofit True the Vote had used donations for personal gain. True the Vote said the complaint was without merit.

Digital advertising has made it easy and lucrative to target people on the internet with scam ads and donation pitches. Besides AdStyle, other networks and social media platforms have carried scam ads. Earlier this month, Harpo filed two federal lawsuits against people and companies it said used Winfrey’s name and trademarks without permission to market weight loss and CBD gummies. Both cases are pending. Harpo did not sue AdStyle. Asked why, Winfrey’s company declined to comment.

It’s unclear who ultimately owns AdStyle and how much money it and its publisher partners earn from the scam ads. Ad networks like AdStyle act as a middleman by connecting advertisers with publishers. An advertiser signs up with a network, uploads the ads it wants to run, identifies the kind of people it wants to reach, and sets the price range it’s willing to pay each time someone views or clicks on an ad.

Meanwhile, the network signs deals with publishers to place ads on their websites in exchange for a share of the revenue. It’s unclear how AdStyle splits revenue with publishers, but ad networks typically take between 20% and 50% of the revenue generated.

Scam ads on DC Swamp Tales featured Elon Musk and Reba McEntire. (Screenshot by ProPublica)

In the U.S., AdStyle primarily works with right-wing sites operated by two companies, Saber Communications and Digital Communications LLC, located a few doors down from each other in Fredericksburg, Virginia.

The companies are owned by Andrew Coelho and Michael Rothfeld, political marketers with ties to former U.S. representative and presidential candidate Ron Paul and his son, Kentucky Sen. Rand Paul. Federal Election Commission records show Saber provided digital marketing services to Rand Paul and PACs that support him. Ron Paul’s 2012 presidential campaign paid Saber close to $8 million.

With names like Liberal Hack Watch, DC Dirt Sheet and DC Swamp Tales, most sites in the Saber/Digital Media Communications network publish content with a pro-Trump bent. Four other sites produce Christian content or travel and lifestyle advice for conservatives.

Through their websites, Rothfeld and Coelho collect the email addresses of American conservatives and target them with paid political and marketing messages.

“I am a professional junk mailer,” Rothfeld said in a 2012 talk to the Young Americans for Liberty National Convention, according to BuzzFeed News. “I am a professional telemarketer. I’m a professional spammer — like, a hundred million pieces of, emails a month. And I’m a professional negative campaigner. And I’m damn proud of all four.”

Until 2020, Digital Communications listed David Warrington as its registered agent. The Virginia-based Warrington was also the agent for at least seven now-defunct LLCs connected to websites in the Rothberg/Coelho network.

Warrington represented Trump in his dealings with the Jan. 6 congressional committee. His clients have also included Jessie Benton, a Texas political consultant convicted of illegally funneling money to Trump’s campaign on behalf of Roman Vasilenko, who has been described as a “Russian naval officer turned multilevel marketer.” Vasilenko, who was not charged, did not respond to requests for comment through his social media accounts.

Warrington said he represents Rothfeld, Coelho and their companies. He provided a statement from Saber about the AdStyle ads on its sites.

AdStyle is “by far our least active ad service, delivering less than 3% of total banner impressions on the sites we manage,” the statement said. “For the sites that still host their ads in low-priority positions, their ads currently generate an average of $11 per month per site.” He declined to comment further.

Rand Paul and the Trump campaign did not respond to requests for comment, nor did Ron Paul when he was contacted through his institute and social media accounts.

In Sweden, AdStyle works with Samnytt, one of the country’s leading far-right sites. In 2021, its publisher and political editor, Mats Dagerlind, was convicted in a Stockholm court of gross defamation against a Syrian-Swedish journalist for calling him a “jihadist undercover.” Dagerlind was fined about $2,800 plus court costs and given a suspended sentence. The site’s CEO is Kent Ekeroth, a politician affiliated with the Sweden Democrats, a nationalist party that pursues anti-immigration policies.

In a statement to the Expressen newspaper, Dagerlind said the site does not control the content of ads placed by AdStyle. “Due to political persecution from the establishment in Sweden, Samnytt has been blocked from using the more established ad exchanges,” he said. (Google Ads, for example, do not appear on Samnytt.)

In Germany, AdStyle places ads on far-right sites such as Journalistenwatch, which a previous ProPublica investigation identified as a source of false information.

“We don’t care because we think our readership is smart enough to not be scammed,” said Conny Axel Meier, a member of Journalistenwatch’s board and editorial team. “I don’t really care what advertising is going on. After all, we work with a lot of advertising partners. We don’t control the advertising, we don’t care, we can’t check them all.” He plans to continue working with AdStyle “as long as I don’t get a letter from a public prosecutor’s office,” he added.

The celebrities featured in the scam ads on these and other sites change depending on the location of the person viewing the ad. In Germany, scam ads featured Shröder and former tennis star Boris Becker. In Sweden, they used Stefan Persson, the majority owner of fast fashion retailer H&M and the country’s richest person. In each case, the ads placed by AdStyle sent readers to websites promoting fraudulent cryptocurrency investment schemes that can cause people to lose their life savings.

“These are 100% incorrect and false claims,” said Kristina Stenvinkel, a spokesperson for Persson’s family company. “It is very regrettable that there are people who fabricate and mislead by exploiting and using public figures for their own gain.”

On its LinkedIn page, AdStyle says it was founded in 2015 by “a small group of great minds in Boca Raton.” Its website gives an address there. But building management and a lessor of office space there said AdStyle isn’t a tenant.

AdStyle’s website said the company was “trusted by” major brands like Ikea and Toyota, both of which said they had no record of working with AdStyle. The logos were removed after journalists contacted AdStyle for comment. (Screenshot by ProPublica)

At least five profiles for current AdStyle employees on LinkedIn use headshots that exhibit characteristics of AI-generated images, such as mismatched earrings and unrealistic backgrounds. ProPublica could not find the employees in public records. One actual employee is Anna Bella Burjak, whose LinkedIn profile says she is the company’s director of business development.

Burjak is married to a web developer named Leonid Volinski, whose name appears in a domain registration linked to AdStyle. Originally from Latvia, the couple used to live in Israel but recently moved to a town roughly 60 miles from Venice, Italy.

When reporters visited the couple’s residence, Burjak and Volinski declined to comment. Within a day, AdStyle had removed the investment and dementia scam ads from the network, including the Winfrey ad.

“We have taken immediate action to reinforce our systems and processes, working diligently to enhance our ad approval mechanisms to better prevent the appearance of misleading or low-quality advertisements,” the company said in an unsigned email. “We are actively reviewing and refining our content moderation policies.”


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Craig Silverman.

]]>
https://www.radiofree.org/2023/07/10/right-wing-websites-connected-to-former-trump-lawyer-are-scamming-loyal-followers-with-phony-celebrity-pitches/feed/ 0 410495
Palestine a testing ground for Israeli ‘occupation war tech’, says author https://www.radiofree.org/2023/07/08/palestine-a-testing-ground-for-israeli-occupation-war-tech-says-author/ https://www.radiofree.org/2023/07/08/palestine-a-testing-ground-for-israeli-occupation-war-tech-says-author/#respond Sat, 08 Jul 2023 00:13:04 +0000 https://asiapacificreport.nz/?p=90535
Antony Loewenstein
Investigative journalist Antony Loewenstein . . . author of The Palestine Laboratory. Image: The author

Asia Pacific Report:
Locations
Monday, July 17: Christchurch
Public meeting, 7pm
Knox Centre, Cnr Bealey Avenue & Victoria street, Christchurch (books available)
https://www.facebook.com/events/813719740268177/

Tuesday, July 18: Wellington
7pm
St Andrews on the Terrace, 30 The Terrace (Unity Books will have a rep there)
https://www.facebook.com/events/644521054258279/

Wednesday, July 19: Hawkes Bay
8pm
Greenmeadows Community Hall, 83 Tait Drive, Napier
https://www.facebook.com/events/6474977775923813/

Thursday, July 20: Auckland
Public Meeting, 7pm
The Fickling Centre, 546 Mt Albert Road (The Women’s Bookshop will be at the meeting to sell books)
https://www.facebook.com/events/285795137317711/


TRT World News interviews Antony Loewenstein on this week’s Israeli attack on Jenin refugee camp.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/07/08/palestine-a-testing-ground-for-israeli-occupation-war-tech-says-author/feed/ 0 410339
FBI Hired Social Media Surveillance Firm That Labeled Black Lives Matter Organizers “Threat Actors” https://www.radiofree.org/2023/07/06/fbi-hired-social-media-surveillance-firm-that-labeled-black-lives-matter-organizers-threat-actors/ https://www.radiofree.org/2023/07/06/fbi-hired-social-media-surveillance-firm-that-labeled-black-lives-matter-organizers-threat-actors/#respond Thu, 06 Jul 2023 17:11:08 +0000 https://production.public.theintercept.cloud/?p=434224

The FBI’s primary tool for monitoring social media threats is the same contractor that labeled peaceful Black Lives Matter protest leaders DeRay McKesson and Johnetta Elzie as “threat actors” requiring “continuous monitoring” in 2015.

The contractor, ZeroFox, identified McKesson and Elzie as posing a “high severity” physical threat, despite including no evidence that McKesson or Elzie were suspected of criminal activity. “It’s been almost a decade since the referenced 2015 incident and in that time we have invested heavily in fine-tuning our collections, analysis and labeling of alerts,” Lexie Gunther, a spokesperson for ZeroFox, told The Intercept, “including the addition of a fully managed service that ensures human analysis of every alert that comes through the ZeroFox Platform to ensure we are only alerting customers to legitimate threats and are labeling those threats appropriately.”

The FBI, which declined to comment, hired ZeroFox in 2021, a fact referenced in the new 106-page Senate report about the intelligence community’s failure to anticipate the January 6, 2021, uprising at the U.S. Capitol. The June 27 report, produced by Democrats on the Senate Homeland Security Committee, shows the bureau’s broad authorities to surveil social media content — authorities the FBI previously denied it had, including before Congress. It also reveals the FBI’s reliance on outside companies to do much of the filtering for them.

The FBI’s $14 million contract to ZeroFox for “FBI social media alerting” replaced a similar contract with Dataminr, another firm with a history of scrutinizing racial justice movements. Dataminr, like ZeroFox, subjected the Black Lives Matter movement to web surveillance on behalf of the Minneapolis Police Department, previous reporting by The Intercept has shown. 

In testimony before the Senate in 2021, the FBI’s then-Assistant Director for Counterterrorism Jill Sanborn flatly denied that the FBI had the power to monitor social media discourse.

“So, the FBI does not monitor publicly available social media conversations?” asked Arizona Sen. Kyrsten Sinema. 

“Correct, ma’am. It’s not within our authorities,” Sanborn replied, citing First Amendment protections barring such activities. 

Sanborn’s statement was widely publicized at the time and cited as evidence that concerns about federal government involvement in social media were unfounded. But, as the Senate report stresses, Sanborn’s answer was false. 

“FBI leadership mischaracterized the Bureau’s authorities to monitor social media,” the report concludes, calling it an “exaggeration of the limits on FBI’s authorities,” which in fact are quite broad.

It is under these authorities that the FBI sifts through vast amounts of social media content searching for threats, the report reveals.

“Prior to 2021, FBI contracted with the company Dataminr that used pre-defined search terms to identify potential threats from voluminous open-source posts online, which FBI could then investigate further as appropriate,” the report states, citing internal FBI communications obtained as part of the committee’s investigation. “Effective Jan. 1, 2021, FBI’s contract for these services switched to a new company called ZeroFox that would perform similar functions under a new system.”

The FBI has maintained that its “intent is not to ‘scrape’ or otherwise monitor individual social media activity,” instead insisting that it “seeks to identify an immediate alerting capability to better enable the FBI to quickly respond to ongoing national security and public safety-related incidents.” Dataminr has also previously told The Intercept that its software “does not provide any government customers with the ability to target, monitor or profile social media users, perform geospatial, link or network analysis, or conduct any form of surveillance.” 

While it may be technically true that flagging social media posts based on keywords isn’t the same as continuously flagging posts from a specific account, the notion that this doesn’t amount to monitoring specific users is misleading. If an account is routinely using certain keywords (e.g. #BlackLivesMatter), flagging those keywords would surface the same accounts repeatedly.

The 2015 threat report for which ZeroFox was criticized specifically called for “continuous monitoring” of McKesson and Elzie. In an interview with The Intercept, Elzie stressed how incompetent the FBI’s analysis of social media was in her situation. She described a visit the FBI paid her parents in 2016, telling them that it was imperative she not attend the Republican National Convention in Cleveland — an event she says she had no intention of attending and which troll accounts on Twitter bearing her name claimed she would be at to foment violence. (The FBI confirmed that it was “reaching out to people to request their assistance in helping our community host a safe and secure convention,” but did not respond to allegations that they were trying to discourage activists from attending the convention.)

“My parents were like why would she be going to the RNC? And that’s where the conversation ended because they couldn’t answer that.”

“I don’t think [ZeroFox] should be getting $14 million dollars [from] the same FBI that knocked on my family’s door [in Missouri] and looked for me when it was world news that I was in Baton Rouge at the time,” Elzie told The Intercept. “They’re just very unserious, both organizations.”

The FBI was so dependent on automated social media monitoring for ascertaining threats that the temporary loss of access to such software led to panic by bureau officials.

“This investigation found that FBI’s efforts to effectively detect threats on social media in the lead-up to January 6th were hampered by the Bureau’s change in contracts mere days before the attack,” the report says. “Internal FBI communications obtained by the Committee show how that transition caused confusion and concern as the Bureau’s open-source monitoring capabilities were degraded less than a week before January 6th.” 

One of the FBI communications obtained by the committee was an email from an FBI official at the Washington Field Office, lamenting the loss of Dataminr, which the official deemed “crucial.”

“Their key term search allows Intel to enter terms we are interested in without having to constantly monitor social media as we’ll receive notification alerts when a social media posts [sic] hits on one of our key terms,” the FBI official said.

“The amount of time saved combing through endless streams of social media is spent liaising with partners and collaborating and supporting operations,” the email continued. “We will lose this time if we do not have a social media tool and will revert to scrolling through social media looking for concerning posts.”

But civil libertarians have routinely cautioned against the use of automated social media surveillance tools not just because they place nonviolent, constitutionally protected speech under suspicion, but also for their potential to draw undue scrutiny to posts that represent no threat whatsoever. 

While tools like ZeroFox and Dataminr may indeed spare FBI analysts from poring over timelines, the company’s in-house definition of what posts are relevant or constitute a “threat” can be immensely broad. Dataminr has monitored the social media usage of people and communities of color based on law enforcement biases and stereotypes

A May report by The Intercept also revealed that the U.S. Marshals Service’s contract with Dataminr had the company relaying not only information about peaceful abortion rights protests, but also web content that had no apparent law enforcement relevance whatsoever, including criticism of the Met Gala and jokes about Donald Trump’s weight.

The FBI email closes noting that “Dataminr is user friendly and does not require an expertise in social media exploitation.” But that same user-friendliness can lead government agencies to rely heavily on the company’s designations of what is important or what constitutes a threat. 

The dependence is mutual. In its Securities and Exchange Commission filing, ZeroFox says that “one U.S. government customer accounts for a substantial portion” of its revenue.

Additional reporting by Sam Biddle.

Join The Conversation


This content originally appeared on The Intercept and was authored by Ken Klippenstein.

]]>
https://www.radiofree.org/2023/07/06/fbi-hired-social-media-surveillance-firm-that-labeled-black-lives-matter-organizers-threat-actors/feed/ 0 409883
The overlooked climate consequences of AI https://grist.org/technology/the-overlooked-climate-consequences-of-ai/ https://grist.org/technology/the-overlooked-climate-consequences-of-ai/#respond Thu, 06 Jul 2023 10:45:00 +0000 https://grist.org/?p=613013 This story was published in partnership with The Markup, a nonprofit, investigative newsroom that challenges technology to serve the public good. Sign up for its newsletters here.

“Something’s fishy,” declared a March newsletter from the right-wing, fossil fuel-funded think tank Texas Public Policy Foundation. The caption looms under an imposing image of a stranded whale on a beach, with three huge offshore wind turbines in the background. 

Something truly was fishy about that image. It’s not because offshore wind causes whale deaths, a groundless conspiracy pushed by fossil fuel interests that the image attempts to bolster. It’s because, as Gizmodo writer Molly Taft reported, the photo was fabricated using artificial intelligence. Along with eerily pixelated sand, oddly curved beach debris, and mistakenly fused together wind turbine blades, the picture also retains a tell-tale rainbow watermark from the artificially intelligent image generator DALL-E. 

DALL-E is one of countless AI models that have risen to otherworldly levels of popularity, particularly in the last year. But as hundreds of millions of users marvel at AI’s ability to produce novel images and believable text, the current wave of hype has concealed how AI could be hindering our ability to make progress on climate change.  

Advocates argue that these impacts — which include vast carbon emissions associated with the electricity needed to run the models, a pervasive use of AI in the oil and gas industry to boost fossil fuel extraction, and a worrying uptick in the output of misinformation — are flying under the radar. While many prominent researchers and investors have stoked fears around AI’s “godlike” technological force or potential to end civilization, a slew of real-world consequences aren’t getting the attention they deserve. 

Many of these harms extend far beyond climate issues, including algorithmic racism, copyright infringement, and exploitative working conditions for data workers who help develop AI models. “We see technology as an inevitability and don’t think about shaping it with societal impacts in mind,” David Rolnick, a computer science professor at McGill University and a co-founder of the nonprofit Climate Change AI, told Grist.

But the effects of AI, including its impact on our climate and efforts to curtail climate change, are anything but inevitable. Experts say we can and should confront these harms — but first, we need to understand them.

Large AI models produce an unknown amount of emissions

At its core, AI is essentially “a marketing term,” the Federal Trade Commission stated back in February. There is no absolute definition for what an AI technology is. But usually, as Amba Kak, the executive director of the AI Now Institute, describes, AI refers to algorithms that process large amounts of data to perform tasks like generating text or images, making predictions, or calculating scores and rankings. 

That higher computational capacity means large AI models gobble up large quantities of computing power in its development and use. Take ChatGPT, for instance, the OpenAI chatbot that has gone viral for producing convincing, human-like text. Researchers estimated that the training of ChatGPT-3, the predecessor to this year’s GPT-4, emitted 552 tons of carbon dioxide equivalent — equal to more than three round-trip flights between San Francisco and New York. Total emissions are likely much higher, since that number only accounts for training ChatGPT-3 one time through. In practice, models can be retrained thousands of times while they are being built. 

OpenAI CEO Sam Altman speaks at Keio University in Tokyo, Japan, on June 12. Tomohiro Ohsumi / Getty Images

The estimate also does not include energy consumed when ChatGPT is used by approximately 13 million people each day. Researchers highlight that actually using a trained model can make up 90 percent of energy use associated with an AI machine learning model. And the newest version of ChatGPT, GPT-4, likely requires far more computing power because it is a much larger model.

No clear data exists on exactly how many emissions result from the use of large AI models by billions of users. But researchers at Google found that total energy use from machine learning AI models accounts for about 15 percent of the company’s total energy use. Bloomberg reports that amount would equal 2.3 terawatt-hours annually — roughly as much electricity used by homes in a city the size of Atlanta in a year.

The lack of transparency from companies behind AI products like Microsoft, Google, and OpenAI means that the total amount of power and emissions involved in AI technology is unknown. For instance, OpenAI has not disclosed what data was fed into this year’s ChatGPT-4 model, how much computing power was used, or how the chatbot was changed. 

“We’re talking about ChatGPT and we know nothing about it,” Sasha Luccioni, a researcher who has studied AI models’ carbon footprints, told Bloomberg. “It could be three raccoons in a trench coat.”

AI fuels climate misinformation online

AI could also fundamentally shift the way we consume — and trust — information online. The UK nonprofit Center for Countering Digital Hate tested Google’s Bard chatbot and found it capable of producing harmful and false narratives around topics like COVID-19, racism, and climate change. For instance, Bard told one user, “There is nothing we can do to stop climate change, so there is no point in worrying about it.”

The ability of chatbots to spout misinformation is baked into their design, according to Rolnick. “Large language models are designed to create text that looks good rather than being actually true,” he said. “The goal is to match the style of human language rather than being grounded in facts” — a tendency that “lends itself perfectly to the creation of misinformation.” 

Google, OpenAI, and other large tech companies usually try to address content issues as these models are deployed live. But these efforts often amount to “papered over” solutions, Rolnick says. “Testing their content more deeply, one finds these biases deeply encoded in much more insidious and subtle ways that haven’t been patched by the companies deploying the algorithms,” he said.

Giulio Corsi, a researcher at the U.K.-based Leverhulme Centre for the Future of Intelligence who studies climate misinformation, says an even bigger concern is AI-generated images. Unlike text produced on an individual scale through a chatbot, images can “spread very quickly and break the sense of trust in what we see,” he said. “If people start doubting what they see in a consistent way, I think that’s pretty concerning behavior.”

Climate misinformation existed long before AI tools. But now, groups like the Texas Public Policy Foundation have a new weapon in their arsenal to launch attacks against renewable energy and climate policies — and the fishy whale image indicates that they’re already using it.

A view of the Google office in London, U.K., in May. Steve Taylor / SOPA Images / LightRocket via Getty Images

AI’s climate impacts depend on who’s using it, and how

Researchers emphasize that AI’s real-world effects aren’t predetermined — they depend on the intentions, and actions, of the people developing and using it. As Corsi puts it, AI can be used “as both a positive and negative force” when it comes to climate change.

For example, AI is already used by climate scientists to further their research. By combing through huge amounts of data, AI can help create climate models, analyze satellite imagery to target deforestation, and forecast weather more accurately. AI systems can also help improve the performance of solar panels, monitor emissions from energy production, and optimize cooling and heating systems, among other applications

At the same time, AI is also used extensively by the oil and gas sector to boost the production of fossil fuels. Despite touting net-zero climate targets, Microsoft, Google, and Amazon have all come under fire for their lucrative cloud computing and AI software contracts with oil and gas companies including ExxonMobil, Schlumberger, Shell, and Chevron. 

A 2020 report by Greenpeace found that these contracts exist at every phase of oil and gas operations. Fossil fuel companies use AI technologies to ingest massive amounts of data to locate oil and gas deposits and create efficiencies across the entire supply chain, from drilling to shipping to storing to refining. AI analytics and modeling could generate up to $425 billion in added revenue for the oil and gas sector between 2016 and 2025, according to the consulting firm Accenture.

AI’s application in the oil and gas sector is “quite unambiguously serving to increase global greenhouse gas emissions by outcompeting low-carbon energy sources,” said Rolnick. 

Google spokesperson Ted Ladd told Grist that while the company still holds active cloud computing contracts with oil and gas companies, Google does not currently build custom AI algorithms to facilitate oil and gas extraction. Amazon spokesperson Scott LaBelle emphasized that Amazon’s AI software contracts with oil and gas companies focus on making “their legacy businesses less carbon intensive,” while Microsoft representative Emma Detwiler told Grist that Microsoft provides advanced software technologies to oil and gas companies that have committed to net-zero emissions targets.  

EU commissioners Margrethe Vestager and Thierry Breton at a press conference on AI and digital technologies in 2020 in Brussels, Belgium. Thierry Monasse / Getty Images

There are currently no major policies to regulate AI

When it comes to how AI can be used, it’s “the Wild West,” as Corsi puts it. The lack of regulation is particularly alarming when you consider the scale at which AI is deployed, he added. Facebook, which uses AI to recommend posts and products, boasts nearly 3 billion users. “There’s nothing that you could do at that scale without any oversight,” Corsi said — except AI. 

In response, advocacy groups such as Public Citizen and the AI Now Institute have called for the tech companies responsible for these AI products to be held accountable for AI’s harms. Rather than relying on the public and policymakers to investigate and find solutions for AI’s harms after the fact, AI Now’s 2023 Landscape report calls for governments to “place the burden on companies to affirmatively demonstrate that they are not doing harm.” Advocates and AI researchers also call for greater transparency and reporting requirements on the design, data use, energy usage, and emissions footprint of AI models.

Meanwhile, policymakers are gradually coming up to speed on AI governance. In mid-June, the European Parliament approved draft rules for the world’s first law to regulate the technology. The upcoming AI Act, which likely won’t be implemented for another two years, will regulate AI technologies according to their level of perceived risk to society. The draft text bans facial recognition technology in public spaces, prohibits generative language models like ChatGPT from using any copyrighted material, and requires AI models to label their content as AI-generated. 

Advocates hope that the upcoming law is only the first step to holding companies accountable for AI’s harms. “These things are causing problems now,” said Rick Claypool, research director for Public Citizen. “And why they’re causing problems now is because of the way they are being used by humans to further human agendas.”

This story was originally published by Grist with the headline The overlooked climate consequences of AI on Jul 6, 2023.


This content originally appeared on Grist and was authored by Akielly Hu.

]]>
https://grist.org/technology/the-overlooked-climate-consequences-of-ai/feed/ 0 409755
Hackers already infiltrate EV chargers. It could only get worse https://grist.org/technology/hackers-already-infiltrate-ev-chargers-it-could-only-get-worse/ https://grist.org/technology/hackers-already-infiltrate-ev-chargers-it-could-only-get-worse/#respond Wed, 05 Jul 2023 10:30:00 +0000 https://grist.org/?p=612920 This story was co-published with WIRED.

With his electric Kia EV6 running low on power, Sky Malcolm pulled into a bank of fast-chargers near Terre Haute, Indiana, to plug in. As his car powered up, he peeked at nearby chargers. One in particular stood out.

Instead of the businesslike welcome screen displayed on the other Electrify America units, this one featured a picture of President Biden pointing his finger, with an “I did that!” caption. It was the same meme the president’s critics started slapping on gas pumps as prices soared last year, cloned 20 times across the screen. 

“It was, unfortunately, not terribly surprising,” Malcolm said of the hack, which he stumbled upon last fall. Such shenanigans are increasingly common. At the beginning of the war in Ukraine, hackers tweaked charging stations along the Moscow–Saint Petersburg motorway in Russia to greet users with anti-Putin messages. Around the same time, cyber-vandals in England programmed public chargers to broadcast pornography. Just this year, the hosts of YouTube channel The Kilowatts tweeted a video showing it was possible to take control of an Electrify America station’s operating system. 

While such breaches have so far remained relatively innocuous, cybersecurity experts say the consequences would be far more severe at the hands of truly nefarious miscreants. As companies, governments and consumers sprint to install more chargers, the risks could only grow.

In recent years, security researchers and white-hat hackers have identified sprawling vulnerabilities in internet-connected home and public charging hardware that could expose customer data, compromise wi-fi networks, and, in a worst-case scenario, bring down power grids. Given the dangers, everyone from device manufacturers to the Biden administration is rushing to fortify these increasingly common machines and establish security standards.

“This is a major problem,” said Jay Johnson, a cybersecurity researcher at Sandia National Laboratories. “It is potentially a very catastrophic situation for this country if we don’t get this right.”

Chinks in EV charger security aren’t hard to find. Johnson and his colleagues summarized known shortcomings in a paper published last fall in the journal Energies. They found everything from the possibility of hackers being able to track users to vulnerabilities that “may expose home and corporate [Wi-Fi] networks to a breach.” Another study, led by Concordia University and published last year in the journal Computers & Security, highlighted more than a dozen classes of “severe vulnerabilities,” including the ability to turn chargers on and off remotely, as well as deploy malware.


When British security research firm Pen Test Partners spent 18 months analyzing seven popular EV charger models, it found five had critical flaws. For instance, it identified a software bug in the popular Chargepoint network that hackers could likely exploit to obtain sensitive user information (the team stopped digging before acquiring such data). A charger sold in the UK by Project EV allowed researchers to overwrite its firmware. 

Such cracks could conceivably permit hackers to access vehicle data or consumers’ credit card information, said Ken Munro, a co-founder of Pen Test Partners. But perhaps the most worrying weakness to him was that, as with the Concordia testing, his team discovered that many of the devices allowed hackers to stop or start charging at will. That could leave frustrated drivers without a full battery when they need one, but it’s the cumulative impacts that could be truly devastating.

A woman in a tan coat plugs a charger into her electric vehicle, which is parked on the street outside her home in Berkeley, California
Cybersecurity experts say one of the best ways to ensure the security of your home EV charger is to skip connecting it to the internet. Paul Chinn/The San Francisco Chronicle via Getty Images

“It’s not about your charger, it’s about everyone’s charger at the same time,” he said. Many home users leave their cars connected to chargers even if they aren’t drawing power. They might, for example, plug in after work and schedule the vehicle to charge overnight when prices are lower. If a hacker were to switch thousands, or millions, of chargers on or off simultaneously, it could destabilize and even bring down entire electricity networks.

“We’ve inadvertently created a weapon that nation states can use against our power grid,” said Munro. The United States glimpsed what such an attack might look like in 2021 when hackers hijacked Colonial Pipeline and disrupted gasoline supplies nationwide. The attack ended once the company paid millions of dollars in ransom. 

Munro’s top recommendation for consumers is to not connect their home chargers to the internet, which should prevent the exploitation of most vulnerabilities. The bulk of safeguards, however, must come from manufacturers.

“It’s the responsibility of the companies offering these services to make sure they are secure,” said Jacob Hoffman-Andrews, senior staff technologist at the Electronic Frontier Foundation, a digital rights nonprofit. “To some degree you have to trust the device you’re plugging into.”

Electrify America declined an interview request. With regard to the issues Malcolm and the Kilowatts documented, spokesperson Octavio Navarro wrote in an email that the incidents were isolated and the fixes were quickly deployed.” In a statement, the company said, “Electrify America is constantly monitoring and reinforcing measures to protect ourselves and our customers and focusing on risk-mitigating station and network design.”

Pen Test Partners wrote in its findings that companies were by and large responsive to fixing the vulnerabilities it identified, with ChargePoint and others plugging gaps in less than 24 hours (though one company created a new hole while trying to patch the old one). Project EV did not respond to Pen Test Partners but did eventually implement “strong authentication and authorisation.” Experts, however, argue that it’s far past time for the industry to move beyond this whack-a-mole approach to cybersecurity. 

“Everybody knows this is an issue and lots of people are trying to figure out how to best solve it,” said Johnson, adding that he has seen progress. For example, many public EV charging stations have upgraded to more secure methods of transmitting data. But as for a coordinated set of standards, he said, “there’s not much regulation out there.”

There has been some movement toward changing that. The 2021 Bipartisan Infrastructure Law included some $7.5 billion to expand the electric vehicle charging network across the U.S., and the Biden administration has made cybersecurity part of that initiative. Last fall, the White House convened manufacturers and policymakers to discuss a path toward ensuring that increasingly vital electric vehicle charging hardware is properly protected.

Earlier this year the Federal Highway Administration finalized a rule that will require all states to implement cybersecurity standards for any charger installed under the 2021 Bipartisan Infrastructure Law. Santiago Mejia/The San Francisco Chronicle via Getty Images

“Our critical infrastructure needs to meet a baseline level of security and resilience,” said Harry Krejsa, chief strategist at the White House Office of the National Cyber Director. He also argued that bolstering EV cybersecurity is as much about building trust as it is mitigating risk. Secure systems, he said, “give us the confidence in our next-generation digital foundations to aim higher than we possibly could have otherwise.”

Earlier this year the Federal Highway Administration finalized a rule requiring states to implement “appropriate” cybersecurity strategies for chargers funded under the infrastructure law. But Johnson says the regulation omits devices installed outside that expansion, not to mention the more than 100,000 units already in place nationwide. Plus, he said, states haven’t offered much detail about what they’ll do. “If you drill down into the state plans, you’ll find that they are actually extremely light on cyber requirements,” he said. “The vast majority that I saw just say they will follow best practices.”

Just what constitutes best practice remains ill-defined. Johnson and his colleagues at Sandia published recommendations for charger manufacturers, and he noted that the National Institute of Standards and Technology is developing a framework for fast-charging that could help shape future regulation. But, ultimately, he would like to see something akin to the 2022 Protecting and Transforming Cyber Health Care Act that’s geared toward electric vehicles.

“Regulation is a way to drive the entire industry to improve their baseline security standards,” he said, pointing to recent laws in other countries as models or starting points for policymakers in the United States. Last year, for instance, the United Kingdom rolled out a host of requirements for EV chargers, such as enhanced encryption and authentication standards, tamper detection alerts and randomized delay functionality. 

The latter means that a charger must be able to turn on and off with a random time delay of up to 10 minutes. That would mitigate the impact of all the chargers in an area coming online simultaneously after a power outage or hack. “You don’t get that spike, which is great,” said Munro. “It removes the threat from the power grid.”

Johnson is optimistic that the industry is moving in the right direction, albeit more slowly than is ideal. “I can’t imagine [stricter standards] won’t happen. It’s just taking a long time,” he said. And he certainly doesn’t want to spark undue alarm, but rather apply steady pressure for improvement. 

“It’s scary stuff,” he said, “but it shouldn’t be fear mongering.”

This story was originally published by Grist with the headline Hackers already infiltrate EV chargers. It could only get worse on Jul 5, 2023.


This content originally appeared on Grist and was authored by Tik Root.

]]>
https://grist.org/technology/hackers-already-infiltrate-ev-chargers-it-could-only-get-worse/feed/ 0 409450
Hackers already infiltrate EV chargers. It could only get worse https://grist.org/technology/hackers-already-infiltrate-ev-chargers-it-could-only-get-worse/ https://grist.org/technology/hackers-already-infiltrate-ev-chargers-it-could-only-get-worse/#respond Wed, 05 Jul 2023 10:30:00 +0000 https://grist.org/?p=612920 This story was co-published with WIRED.

With his electric Kia EV6 running low on power, Sky Malcolm pulled into a bank of fast-chargers near Terre Haute, Indiana, to plug in. As his car powered up, he peeked at nearby chargers. One in particular stood out.

Instead of the businesslike welcome screen displayed on the other Electrify America units, this one featured a picture of President Biden pointing his finger, with an “I did that!” caption. It was the same meme the president’s critics started slapping on gas pumps as prices soared last year, cloned 20 times across the screen. 

“It was, unfortunately, not terribly surprising,” Malcolm said of the hack, which he stumbled upon last fall. Such shenanigans are increasingly common. At the beginning of the war in Ukraine, hackers tweaked charging stations along the Moscow–Saint Petersburg motorway in Russia to greet users with anti-Putin messages. Around the same time, cyber-vandals in England programmed public chargers to broadcast pornography. Just this year, the hosts of YouTube channel The Kilowatts tweeted a video showing it was possible to take control of an Electrify America station’s operating system. 

While such breaches have so far remained relatively innocuous, cybersecurity experts say the consequences would be far more severe at the hands of truly nefarious miscreants. As companies, governments and consumers sprint to install more chargers, the risks could only grow.

In recent years, security researchers and white-hat hackers have identified sprawling vulnerabilities in internet-connected home and public charging hardware that could expose customer data, compromise wi-fi networks, and, in a worst-case scenario, bring down power grids. Given the dangers, everyone from device manufacturers to the Biden administration is rushing to fortify these increasingly common machines and establish security standards.

“This is a major problem,” said Jay Johnson, a cybersecurity researcher at Sandia National Laboratories. “It is potentially a very catastrophic situation for this country if we don’t get this right.”

Chinks in EV charger security aren’t hard to find. Johnson and his colleagues summarized known shortcomings in a paper published last fall in the journal Energies. They found everything from the possibility of hackers being able to track users to vulnerabilities that “may expose home and corporate [Wi-Fi] networks to a breach.” Another study, led by Concordia University and published last year in the journal Computers & Security, highlighted more than a dozen classes of “severe vulnerabilities,” including the ability to turn chargers on and off remotely, as well as deploy malware.


When British security research firm Pen Test Partners spent 18 months analyzing seven popular EV charger models, it found five had critical flaws. For instance, it identified a software bug in the popular Chargepoint network that hackers could likely exploit to obtain sensitive user information (the team stopped digging before acquiring such data). A charger sold in the UK by Project EV allowed researchers to overwrite its firmware. 

Such cracks could conceivably permit hackers to access vehicle data or consumers’ credit card information, said Ken Munro, a co-founder of Pen Test Partners. But perhaps the most worrying weakness to him was that, as with the Concordia testing, his team discovered that many of the devices allowed hackers to stop or start charging at will. That could leave frustrated drivers without a full battery when they need one, but it’s the cumulative impacts that could be truly devastating.

A woman in a tan coat plugs a charger into her electric vehicle, which is parked on the street outside her home in Berkeley, California
Cybersecurity experts say one of the best ways to ensure the security of your home EV charger is to skip connecting it to the internet. Paul Chinn/The San Francisco Chronicle via Getty Images

“It’s not about your charger, it’s about everyone’s charger at the same time,” he said. Many home users leave their cars connected to chargers even if they aren’t drawing power. They might, for example, plug in after work and schedule the vehicle to charge overnight when prices are lower. If a hacker were to switch thousands, or millions, of chargers on or off simultaneously, it could destabilize and even bring down entire electricity networks.

“We’ve inadvertently created a weapon that nation states can use against our power grid,” said Munro. The United States glimpsed what such an attack might look like in 2021 when hackers hijacked Colonial Pipeline and disrupted gasoline supplies nationwide. The attack ended once the company paid millions of dollars in ransom. 

Munro’s top recommendation for consumers is to not connect their home chargers to the internet, which should prevent the exploitation of most vulnerabilities. The bulk of safeguards, however, must come from manufacturers.

“It’s the responsibility of the companies offering these services to make sure they are secure,” said Jacob Hoffman-Andrews, senior staff technologist at the Electronic Frontier Foundation, a digital rights nonprofit. “To some degree you have to trust the device you’re plugging into.”

Electrify America declined an interview request. With regard to the issues Malcolm and the Kilowatts documented, spokesperson Octavio Navarro wrote in an email that the incidents were isolated and the fixes were quickly deployed.” In a statement, the company said, “Electrify America is constantly monitoring and reinforcing measures to protect ourselves and our customers and focusing on risk-mitigating station and network design.”

Pen Test Partners wrote in its findings that companies were by and large responsive to fixing the vulnerabilities it identified, with ChargePoint and others plugging gaps in less than 24 hours (though one company created a new hole while trying to patch the old one). Project EV did not respond to Pen Test Partners but did eventually implement “strong authentication and authorisation.” Experts, however, argue that it’s far past time for the industry to move beyond this whack-a-mole approach to cybersecurity. 

“Everybody knows this is an issue and lots of people are trying to figure out how to best solve it,” said Johnson, adding that he has seen progress. For example, many public EV charging stations have upgraded to more secure methods of transmitting data. But as for a coordinated set of standards, he said, “there’s not much regulation out there.”

There has been some movement toward changing that. The 2021 Bipartisan Infrastructure Law included some $7.5 billion to expand the electric vehicle charging network across the U.S., and the Biden administration has made cybersecurity part of that initiative. Last fall, the White House convened manufacturers and policymakers to discuss a path toward ensuring that increasingly vital electric vehicle charging hardware is properly protected.

Earlier this year the Federal Highway Administration finalized a rule that will require all states to implement cybersecurity standards for any charger installed under the 2021 Bipartisan Infrastructure Law. Santiago Mejia/The San Francisco Chronicle via Getty Images

“Our critical infrastructure needs to meet a baseline level of security and resilience,” said Harry Krejsa, chief strategist at the White House Office of the National Cyber Director. He also argued that bolstering EV cybersecurity is as much about building trust as it is mitigating risk. Secure systems, he said, “give us the confidence in our next-generation digital foundations to aim higher than we possibly could have otherwise.”

Earlier this year the Federal Highway Administration finalized a rule requiring states to implement “appropriate” cybersecurity strategies for chargers funded under the infrastructure law. But Johnson says the regulation omits devices installed outside that expansion, not to mention the more than 100,000 units already in place nationwide. Plus, he said, states haven’t offered much detail about what they’ll do. “If you drill down into the state plans, you’ll find that they are actually extremely light on cyber requirements,” he said. “The vast majority that I saw just say they will follow best practices.”

Just what constitutes best practice remains ill-defined. Johnson and his colleagues at Sandia published recommendations for charger manufacturers, and he noted that the National Institute of Standards and Technology is developing a framework for fast-charging that could help shape future regulation. But, ultimately, he would like to see something akin to the 2022 Protecting and Transforming Cyber Health Care Act that’s geared toward electric vehicles.

“Regulation is a way to drive the entire industry to improve their baseline security standards,” he said, pointing to recent laws in other countries as models or starting points for policymakers in the United States. Last year, for instance, the United Kingdom rolled out a host of requirements for EV chargers, such as enhanced encryption and authentication standards, tamper detection alerts and randomized delay functionality. 

The latter means that a charger must be able to turn on and off with a random time delay of up to 10 minutes. That would mitigate the impact of all the chargers in an area coming online simultaneously after a power outage or hack. “You don’t get that spike, which is great,” said Munro. “It removes the threat from the power grid.”

Johnson is optimistic that the industry is moving in the right direction, albeit more slowly than is ideal. “I can’t imagine [stricter standards] won’t happen. It’s just taking a long time,” he said. And he certainly doesn’t want to spark undue alarm, but rather apply steady pressure for improvement. 

“It’s scary stuff,” he said, “but it shouldn’t be fear mongering.”

This story was originally published by Grist with the headline Hackers already infiltrate EV chargers. It could only get worse on Jul 5, 2023.


This content originally appeared on Grist and was authored by Tik Root.

]]>
https://grist.org/technology/hackers-already-infiltrate-ev-chargers-it-could-only-get-worse/feed/ 0 409451
Armageddon and the Limits of Evolution https://www.radiofree.org/2023/07/03/armageddon-and-the-limits-of-evolution/ https://www.radiofree.org/2023/07/03/armageddon-and-the-limits-of-evolution/#respond Mon, 03 Jul 2023 01:55:24 +0000 https://dissidentvoice.org/?p=141753 On March 28, 2022, the Biden administration sent to Congress a revised version of its classified National Defense Strategy. The new version removed the longstanding doctrine of “no first use” of nuclear weapons, and opened the door to a nuclear response to a non-nuclear threat. Within months of the new U.S. policy, but without referring to it, the Putin administration responded that it might consider first use in case of an existential threat to Russia, including a non-nuclear one.  More recently, Sergei Karaganov, head of the Council on Foreign and Defense Policy, a non-governmental Russian think tank, argued that perhaps Russia should use a low yield tactical nuclear weapon in order to convince NATO to back off and stop threatening Russia’s security.

What drives human society to engage in such reckless behavior? The answer to this question is at once familiar to any student of human nature, human society and human history, and yet equally perplexing given the prospect of potential obliteration. This article is an exploration of such causes and their consequences, with possible implications that go far beyond human behavior alone, and may be grounded in universal principles.

We live in extraordinary times – possibly more extraordinary than we realize. How many of those living even fifty years ago imagined that today we might be able to carry in the palm of our hand a device that can access most of human knowledge. Or quantum computers with almost infinite and instantaneous computing capacity, which are now being designed. We can now even peer at the birth of the universe.

We owe this to human intelligence, which is sometimes ridiculed, but is an extraordinary evolutionary development nonetheless. More specifically, we owe our superpowers to human technology, which is a product of human intelligence, and which further expands the production of human intelligence with new tools, even including the ability to augment human intelligence with artificial intelligence.

How did this come about? The answer is quite simple and well known, although only the most imaginative science fiction writers have even scratched the surface of its potential consequences. Intelligence is born of evolution.

Evolution, in turn, is born of competition, and more specifically the competition between life forms. In fact, if there is another form of competition, such as between astronomical or chemical or physical units, they might have to be defined as life forms by virtue of that competition. Even the most ancient and primitive life forms, such as viruses, compete against other life forms and against each other. This is the fundamental fact of evolution.

We know that evolution has produced a fantastic array of life forms on earth, and we can imagine that the array is infinitely greater when life forms in the rest of the universe are eventually included. We also know that life forms have lived and died and gone extinct and passed on their genes according to their ability to compete and survive in different environments and in response to other life forms, and to great catastrophes, as well, such as the Chicxulub asteroid that wiped out all non-avian dinosaurs and ushered in the age of mammals 65 million years ago.

What are the strategies that organisms have employed in the competition for survival? There are many that we all can name: size, speed, venom, diet, teeth, claws, regeneration of tissue, immunity to disease, etc. These can also be called tools or weapons, though not in the technological sense. The term weapon is nonetheless appropriate because it confers advantages in the competition against other organisms, eventually resulting in the survival or extinction of some over others, depending on the success or failure of the weapon.

But there is a special weapon that is implied by the term strategy itself, namely intelligence. Intelligence is present in all living things. Even a virus has a form of intelligence and responds to its environment. Plants and fungi have also shown this ability, including a means of communication. Intelligence therefore qualifies as a tool or weapon in the tool chest or arsenal of every organism.

It is not surprising, therefore, that evolution should experiment with intelligence in much the same way as with teeth, claws, horns, plumage and other traits. The antlers of the Irish elk, the diving adaptations of the sperm whale, the size of the Beast of Baluchistan, the plumage of birds of paradise, the predations of the strangler fig and carnivorous plants are all examples of evolutionary experiments that have gone to extremes. Some organisms, like the nautilus, have survived relatively unchanged for vast eons, while others have painted themselves into evolutionary corners that have resulted in extinction. The development of humans, therefore, demonstrates that evolution is also capable of taking intelligence to extremes.

It has often been noted that humans are relatively helpless creatures, except for their brains. Furthermore, those brains place a great demand upon the body’s metabolism, the female birth canal, the rearing requirements of the young, the number of offspring, etc. Nevertheless, our brain confers enough of an advantage to overcome these disadvantages, at least thus far in our evolution.

This has been true in the last few million years of our existence, and especially in the last ten thousand. Today, human technology has carried us off the charts as a species. It began in the paleolithic period, so called because stone tools are the only ones that survive in the archaeological record from this earliest and most basic stage of technological development. From then on, the human species has continued to evolve physically, eventually resulting in the homo sapiens species. But our technological evolution proceeded and accelerated even faster. In fact, our species essentially invented technological evolution, at least within our corner of the universe, and it is now proceeding at breakneck speed.

The reasons for the acceleration of technological advancement have been widely discussed elsewhere, and may be summarized as 1) population growth (the increase in the number of minds that can be applied to technological advancement), 2) the increase in available time at the disposal of those minds, and 3) the multiplying effect of technological advances, i.e. the use of existing technology to create new technology, at an ever increasing and perhaps geometric pace.

Why is technology so attractive to us? Most of the reasons are self-evident. It has the potential (though not always the effect) to make our lives easier, more comfortable and more secure. These are motives that drive all life forms, not just humans. It also gives us competitive advantages, both against other species (now a lesser issue), and within our own.

In fact, the competition within our own species has become the primary evolutionary drive for humans. This sometimes takes relatively benign forms, such as social achievement and recognition, but the most intense competition is what we call warfare. Not surprisingly, it is also the time of greatest and fastest technological advancement, due to the much greater investment in the development of new weaponry during times of conflict. As noted earlier, we are now proceeding into unknown territory, powered by our ancient competitive drive, our relatively recent brain capacity, and our seemingly self-propelled technology.

Are we the only life forms in the universe to experience these developments? Many well-known thinkers agree that this is extremely unlikely. Although the proportion of planets capable of developing and sustaining life is undoubtedly a small fraction of the total, and although the number that have developed intelligent life and technological societies is smaller still, the total number of planets is so enormous that intelligent life cannot be unique on a cosmic scale. Furthermore, some or many such planets will have reached an evolutionary stage comparable to our present millions or billions of years before us.

Why, then, is there no incontrovertible evidence of alien societies having come to our planet? Why is there no synthetic substance of clearly alien origin that we can point to? We have sent synthetic terrestrial substances to the moon, Mars and other planets despite our short history of space travel, so why would alien civilizations not do the same?

This is sometimes called the Fermi paradox, after a famous question posed by Enrico Fermi in a conversation with other physicists in 1950. Many thinkers have proposed explanations, but I would like to approach it from first principles rather than responses to the question, per se.

I propose that just as physical laws govern the entire universe, there are evolutionary and biological laws that also apply universally, not merely on earth. A good candidate for one such law is clearly evolution, and the competitive forces that drive it. It is, in fact, hard to imagine that competition between species and among the same species is not one of these universal laws. A species without such a drive would simply not bother to attempt to survive, and therefore disappear in short order (or, more likely, never come into being).

It is also reasonable to assume that, sooner or later, intelligence inevitably becomes one of the experimental paths of evolution. As on earth, it becomes the impetus for technological development, and also more rapid in times of warfare than at other times, in pursuit of an advantage against competitors.

This is a clue that we can use to help answer the question of why alien civilizations would not have visited earth, and why we are unlikely to visit theirs. It is also the reason for the title of this article. In order to explore this line of inquiry, it is instructive to look at the history of weapons development, already mentioned in passing.

Weapons are often cited as a metric for technological advancement. They may have other uses, but it is their use in warfare that often stands out in the creation of empire and domination of competing societies. Such may have been the case with fire and stone implements, although we often have only inferential evidence for prehistorical periods. Clearer evidence comes for the taming of the horse and other domesticated creatures, and from metallurgy and then gunpowder. Shipbuilding, external and internal combustion engines, chemistry, electricity and the other developments of the industrial revolution eventually also contributed to advances in weaponry and warfare.

Since 1900, we have experienced poison gas, aircraft, hypersonic missiles, electronic weapons, artificial intelligence, and of course, nuclear weapons. We know that poison gas (“chemical weapons”) has been banned by international treaty, and that no one has used nuclear weapons in warfare since 1945. But poison gas has been used despite the ban, and nuclear weapons still exist in great quantities, with delivery systems capable of destroying most or all of humanity. It is a Sword of Damocles over the human race, with other swords under development. Some suspect that biological weapons have also been tried.

Will we succeed in avoiding our own destruction? For how long? Will no one in the next 10 years trigger a nuclear war? The next 100? 1000? 10,000? No one at all? Has there ever been a weapon that has not been used? In the case of nuclear weapons, a single war between nuclear powers might be enough to finish us off. Will the US/NATO use a nuclear weapon when it runs out of conventional weapons, to prevent a defeat in Ukraine? In eastern Asia? Will Russia be driven to use if nuclear weapons in order to avoid disappearance as a nation?

Most of us know the story of the scorpion and the frog. The scorpion asks the frog to carry him across the river. “No way!” says the frog. “You’ll kill me with your stinger!”

“Why would I do that?” asks the scorpion. “I can’t swim.”

So the frog takes him halfway across, when the scorpion mortally stings him.

“Why did you do that?” asks the dying frog,

“I’m a scorpion,” says the scorpion. “It’s in my nature.”

And what is the nature of humans? Has there ever been a time without war? Many of us will acknowledge that we came close to nuclear Armageddon during the Cuban missile crisis of 1962. Reportedly, there were scorpions in both Washington and Moscow. Washington’s chief scorpion was Gen. Curtis Lemay, the Air Force Chief of Staff. He is reported to have considered a nuclear war “winnable” and worth the risk, and he even permitted some of his bombers to stray beyond the callback point despite lacking the authority. Khrushchev made reference to similar pressures on his side (a negotiating bluff, perhaps, but certainly plausible).

Are there scorpions in Washington today? Some policy makers are certainly tempting fate, principally the neoconservative warmongers. They bear major responsibility for pulling the U.S. out of nuclear arms reduction and limitation treaties, including the manufacture and testing of low-yield “battlefield” nuclear weapons that both sides previously refrained from developing, for fear that the temptation to use them would be too great if they found themselves losing a conventional war, as in Ukraine. This sort of nuclear brinkmanship is exactly the sort of folly that can lead to masses of dead scorpions and frogs.

The question therefore arises: is nuclear holocaust even avoidable (permanently, that is)? Or a holocaust by biological or other means, such as a takeover by artificial intelligence? Or other technology that we haven’t even thought of yet? If not, does it explain why we have no evidence of visitation by alien civilizations? Are we hitting a barrier to further evolution that is universal in scope, and which sooner or later results in a lifeless burnt-out planet, or one with only primitive life forms, or perhaps a small number of intelligent survivors, doomed to rise again, bump against the ceiling of evolutionary development and get thrown back in an endless cycle?

I am not the first to make this case, but I believe that it is unfortunately very timely, and I hope it stimulates new thoughts for consideration.  I also hope that I am wrong, that there is something that I am overlooking, and that we can find a way to overcome this aspect of our nature and build a more peaceful – or at least less warlike – society that has eluded us for as long as we have existed.  But the evidence is not encouraging, and I would feel a lot better if an alien civilization came calling soon, proving that self-destruction is not the inevitable end of evolution and technology.


This content originally appeared on Dissident Voice and was authored by Paul Larudee.

]]>
https://www.radiofree.org/2023/07/03/armageddon-and-the-limits-of-evolution/feed/ 0 409001
Village Basketball and Football Championships https://www.radiofree.org/2023/07/01/village-basketball-and-football-championships/ https://www.radiofree.org/2023/07/01/village-basketball-and-football-championships/#respond Sat, 01 Jul 2023 15:33:21 +0000 https://dissidentvoice.org/?p=141723 This week’s News on China.

• Alibaba Cloud will broadcast 2024 Olympics
• Taiwanese leader’s popularity slumps
• World’s largest hydro-solar power plant
• Village basketball and football championships


This content originally appeared on Dissident Voice and was authored by Dongsheng News.

]]>
https://www.radiofree.org/2023/07/01/village-basketball-and-football-championships/feed/ 0 408862
As charging headaches persist, automakers turn to Tesla’s Supercharger network https://grist.org/transportation/as-charging-headaches-persist-automakers-turn-to-teslas-supercharger-network/ https://grist.org/transportation/as-charging-headaches-persist-automakers-turn-to-teslas-supercharger-network/#respond Wed, 28 Jun 2023 10:45:00 +0000 https://grist.org/?p=612629 Ford CEO Jim Farley was driving his family back from vacation in Lake Tahoe last summer when he recognized something most EV owners know well: Public charging can be a headache. 

On the 300-mile trip to Monterey, California, it wasn’t easy to find places to plug in his Ford Mustang Mach-E. His children had no problem, however, spotting the numerous Tesla Supercharger stations along the way. 

“My kids kept looking at me, ‘Hey Dad, there’s another Supercharger, can we stop there? How about there?’” Farley recounted in a conversation on Twitter Spaces in May. “I’d say ‘No, we have to go over here, behind this other building.’”

Farley said that was when he realized Tesla had done far better than any other charging network in creating an easy, dependable, and accessible customer experience. So easy in fact, that he wanted Ford customers to be able to access it, too. 

Farley was on Twitter to make an unprecedented announcement with Tesla CEO Elon Musk: Ford will join Tesla’s vast network of 12,000 Supercharger fast-charging stations. Early next year, it will offer an adapter that will allow Ford drivers to connect Tesla’s charging cables to their cars. Beginning in 2025, the company’s EVs will come with Tesla’s charging port.

“It was shocking,” said Loren McDonald, CEO of analytics firm EVAdoption, adding that Farley was sending a clear message. “He had absolutely no confidence that the charging networks could get their act together. Or why would you join with your competitor?” 

Ford Mustang Mach-E at Tesla Supercharger station
Beginning next year, Ford EVs like this Mustang Mach-E will be able to connect to Tesla Superchargers using an adapter. Courtesy of Ford Motor Company

The once unimaginable decision set off a cascade of echoing announcements. Two weeks later, General Motors CEO Mary Barra held her own Twitter Space with Musk to reveal that GM would join the network by offering adapters, to be followed by adopting its ports. Rivian and Volvo recently said the same. 

The growing embrace of Tesla’s network could transform the public charging experience for EV drivers, who will gain access to Supercharger stations throughout North America. It is meant to catalyze EV adoption by providing a simpler, more expansive, and more reliable experience than those offered by notoriously unreliable third-party networks. And it suddenly increased the likelihood that the U.S. could one day see a single charging standard rather than the patchwork of systems that frustrate current EV drivers and could scare off potential ones. 

While the announcements surprised many, in some ways they were inevitable. Tesla began building its proprietary global charging network over a decade ago, just as the company introduced its first sedan, the Model S.

“Tesla understood that in order for them to sell a lot of EVs, they had to take it upon themselves to build out the infrastructure,” said McDonald. 

Perhaps presumptuously, Tesla named its system the North American Charging Standard, or NACS. In actuality, it is far from the standard. There are three EV fast charging cable configurations in the U.S. CHAdeMO connectors are used almost exclusively by the Nissan Leaf, while most other EVs use the Combined Charging System, or CCS. Each has a different shape, and they are not interchangeable.

No other automaker built a network like Tesla’s, leaving most EV drivers dependent upon third-party networks like EVgo, Chargepoint and Electrify America for their public charging needs. Drivers often encounter broken chargers and long wait times, if they can find a fast charger at all.  

In a 2022 survey by the consumer advocacy group Plug In America, one quarter of non-Tesla EV drivers said broken chargers or sparse locations were a “major difficulty” or “deal breaker” to using some of the biggest fast charging networks. Only two to three percent of Tesla drivers said that of their network. 

Customer frustration is catching up with legacy automakers and third-party charging networks, said Matt Teske, CEO of Chargeway, a mobile app designed to help users find and utilize charging stations. 

“Everyone else was saying, ‘We build cars in a silo, you build chargers in a silo, but hopefully we make those things connect somehow,’” said Teske. That is, until the automakers saw that the two weren’t connecting. “They finally realized that the business model used by many third-party networks doesn’t truly serve the driver, and that impacted the ownership experience.”

The decision by two of the Big Three automakers to adopt Tesla’s standard will essentially double the number of places where customers can fill up and simplify the experience. Whereas a typical Electrify America or Chargepoint station may have four to six chargers, Supercharger stations can have as many as 50 to 100, reducing or eliminating wait times. Tesla’s charging cable and connector are smaller and lighter than CCS and CHAdeMO, making them easier to handle, and its chargers don’t have screens, which can break or be difficult to read. Payments are made exclusively through a mobile app. 

Teske said this kind of efficiency is key to getting drivers to abandon internal combustion. “What truly will accelerate electric vehicle adoption is, how do we get average consumers to look at using electricity as their fuel of choice when buying a car and say, ‘That’s easy,’” he said. 

Of course, the Tesla charging network can’t bear the burden of charging all 1.8 million electric vehicles on U.S. roads today, much less the 28.3 million expected by 2030. By one estimate, the country will need 172,000 public fast-chargers by then. It currently has about 9,000. As third-party networks scale up, the moves by Ford, GM and Rivian put pressure on them to do better. 

“It’s forcing everybody else to get their act together,” said McDonald, “because if they don’t, they’re out of business at some point.”

EVgo Station
An EVgo charging stall in Vienna, Virginia, includes both CCS and CHAdeMO connectors. EVgo has announced it will add NACS connectors to its chargers. Saul Loeb / AFP via Getty Images

EVgo and Chargepoint, among others, have announced they will add NACS connectors to their stations. That of course does not address issues with spotty reliability or cumbersome user experiences.  

Nor does it solve the problem of customer confusion over which connector is compatible with their car and which charging stalls offer that connection — an impediment to adoption that the adoption of a single universal charging standard could solve. 

Some in the industry publicly support this idea, including General Motors. “We have a real opportunity to drive this to be the unified standard for North America, which will enable even more mass adoption,” Barra said during her conversation with Musk. 

Adopting a single standard would not happen overnight — there are hundreds of thousands of electric vehicles already on the road that don’t use Tesla’s plug, and big players like Volkswagen and Toyota, the world’s two largest automakers, have not indicated that they will embrace NACS. 

The Biden administration, which has invested billions in accelerating EV adoption, has not yet publicly supported a single standard. On Tuesday, the Joint Office of Energy and Transportation announced that it will collaborate with the Society for Automotive Engineers to conduct an expedited review of NACS as a potential “public standard.” Such a designation would make it available to any manufacturer, much like a USB-C cord, which could further NACS adoption by more automakers. 

That said, a $5 billion grant program run by the Joint Office to build 500,000 charging stations by 2030 requires eligible projects to include at least four CCS connectors. While Texas and Washington recently added requirements that such projects also include NACS connectors, the Joint Office has not followed suit. 

“I think we’re headed down a two standard-connector path for much of the rest of this decade,” said McDonald, who likened the landscape to other widespread technologies with dueling interfaces, like Apple versus Android and Windows versus Mac.

In the short term, it’s possible that charging could become even more confusing, as networks try to accommodate all three standards in their stations. Drivers may need to rely on adapters that they attach to connector cables to make them compatible with their car, adding a layer of hardware that can break or get lost. 

“This is what happens when you have a Wild West approach to technology and everybody’s trying to prove they have the best mousetrap,” Teske said. “Unless there’s a really strong push for regulation to step in and change the conversation, we’re going to have a very messy landscape for drivers to contend with for years to come.”

It is already possible to catch a glimpse of what automaker-agnostic Supercharger stations will look like by visiting one of Tesla’s 11 Magic Dock Supercharger locations, which include CCS adapters so other cars can plug in. 

At the Magic Dock in Placerville, California, last week, Dawn Sorrell pulled up to charge a Tesla Model Y that she’d rented for a trip from Virginia to visit her mother in Northern California. It was her first time driving a fully electric car. “It’s a completely different mindset, I’m just figuring it out as I go,” she said.

Sorrell supported the idea of outside automakers accessing the Tesla network. “Anything where you’re opening it up more is going to be better,” she said, “because it’s stressful, making sure you have a charge.”

This story was originally published by Grist with the headline As charging headaches persist, automakers turn to Tesla’s Supercharger network on Jun 28, 2023.


This content originally appeared on Grist and was authored by Gabriela Aoun Angueira.

]]>
https://grist.org/transportation/as-charging-headaches-persist-automakers-turn-to-teslas-supercharger-network/feed/ 0 407768
Teal Process & Company on the future of work, learning, time, and space https://www.radiofree.org/2023/06/27/teal-process-company-on-the-future-of-work-learning-time-and-space/ https://www.radiofree.org/2023/06/27/teal-process-company-on-the-future-of-work-learning-time-and-space/#respond Tue, 27 Jun 2023 07:00:00 +0000 https://thecreativeindependent.com/people/teal-process-and-company-on-the-future-of-work-learning-time-and-space Tell me about your phrase, “work is a feeling.”

Yatú: We believe that work is a feeling that emerges from an activity. For example, sometimes people like to listen to certain types of music that gets them in the mood to work.

Norm: Work isn’t just one feeling. There are different types of work feelings. We recommending first figuring out how you want to feel when you work, or when you’re being “productive.” Then, you create an infrastructure or environment that supports that work feeling.

How does Teal like to feel when it works?

Norm: I like to feel “open and a little lost.” We believe you have to not know where you’re going in order to find somewhere new. A lot of the things we work on take a while to find themselves. So, it’s normal that we’re lost for a while.

Yatú: Personally, I like to feel “cozy.” Traditional time systems do a good job of making sure you don’t feel cozy. That’s why we had to invent our own time and space.

That reminds me of your clocks. Why do you cover all the clocks in your house?

Norm: We believe you shouldn’t have to watch the time. When we allow ourselves to be sensitive, we believe every human can innately feel time and space.

I equate covering the clocks up to a social media detox. In the same way you detox yourself from the habit of checking your phone, you can detox yourself from the habit of checking the time. After I covered the clocks up, I would catch myself looking for the time and realizing, “I don’t actually need to know the time after all.”

How did you begin questioning time?

Norm: We moved into the apartment we share in 2020, at the beginning of the pandemic. We put a lot of time, energy, and thought into our physical space, which was new to us then. Eventually, we realized time was just as important as space — the two are completely intertwined to create an environment.

Yatú: When the days of the pandemic felt blurred together, we would say, “This all feels like one day.” We began by defining our own “paragonday” — our ideal sense of time. “Paragon” means ideal, so “paragonday” is an ideal day.

So your time system, “Paragonday Systems,” is about feeling time?

Yatú: Yes. It’s important each person defines paragonday for themselves.

For me personally, paragonday feels like there’s a sense of abundance. People sometimes call this vacation, but I believe most people plan their vacations too much. Paragonday is whatever you want it to be. It can be a massage. It could be you going to visit a waterfall. It could simply be you closing your eyes and thinking peacefully. Whatever it is, it’s important to intentionally decide an ideal environment for you to enjoy time.

Paragonday sounds dreamy. What are the other ways to pass time?

Yatú: In Paragonday Systems, NP1 stands for “Non-Paragonday 1” which is a period of time that’s often filled with obligations. For a lot of people NP1 maps onto the work week, or Monday through Friday. Then there is NP2 or “Non-Paragonday 2” which is a period of time that isn’t tied to the obligations of “work.” The unplanned space of NP2 typically maps onto the weekend.

You can “parachute into Paragonday” from NP1 or NP2. Parachuting is the transitional period. It’s a mental parachute; you do it in your head. You land whenever you’re ready. You grab both handles of the parachute and you go, “pshhhhhhuuu”! The parachute is our way of making an intentional choice to enter your ideal sense of time.

Norm: Our date format goes like this: “Season Day, Year”. For example, the theoretical artifact we made for Paragonday Systems, accessible at http://www.paragonday.systems, was created on Spring Paragonday 3, 2020. Each time you enter a new Paragonday, you increment the count.

How did you two meet?

Yatú: We went to the same school. Our relationship became strong when we worked together on a hackathon for our college.

Yatú & Norm: We bonded over a shared mission to inspire other students to organize their own hackathons to create a broader educational network.

For the record, what’s a hackathon?

Yatú: Hackathons are those events where people quickly and collaboratively create something, usually technological, over a short period of time like a weekend. Eventually, our goal became broadening the idea of what hacking is.

We wanted to give people the opportunity to explore things. Eventually, we organized hackathons that allowed people to come together to create anything they wanted — with less tech focus. At our university, we didn’t have design classes. And there weren’t many designers who showed up to the hackathons at first.

Norm: Eventually, more designers popped up. We also brought in local professional designers to give workshops.

Yatú: It was a funny moment — people were writing articles about diversity — using a photo of our hackathon as an illustration. But we didn’t even try to be that.

We simply tried to create an environment that welcomes anyone to explore anything — focusing bringing in all the disciplines. We did this by attracting a wider audience and fostering an encouraging environment towards building. The rest followed naturally.

Norm: Yatú and I had tons of conversations about why we were doing the things we were doing, and that’s how we were able to mind meld and grow.

Shortcomings in your educations have been extremely motivating to both of you.

Norm: Yeah, we learned a lot. One week, we both almost dropped out. I basically failed out of my major. It’s funny because we were working with administrators at the school to organize hackathons. We talked often with heads of departments but were simultaneously failing out of their classes.

Yatú: We ran multiple organizations on campus. We truly believed in the motto, “learn by doing.” Our groups bonded through friendships, travel, and the desire to learn. We created an environment where anyone could appoint themselves to lead any exploration.

Norm: We did a lot of work for anyone to have supportive educational infrastructure because we knew what it’s like not to have that.

How do each of you define Teal?

Yatú: We have a shared understanding that Teal is always an open question.

Norm: Yeah. In trying to describe it to people, it can also be called an “art group” or … But once you start trying to define it in any kind of way, it loses the vastness. The vastness is hard to communicate.

Yatú: At first, I didn’t want to define Teal. But Norm said it was important to define it.

The vastness is Teal’s character. Teal is sometimes considered “the gray of color.”

Norm: We added “Process & Company” to the name because we wanted to communicate how things came to be through documentation (“Process”), and we also wanted it to be real and legitimate (“Company”).

Yatú: The other meaning of “& Company” is the “company you keep” — being intentional about the people you share time with.

It gets easier to describe the things inside of Teal.

One of Teal’s concepts I’m especially curious about is “careering.”

Norm: Yeah! We like to talk about how the word “career” is both a noun and a verb. Most people know about “career” the noun, which means “an occupation undertaken for a significant period with opportunities for progress.” But “career” is also a verb.

Yatú: As a verb, “career” means “to move swiftly and in an uncontrolled manner in a specified direction.”

Norm: Thinking about career as a verb helps introduce a more fluid way of exploring throughout one’s working life.

A career doesn’t have to be a finite ladder, with roles predetermined that you fit into. Instead, a career can be more like a map you draw that ties together your interests, what roles you play, and what environments you want to inhabit, so that you can move around it fluidly over time, maybe even continuing to draw the map as you go.

Careering sounds fun and natural, but also scary due to the uncertainty …

Norm: There is a lot of privilege in the ability to have time to think freely about the roles you’d like to create and play. We often wonder how to give more folks this opportunity.

We believe organizations need to empower individuals to explore roles. If people have the ability to switch roles, play more roles, and discover completely new roles, we ultimately believe it will benefit both organizations and individuals. If an organization doesn’t allow for inward mobility, they can both lose talent and lose money. Recruiting and onboarding new individuals is expensive.

Careering goes hand-in-hand with lifelong learning. We believe more educational moments should happen in our lives, especially in the workplace. Currently education in the US is bucketed from kindergarten through 12th grade and sometimes university, which can make it feel like learning ends then.

If someone says, “I want to change industries. But it’s actually a difficult thing to do!” — what actionable advice can you give them?

Yatú: Relationships allow for mobility. If more people are thinking that things are possible with you, and you surround yourself with people who believe in the possibilities of things, that’s a different potential future. The advice I’d give someone is to find and surround yourself with people who believe in you, who are honest, who are optimists — people who are willing to try things that haven’t been done before. If we look to architecture, every good architect has good relationships.

Norm: With design, it feels like if you can learn how to design one thing, then you can learn how to design anything. So start somewhere. We like to think about every work experience as a “careering waypoint” — it gives you a direction but doesn’t imply a final destination.

Which reminds me that back in our hackathon days, we would encourage people to “learn whatever language your best friend knows.” In order to pick up technical skills like computer programming, we believe it’s about finding folks, building those relationships, and learning whatever tools are available and shared to get started.

I noticed in 2022 you published this “Careering Theory” as a website: https://www.careering.life. It’s exciting to see everything together here.

Norm: Yeah, one other thing about Teal is that we have a lot of concepts. But whatever theories we have, it’s important we work through them by creating, such as publishing Careering as a theoretical artifact.

How has Teal explored careering?

Norm: As we were graduating, we started thinking about life after university and asked, “What are ways of living?” We were coming out of the tunnel that was the hackathon scene. We started finding other ways people were operating, such as having residencies. We also liked the idea of apprenticeships, or finding someone to work and learn with.

This is actually how one of our projects called “Leave Room for Thoughts” started in 2018. I found out about the concept of an artist residency, told Yatú, and our minds were completely blown —

Yatú: Yeah. We found out about residencies and said to ourselves, “Let’s do it.” I took a loan out to finance the project. We said, “We’ve got to find a space.” We only had one month before starting our full-time jobs, so we met up with our friend Benji in NYC and found a space within a week.

Norm: We had no plan other than spending a month together in a space.

Yatú: We didn’t know what we were doing. We were careering before we even defined it. The only thing we knew was that we wanted to do a residency.

For the residency, we hit up friends saying, “We have a space. You can come by and create whatever you want and we’ll help you make it happen.”

We had five people come in during that month. We documented it.

Like we did in our hackathon days, we did a lot of work simply for someone to have the supportive infrastructure because we know what it’s like to not have the infrastructure. When you’re no longer a student at a university, it’s easy to appreciate access to space and certain facilities, now that they are no longer available.

One other interesting thing to note is that every artist who came to the space was experimenting with something for the first time. They all ended up continuing whatever creative pursuits they began at the residency into their ongoing practice.

Norm: It was the last couple of days we were in New York and were reflecting, finishing things up and working with the artists. We were like, “What just happened?” And then we asked outselves, “Is this an institution??”

Yatú: Afterwards, we packaged the narrative of what happened as an online artifact: https://lrft.institute. Something happened in real life. It’s not just a website.

Norm: Four years later, we created a new program under the “Leave Room for Thoughts” umbrella called “Campus Complex,” a month-long educational experiment that unfolded across New York City.

Originally, we wanted to design a new physical campus for ideal learning, with beautiful rolling hills and all. But we soon realized the potential by utilizing existing infrastructure within NYC, so we brought together local organizations to create our own “Schoolscape.”

Yatú: We encouraged learners to freely explore the Schoolscape and document their journey along the way. In creating the theoretical artifact for this program, https://cc.place, our “Leave Room for Thoughts” institution was intentionally put to rest, or as we like to say “composted,” because we don’t believe that institutions should exist forever.

Can you tell me more about how Teal approaches publishing on the web?

Norm: We’ve always believed that websites can be more. Or that websites can just “be.” Generally, anything that people try to put in a box … it can be something else.

Back in our hackathon scene days, everyone was generally into startups and building digital products. In that sphere, websites were very functional. We realized we could play with the web in a way where we could still use what we learned from digital products. That’s why most of our online artifacts have special attention put into the navigation, for example.

All in all, we believe the purpose of websites can be just to exist. I would love to see more people creating and publishing things for the simple purpose of them existing. Websites can also be works of art.

On a more holistic level, we’ve been applying this lens of viewing websites to make beautiful tools more broadly. We call this “Couture Software” — or, bespoke tools for us and friends. An example we use internally we call “Concept Trust,” a tool that helps our process of creation.

Speaking of websites, the first project Teal did, “Gassed Up,” resulted in an online artifact you can explore: https://tealprocess.net/gassed-up.

How did this website begin?

Yatú: Gassed Up started with a space. Everything always comes back to space. We used to work out of this co-working startup incubator. They had a room that could be used for events. We asked if we could use that space for one day to do a photoshoot. I had a vision.

Norm: The day before the shoot we were looking through a book of Norman Rockwell paintings I had. There’s one with this guy looking at the balloons and mess he has to clean up, feeling defeated. There was something nice about the exciting party and the sadness simultaneously. I’m imagining early us, getting into art and design for the first time, thinking to ourselves, “Yeah, the contrast! The dichotomy!” So, we decided there had been this birthday party.

Yatú: We did the photoshoot, then did video. That’s when I first did web design.

Norm: As we were putting together the site, we wondered, “How do we weave this together?“ We realized we needed a story. What if we introduce the characters first? We had a nice photo of a ladder. We realized the ladder had to be the star!

Yatú: This ladder was called Giraffe. It was yellow.

Norm: We named the ladder first. Then we needed to identify the other characters — a couple humans and the balloons. We wondered, “Are we creating a universe here? Do these characters exist in a broader world?” So we chose names for ourselves. I chose “Norman” from the book that inspired some of the vibe.

Yatú: My character’s name was Xavier. I thought it was a cool name at the time. My mom actually wanted to call me this before I was born. For some reason “Xavier” never stuck for me. After a while, my friends started calling me “Yatú Sabe.” It had a nice ring. In Spanish, “ya tú sabe” means “you already know.” It’s a way of acknowledging someone’s inherent knowledge.

So, we started exploring names in our first project. And that’s how our names came to be. We sometimes call them our Teal names, but they’re the names everyone calls us now.

How do you work so well together?

Yatú: Trust is the most important thing. As long as we trust each other and we’re honest with each other, then problems are just opportunities for us to think things through.

We also have a lot of complementary traits. Norm is a pretty encouraging as a person. His encouragement enables me a lot. And I have the audacity to try things. We build on each other. We ladder each other’s thoughts.

Norm: It all comes back to the ladder.

One reason we’re able to ladder each other’s thoughts so well is that we take each other’s very ridiculous ideas very seriously. We’re like, “Okay, if that was a thing, then…” We build on each other’s ideas by validating and extending them further.

Somehow, Yatú and I are able to align on something that feels grand and wonderful to go explore. And then we go explore it together.

What’s Teal’s operational model?

Norm: Ideas start as concepts, get nourished into experiments, and then are published as artifacts. Yatú came up with this funnel. There are way more concepts than there are artifacts. And it takes a long time to even go from experiment to artifact.

Yatú: This operational model isn’t perfect, but it’s been working for us.

Norm: It helps us align on strategy. Questions like, “How much time are we trying to spend on this?” or “What level are we trying to take this to?”

We also landed on three formats: digital, physical, and theoretical. We work at the intersection of those, which is everything.


Note: This conversation was originally conducted in 2021, edited in 2022, and published in 2023. As Teal Process & Company says, “sometimes time finds us rather than us finding the time.”

Currently, Norm & Yatú are careering as Artist-Founders by playing with USBs and the world of hardware connectivity.


This content originally appeared on The Creative Independent and was authored by Laurel Schwulst.

]]>
https://www.radiofree.org/2023/06/27/teal-process-company-on-the-future-of-work-learning-time-and-space/feed/ 0 407396
"The Palestine Laboratory": Antony Loewenstein on How Israel Exports the Technology of Occupation https://www.radiofree.org/2023/06/23/the-palestine-laboratory-antony-loewenstein-on-how-israel-exports-the-technology-of-occupation-2/ https://www.radiofree.org/2023/06/23/the-palestine-laboratory-antony-loewenstein-on-how-israel-exports-the-technology-of-occupation-2/#respond Fri, 23 Jun 2023 14:46:33 +0000 http://www.radiofree.org/?guid=91ab114629b9fc33ae5179bc20e2bd5e
This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2023/06/23/the-palestine-laboratory-antony-loewenstein-on-how-israel-exports-the-technology-of-occupation-2/feed/ 0 406509
“The Palestine Laboratory”: Antony Loewenstein on How Israel Exports the Technology of Occupation https://www.radiofree.org/2023/06/23/the-palestine-laboratory-antony-loewenstein-on-how-israel-exports-the-technology-of-occupation/ https://www.radiofree.org/2023/06/23/the-palestine-laboratory-antony-loewenstein-on-how-israel-exports-the-technology-of-occupation/#respond Fri, 23 Jun 2023 12:42:02 +0000 http://www.radiofree.org/?guid=e25d8a7b2ec20d9a07eb68c09c2210e2 Palestinelaboratory

We speak with journalist and author Antony Loewenstein about his new book, The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Loewenstein explains that Israel’s military-industrial complex has used the Occupied Palestinian Territories for decades as a testing ground for weaponry and surveillance technology that it then exports around the world for profit. “You find in over 130 countries across the globe in the last decades, Israel has sold … a range of tools of occupation and repression that have initially been tested in Palestine on Palestinians,” Loewenstein says.


This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2023/06/23/the-palestine-laboratory-antony-loewenstein-on-how-israel-exports-the-technology-of-occupation/feed/ 0 406484
China’s facial recognition technology hinders North Korean escapees https://www.rfa.org/english/news/korea/facial-recognition-06222023180458.html https://www.rfa.org/english/news/korea/facial-recognition-06222023180458.html#respond Thu, 22 Jun 2023 22:05:15 +0000 https://www.rfa.org/english/news/korea/facial-recognition-06222023180458.html Facial recognition technology in China is increasing the risk that North Korean escapees in China will be caught, and raising the prices charged by smugglers who assist them, sources who work closely with escapees told Radio Free Asia. 

Most North Koreans who escape do so by crossing the northern border into China. But facial recognition systems there are spreading – with cameras installed on street corners and train stations – and used by Chinese police to keep track of the population on the streets.

While face of nearly every Chinese resident is registered in a government database, North Koreans escapees are not, and turn up nothing when scanned, Seo Jae-pyoung, head of the Association of the North Korean Defectors, a support group based in South Korea, told RFA’s Korean Service.

When the face does not match a profile, the police are quick to check on the person to determine why, he said.

While it's difficult to know for sure if the software has led to North Korean refugees getting captured in China, it has clearly raised the risks and costs for those trying to escape, those familiar with the situation say.

In March, the surveillance software appeared to be a key factor in the capture of five or six North Korean refugees and a local broker helping them move within China, Seo said. They were caught by Chinese police near the northeastern city of Dalian.

“It seems that those North Korean escapees were already tracked down,” he said. “It is highly likely that they were caught because they were unaware of the dangers of facial recognition technology and tracking.”

Seo said that artificial intelligence-based facial recognition technology has increased the risks facing North Koreans who want to escape. Typically, they travel discreetly through China all the way to Southeast Asia, where they take a flight to Seoul.

Sharp decrease

This may be one reason that the number of North Koreans who successfully reach the South are down, experts say. 

Between 2001 and 2019 more than 1,000 North Koreans arrived in the South each year, reaching a peak of 2,914 in 2009. But this dropped to 229 in 2020 and then to the double digits in 2021 and 2022, data from the South Korean Ministry of Unification showed.

Much of the rapid decline is due to the COVID-19 pandemic, during which North Korea and China closed the entirety of the 1,350-kilometer (840-mile) Sino-Korean border, but experts say that facial recognition tech is also responsible.

The issue was raised before a U.S. Congressional hearing this month.

“The AI-based facial recognition program has made the North Korean refugees’ internal movement by public transportation within China almost impossible while the authorities have been using surveillance technology to monitor and intercept the escapees attempting to flee China,” Ethan Hee-Seok Shin, a legal analyst at the South Korea-based Transitional Justice Working Group, told the Congressional-Executive Commission on China on June 13.

ENG_KOR_FaceRecognition_06162023_02.jpg
A man walks past surveillance cameras in Beijing, Nov. 23 2021. Credit: Carlos Garcia Rawlins/Reuters

The technology is spreading fear among escapees in China, Hanna Song, director of international cooperation at the South Korea-based Database Center for North Korean Human Rights, told the same hearing.

China’s increasing use of emerging technology is being used as a tool of repression that affects the most vulnerable groups including North Korean refugees,” she said. “Many North Koreans spoke about how the advanced surveillance capabilities, such as facial recognition and biometric systems, are used to monitor and track the movements of those in China.”

There are no statistics on North Korean refugees caught or arrested as a result of facial recognition technology in China. Experts have explained that it is not easy to identify North Koreans because there are many foreigners who are not registered in China's surveillance system.

But sources told RFA that facial recognition likely has a role in the arrests of such refugees in China.

“Most of the North Korean escapees being arrested now [in China] can be attributed to facial recognition cameras,” Chun Ki-won, a reverend with the Durihana Mission, an organization that carries out rescue operations for escapees, told RFA.

Kim Sung-eun of the Caleb Mission, another group that assists escapees in China, said personnel from his organization were arrested with a group of escapees because of facial recognition technology.

“Some of our people got caught too, before COVID-19,” said Kim. “There is a facial recognition machine in front of the train station. They passed it and sat on the train and they were caught right away.”

All the escapees were forcibly repatriated to North Korea, he said.

ENG_KOR_FaceRecognition_06162023_03.JPG
A demonstration of face-recognize technology is displayed on Chinese State-owned surveillance equipment manufacturer Hikvision’s screen at Security China 2018 in Beijing, China, Oct. 23, 2018. Credit: Ng Han Guan/AP

Several officials of South Korea-based organizations told RFA that they believe facial recognition technology is having a great impact on escaped North Koreans. 

“Cameras installed throughout China and artificial intelligence facial recognition technology have made it difficult for North Korean refugees to move, and awareness of fleeing North Koreans [in China] is growing,” said Ko Yonghwan, a former North Korean diplomat who is currently a non-resident senior researcher at Korean Institute for Military Affairs.

Because the technology is so advanced, China would even be able to surveil escapees at North Korea’s request, said Choo Jaewoo, a professor at the department of Chinese language and literature at Seoul’s Kyung Hee University.

“If North Korea requests tracking of a specific person and China accepts it, the risk of being caught by facial recognition technology could be much greater," said Choo.

Higher costs

The surveillance software has increased the risk facing brokers, prompting them to raise their prices.

Before facial recognition technology was so prevalent, it cost about US$2,000 per refugee to get through China with the help of a broker, but now it costs $10,000 to $15,000, said Kim from the Caleb Mission.

“It wasn't easy before, but the reality is that using the train station or bus stop has become more difficult,” said Ji Chul-ho, head of the Emergency Rescue team at Now Action & Unity for Human rights, a South Korean organization that helps North Korean escapees.

“It is a reality that it is difficult to use most [public transportation] these days,” he said. “As a result, the cost of rescue is higher than in the past, as it is necessary to move using the broker’s vehicle and to more carefully arrange [escape] plans.”

Prior to the advent of facial recognition technology, escapees could at least see police coming and try to avoid them, or hide when they hear sirens, Ji said.

“Now we are exposed to more invisible and unaware fears,” he said. “It is a serious problem.”

Translated by Leejin J. Chung. Edited by Eugene Whong and Malcolm Foster.


This content originally appeared on Radio Free Asia and was authored by By Cheon Soram for RFA Korean.

]]>
https://www.rfa.org/english/news/korea/facial-recognition-06222023180458.html/feed/ 0 406198
To reach net-zero emissions, American homes need an electric makeover https://grist.org/technology/to-reach-net-zero-emissions-american-homes-need-an-electric-makeover/ https://grist.org/technology/to-reach-net-zero-emissions-american-homes-need-an-electric-makeover/#respond Thu, 22 Jun 2023 10:30:00 +0000 https://grist.org/?p=612467 Households in the U.S. use 1 billion fossil-fuel powered machines to heat our homes, cook food, and drive to work. Those residential appliances and vehicles produce 42 percent of the nation’s energy-related emissions. But electric alternatives, like heat pumps and electric vehicles, already exist — and adopting them will help curb emissions, fast. A report released on Tuesday by the nonprofit Rewiring America found that to reach President Joe Biden’s goal of a net-zero emissions economy by 2050, Americans will need to buy 14 million more electric household machines than usual over the next three years.

Cora Wyent, director of research at Rewiring America, said that target is “ambitious, but it’s achievable,” mainly due to clean tech incentives created by the 2022 Inflation Reduction Act and some state policies. The report finds that if there are enough early adopters, market trends will soon take over — eventually resulting in widespread adoption with little to no additional effort. 

“The good news about this transition is that we have time. We have decades to do it,” Wyent said. “But what happens in the next few years really dictates when that adoption curve starts to take off.” 

The report details growth trajectories for five clean technologies: heat pumps, heat pump water heaters, induction stoves, electric vehicles, and rooftop solar. All are eligible for tax rebates or other incentives under the Inflation Reduction Act.

The report quantifies exactly how many electrical machines Americans will need to purchase above business-as-usual scenarios in order to reach net-zero by 2050. It focuses on the amount of sales needed to achieve “market acceleration” — a critical tipping point where sales will begin to increase sustainably on their own. 

Heat pumps, which use electricity for space heating and cooling, are currently used in 16 percent of homes in the U.S.. To get on track for net-zero by 2050, sales will need to outpace business-as-usual projections by a factor of three by 2032. To meet that pace, households will need to purchase 2.38 million more heat pumps than usual over the next three years. 

Sales of heat pump water heaters, which are used in only 1 percent of households in the U.S., will need to speed up 10 times over the business-as-usual scenario by 2032. That means 200,000 extra units over the next three years.

Induction stoves run on electricity and use magnetic properties to cook food, resulting in none of the toxic pollution generated by gas and propane stoves. To align with its 2050 climate goal, U.S. households will need to adopt induction stoves five times faster than usual, purchasing an additional 1.76 million induction stoves over the next three years. 

Meanwhile, electric vehicles, which today make up only 2 percent of U.S. passenger cars on the road, need to accelerate sales seven times over current projections by 2032. The report sets a national goal of selling 6.7 million extra electric vehicles in the next three years. Rooftop solar sales would also need to speed up by a factor of seven, requiring 2.78 million additional installations in three years. 

The report aims to inspire policymakers to start identifying gaps in uptake of these technologies and get working on policies to incentivize adoption. 

“This transition is already starting to happen,” Wyent said. One encouraging example is heat pumps, which outpaced gas furnaces in sales in 2022 for the first time. But for that transition to happen equitably, policymakers will need to design laws that ensure lower-income communities and communities of color can access these technologies early — and start reaping the climate and energy efficiency benefits sooner.

“We hope that breaking this down into smaller targets will help cities, states, manufacturers, and everyone else who’s invested in this transition to set near-term goals that will get us on the right trajectory,” Wyent told Grist.

This story was originally published by Grist with the headline To reach net-zero emissions, American homes need an electric makeover on Jun 22, 2023.


This content originally appeared on Grist and was authored by Akielly Hu.

]]>
https://grist.org/technology/to-reach-net-zero-emissions-american-homes-need-an-electric-makeover/feed/ 0 405974
PNG academic says Port Moresby politicians naïve over US defence deals https://www.radiofree.org/2023/06/22/png-academic-says-port-moresby-politicians-naive-over-us-defence-deals/ https://www.radiofree.org/2023/06/22/png-academic-says-port-moresby-politicians-naive-over-us-defence-deals/#respond Thu, 22 Jun 2023 02:10:53 +0000 https://asiapacificreport.nz/?p=90095 By Don Wiseman, RNZ Pacific senior journalist

A Papua New Guinean academic says the new security deals with the United States will militarise his country and anyone who thinks otherwise is naïve.

In May, PNG’s Defence Minister Win Barki Daki and US Secretary of State Antony Blinken signed the Defence Cooperation Agreement and the Shiprider Agreement.

Last week they were presented to PNG MPs for ratification and made public.

The defence cooperation agreement talks of reaffirming a strong defence relationship based on a shared commitment to peace and stability and common approaches to addressing regional defence and security issues.

Money that Marape ‘wouldn’t turn down’
University of PNG political scientist Michael Kabuni said there was certainly a need for PNG to improve security at the border to stop, for instance, the country being used as a transit point for drugs such as methamphetamine and cocaine.

“Papua New Guinea hasn’t had an ability or capacity to manage its borders. So we really don’t know what goes on on the fringes of PNG’s marine borders.”

But Kabuni, who is completing his doctorate at the Australian National University, said whenever the US signs these sorts of deals with developing countries, the result is inevitably a heavy militarisation.

“I think the politicians, especially PNG politicians, are either too naïve, or the benefits are too much for them to ignore. So the deal between Papua New Guinea and the United States comes with more than US$400 million support. This is money that [Prime Minister] James Marape wouldn’t turn down,” he said.

The remote northern island of Manus, most recently the site of Australia’s controversial refugee detention camp, is set to assume far greater prominence in the region with the US eyeing both the naval base and the airport.


Kabuni said Manus was an important base during World War II and remains key strategic real estate for both China and the United States.

“So there is talk that, apart from the US and Australia building a naval base on Manus, China is building a commercial one. But when China gets involved in building wharves, though it appears to be a wharf for commercial ships to park, it’s built with the equipment to hold military naval ships,” he said.

Six military locations
Papua New Guineans now know the US is set to have military facilities at six locations around the country.

These are Nadzab Airport in Lae, the seaport in Lae, the Lombrum Naval Base and Momote Airport on Manus Island, as well as Port Moresby’s seaport and Jackson’s International Airport.

According to the text of the treaty the American military forces and their contractors will have the ability to largely operate in a cocoon, with little interaction with the rest of PNG, not paying taxes on anything they bring in, including personal items.

Prime Minister James Marape has said the Americans will not be setting up military bases, but this document gives them the option to do this.

Marape said more specific information on the arrangements would come later.

Antony Blinken said the defence pact was drafted by both nations as ‘equal and sovereign partners’ and stressed that the US will be transparent.

Critics of the deal have accused the government of undermining PNG’s sovereignty but Marape told Parliament that “we have allowed our military to be eroded in the last 48 years, [but] sovereignty is defined by the robustness and strength of your military”.

The Shiprider Agreement has been touted as a solution to PNG’s problems of patrolling its huge exclusive economic zone of nearly 3 million sq km.

Another feature of the agreements is that US resources could be directed toward overcoming the violence that has plagued PNG elections for many years, with possibly the worst occurrence in last year’s national poll.

But Michael Kabuni said the solution to these issues will not be through strengthening police or the military but by such things as improving funding and support for organisations like the Electoral Commission to allow for accurate rolls to be completed well ahead of voting.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/06/22/png-academic-says-port-moresby-politicians-naive-over-us-defence-deals/feed/ 0 405970
LexisNexis Is Selling Your Personal Data to ICE So It Can Try to Predict Crimes https://www.radiofree.org/2023/06/20/lexisnexis-is-selling-your-personal-data-to-ice-so-it-can-try-to-predict-crimes/ https://www.radiofree.org/2023/06/20/lexisnexis-is-selling-your-personal-data-to-ice-so-it-can-try-to-predict-crimes/#respond Tue, 20 Jun 2023 20:33:27 +0000 https://production.public.theintercept.cloud/?p=431690

The legal research and public records data broker LexisNexis is providing U.S. Immigration and Customs Enforcement with tools to target people who may potentially commit a crime — before any actual crime takes place, according to a contract document obtained by The Intercept. LexisNexis then allows ICE to track the purported pre-criminals’ movements.

The unredacted contract overview provides a rare look at the controversial $16.8 million agreement between LexisNexis and ICE, a federal law enforcement agency whose surveillance of and raids against migrant communities are widely criticized as brutal, unconstitutional, and inhumane.

“The purpose of this program is mass surveillance at its core.”

“The purpose of this program is mass surveillance at its core,” said Julie Mao, an attorney and co-founder of Just Futures Law, which is suing LexisNexis over allegations it illegally buys and sells personal data. Mao told The Intercept the ICE contract document, which she reviewed for The Intercept, is “an admission and indication that ICE aims to surveil individuals where no crime has been committed and no criminal warrant or evidence of probable cause.”

While the company has previously refused to answer any questions about precisely what data it’s selling to ICE or to what end, the contract overview describes LexisNexis software as not simply a giant bucket of personal data, but also a sophisticated analytical machine that purports to detect suspicious activity and scrutinize migrants — including their locations.

“This is really concerning,” Emily Tucker, the executive director of Georgetown Law School’s Center on Privacy and Technology, told The Intercept. Tucker compared the LexisNexis contract to controversial and frequently biased predictive policing software, causing heightened alarm thanks to ICE’s use of license plate databases. “Imagine if whenever a cop used PredPol to generate a ‘hot list’ the software also generated a map of the most recent movements of any vehicle associated with each person on the hot list.”

The document, a “performance of work statement” made by LexisNexis as part of its contract with ICE, was obtained by journalist Asher Stockler through a public records request and shared with The Intercept. LexisNexis Risk Solutions, a subsidiary of LexisNexis’s parent company, inked the contract with ICE, a part of the Department of Homeland Security, in 2021.

“LexisNexis Risk Solutions prides itself on the responsible use of data, and the contract with the Department of Homeland Security encompasses only data allowed for such uses,” said LexisNexis spokesperson Jennifer Richman. She told The Intercept the company’s work with ICE doesn’t violate the law or federal policy, but did not respond to specific questions.

The document reveals that over 11,000 ICE officials, including within the explicitly deportation-oriented Enforcement and Removal Operations branch, were using LexisNexis as of 2021. “This includes supporting all aspects of ICE screening and vetting, lead development, and criminal analysis activities,” the document says.

In practice, this means ICE is using software to “automate” the hunt for suspicious-looking blips in the data, or links between people, places, and property. It is unclear how such blips in the data can be linked to immigration infractions or criminal activity, but the contract’s use of the term “automate” indicates that ICE is to some extent letting computers make consequential conclusions about human activity. The contract further notes that the LexisNexis analysis includes “identifying potentially criminal and fraudulent behavior before crime and fraud can materialize.” (ICE did not respond to a request for comment.)

LexisNexis supports ICE’s activities through a widely used data system named the Law Enforcement Investigative Database Subscription. The contract document provides the most comprehensive window yet for what data tools might be offered to a LEIDS clients. Other federal, state, and local authorities who pay a hefty subscription fee for the LexisNexis program could have access to the same powerful surveillance tools used by ICE.

The LEIDS program is used by ICE for “the full spectrum of its immigration enforcement,” according to the contract document. LexisNexis’s tools allow ICE to monitor the personal lives and mundane movements of migrants in the U.S., in search of incriminating “patterns” and for help to “strategize arrests.”

The ICE contract makes clear the extent to which LexisNexis isn’t simply a resource to be queried but a major power source for the American deportation machine.

LexisNexis is known for its vast trove of public records and commercial data, a constantly updating archive that includes information ranging from boating licenses and DMV filings to voter registrations and cellphone subscriber rolls. In the aggregate, these data points create a vivid mosaic of a person’s entire life, interests, professional activities, criminal run-ins no matter how minor, and far more.

While some of the data is valuable for the likes of researchers, journalists, and law students, LexisNexis has turned the mammoth pool of personal data into a lucrative revenue stream by selling it to law enforcement clients like ICE, who use the company’s many data points on over 280 million different people to not only determine whether someone constitutes a “risk,” but also to locate and apprehend them.

LexisNexis has long since deflected questions about its relationship by citing ICE’s “national security” and “public safety” mission; the agency is responsible for both criminal and civil immigration violations, including smuggling, other trafficking, and customs violations. The contract’s language, however, indicates LexisNexis is empowering ICE to sift through an large sea of personal data to do exactly what advocates have warned against: busting migrants for civil immigration violations, a far cry from thwarting terrorists and transnational drug cartels.

ICE has a documented history of rounding up and deporting nonviolent immigrants without any criminal history, whose only offense may be something on the magnitude of a traffic violation or civil immigration violation. The contract document further suggests LexisNexis is facilitating ICE’s workplace raids, one of the agency’s most frequently criticized practices, by helping immigration officials detect fraud through bulk searches of Social Security and phone numbers.

ICE investigators can use LexisNexis tools, the document says, to pull a large quantity of records about a specified individual’s life and visually map their relationships to other people and property. The practice stands as an exemplar of the digital surveillance sprawl that immigrant advocates have warned unduly broadens the gaze of federal suspicion onto masses of people.

Citing language from the contract, Mao, the lawyer on the lawsuit, said, “‘Patterns of relationships between entities’ likely means family members, one of the fears for immigrants and mixed status families is that LexisNexis and other data broker platforms can map out family relationships to identify, locate, and arrest undocumented individuals.”

The contract shows ICE can combine LexisNexis data with databases from other outside firms, namely PenLink, a controversial company that helps police nationwide request private user data from social media companies.

In this Wednesday, April 29, 2020 photo, a surveillance camera, top right, and license plate scanners, center, are seen at an intersection in West Baltimore. On Friday, May 1, planes equipped with cameras will begin creating a continuous visual record of the city of Baltimore so that police can see how potential suspects and witnesses moved to and from crime scenes. Police alerted to violent crimes by street-level cameras and gunfire sound detectors will work with analysts to see just where people came and went.

A license plate reader, center, and surveillance camera, top right, are seen at an intersection in West Baltimore, Md., on April 29, 2020.

Photo: Julio Cortez/AP

The contract’s “performance of work statement” mostly avoids delving into the numerous categories of data LexisNexis makes available to ICE, but it does make clear the importance of one: license plates.

The automatic scanning of license plates has created a feast for data-hungry government agencies, providing an effective means of tracking people. Many people are unaware that their license plates are continuously scanned as they drive throughout their communities and beyond — thanks to automated systems affixed to traffic lights, cop cars, and anywhere else a small camera might fit. These automated license plate reader systems, or ALPRs, are employed by an increasingly diverse range of surveillance-seekers, from toll booths to homeowners associations.

Police are a major consumer of the ALPR spigot. For them, tracking the humble license plate is a relatively cheap means of covertly tracking a person’s movements while — as with all the data offered by LexisNexis — potentially bypassing Fourth Amendment considerations. The trade in bulk license plate data is generally unregulated, and information about scanned plates is indiscriminately aggregated, stored, shared, and eventually sold through companies like LexisNexis.

A major portion of the LexisNexis overview document details ICE’s access to and myriad use of license plate reader data to geolocate its targets, providing the agency with 30 million new plate records monthly. The document says ICE can access data on any license plate query going back years; while the time frame for different kinds of investigations aren’t specified, the contract document says immigration investigations can query location and other data on a license plate going back five years.

“This begins to look a lot like indiscriminate, warrantless real-time surveillance capabilities for ICE with respect to any vehicle.”

The LexisNexis license plate bounty provides ICE investigators with a variety of location-tracking surveillance techniques, including the ability to learn which license plates — presumably including people under no suspicion of any wrongdoing — have appeared in a location of interest. Users subscribing to LexisNexis’s LEIDS program can also plug a plate into the system, and LexisNexis will automatically share updates on the car as they come in, including maps and vehicle images. ICE investigators are allowed to place up to 2,500 different license plates onto their own watchlist simultaneously, the contract notes.

ICE agents can also bring the LexisNexis car-tracking tech on the road through a dedicated smartphone app that allows them to, with only a few taps, snap a picture of someone’s plate to automatically place them on the watchlist. Once a plate of interest is snapped and uploaded, ICE agents then need only to wait for a convenient push notification informing them that there’s been activity detected about the car.

Combining the staggering number of plates with the ability to search them from anywhere provides a potent tool with little oversight, according to Tucker, of Georgetown Law.

Tucker told The Intercept, “This begins to look a lot like indiscriminate, warrantless real-time surveillance capabilities for ICE with respect to any vehicle encountered by any agent in any context.”

LexisNexis’s LEIDS program is, crucially, not an outlier in the United States. For-profit data brokers are increasingly tapped by law enforcement and intelligence agencies for both the vastness of the personal information they collect and the fact that this data can be simply purchased rather than legally obtained with a judge’s approval.

“Today, in a way that far fewer Americans seem to understand, and even fewer of them can avoid, CAI includes information on nearly everyone,” warned a recently declassified report from the Office of the Director of National Intelligence on so-called commercially available information. Specifically citing LexisNexis, the report said the breadth of the information “could be used to cause harm to an individual’s reputation, emotional well-being, or physical safety.”

While the ICE contract document is replete with mentions of how these tools will be used to thwart criminality — obscuring the extent to which this the ends up deporting noncriminal migrants guilty of breaking only civil immigration rules — Tucker said the public should take seriously the inflated ambitions of ICE’s parent agency, the Department of Homeland Security.

“What has happened in the last several years is that DHS’s ‘immigration enforcement’ activities have been subordinated to its mass surveillance activities,” Tucker said, “which produce opportunities for immigration enforcement but no longer have the primary purpose of immigration enforcement.”

“What has happened in the last several years is that DHS’s ‘immigration enforcement’ activities have been subordinated to its mass surveillance activities.”

The federal government allows the general Homeland Security apparatus so much legal latitude, Tucker explained, that an agency like ICE is the perfect vehicle for indiscriminate surveillance of the general public, regardless of immigration status.

“That’s not to say that DHS isn’t still detaining and deporting hundreds of thousands of people every year. Of course they are, and it’s horrific,” Tucker said. “But the main goal of DHS’s surveillance infrastructure is not immigration enforcement, it’s … surveillance.

“Use the agency that operates with the fewest legal and political restraints to put everyone inside a digital panopticon, and then figure out who to target for what kind of enforcement later, depending on the needs of the moment.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/06/20/lexisnexis-is-selling-your-personal-data-to-ice-so-it-can-try-to-predict-crimes/feed/ 0 405477
The Frankenstein Chatbots are Erupting https://www.radiofree.org/2023/06/17/the-frankenstein-chatbots-are-erupting/ https://www.radiofree.org/2023/06/17/the-frankenstein-chatbots-are-erupting/#respond Sat, 17 Jun 2023 14:59:32 +0000 https://dissidentvoice.org/?p=141182 Rick Claypool is a level-headed policy analyst and number-cruncher for Public Citizen, who is known for reporting the decline in corporate crime enforcement with each succeeding Presidency. (Biden less than Trump). His latest report (with Cheyenne Hunt) clearly shows him in an unusually agitated state. Its title is “‘Sorry in Advance!’ Rapid Rush to Deploy Generative A.I. Risks a Wide Array of Automated Harms.”

Claypool is not engaging in hyperbole or horrible hypotheticals concerning Chatbots controlling humanity. He is extrapolating from what is already starting to happen in almost every sector of our society.

I challenge you to read his report without experiencing cognitive dissonance and throwing up your hands thinking the genie is already out of a million bottles. Claypool takes you through “… real-world harms [that] the rush to release and monetize these tools can cause – and, in many cases, is already causing.”

Claypool’s analysis takes you through five broad areas of concern, excluding the horrific autonomous weapons the Department of Defense (aka the Department of Offense) is deeply involved in developing. The various section titles of his report foreshadow the coming abuses: “Damaging Democracy,” “Consumer Concerns” (rip-offs and vast privacy surveillances), “Worsening Inequality,” “Undermining Worker Rights” (and jobs), and “Environmental Concerns” (damaging the environment via their carbon footprints).

Before he gets specific, Claypool previews his conclusion: “Until meaningful government safeguards are in place to protect the public from the harms of generative A.I., we need a pause.” Just how, he doesn’t say. Because with so many increasing generators of these Chatbots around the world, this flood of Frankenstein Chatbots may present a problem the Dean of the Harvard Law School, Roscoe Pound, described regarding the prohibition of alcoholic beverages in the 1920s as being beyond “the limits of effective legal action.”

Claypool quotes Sam Altman, CEO of OpenAI, who released last November the shocking ChatGPT A.I. product, saying afterward: “I think we are potentially not that far away from potentially scary ones.” Altman has been busy up on Capitol Hill mesmerizing legislators by saying “regulation is needed” by which he means the industry itself writing the rules and standards for Congress.

Using its existing authority, the Federal Trade Commission, in the author’s words “… has already warned that generative A.I. tools are powerful enough to create synthetic content – plausible sounding news stories, authoritative-looking academic studies, hoax images, and deepfake videos – and that this synthetic content is becoming difficult to distinguish from authentic content.” He adds that “…these tools are easy for just about anyone to use.” BIG TECH is rushing way ahead of any legal framework for AI in the quest for big profits, while pushing for self-regulation instead of the constraints imposed by the rule of law.

There is no end to the predicted disasters, both from people inside the industry and its outside critics. Destruction of livelihoods, harmful health impacts from promotion of quack remedies, financial fraud, political and electoral fakeries, stripping of the information commons, subversion of the open internet, faking your facial image, voice, words, and behavior, tricking you and others with lies every day. AI’s potential for deception will make Fox News’ deceptions look comparatively restrained.

With Congress and the White House issuing unenforceable exhortations to the industry to be nice, safe and responsible, critics are looking to the European Union’s first stage passage of an A.I. Act to protect its people from the more overt damages to their common and individual rights and interests. The Act’s focus is on which uses of A.I. need to be curbed, including the adverse impact on elections. It mandates the labeling of A.I.-generated content. On May 16, 2023, Public Citizen petitioned the Federal Election Commission to issue a rule preventing the use of AI to deceive voters.

All legislative bodies will have to confront the barriers of secrecy – claims by governments on weapons and surveillance development and the already asserted “trade secrets” by corporations. In the U.S., there will also be First Amendment defenses for free speech by these artificial entities called corporations. Their corporate lawyers will have a lucrative field day concocting delays and obstructions.

Our nation and the world are barely organized enough to control through treaties the use of nuclear weapons – through treaties, poorly prepared for devastating pandemics, and virtually nowhere in foreseeing and forestalling the mega-threats of generative A.I. “to society and humanity.” Those were the words of an open warning letter calling for a six-month pause, signed by top CEOs (such as Elon Musk), technologists and academics.

With few exceptions, a lazy Congress, readying for a long July 4 holiday break followed by taking off all of August for a congressional recess, is oblivious to its special powers and duties to the American people. Let’s see some congressional urgency to put some specificity and enforcement teeth behind and beyond Biden’s nonbinding “Blueprint for an AI Bill of Rights” published by the White House Office of Science and Technology Policy in October 2022.

Rep. Ted Lieu (D-CA), who sits on the House Committee on Science, Space and Technology, is pushing for the creation of a new federal agency to regulate A.I. Technologies.

For now, I have two recommendations. Demand your Senators and Representatives join you for local town meetings during Congress’s August recess where you and your lawmakers can listen to each other and address the pressing issues. Tell them that this run-away robotic juggernaut is stripping humans of their own mental identities, autonomy and self-reliant judgments.

Everyone is at risk. Even Microsoft and Google have little idea of the whirlwind they are unleashing, driven by shortsighted profits, not wisdom, civic principles and accountabilities to public institutions and the people themselves. Have your local experts formulate the focus of the town meeting agendas, backed by your sense of urgency.

Then demand that your members of Congress end their three-day a week work routine and conduct rigorous hearings in D.C. and around the country with a deadline for passing legislation. Tell them they, too, are at risk for the fakery, slander, and imitations of the Chatbots.

Lastly, upgrade and make more precise your skepticism toward the Chatbots already entering and affecting your lives and localities. Be on guard and develop an ever-larger circle of trusting relatives, friends, neighbors and coworkers.

The corporate Chatbots are coming on fast without any legal or ethical frameworks to restrain and discipline them from subverting your freedoms and true sense of realities.


This content originally appeared on Dissident Voice and was authored by Ralph Nader.

]]>
https://www.radiofree.org/2023/06/17/the-frankenstein-chatbots-are-erupting/feed/ 0 404795
Ted Kaczynski, Technology and Trauma https://www.radiofree.org/2023/06/16/ted-kaczynski-technology-and-trauma/ https://www.radiofree.org/2023/06/16/ted-kaczynski-technology-and-trauma/#respond Fri, 16 Jun 2023 05:51:07 +0000 https://www.counterpunch.org/?p=286165 Henry A. Murray has much to answer for.  Between 1959 and 1961, the Harvard psychology academic, as the leader of a team of equally unprincipled academics, was responsible for conducting an CIA-funded experiment most unethical on twenty-two undergraduates.  The individuals in question were pseudonymised.  One particularly youthful figure, named “Lawful”, was the mathematically gifted Theodore John Kaczynski. A central theme More

The post Ted Kaczynski, Technology and Trauma appeared first on CounterPunch.org.


This content originally appeared on CounterPunch.org and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2023/06/16/ted-kaczynski-technology-and-trauma/feed/ 0 404357
A once-shuttered California mine is trying to transform the rare earth industry https://grist.org/energy/a-once-shuttered-california-mine-is-trying-to-transform-the-rare-earth-industry/ https://grist.org/energy/a-once-shuttered-california-mine-is-trying-to-transform-the-rare-earth-industry/#respond Thu, 15 Jun 2023 10:45:00 +0000 https://grist.org/?p=612118 In arid southeastern California, just across the border from Nevada, sits the only large-scale rare earth element mine in the Western Hemisphere. Here at Mountain Pass, rocks are dug out of a 400-foot pit in the ground, crushed, and liquified into a concentrated soup of metals that are essential for the magnets inside consumer electronics, wind turbines, and electric vehicles, or EVs. Today, that metallic soup is shipped to China, where individual rare earths are separated before being refined into metals and forged into magnets. But MP Materials, the company that took ownership of the 70 year-old Mountain Pass mine in 2017, hopes to change that. This quarter, MP Materials plans to begin separating rare earths at Mountain Pass — the first time this key processing step will have occurred in the United States since 2015. 

MP Materials says that the new U.S.-based rare earth supply chain it is building will be greener than its counterparts in Asia, where the mining and processing of rare earths have created nightmarish pollution problems. Some of its domestically processed rare earths will be used to make alloys and magnets for EVs, and others could help renewables developers build the wind turbines the U.S. desperately needs to decarbonize its power sector. MP Materials’ rare earths could also get used in everything from smartphones to military weapons like drones and missiles. 

Julie Klinger, a geographer at the University of Delaware who studies the global rare earth industry, said MP Materials’ new processing capabilities have the potential to be a “best-case scenario in terms of diversifying the global supply chain and also doing so in a comparably robust regulatory environment.” However, Klinger cautioned that from a sustainability perspective, it’s important to minimize new mining overall. That could mean prioritizing the use of rare earths in clean energy versus military applications, or dramatically ramping up rare earth recycling, an industry still in its infancy.

Owing to their unique atomic structure, rare earth elements are able to generate stronger magnetic fields than other elements susceptible to magnetization, like iron. As a result, rare earths can be used to create the most powerful commercial magnets on the market today. Within the clean energy sector, they’re used in the types of generators popular for offshore wind turbines, as well as inside the motors of EVs and hybrid vehicles. These magnets get their strength from the “light,” or lower atomic weight, rare earth elements neodymium and praseodymium, which are often refined together as a compound called NdPr oxide. A pinch of dysprosium or terbium, two of the scarcer and more valuable “heavy” rare earth elements, is added to the mix to boost the magnet’s heat resistance.

Rare earths magnets are used in the types of generators popular for offshore wind turbines. ANDY BUCHANAN / AFP via Getty Images

Demand for rare earth magnets is growing quickly. By 2030, under an aggressive decarbonization scenario, the U.S. EV sector’s rare earth magnet demand could rise nearly sixfold compared with 2020 levels, according to a recent report by the U.S. Department of Energy, or DOE. Over the same time frame, rare earth magnet demand for the nascent offshore wind industry could rise from zero to 10,000 tons. These trends mirror what’s expected worldwide: In a report published in April, critical minerals research firm Adamas Intelligence forecasted that the value of the market for rare earths used in magnets will increase fivefold by 2040, driven by rapid growth of the EV and wind energy sectors. By that same year, the world could face a 90,000-ton-per-year shortfall of NdPr oxide, roughly equivalent to total global production in 2022. 

As the U.S. competes with other nations for these critical resources, one country dominates their production. In 2020, China was responsible for 58 percent of rare earth mining, 89 percent of rare earth separations (including nearly 100 percent of heavy rare earth separations), 90 percent of rare earth refining, and 92 percent of magnet-making. While the Chinese government has attempted to reduce the rare earth industry’s environmental impact in recent years, decades of poorly regulated production, along with illegal mining, have caused significant air and water pollution, leaving behind nightmarish waste ponds filled with heavy metals and radioactive elements. (Rare earths tend to occur alongside the radioactive elements thorium and uranium, resulting in the production of low-level radioactive waste during mining and processing.) In neighboring Myanmar, where illegal rare earth mining is taking off today, the situation is equally bleak.

MP Materials is positioning itself as an alternative to Asian dominance of the rare earth supply chain and its questionable environmental legacy. The company assumed ownership of the Mountain Pass mine in 2017 after its previous owner, Molycorps, struggled to become profitable and ultimately filed for bankruptcy. Since then, MP Materials has been steadily ramping up rare earth production at Mountain Pass, generating 14,000 tons of rare earth oxides in 2018, and 28,000 tons the following year. Last year, Mountain Pass produced 42,499 metric tons of rare earths — the highest output in the mine’s history, and 14 percent of the global total.

The revival of Mountain Pass has already reconfigured the global rare earth mining landscape. Now, MP Materials seeks to redraw the rest of the supply chain. After rare earths are mined and concentrated in liquid form, companies use additional steps like roasting and leaching to separate out impurities and unwanted elements, such as cerium, a low-value light rare earth. From there, a series of chemical extraction processes separate elements of interest. Separated rare earth oxides are then converted into metals through processes like electrowinning, in which metals are extracted from a solution by running an electric current through it. Rare earth metals are then pressed, or sintered, into a magnetic block which can be cut into a desired shape.

The view inside the mill where minerals are extracted from rock at Mountain Pass Mine in 2019. Ricky Carioti / The Washington Post via Getty Images

MP Materials is in the process of investing $700 million to develop all of these capabilities in the U.S. In 2021, the company began upgrading the refinery at Mountain Pass to restore its processing capabilities, including rare earth separations. According to the company’s earnings call for the first quarter of 2023, the facility will begin separating NdPr oxide this quarter. With the help of a $35 million contract from the US Department of Defense, or DOD, the company is planning additional upgrades to separate the 11 elements classified as medium and heavy rare earths, focusing on the magnet elements dysprosium and terbium. Once these capabilities exist, MP Materials will ship processed rare earths from California to a new facility under construction in Fort Worth, Texas, where they will be used to make alloys and magnets for General Motors EVs. 

While the concentrations of dysprosium and terbium in Mountain Pass ore is low, Matt Sloustcher, senior vice president of communications and policy at MP Materials, says MP Materials expects to produce enough of them to “cover the needs of its Texas magnetics factory.” MP Materials’ facilities will also be capable of refining material mined elsewhere, including material with a higher relative abundance of heavy rare earths.

According to Sloustcher, the company’s goal is to begin supplying General Motors with rare earth alloy later this year, and to produce finished magnets by 2025. At full capacity, MP Materials expects the magnetics factory to produce 1,000 tons of rare earth magnets a year, supporting the production of roughly half a million EV motors.

Under Molycorp’s ownership in the 1990s and early 2000s, the Mountain Pass mine was beset with environmental scandals related to the handling of radioactive wastewater, which Molycorp pumped into open-air evaporation ponds in the desert. To avoid repeating that history, MP Materials is operating Mountain Pass as a “zero discharge” facility, meaning all of the water it uses is recycled on site, with dry waste buried in lined landfills. It claims to be the only rare earth mine in the world to use this process.

From an environmental perspective, MP Materials’ water recycling process process is “a really big deal,” said Klinger. “It significantly reduces their waste footprint.”

The refining processes MP Materials is adding will inevitably increase its environmental footprint. Owing to their chemical similarity, separating rare earths from one another is extraordinarily complicated. Separation processes, which can include hundreds of different steps, consume large volumes of water, chemicals, and energy. The company says it is intent on minimizing resource use, and to that end is recycling chemicals throughout its process. In addition, it has introduced a roasting step to remove cerium before attempting to separate other elements, which MP Materials believes will improve the efficiency of the entire process. Cerium comprises nearly half of the rare earth mixture present in Mountain Pass ore.

Eric Schelter, a professor of chemistry at the University of Pennsylvania who studies rare earth separations, agrees that this roasting step will make it “relatively simpler” to separate the rare earths of value. But he says that if there is no market for the cerium, it must be disposed of as waste, driving up costs. In general, Schelter cautions that the economics of rare earth production are challenging and have worked against U.S. industry in the past. 

“Personally, I think it would be great” if MP Materials were successful, Schelter said. “This is a really significant need. But ultimately, the marketplace is going to decide that it is, or is not, worthwhile to buy these magnets or buy these materials from them.”

Sloustcher, from MP Materials, agrees that profitably producing rare earths is challenging considering the large quantities of low-value materials that need to be sifted out first, including both cerium and the light rare earth lanthanum. However, he says the company has identified customers that are “eager for U.S.-produced cerium and lanthanum products,” which are used in water treatment and fuel manufacturing processes, among others. NdPr oxide, Sloustcher says, is the “key commodity that drives economic value” in the rare earth industry, and MP Materials believes it is “a low-cost NdPr producer globally.” Sloustcher added that the company has already proven it can produce rare earths at a profit for several years.

To ensure no valuable rare earth material is wasted, MP Materials is also planning to recycle the scrap produced during magnet fabrication, as well as end-of-life magnets. The goal, Sloustcher says, is re-introduce recyclable material at whatever point in the process flow it is most efficient, whether that means using scrap to produce new magnets directly or separating it back to individual elements. Schelter believes that the latter approach will make it easier to scale up recycling, because different types of magnets contain different amounts of rare earths. 

hands hold a pile of rocky soil
A worker at the Mountain Pass Mine holds Bastnasite on May 30, 2019. Ricky Carioti / The Washington Post via Getty Images

An unknown but likely very small fraction of rare earths are recycled at end-of-life today.

“Recycling magnets from phones, hard drives, and wind turbines can provide magnets of different grades,” Schelter said. “Collecting them from different sources would be enabled by a chemistry that purified the individual rare earths back out again.” 

Klinger, the University of Delaware researcher, is excited about MP Materials’ interest in rare earths recycling, and its pitch for a greener supply chain more broadly. However, any new rare earth production will have an environmental cost, and Klinger says that the extent of the impacts ultimately comes down to our consumption of rare earths — not just for clean energy and personal electronics, but also weapons of war. Rare earths are essential for a variety of defense applications, including drones, missile guidance, tank and aircraft motors, and advanced laser systems. In addition to investing tens of millions in both light and heavy rare earth processing at Mountain Pass, the DOD recently awarded Australian company Lynas a $120 million contract to build a rare earth separations facility in Texas, expected online in 2025. 

The DOD declined to comment on the fraction of rare earths from these new U.S. processing facilities that could ultimately make their way into defense applications. However, a DOD official told Grist in an emailed statement that generally speaking, rare earth demand for civilian applications like clean energy “vastly exceeds projected defense demand.”

Nevertheless, Klinger worries that military industrial demand for rare earths will rise as conflicts intensify across the world and the global arms trade grows. She suspects that reining in this demand will lead to the “greatest gains” in terms of reducing the need for new mining overall, and she’s in the process of gathering data to explore the idea further.

“I am a little concerned,” Klinger said, “by what the overemphasis on the energy transition might be covering up.”

This story was originally published by Grist with the headline A once-shuttered California mine is trying to transform the rare earth industry on Jun 15, 2023.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/energy/a-once-shuttered-california-mine-is-trying-to-transform-the-rare-earth-industry/feed/ 0 403971
Never More Relevant: Ted Kaczynski, Technology and Trauma https://www.radiofree.org/2023/06/15/never-more-relevant-ted-kaczynski-technology-and-trauma/ https://www.radiofree.org/2023/06/15/never-more-relevant-ted-kaczynski-technology-and-trauma/#respond Thu, 15 Jun 2023 08:12:42 +0000 https://dissidentvoice.org/?p=141121 Henry A. Murray has much to answer for. Between 1959 and 1961, the Harvard psychology academic, as the leader of a team of equally unprincipled academics, was responsible for conducting an CIA-funded experiment most unethical on twenty-two undergraduates. The individuals in question were pseudonymised. One particularly youthful figure, named “Lawful”, was the mathematically gifted Theodore John Kaczynski.

A central theme of the experiments was examining the effects of stress, characterised by what Murray called “vehement, sweeping, and personally abusive” attacks. Ideals and beliefs were assailed; egos pulverised. For Murray, this came naturally. He had cut his teeth designing psychological screening tests for the forerunner to the CIA, the Office of Strategic Services. It was perfect preparation for what came to be known as Multiform Assessments of Personality Development Among Gifted College Men.

Kaczynski was the less than grateful recipient of the higher end of the experiment. “I had been talked or pressured,” he told his attorney Michael Mello in August 1998, “into participating in the Murray study against my better judgment.” It is indisputable that he, along with other subjects, had been sufficiently deceived to be victims of a breach of experimental ethics known more commonly as the Nuremberg Code.

Drafted in the aftermath of the Nuremberg War Crimes Trial of German concentration camp doctors, the code stressed the importance of informed consent. “The voluntary consent of the human subject is absolutely essential,” declared the judges responsible for formulating the code. The subject should also be “so situated as to be able to exercise free power of choice, without the intervention of any element of force, fraud, deceit, duress…”

Kaczynski can hardly be said to go on to better things, but they were certainly bigger. In terms of notoriety, his position in the technology obsessed undergrowth of the United States was assured by his murderous and maiming efforts. His favourite method: the package bomb, 16 of which were mailed to his intended victims. Three people died; 23 were injured.

A central tenet of Kaczynski’s thought was levelled at those complicit representatives of what he called the Industrial Society and its state manifestation. Far from being critical of power, its methods, and its wielding by bureaucrats and planners, its members were adjutants and prosecutors of a sinister agenda of behavioural control.

The profiles of the victims, actual and intended, constituted a true fruit salad, at times erratic and scattered: academics in engineering, psychology, genetics and computer science; the president of the California Forestry Association; a computer store owner; an advertising executive; American Airlines Flight 444 and the United Airlines President.

In its unifying theme, the manifesto, Industrial Society and Its Future, opens its barrels on the role of technology. “The Industrial Revolution and its consequences,” goes the grave opening, “have been a disaster for the human race.” While it had “greatly increased the life-expectancy of those of us who live in ‘advanced’ countries”, society had been destabilised, life made “unfulfilling”. Humans had been subjected to “indignities” and “widespread psychological suffering (in the Third World to physical suffering as well)”. The “natural world” had also suffered.

James Ley, reflecting on Kaczynski’s writing, finds his understanding of technology to be “the ultimate constraint on freedom, beyond any specific laws or political arrangements that might obtain.” The conservatives are deluded for conniving in the destruction of their own ideals in embracing technology; leftists merely pursue goals of improvement without dealing with the elephant in the room: the properties of technological enslavement.

In an area of surveillance capitalism, inexorable data mining, and Mark Zuckerberg, there is something haunting about this. The manifesto may not be the sprightliest work of originality, but the vision is contemporary and relevant. The technological society systematically oppresses; it cannot be regulated. With that monstrous genie out of the bottle, it can only be, according to Kaczynski, destroyed.

Kaczynski defied the authorities and the technological state he so despised, eluding capture for almost two decades. Being incapable of summoning the forces to destroy technology, he eschewed it, becoming a rustic version of the Savage in Aldous Huxley’s Brave New World, the man who “ate civilization”, and in so doing ate his own wickedness.

He lived in a cabin near Lincoln, Montana, a place in every sense off the grid: no electricity, no television, no telephone. He moved about with a bicycle. He took an interest in regeneration in nature. He even foraged. This was his way of romancing the notion of the “pre-industrial city”, as he termed it, where the “19th century frontiersman” could create “change himself, by his own choice.” Change for the “modern man”, in contrast, was “imposed”.

Despite isolation, his pride proved too powerful, the need for recognition, consuming. His efforts to get the New York Times and Washington Post to publish his 35,000-word manifesto undid him. His brother David, and sister-in-law, on realising he was the author, identified him. The FBI, furnished by letters and documents provided by David, joined the dots, arresting Kaczynski on April 3, 1996.

The stage was set for the Unabomber to become a figure of medical interest. At trial, fearing that his brother would receive the death sentence, David, and the defence, opted for psychopathological grounds. Did the Murray experiments tip him over? The lawyers ran with the argument that the Harvard experience had provided the bricks and mortar of paranoid schizophrenia. Their client begged, with tenacious fury, to differ. His terrorism had been principled, rational, his Weltanschauung outlined in his manifesto. To suggest medical illness and disturbance was to give into the pathologizing agenda, something that would render him mad and therefore illegitimate as a thinker.

Far from being mad, the dystopia of Kaczynski’s industrial society has found solid roots. And the forces behind it, be they the myriad of social networks, data hungry platforms and the increasingly agitated discussion about Artificial Intelligence and its generative properties, implicates us all.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2023/06/15/never-more-relevant-ted-kaczynski-technology-and-trauma/feed/ 0 403957
Never More Relevant: Ted Kaczynski, Technology and Trauma https://www.radiofree.org/2023/06/15/never-more-relevant-ted-kaczynski-technology-and-trauma-2/ https://www.radiofree.org/2023/06/15/never-more-relevant-ted-kaczynski-technology-and-trauma-2/#respond Thu, 15 Jun 2023 08:12:42 +0000 https://dissidentvoice.org/?p=141121 Henry A. Murray has much to answer for. Between 1959 and 1961, the Harvard psychology academic, as the leader of a team of equally unprincipled academics, was responsible for conducting an CIA-funded experiment most unethical on twenty-two undergraduates. The individuals in question were pseudonymised. One particularly youthful figure, named “Lawful”, was the mathematically gifted Theodore John Kaczynski.

A central theme of the experiments was examining the effects of stress, characterised by what Murray called “vehement, sweeping, and personally abusive” attacks. Ideals and beliefs were assailed; egos pulverised. For Murray, this came naturally. He had cut his teeth designing psychological screening tests for the forerunner to the CIA, the Office of Strategic Services. It was perfect preparation for what came to be known as Multiform Assessments of Personality Development Among Gifted College Men.

Kaczynski was the less than grateful recipient of the higher end of the experiment. “I had been talked or pressured,” he told his attorney Michael Mello in August 1998, “into participating in the Murray study against my better judgment.” It is indisputable that he, along with other subjects, had been sufficiently deceived to be victims of a breach of experimental ethics known more commonly as the Nuremberg Code.

Drafted in the aftermath of the Nuremberg War Crimes Trial of German concentration camp doctors, the code stressed the importance of informed consent. “The voluntary consent of the human subject is absolutely essential,” declared the judges responsible for formulating the code. The subject should also be “so situated as to be able to exercise free power of choice, without the intervention of any element of force, fraud, deceit, duress…”

Kaczynski can hardly be said to go on to better things, but they were certainly bigger. In terms of notoriety, his position in the technology obsessed undergrowth of the United States was assured by his murderous and maiming efforts. His favourite method: the package bomb, 16 of which were mailed to his intended victims. Three people died; 23 were injured.

A central tenet of Kaczynski’s thought was levelled at those complicit representatives of what he called the Industrial Society and its state manifestation. Far from being critical of power, its methods, and its wielding by bureaucrats and planners, its members were adjutants and prosecutors of a sinister agenda of behavioural control.

The profiles of the victims, actual and intended, constituted a true fruit salad, at times erratic and scattered: academics in engineering, psychology, genetics and computer science; the president of the California Forestry Association; a computer store owner; an advertising executive; American Airlines Flight 444 and the United Airlines President.

In its unifying theme, the manifesto, Industrial Society and Its Future, opens its barrels on the role of technology. “The Industrial Revolution and its consequences,” goes the grave opening, “have been a disaster for the human race.” While it had “greatly increased the life-expectancy of those of us who live in ‘advanced’ countries”, society had been destabilised, life made “unfulfilling”. Humans had been subjected to “indignities” and “widespread psychological suffering (in the Third World to physical suffering as well)”. The “natural world” had also suffered.

James Ley, reflecting on Kaczynski’s writing, finds his understanding of technology to be “the ultimate constraint on freedom, beyond any specific laws or political arrangements that might obtain.” The conservatives are deluded for conniving in the destruction of their own ideals in embracing technology; leftists merely pursue goals of improvement without dealing with the elephant in the room: the properties of technological enslavement.

In an area of surveillance capitalism, inexorable data mining, and Mark Zuckerberg, there is something haunting about this. The manifesto may not be the sprightliest work of originality, but the vision is contemporary and relevant. The technological society systematically oppresses; it cannot be regulated. With that monstrous genie out of the bottle, it can only be, according to Kaczynski, destroyed.

Kaczynski defied the authorities and the technological state he so despised, eluding capture for almost two decades. Being incapable of summoning the forces to destroy technology, he eschewed it, becoming a rustic version of the Savage in Aldous Huxley’s Brave New World, the man who “ate civilization”, and in so doing ate his own wickedness.

He lived in a cabin near Lincoln, Montana, a place in every sense off the grid: no electricity, no television, no telephone. He moved about with a bicycle. He took an interest in regeneration in nature. He even foraged. This was his way of romancing the notion of the “pre-industrial city”, as he termed it, where the “19th century frontiersman” could create “change himself, by his own choice.” Change for the “modern man”, in contrast, was “imposed”.

Despite isolation, his pride proved too powerful, the need for recognition, consuming. His efforts to get the New York Times and Washington Post to publish his 35,000-word manifesto undid him. His brother David, and sister-in-law, on realising he was the author, identified him. The FBI, furnished by letters and documents provided by David, joined the dots, arresting Kaczynski on April 3, 1996.

The stage was set for the Unabomber to become a figure of medical interest. At trial, fearing that his brother would receive the death sentence, David, and the defence, opted for psychopathological grounds. Did the Murray experiments tip him over? The lawyers ran with the argument that the Harvard experience had provided the bricks and mortar of paranoid schizophrenia. Their client begged, with tenacious fury, to differ. His terrorism had been principled, rational, his Weltanschauung outlined in his manifesto. To suggest medical illness and disturbance was to give into the pathologizing agenda, something that would render him mad and therefore illegitimate as a thinker.

Far from being mad, the dystopia of Kaczynski’s industrial society has found solid roots. And the forces behind it, be they the myriad of social networks, data hungry platforms and the increasingly agitated discussion about Artificial Intelligence and its generative properties, implicates us all.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2023/06/15/never-more-relevant-ted-kaczynski-technology-and-trauma-2/feed/ 0 403958
Algorithm Used in Jordanian World Bank Aid Program Stiffs the Poorest https://www.radiofree.org/2023/06/13/algorithm-used-in-jordanian-world-bank-aid-program-stiffs-the-poorest/ https://www.radiofree.org/2023/06/13/algorithm-used-in-jordanian-world-bank-aid-program-stiffs-the-poorest/#respond Tue, 13 Jun 2023 15:42:46 +0000 https://production.public.theintercept.cloud/?p=431206

A program spearheaded by the World Bank that uses algorithmic decision-making to means-test poverty relief money is failing the very people it’s intended to protect, according to a new report by Human Rights Watch. The anti-poverty program in question, known as the Unified Cash Transfer Program, was put in place by the Jordanian government.

Having software systems make important choices is often billed as a means of making those choices more rational, fair, and effective. In the case of the poverty relief program, however, the Human Rights Watch investigation found the algorithm relies on stereotypes and faulty assumptions about poverty.

“Its formula also flattens the economic complexity of people’s lives into a crude ranking.”

“The problem is not merely that the algorithm relies on inaccurate and unreliable data about people’s finances,” the report found. “Its formula also flattens the economic complexity of people’s lives into a crude ranking that pits one household against another, fueling social tension and perceptions of unfairness.”

The program, known in Jordan as Takaful, is meant to solve a real problem: The World Bank provided the Jordanian state with a multibillion-dollar poverty relief loan, but it’s impossible for the loan to cover all of Jordan’s needs.  

Without enough cash to cut every needy Jordanian a check, Takaful works by analyzing the household income and expenses of every applicant, along with nearly 60 socioeconomic factors like electricity use, car ownership, business licenses, employment history, illness, and gender. These responses are then ranked — using a secret algorithm — to automatically determine who are the poorest and most deserving of relief. The idea is that such a sorting algorithm would direct cash to the most vulnerable Jordanians who are in most dire need of it. According to Human Rights Watch, the algorithm is broken.

The rights group’s investigation found that car ownership seems to be a disqualifying factor for many Takaful applicants, even if they are too poor to buy gas to drive the car.

Similarly, applicants are penalized for using electricity and water based on the presumption that their ability to afford utility payments is evidence that they are not as destitute as those who can’t. The Human Rights Watch report, however, explains that sometimes electricity usage is high precisely for poverty-related reasons. “For example, a 2020 study of housing sustainability in Amman found that almost 75 percent of low-to-middle income households surveyed lived in apartments with poor thermal insulation, making them more expensive to heat.”

In other cases, one Jordanian household may be using more electricity than their neighbors because they are stuck with old, energy-inefficient home appliances.

Beyond the technical problems with Takaful itself are the knock-on effects of digital means-testing. The report notes that many people in dire need of relief money lack the internet access to even apply for it, requiring them to find, or pay for, a ride to an internet café, where they are subject to further fees and charges to get online.

“Who needs money?” asked one 29-year-old Jordanian Takaful recipient who spoke to Human Rights Watch. “The people who really don’t know how [to apply] or don’t have internet or computer access.”

Human Rights Watch also faulted Takaful’s insistence that applicants’ self-reported income match up exactly with their self-reported household expenses, which “fails to recognize how people struggle to make ends meet, or their reliance on credit, support from family, and other ad hoc measures to bridge the gap.”

The report found that the rigidity of this step forced people to simply fudge the numbers so that their applications would even be processed, undermining the algorithm’s illusion of objectivity. “Forcing people to mold their hardships to fit the algorithm’s calculus of need,” the report said, “undermines Takaful’s targeting accuracy, and claims by the government and the World Bank that this is the most effective way to maximize limited resources.”

The report, based on 70 interviews with Takaful applicants, Jordanian government workers, and World Bank personnel, emphasizes that the system is part of a broader trend by the World Bank to popularize algorithmically means-tested social benefits over universal programs throughout the developing economies in the so-called Global South.

Confounding the dysfunction of an algorithmic program like Takaful is the increasingly held naïve assumption that automated decision-making software is so sophisticated that its results are less likely to be faulty. Just as dazzled ChatGPT users often accept nonsense outputs from the chatbot because the concept of a convincing chatbot is so inherently impressive, artificial intelligence ethicists warn the veneer of automated intelligence surrounding automated welfare distribution leads to a similar myopia.

The Jordanian government’s official statement to Human Rights Watch defending Takaful’s underlying technology provides a perfect example: “The methodology categorizes poor households to 10 layers, starting from the poorest to the least poor, then each layer includes 100 sub-layers, using statistical analysis. Thus, resulting in 1,000 readings that differentiate amongst households’ unique welfare status and needs.”

“These are technical words that don’t make any sense together.”

When Human Rights Watch asked the Distributed AI Research Institute to review these remarks, Alex Hanna, the group’s director of research, concluded, “These are technical words that don’t make any sense together.” DAIR senior researcher Nyalleng Moorosi added, “I think they are using this language as technical obfuscation.”

As is the case with virtually all automated decision-making systems, while the people who designed Takaful insist on its fairness and functionality, they refuse to let anyone look under the hood. Though it’s known Takaful uses 57 different criteria to rank poorness, the report notes that the Jordanian National Aid Fund, which administers the system, “declined to disclose the full list of indicators and the specific weights assigned, saying that these were for internal purposes only and ‘constantly changing.’”

While fantastical visions of “Terminator”-like artificial intelligences have come to dominate public fears around automated decision-making, other technologists argue civil society ought to focus on real, current harms caused by systems like Takaful, not nightmare scenarios drawn from science fiction.

So long as the functionality of Takaful and its ilk remain government and corporate secrets, the extent of those risks will remain unknown.

Join The Conversation


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/06/13/algorithm-used-in-jordanian-world-bank-aid-program-stiffs-the-poorest/feed/ 0 403390
Technology Needs Assessments by Congress Municipalities and Local Civic Groups https://www.radiofree.org/2023/06/13/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups-3/ https://www.radiofree.org/2023/06/13/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups-3/#respond Tue, 13 Jun 2023 05:50:55 +0000 https://www.counterpunch.org/?p=285925

Photograph Source: Kai Kowalewski – CC BY-SA 4.0

The pace of for-profit technological innovations is accelerating, but to what end beyond corporate sales? The gap between marketing new high-tech products and assessing their intended and unintended consequences has never been greater.

Let’s start with the ballooning of augmented reality inside virtual reality. Facebook’s Oculus Rift escapism has flopped. Trying to improve on this bizarre quest to envelop its customers, Apple plans to release the “Vision Pro”, a “mixed-reality” headset so large that Washington Post columnist Molly Roberts described it as “clunky and creepy” and predicted failure for this $3,499 rip-off.

Do mega-corporation CEOs – who spend company profits on massive stock buybacks for no productive use (Apple plans to spend $90 billion on buybacks this year) – spend any money on the lost practice of technology assessment? Do Facebook and Apple have studies on what fantasy goggles are doing to youngsters’ minds? Are these devices producing anxieties, fears or addictions? Do these corporations have more victims than customers? Do the high-tech CEOs care? If they do, they’re not saying.

Let’s move on to the big stuff! Congress has been spending trillions of your taxpayer dollars on technologies of modern weaponry, chemicals, drugs, medical devices, transportation, the Internet, biotechnology, nanotechnology and fusion energy. Yet the general public remains clueless about the adverse impact of these expenditures. Congress doesn’t even know if many technologies or products work as advertised.

You can thank the bombastic, ignorant Newt Gingrich for hurling our 535 members of Congress into this black void. In 1994 Gingrich orchestrated the Republican takeover of the House of Representatives. And, in 1995, after becoming Speaker of the House, Gingrich and the Republican-controlled Congress eliminated the funding of the Congressional Office of Technology Assessment (OTA). With a small $20 million annual budget, OTA produced scores of assessment reports needed by Congress. (See: https://ota.fas.org/otareports/). Senator Edward Kennedy (D-MA) was one of OTA’s strongest supporters, who with other members of Congress served on its bipartisan board. When Congress was debating the creation of OTA, Kennedy said “without an OTA the role of Congress in national science policy would become more and more perfunctory and more and more dependent on administration facts and figures, with little opportunity for independent Congressional evaluation.” Kennedy was furious about the Republican defunding of OTA, but could not marshal enough of his dejected fellow Democrats to fight to restore funding even after Gingrich resigned in disgrace five years later.

The failure of Democrats to fund OTA when they controlled Congress allowed Gingrich’s demolition to continue the wreckage he launched. Technically unadvised members looked foolish for years in their questioning of Silicon Valley executives at public hearings.

Right after Obama’s victory in 2008, carrying large Democratic majorities in the House and Senate, I organized an effort to refund OTA with Nobel laureates and other scientists on board. For many years, Cong. Rush Holt Jr. (D-NJ) led the effort in the House, only to be undermined by Speaker Nancy Pelosi, who said she didn’t want to give the Republicans an opportunity to accuse her of starting another bureaucracy on Capitol Hill. Truly shocking!

Now it is 2023 and the studied ignorance of Congress fuels the strategically useless F-35 Fighter planes at a $1.5 trillion projected cost. Well over a trillion dollars will be spent upgrading the nuclear bomb arsenal – currently able to blow up the world many times over. The unavoidable ballistic missile so-called defense program soaks up billions of dollars yearly (See: “Why Missile Defense Won’t Work” by MIT Professor Ted Postol. The rave for electric vehicles badly needs a thorough technology assessment for its lifecycle costs and benefits.

An adequately funded OTA would have alerted Congress early about the looming opioid crisis and crimes that have taken a million or more American lives. A similar alert from an OTA report, before Covid-19 struck, could have alerted Congress on the lack of preparedness for coming pandemics. Being part of Congress, OTA can command the attention and credibility from members far more easily than any studies or alarms from citizen groups or civically-minded Think Tanks.

Pressing the issue of funding OTA in the 21st century’s second decade brought the Democratic Party’s excuse that either one chamber of Congress or the other half was Republican-controlled. I, with Bruce Fein, Joan Claybrook and Claire Nader, explained to Speaker Pelosi in 2020 that the House or Senate can fund OTA without the concurrence of the other simply on the grounds of its prerogative to more fully fund its own institution. No reply.

It took 86-year-old Congressman Bill Pascrell, Jr. (D-NJ) to publicly chastise his colleagues with articles titled: Why is Congress so dumb? (January 11, 2019, Washington Post) and Congress Is Sabotaging Your Post Office (April 7, 2019, Washington Monthly). Still no visible reaction from the tone-deaf congressional solons busily reducing their own significance under the Constitution and spending money unwisely.

The ongoing lack of local technology assessment capabilities leaves Congress without a grassroots infrastructure of fact-based, nonpartisan analysis.

Municipalities do not have formal little OTAs for their infrastructure projects, so the grasping, politically connected vendors take advantage of such ignorance to increase prices and delay projects and continue shoddiness. Think bridges, highways, schools and public buildings projects.

The science and engineering departments of universities are rarely interested in supplying such knowledge or even teaching the ethics of engineering to their students. In 2018 we sponsored a book titled Ethics, Politics, and Whistleblowing in Engineering by Rania Milleron and Nicholas Sakellariou (CRC Press) that delved into how disasters can occur when engineering professionals don’t take their consciences that reflect their expected responsibilities to work. Three times we sent letters to about two dozen Deans and professors of Engineering around the country encouraging them to develop classes on ethics for their students. Not a single reply. (See, January 2, 2019, Letter to Engineering Professors or Department Heads).

In 1998, our community project in Winsted, Connecticut retained an engineer, Susan M. McGoey, as a “community technologist.” She proved her worth manyfold, catching over-reaches by the engineering firm hired to upgrade the town’s drinking water purification plant. She also advised the town on its municipal watershed stewardship, began a natural resources inventory and organized a successful river clean-up along with many other money-saving projects from redesigning traffic lights to improving downtown renovations.

Readers interested in collaborating with the renewed effort to fund the Office of Technology Assessment (OTA) in Congress can contact their members of Congress, and also connect with us at info@nader.org. It is high time to aggregate dedicated public opinion and advocacy on this inexpensive but very important restoration.


This content originally appeared on CounterPunch.org and was authored by Ralph Nader.

]]>
https://www.radiofree.org/2023/06/13/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups-3/feed/ 0 403201
How Does Technology Factor in for US Militarism toward China? https://www.radiofree.org/2023/06/12/how-does-technology-factor-in-for-us-militarism-toward-china/ https://www.radiofree.org/2023/06/12/how-does-technology-factor-in-for-us-militarism-toward-china/#respond Mon, 12 Jun 2023 23:04:32 +0000 https://dissidentvoice.org/?p=140446
The United States is about militarism. Its economy is largely based on the military-industrial complex. It has hundreds upon hundreds of military bases in lands around the planet. Yet, despite a bloated military budget, the US fails to care for all its citizens, certainly not the millions of homeless, poor, and those unable to afford medical procedures because they are without medical insurance; however, the US does house and feed its soldiers, marines, and air-force personnel abroad. Yet, when it comes to its veterans there is often a price they must pay. Nonetheless, what must not be forgotten is the far greater price paid by the victims of US aggression.

The US claims full-spectrum dominance. US politicians make bellicose statements about which country the US will attack next. And when a pretext is required the US will fabricate one. (See AB Abrams’s excellent book Atrocity Fabrications and Its Consequences, 2023. Review)

I asked Wei Ling Chua, the author of 3 books including Democracy: What the west can learn from China and Tiananmen Square’s “Massacre”? The Power of Words vs Silent Evidence, how aggressive US posturing impacts China.

Kim Petersen: It is clear that the US is waging an economic war against China. However, based on the bombast of several American military and political figures, the US is also pining for a military confrontation. US Air Force four-star general Mike Minihan said his gut warns of a war with China in 2025.  The Chinese claim to most of the South China Sea has caused the US to assert the right to freedom of navigation by sailing its warships off the Chinese coast. But when has China ever denied any ships the right to freely traverse the South China Sea? And as for the disputed territoriality in the South China Sea, why does the US arrogate to itself a supposed right to meddle in the affairs of other countries even those thousands of kilometers from the US shoreline? The Brookings Institute informs that of potential threats worldwide, “China gets pride of place as security challenge number one — even though China has not employed large-scale military force against an adversary since its 1979 war [what even Wikipedia calls a “brief conflict”] with Vietnam.” Consider that the media organ of British capitalism, The Economist, complains that “People’s Liberation Army (PLA) fighter jets keep staging recklessly close, high-speed passes to intimidate Western military aircraft in international airspace near China.” The magazine doesn’t blink at the risible scenario it has described: foreign fighter planes near China. Isn’t there sufficient airspace for American military jets in the US? Or sufficient coastline to practice freedom of navigation with its warships in US waters?

The US is so fixated on the economic rise of China that it even scuppered a multibillion-dollar deal its ally France had to sell submarines to Australia and replace it with nuclear submarines to be supplied by itself and the United Kingdom — AUKUS. The obvious target of the nuclear subs: China. China’s foreign minister Qin Gang has called on the US to put the brakes on to avoid confrontation and conflict. What does all the militaristic hoopla directed at China portend?

Nonetheless, SCMP.com reported on 24 March 2023 that China has developed a coating for its submarines — an “active” tile based on giant magnetostrictive material (GMM) technology — that “could turn the US active sonar technology against itself.”

Also, the Chinese navy has many more ships than the US (around 340 Chinese navy ships to the 300 US navy ships) and that gap is widening.

Given that the rise of China is not just economic, but that China has also developed a staunch defensive capability, what do the military experts say about China’s capability of defending itself against an American attack? Such an attack would also be insane because war between two nuclear-armed foes is a scenario in which there are no winners.

Wei Ling Chua: The US is the most warmongering country on the planet with every inch of its territory looted from others. Like former US President Jimmy Carter told Trump in a (2019) phone conversation: “US has only enjoyed 16 years of peace in its 242-year history.”  The US is also the only nuclear power ever to use such a weapon of mass destruction, which it did on 2 populated civilian cities (Hiroshima and Nagasaki). So, any military threat from the US cannot be taken lightly.

In addition, one should also note that the Chinese military grouped itself into 5 defense regions (Western defense region, Northern defense region, Central defense region, Southern defense region, and Eastern defense region), they are all within China and defensive in nature; whereas, the US military grouped itself into 6 command centers covering the entire world [Africa Command (AFRICOM), Southern Command (covering Latin America), European Command (covering Europe, part of the Middle East and Eurasia), Central Command (covering the Middle East), Indo-Pacific Command (covering the entire Asia Pacific Region, and half the Indian Ocean), and Northern Command (covering the US, Alaska, Canada, Mexico, and Bahamas)]. The US military is obviously imperialistic in nature.

However, the good news is that after WW2, the US-led military coalition never won any war in Asia. Their military coalition was badly beaten in the Korean War and Vietnam War (both of which involved China). The latest sudden and messy US withdrawal from Afghanistan after 20 years of brutal occupation demonstrates that the US military is not as powerful as perceived. It appears to be as Mao famously described: “A Paper Tiger.”

I believe that if the US regime is informed and rational, it will not dare to start a war with China on the Chinese doorstep. The reasons are quite obvious:

1) After the Korean and Vietnam wars, the US never dared to directly attack any well-armed country such as North Korea, Iran, USSR/Russia, etc. For example, in 2020, Iran fired 22 missiles at 2 US airbases in revenge for the cowardly US assassination of their minister (Qasem Soleimani) while he was on an official diplomatic visit inside Iraq. Despite the Pentagon’s initial playing down of the severity of the Iranian attacks, it was later admitted that 109 US troops had suffered brain injuries. The US did not dare take further military action against Iran.

My perception from this incident is that the US is too confident — that no one dares to take military action against their military bases across the world.So, they are complacent and failed to invest in underground shelters in those 2 airbases. So, it is reasonable to assume that such weaknesses are likely to be widespread across all the other US military bases across the world.

2) All the countries the US and NATO attacked after the Korean War and Vietnam War were developing countries. It was only after these countries had been weakened by years of economic sanctions and were without a decent air and sea defense system (e.g., Libya, Syria, Iraq, etc). One should note that the US invasion of Iraq was carried out only after over a decade of UN weapons inspection, disarmament, and economic sanctions. That is after the Iraqi economy and its advanced weaponry were destroyed. As a result, US fighter jets were able to take their own sweet time, flying low, flying slowly to identify targets and bombs. So, the US military weapons have yet to be tested in confrontation with a militarily powerful country, one armed with air and sea defense systems.

As for the perceived US military might and superior high-tech weaponry, I believe that the following examples will shed some light on whether the US is more militarily powerful or China:

Firstly, we should thank the United States for its ongoing military actions across the world, and its marketing tactics to promote its image as a superpower, with the intention to sell weapons and to scare the world into submission from its position of strength. Below is a series of US announcements of new weaponry that had frightened the Chinese; as a result, China commissioned her scientists to invent powerful weapons with ideas initiated by the Americans. E.g.,

Hypersonic Missiles

  • The US is the first country that commissioned a hypersonic bomber program capable of nuking any country worldwide within an hour in the early 2000s. Such an announcement scared the Chinese and Russians. Yet, whereas the US failed miserably and decided to shut down the program in early 2023, we have witnessed that Russia and China successfully developed hypersonic missile technology.  Ironically, given the US failure and China’s success in the technology, the Washington Post published a report titled “American technology boosts China’s hypersonic missile program” to attribute China’s hypersonic missile success to US technology. (When one comes by this type of baseless claim of US technological superiority over China, besides having a good laugh, I am really speechless at the unbelievably shameless nature of the American propaganda machine)

Laser Guns

  • The US is also the first country which commissioned a laser gun program. In 2014, the US announced that the weapon was installed on USS Ponce for field testing with success. However, in 2023, CBS News reported that the Pentagon spent $1b a year to develop these weapons and stated that  “Whether such weapons are worth the money is an open question, and the answer likely depends on whom you ask. For defense contractors, of course, a new generation of powerful military hardware could provide vast new revenue streams.” The irony is that in 2022, China had already exported its laser guns to Saudi Arabia and that country was reported to have successfully gunned down 13 incoming attack drones.

One ought to recall what happened to Saudi oil facilities in 2019 when drones attacked. The report at that time was: “US-made Patriot anti-aircraft missiles, the main air defense of Saudi Arabia that was so useless last Saturday, cost $3m apiece.” In addition, there is the recent bad news that the vaunted US Patriot missile system was put out of action by a Russian hypersonic missile in Kiev on the 16th of May 2023. The report’s title was “A Patriot Radar Station and five missile batteries destroyed in Russian hypersonic strikes”. Obviously, the mendacious US military-industrial complex was successfully ripping off a lot of its allies which paid super high prices for their inferior products.

F-35 “World Most Advanced” stealth fighter

  • The US is a country that loves to boast about its military capability even when the concept is still in an imaginary stage. E.g., introduced in 2006 as the world’s most advanced stealth fighter, the F-35 is also regarded as the US’s most expensive 5th-generation warplane. However, in the past 5 years alone, more than a dozen F-35s crashed across the world despite not operating in a war zone. In 2019, Japan confirmed that an F-35A jet had crashed, causing the remaining F-35s in Japan to be grounded. In 2021, two F-35s were damaged and grounded by a lightning strike in the sky over western Japan. Forbes magazine ran a report titled “Japan is about to waste its F35s shadowing Chinese plane” with this statement: “The stealth fighter is too expensive, too unreliable, and too valuable for other missions to waste it on boring up-and-down flights.” In 2020, The National Interest reported that “The F-35 Stealth Fighter still has hundreds of flaws.” And in 2021, Forbes magazine reported, “The US Air Force just admitted the F35 stealth fighter has failed.” In 2022, the Chinese [People’s Liberation Army] PLA detected an F-35 over the East China Sea and confronted it with their J20 fighter jet, and according to US Airforce General Kenneth Wilbach: “American Lockheed Martin F-35s had had at least one encounter with China’s J-20 stealth fighters recently in the East China Sea and that the US side was ‘impressed’.” These cases demonstrated that the US’s supposedly most advanced “stealth fighter” is visible to Chinese radar technology.

Space Technology/Rocket Engines

  • Despite the US’s stringent technology bans against China, including even attending international space conferences in the US, China is now the only country to have independently and successfully built its own space station. The International space station (ISS) was created by a number of countries with the Russian contribution being the most crucial part of putting the station and astronauts (with Russian rockets) in space. However, as usual, the American media likes to bullshit to save face. So, in 2020, when the American media reported the news that NASA paid the Russians $90m to send an astronaut to the ISS, the title was: “Despite SpaceX success, NASA will pay Russia $90m to take US astronaut to ISS”. The irony is that in 2022, the US imposed the strictest economic sanctions against Russia including confiscating Russian public and private assets in the West and banning Russia from the SWIFT payment system due to Russia’s military action in Ukraine to prevent NATO expansion. As a counter-US sanction measure, NASA was forced to pay Russia in rubles (2 billion) to take the American astronaut back to Earth. These two incidents should be enough evidence that SpaceX’s space technology is not as advanced as its public relations. The Russians and the Chinese appear more advanced than NASA/Elon Musk’s SpaceX in transporting astronauts to and from a space station.

Many people may not have noticed that, in 2015, the US ordered 20 rocket engines from Russia. So, in 2022, when Russia counters US-Ukraine war sanctions with a ban on selling their rocket engines to the US, TechCrunch+ reported the situation with an honest title in recognition of the reality: “Russia halts rocket engine sales to US, suggests flying to space on their ‘broomsticks’.”

GPS Vs Beidou Global Navigation/positioning systems

  • Global positioning technology is a vital part of many advanced weapon systems including land, sea, and air travel: In 1993, the US government falsely accused a Chinese commercial cargo ship with the registered name ‘Yinhe’ of transporting chemical weapon materials to Iran. The US government then cut off Yinhe’s GPS for 24 days to strand them in the Indian Ocean and forced them to allow US officials to board the cargo ship for inspection and nothing was found. Again, in 1996, the PLA conducted a series of missile tests in the Taiwan Strait, and the US again suddenly shut down the GPS used by the PLA. Both incidents led to the Chinese government’s investment in its own Global positioning technology.

In 2003, the cash-strapped EU invited China to participate in their Galileo navigation satellite project. However, after China transferred €200 million (US$270 million) to the project, in the name of security concerns, China was forced out of major decision-making by the EU in 2007. The irony is that China managed to develop its own Global positioning system (Beidou) faster than the EU’s Galileo project. As a “revenge” perhaps, on a “first-launched, first-served” international wavelength application rule, China successfully registered the use of transmit signals on the wavelength that the EU wanted to use for Galileo’s public regulated service. The New York Times reported the story with a title: ‘Chinese Square off with Europe in Space’.

One may notice that the US’s aging GPS satellite system has been having a lot of problems in the past years. Just do a web search under GPS breakdown, GPS jamming, GPS outages, GPS error, GPS problems, GPS malfunction, etc., to find out about the reliability of the GPS system.

Contrariwise, the Chinese Beidou navigation system is a Chinese owned technology with new functions and apparently more precision than the GPS. For example:

  • The Chinese Beidou can be used for text communication between users, while the GPS cannot. So, Huawei became the first company to add satellite texting to their phone device (Mate 50). The significance of such a new communication feature is that, during wartime, the PLA command center or between individual PLA soldiers will be able to communicate with each other with no blind spot. That will enable rapid battlefield intelligence gathering and transmission.
  • In addition, if one ever uses a Beidou navigation device while driving, one should notice that the device’s screen displays the position of the specific car on a specific lane. Should the driver change lanes, the screen will display the changes instantly. That is an indication that Beidou’s navigation system is far more accurate and advanced than the GPS in terms of positioning precision and processing speed. This may imply that the Chinese satellite-guided missiles will be more accurate than the US GPS-guided missiles.
  • A report by Japan Nikkei in 2020 headlined, “Chinese Beidou navigation system has surpassed American GPS in over 165 countries.” That indicates that the Beidou system is a tested, mature navigation technology.
  • A recently published report of a series of computer simulations run by a research team in China revealed that China needs only 24 hypersonic anti-ship missiles to destroy the newest US aircraft carrier and its accompanying warships.

I consider that China is superior in technology to the US. For example, a recent Australian Strategy Policy Institute report acknowledged, “China leads the world in 37 out of 44 critical technologies.”

Of course, unless the US regime is crazy enough to start a mutually destructive nuclear war, there is little reason to believe that the US would be able to win a war with non-nuclear weapons on China’s doorstep.

Winning a war is not just about weaponry: the Korean War, Vietnam War, and Afghanistan War have already demonstrated that a coalition of the most militarily powerful imperialistic nations can be defeated by the people of a lesser-armed nation fighting for their freedom. So, beyond the use of advanced weaponry, the factors that determine who will win a war include:

      • the unity of the citizens,
      • the fighting morale of the soldiers,
      • the logistical support,
      • the military strategies,
      • the ability to manufacture more weapons with speed to sustain a long war;
      • the manufacturing supply chains
      • the energy supply and reserve,
      • the food supply and reserve,
      • the money to sustain a war, and
      • the neighboring countries’ attitude toward the warring parties.

So, when one goes through the above list, one should easily come to the conclusion that the US is in a  disadvantageous position to travel across the Pacific Ocean to attack China on its doorstep.

*****
Upcoming: What does US militarism augur in the context of Taiwan?


This content originally appeared on Dissident Voice and was authored by Kim Petersen.

]]>
https://www.radiofree.org/2023/06/12/how-does-technology-factor-in-for-us-militarism-toward-china/feed/ 0 403155
New Technology Helps Reconstruct Atrocities. Will It Make It Easier to Convict War Criminals? https://www.radiofree.org/2023/06/12/new-technology-helps-reconstruct-atrocities-will-it-make-it-easier-to-convict-war-criminals/ https://www.radiofree.org/2023/06/12/new-technology-helps-reconstruct-atrocities-will-it-make-it-easier-to-convict-war-criminals/#respond Mon, 12 Jun 2023 19:17:54 +0000 https://production.public.theintercept.cloud/?p=431117

Standing before a computer monitor in a courtroom in The Hague in 2020, a prosecutor with the International Criminal Court zoomed in and out on a detailed 3D digital reconstruction of the city of Timbuktu. She moved around the interactive map through squares and markets, zooming past renderings of city buildings, eventually descending to street level. There, she played a video that showed a Malian rebel leader holding a whip and escorting two cuffed men to an open area, then ordering the men to kneel and whipping them before a crowd of bystanders, including several children.

It was a vivid opening to the war crimes and crimes against humanity trial of Al Hassan Ag Abdoul Aziz, a member of the Ansar Dine Islamist group, which took over swaths of northern Mali in a 2012 coup. As chief of Islamic police, Al Hassan stands accused of widespread crimes, including torture, rape, sexual slavery, and forced marriages.

“Mr. Al Hassan’s work was not confined within the four walls of his office,” the prosecutor, Sarah Coquillaud, said in her opening statement, as Al Hassan watched quietly, his reactions hidden behind a face mask. “His work did not only consist in dispatching men and writing reports at his desk; he took it outside in open places and preferably places where his idea of justice could be seen and taught to everyone.”

The trial against Al Hassan ended late last month, with a verdict expected in the coming weeks. It will not only determine the fate of a man whom prosecutors accused of being an “enthusiastic” war crimes perpetrator, but will also answer a key question facing human rights advocates: Can sophisticated digital evidence platforms, part of a rapidly growing arsenal of technology deployed in the documentation of human rights abuses, help secure convictions?

“Many of us are watching to see how visual and other forms of digital evidence become useful or are challenged, what the judges think,” said Alexa Koenig, a co-director of the University of California, Berkeley’s Human Rights Center and a leading expert on the use of emerging technologies in human rights practice.

The Al Hassan case marks the first use of an immersive virtual environment — or IVE, in the court’s lingo — in an international criminal trial. (SITU, the visual investigations team that built the model, developed a simpler platform for a 2016 war crimes prosecution that was resolved with a guilty plea before trial.) Yet these types of tools — which are increasingly being used by human rights groups and media organizations, and have even contributed to landmark settlements in cases involving police violence in the U.S. — are likely to become a critical part of international justice efforts moving forward.

Take Ukraine, where scores of alleged crimes have been documented almost in real time by an unprecedented number of actors. As prosecutors increasingly rely on digital evidence and reconstructions in their work, they will face the challenge of sorting through massive amounts of data efficiently, a process that experts say will inevitably need to become automated in some way. Earlier this year, the International Criminal Court’s prosecutor’s office launched what it called “the most ambitious technical modernization initiative in its history,” including a new evidence management platform to handle the influx of large amounts of digital evidence.

The proliferation of such tools and their expected contribution to criminal accountability efforts raises a number of pressing questions, human rights experts caution, like issues of fairness in judicial proceedings, particularly as prosecutors’ teams in international criminal tribunals are often better resourced than the defense. It also raises ethical questions, for instance about the re-traumatization of victims.

“Will this be in any way prejudicial to the accused and violate some fair trial norms that are so important to the effectuation of justice? What does it mean for the psychosocial well-being of the people in the courtroom, let alone the survivors of something so horrific, if you are able to immerse yourself in the scene of an atrocity?” asked Koenig.

“They can be really helpful for people to situate themselves at the scene of a series of atrocities and be able to explore what that atrocity means to the surrounding community,” she added. “But there are a lot of unknowns still in the field about how we control to give ourselves the best that can come from these digital platforms while at the same time minimizing the risks and the harm.”

An immersive, 3D reconstruction of the city of Timbuktu, populated with digital evidence of alleged crimes that took place there was used during the trial of Malian rebel Al Hassan Ag Abdoul Aziz before the International Criminal Court. While a rapidly growing arsenal of technology has been deployed in the documentation of human rights, the case marks the first use of such technology in an international criminal trial.
Source: SITU

Is Seeing Believing?

SITU researchers assembled the Timbuktu reconstruction through a combination of satellite imagery, drone footage, and other materials. They populated the reconstruction with evidentiary videos, some that witnesses provided directly to prosecutors and others that prosecutors collected from the internet. During the trial, prosecutors used the platform to show some instances of violence — like the floggings of a couple accused of adultery and of two young men accused of drinking alcohol, both of which Al Hassan participated in — as well as the places where other alleged crimes, which were not caught on video, took place.

In exchanges with the court, Al Hassan’s defense team raised concerns about the platform. “Unfair prejudice arises from the inherently persuasive and unduly demonstrative nature of the material,” they wrote in one email. They cited research that argues that “at first glance, these graphical reconstructions may be seen as potentially useful in many courtroom situations,” but cautioned against “the undue reliance that the viewer may place on the evidence presented through a visualisation medium, this is often referred to as the ‘seeing is believing’ tendency.” The court overruled the defense team’s objections. Al Hassan’s lawyers did not respond to The Intercept’s request for comment. Gilles Dutertre, the lead prosecutor in the case, referred questions to the ICC’s office of the prosecutor, which did not respond to The Intercept’s questions.

The team at SITU — with which The Intercept has collaborated in the past — said that while they worked with evidence provided by the prosecution, the platforms are designed to be used by all parties to the proceedings, including the defense. “It’s not a linear narrative that walks a viewer through specific sets of events, tries to make an argument and to thread a line through all of the pieces of evidence,” Bora Erden, a senior researcher and technical lead at SITU, told The Intercept. “Instead, it allows any user to query the platform for their own purposes.”

Koenig, who advised the former ICC prosecutor’s office on the use of emerging technologies, told The Intercept that the office’s interest in such tools was inspired in part by the realization, a decade after the court first started operating in 2002, that many of its cases were falling apart early on because prosecutors were not bringing enough corroborating evidence to support what witnesses were saying. The growing availability of a range of digital evidence sources — from geospatial imagery and drone footage to the spread of the smartphone and the rise of social media — offered not only new ways to corroborate witness testimony, but also ways to link evidence of crimes on the ground to the higher-level perpetrators the court was tasked with pursuing. “All of these were tools that the prosecutor needed to become more effective and efficient,” she said.

Still, the new tools were met with some resistance, in part because those developing them worked in fields — from architecture and design to computer programming — that fell outside the disciplines more traditionally associated with forensic work. “When you’ve been doing your job for decades, and you have a set methodology for how you find the evidence, verify the evidence, introduce it into court … there’s a very healthy skepticism that comes with introducing new ways of working with evidence,” Koenig added. “I have definitely seen some reticence to engage with these newer methodologies.”

More Accessible Courtrooms

The immersive nature of these platforms can make them a more effective way to engage survivors and eyewitnesses, proponents say.  

Anjli Parrin, a Kenyan human rights advocate and lawyer and director of the University of Chicago Law School’s Global Human Rights Clinic, told The Intercept that in many countries, courtrooms are elitist settings, “not an environment where victims groups, survivors, and impacted communities are going to feel welcome.”

But when they can see a recreation of places they know and experiences they lived through, “it helps make the courtroom accessible,” she added, drawing a contrast to technical reports that can be difficult for the layperson to understand.

“What is actually exciting and revolutionary about this is how it can simplify the problem, not how it’s an exciting, shiny new thing that looks cool.”

Yet these tools are not a panacea, cautioned Parrin, who has investigated mass atrocities and served as an expert witness in international criminal proceedings, especially when it comes to communities without access to certain technology. She cited a recent visit to a Central African Republic village where she interviewed witnesses after 30 people were massacred. “Not one person had a smartphone,” she said.

“What is actually exciting and revolutionary about this is how it can simplify the problem, not how it’s an exciting, shiny new thing that looks cool,” Parrin said. “It’s about how you actually make this meaningful to the people who are affected.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Alice Speri.

]]>
https://www.radiofree.org/2023/06/12/new-technology-helps-reconstruct-atrocities-will-it-make-it-easier-to-convict-war-criminals/feed/ 0 403086
John Mitchell: Planet Ocean – tides are changing, but halt plastic horror https://www.radiofree.org/2023/06/11/john-mitchell-planet-ocean-tides-are-changing-but-halt-plastic-horror/ https://www.radiofree.org/2023/06/11/john-mitchell-planet-ocean-tides-are-changing-but-halt-plastic-horror/#respond Sun, 11 Jun 2023 12:34:05 +0000 https://asiapacificreport.nz/?p=89566 By John Mitchell in Suva

Fiji got to celebrate World Oceans Day this week — a day when our conscience gets the occasional prick on matters related to the value of the ocean in sustaining life.

I like to brag about growing up surrounded by the sea and those unique moments during childhood I spent rowing across Qamea’s picturesque and mangrove-fringed Naiviivi Bay, plucking seashells from shallow tide pools and digging up vetuna (sandworm) from the sand.

Yes, the sea is a way of life for all of us.

Think of this.

The ocean covers more than 70 percent of the planet.

It is our life source, supporting humanity’s sustenance and existence, and that of every other organism on earth.

The ocean produces much of the oxygen we breath and need to survive, it is the habitat of most of earth’s biodiversity and is the main source of meat protein for more than a billion people around the world.

40 million ’employees’
The ocean is key to our economy with an estimated 40 million people to be employed by ocean-based industries by 2030.

In Fiji, an estimated 60 percent of the 900,000 population are thought to live in coastal communities, surviving on activities linked to the ocean, and our fisheries and tourism sectors are so intrinsically connected to the health of the ocean.

But the ocean we call our home is facing a variety of threats that challenges its existence and endangers humanity.

United Nations statistics say that we have depleted 90 percent of big fish populations and destroyed 50 percent of coral reefs.

“We are taking more from the ocean than can be replenished. We need to work together to create a new balance with the ocean that no longer depletes its bounty but instead restores its vibrancy and brings it new life,” the UN says.

With such dreadful reality in the backdrop, the 2023 WOD theme seemed timely and relevant — “Planet Ocean: tides are changing”.

It provides us with an opportunity to rethink what we’ve done, what we need to do and how to work together with world leaders, decision-makers, indigenous leaders, scientists, private sector executives, civil society, celebrities, and youth activist to make the health of the ocean a public agenda.

Veiuto Primary School Year 2 student Josaia Waqaivolavola takes part in the beach clean up at the My Suva Picnic Park along the Nasese foreshore in Suva
Veiuto Primary School Year 2 student Josaia Waqaivolavola takes part in the beach clean up at the My Suva Picnic Park along the Nasese foreshore in Suva on Tuesday. Image: Jonacani Lalakobau/Fiji Times

Clean up day
On Wednesday this week, The Fiji Times’ front page photo was of Josaia Waqaivolavola, a Year 2 student from Veiuto Primary School who was captured on camera participating in a beach clean up at My Suva Picnic Park along the Nasese foreshore.

His group collected 10 trash bags filled with plastics, among others.

It’s when we see the amount of rubbish along our coastlines and in the sea around us that we begin to realise that all the talk about “putting rubbish in the bin” is not working.

We talk about responsible citizenship but plastics continue to pollute our communities, roads, streets and parks, and our oceans.

Plastics have become so cheap to produce that we are producing things we don’t intend to keep for long.

In other words, we are producing plastics only to throw them away.

We are now mass producing disposable plastics at a phenomenal rate that the world’s waste management systems are finding hard to keep up.

40% of plastics disposable
It is estimated that about 40 percent of the now more than 448 million tonnes of plastics produced every year is disposable and used in products intended to be discarded virtually soon after purchase.

Just go to the beach and you’ll find them on the sand.

World statistics estimate that each day billions upon billions of plastic material find their way into our rivers, streams and eventually into our oceans.

During my childhood years on Qamea, my family’s livelihood depended on the sea.

At a time, when village canteens had no refrigerators to store meat, the sea was our main source of daily meat protein.

Many years ago, scientists and environment experts were warning us that the amount of plastics in the world’s ocean would increase 10 times by 2020.

That was three years ago.

Too polluted for fish
They further advised that by 2050, if statistical predictions remain true, we’d have so much plastics in the sea and our oceans would too polluted that fish and other delicacies would be unsafe to eat or we’d not be able to even swim anymore.

Cleaning the ocean is good but may not be good enough.

We need to nip this spiralling issue in the bud.

We need to work before the plastic reaches the ocean.

We need to work on land where they are produced before we go to the ocean.

In Fiji, the concern over disposable plastic waste is the same as the threat in other countries of the world — we are using more disposable plastics at a rate faster than we are able to effectively dispose them that our waste managing systems are struggling to contain the problem.

Recycling not effective
Our recycling initiatives are not effectively solving our disposable plastic dilemma.

During this year’s WOD celebrations, UN Secretary-General Antonio Guterres described the ocean as “the foundation of life”.

That pretty much sums everything up.

If the ocean is life, then why can’t we get out act together.

The ball is in everyone’s court and the time to act is now.

Until we meet again, stay blessed, stay healthy and stay safe!

John Mitchell is a Fiji Times journalist and writes the weekly “Behind The News” column. Republished with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/06/11/john-mitchell-planet-ocean-tides-are-changing-but-halt-plastic-horror/feed/ 0 402800
Papuan students accused of ‘treason’ over raising Morning Star flags https://www.radiofree.org/2023/06/10/papuan-students-accused-of-treason-over-raising-morning-star-flags/ https://www.radiofree.org/2023/06/10/papuan-students-accused-of-treason-over-raising-morning-star-flags/#respond Sat, 10 Jun 2023 02:19:46 +0000 https://asiapacificreport.nz/?p=89520 Jubi News

The trial of three Papuan “free speech” students accused of treason has resumed at the Jayapura District Court this week.

The defendants — Yoseph Ernesto Matuan, Devio Tekege, and Ambrosius Fransiskus Elopere — have been charged with treason for organising a free speech rally where they were accused of raising the banned Morning Star flags of West Papuan independence at the Jayapura University of Science and Technology (USTJ) on November 10, 2022.

During the hearing on Thursday, linguist Dr Robert Masreng testified as an expert witness presented by the public prosecutor.

He said the Morning Star flags displayed in the event were “merely an expression”.

The students organised a protest to voice opposition against the Papua dialogue plan initiated by the National Commission on Human Rights (Komnas HAM).

However, the event was broken up by police and several participants were arrested.

Dr Masreng, a faculty member at Cenderawasih University’s Faculty of Teacher Training and Education, clarified the definitions of treason, independence, Morning Star, conspiracy, and the meanings of writings displayed during the free speech rally.

Treason ‘definitions’
He said that according to the Indonesian Thesaurus dictionary, “treason” referred to engaging in deceitful actions or manipulating others to achieve personal objectives.

It could also denote rebellion, expressing a desire to prevent something from happening.

Additionally, Dr Masreng noted that treason could signify an intention to commit murder.

In court, Dr Masreng explained that treason involved deceptive actions, rebellion, and an intention to commit murder.

He emphasised that the Morning Star flag was a symbol that gained meaning when it was used for a specific purpose. Without a clear intention behind its use, the flag lost its importance.

Dr Masreng said that the Morning Star flag was often used as a symbol to express ideas.

He said that the meaning of the flag could be understood based on how it was used in different situations, and different people might interpret it in their own unique ways.

‘Independence’ clarified
Dr Masreng clarified the term “independence” by explaining that it represented a perspective of freedom that had a wide-ranging and abstract significance when it was used.

The understanding of the word relied on the specific situation and how different people perceived it, especially in relation to the core concept of freedom.

Dr Masreng said this meant that when someone expressed themself, it implied being free from criticism and oppression.

He also provided an interpretation of the chant “referendum yes, dialogue no.”

He said the chant conveyed a decision to the general public without involving Parliament.

Rejecting dialogue was an expression of the speaker’s unwillingness to engage in a dialogue.

Regarding the statement requesting intervention of the United Nations Human Rights Council in Papua, Dr Masreng said this signified that the problems in Papua were not limited to domestic concerns, but were matters that should be acknowledged by the international community.

“It means an expression of asking the government to be open to the international community, allowing them to enter Papua and observe the dire human rights situations in the region,” he said.

Republished from Jubi with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/06/10/papuan-students-accused-of-treason-over-raising-morning-star-flags/feed/ 0 402651
Papuan students accused of ‘treason’ over raising Morning Star flags https://www.radiofree.org/2023/06/10/papuan-students-accused-of-treason-over-raising-morning-star-flags/ https://www.radiofree.org/2023/06/10/papuan-students-accused-of-treason-over-raising-morning-star-flags/#respond Sat, 10 Jun 2023 02:19:46 +0000 https://asiapacificreport.nz/?p=89520 Jubi News

The trial of three Papuan “free speech” students accused of treason has resumed at the Jayapura District Court this week.

The defendants — Yoseph Ernesto Matuan, Devio Tekege, and Ambrosius Fransiskus Elopere — have been charged with treason for organising a free speech rally where they were accused of raising the banned Morning Star flags of West Papuan independence at the Jayapura University of Science and Technology (USTJ) on November 10, 2022.

During the hearing on Thursday, linguist Dr Robert Masreng testified as an expert witness presented by the public prosecutor.

He said the Morning Star flags displayed in the event were “merely an expression”.

The students organised a protest to voice opposition against the Papua dialogue plan initiated by the National Commission on Human Rights (Komnas HAM).

However, the event was broken up by police and several participants were arrested.

Dr Masreng, a faculty member at Cenderawasih University’s Faculty of Teacher Training and Education, clarified the definitions of treason, independence, Morning Star, conspiracy, and the meanings of writings displayed during the free speech rally.

Treason ‘definitions’
He said that according to the Indonesian Thesaurus dictionary, “treason” referred to engaging in deceitful actions or manipulating others to achieve personal objectives.

It could also denote rebellion, expressing a desire to prevent something from happening.

Additionally, Dr Masreng noted that treason could signify an intention to commit murder.

In court, Dr Masreng explained that treason involved deceptive actions, rebellion, and an intention to commit murder.

He emphasised that the Morning Star flag was a symbol that gained meaning when it was used for a specific purpose. Without a clear intention behind its use, the flag lost its importance.

Dr Masreng said that the Morning Star flag was often used as a symbol to express ideas.

He said that the meaning of the flag could be understood based on how it was used in different situations, and different people might interpret it in their own unique ways.

‘Independence’ clarified
Dr Masreng clarified the term “independence” by explaining that it represented a perspective of freedom that had a wide-ranging and abstract significance when it was used.

The understanding of the word relied on the specific situation and how different people perceived it, especially in relation to the core concept of freedom.

Dr Masreng said this meant that when someone expressed themself, it implied being free from criticism and oppression.

He also provided an interpretation of the chant “referendum yes, dialogue no.”

He said the chant conveyed a decision to the general public without involving Parliament.

Rejecting dialogue was an expression of the speaker’s unwillingness to engage in a dialogue.

Regarding the statement requesting intervention of the United Nations Human Rights Council in Papua, Dr Masreng said this signified that the problems in Papua were not limited to domestic concerns, but were matters that should be acknowledged by the international community.

“It means an expression of asking the government to be open to the international community, allowing them to enter Papua and observe the dire human rights situations in the region,” he said.

Republished from Jubi with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/06/10/papuan-students-accused-of-treason-over-raising-morning-star-flags/feed/ 0 402652
Technology Needs Assessments by Congress, Municipalities, and Local Civic Groups https://www.radiofree.org/2023/06/09/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups-2/ https://www.radiofree.org/2023/06/09/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups-2/#respond Fri, 09 Jun 2023 23:27:28 +0000 https://dissidentvoice.org/?p=140975 The pace of for-profit technological innovations is accelerating, but to what end beyond corporate sales? The gap between marketing new high-tech products and assessing their intended and unintended consequences has never been greater.

Let’s start with the ballooning of augmented reality inside virtual reality. Facebook’s Oculus Rift escapism has flopped. Trying to improve on this bizarre quest to envelop its customers, Apple plans to release the “Vision Pro”, a “mixed-reality” headset so large that Washington Post columnist Molly Roberts described it as “clunky and creepy” and predicted failure for this $3,499 rip-off.

Do mega-corporation CEOs – who spend company profits on massive stock buybacks for no productive use (Apple plans to spend $90 billion on buybacks this year) – spend any money on the lost practice of technology assessment? Do Facebook and Apple have studies on what fantasy goggles are doing to youngsters’ minds? Are these devices producing anxieties, fears or addictions? Do these corporations have more victims than customers? Do the high-tech CEOs care? If they do, they’re not saying.

Let’s move on to the big stuff! Congress has been spending trillions of your taxpayer dollars on technologies of modern weaponry, chemicals, drugs, medical devices, transportation, the Internet, biotechnology, nanotechnology and fusion energy. Yet the general public remains clueless about the adverse impact of these expenditures. Congress doesn’t even know if many technologies or products work as advertised.

You can thank the bombastic, ignorant Newt Gingrich for hurling our 535 members of Congress into this black void. In 1994 Gingrich orchestrated the Republican takeover of the House of Representatives. And, in 1995, after becoming Speaker of the House, Gingrich and the Republican-controlled Congress eliminated the funding of the Congressional Office of Technology Assessment (OTA). With a small $20 million annual budget, OTA produced scores of assessment reports needed by Congress. Senator Edward Kennedy (D-MA) was one of OTA’s strongest supporters, who with other members of Congress served on its bipartisan board. When Congress was debating the creation of OTA, Kennedy said “without an OTA the role of Congress in national science policy would become more and more perfunctory and more and more dependent on administration facts and figures, with little opportunity for independent Congressional evaluation.” Kennedy was furious about the Republican defunding of OTA, but could not marshal enough of his dejected fellow Democrats to fight to restore funding even after Gingrich resigned in disgrace five years later.

The failure of Democrats to fund OTA when they controlled Congress allowed Gingrich’s demolition to continue the wreckage he launched. Technically unadvised members looked foolish for years in their questioning of Silicon Valley executives at public hearings.

Right after Obama’s victory in 2008, carrying large Democratic majorities in the House and Senate, I organized an effort to refund OTA with Nobel laureates and other scientists on board. For many years, Cong. Rush Holt Jr. (D-NJ) led the effort in the House, only to be undermined by Speaker Nancy Pelosi, who said she didn’t want to give the Republicans an opportunity to accuse her of starting another bureaucracy on Capitol Hill. Truly shocking!

Now it is 2023 and the studied ignorance of Congress fuels the strategically useless F-35 Fighter planes at a $1.5 trillion projected cost. Well over a trillion dollars will be spent upgrading the nuclear bomb arsenal – currently able to blow up the world many times over. The unavoidable ballistic missile so-called defense program soaks up billions of dollars yearly (See: “Why Missile Defense Won’t Work” by MIT Professor Ted Postol). The rave for electric vehicles badly needs a thorough technology assessment for its lifecycle costs and benefits.

An adequately funded OTA would have alerted Congress early about the looming opioid crisis and crimes that have taken a million or more American lives. A similar alert from an OTA report, before Covid-19 struck, could have alerted Congress on the lack of preparedness for coming pandemics. Being part of Congress, OTA can command the attention and credibility from members far more easily than any studies or alarms from citizen groups or civically-minded Think Tanks.

Pressing the issue of funding OTA in the 21st century’s second decade brought the Democratic Party’s excuse that either one chamber of Congress or the other half was Republican-controlled. I, with Bruce Fein, Joan Claybrook and Claire Nader, explained to Speaker Pelosi in 2020 that the House or Senate can fund OTA without the concurrence of the other simply on the grounds of its prerogative to more fully fund its own institution. No reply. (See letter).

It took 86-year-old Congressman Bill Pascrell, Jr. (D-NJ) to publicly chastise his colleagues with articles titled: “Why is Congress so dumb?” (January 11, 2019, Washington Post) and “Congress Is Sabotaging Your Post Office” (April 7, 2019, Washington Monthly). Still no visible reaction from the tone-deaf congressional solons busily reducing their own significance under the Constitution and spending money unwisely.

The ongoing lack of local technology assessment capabilities leaves Congress without a grassroots infrastructure of fact-based, nonpartisan analysis.

Municipalities do not have formal little OTAs for their infrastructure projects, so the grasping, politically connected vendors take advantage of such ignorance to increase prices and delay projects and continue shoddiness. Think bridges, highways, schools and public buildings projects.

The science and engineering departments of universities are rarely interested in supplying such knowledge or even teaching the ethics of engineering to their students. In 2018 we sponsored a book titled Ethics, Politics, and Whistleblowing in Engineering by Rania Milleron and Nicholas Sakellariou (CRC Press) that delved into how disasters can occur when engineering professionals don’t take their consciences that reflect their expected responsibilities to work. (See Nicholas Ashford’s review). Three times we sent letters to about two dozen Deans and professors of Engineering around the country encouraging them to develop classes on ethics for their students. Not a single reply. (See, January 2, 2019, Letter to Engineering Professors or Department Heads).

In 1998, our community project in Winsted, Connecticut retained an engineer, Susan M. McGoey, as a “community technologist.” She proved her worth manyfold, catching over-reaches by the engineering firm hired to upgrade the town’s drinking water purification plant. She also advised the town on its municipal watershed stewardship, began a natural resources inventory and organized a successful river clean-up along with many other money-saving projects from redesigning traffic lights to improving downtown renovations. (See: Courant.).

Readers interested in collaborating with the renewed effort to fund the Office of Technology Assessment (OTA) in Congress can contact their members of Congress, and also connect with us at gro.redannull@ofni. It is high time to aggregate dedicated public opinion and advocacy on this inexpensive but very important restoration.


This content originally appeared on Dissident Voice and was authored by Ralph Nader.

]]>
https://www.radiofree.org/2023/06/09/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups-2/feed/ 0 402621
Technology Needs Assessments by Congress Municipalities and Local Civic Groups https://www.radiofree.org/2023/06/09/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups/ https://www.radiofree.org/2023/06/09/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups/#respond Fri, 09 Jun 2023 17:50:06 +0000 https://nader.org/?p=5891
This content originally appeared on Ralph Nader and was authored by eweisbaum.

]]>
https://www.radiofree.org/2023/06/09/technology-needs-assessments-by-congress-municipalities-and-local-civic-groups/feed/ 0 402603
Fifteen Pasifika people on NZ King’s Birthday Honours List https://www.radiofree.org/2023/06/05/fifteen-pasifika-people-on-nz-kings-birthday-honours-list/ https://www.radiofree.org/2023/06/05/fifteen-pasifika-people-on-nz-kings-birthday-honours-list/#respond Mon, 05 Jun 2023 03:36:09 +0000 https://asiapacificreport.nz/?p=89306 RNZ Pacific

Paediatrician Dr Teuila Percival heads the list of Pacific recipients in the New Zealand King’s Birthday Honours List for 2023.

Dr Percival is one of at least 15 Pasifika people in New Zealand who are on the list. She is to be a Dame Companion of the New Zealand Order of Merit for services to health and the Pacific community.

For the past three decades she has been a strong advocate for Pacific children’s health in New Zealand and the Pacific.

Dr Teuila Percival.
Dr Teuila Percival . . . “It’s important for Pacific people to be recognised in the work they do.” Image: Pasifika Medical Association/RNZ

Dr Percival said she felt honoured to get the award after getting over the initial surprise.

“I think it’s important for Pacific people to be recognised in the work they do, so it’s really nice in that respect,” she said.

“It’s just a great job, I love working with kids. I think children are the most important thing.”

Dr Percival was a founding member of South Seas Healthcare, a community health service for Pacific people in Auckland since 1999.

She has also been deployed to Pacific nations after natural disasters like to Samoa in 2009 after the tsunami and to Vanuatu in 2015 following cyclone Pam.

Education
Sacred Heart school counsellor Nua Silipa is to be an Officer of the New Zealand Order of Merit for her services to Pacific education.

Silipa said her experience struggling in the education system after immigrating from Samoa in 1962 had motivated her to help Pacific people in the classroom.

“When I look back now I think my journey was so hard as a minority in Christchurch,” Silipa said.

“It was a struggle because we weren’t in the classroom, the resources at that time were Janet and John . . .  so as a learner I really struggled.”

She said the “whole experience of underachievement” motivated her to help “people who are different in the system”.

“It’s not a one size fits all in education.”

Nua Silipa said she felt humbled to be a recipient on the King’s Birthday Honours List.

She said the award also honoured the people who had been involved in improving education for Pasifika.

“I know there’s so, so many other people who are doing work quietly every day, helping our communities and I’m really in awe of them.

“There are many unsung heroes out in our community doing work for our people.”

Technology
Mary Aue is to be a Member of the New Zealand Order of Merit for her services to education, technology and Pacific and Māori communities.

Mary Aue is to be a Member of the New Zealand Order of Merit for her services to education, technology and Pacific and Māori communities
Coconut Wireless creator Mary Aue . . . “There was no communication back then, so I created an e-newsletter.” Image: RNZ Pacific

Mary Aue is to be a Member of the New Zealand Order of Merit for her services to education, technology and Pacific and Māori communities Photo: Supplied

In 1999, she launched Coconut Wireless as an e-newsletter for Pasifika reaching 10,000 subscribers. It relaunched in 2014 as a social media platform and now has over 300,000 Facebook followers.

“There was a disconnect between community and government agencies and there was a disconnect between our communities,” she said.

“There was no communication back then, so I created an e-newsletter.”

The name Coconut Wireless was based on the island concept as a fast way of communicating through word of mouth.

Aue has also been an advocate for more Pacific and Māori learners in science, engineering, technology and mathematics (STEM).

Aue said she was originally going to decline the award as there were a lot of people in the community who do not get recognised behind the scenes.

“I have to thank my family, my friends and the amazing community that we’re all part of.”

Sport
Teremoana Maua-Hodges said she “just about choked” on her cup of tea when she found out she had received the Queen’s Service Medal.

Maua-Hodges has been given the award for her contribution to sport and culture.

She said the award was the work of many people — including her parents — who travelled to New Zealand from the Cook Islands when she was a child.

“I’m very humbled by the award, but it’s not just me,” Maua-Hodges said.

“I stand on the shoulders of different heroes and heroines of our people in the community.

“It’s not my award, it’s our award.”

Maua-Hodges said the most important thing she had done was connect Cook Islanders.

“Uniting Cook Islanders who have come over from different islands in the Cook Islands and then to come here and be united here within their diversity makes me very proud.

“They’ve taken on the whole culture of Aotearoa but still as Cook Islanders . . .  to show their voice, to show their flag, in the land of milk and honey.”

The Queen’s Service Medal will be renamed the King’s Service Medal once the necessary processes are done, and the updated Royal Warrant is approved by King Charles.

Pasifika recognised in the Queen’s Birthday Honours List for 2022:

Dame Companion of the New Zealand Order of Merit: Dr Teuila Mary Percival — for services to health and the Pacific community.

Officer of the New Zealand Order of Merit: Nua Semuā Silipa — for services to Pacific education.

Honorary Officer of the New Zealand Order of Merit: Meleane Pau’uvale — for services to the Tongan community and education.

Member of the New Zealand Order of Merit:

Mary Puatuki Aue — for services to education, technology and Pacific and Māori communities.

Dr Ofanaite Ana Dewes — for services to health and the Pacific community.

Fa’atili Iosua Esera — for services to Pacific education.

Dr Siale Alokihakau Foliaki — for services to mental health and the Pacific community.

Keni Upokotea Moeroa — for services to the Cook Islands community.

Talalelei Senetenari Taufale — for services to Pacific health.

Dr Semisi Pouvalu Taumoepeau — for services to education and tourism.

Honorary Member of the New Zealand Order of Merit: Fa’amoana Ioane Luafutu — for services to arts and the Pacific community.

Queen’s Service Medal:

Joseph Davis — for services to the Fijian community.

Reverend Alofa Ta’ase Lale — for services to the community.

Teremoana Maua-Hodges — for services to sport and culture.

Putiani Upoko — for services to the Pacific community.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/06/05/fifteen-pasifika-people-on-nz-kings-birthday-honours-list/feed/ 0 400856
Plutocracy Uses Technology to Clobber the Poor https://www.radiofree.org/2023/06/02/plutocracy-uses-technology-to-clobber-the-poor/ https://www.radiofree.org/2023/06/02/plutocracy-uses-technology-to-clobber-the-poor/#respond Fri, 02 Jun 2023 05:58:40 +0000 https://www.counterpunch.org/?p=284600 Technology wielded by oligarchic government is a nightmare. From killer police dog robots to facial recognition in public housing, it’s not just the poor who are targets, it’s everybody. But the poor and the left get smacked with it the worst. It’s open season on antifa, a season inaugurated by killer Kyle Rittenhouse shooting two Black Lives Matter protestors to death, getting off scott free and becoming the darling of far-right celebrities. As for how technology crushes the poor, just take the case of 33-year-old Tania Acabou, who found herself a victim of constant surveillance in her public housing project. More

The post Plutocracy Uses Technology to Clobber the Poor appeared first on CounterPunch.org.


This content originally appeared on CounterPunch.org and was authored by Eve Ottenberg.

]]>
https://www.radiofree.org/2023/06/02/plutocracy-uses-technology-to-clobber-the-poor/feed/ 0 400275
Is Bluesky Billionaire-Proof? https://www.radiofree.org/2023/06/01/is-bluesky-billionaire-proof/ https://www.radiofree.org/2023/06/01/is-bluesky-billionaire-proof/#respond Thu, 01 Jun 2023 16:15:14 +0000 https://production.public.theintercept.cloud/?p=429809

For someone who hasn’t been on Twitter since it became a safe space for the far right under Elon Musk’s leadership, the new invite-only social media network Bluesky can feel like a nostalgic breath of fresh air. The vibes are great. A lot of old communities from Twitter that never quite made the jump to Mastodon — a harder-to-use federated social network — have shown up in Bluesky.

Like Mastodon, Bluesky is an open-source, decentralized social network. Unlike Mastodon, which is notoriously confusing for the uninitiated, it’s simple to get started on Bluesky. The user interface is clean and familiar to people accustomed to modern commercial apps. Bluesky embraces user control over their timelines, both in terms of algorithmic choice — the Mastodon project is hostile to algorithms — and customizable content moderation.

There are other fundamental differences between the two projects. While Mastodon is a scrappy nonprofit, Bluesky PBLLC is a for-profit startup. And while Mastodon is a vibrant network of thousands of independent social media that federate with each other, Bluesky’s “decentralization” is only in theory. So far there’s only one site that uses Bluesky’s decentralized AT Protocol, and that site is Bluesky Social.

It is mostly for these and related reasons that people on Mastodon get very defensive when Bluesky comes up. “Why are you helping oligarchs test their products? Are they paying you or do you do it out of sheer loyalty?” one stranger asked me when I posted about some of Bluesky’s creative moderation features that had recently dropped.

Amid the noise, though, there are genuine concerns about how Bluesky is operated and what the people behind it aim to do. It’s wise to remember that the company started off with $13 million of funding from pre-Musk Twitter, when Jack Dorsey, who is now at Bluesky, was CEO.

The history and the arrangement raise several questions: Who owns Bluesky PBLLC? What is the role of Dorsey, who famously tweeted about Musk’s purchase of Twitter that “Elon is the singular solution I trust”? What is Bluesky’s business model? What prevents another Elon Musk from buying Bluesky PBLLC and destroying it 10 years down the line? Many of the answers are out there — many even posted to Bluesky itself by its employees. Since Bluesky is still a private invite-only site, here are some of these answers for Bluesky skeptics to see.

Who Owns Bluesky?

“Bluesky, the company, is a Public Benefit LLC. It is owned by Jay Graber and the Bluesky team,” according to the site’s Frequently Asked Questions page. This is exactly what Jeromy Johnson, a former engineer for the distributed file system IPFS and a technical adviser to Bluesky who goes by Whyrusleeping, said when asked in early April.

Bluesky technical advisor Jeremy Johnson’s post about who own’s Bluesky PBLLC

Bluesky technical adviser Jeromy Johnson’s post about who owns Bluesky PBLLC.

Screenshot: Micah Lee/The Intercept

One user — who like nearly everyone else on the site was psyched to be essentially tweeting but without having to deal with Twitter — inquired who owns Bluesky. Why said that “the founding team holds the equity” and that Dorsey himself is not an owner. (You can verify that Why is part of the Bluesky team because of how self-verifying handles work in the AT Protocol; only people who control the domain name bsky.team are able to have handles like that.)

When asked for clarification about Bluesky’s ownership, Emily Liu, another member of the Bluesky team, told me that Bluesky has been offering employees equity as part of their compensation packages, as is a common practice with startups. She also confirmed that Bluesky PBLLC’s board consists of Graber, Dorsey, and Jeremie Miller, inventor of the open and decentralized chat protocol Jabber.

For burgeoning Twitter skeptics, this should be good news: a much better arrangement than if it were owned by Dorsey or, worse yet, if it were a subsidiary of Twitter. The arrangement also explains why Bluesky PBLLC appears on Dun & Bradstreet’s list of minority and women-owned businesses: Jay Graber, Bluesky PBLLC’s CEO and primary owner, is a woman of color.

What About Twitter’s Role?

In December 2019, Dorsey, who was Twitter’s CEO at the time, announced that the company was funding Bluesky, which he described as “a small independent team of up to five open source architects, engineers, and designers to develop an open and decentralized standard for social media.”

This ultimately turned into the independent company Bluesky PBLLC, incorporated in late 2021, with $13 million in initial funding from Twitter.

Does Twitter, with Musk at the helm, have any power over Bluesky now? As is the habit of other Bluesky team members, Graber explained the situation on Bluesky. According to Graber, she “spent 6 mo of 2021 negotiating for bluesky to be built in an org independent from twitter, and boy was that the right decision.” In response to another question, Graber confirmed that Bluesky doesn’t “owe” Twitter anything.

Graber’s post explaining that Bluesky doesn’t owe Twitter anything.

Jay Graber’s post explaining that Bluesky doesn’t owe Twitter anything.

Screenshot: Micah Lee/The Intercept

Bluesky PBLLC is 100 percent independent from Twitter and Elon Musk.

What is a Public Benefit LLC?

In the name Bluesky PBLLC, PB stands for Public Benefit. PBLLCs are a relatively new type of corporation that’s designed for companies that want to promote a general or specific public benefit as opposed to just making a profit.

When whistleblower Chelsea Manning asked why Bluesky chose to incorporate as a PBLLC, Graber explained her reasoning.

Graber’s post explaining why her company chose a Public Benefit LLC

Jay Graber’s post explaining why Bluesky formed as a Public Benefit LLC.

Screenshot: Micah Lee/The Intercept

According to Graber, they chose PBLLC because it was fast to form and because “being Public Benefit means shareholders can’t sue us for pursing mission over profit.” The mission appears to be the design and promotion of the AT Protocol and its ecosystem of (eventually) other social networks that federate with Bluesky Social, along with the larger Bluesky developer community that has sprung up.

Liu, who answered some of my questions, did not respond when I asked for the exact language the Bluesky PBLLC used to describe its public benefit mission when incorporating the company. She also didn’t say whether the company would publish its annual benefits reports — reports that PBLLCs are required to create each year, but PBLLCs incorporated in Delaware, where Bluesky was incorporated, are not required to make them public.

In her email, Liu said, “We’re generally not taking interviews right now because we’re heads down on work.”

Bluesky’s Business Model

AT Protocol is open, and the code that powers Bluesky Social is open source. Yet Bluesky PBLLC is still a for-profit company. How do they plan to make money? “We’ll be publishing a blog post on our monetization plans in a few weeks, and we’ll share more then,” Liu told me.

In the meantime, the team has openly discussed hints of some of their potential plans on Bluesky. According to Why, advertising might play a role in the future.

Johnson’s post about if Bluesky will have ads

Jeromy Johnson’s post about if Bluesky will have ads.

Screenshot: Micah Lee/The Intercept

And Paul Frazee, an engineer who’s been livestreaming his Bluesky coding, hinted that the company may be considering some sort of paid subscription component. “[H]ypothetically speaking,” Frazee asked in a post, “if bluesky ever did a paid subscription thing, what would we call it.” Though Frazee was also quick to point out that he’s not as terrible at business as Musk is and wouldn’t use paid subscriptions to destroy the product — à la Twitter’s $8-a-month “verified” blue checkmarks.

Regardless of how Bluesky PBLLC eventually monetizes its product, if it gets its way, this monetization would only affect users of Bluesky Social. In the future, if you didn’t like the ads you were seeing in Bluesky, for example, the AT Protocol would allow you to take your account, including your handle, your followers, and all your posts, and move to a different social network you like better, so long as it also used the AT Protocol.

Resilient to Billionaires?

If we learned anything from Twitter over this last year, it’s that you can’t trust billionaires. By all accounts, the owners of Bluesky appear to be genuinely interested in remaking social media so that users have control instead of big tech companies like Twitter. But it’s possible that one day they could become seduced by obscene amounts of money to sell their shares of the company to an Elon Musk character who is hellbent on owning the libs. What would happen then?

Part of the problem with Twitter’s demise is that so many people have spent the last decade building up an audience there, making it very hard to finally pull the plug and start over from scratch somewhere else — even after several months of Musk’s policies have rapidly made the site more toxic and less useful at the same time.

The whole idea behind the AT Protocol, though, is that if you don’t like Bluesky Social for whatever reason, you can simply move to a rival social media site without losing your data or social graph. This is called “account portability,” and it’s baked into the core of the AT Protocol. It’s also a feature that Mastodon doesn’t support; it is possible to move your Mastodon account from one server to another and keep your followers, but only if your original server cooperates, and you’re willing to lose your old data.

So hypothetically, if a billionaire one day buys Bluesky PBLLC and ruins it, it won’t matter. Anyone who doesn’t like how Bluesky Social is run can simply switch to a rival service without losing their post history or their followers. When Musk took over Twitter and starting bringing back neo-Nazis and banning antifascists, imagine if you could have simply ported your account over to another social media site and then just kept tweeting like normal. That’s the promise of the AT Protocol.

Account portability is exactly how, once it begins to federate with other servers, Bluesky hopes to avoid the confusion that Mastodon is famous for. As Frazee explained, keeping Bluesky easy to use is a top priority.

Bluesky engineer Paul Frazee’s posts about emphasizing a good user experience

Bluesky engineer Paul Frazee’s posts about emphasizing a good user experience.

Screenshot: Micah Lee/The Intercept

Bluesky’s usability plan is simple: When you install the app and create an account, you’ll get an account on the default server, Bluesky Social (unless you already have a preference). Then, at any point after that, you can simply move your account to any other server that you prefer.

Of course, account portability is only possible if there are other AT Protocol sites to port your account to, and so far, Bluesky Social is the only one.

“Right now, Bluesky is the only option because we haven’t launched federation yet, but we’ll be starting with a sandbox environment for federation soon,” Liu told me, mentioning a recent blog post that gives an overview of how it will work. “Other companies are working on Bluesky and atproto integrations already, and when the federation sandbox launches, we’ll work with community developers and external teams to build more on the AT Protocol.”

It’s too early to tell whether Bluesky will succeed, but if it works out the way the team hopes, social media users will have far more power and tech companies — and the billionaires who own them — will have far less.

Join The Conversation


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2023/06/01/is-bluesky-billionaire-proof/feed/ 0 400050
Should we pull carbon out of the air with trees, or machines? https://grist.org/technology/should-we-pull-carbon-out-of-the-air-with-trees-or-machines/ https://grist.org/technology/should-we-pull-carbon-out-of-the-air-with-trees-or-machines/#respond Tue, 30 May 2023 10:45:00 +0000 https://grist.org/?p=610807 This transcript has been edited for length and clarity.

Every few years, the world’s top scientists come up with hundreds of different scenarios, all aimed at limiting global warming to 2º C above pre-industrial levels. The successful plans all require serious emissions cuts — not surprising, as humans have put more than 1.7 trillion metric tons of CO2 into the atmosphere over the past three centuries. But many of those plans also require something else: sucking carbon out of the atmosphere. The challenge is, no one can agree on the best way to do it

Carbon removal is a catch-all term for anything that people do that pulls CO2 out of the air and stores it somewhere else. To meet the world’s climate goals, we would need to do this on a massive scale — anywhere from 440 billion to 1.1 trillion metric tons before the end of the century. That’s more carbon than the U.S. has emitted in its entire history. 

So how do we remove all that carbon? There are two carbon removal ideas that have really captured the conversation. One is direct air capture, which are big factories that suck in tons of CO2 from the atmosphere, chemically concentrate it, and store it deep in the ground. The other idea is to simply plant trees! After all, trees have naturally sequestered carbon for millions of years. These two approaches are often viewed as technology vs. nature. 

The world’s direct air capture factories currently remove around 10,000 metric tons of CO2 each year. That’s the equivalent of more than a million gallons of gasoline. But that’s small compared to the 2 billion metric tons of CO2 removed by the world’s trees and plants each year.

Trees are also a tried-and-true method for removing carbon. They’re ready to go compared to direct air capture, which is only a few decades old. The direct air capture industry does exist, with a few facilities up and running today, but experts say it still has a ways to go. 

To better understand why pulling carbon out of the atmosphere is so difficult, imagine being given a martini and being asked to somehow extract all the gin. (Keep in mind, CO2 makes up a much smaller proportion of the atmosphere than gin does in a martini.) That’s part of the reason why carbon-removing machines have to rely on energy-intensive chemical reactions and processes, which come with a pretty hefty price tag. Critics of direct-air capture think there are way better uses for all that energy and money. Trees, on the other hand, are pretty cheap and they’re self-powered by the sun. 

Given those arguments, trees seem like the obviously better approach for carbon removal. But the choice is not nearly as clear-cut as it might seem.

Scientists think direct air capture, once it is better developed, could potentially store a lot of carbon — more even than the potential of the vast majority of the “natural” forms of carbon removal happening today. 

a chart showing squares showing that direct air capture captures more carbon than several natural types of carbon removal
Jesse Nichols / Grist

You also need to consider what happens to the carbon after it’s removed. Trees suck up carbon, turning it into wood as they grow bigger, storing this living carbon for decades or sometimes even centuries. But they can’t store it forever. Eventually, trees die and decompose, which means that carbon in plants doesn’t actually stay out of the atmosphere all that long. For this reason, scientists call this the “fast carbon cycle.” 

If you want to remove carbon for a really long time, your best bet is the slow carbon cycle. This is all the carbon that’s stored deep in the Earth. Normally, it takes up to 200 million years for carbon in this cycle to move between rocks, soil, ocean, and atmosphere, but humans short-circuited this cycle when we started digging up fossil fuels. As we burned coal and oil from the ground, we were inadvertently pulling massive amounts of ancient carbon out of the slow carbon cycle, and into our atmosphere, leading to the climate crisis we’re in today.  

Technologies like direct air capture allow us to do the exact opposite: to put that carbon back into the slow carbon cycle where it came from. When direct air capture facilities put carbon back underground, that carbon could stay there for 10,000 years or more.
So, while the goals of direct air capture and tree-based carbon removal are the same, they are really different approaches — and they’re not even the only ones. There are dozens of other ideas for removing carbon from the atmosphere, and they’re all a little different when it comes to cost, readiness level, capacity, and storage duration.

A data visual showing boxes of different sizes on a y-axis of cost. Different colors (yellow to green) depict idea readiness
Jesse Nichols / Grist

There are ideas for storing organic carbon in wetlands, in soil, and even in algae in the ocean. 

Some plans propose converting CO2 into minerals, on land and in the ocean. You can even combine trees and direct air capture — using trees or plants for energy, and capturing and injecting the carbon into the ground.

Scaling up our carbon removal is going to be challenging, and there are legitimate concerns that it could distract from the highest priority goal of cutting emissions in the first place. But even with dramatic cuts to how much CO2 we release into the atmosphere, scientists say carbon removal is probably going to be necessary.

Methodology

We got our data from the 2022 IPCC report, which compiled data from dozens of carbon removal studies that estimated the cost, capacity, and storage duration for each carbon removal idea. It also ranked how well each technology is developed, on a scale of 1-9.

The report presents low and high estimates for each category. For simplicity, we chose an average of the two estimates to show on our charts. We also aimed to show the ranges wherever possible. Although there are plenty of ways to remove carbon with trees, we focused on “afforestation/reforestation” — which is a technical term for planting new forests or restoring cut forests.

At one point in the video, we show a visual depicting the amount of carbon currently being removed by trees and other plants. This figure at 2:03 comes from the State of Carbon Dioxide Removal report, and includes carbon removed through afforestation, reforestation, agroforestry, soil carbon, wetland restoration, and improved forest management. The report also includes carbon stored in durable wood products, though this sub category is subject to scientific debate. Later, at 2:34, we chose to exclude durable wood products in our figure depicting tons of carbon removed due forms of natural processes. This was based on a lack of data in the IPCC report on durable wood goods.

For simplicity and data purposes, we couldn’t include every carbon removal idea in our video. If you’d like to learn about more carbon removal ideas, check out the 2022 IPCC report.

This story was originally published by Grist with the headline Should we pull carbon out of the air with trees, or machines? on May 30, 2023.


This content originally appeared on Grist and was authored by Jesse Nichols.

]]>
https://grist.org/technology/should-we-pull-carbon-out-of-the-air-with-trees-or-machines/feed/ 0 399387
“Free Trade” as Revealed in the China-United States Paradigm https://www.radiofree.org/2023/05/29/free-trade-as-revealed-in-the-china-united-states-paradigm/ https://www.radiofree.org/2023/05/29/free-trade-as-revealed-in-the-china-united-states-paradigm/#respond Mon, 29 May 2023 15:00:27 +0000 https://dissidentvoice.org/?p=140352
Free trade is much ballyhooed by the US and the capitalist world, but critics have been skeptical as to whether such trade freely takes place.

Investopedia provides a useful definition of free trade:

A free trade agreement is a pact between two or more nations to reduce barriers to imports and exports among them. Under a free trade policy, goods and services can be bought and sold across international borders with little or no government tariffs, quotas, subsidies, or prohibitions to inhibit their exchange.

The concept of free trade is the opposite of trade protectionism or economic isolationism.

In the eyes of the US, China is threateningly making major headway in 6G, AI, robotics, supercomputing among other technology fields. This has scared the Biden administration, so Biden has sought to cut off Chinese access to semiconductor chips below 14 nanometers. Foreign Policy called it going for China’s jugular after one term of ex-US president Donald Trump inflicting “flesh wounds” to China.

“This is economic coercion and is unacceptable,” said China’s foreign ministry spokesperson Mao Ning of the US actions. China did not stand idly by; it banned the US memory chip Micron on security grounds.

China, correspondingly, has reduced its import of chips by $129.1 billion since 2022, harming US, Taiwanese, and Korean exporters and giving Shanghai’s SMIC a shot in the arm.

Billionaire investor Warren Buffett was so bearish on the world’s largest semiconductor company, TSMC, that he sold all his shares.

The US also told ASML, producer of lithography machines used to make chips, to curb sales to China. Hence, China was forced to develop its own lithography machines to produce chips. ASML also has seen a decline in its profit picture and now is potentially faced with competition from a former customer. Telecommunications giant and leader in 5G technology, Huawei, has found itself faced with trade barriers relentlessly erected by the US. It was forced to develop its own lithography machines. Peter Winnick, president of ASML, complained that China’s development of its own lithography machine “is a ‘destructive behavior” that will cause impact and chaos to the global chip industry chain.” ASML, however, is said to be considering to ignore US directives on such technology sales.

Even US chip makers, whose businesses are adversely affected by government directives, are instead prioritizing their own business with China.

This situation is similar to what transpired when the US rejected Chinese participation in the International Space Station. China went out and built its own space station, the Tiangong, which orbits the planet 340 and 450 km above the surface.

So far protectionism has proven a double-edged sword for the US and its allies, as initially China is negatively affected, but soon enough, China winds up becoming independent for these technologies while also becoming an exporting competitor in the marketplace for such technologies.

I interviewed Wei Ling Chua, the author of 3 books including Democracy: What the west can learn from China and Tiananmen Square’s “Massacre”? The Power of Words vs Silent Evidence, for his perspective.

Kim Petersen: The United States has always trumpeted the benefits of so-called free trade being “A rising tide lifts all boats.” That is fine when you have the biggest boat in global capitalism. But does that tide raise all boats equally? China, which eschews hegemony, now has a big boat, and that boat is portrayed as a threat to the US. The US hegemon prides itself on being exceptional, indispensable, and craving full-spectrum dominance. Yet fear of the China threat caused former US president Barack Obama to exclude China from negotiations on the Trans-Pacific Partnership, which was to comprise the largest free-trade region in history and include forty percent of world trade. Obama’s successor Donald Trump scuttled that deal, but he enacted various sanctions and tariffs against China. Fast forward to Joe Biden and the anti-China rhetoric continues unabated. Biden’s disdain for free trade is revealed by the continuation of sanctions against China, depicting it as a security threat, and never producing any credible evidence to support his assertion. In particular, Biden has sought to squeeze China out from access to chip technology and from the purchase of lithography machines to produce the chips. It has sought to cajole or coerce myriad countries such as Japan, South Korea, Netherlands, and the Chinese province of Taiwan to join in the denial of trade. In doing so, it appears that Biden and the complying countries have shot themselves in the foot. How do you see this denial of trade, imposing tariffs (i.e., protectionism), and sanctioning playing out?

Wei Ling Chua: Western so-called free trade was designed at a time when they had absolute advantages in many areas over the rest of the world. Why wouldn’t they? After centuries of colonialism, wars, slavery, and looting, the West enjoyed absolute advantages in wealth accumulation (they are very rich with plenty of cash to take over the assets of others and attract talents from all over the world) after WW2. The West was also more industrialized after the world war, while much of the rest of the world was war ravaged, poor, and under-developed. So, their so-called free trade is nothing more than demanding the lesser-developed world to allow the West to use money looted from them to take control of their assets, resources, market, and factories, and keep the economies of lesser-developed nations in the primitive stage of cheap labor, cheap resources, and polluting industry.

The WTO, IMF, and the World Bank are just tools that the West uses to control the rest of the world’s opportunities to freely trade with each other and access funding. The West uses these financial tools to manipulate free access to member-state markets by erecting trade barriers against countries who seek to protect local industry and, therefore, refuse to accept western-imposed trading terms.

It took China 15 years of negotiation with the US before the US allowed China to enter the WTO in 2000. During that time, the West was happy to transfer polluted and labor-intensive industries to China: they were happy to allow China to set up factories to assemble iPhones for Apple. Why not? Apple pays the price of a cappuccino to the Chinese factories for each iPhone assembled while selling the iPhones back to Chinese consumers and the rest of the world for hundreds of dollars per unit of iPhone.

There is absolutely no such thing as Western kindness in setting up factories in China or importing in a big way from China. The benefits to both sides are not equal. It is about the West eating the meat and drinking the soup, and the leftover meat on the bone is then shared among millions of Chinese wage slaves. So, in 2017, when China successfully test flies her passenger plane C919, the news heading across China is (translated): “the day China uses 800 million shirts in exchange for one Boeing Plane will become history“.

In recent years, we have witnessed how the US initiated a series of sanctions against Chinese high-tech manufacturers and products of far higher quality than US companies are able to produce. The victims include Huawei 5G, smartphones, chip imports, DJI drones, TikTok, etc. So, the so-called free market never existed in real terms under the western International rule-based order.

It is the Chinese who oblige free trade: The Chinese happily enjoy and buy quality products from all over the world. At the time of unfair US sanctions against Huawei and many other Chinese high-tech firms, China continued to allow Apple to make huge profits in China, and it openly assured the world that China will not resort to protectionism. As long as foreign companies do not violate Chinese law, they are free to conduct their business as usual in China, and they will be treated as equal as the local businesses.

As we can see, the US counters competition with protectionism in the form of sanctions and bullying, whereas China overcomes competition via innovation through investment in education, R&D, and building government infrastructure to facilitate the development of new technology. E.g., China has just overtaken Japan as the world’s top car exporter, and this was made possible by the farsighted investment of the Chinese government in laying down the foundation for EV car manufacturing with market readiness, such as offering incentives for consumers to buy EV cars and building millions of battery charging stations to facilitate the use of EV cars across the country.

As for Internet technology, after decades of paying billions and billions of dollars for intellectual property to US companies for using their 2G, 3G, and 4G technologies, the Chinese company Huawei invested heavily in R&D and produced a far more advanced 5G technology and began to collect intellectual property payments from the world for using its 5G. This is something that the West, particularly the US cannot tolerate. So, by sanctioning Huawei 5G (the world’s most affordable and advanced 5G technology), the US lost its ability to facilitate its tech companies to develop AI technology that required high-speed wifi, while the Chinese state-owned telecommunication companies heavily invested in building millions of Huawei 5G stations across the country to facilitate Chinese companies in developing AI technology. As a result, according to Nicholas Chaillan, the Pentagon’s ex-software chief: “China has won AI battle with the US.” In fact, former British Business and Industry Minister Vince Cable said in an interview in 2022, “The UK government decision to ban Huawei 5G equipment and services had nothing to do with national security, and was because of American pressure.” Cable then, regrettably, made this statement: “If Britain had kept with 5G, we would now be at the forefront of countries using the most advanced technologies, and we are not.”

In fact, in the semiconductor sector, the US-led sanctions on technology exports to China have effectively given away more than $300 billion per year worth of the Chinese chip market (the world’s biggest) exclusively to the Chinese chip industry. As a result, we have already witnessed US chip companies’ revenues being reduced, share prices dropping and a massive staff retrenchment taking place while China experienced a rise in chip production and a drop in imports.

It is not hard to predict what will happen to the US and China under US sanctions:

1) Without the world’s biggest market, many of the US high-tech companies will lose economies of scale, and be eventually unable to compete in the world market.

2) The US’s destructive behavior that violates market regulations only serves to alert the world to the risk of investing, buying, and doing business with the US. The weaponization of the supply chain will only damage the US’s credibility and reliability as a business partner in the mind of the rest of the world.

3) As for China, upholding fair trade and continuing to protect the interests of all foreign investment in China, including Apple, this will enforce the world impression of a reliable and stable Chinese business environment. Hence, China will continue to become a magnet for world investors.


This content originally appeared on Dissident Voice and was authored by Kim Petersen.

]]>
https://www.radiofree.org/2023/05/29/free-trade-as-revealed-in-the-china-united-states-paradigm/feed/ 0 399201
“Free Trade” as Revealed in the China-United States Paradigm https://www.radiofree.org/2023/05/29/free-trade-as-revealed-in-the-china-united-states-paradigm/ https://www.radiofree.org/2023/05/29/free-trade-as-revealed-in-the-china-united-states-paradigm/#respond Mon, 29 May 2023 15:00:27 +0000 https://dissidentvoice.org/?p=140352
Free trade is much ballyhooed by the US and the capitalist world, but critics have been skeptical as to whether such trade freely takes place.

Investopedia provides a useful definition of free trade:

A free trade agreement is a pact between two or more nations to reduce barriers to imports and exports among them. Under a free trade policy, goods and services can be bought and sold across international borders with little or no government tariffs, quotas, subsidies, or prohibitions to inhibit their exchange.

The concept of free trade is the opposite of trade protectionism or economic isolationism.

In the eyes of the US, China is threateningly making major headway in 6G, AI, robotics, supercomputing among other technology fields. This has scared the Biden administration, so Biden has sought to cut off Chinese access to semiconductor chips below 14 nanometers. Foreign Policy called it going for China’s jugular after one term of ex-US president Donald Trump inflicting “flesh wounds” to China.

“This is economic coercion and is unacceptable,” said China’s foreign ministry spokesperson Mao Ning of the US actions. China did not stand idly by; it banned the US memory chip Micron on security grounds.

China, correspondingly, has reduced its import of chips by $129.1 billion since 2022, harming US, Taiwanese, and Korean exporters and giving Shanghai’s SMIC a shot in the arm.

Billionaire investor Warren Buffett was so bearish on the world’s largest semiconductor company, TSMC, that he sold all his shares.

The US also told ASML, producer of lithography machines used to make chips, to curb sales to China. Hence, China was forced to develop its own lithography machines to produce chips. ASML also has seen a decline in its profit picture and now is potentially faced with competition from a former customer. Telecommunications giant and leader in 5G technology, Huawei, has found itself faced with trade barriers relentlessly erected by the US. It was forced to develop its own lithography machines. Peter Winnick, president of ASML, complained that China’s development of its own lithography machine “is a ‘destructive behavior” that will cause impact and chaos to the global chip industry chain.” ASML, however, is said to be considering to ignore US directives on such technology sales.

Even US chip makers, whose businesses are adversely affected by government directives, are instead prioritizing their own business with China.

This situation is similar to what transpired when the US rejected Chinese participation in the International Space Station. China went out and built its own space station, the Tiangong, which orbits the planet 340 and 450 km above the surface.

So far protectionism has proven a double-edged sword for the US and its allies, as initially China is negatively affected, but soon enough, China winds up becoming independent for these technologies while also becoming an exporting competitor in the marketplace for such technologies.

I interviewed Wei Ling Chua, the author of 3 books including Democracy: What the west can learn from China and Tiananmen Square’s “Massacre”? The Power of Words vs Silent Evidence, for his perspective.

Kim Petersen: The United States has always trumpeted the benefits of so-called free trade being “A rising tide lifts all boats.” That is fine when you have the biggest boat in global capitalism. But does that tide raise all boats equally? China, which eschews hegemony, now has a big boat, and that boat is portrayed as a threat to the US. The US hegemon prides itself on being exceptional, indispensable, and craving full-spectrum dominance. Yet fear of the China threat caused former US president Barack Obama to exclude China from negotiations on the Trans-Pacific Partnership, which was to comprise the largest free-trade region in history and include forty percent of world trade. Obama’s successor Donald Trump scuttled that deal, but he enacted various sanctions and tariffs against China. Fast forward to Joe Biden and the anti-China rhetoric continues unabated. Biden’s disdain for free trade is revealed by the continuation of sanctions against China, depicting it as a security threat, and never producing any credible evidence to support his assertion. In particular, Biden has sought to squeeze China out from access to chip technology and from the purchase of lithography machines to produce the chips. It has sought to cajole or coerce myriad countries such as Japan, South Korea, Netherlands, and the Chinese province of Taiwan to join in the denial of trade. In doing so, it appears that Biden and the complying countries have shot themselves in the foot. How do you see this denial of trade, imposing tariffs (i.e., protectionism), and sanctioning playing out?

Wei Ling Chua: Western so-called free trade was designed at a time when they had absolute advantages in many areas over the rest of the world. Why wouldn’t they? After centuries of colonialism, wars, slavery, and looting, the West enjoyed absolute advantages in wealth accumulation (they are very rich with plenty of cash to take over the assets of others and attract talents from all over the world) after WW2. The West was also more industrialized after the world war, while much of the rest of the world was war ravaged, poor, and under-developed. So, their so-called free trade is nothing more than demanding the lesser-developed world to allow the West to use money looted from them to take control of their assets, resources, market, and factories, and keep the economies of lesser-developed nations in the primitive stage of cheap labor, cheap resources, and polluting industry.

The WTO, IMF, and the World Bank are just tools that the West uses to control the rest of the world’s opportunities to freely trade with each other and access funding. The West uses these financial tools to manipulate free access to member-state markets by erecting trade barriers against countries who seek to protect local industry and, therefore, refuse to accept western-imposed trading terms.

It took China 15 years of negotiation with the US before the US allowed China to enter the WTO in 2000. During that time, the West was happy to transfer polluted and labor-intensive industries to China: they were happy to allow China to set up factories to assemble iPhones for Apple. Why not? Apple pays the price of a cappuccino to the Chinese factories for each iPhone assembled while selling the iPhones back to Chinese consumers and the rest of the world for hundreds of dollars per unit of iPhone.

There is absolutely no such thing as Western kindness in setting up factories in China or importing in a big way from China. The benefits to both sides are not equal. It is about the West eating the meat and drinking the soup, and the leftover meat on the bone is then shared among millions of Chinese wage slaves. So, in 2017, when China successfully test flies her passenger plane C919, the news heading across China is (translated): “the day China uses 800 million shirts in exchange for one Boeing Plane will become history“.

In recent years, we have witnessed how the US initiated a series of sanctions against Chinese high-tech manufacturers and products of far higher quality than US companies are able to produce. The victims include Huawei 5G, smartphones, chip imports, DJI drones, TikTok, etc. So, the so-called free market never existed in real terms under the western International rule-based order.

It is the Chinese who oblige free trade: The Chinese happily enjoy and buy quality products from all over the world. At the time of unfair US sanctions against Huawei and many other Chinese high-tech firms, China continued to allow Apple to make huge profits in China, and it openly assured the world that China will not resort to protectionism. As long as foreign companies do not violate Chinese law, they are free to conduct their business as usual in China, and they will be treated as equal as the local businesses.

As we can see, the US counters competition with protectionism in the form of sanctions and bullying, whereas China overcomes competition via innovation through investment in education, R&D, and building government infrastructure to facilitate the development of new technology. E.g., China has just overtaken Japan as the world’s top car exporter, and this was made possible by the farsighted investment of the Chinese government in laying down the foundation for EV car manufacturing with market readiness, such as offering incentives for consumers to buy EV cars and building millions of battery charging stations to facilitate the use of EV cars across the country.

As for Internet technology, after decades of paying billions and billions of dollars for intellectual property to US companies for using their 2G, 3G, and 4G technologies, the Chinese company Huawei invested heavily in R&D and produced a far more advanced 5G technology and began to collect intellectual property payments from the world for using its 5G. This is something that the West, particularly the US cannot tolerate. So, by sanctioning Huawei 5G (the world’s most affordable and advanced 5G technology), the US lost its ability to facilitate its tech companies to develop AI technology that required high-speed wifi, while the Chinese state-owned telecommunication companies heavily invested in building millions of Huawei 5G stations across the country to facilitate Chinese companies in developing AI technology. As a result, according to Nicholas Chaillan, the Pentagon’s ex-software chief: “China has won AI battle with the US.” In fact, former British Business and Industry Minister Vince Cable said in an interview in 2022, “The UK government decision to ban Huawei 5G equipment and services had nothing to do with national security, and was because of American pressure.” Cable then, regrettably, made this statement: “If Britain had kept with 5G, we would now be at the forefront of countries using the most advanced technologies, and we are not.”

In fact, in the semiconductor sector, the US-led sanctions on technology exports to China have effectively given away more than $300 billion per year worth of the Chinese chip market (the world’s biggest) exclusively to the Chinese chip industry. As a result, we have already witnessed US chip companies’ revenues being reduced, share prices dropping and a massive staff retrenchment taking place while China experienced a rise in chip production and a drop in imports.

It is not hard to predict what will happen to the US and China under US sanctions:

1) Without the world’s biggest market, many of the US high-tech companies will lose economies of scale, and be eventually unable to compete in the world market.

2) The US’s destructive behavior that violates market regulations only serves to alert the world to the risk of investing, buying, and doing business with the US. The weaponization of the supply chain will only damage the US’s credibility and reliability as a business partner in the mind of the rest of the world.

3) As for China, upholding fair trade and continuing to protect the interests of all foreign investment in China, including Apple, this will enforce the world impression of a reliable and stable Chinese business environment. Hence, China will continue to become a magnet for world investors.


This content originally appeared on Dissident Voice and was authored by Kim Petersen.

]]>
https://www.radiofree.org/2023/05/29/free-trade-as-revealed-in-the-china-united-states-paradigm/feed/ 0 399202
What We’re Reading and Watching https://www.radiofree.org/2023/05/28/what-were-reading-and-watching/ https://www.radiofree.org/2023/05/28/what-were-reading-and-watching/#respond Sun, 28 May 2023 10:00:00 +0000 https://production.public.theintercept.cloud/?p=429399

Fiction

Nights of Plague,” Orhan Pamuk
Like many other people during the pandemic, I searched for books that could help me understand the impact of a mass disease outbreak on society. Above any book of epidemiology or history, however, I found that this novel by Turkish writer Orhan Pamuk about an outbreak of plague on a fictional Mediterranean island to be the most enlightening about how disease can sap the human spirit and break open divisions within a society. His writing is darkly humorous and full of pathos — highly recommended for anyone looking for a novel to immerse themselves in this summer. – Murtaza Hussain

Cuatro Manos,” Paco Ignacio Taibo II
The novel “Cuatro Manos” was published in 1997 and features major historical characters and events from 20th century Latin America. Taibo, a renowned author and activist in Mexico, guides us through a story of two journalists in the 1980s. They begin to investigate unpublished and undiscovered works by Russian revolutionary Leon Trotsky, written during his exile in Mexico City. The book jumps between the past and the present. And the two journalists’ travels through Latin America overlap with drug traffickers, a Spanish anarchist, a Bulgarian communist, and a shady CIA agent. It’s a light, fun novel, but it may require the reader to stop at every few pages and independently research historical events Taibo narrates, like the CIA’s alleged involvement in the killing of Salvadoran poet Roque Dalton. – José Olivares

Harrow,” Joy Williams
On the banks of a fetid lake called Big Girl, a cadre of aging rebels plots acts of ecoterrorism. They don’t consider themselves terrorists, though, reserving that appellation for bankers and war-mongers, “exterminators and excavators … those locusts of clattering, clacking hunger.” You can hardly blame them. In this vision of a near-future beset by ecological collapse, oranges and horses are long gone, but Disney World has “rebooted and is going strong.” A girl named Khirsten, or Lamb, who may or may not have been resurrected as an infant, stumbles upon the group after her mother disappears and her boarding school abruptly shuts down.

This is the rough plot of “Harrow” by Joy Williams, but the plot is not really the point. Williams is a worldbuilder, crafting mood and meaning out of layered fragments. Her writing is often called “experimental,” but if anything, oblique prose is the truest way to capture life under the yoke of apocalypse, the dizzying absurdity of deciding to forsake Earth for profit. Sometimes, lucid revelations peek through — “I think the world is dying because we were dead to its astonishments pretty much. It’ll be around but it will become less and less until it’s finally compatible with our feelings for it” — though for the most part, the world of “Harrow” is a labyrinth of decay. But don’t be mistaken: The book is very funny. Apocalypse is a slow creep, and while the Earth might not end with a bang, at least in “Harrow,” it ends with one final, reverberating laugh. – Schuyler Mitchell

Red Team Blues,” Cory Doctorow
I just started “Red Team Blues,” and I can’t put it down. I’ve always loved Cory Doctorow’s novels, and this one is no exception. The protagonist, a 67-year-old retired forensic accountant who lives alone in his RV called the Unsalted Hash, spent his career tracking down assets of the ultra-rich by unwinding their shady networks of shell companies. He took one final job from an old friend and found himself both incredibly rich and in a world of trouble, trying to escape with his life. This book is a cryptocurrency techno-thriller (full of characters who are skeptical of crypto bros and insist that “crypto means cryptography”), and it’s full of money laundering, tax havens, lawyers for the 1 percent, organized crime and murders, hacking and open source intelligence, and so much more. This is the first book in a new series that I definitely plan on reading as they come out. – Micah Lee

In Memory of Memory,” Maria Stepanova
Appropriate to its contents, the title so easy to remember, yet always escapes memory. – Fei Liu

Long Way Down,” Jason Reynolds
I don’t often reach for poetry, but I had 15 minutes before I boarded a flight and had neglected to pack a book. The cover was riddled with awards and, most importantly, it was right next to the checkout. “Long Way Down” captures an emotional journey of grief built around a young man’s descent in an elevator after his brother is shot and killed. The book is an intense, quick read (I finished before we landed), written in captivating staccato narrative verse. The anxiety was palpable and fierce, and the structure truly enhances the reading experience. I found myself reflecting on Reynolds’s motivation for structural decisions, just as much as his word choice. Overall, “Long Way Down” is a powerful study in the traumatic and lasting impact of violence on individuals and communities. – Kate Miller

The Melancholy of Resistance,” László Krasznahorkai
I’ve been — very slowly! — reading “The Melancholy of Resistance” by László Krasznahorkai, a Hungarian writer best known in the U.S. for Béla Tarr’s grueling film adaptation of his novel “Sátántangó.” Written during the collapse of Eastern Bloc communism, “Melancholy” tells the surreal tale of a rubbish-strewn town visited by a mysterious circus exhibiting only the body of a giant whale, which slowly incites the townspeople to madness. As the town’s petty tyrants scheme to use the chaos to their advantage, Krasznahorkai’s novel becomes a striking parable about the appeal of fascism in uncertain times, while his darkly funny stream-of-consciousness prose captures the devilish internal logic of anxiety. “His followers know all things are false pride, but they don’t know why.” Sound familiar? – Thomas Crowley

The Actual True Story of Ahmed and Zarga,” Mohamedou Ould Slahi
I found myself laughing, loudly, overcome with appreciation and awe during the first few pages of my friend Mohamedou Ould Slahi’s first novel, “The Actual True Story of Ahmed and Zara.” Mohamedou opens the book by swearing “on the belly button of my only sister” that the story we are about to hear is a thousand percent true and that we must have already heard it before. What begins to unfold is a mystical tale so rich in detail, tradition, Mauritanian culture, and moral guidance that you feel Mohamedou himself is speaking all this to you, and only you, while slurping his hot tea and conjuring the tale with his hands. It’s impossible to put the pages down once you start across the desert with Ahmed, battling djinns, dreams, snakes, and the changing ways of the world as he races to find his missing camel named Zarga. While Mohamedou is best known for captivating the world with best-selling memoir “Guantánamo Diary” and as the subject of the film “The Mauritanian,” both about his time wrongly imprisoned and tortured at GTMO, it is this stunning novel, rich with wordplay, wit, and unwavering conviction, that lets us know his true heart. – Elise Swain

The Lathe of Heaven,” Ursula K. Le Guin
Have you ever woken up from a dream so intense that it affected you in real life? George Orr’s dreams change lived reality, so he wants to stop sleeping, and the only person who can cure him is his misguided psychiatrist whose ambitions to make their dystopia, and his own position in it, “better” means that Orr can’t be treated just yet. Le Guin’s topical themes of techno-utopianism, alternate realities, collective false memories, living nightmares, consent, and more make me forget that it was published in 1971. The novel also has aliens, untranslatable words, a Beatles song, plague history, and Hollywood-thriller plot scaffolding (a cinematic climax and almost forced coupling of the passive protagonist who falls in love with the lawyer helping him). Two video artists made a film adaptation in 1980 on a shoestring budget — with Le Guin’s active involvement — that was produced by NYC public television and aired on PBS. I haven’t watched it yet (it’s available on YouTube), but in my dream soundtrack for “The Lathe of Heaven,” I hear the late Pauline Anna Strom’s prelude-to-a-portal “Marking Time” over the opening credits. – Nara Shin

Nonfiction

The Undertow: Scenes From a Slow Civil War,” Jeff Sharlet
I’ve been reading Jeff Sharlet’s reporting on the varieties of Christian authoritarianism for more than 20 years. In books such as “The Family” and “C Street,” Sharlet exposed the political ambitions and hidden influence of shadowy and well-financed Christian extremists. Looking back, after the Trump presidency, his writings now seem prophetic. In “The Undertow,” Sharlet sets out to understand the movement that coalesced, under Donald Trump, into full-blown messianic fascism. How do we stop this slow-motion slide toward political violence, the strange lure of civil war? – Roger Hodge

Black Women Writers at Work,” Claudia Tate
In this powerhouse of a collection, Claudia Tate interviews iconic Black women writers, from Gwendolyn Brooks to Ntozake Shange, about their process, inspirations, critiques, and audience. I was personally thrilled to read about the differences between the structures of their writing processes, as well as their thoughts on craft — it’s a trove of knowledge for any writer, poet, or playwright. Black women writers are often lumped together as a monolith; this book breaks apart that belief throughout every single interview. – Skyler Aikerson

A World Without Soil,” Jo Handelsman
No time to write! Only to read and garden! – Fei Liu

Nineteen Reservoirs: On Their Creation and the Promise of Water for New York City,” Lucy Sante
Best known for “Lowlife,” her masterpiece history of low-class New York City’s metaphorical underground, Lucy Sante of late turned her sights on the underwater. Specifically, in “Nineteen Reservoirs,” she tells the stories of upstate New York valleys and ravines, hamlets and farms, all drowned one by one to expand the water supply of the growing metropolis downstate. Sante writes with the verve we expect from her, transmitting an astounding amount of rapid-fire details and facts with delectable prose that keeps it humming and makes it easy reading. – Ali Gharib

Mussolini’s Grandchildren,” David Broder
When it became clear last year that my country was about to elect its most rightwing government since Benito Mussolini gave fascism its name, I found it hard to explain to non-Italians how we had gotten there, so I pointed them to David Broder’s words instead. After speaking with Broder for a story about how new Prime Minister Giorgia Meloni had inspired a surge of far-right threats and attacks against journalists and critics, I picked up his book, “Mussolini’s Grandchildren,” a lucid if terrifying history drawing the direct and rather explicit line between Mussolini’s regime and Meloni’s political triumph. It’s a history even many Italians watched unfold almost without noticing, deluded by the notion that fascism is for the history books alone, or maybe just wishing to look the other way. It’s also by no means an Italian story alone. – Alice Speri

Chaos: Charles Manson, the CIA, and the Secret History of the Sixties,” Tom O’Neill
I am reading “Chaos” alongside “Women in Love” by D. H. Lawrence. I recommend listening to The Fucktrots while reading. – Daniel Boguslaw

Strange Tapes” zine
DIY zines oft offer a kaleidoscopic peek down the subcultural spiral. No matter how fringe a particular hobby may look, the deeper you dive into a given genre, the more singular the subject matter becomes. Strange Tapes is a zine devoted to the celebratory archaeology of unearthing VHS ephemera: analog jetsam that’s washed up on the shores of thrift stores and swap meets, or in the dregs of dusty attics and musty basements. The tapes covered range from promotional and instructional videos, to recorded home movies and Z-grade filmmaking efforts. Interspersed with reviews of the tapes are interviews with independent filmmakers, collectors, and other personalities. “Strange Tapes” is a zine for those who marvel at the sheer range of humanity’s knowledge base, and the accompanying desire to share those singular skill sets with the world at large, whether those proficiencies are in the realm of ocular yoga or canine choreography.  – Nikita Mazurov

Care Work: Dreaming Disability Justice,” Leah Lakshmi Piepzna-Samarasinha
A love letter to the sick and disabled queer and trans community of color in Canada and beyond. This collection of essays discusses everything from chronic suicidal ideation, accessible queer spaces, invisible femme labor, tips for sick and disabled artists who are traveling, and much, much more. Listening to this audiobook (narrated by the author) was such a beautiful, impactful experience; Piepzna-Samarasinha writes with sizzling rage and deep love for their communities in a way that will set you on fire. – Skyler Aikerson

Arabiyya: Recipes from the Life of an Arab in Diaspora,” Reem Assil
For the past several years, I’ve been learning to recreate the Syrian dishes I ate growing up, begging my mom to commit to writing (or at least a voice note) the recipes she knows via muscle memory and FaceTiming her when something just doesn’t look right. More recently, I’ve sought to expand my repertoire of dishes from Syria and the broader Levant by digging into cookbooks written by chefs from the region. “Arabiyya” by Reem Assil is the most recent addition to my collection, which also includes “The Palestinian Table” by Reem Kassis and “Feast: Food of the Islamic World” by Anissa Helou.

Assil, who was born in the United States to a Syrian father and Palestinian mother, weaves personal stories about her food experiences as a diaspora Arab with recipes that run the gamut from pickled vegetables to a slow-cooked lamb shoulder. I’ve so far attempted her shawarma mexiciyya (Mexican shawarma) — a fusion dish that she describes in English as al pastor-style red-spiced chicken — and her kafta bil bandoura, or meatballs in Arab-spiced tomato sauce. The shawarma recipe features my all-time favorite spice, Aleppo pepper, which I threw into the meatballs as well. (I don’t quite yet have my mom’s nafas yet, but I’m slowly but surely trying to wean myself off the dictates of a written recipe.) This summer, I’m looking forward to trying my hand at making saj, a flatbread named for the dome-shaped griddle it is prepared on, and musakhan, a Palestinian dish that involves sumac-spiced chicken. – Maryam Saleh

Films

Joyland,” Saim Sadiq
I’ve thought about “Joyland” at least once a day since it opened in New York earlier this month. I’ve already seen it twice — that’s how obsessed I am with this gorgeous, emotional tour de force of a film. Haider is an unemployed, acquiescent young man who lives in a joint household in Lahore with his free-spirited wife, his conventionally masculine older brother and his family, and his elderly patriarch father. Haider finds a job as a backup dancer for a fierce trans burlesque performer, who he has an instant crush on. What happens from there sends a ripple effect through his family, as they each strain against the stifling scripts of gender and sexuality that they impose on themselves and each other.

“Joyland” is a deeply human story about untangling desires from obligations to embody the most honest version of ourselves for a chance to experience connection as we are. It’s a movie you feel just as much as you watch. – Rashmee Kumar

Return to Seoul,” Davy Chou
This movie is so unusual, a mixture of a transnational adoption documentary and a film noir, created by the French director Davy Chou. “Return to Seoul” follows the journey of a Korean adoptee played by the elusive Park Ji-min, who wasn’t an actor at all until taking the lead role in this film. Park’s character decides on a whim to return to the country where she was born, and the result is a film that goes sideways at every issue and scenario it lands on. Yes, it’s the saga of an adoptee who seeks out her birth parents, but that’s just some of what happens. It unfolds with visual and existential twists you don’t expect, keeping you in suspense until the last note. It also provides an imaginative variation on the discourse about the emotional dislocation that foreign adoption can involve. If you want to know more about that after the credits roll, I highly recommend the landmark “Adopted Territory,” written by anthropologist (and friend) Eleana J. Kim. – Peter Maass

Join The Conversation


This content originally appeared on The Intercept and was authored by The Intercept.

]]>
https://www.radiofree.org/2023/05/28/what-were-reading-and-watching/feed/ 0 399043
Luddite, or Cantankerous, or Naysayer, or Devil’s Advocate, Backward, or … https://www.radiofree.org/2023/05/27/luddite-or-cantankerous-or-naysayer-or-devils-advocate-backward-or/ https://www.radiofree.org/2023/05/27/luddite-or-cantankerous-or-naysayer-or-devils-advocate-backward-or/#respond Sat, 27 May 2023 14:27:14 +0000 https://dissidentvoice.org/?p=140558

King Ludd


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]> https://www.radiofree.org/2023/05/18/budget-2023-nzs-climate-and-science-sectors-react-to-wins-and-losses/feed/ 0 395872 Can the Global South Build a New World Information and Communication Order? https://www.radiofree.org/2023/05/18/can-the-global-south-build-a-new-world-information-and-communication-order/ https://www.radiofree.org/2023/05/18/can-the-global-south-build-a-new-world-information-and-communication-order/#respond Thu, 18 May 2023 15:23:12 +0000 https://dissidentvoice.org/?p=140272

Meas Sokhorn (Cambodia), Inverted Sewer, 2014.

It is remarkable how the media in a select few countries is able to set the record on matters around the world. The European and North American countries enjoy a near-global monopoly over information, their media houses vested with a credibility and authority inherited from their status during colonial times (BBC, for instance) as well as their command of the neocolonial structure of our times (CNN, for instance). In the 1950s, the post-colonial nations identified the West’s monopoly over media and information and sought to ‘promote the free flow of ideas by word and by image’, as the 1945 Constitution of the United Nations Educational, Scientific, and Cultural Organisation (UNESCO) put it.

As part of the Non-Aligned Movement, the countries and regions of Africa, Asia, and Latin America developed their own national and regional news institutions: in 1958, a UNESCO seminar held in Quito (Ecuador) led to the establishment of a regional school to train journalists and communications professionals in 1960 known as the International Centre of Advanced Communication Studies for Latin America (CIESPAL); in 1961, a meeting held in Bangkok created the Organisation of Asia-Pacific News Agencies (OANA); and in 1963, a conference held in Tunis created the Union of African News Agencies (UANA). These agencies tried to amplify the voices of the Third World through their own media, but also – unsuccessfully – within the media houses of the West. Alongside these efforts, at the UNESCO General Conference of 1972, Soviet Union and UNESCO experts from more than a dozen countries put forward a resolution entitled the ‘Declaration of Guiding Principles for the Use of Satellite Broadcasting for the Free Flow of Information, the Spread of Education, and Greater Cultural Exchange’, which called for nations and peoples to have the right to determine what information is broadcasted in their countries. Like other such efforts, it was opposed by Western states, with the United States at its helm. Although conference after conference, from Bangkok to Santiago, took the issue of the democratisation of the press seriously, this opposition meant that little advancement was possible.

Dominique Bwalya Mwando (Democratic Republic of the Congo), Lumumba’s Speech, 2005.

In the 1970s and 1980s, these efforts came together in the movement to build the New World Information and Communication Order to address the global imbalances in this sphere between developed and developing countries. This idea was influential on UNESCO’s International Commission for the Study of Communication Problems, or MacBride Commission, established in 1977 and chaired by the Irish politician and Nobel laureate Seán MacBride, which produced an important, but little-read, report on the topic (Many Voices, One World, 1980). In 1984, the United States withdrew from UNESCO in response to these initiatives. The privatisation of the media in the 1980s ultimately killed off any attempt by the Third World to create sovereign media networks – even where these networks were anti-communist (as with the Asia-Pacific News Network, established in Kuala Lumpur, Malaysia in 1981).

However, in recent years, this dream of the free flow of information has been revived by movements of the Global South, which have been frustrated by the near-total absence of their views in international debates and by the imposition of a narrow, foreign worldview on their countries about the dilemmas that they face (war and hunger, for instance). As part of this revival, hundreds of editors and journalists from the Global South gathered in Shanghai (China) in early May for the Global South International Communication Forum. At the close of two days of intense debate, the participants drafted and voted on a Shanghai Consensus, which can be read in full below.

Opening cultural performance of the Global South International Communication Forum, 4 May 2023. Credit: International Communication Research Institute of East China Normal University

Promoting the Construction of a Twenty-First-Century New World Information and Communication Order

In the 1970s, as part of the process by the Non-Aligned Movement to establish the New International Economic Order, the states of the Global South along with UN Educational, Scientific, and Cultural Organisation (UNESCO) attempted to establish the New World Information and Communication Order. This attempt was destroyed by the rise of neoliberal hegemony during the 1980s. The wave of neoliberal globalisation accelerated due to the Third World debt crisis and the demise of the Soviet Union. The West established a ‘rules-based international order’ to mask its neocolonial structures and imperialist actions. Samir Amin argued that the neocolonial structure is built on ‘five controls’: over finance, natural resources, science and technology, weapons of mass destruction, and information.

Today, although some of these monopolies have loosened, the unequal structure of information and communication has not only remained unchanged but has also become more severe. The dominant theoretical paradigm on information production and communication worldwide remains Western-centric, and the Global South’s academia and media lack mechanisms to generate ideas and a framework that goes beyond the Western-centric perspective.

Vijay Prashad, director of Tricontinental: Institute for Social Research, gives the keynote address, entitled ‘History Has Not Ended: The Three Battles of Our Time’, 4 May 2023. Credit: International Communication Research Institute of East China Normal University

We note the prevalence of neocolonial structures, in particular in the media, which are controlled by the West. This media is unable to articulate the challenges faced by the world’s people or effectively communicate and discuss feasible development strategies, in particular for the Global South.

US imperialists and their allies weaponise the media, launching information wars against countries in Asia, Africa, and Latin America. If the Global South tries to put peace and development on the agenda, the West answers with war and debt. In the hands of Western media monopolies, the communications order is not used to promote world peace, but to exacerbate human division and the risk of war.

US imperialists and their allies use media hegemony to distort the beautiful concepts of democracy, freedom, and human rights. They attack other countries under the pretext of democracy, freedom, and human rights while remaining silent about their own trampling of democracy, deprivation of freedom, and human rights.

Professor Lyu Xingyu, dean of the International Communication Research Institute of East China Normal University, gives the closing remarks of the Global South International Communication Forum, 5 May 2023. Credit: International Communication Research Institute of East China Normal University

Digital technologies such as the internet, big data, and artificial intelligence, which should serve human welfare, are used by a few Western media giants and monopoly platforms to dominate the production and dissemination of information and to block voices that differ from their claims. Given these circumstances, we believe that it is essential for intellectuals and communications professionals from and sympathetic to the Global South to revive the spirit of the 1955 Bandung Conference and the Non-Aligned Movement (established in 1961), respond to the Global Civilisation Initiative (2023), and establish international solidarity through communications theory and practice.

We believe that it is essential for intellectuals from and sympathetic to the Global South to promote the theoretical syntheses and academic production of the Global South (especially in the arenas of history and development), actively engage in academic exchanges and collaboration, and form a communications theory from the perspective of the Global South.

Tings Chak, Dongsheng co-founder and director of art at Tricontinental: Institute for Social Research, delivers a speech entitled ‘Third World Culture, Communication, and Solidarity’, 4 May 2023.

We believe that it is essential for progressive media from and sympathetic to the Global South to form a distributed and diversified content production and dissemination network, share content and media experiences, and establish a united international communications front against imperialism and neocolonialism to advocate for peace and development.

We believe that it is essential for the Global South International Communication Forum to be held annually in order to build a diverse and multilateral network and platform for dialogue and exchange among intellectuals and communications professionals. This network and platform will serve as a basis for various forms of collaboration with governments, universities, think tanks, media, and other institutions.

The historical mission of the New World Information and Communication Order has not been fulfilled, nor has the spirit behind it been eradicated. Anti-imperialism and anti-colonialism are still the consensus of the new Non-Aligned Movement. Let us work t>

Nor Tijan Firdaus (Malaysia), Just Scan It (2021).

We, at Tricontinental: Institute for Social Research, are in broad agreement with the need to further the New World Information and Communication Order and revive the dream of the free flow of ideas. This endeavour is built upon efforts of the past, such as the Non-Aligned News Agencies Pool, formed by the Yugoslav news agency Tanjug on 20 January 1975, which brought together eleven news agencies. In its first year of operation, the agencies shared 3,500 stories; a decade later, there were sixty-eight news agencies in the network. Though the Non-Aligned News Agencies Pool is now extinct, the idea behind it remains vital. The recent conference in Shanghai is part of the new conversation to build new pools, new networks, and new media, anchored organisations such as Peoples Dispatch and like-minded media projects.


This content originally appeared on Dissident Voice and was authored by Vijay Prashad.

]]> https://www.radiofree.org/2023/05/18/can-the-global-south-build-a-new-world-information-and-communication-order/feed/ 0 395789 Tahitian anti-nuclear group criticises France for ‘downplaying’ tests health https://www.radiofree.org/2023/05/18/tahitian-anti-nuclear-group-criticises-france-for-downplaying-tests-health/ https://www.radiofree.org/2023/05/18/tahitian-anti-nuclear-group-criticises-france-for-downplaying-tests-health/#respond Thu, 18 May 2023 03:30:18 +0000 https://asiapacificreport.nz/?p=88517 By Walter Zweifel, RNZ Pacific reporter

French Polynesia’s anti-nuclear organisation Association 193 has criticised the latest French report about the impact of the France’s nuclear weapons tests.

France’s National Institute of Health and Medical Research evaluated additional declassified data from the tests at Moruroa Atoll and found that radiation from them had a “minimal” role in causing thyroid cancer.

The association’s president, Father Auguste Uebe-Carlson, told the AFP news agency there was a tendency by the French state and the institute to minimise the impact of the nuclear fallout.

He said the French Committee for the Compensation of Victims of Nuclear Tests refused to recognise the files of victims born after 1974, when the military carried out its last atmospheric test.

But Father Uebe-Carlson said there was an argument to also recognise cancer sufferers born since then.

According to Father Uebe-Carlson, the institute would one day have to explain why there were so many cancers in French Polynesia.

He has repeatedly accused France of refusing to recognise the impact of the tests, instead using “propaganda” to say they were clean or a “thing of the past”.

He said health problems were now being attributed to poor diet and lifestyle choices.

He said that three years ago he had carried out a survey in Mangareva, which is close to the former weapons test sites, and found that from 1966 onward all families reported cases of still-born babies.

Call for release of scientific data
The president of the test veterans’ organisation Moruroa e Tatou said the release of the scientific data was not enough.

Hiro Tefaarere told Polynésie 1ère TV that it was “absolutely necessary” for his organisation to get from the French state the register of the cancer patients and cancer deaths during the testing period.

He said it was “imperative” that these files be given to Moruroa e Tatou.

Tefaarere said this research, if the state agreed to release it, would give his organisation the essential elements to consolidate the complaints which have been filed

A Territorial Assembly member, Hinamoeura Cross, who suffers from leukemia, said she was outraged that reports were still being published that were downplaying the tests’ effects.

The new Tahitian president, Moetai Brotherson, said he would take the latest report into account when he entered into discussions with the French government.

French Polynesia had for years been trying to get France to reimburse it for the costs of cancer sufferers.

$1bn to treat radiation cancers
Its social security agency, CPS, said that since 1995 it had spent almost US$1 billion to treat 10,000 people suffering from cancer as the result of radiation from the tests.

In 2010, Paris recognised for the first time that the tests had had an impact on the environment and health, paving the way for compensation.

Between 1966 and 1996, France carried out almost 200 tests in the South Pacific, involving more than 100,000 military and civilian personnel.

Paris has refused to apologise for the tests, but President Emmanuel Macron said France owed “a debt” to the French Polynesian people.

This article is republished under a community partnership agreement with RNZ.

A protest group's banner on Mangareva Atoll
An Association 193 protest group’s banners on Mangareva Atoll in opposition to the shipment of building materials from Hao Atoll, the former French military base. Image: Association 193/FB/RNZ Pacific


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/05/18/tahitian-anti-nuclear-group-criticises-france-for-downplaying-tests-health/feed/ 0 395619
Tracking an Addiction https://www.radiofree.org/2023/05/16/tracking-an-addiction/ https://www.radiofree.org/2023/05/16/tracking-an-addiction/#respond Tue, 16 May 2023 14:46:12 +0000 https://dissidentvoice.org/?p=140208


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2023/05/16/tracking-an-addiction/feed/ 0 395211
U.S. Marshals Spied on Abortion Protesters Using Dataminr https://www.radiofree.org/2023/05/15/u-s-marshals-spied-on-abortion-protesters-using-dataminr/ https://www.radiofree.org/2023/05/15/u-s-marshals-spied-on-abortion-protesters-using-dataminr/#respond Mon, 15 May 2023 10:00:39 +0000 https://theintercept.com/?p=427574

Dataminr, an “official partner” of Twitter, alerted a federal law enforcement agency to pro-abortion protests and rallies in the wake of the reversal of Roe v. Wade, according to documents obtained by The Intercept through a Freedom of Information Act request.

Internal emails show that the U.S. Marshals Service received regular alerts from Dataminr, a company that persistently monitors social media for corporate and government clients, about the precise time and location of both ongoing and planned abortion rights demonstrations. The emails show that Dataminr flagged the social media posts of protest organizers, participants, and bystanders, and leveraged Dataminr’s privileged access to the so-called firehose of unrestricted Twitter data to monitor constitutionally protected speech.

“This is a technique that’s ripe for abuse, but it’s not subject to either legislative or judicial oversight,” said Jennifer Granick, an attorney with the American Civil Liberties Union’s Speech, Privacy, and Technology Project.

The data collection alone, however, can have a deleterious effect on free speech. Mary Pat Dwyer, the academic program director of the Institute for Technology Law and Policy at Georgetown University, told The Intercept, “The more it’s made public that law enforcement is gathering up this info broadly about U.S. residents and citizens, it has a chilling effect on whether people are willing to express themselves and attend protests and plan protests.”

The documents obtained by The Intercept are from April to July 2022, during a period of seismic news from the Supreme Court. Following the leak of a draft decision that the court would overturn Roe v. Wade, the cornerstone of reproductive rights in the U.S., pro-abortion advocates staged massive protests and rallies across the country. This was not the first time Dataminr helped law enforcement agencies monitor mass demonstrations in the wake of political outcry: In 2020, The Intercept reported that the company had surveilled Black Lives Matter protests for the Minneapolis Police Department following the murder of George Floyd.

The Marshals Service’s social media surveillance ingested Roe-related posts nearly as soon as they began to appear. In a typical alert, a Dataminr analyst wrote a caption summarizing the social media data in question, with a link to the original post. On May 3, 2022, the day after Politico’s explosive report on the draft decision, New York-based artist Alex Remnick tweeted about a protest planned later that day in Foley Square, a small park in downtown Manhattan surrounded by local and federal government buildings. Dataminr quickly forwarded his tweet to the Marshals. That evening, Dataminr continued to relay information about the Foley Square rally, now in full swing, with alerts like “protestors block nearby streets near Foley Square,” as well as photos of demonstrators, all gleaned from Twitter.

The following week, Dataminr alerted the Marshals when pro-abortion demonstrators assembled at the Basilica of St. Patrick’s Old Cathedral in Manhattan, coinciding with a regular anti-abortion event held by the church. Between 9:06 and 9:53 that morning, the Marshals received five separate updates on the St. Patrick’s protest, including an estimated number of attendees, again based on the posts of unwitting Twitter users.

In the weeks and months that followed, the emails show that Dataminr tipped off the Marshals to dozens of protests, including many pro-abortion gatherings, from Maine to Wisconsin to Virginia, both before and during the demonstrations. Untold other protests, rallies, and exercises of the First Amendment may have been monitored by the company; in response to The Intercept’s public records request, the Marshals Service identified nearly 5,000 pages of relevant documents but only shared about 800 pages. The U.S. Marshals Service did not respond to a request for comment.

The documents obtained by The Intercept are email digests of social media activity that triggered alerts based on requested search terms, which appear at the bottom of the reports. The subscribed topics have ambiguous names like “SCOTUS Mentions,” “Federal Courthouses and Personnel Hazards_V2,” “Public Safety Critical Events,” “Attorneys,” and “Officials.” The lists suggest that the Marshals were not specifically seeking information on abortion rallies; rather, the agency had cast such a broad surveillance net that large volumes of innocuous First Amendment-protected activity regularly got swept up as potential security threats. What the Marshals did with the information Dataminr collected remains unknown.

“The breadth of these search categories and terms is definitely going to loop in political speech. It’s a certainty,” Granick told The Intercept. “It’s a reckless indifference to the fact that you’re going to end up spying on core constitutionally protected political activity.”

Pro-choice and pro-life supporters confronted each other on Mott street between St. Patrick's old cathedral and Planned Parenthood in New York on June 4, 2022. Pro-choice for rights to get abortion staged rally at the front of St. Patrick's old cathedral and pro-life supporters counter protest and pushed their way up to Planned Parenthood. Police tried to separate demonstrators. (Photo by Lev Radin/Sipa USA)(Sipa via AP Images)

Pro-abortion and anti-abortion supporters confronted each other on Mott Street between the Basilica of St. Patrick’s Old Cathedral and Planned Parenthood in New York City on June 4, 2022.

Photo: Lev Radin/Sipa via AP

The oldest law enforcement agency in the U.S., the Marshals are a niche holdover of early American policing, immortalized in cowboy movies and tales of the Wild West. Today, the Marshals Service retains a unique mission among federal agencies, consisting largely of transporting prisoners, hunting fugitives, and ensuring the safety of federal courts and judicial staff.

While some of the Dataminr alerts aligned with this mission, such as informing the Marshals of protests near courthouses or judges’ homes, others monitored protests in locations without any ostensible relation to the judiciary. The Basilica of St. Patrick’s Old Cathedral is well over a mile from the nearest courthouse and surrounded by trendy cafes and boutiques. Brooklyn’s Barclays Center, a sports and performance venue where a protest organized on Facebook was flagged by Dataminr on May 3, 2022, is nearly a mile from the closest courthouse.

The Marshals’ broad use of social media surveillance is not the first instance of its apparent mission creep in recent years: In 2021, The Intercept reported that a drone operated by the Marshals had spied on Black Lives Matter protests in Washington, D.C.

As an attorney who frequents courthouses, including during protests, Granick rejected the notion that a political rally is a security threat by dint of its proximity to a judiciary building.

“I would say that a tiny, tiny, tiny fraction of protests at courthouses pose any kind of risk of either property damage or personal injury,” she said. “And there’s really no reason to gather information on who is going to that protest, or what their other political views are, or how they’re communicating with other people who also believe in that cause.”

Dataminr sent a regular volley of alerts about planned and ongoing protests at or near the homes of conservative Supreme Court Justices Clarence Thomas, Brett Kavanaugh, and Amy Coney Barrett. On June 24, 2022, Dataminr sent the Marshals an alert that read, “Protest planned for 18:30 at CVS on 5700 Burke Centre Parkway in Burke, VA to travel to residence of US Supreme Court Justice Thomas.” Follow-up alerts noted the protesters were “at entrance to subdivision of neighborhood where US Supreme Court Justice Thomas lives.” A third alert included that the Marshals were already at the protest; it’s unclear why the agency would need to monitor discussion of an event where its marshals were already present.

Only a small fraction of the alerts reviewed by The Intercept include content that could plausibly be construed as threatening, and even those seem to lack any specificity that would make them useful to a federal agency. On May 3, 2022, Dataminr flagged a tweet that read “WE’RE COMING FOR YOU PLANNED PARENTHOOD.” A week later, another tweet exhorted followers to “[b]urn down anti abortion orgs, kick in extremist churches and smash the homes of the oppressors.”

“There’s an assumption underlying this that someone who complains on Twitter is more dangerous than someone who doesn’t complain on Twitter.”

The following month, Dataminr reported two tweets to the Marshals that appeared to be more hyperbolic fantasies than credible threats. One user tweeted that they would pay to watch the Supreme Court justices who overturned Roe burn alive, while another cited an individual who tweeted, “I’m not not advocating for burning down buildings. But trauma and destruction is kind of the thing that I love.”

At other times, Dataminr seemed incapable of distinguishing between slang and violence. Among several tweets about the 2022 Met Gala inexplicably flagged by Dataminr, the Marshals Service was alerted to a fan account of the actor Timothée Chalamet that tweeted, “i would destroy the met gala” — an online colloquialism for something akin to stealing the show.

These alerts show that despite the claims in its marketing materials, Dataminr isn’t necessarily in the business of public safety, but rather bulk, automated scrutiny. Given the generally incendiary, keyed-up nature of social media speech, a vast number of people might potentially be treated with suspicion by police in the total absence of a criminal act.

“There’s an assumption underlying this that someone who complains on Twitter is more dangerous than someone who doesn’t complain on Twitter,” Granick said. “Inevitably, you have people making decisions about what anger is legitimate and what anger is not.”

FILE - A U.S. Marshal patrols outside the home of Supreme Court Justice Brett Kavanaugh, in Chevy Chase, Md., June 8, 2022. The House has given final approval to legislation to allow around-the-clock security protection for families of Supreme Court justices. The vote on Tuesday came one week after a man carrying a gun, knife and zip ties was arrested near Justice Brett Kavanaugh’s house after threatening to kill the justice.  (AP Photo/Jacquelyn Martin, File)

A U.S. Marshal patrols outside the home of Supreme Court Justice Brett Kavanaugh in Chevy Chase, Md., on June 8, 2022.

Photo: Jacquelyn Martin/AP

Aside from alerts about protests near judges’ homes or courthouses, many of the Dataminr notices appear to have no relevance to American law enforcement. Emails reviewed by The Intercept show that Dataminr alerted the Marshals to social media chatter about Saudi airstrikes in Yemen, attacks in Syria using improvised explosive devices, and political protests in Argentina.

Dataminr represents itself as a “real-time AI platform,” but company sources have previously told The Intercept that this is largely a marketing feint and that human analysts conduct the bulk of platform surveillance, scouring the web for posts they think their clients want to see.

Nonetheless, Dataminr is armed with one technological advantage: the Twitter firehose. For companies willing to pay for it, Twitter’s firehose program provides unfettered access to the entirety of the social network and the ability to automatically comb every tweet, topic, and photo in real time.

The Marshals Service emails also show the extent to which Dataminr is drinking from far more than the Twitter firehose. The emails indicate that the agency is notified when internet users merely mention certain political figures, namely judges and state attorneys general, on Telegram channels or in the comments of news articles.

Although most of the Dataminr alerts don’t include the text of the original posts, those that do often flag innocuous content across the political spectrum, including hundreds of mundane comments from blogs and news websites. In July, for instance, Dataminr reported to the Marshals web comments calling New York Attorney General Letitia James a “racist;” a user saying, “God Bless Gov. Youngkin,” referring to the Virginia governor; and another comment arguing that “Trump wants to hide out in the Oval Office from the responsibility and any accountability for what he did on January 6th and before.” When Ohio Attorney General Dave Yost made national headlines after suggesting that reports of a 10-year-old rape victim denied an abortion may have been fabricated, the Marshals received dozens of alerts about blog comments debating his words.

In some cases, Dataminr appeared incapable of differentiating between people with the same name. On May 18, the Marshals received an alert that “New Jersey District Court Magistrate Judge Jessica S. Allen” was mentioned in a Telegram channel used to organize an anti-Covid lockdown rally in Australia. The text in question appears to be automated, semicoherent spam: “I’ve been a victim of scam, was scared of getting scammed again, but somehow I managed to squeeze out some couple of dollars and I invested with Jessica Allen, damn to my surprise I got my profit within 2 hours.”

Even those sharing links to articles without any added commentary on Telegram fell under Dataminr scrutiny. When one Telegram user shared a July 4, 2022, story from The Hill about Kentucky Attorney General Daniel Cameron’s request that the Supreme Court put the state’s abortion ban back in place, it was flagged to the U.S. Marshals within an hour.

“Discussions of how people view political officials governing them, discussions of constitutional rights, planning protests — that’s supposed to be the most protected speech,” Georgetown’s Dwyer said. “And here you have it being swept up and provided to law enforcement.”

At the time the Marshals received the alerts obtained by The Intercept, Dataminr was listed as an “official partner” on Twitter’s website. Since Elon Musk acquired Twitter in October 2022, the company’s partnership with the social media site has continued. Despite his fury against people who might track the location of his private jet, Musk does not appear to have similar misgivings about furnishing federal police with the precise real-time locations of peaceful protesters.

Twitter’s longtime policy forbids third parties from “conducting or providing surveillance or gathering intelligence” or “monitoring sensitive events (including but not limited to protests, rallies, or community organizing meetings).” When asked how Dataminr’s surveillance of protests using Twitter could be compatible with the policy banning the surveillance of protests, Dataminr spokesperson Georgia Walker said in a statement:

Dataminr supports all public sector clients with a product called First Alert which was specifically developed with input from Twitter, and fully complies with Twitter’s policies and the policies of all our data providers. First Alert delivers breaking news alerts enabling first responders to respond more quickly to public safety emergencies. First Alert is not permitted to be used for surveillance of any kind by First Alert users. First Alert provides a public good while ensuring maximum protections for privacy and civil liberties.

Both Twitter, which no longer has a communications team in the Musk era, and Dataminr have denied that the persistent real-time monitoring of the platform on behalf of police constitutes “surveillance” because the posts are public. Civil libertarians and scholars of state surveillance generally reject their argument, noting that other forms of surveillance routinely occur in public spaces — security cameras pointed at the sidewalk, for instance — and that Dataminr is surfacing posts that would likely be hard for police to find through a manual search.

“There is a world of difference between reading through some public tweets and having a service which indexes, stores, aggregates, and makes that information searchable.”

“There is a world of difference between reading through some public tweets and having a service which indexes, stores, aggregates, and makes that information searchable,” Granick said. As is typical with surveillance tools, police are inclined to use Dataminr not necessarily because it’s effective in thwarting or solving crimes, she said, but because it’s easy and relatively cheap. Receiving a constant flow of alerts from Dataminr creates the appearance of intelligence-gathering without any clear objective or actual intelligence.

In the absence of automated tools like Dataminr, police would have to make choices about how to use their finite time to sift through the vastness of social media platforms, which would likely result in more focus on actual criminality instead of harmless political chatter.

“What this technology does is it liberates law enforcement from having to make that economic calculation and enables them to do both,” Granick explained. “And then once the technology does that, in the absence of any kind of regulation, there’s insufficient disincentive to stop them from doing it.”

Following January 6, 2021, lawmakers questioned why police were blindsided by the storming of the U.S. Capitol even though it was openly planned online. There were calls to bolster the government’s ability to monitor social media, which were again sounded in the wake of the recent leak of classified intelligence documents on Discord. These calls, however, ignore the vast scale of social media surveillance already taking place, surveillance that has failed to stop both apparent blows to state security.

While Dataminr and its many competitors stand to profit immensely from more government agencies buying these tools, they have little to say about how they’ll avoid generating even more noise in search of signal.

“Collecting more hay,” Granick said, “doesn’t help you find the needle.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]> https://www.radiofree.org/2023/05/15/u-s-marshals-spied-on-abortion-protesters-using-dataminr/feed/ 0 394850 Can the Pentagon Use ChatGPT? OpenAI Won’t Answer. https://www.radiofree.org/2023/05/08/can-the-pentagon-use-chatgpt-openai-wont-answer/ https://www.radiofree.org/2023/05/08/can-the-pentagon-use-chatgpt-openai-wont-answer/#respond Mon, 08 May 2023 10:00:56 +0000 https://theintercept.com/?p=427162

As automated text generators have rapidly, dazzlingly advanced from fantasy to novelty to genuine tool, they are starting to reach the inevitable next phase: weapon. The Pentagon and intelligence agencies are openly planning to use tools like ChatGPT to advance their mission — but the company behind the mega-popular chatbot is silent.

OpenAI, the nearly $30 billion R&D titan behind ChatGPT, provides a public list of ethical lines it will not cross, business it will not pursue no matter how lucrative, on the grounds that it could harm humanity. Among many forbidden use cases, OpenAI says it has preemptively ruled out military and other “high risk” government applications. Like its rivals, Google and Microsoft, OpenAI is eager to declare its lofty values but unwilling to earnestly discuss what these purported values mean in practice, or how — or even if — they’d be enforced.

“If there’s one thing to take away from what you’re looking at here, it’s the weakness of leaving it to companies to police themselves.”

AI policy experts who spoke to The Intercept say the company’s silence reveals the inherent weakness of self-regulation, allowing firms like OpenAI to appear principled to an AI-nervous public as they develop a powerful technology, the magnitude of which is still unclear. “If there’s one thing to take away from what you’re looking at here, it’s the weakness of leaving it to companies to police themselves,” said Sarah Myers West, managing director of the AI Now Institute and former AI adviser to the Federal Trade Commission.

The question of whether OpenAI will allow the militarization of its tech is not an academic one. On March 8, the Intelligence and National Security Alliance gathered in northern Virginia for its annual conference on emerging technologies. The confab brought together attendees from both the private sector and government — namely the Pentagon and neighboring spy agencies — eager to hear how the U.S. security apparatus might join corporations around the world in quickly adopting machine-learning techniques. During a Q&A session, the National Geospatial-Intelligence Agency’s associate director for capabilities, Phillip Chudoba, was asked how his office might leverage AI. He responded at length:

We’re all looking at ChatGPT and, and how that’s kind of maturing as a useful and scary technology. … Our expectation is that … we’re going to evolve into a place where we kind of have a collision of you know, GEOINT, AI, ML and analytic AI/ML and some of that ChatGPT sort of stuff that will really be able to predict things that a human analyst, you know, perhaps hasn’t thought of, perhaps due to experience, or exposure, and so forth.

Stripping away the jargon, Chudoba’s vision is clear: using the predictive text capabilities of ChatGPT (or something like it) to aid human analysts in interpreting the world. The National Geospatial-Intelligence Agency, or NGA, a relatively obscure outfit compared to its three-letter siblings, is the nation’s premier handler of geospatial intelligence, often referred to as GEOINT. This practice involves crunching a great multitude of geographic information — maps, satellite photos, weather data, and the like — to give the military and spy agencies an accurate picture of what’s happening on Earth. “Anyone who sails a U.S. ship, flies a U.S. aircraft, makes national policy decisions, fights wars, locates targets, responds to natural disasters, or even navigates with a cellphone relies on NGA,” the agency boasts on its site. On April 14, the Washington Post reported the findings of NGA documents that detailed the surveillance capabilities of Chinese high-altitude balloons that had caused an international incident earlier this year.

Forbidden Uses

But Chudoba’s AI-augmented GEOINT ambitions are complicated by the fact that the creator of the technology in question has seemingly already banned exactly this application: Both “Military and warfare” and “high risk government decision-making” applications are explicitly forbidden, according to OpenAI’s “Usage policies” page. “If we discover that your product or usage doesn’t follow these policies, we may ask you to make necessary changes,” the policy reads. “Repeated or serious violations may result in further action, including suspending or terminating your account.”

By industry standards, it’s a remarkably strong, clear document, one that appears to swear off the bottomless pit of defense money available to less scrupulous contractors, and would appear to be a pretty cut-and-dry prohibition against exactly what Chudoba is imagining for the intelligence community. It’s difficult to imagine how an agency that keeps tabs on North Korean missile capabilities and served as a “silent partner” in the invasion of Iraq, according to the Department of Defense, is not the very definition of high-risk military decision-making.

While the NGA and fellow intel agencies seeking to join the AI craze may ultimately pursue contracts with other firms, for the time being few OpenAI competitors have the resources required to build something like GPT-4, the large language model that underpins ChatGPT. Chudoba’s namecheck of ChatGPT raises a vital question: Would the company take the money? As clear-cut as OpenAI’s prohibition against using ChatGPT for crunching foreign intelligence may seem, the company refuses to say so. OpenAI CEO Sam Altman referred The Intercept to company spokesperson Alex Beck, who would not comment on Chudoba’s remarks or answer any questions. When asked about how OpenAI would enforce its use policy in this case, Beck responded with a link to the policy itself and declined to comment further.

“I think their unwillingness to even engage on the question should be deeply concerning,” Myers of the AI Now Institute told The Intercept. “I think it certainly runs counter to everything that they’ve told the public about the ways that they’re concerned about these risks, as though they are really acting in the public interest. If when you get into the details, if they’re not willing to be forthcoming about these kinds of potential harms, then it shows sort of the flimsiness of that stance.”

Public Relations

Even the tech sector’s clearest-stated ethics principles have routinely proven to be an exercise in public relations and little else: Twitter simultaneously forbids using its platform for surveillance while directly enabling it, and Google sells AI services to the Israeli Ministry of Defense while its official “AI principles” prohibit applications “that cause or are likely to cause overall harm” and “whose purpose contravenes widely accepted principles of international law and human rights.” Microsoft’s public ethics policies note a “commitment to mitigating climate change” while the company helps Exxon analyze oil field data, and similarly professes a “commitment to vulnerable groups” while selling surveillance tools to American police.

It’s an issue OpenAI won’t be able to dodge forever: The data-laden Pentagon is increasingly enamored with machine learning, so ChatGPT and its ilk are obviously desirable. The day before Chudoba was talking AI in Arlington, Kimberly Sablon, Principal Director for Trusted AI and Autonomy at the Undersecretary of Defense for Research and Engineering, told a conference in Hawaii that “There’s a lot of good there in terms of how we can utilize large language models like [ChatGPT] to disrupt critical functions across the department,” National Defense Magazine reported last month. In February, CIA Director of Artificial Intelligence Lakshmi Raman told the Potomac Officers Club, “Honestly, we’ve seen the excitement in the public space around ChatGPT. It’s certainly an inflection point in this technology, and we definitely need to [be exploring] ways in which we can leverage new and upcoming technologies.”

Steven Aftergood, a scholar of government secrecy and longtime intelligence community observer with the Federation of American Scientists, explained why Chudoba’s plan makes sense for the agency. “NGA is swamped with worldwide geospatial information on a daily basis that is more than an army of human analysts could deal with,” he told The Intercept. “To the extent that the initial data evaluation process can be automated or assigned to quasi-intelligent machines, humans could be freed up to deal with matters of particular urgency. But what is suggested here is that AI could do more than that and that it could identify issues that human analysts would miss.” Aftergood said he doubted an interest in ChatGPT had anything to do with its highly popular chatbot abilities, but in the underlying machine learning model’s potential to sift through massive datasets and draw inferences. “It will be interesting, and a little scary, to see how that works out,” he added.

U.S. Army Reserve soldiers receive an overview of Washington D.C. as part of the 4th Annual Day with the Army Reserve May 25, 2016.  The event was led by the Private Public Partnership office. (U.S. Army photo by Sgt. 1st Class Marisol Walker)

The Pentagon seen from above in Washington, D.C, on May 25, 2016.

Photo: U.S. Army

Persuasive Nonsense

One reason it’s scary is because while tools like ChatGPT can near-instantly mimic the writing of a human, the underlying technology has earned a reputation for stumbling over basic facts and generating plausible-seeming but entirely bogus responses. This tendency to confidently and persuasively churn out nonsense — a chatbot phenomenon known as “hallucinating” — could pose a problem for hard-nosed intelligence analysts. It’s one thing for ChatGPT to fib about the best places to get lunch in Cincinnati, and another matter to fabricate meaningful patterns from satellite images over Iran. On top of that, text-generating tools like ChatGPT generally lack the ability to explain exactly how and why they produced their outputs; even the most clueless human analyst can attempt to explain how they reached their conclusion.

Lucy Suchman, a professor emerita of anthropology and militarized technology at Lancaster University, told The Intercept that feeding a ChatGPT-like system brand new information about the world represents a further obstacle. “Current [large language models] like those that power ChatGPT are effectively closed worlds of already digitized data; famously the data scraped for ChatGPT ends in 2021,” Suchman explained. “And we know that rapid retraining of models is an unsolved problem. So the question of how LLMs would incorporate continually updated real time data, particularly in the rapidly changing and always chaotic conditions of war fighting, seems like a big one. That’s not even to get into all of the problems of stereotyping, profiling, and ill-informed targeting that plague current data-drive military intelligence.”

OpenAI’s unwillingness to rule out the NGA as a future customer makes good business sense, at least. Government work, particularly of the national security flavor, is exceedingly lucrative for tech firms: In 2020, Amazon Web Services, Google, Microsoft, IBM, and Oracle landed a CIA contract reportedly worth tens of billions of dollars over its lifetime. Microsoft, which has invested a reported $13 billion into OpenAI and is quickly integrating the smaller company’s machine-learning capabilities into its own products, has earned tens of billions in defense and intelligence work on its own. Microsoft declined to comment.

But OpenAI knows this work is highly controversial, potentially both with its staff and the broader public. OpenAI is currently enjoying a global reputation for its dazzling machine-learning tools and toys, a gleaming public image that could be quickly soiled by partnering with the Pentagon. “OpenAI’s righteous presentations of itself are consistent with recent waves of ethics-washing in relation to AI,” Suchman noted. “Ethics guidelines set up what my UK friends call ‘hostages to fortune,’ or things you say that may come back to bite you.” Suchman added, “Their inability even to deal with press queries like yours suggests that they’re ill-prepared to be accountable for their own policy.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]> https://www.radiofree.org/2023/05/08/can-the-pentagon-use-chatgpt-openai-wont-answer/feed/ 0 393217 Schools Are Pouring Millions Into AI-Powered Weapons Detection Systems. Do They Work? https://www.radiofree.org/2023/05/07/schools-are-pouring-millions-into-ai-powered-weapons-detection-systems-do-they-work/ https://www.radiofree.org/2023/05/07/schools-are-pouring-millions-into-ai-powered-weapons-detection-systems-do-they-work/#respond Sun, 07 May 2023 09:00:53 +0000 https://theintercept.com/?p=427148

On Halloween day last year, a 17-year-old-student walked straight through an artificial intelligence weapons detection system at Proctor High School in Utica, New York. No alert went off.

The 17-year-old then approached a fellow student, pulled a hunting-style knife out of his backpack, and repeatedly stabbed the other student in the hands and back.

The Utica City School District had installed the $4 million weapons detection system across 13 of its schools earlier that summer, mostly with public funds. The scanners, from Massachusetts-based Evolv Technology, look like metal detectors but scan for “signatures” for “all the guns, all the bombs, and all the large tactical knives” in the world, Evolv’s CEO Peter George has repeatedly claimed.

In Utica, the 17-year-old’s weapon wasn’t the first knife, or gun, to bypass the system. Earlier that month, at a parents’ night, a law enforcement officer had walked through the system twice with his service revolver and was puzzled to find it was never detected. School authorities reached out to Evolv and were subsequently told to increase the sensitivity settings to the highest level.

The detector did finally go off: It identified a 7-year-old student’s lunch box as a bomb. On Halloween, however, it remained silent.

“They’ve tried to backtrack by saying, ‘Oh no, it doesn’t pick up all knives,’” said Brian Nolan, who had been appointed acting superintendent of the Utica City School District 10 days before the stabbing. “They don’t tell you — will it pick up a machete or a Swiss army knife? We’ve got like really nothing back from Evolv.”

Ultimately, Utica City School District removed and replaced the scanners from their high schools, costing the district another $250,000. In the elementary and middle schools, which retained Evolv scanners, three knives have been recovered from students — but not because the scanners picked them up, according to Nolan.

Stories about Evolv systems missing weapons have popped up nationwide. Last month, a knife fight erupted between students at Mifflin High School in Ohio. It’s not clear how the knives entered the building, but it was less than three months after the school district spent $3 million installing Evolv scanners.

As school shootings proliferate across the country — there were 46 school shootings in 2022, more than in any year since at least 1999 — educators are increasingly turning to dodgy vendors who market misleading and ineffective technology. Utica City is one of dozens of school districts nationwide that have spent millions on gun detection technology with little to no track record of preventing or stopping violence.

Evolv’s scanners keep popping up in schools across the country. In a video produced by the Charlotte-Mecklenburg district about its new $16.5 million system, students spoke about how the technology reassured them. “I know that I’m not going to be threatened with any firearms, any knives, any sort of metallic weapon at all,” one said.

“Private companies are preying on school districts’ worst fears and proposing the use of technology that’s not going to work and may cause many more problems than it seeks to solve.”

Over 65 school districts have bought or tested artificial intelligence gun detection from a variety of companies since 2018, spending a total of over $45 million, much of it coming from public coffers, according to an investigation by The Intercept.

“Private companies are preying on school districts’ worst fears and proposing the use of technology that’s not going to work,” said Stefanie Coyle, deputy director of the Education Policy Center at the New York Civil Liberties Union, or NYCLU, “and may cause many more problems than it seeks to solve.”

In December, it came out that Evolv, a publicly traded company since 2021, had doctored the results of their software testing. In 2022, the National Center for Spectator Sports Safety and Security, a government body, completed a confidential report showing that previous field tests on the scanners failed to detect knives and a handgun. When Evolv released a public version of the report, according to IPVM and underlying documents reviewed by The Intercept, the failures had been excised from the results. Though Evolv touted the report as “fully independent, there was no disclosure that the company itself had paid for the research. (Evolv has said the public version of the report had information removed for security reasons.)

Five law firms recently announced investigations of Evolv Technology — a partner of Motorola Solutions whose investors include Bill Gates — looking into possible violations of securities law, including claims that Evolv misrepresented its technology and its capabilities to it.

“When you start peeling back the onion on what the technology actually does and doesn’t do, it’s much different than the reality these companies present,” said Donald Maye at IPVM, a surveillance industry research publication. “And that is absolutely the case with Evolv.”

Evolv told The Intercept it would not comment on any specific situations involving their customers and declined to comment further. (Motorola Solutions did not respond to a request for comment.)

The overpromising of artificial intelligence products is an industry-wide problem. The Federal Trade Commission recently released a blog post warning companies, “Keep your AI claims in check.” Among the questions was, “Are you exaggerating what your AI product can do?”

An employee for Evolv Technology, demonstrates the Evolv Express weapons detection system, which is showing red lights to flag a weapon he is wearing on his hip, Wednesday, May 25, 2022, in New York. (AP Photo/Mary Altaffer)

An employee of Evolv Technology demonstrates the Evolv Express weapons detection system, which is showing red lights to flag a weapon, on May 25, 2022, in New York.

Photo: Mary Altaffer/AP


Artificial intelligence gun detection vendors advertise themselves as the solution to the mass school shootings that plague the U.S. While various companies employ differing methods, the Evolv machines use cameras and sensors to capture people as they walk by, after which AI software compares them with object signatures that the system has created. When a weapon is present, the system is supposed to pick up the weapon’s signature and sound an alarm.

At an investor conference in June 2022, Evolv CEO George was asked if the company would have stopped the tragic school shooting in Uvalde, Texas, where 19 students and two teachers were killed. “The answer is when somebody goes through our system and they have a concealed weapon or an open carry weapon, we’re gonna find it, period,” he responded. “We won’t miss it.”

In January, the scanners caught a student trying to enter a high school with a handgun in Guilford, North Carolina. Subsequently, an Evolv spokesperson told WFMY News that their systems had uncovered 100,000 weapons in 2022. In a presentation for investors in the fourth quarter of 2022, George said the detection scanners, on average, stopped 400 guns per day.

There is little peer-reviewed research, however, showing that AI gun detection is effective at preventing shootings. And in the case of Uvalde, the shooter began firing his gun before even entering the school building — and therefore before having passed through a detector.

“The odds of that happening — someone walks in with a displayed gun — are really, really small. It just doesn’t make sense that that’s what you’re investing in.”

“The odds of that happening — someone walks in with a displayed gun — are really, really small,” said Andrew Guthrie Ferguson, a professor of law at American University’s law school and an expert on surveillance. “It just doesn’t make sense that that’s what you’re investing in.”

Even in airports with maximum security protocols, Evolv’s technology has proved to have gaping holes. When an official at Denver International Airport expressed interest in Evolv scanners, he asked a colleague at Oakland International Airport, which uses the machines.

“It is not an explosives detection machine per se,” wrote Douglas Mansel, the aviation security manager in Oakland, in an internal email obtained through a public records request and shared with The Intercept, “So if an employee (or law enforcement during a test) walks through with a brick of C4” — an explosive — “in their hands, the Evolv will not alarm.” (The Oakland Airport told The Intercept it does not comment on its security program.)

In a BBC interview in 2020, Evolv said the density of metal is one key indicator of a weapon’s presence. But the company firmly denies that their scanners are akin to metal detectors. “We’re a weapons detector, not a metal detector,” George said on a conference call in June 2021. (A large competitor of Evolv is CEIA, which manufactures metal detectors without AI, used in airports and schools.)

Yet in many cases, Evolv hasn’t picked up weapons. And researchers have also highlighted how metallic objects, such as laptops, repeatedly set the system off. “They go through great lengths to claim they are not a metal detector,” said Maye of IPVM. “To the extent to which AI is being used, it’s open to interpretation to the consumer.”

Despite claims by George that the system can scan up to 1,000 students in 15 minutes, in the Hemet Unified School District in California, false alarms slowed ingress to school buildings. The solution, according to Evolv, was to simply encourage educators to let students proceed.

“They only need to clear the threat(s) and not figure out what alarmed the system,” wrote Amy Ferguson, customer manager at Evolv, in an internal email to the school system obtained through a public records request and shared with The Intercept. “I recommended not doing a loop back unless necessary. … Many students were looping back 2 or 3 times.” (The Hemet Unified School District did not respond to a request for comment.)

Across the country in Dorchester County Public Schools in Maryland, the system had 250 false alarms for every real hit in the period from September 2021 to June 2022, according to internal records obtained by IPVM. The school district spent $1.4 million on the Evolv software, which it bought from Motorola.

“It plays an important role in our efforts to keep our School District safe,” the district told The Intercept. “And we plan to expand its use within the District.”

Evolv isn’t the only company making bold claims about its sophisticated weapons detection system. ZeroEyes, a Philadelphia-based AI company, states in contracts that “our proactive solution saves lives.” Founded by Navy SEALs in 2018, the firm uses video analytics and object detection to pick up guns.

ZeroEyes’s website lists the timeline for the Sandy Hook shooting, arguing its technology could have materially reduced the response time. When a gun is visible on camera, an alert gets sent to a “24/7/365 ZeroEyes Operations Center Team,” with people monitoring the feed, who in turn confirm the gun and alert the school and police. It claims to do all of this in three to five seconds.

The human team is key to the group’s system, something critics say belies the weakness of the underlying AI claims. “This is one of the fundamental challenges these companies have. Like if they could fully automate it reliably, they wouldn’t need to have a human-in-the-loop,” said Maye. “The human-in-the-loop is because AI isn’t good enough to do it itself.”

“We have never suggested that AI alone is enough,” Olga Shmukyler, spokesperson for ZeroEyes, told The Intercept. “We would never trust AI alone to determine whether a gun threat is real or fake, nor should anybody else.”

In addition to Philadelphia, the company also has an operations center in Honolulu, Hawaii, “to cater to different time zones.”

ZeroEyes seems determined to overcome its critics and is so far faring well. The company raised $20 million in 2021. According to co-founder Rob Huberty, in a LinkedIn post, the team’s mantra is “F*** you, watch me.”

“We are problem solvers, and this is a difficult problem,” said Shmukyler, the spokesperson. “Without the mentality proposed in that post, we wouldn’t have a solution to offer to school districts around the country.”

During the pandemic, school shootings rose in tandem with a spike in gun violence in general. The sort of panic that ensued can lead to impulsive and ineffective action, according to safety experts.

“We are seeing some school boards and administrators making knee-jerk reactions by purchasing AI weapons detection systems,” said Kenneth Trump, president of National School Safety and Security Services. “Unfortunately, the purchase of the systems appears to be done with little-to-no professional assessment of overall security threats and needs.”

Schools in Colorado and Texas brought weapons detection software from a now-convicted fraudster. Barry Oberholzer developed SWORD in 2018 under the startup X.Labs, registered as Royal Holdings Technologies, which he claimed to be the first mobile phone case providing gun detection software.


“I can identify you and identify if you are carrying a gun in 1.5 seconds,” Oberholzer told WSFA 12 News in Alabama in February 2019. “You don’t even have to click. You just need to point the device at the person.”

Later that year, it was reported that Oberholzer was on the run from over two dozen fraud and forgery charges in South Africa. (Todd Dunphy, a board member of and investor in X.Labs, denied the charges on Oberholzer’s behalf and produced an unverified letter from South African authorities clearing him.)

His SWORD product was endorsed by former high-level U.S. officials.

Former FBI agent James Gagliano, who was listed as an adviser to X.Labs, praised the product as “next generation public safety threat-detection.” Charles Marino, a retired secret service special agent, was listed as the company’s national security adviser.

Marino said he invested in the company but has not been involved for years and did not work on the SWORD project. “He swindled everybody,” Marino told The Intercept, referring to the conspiracy conviction. “Look, you kiss a lot of frogs in this world.”

Gagliano said in an email that he severed ties with Oberholzer after hearing of the fraud charges. “I was as stunned as anyone,” he said. “Have had no contact with him since I learned of his indictment in the Summer of 2021. I was excited about the technology he was seeking to introduce to law enforcement.”

In June 2020, X.Labs announced the rebranding of SWORD to X1, a standing device and “full-featured weapons detection system” in partnership with another firm.

Last month, Oberholzer and his business partner Jaromy Pittario pleaded guilty in federal court to conspiracy to defraud investors and creditors. The Department of Justice accused Oberholzer of posing as Gen. David Petraeus, the former CIA director, while pitching the product to venture capital firms.

“Instead of attracting investors honestly, Oberholzer lied continuously to make his company more appealing to investors,” Manhattan U.S. attorney Damian Williams said in a statement.

None of it deterred the company. Its scanners, despite problems, remain in schools — and X.Labs continues to cultivate new business. “All of the devices that are purchased by clients are in their possession and can be used as they see fit,” Dunphy said. “The company, like last year, is run by the board and is working with parties to complete the last phase of development for the purpose of slowing down mass shootings globally.”

Oberholzer is no longer involved with X.Labs, said Dunphy, the board member, who responded to emails addressed to Oberholzer.

“Mr Oberholzer is a professional helicopter pilot and his comings and goings has nothing to do with X.labs,” Dunphy said, “as he resigned from the company in February 2021.”

There is a reason districts in New York, such as Utica, have been a target of gun detection vendors. Most of this technology is being funded by taxpayer money and, in the Empire State, there is a lot to spend.

Under the Boards of Cooperative Educational Services aid, school purchases get reimbursed based on a school district’s poverty level. Utica City School District, which has a high poverty level, was reimbursed 93 cents on the dollar on the Evolv sale, according to acting superintendent Nolan.

The Boards of Cooperative Educational Services told The Intercept, “ As a coalition of the state’s 37 Boards of Cooperative Educational Services, BOCES of NYS has neither authority nor oversight regarding the budgets, purchases, or reimbursement rates of any school district.” The regional Oneida-Herkimer-Madison Counties BOCES office — which covers the Utica school district — did not respond for comment.

While the district gets most of its money back after the disastrous purchase of the Evolv scanners, “New York state taxpayers are still on the hook for the system,” Nolan said.

The Smart Schools Bond Act, passed in 2014, also set aside $2 billion funding to “finance improved educational technology and infrastructure,” drawing the attention of vendors nationwide.

“Folks in the school security industry got wind that New York State was sitting on this big pot of money that school districts had access to,” said Coyle of the NYCLU. “And that kind of opened the floodgates for companies to try to convince school districts to use that state funding to buy products they don’t need, they don’t know how to use, and are potentially harmful.”

New York isn’t the only state ready to spend a fortune. A 2019 Texas bill allocated $100 million in grants for schools seeking to purchase new equipment.

Federal Covid-19 relief dollars can also be directed to things like school security systems, through the Elementary and Secondary School Emergency Relief Fund. Companies, including ZeroEyes and a similar firms, advertise how schools can receive a grant for the “development and implementation of procedures and systems to improve the preparedness and response efforts of a school district.”

“We are targeting sales to all states,” Shmuklyer, of Zero Eyes, said. “A lack of funds should not be the reason why a school cannot be proactive in addressing the mass shooting problem.”

Experts argue schools are just a cheap training ground for technology vendors to test and improve their object detection software so that they can eventually sell it elsewhere.

“Part of the reason why these companies are offering schools the technologies at a relatively cheap price point is that they’re using the schools as their grounds for training,” said Ferguson, the American University professor. “And so those schools or students become data points in a large data set that’s actually improving the technology so they can sell it to other people in other places.”

“They keep saying how the artificial intelligence system they use gets refined after more usage, because they collect more data, more information. But what’s it going to take, 20 years?”

Acting superintendent Nolan himself was told by Evolv the system would get smarter over time with more use. “They keep saying how the artificial intelligence system they use gets refined after more usage, because they collect more data, more information,” he said. “But what’s it going to take, 20 years?”

The lack of regulation leads to a lack of transparency on the use of the data itself. “There’s no protections in place,” said Daniel Schwarz, privacy and technology strategist at NYCLU, “And it raises all these issues around what happens with the data. … Oftentimes, what we’ve caught out is that they actually worsen racial disparities and biases.”

FILE - ShotSpotter equipment overlooks the intersection of South Stony Island Avenue and East 63rd Street in Chicago on Tuesday, Aug. 10, 2021. In more than 140 cities across the United States in 2023, ShotSpotter’s artificial intelligence algorithm and its intricate network of microphones evaluate hundreds of thousands of sounds a year to determine if they are gunfire, generating data now being used in criminal cases nationwide. (AP Photo/Charles Rex Arbogast, File)

ShotSpotter (renamed SoundThinking) equipment overlooks the intersection of South Stony Island Avenue and East 63rd Street in Chicago on Aug. 10, 2021.

Photo: Charles Rex Arbogast/AP


Additionally, ShotSpotter — now renamed SoundThinking — a system of microphones which claims to use “sensors, algorithms and artificial intelligence” to detect the sound of gunfire, has received intense criticism for being overwhelmingly deployed in communities of color. The frequent false alarms of the systems has led to more aggressive policing, as well as the distortion of gunfire statistics.

An analysis by the MacArthur Justice Center found that 89 percent of ShotSpotter alerts in Chicago from 2019-2021 turned up no gun-related crime. “Every unfounded ShotSpotter deployment creates an extremely dangerous situation for residents in the area,” according to the report.

There has been extensive reporting on police departments and other agencies’ use of ShotSpotter nationwide — but not schools. Public records show Brockton Public Schools, in Massachusetts, for instance, bought access to the technology for three years in a row. However, the school said the Shotspotter system was bought by the police department, who donated the technology to them, but it was never activated.

“Contrary to claims that the ShotSpotter product leads to over-policing, ShotSpotter alerts allow police to investigate a gunfire incident in a more precise area,” Sara Lattman, a SoundThinking spokesperson, said in a statement to The Intercept. “Additionally, ShotSpotter has maintained a low false positive rate, just 0.5%, across all customers in the last three years.”

For many advocates against gun violence, particularly in schools, gun control measures like an assault weapons ban would go a long way in curtailing the deadly effects of attacks. With Congress failing to enact such policies, experts argue that schools should refrain from turning to shoddy technology to support their students.

“We advise schools to focus on human factors: people, policies, procedures, planning, training, and communications,” said Trump, the National School Safety and Security Services head. “Avoid security theater.”

Vendors, though, continue to emphasize the risk of gun violence and rely on the steady drumbeat of attacks to generate fear in potential clients — and to make sales.

“While recent high visibility attacks at publicly and privately-owned venues and schools have increased market awareness of mass shootings,” said Evolv’s recent annual disclosure report, “if such attacks were to decline or enterprises of governments perceived the general level of attacks has declined, our ability to attract new customers and expand our sales to existing customers could be materially and adversely affected.”

The company even helps schools market the technology to their own communities. In an email from Evolv to the Charlotte-Mecklenburg school district, a bullet-point list of talking points makes suggestions for how the school system might respond to public queries about the scanners. One of the talking points said, “Security approaches included multiple layers,” adding that “this approach recognizes the reality that no single layer or single technology is 100% effective.”

When reached for comment by The Intercept, Eddie Perez, a spokesperson for the Charlotte-Mecklenburg school district, quoted the talking point verbatim in an emailed response.

That hedged view is out of step with how people in the district itself speak about the system: as an absolute assurance of a gun-free safety. Students in the video produced by the school district said, “You get a certain reassurance that there are no dangerous weapons on campus.”


This content originally appeared on The Intercept and was authored by Georgia Gee.

]]> https://www.radiofree.org/2023/05/07/schools-are-pouring-millions-into-ai-powered-weapons-detection-systems-do-they-work/feed/ 0 393098 Housing-Education-Health Care: Universal Rights! https://www.radiofree.org/2023/05/06/housing-education-health-care-universal-rights/ https://www.radiofree.org/2023/05/06/housing-education-health-care-universal-rights/#respond Sat, 06 May 2023 17:38:10 +0000 https://new.dissidentvoice.org/?p=123549 Think “out-of-this-universe” rights (Universal Rights, my ass), hint hint, chuckle chuckle. Universal Rights Given to Us By Whom? In USA? This is a joke beyond jokes.

I was at a Chamber (local) meeting with 50 folk. Yesterday. Yeah, jolly jolly, out to a community college room, with pastries from the local bakery, and people there wondering really what the art world future of the little 2,100 populous Waldport has in store. Art? Crafts? This is delusion. Not real jobs, real community buttressing, real services, bringing in older people to live and survive in nice facilities, townhomes, what have you, with a thriving intergenerational community to aid those aging in place. What a dream, but not a Universal Right, no?

You see, a city or town predicated on a few restaurants and art galleries (sic), and trickles of tourism bucks, that is the question. At a community college building that has largely been left vacant, save for the past year of letting the teachers of the K12 schools use the facility (five rooms) for a pop-up day care.

Oh yeah, day care, a universal right, too. (chuckle-chuckle). Not in a social Darwin dog-eat-dog, survival of the richest (fittest).

There were big ideas coming from people who, for the most part, are not precarious in the sense that they only have one giant frayed safety net — social security payments (oh, a universal right, right, etched in stone . . . or is it out-of-the-universe pie in the sky dream?) income (fixed and felonious) and that’s that. Maybe one or two renters, really, and they own a home or two, and not to knock them, some are trying to make a go at, well, food-art-crafts-kayaking. The rest are doing okay, in the upper middle class category kind of doing okay way. Most, not all. And that is the elephant in the room — listening to bluster and PR, when there are proverbial elephants in the room after proverbial gorillas in the room, wherever you go!

In a small town with aging housing stock, threats of ocean tide rises, lots of 10-inches-in-three-days rain events, and, well, that Republican and Democrat Build Nothing Back Better smile, and the menu for the morning was arts and crafts, and eateries.

Oh, a few wringing of the hands about housing (there is none for rent, and those for sale, are match stick cabanas for half a million$). But the beat goes on, as a city manager was in attendance ($100K a year?) and the mayor (he said he failed to read the entire email for this breakfast invitation so he was an hour late, after ending up driving north, to the Newport college campus, which on so many levels is inane and bizarre, since this town is called Waldport and this town has a community college campus building a mile from where the guy lives but this dude thinks we’d all be driving 30 minutes north to another town with their own Chamber of Commerce?). You gotta give it to small towns, but they are really, just big towns, are they not since many come to the rural areas from big town jobs and lives?

Teacher shortage

Testament after testament on the level (low bar) of schooling people have gotten, and are giving. Amazing the mental density of the average American. Oh, the local schools have failed — so we have a few thousand kids in all 11 schools in Lincoln County, and, well, the graduation rate is in the tank, and, the Zoom Doom is dooming more of them, and the generalized anxiety disorder (GAD) is out the roof with Fauci’s Felony Follies, and, well, teachers are dropping like flies, that is, they are not wanting the gig anymore. Leaving. Quitting. Washing their hands of Five Decades of Failure! Public Education!

Here, what follows, our local rag’s coverage of a meeting of the school representative of the union giving some results of a survey for Lincoln County teachers, just a few days ago:

Before launching into the results, Lohonyay foreshadowed them with a personal note. “In the last 96 hours, I’ve gotten phone calls, text messages and emails from six teachers asking, ‘How can I can resign?’” he said, adding that there had been a dozen more such communications since classes started.

He said that while teachers were overwhelmingly happy to have students back in the classroom and “grateful for some of the stuff that the school district’s brought to us,” 85 percent of 121 teachers surveyed said they have experienced more job-related stress during the first two months of this school year than in previous years, and 73 percent said they were experiencing more anxiety. (Source — Teachers say they are over scrutinized, burned out)

It is complicated, no, working with young people, when staffing is threadbare, when classroom disruptions are out the ceiling, when parents are stressed and stressing youth, and that state of the state is like a 1984 War Zone, all fitted with masks, social distancing and the jab-jab-jab? “We want to have time to have fun with our students,” Lohonyay said, something he added was acutely missing this year.

So, the teachers are getting way to much evaluation, too many professional development requirements and are up to their ears in strict pacing guides and assessment schedules. They also want more support from building administrators, better communication with leadership and compensation for time spent covering for staff shortages and quarantine preparation, according to the survey.

The district superintendent states she was shocked at being broadsided by this survey, by the complaints, and, well, she did bring up another pre/during Covid fact —

“I want people to have fun in school, too. But 50 percent of our kids can’t read at grade level, so where’s the fun in that? There isn’t any.” (Superintendent Karen Gray)

Again, a superintendent who should not be in the job. In fact, there should not be this top down “management,” and one overlord, we know that, really,  come on. Spread out the work of a single superintendent, spread out the signature power for other people, too;  spread out the perspectives and contexts and background. But one superintendent who is over her head, big time? That is the broken system of systems management in the USA, elsewhere.

It gets worse — so those youth with developmental, intellectual, learning disabilities/challenges/ realities, they are getting fewer hours of special education instruction on life skills, social skills, the 3 R’s, etc. Staffing shortages have dented the Lane Education Service District, representing 16 school districts including Eugene. They are cutting one day a week of Life Skills classes for students with cognitive disabilities.

It’s a teacher-counselor-paraeducator shortage, statewide — and that, my friends, is the Zoom plan, the at-home zooming crap that has created so much anxiety in the first place, yet, the consequences are dire on every Build Nothing Back Better level: Giving an unequal (less) amount of instruction time to students with disabilities is a violation of the federal Individuals with Disabilities Education Act.

“Civil rights don’t go away in the midst of a pandemic,” said committee member Sen. Sara Gelser Blouin, D-Corvallis. “It’s against the law, it’s outrageous and it’s immoral.” (School staffing issues in Oregon called ‘real, emergency situation’)

And so this all comes back to Waldport, to families, to people wanting to enroll in college, when in fact, there is no housing, and, this Highway 101 strip is for retirees and marine scientists, and builders and laborers and hotel staff. This is not a family-engaging place, on some levels, and with so many parents pre-during Covid shirking their responsibilities around engaging kids (their own, neighbors’ kids) and getting them to read and think, this place seems like a dead zone, Zombie Land, since Disneyfication of La-La Land has pretty much hijacked a majority of families into mind-numbing consumerism and endless TV and video games.

And this is just Oregon, this emergency!!

But that Build Back Nothing Better beat keeps on tapping — Oh, those Centers for Disease Control reports the United States hit over 100,000 drug overdose deaths over a 12-month period ending April 2021 — they say, nearly 30-percent increase over the previous year. CDC states it’s the first time annual U.S. overdose deaths reached six figures. Oh, these new dashboards we can put on our smartphones — Covid infections, Covid death, Overdose hospitalization, Overdose deaths! Get your hear rate, BP and number of steps while tracking Techno Hell! We get all sorts of causes for ODs, such as isolation and stress brought on by the pandemic led to higher rates of drug abuse. Opioids including Sackler Family stuff, and the powerful drug fentanyl accounted for about three-quarters of all overdose deaths. But they miss the point of capitalism as inflammatory DISEASE!

So what do I as a college teacher, who can’t get a class here on The Zombie Coast, but if I could what would I be able to teach if he/I were teaching critical reading and writing classes at the college level? In reality, Build Back Nothing Better is killing the education arena in higher education. Right now, after 10 years of lagging community college enrollments countrywide (but community college presidents get six figures and their henchmen and henchwomen get six figures and pretty landscaping and building construction continues and state legislatures continue to defund them), community colleges are struggling big time. They will go the way of the Dodo, that is, correspondence Zoom Doom, University of Phoenix Power Point and Webinar crap. That was in the plan, remote unlearning! Decades ago!

The technofascists have been working on this project for decades, way before DARPA and the virus, and this fear-fear-fear has been a project of the United Slaves of America for two centuries, or more, really, when that Smith Colony come in looking for wood, metals, gems, gold, and slaves, really. That dark-dark forest and those dark-dark men and women, they were the devil’s doing. Captain Smith, err, Captain Fear, The Village style.

The Village (2004) Review |BasementRejects

In a hypothetical class, would I be able to look at the public record of say, Fauci, the highest paid government official, or would that be a fineable/fireable offense, or worse — myself being brought before a tribunal of cancel culture henchwomen and henchmen? Tattooed on my forehead, a  scarlet letter, “A,” “A” for Anti-Christ, Anarchist, Antithesis of Capitalism’s Soldiers? Fauci, and his record — something to chew on, a sadist’s story, really.

Fauci Blesses Feeding Puppies’ Heads to Flies (Report)

Flesh-eating flies on these animals (above image), for 90 days, while the sentient beings’ vocal chords were slashed without anesthesia so the mad scientists wouldn’t have to hear their screams as their faces were being eaten alive. NIH, Fauci style: New reports allege that Fauci’s National Institutes of Health (NIH) division greenlit tests in which experimenters drugged beagle puppies and locked their heads in cages filled with hungry, infected sandflies. The drug tests were apparently executed even though the Food and Drug Administration doesn’t require new drugs to be tested on dogs.

The Real Anthony Fauci

This, from Simon and Schuster’s website for Kennedy’s most recent book, see below. Would this book be allowed in a community college? Would fellow faculty (most being Covidians) allow students to course through some debates and critical thinking exercises using this book as one of several to explore the entire concept of Big Pharma? Do we get to look at Big Medicine? Big Mining? Big Oil? Big Media? Big Finance? Big Prison? Big Ag? Big Real Estate? Big Timber? Big Retail? Big Surveillance? Big AI? Big Fourth Industrial Revolution? Big New Green Lie? Big Nonprofit Industrial Complex? Big Military/Propaganda/Bioweaponry/Digital Complex?

Or are the youth coming to classes so brain fogged from K12, that is, for all intents and purposes, which is the wasteland of intentional harm, intentional miseducation? This in a country of Republicans making anime shit with AOC as a murdered victim, and then, cancel culture on steroids, and then Neanderthals fighting real history in each community’s courts of public opinion fighting against the very real 1619 Project? Does this become more Monty Python-SNL fodder?

All Power to the People? Check it out, a documentary which can’t be shown in K12, say, even in a senior- level social studies class. These are murdering-book banning times, and the USA has always been a lynching country, a slaver country, one that puts the power into the hands of white supremacists with guns, bombs, and, well, now with these Fauci Types and Trump LLC’s and Republicans and Democrats and Bankers, they have the power of foreclosure. Foreclosing on people, on medicine, on health care, on housing, on education, on food, on electricity. This is the Out of This Universe bullshit of universal rights to a roof over your head? Come on, what are you thinking? So, that’s a one-0bedroom shack, with or without running water, and a toilet, and electricity? Hmm, is that with or without food? Hmm, is that with or without your diabetes meds? You get the picture. These billionaires and their Eichmann Armies are all about FORECLOSING, and that has wormed its way into the very thought processes of the average American, scared, pissed, etc. A snapshot into the perversity of every part of the Complex coming from the rightwing book publisher of RFK, Jr’s book. The Real Anthony Fauci [imagine a thousand books with that same title, but The Real Fill-in-the-Blank. FORECLOSING on the American MIND!

As director of the National Institute of Allergy and Infectious Diseases (NIAID), Dr. Anthony Fauci dispenses $6.1 billion in annual taxpayer-provided funding for scientific research, allowing him to dictate the subject, content, and outcome of scientific health research across the globe. Fauci uses the financial clout at his disposal to wield extraordinary influence over hospitals, universities, journals, and thousands of influential doctors and scientists—whose careers and institutions he has the power to ruin, advance, or reward.

During more than a year of painstaking and meticulous research, Robert F. Kennedy Jr. unearthed a shocking story that obliterates media spin on Dr. Fauci . . . and that will alarm every American—Democrat or Republican—who cares about democracy, our Constitution, and the future of our children’s health.

The Real Anthony Fauci reveals how “America’s Doctor” launched his career during the early AIDS crisis by partnering with pharmaceutical companies to sabotage safe and effective off-patent therapeutic treatments for AIDS. Fauci orchestrated fraudulent studies, and then pressured US Food and Drug Administration (FDA) regulators into approving a deadly chemotherapy treatment he had good reason to know was worthless against AIDS. Fauci repeatedly violated federal laws to allow his Pharma partners to use impoverished and dark-skinned children as lab rats in deadly experiments with toxic AIDS and cancer chemotherapies.

In early 2000, Fauci shook hands with Bill Gates in the library of Gates’ $147 million Seattle mansion, cementing a partnership that would aim to control an increasingly profitable $60 billion global vaccine enterprise with unlimited growth potential. Through funding leverage and carefully cultivated personal relationships with heads of state and leading media and social media institutions, the Pharma-Fauci-Gates alliance exercises dominion over global health policy.

The Real Anthony Fauci details how Fauci, Gates, and their cohorts use their control of media outlets, scientific journals, key government and quasi-governmental agencies, global intelligence agencies, and influential scientists and physicians to flood the public with fearful propaganda about COVID-19 virulence and pathogenesis, and to muzzle debate and ruthlessly censor dissent.

monkeys at the Washington National Primate Research Center will suffer under michele basso

Oh, those monkeys in those mad scientists’ experiments. Now, let’s graduate to . . . .

Pa. and N.J. kids are lining up for COVID-19 shots as parents experience both relief and hesitancy

Homo Sapiens . . . . Children! And school hallway movements, oh boy:

FDA says Pfizer COVID vaccine looks effective for young kids - Hawaii Tribune-Herald

And we wonder where are all the smarts in this new generation of children? Where are those future renters? Those future home buyers? Those future workers? Ya think this is not planned? Right, I am just a Tin Foil Hat conspiracy Freak.

“The pernicious new selling of virtual travel is potentially a way to kill off the dream center of children, to kill their imagination. To move freely, even within the area from which you were born, is in my opinion the most indelible of rights. What is going on is a ruling class soft coup, a less overtly violent coup and their vision of a digital feudal planet is terrifying, if only because it is cannot possibly work. It is delusion.” — A Solution Without a Solution, September 18, 2021, John Steppling

Yes, John, these are monsters, and they are elite, and they are the chosen few, and yes, they come from a select and selective grouping of people, schooled and trained, in the way of the financial abuser, in the art of propaganda and mind control, and they have the floor now, as their prostitutes in Congresses, Senates, on Boards, in Houses of Parliament, inside Presidential Palaces, what have you, are their work horses, all proud of their Eichmann Status — sure, updated Eichmann’s, but still, a spade is a spade:

“Our identity is, literally, who we are, and as the digital technologies of the Fourth Industrial Revolution advance, our identity is increasingly digital. This digital identity determines what products, services and information we can access – or, conversely, what is closed off to us.” – September 2018, World Economic Forum Insight Report, Identity in a Digital World, A New Chapter in the Social Contract November 1, 2018: “If Dave Birch of Consult Hyperion is correct, identity is the new money.”

Monsters! (Watch: Digital ID; Freedom-as-a-Service. The Lure of Entitlement as the Method for Entrapment)

Finally, fortunately, the previous piece I wrote is up on DV, Collusion: The End of Nature, Brought to us by Zoom

And while we never are really finished tweaking our writing, but in this time of nanosecond news, we have to expect that once an article hits the digital ink, that’s that, move on. Luckily, here we are, add to this story, and it’s not pretty — Oregon middle school closes over safety concerns, student ‘socialization’ issues from year of virtual learning

Fistfights and yelling, and youth unable to sit, stand, walk still. Imagine that, as if the people like those I align with did not anticipate this. School has already been a shit-show of outbursts, “behaviors” (that’s what they call it, his or her behavior) and youth lacking concentration skills.

Ya think all those chemicals and compounds and poisons in the food, air, water, around us, they have nothing to do with ADHD, more and more Autism Spectrum disorder. Robert Kennedy Jr says it right when he points out that we do not see a bunch of 67 year olds (his age) walking around with helmets on and with weighted blankets and yammering Autistic jumbled nothingness. He stresses that EPA and FDA and USDA, the entire suite of agencies supposedly in the employ of the public, that they have no common sense to wonder why so many peanut allergies, so many learning and developmental disabilities?

So, get the jab-jab-booster-booster, and keep eating that nanoparticle filled cream pie, and, bam, we have the post lockdown, return to school, well, lockdown because of “behaviors.”

“The shifts in learning methods and isolation caused by COVID-19 closures and quarantines have taken a toll on the well-being of our students and staff,” superintendent Dr. Danna Diaz wrote in a letter to families and staff Tuesday justifying the sudden decision. “We are finding that some students are struggling with the socialization skills necessary for in-person learning, which is causing disruption in school for other students.”

A district spokesman, Steve Padilla, told The Oregonian that the closure was prompted by fights and other behavioral problems among students but declined to go into detail about the frequency of those on-campus brawls. He said weapons were not involved according to the best of his knowledge.

“We need to take care of this now. It’s urgent,” Padilla said. “It’s not just fighting – It’s disruptive behaviors as well. Students are disrupting other students, making it hard for them to learn.”

Yes, the isolation, the fear mongering, the pathetic death of common sense, common medicine, holism. We reap what we sow, no, RFK, Jr.?

Reality is —

Over 40 New Products Added to Nanotechnology Database

FDA has failed to take adequate action on dangerous chemicals despite acknowledging harm

Here, the interview of Kennedy, by Mercola, deemed one of the enemies of the world on the internet. Viral virus debunker spreader: Interview here!

In this interview, Robert F. Kennedy Jr., an environmental activist and attorney turned ultimate freedom fighter, discusses his latest book, “The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health,” which is a must-read if you want to know more about the behind-the-scenes of this giant fraud. We could talk for hours and not cover but a fraction of what’s in this book, which Kennedy calls a “devastating indictment of Tony Fauci.”

In a nutshell, Kennedy describes how Fauci turned the National Institutes of Health into an incubator for pharmaceutical products, and essentially sold the entire country to the drug industry. The book is an incredibly well-referenced record of his history of decimating human health, and exposes him as a self-serving charlatan.

I particularly enjoyed how Kennedy placed Fauci in the context of Rockefeller’s legacy with respect to Bill Gates, who developed an alliance with Fauci over 20 years ago. Rockefeller set us on a course of toxic, profit-driven medicines synthesized from the byproducts of the oil refinery process a century ago, and Gates picked up where he left off and then collaborated heavily with Fauci.

Let the school Game of Thrones begin! More Tasers in school. More isolation rooms in schools. More SWAT teams in school (there is no defunding the Gestapo/Pigs/Cops!). The billionaires’ system is running very very smoothly.


This content originally appeared on Dissident Voice and was authored by Paul Haeder.

]]>
https://www.radiofree.org/2023/05/06/housing-education-health-care-universal-rights/feed/ 0 393053
Housing-Education-Health Care: Universal Rights! https://www.radiofree.org/2023/05/06/housing-education-health-care-universal-rights/ https://www.radiofree.org/2023/05/06/housing-education-health-care-universal-rights/#respond Sat, 06 May 2023 17:38:10 +0000 https://new.dissidentvoice.org/?p=123549 Think “out-of-this-universe” rights (Universal Rights, my ass), hint hint, chuckle chuckle. Universal Rights Given to Us By Whom? In USA? This is a joke beyond jokes.

I was at a Chamber (local) meeting with 50 folk. Yesterday. Yeah, jolly jolly, out to a community college room, with pastries from the local bakery, and people there wondering really what the art world future of the little 2,100 populous Waldport has in store. Art? Crafts? This is delusion. Not real jobs, real community buttressing, real services, bringing in older people to live and survive in nice facilities, townhomes, what have you, with a thriving intergenerational community to aid those aging in place. What a dream, but not a Universal Right, no?

You see, a city or town predicated on a few restaurants and art galleries (sic), and trickles of tourism bucks, that is the question. At a community college building that has largely been left vacant, save for the past year of letting the teachers of the K12 schools use the facility (five rooms) for a pop-up day care.

Oh yeah, day care, a universal right, too. (chuckle-chuckle). Not in a social Darwin dog-eat-dog, survival of the richest (fittest).

There were big ideas coming from people who, for the most part, are not precarious in the sense that they only have one giant frayed safety net — social security payments (oh, a universal right, right, etched in stone . . . or is it out-of-the-universe pie in the sky dream?) income (fixed and felonious) and that’s that. Maybe one or two renters, really, and they own a home or two, and not to knock them, some are trying to make a go at, well, food-art-crafts-kayaking. The rest are doing okay, in the upper middle class category kind of doing okay way. Most, not all. And that is the elephant in the room — listening to bluster and PR, when there are proverbial elephants in the room after proverbial gorillas in the room, wherever you go!

In a small town with aging housing stock, threats of ocean tide rises, lots of 10-inches-in-three-days rain events, and, well, that Republican and Democrat Build Nothing Back Better smile, and the menu for the morning was arts and crafts, and eateries.

Oh, a few wringing of the hands about housing (there is none for rent, and those for sale, are match stick cabanas for half a million$). But the beat goes on, as a city manager was in attendance ($100K a year?) and the mayor (he said he failed to read the entire email for this breakfast invitation so he was an hour late, after ending up driving north, to the Newport college campus, which on so many levels is inane and bizarre, since this town is called Waldport and this town has a community college campus building a mile from where the guy lives but this dude thinks we’d all be driving 30 minutes north to another town with their own Chamber of Commerce?). You gotta give it to small towns, but they are really, just big towns, are they not since many come to the rural areas from big town jobs and lives?

Teacher shortage

Testament after testament on the level (low bar) of schooling people have gotten, and are giving. Amazing the mental density of the average American. Oh, the local schools have failed — so we have a few thousand kids in all 11 schools in Lincoln County, and, well, the graduation rate is in the tank, and, the Zoom Doom is dooming more of them, and the generalized anxiety disorder (GAD) is out the roof with Fauci’s Felony Follies, and, well, teachers are dropping like flies, that is, they are not wanting the gig anymore. Leaving. Quitting. Washing their hands of Five Decades of Failure! Public Education!

Here, what follows, our local rag’s coverage of a meeting of the school representative of the union giving some results of a survey for Lincoln County teachers, just a few days ago:

Before launching into the results, Lohonyay foreshadowed them with a personal note. “In the last 96 hours, I’ve gotten phone calls, text messages and emails from six teachers asking, ‘How can I can resign?’” he said, adding that there had been a dozen more such communications since classes started.

He said that while teachers were overwhelmingly happy to have students back in the classroom and “grateful for some of the stuff that the school district’s brought to us,” 85 percent of 121 teachers surveyed said they have experienced more job-related stress during the first two months of this school year than in previous years, and 73 percent said they were experiencing more anxiety. (Source — Teachers say they are over scrutinized, burned out)

It is complicated, no, working with young people, when staffing is threadbare, when classroom disruptions are out the ceiling, when parents are stressed and stressing youth, and that state of the state is like a 1984 War Zone, all fitted with masks, social distancing and the jab-jab-jab? “We want to have time to have fun with our students,” Lohonyay said, something he added was acutely missing this year.

So, the teachers are getting way to much evaluation, too many professional development requirements and are up to their ears in strict pacing guides and assessment schedules. They also want more support from building administrators, better communication with leadership and compensation for time spent covering for staff shortages and quarantine preparation, according to the survey.

The district superintendent states she was shocked at being broadsided by this survey, by the complaints, and, well, she did bring up another pre/during Covid fact —

“I want people to have fun in school, too. But 50 percent of our kids can’t read at grade level, so where’s the fun in that? There isn’t any.” (Superintendent Karen Gray)

Again, a superintendent who should not be in the job. In fact, there should not be this top down “management,” and one overlord, we know that, really,  come on. Spread out the work of a single superintendent, spread out the signature power for other people, too;  spread out the perspectives and contexts and background. But one superintendent who is over her head, big time? That is the broken system of systems management in the USA, elsewhere.

It gets worse — so those youth with developmental, intellectual, learning disabilities/challenges/ realities, they are getting fewer hours of special education instruction on life skills, social skills, the 3 R’s, etc. Staffing shortages have dented the Lane Education Service District, representing 16 school districts including Eugene. They are cutting one day a week of Life Skills classes for students with cognitive disabilities.

It’s a teacher-counselor-paraeducator shortage, statewide — and that, my friends, is the Zoom plan, the at-home zooming crap that has created so much anxiety in the first place, yet, the consequences are dire on every Build Nothing Back Better level: Giving an unequal (less) amount of instruction time to students with disabilities is a violation of the federal Individuals with Disabilities Education Act.

“Civil rights don’t go away in the midst of a pandemic,” said committee member Sen. Sara Gelser Blouin, D-Corvallis. “It’s against the law, it’s outrageous and it’s immoral.” (School staffing issues in Oregon called ‘real, emergency situation’)

And so this all comes back to Waldport, to families, to people wanting to enroll in college, when in fact, there is no housing, and, this Highway 101 strip is for retirees and marine scientists, and builders and laborers and hotel staff. This is not a family-engaging place, on some levels, and with so many parents pre-during Covid shirking their responsibilities around engaging kids (their own, neighbors’ kids) and getting them to read and think, this place seems like a dead zone, Zombie Land, since Disneyfication of La-La Land has pretty much hijacked a majority of families into mind-numbing consumerism and endless TV and video games.

And this is just Oregon, this emergency!!

But that Build Back Nothing Better beat keeps on tapping — Oh, those Centers for Disease Control reports the United States hit over 100,000 drug overdose deaths over a 12-month period ending April 2021 — they say, nearly 30-percent increase over the previous year. CDC states it’s the first time annual U.S. overdose deaths reached six figures. Oh, these new dashboards we can put on our smartphones — Covid infections, Covid death, Overdose hospitalization, Overdose deaths! Get your hear rate, BP and number of steps while tracking Techno Hell! We get all sorts of causes for ODs, such as isolation and stress brought on by the pandemic led to higher rates of drug abuse. Opioids including Sackler Family stuff, and the powerful drug fentanyl accounted for about three-quarters of all overdose deaths. But they miss the point of capitalism as inflammatory DISEASE!

So what do I as a college teacher, who can’t get a class here on The Zombie Coast, but if I could what would I be able to teach if he/I were teaching critical reading and writing classes at the college level? In reality, Build Back Nothing Better is killing the education arena in higher education. Right now, after 10 years of lagging community college enrollments countrywide (but community college presidents get six figures and their henchmen and henchwomen get six figures and pretty landscaping and building construction continues and state legislatures continue to defund them), community colleges are struggling big time. They will go the way of the Dodo, that is, correspondence Zoom Doom, University of Phoenix Power Point and Webinar crap. That was in the plan, remote unlearning! Decades ago!

The technofascists have been working on this project for decades, way before DARPA and the virus, and this fear-fear-fear has been a project of the United Slaves of America for two centuries, or more, really, when that Smith Colony come in looking for wood, metals, gems, gold, and slaves, really. That dark-dark forest and those dark-dark men and women, they were the devil’s doing. Captain Smith, err, Captain Fear, The Village style.

The Village (2004) Review |BasementRejects

In a hypothetical class, would I be able to look at the public record of say, Fauci, the highest paid government official, or would that be a fineable/fireable offense, or worse — myself being brought before a tribunal of cancel culture henchwomen and henchmen? Tattooed on my forehead, a  scarlet letter, “A,” “A” for Anti-Christ, Anarchist, Antithesis of Capitalism’s Soldiers? Fauci, and his record — something to chew on, a sadist’s story, really.

Fauci Blesses Feeding Puppies’ Heads to Flies (Report)

Flesh-eating flies on these animals (above image), for 90 days, while the sentient beings’ vocal chords were slashed without anesthesia so the mad scientists wouldn’t have to hear their screams as their faces were being eaten alive. NIH, Fauci style: New reports allege that Fauci’s National Institutes of Health (NIH) division greenlit tests in which experimenters drugged beagle puppies and locked their heads in cages filled with hungry, infected sandflies. The drug tests were apparently executed even though the Food and Drug Administration doesn’t require new drugs to be tested on dogs.

The Real Anthony Fauci

This, from Simon and Schuster’s website for Kennedy’s most recent book, see below. Would this book be allowed in a community college? Would fellow faculty (most being Covidians) allow students to course through some debates and critical thinking exercises using this book as one of several to explore the entire concept of Big Pharma? Do we get to look at Big Medicine? Big Mining? Big Oil? Big Media? Big Finance? Big Prison? Big Ag? Big Real Estate? Big Timber? Big Retail? Big Surveillance? Big AI? Big Fourth Industrial Revolution? Big New Green Lie? Big Nonprofit Industrial Complex? Big Military/Propaganda/Bioweaponry/Digital Complex?

Or are the youth coming to classes so brain fogged from K12, that is, for all intents and purposes, which is the wasteland of intentional harm, intentional miseducation? This in a country of Republicans making anime shit with AOC as a murdered victim, and then, cancel culture on steroids, and then Neanderthals fighting real history in each community’s courts of public opinion fighting against the very real 1619 Project? Does this become more Monty Python-SNL fodder?

All Power to the People? Check it out, a documentary which can’t be shown in K12, say, even in a senior- level social studies class. These are murdering-book banning times, and the USA has always been a lynching country, a slaver country, one that puts the power into the hands of white supremacists with guns, bombs, and, well, now with these Fauci Types and Trump LLC’s and Republicans and Democrats and Bankers, they have the power of foreclosure. Foreclosing on people, on medicine, on health care, on housing, on education, on food, on electricity. This is the Out of This Universe bullshit of universal rights to a roof over your head? Come on, what are you thinking? So, that’s a one-0bedroom shack, with or without running water, and a toilet, and electricity? Hmm, is that with or without food? Hmm, is that with or without your diabetes meds? You get the picture. These billionaires and their Eichmann Armies are all about FORECLOSING, and that has wormed its way into the very thought processes of the average American, scared, pissed, etc. A snapshot into the perversity of every part of the Complex coming from the rightwing book publisher of RFK, Jr’s book. The Real Anthony Fauci [imagine a thousand books with that same title, but The Real Fill-in-the-Blank. FORECLOSING on the American MIND!

As director of the National Institute of Allergy and Infectious Diseases (NIAID), Dr. Anthony Fauci dispenses $6.1 billion in annual taxpayer-provided funding for scientific research, allowing him to dictate the subject, content, and outcome of scientific health research across the globe. Fauci uses the financial clout at his disposal to wield extraordinary influence over hospitals, universities, journals, and thousands of influential doctors and scientists—whose careers and institutions he has the power to ruin, advance, or reward.

During more than a year of painstaking and meticulous research, Robert F. Kennedy Jr. unearthed a shocking story that obliterates media spin on Dr. Fauci . . . and that will alarm every American—Democrat or Republican—who cares about democracy, our Constitution, and the future of our children’s health.

The Real Anthony Fauci reveals how “America’s Doctor” launched his career during the early AIDS crisis by partnering with pharmaceutical companies to sabotage safe and effective off-patent therapeutic treatments for AIDS. Fauci orchestrated fraudulent studies, and then pressured US Food and Drug Administration (FDA) regulators into approving a deadly chemotherapy treatment he had good reason to know was worthless against AIDS. Fauci repeatedly violated federal laws to allow his Pharma partners to use impoverished and dark-skinned children as lab rats in deadly experiments with toxic AIDS and cancer chemotherapies.

In early 2000, Fauci shook hands with Bill Gates in the library of Gates’ $147 million Seattle mansion, cementing a partnership that would aim to control an increasingly profitable $60 billion global vaccine enterprise with unlimited growth potential. Through funding leverage and carefully cultivated personal relationships with heads of state and leading media and social media institutions, the Pharma-Fauci-Gates alliance exercises dominion over global health policy.

The Real Anthony Fauci details how Fauci, Gates, and their cohorts use their control of media outlets, scientific journals, key government and quasi-governmental agencies, global intelligence agencies, and influential scientists and physicians to flood the public with fearful propaganda about COVID-19 virulence and pathogenesis, and to muzzle debate and ruthlessly censor dissent.

monkeys at the Washington National Primate Research Center will suffer under michele basso

Oh, those monkeys in those mad scientists’ experiments. Now, let’s graduate to . . . .

Pa. and N.J. kids are lining up for COVID-19 shots as parents experience both relief and hesitancy

Homo Sapiens . . . . Children! And school hallway movements, oh boy:

FDA says Pfizer COVID vaccine looks effective for young kids - Hawaii Tribune-Herald

And we wonder where are all the smarts in this new generation of children? Where are those future renters? Those future home buyers? Those future workers? Ya think this is not planned? Right, I am just a Tin Foil Hat conspiracy Freak.

“The pernicious new selling of virtual travel is potentially a way to kill off the dream center of children, to kill their imagination. To move freely, even within the area from which you were born, is in my opinion the most indelible of rights. What is going on is a ruling class soft coup, a less overtly violent coup and their vision of a digital feudal planet is terrifying, if only because it is cannot possibly work. It is delusion.” — A Solution Without a Solution, September 18, 2021, John Steppling

Yes, John, these are monsters, and they are elite, and they are the chosen few, and yes, they come from a select and selective grouping of people, schooled and trained, in the way of the financial abuser, in the art of propaganda and mind control, and they have the floor now, as their prostitutes in Congresses, Senates, on Boards, in Houses of Parliament, inside Presidential Palaces, what have you, are their work horses, all proud of their Eichmann Status — sure, updated Eichmann’s, but still, a spade is a spade:

“Our identity is, literally, who we are, and as the digital technologies of the Fourth Industrial Revolution advance, our identity is increasingly digital. This digital identity determines what products, services and information we can access – or, conversely, what is closed off to us.” – September 2018, World Economic Forum Insight Report, Identity in a Digital World, A New Chapter in the Social Contract November 1, 2018: “If Dave Birch of Consult Hyperion is correct, identity is the new money.”

Monsters! (Watch: Digital ID; Freedom-as-a-Service. The Lure of Entitlement as the Method for Entrapment)

Finally, fortunately, the previous piece I wrote is up on DV, Collusion: The End of Nature, Brought to us by Zoom

And while we never are really finished tweaking our writing, but in this time of nanosecond news, we have to expect that once an article hits the digital ink, that’s that, move on. Luckily, here we are, add to this story, and it’s not pretty — Oregon middle school closes over safety concerns, student ‘socialization’ issues from year of virtual learning

Fistfights and yelling, and youth unable to sit, stand, walk still. Imagine that, as if the people like those I align with did not anticipate this. School has already been a shit-show of outbursts, “behaviors” (that’s what they call it, his or her behavior) and youth lacking concentration skills.

Ya think all those chemicals and compounds and poisons in the food, air, water, around us, they have nothing to do with ADHD, more and more Autism Spectrum disorder. Robert Kennedy Jr says it right when he points out that we do not see a bunch of 67 year olds (his age) walking around with helmets on and with weighted blankets and yammering Autistic jumbled nothingness. He stresses that EPA and FDA and USDA, the entire suite of agencies supposedly in the employ of the public, that they have no common sense to wonder why so many peanut allergies, so many learning and developmental disabilities?

So, get the jab-jab-booster-booster, and keep eating that nanoparticle filled cream pie, and, bam, we have the post lockdown, return to school, well, lockdown because of “behaviors.”

“The shifts in learning methods and isolation caused by COVID-19 closures and quarantines have taken a toll on the well-being of our students and staff,” superintendent Dr. Danna Diaz wrote in a letter to families and staff Tuesday justifying the sudden decision. “We are finding that some students are struggling with the socialization skills necessary for in-person learning, which is causing disruption in school for other students.”

A district spokesman, Steve Padilla, told The Oregonian that the closure was prompted by fights and other behavioral problems among students but declined to go into detail about the frequency of those on-campus brawls. He said weapons were not involved according to the best of his knowledge.

“We need to take care of this now. It’s urgent,” Padilla said. “It’s not just fighting – It’s disruptive behaviors as well. Students are disrupting other students, making it hard for them to learn.”

Yes, the isolation, the fear mongering, the pathetic death of common sense, common medicine, holism. We reap what we sow, no, RFK, Jr.?

Reality is —

Over 40 New Products Added to Nanotechnology Database

FDA has failed to take adequate action on dangerous chemicals despite acknowledging harm

Here, the interview of Kennedy, by Mercola, deemed one of the enemies of the world on the internet. Viral virus debunker spreader: Interview here!

In this interview, Robert F. Kennedy Jr., an environmental activist and attorney turned ultimate freedom fighter, discusses his latest book, “The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health,” which is a must-read if you want to know more about the behind-the-scenes of this giant fraud. We could talk for hours and not cover but a fraction of what’s in this book, which Kennedy calls a “devastating indictment of Tony Fauci.”

In a nutshell, Kennedy describes how Fauci turned the National Institutes of Health into an incubator for pharmaceutical products, and essentially sold the entire country to the drug industry. The book is an incredibly well-referenced record of his history of decimating human health, and exposes him as a self-serving charlatan.

I particularly enjoyed how Kennedy placed Fauci in the context of Rockefeller’s legacy with respect to Bill Gates, who developed an alliance with Fauci over 20 years ago. Rockefeller set us on a course of toxic, profit-driven medicines synthesized from the byproducts of the oil refinery process a century ago, and Gates picked up where he left off and then collaborated heavily with Fauci.

Let the school Game of Thrones begin! More Tasers in school. More isolation rooms in schools. More SWAT teams in school (there is no defunding the Gestapo/Pigs/Cops!). The billionaires’ system is running very very smoothly.


This content originally appeared on Dissident Voice and was authored by Paul Haeder.

]]>
https://www.radiofree.org/2023/05/06/housing-education-health-care-universal-rights/feed/ 0 393054
A California bill could help make EVs a blackout solution https://grist.org/energy/a-california-bill-could-help-make-evs-a-blackout-solution/ https://grist.org/energy/a-california-bill-could-help-make-evs-a-blackout-solution/#respond Thu, 04 May 2023 10:45:00 +0000 https://grist.org/?p=609236 Chris Bowe was preparing for his daughter’s ninth birthday party in February when a drenching storm knocked out power to his neighborhood in Hayward, California. Minutes before the party began, Bowe connected his electric Ford F-150 Lightning to a panel in his garage, sending electricity from the pickup truck to his house. 

“It was dark out, parents were dropping off their kids, and our house was lit up,” said Bowe, who works as a FedEx manager in the Bay Area. “They were like, ‘How do you have power?’”

Bowe kept the lights on using bidirectional charging, which allows electric vehicles to not only receive electricity but discharge it as well. It’s a feature that a proposed California bill would require that all EVs sold in the state offer by model year 2027.

Making an EV bidirectional capable is a matter of equipping it with the right software and hardware, and some, like the Nissan Leaf, Kia EV 6, and the Lightning, already provide the feature. Other manufacturers have been slower to roll out the technology. Tesla, for example, says its cars will be bidirectional by 2025

Proponents of Senate Bill 233, which the state’s Senate Appropriations Committee will hear this month, say using electric vehicle batteries to power homes, buildings and even the grid could provide energy resilience and bolster grid reliability. Climate events and growing power demand increasingly stress the state’s energy supplies. Utilities sometimes shut down power lines to prevent ignition when wildfire danger is high. Storms can cause widespread blackouts, and excess demand when people turn up air conditioners during heat waves have prompted rolling blackouts to ration power. 

The solutions to these outages often rely on fossil fuels that only exacerbate the underlying causes. California might turn on a backup natural gas plant to supply more power, and homes and businesses often draw power from diesel generators during blackouts. 

“When the grid is stressed, wouldn’t it be great if instead of firing polluting fossil-fuel peaker plants typically located in disadvantaged communities, we were using our electric vehicles?” said Kurt Johnson, community energy resilience director at the California nonprofit The Climate Center.

Such a solution is called vehicle-to-grid integration, in which EV owners could plug their cars into bidirectional charging stations at home and sell the power in its battery to utilities during peak demand, buttressing the grid and reducing their utility bills. Those batteries can also power a home or building, or even be used to directly plug in a refrigerator or essential medical equipment. “Even the smallest commonly available EV battery is a multi-day energy storage asset for everybody,” said Johnson. “A Nissan Leaf can run your house for days.” 

The bill comes as the state takes a leading role in vehicle electrification. Last year, California regulators required that all new cars sold in the state be electric by 2035, and it already has 1.5 million EVs on the road. That number is projected to reach 8 million by 2030. All of those cars would have a total capacity of 80 gigawatts of power, according to Johnson.  Plugging in a fraction of them would quickly surpass the capacity of the state’s largest power plant, the Diablo Canyon nuclear plant, which can provide up to 2.3 gigawatts.

The Alliance for Automotive Innovation, an auto-industry advocacy group, opposes the bill. Its representatives declined an interview request, but referred Grist to a letter to state senators in which it said that a mandate is premature and does not consider the associated costs or the regulatory changes needed to make vehicle-to-grid technology work. 

“Mandating bidirectional hardware on the vehicle will not ensure that bidirectional charging will take place or will even be capable of taking place,” it said in the letter. The organization estimates that the technology could add about $3,300 to a vehicle’s cost. 

In a Senate Transportation Committee hearing last week, state Senator Nancy Skinner said the mandate would ensure that vehicles sold in the most pivotal years of the state’s electric transition, which is being driven by generous grants and rebates, can become energy assets. “I appreciate that manufacturers don’t like mandates, but we need to make sure the cars have the capability while the rebates still exist,” said Skinner, who introduced the bill.

The alliance also argued that using an EV to deliver power could adversely impact battery life and undermine battery warranties, which are based on years and mileage. However, the battery warranty on the Nissan Leaf, one of the least expensive fully battery electric cars available, accounts for bidirectional charging use. The bidirectional charger approved for use with the Leaf manages the battery’s levels to preserve battery life. 

Even if every EV had bidirectional capability, getting the energy flowing into a home or the grid requires an expensive array of hardware. In addition to a bidirectional charging station, the car owner would need an inverter to convert the car’s DC power to AC, a switch to isolate the system from the grid, and a small battery to get the system going during an outage. Ford offers an all-in-one package that costs more than $5,000, not including the cost of hiring an electrician to install it. 

That was too expensive for Bowe. “It sounds wonderful, but you’re still talking about an upper-middle class, wealthy person in a single-family home that’s going to be able to afford to do this,” he said. He instead installed a manual transfer switch that he connects to his Lightning with the same type of power cord used for a home generator. It cost him $1,500. 

For those who can afford all the hardware, the framework for connecting with the grid and selling electricity back to the local utility does not yet exist. “We’re not even effectively interconnecting stationary batteries, much less mobile batteries,” said Johnson. Also, for it to make financial sense for EV owners to offer up energy to the grid, there need to be pricing mechanisms for selling the electricity to the utility. While a few California utilities have begun vehicle-to-grid pilot projects, no official programs exist yet.

Johnson said the state is working on both interconnection and pricing –– there are about a dozen bills addressing interconnection woes in the legislature, and the public utilities commission is studying new pricing frameworks. He said that SB 233 is meant to be a starting point. “If the vehicles themselves don’t have the bidirectional capacity, which is the point of the bill, then none of that opportunity can be realized. So it all starts with the vehicles.”

This story was originally published by Grist with the headline A California bill could help make EVs a blackout solution on May 4, 2023.


This content originally appeared on Grist and was authored by Gabriela Aoun Angueira.

]]>
https://grist.org/energy/a-california-bill-could-help-make-evs-a-blackout-solution/feed/ 0 392421
Journalists, Rights Groups Urge Ban on ‘Sinister’ Spyware Like Pegasus https://www.radiofree.org/2023/05/03/journalists-rights-groups-urge-ban-on-sinister-spyware-like-pegasus/ https://www.radiofree.org/2023/05/03/journalists-rights-groups-urge-ban-on-sinister-spyware-like-pegasus/#respond Wed, 03 May 2023 17:20:07 +0000 https://www.commondreams.org/news/journalists-ban-pegasus-spyware

Six dozen civil society groups, journalists, and experts marked World Press Freedom Day on Wednesday with a joint call for "all governments to implement an immediate moratorium on the export, sale, transfer, servicing, and use of digital surveillance technologies, as well as a ban on abusive commercial spyware technology and its vendors."

The use of spyware against media workers is "an alarming trend impacting freedom of the press and creating a wider chilling effect on civil society and civic space," the statement argues. "Privacy, source protection, and digital security are essential components of press freedom, allowing journalists to protect the confidentiality and integrity of their work and sources."

"As governments and other entities seek to suppress the press and silence dissent, we are seeing an exponential increase in the market for digital surveillance technologies, including spyware, that overrides these journalistic principles."

"As governments and other entities seek to suppress the press and silence dissent, we are seeing an exponential increase in the market for digital surveillance technologies, including spyware, that overrides these journalistic principles," the statement continues. Such tools "can infiltrate a target's phone, giving the attacker full access to emails, messages, contacts, and even the device's microphone and camera," rendering secure and encrypted platforms useless.

"From El Salvador to Mexico, from India to Azerbaijan, from Hungary to Morocco, to Ethiopia—the list goes on of countries where investigative journalists working to expose corruption, power abuses, or human rights violations, have been targeted by invasive spyware such as Pegasus," the statement adds, referencing spyware from the Israeli firm NSO Group that has been used to target reporters, dissidents, and world leaders.

The advocates of banning this type of surveilleance technology noted that there are at least 180 known cases of potentially targeted journalists across 21 countries. They pointed to multiple examples, including Hungary-based Andras Szabo and Szabolcs Panyi being targeted with Pegasus in 2019, and Raymond Mujuni and Canary Mugume facing the same spyware two years later in Uganda.

According to the statement:

Moroccan investigative journalist Omar al-Radi was targeted with Pegasus spyware between 2019 and 2021, and later sentenced to six years in prison on bogus rape and espionage charges. Meanwhile journalist Hicham Mansouri, who fled from Morocco to France in 2016 following state harassment and detention, was hacked by Pegasus at least 20 times between February and April 2021.

Perhaps the most infamous example of how spyware can facilitate and enable transnational repression and serious human rights violations, including enforced disappearance and extrajudicial killing, is the murder of Saudi journalist and dissident Jamal Khashoggi at the Consulate of the Kingdom of Saudi Arabia in Istanbul on October 2, 2018. Both prior to and after his death, Mr. Kashoggi's family members and acquaintances were targeted by Pegasus spyware.

"It is clear that the use of spyware and unlawful targeted surveillance violates the fundamental rights of freedom of expression and access to information, peaceful assembly and association, freedom of movement, and privacy," the statement asserts, demanding not only a ban but also accountability for developers and distributors of the technology, and boosted efforts to protect journalists.

The statement was launched at Secret Surveillance: Countering Spyware's Threats to Freedom of the Press and Expression, an event co-hosted by advocacy organizations including Access Now.

"Invasive and abusive commercial spyware that has been used to facilitate human rights abuses globally has no place in our world," declared Access Now surveillance campaigner Rand Hammoud. "Years worth of evidence by civil society has demonstrated that the companies selling these technologies should not be rewarded with governmental contracts that would continue enabling their abuses."

Natalia Krapiva, tech legal counsel at Access Now, agreed that "this sinister technology that has been misused and abused by governments around the world is not safe in any hands, and its use can never be justified."

"Discussions do not suffice," Krapiva added. "We expect action: Protect freedom of the press, stamp out the spyware threat."

The spyware statement came as other members of the media acknowledged World Press Freedom Day in various ways, including sounding the alarm about the impacts of artificial intelligence on fact-based journalism, demanding global safeguards for digital privacy, and calling out the U.S. government for continuing to seek the extradition of WikiLeaks founder Julian Assange.


This content originally appeared on Common Dreams and was authored by Jessica Corbett.

]]> https://www.radiofree.org/2023/05/03/journalists-rights-groups-urge-ban-on-sinister-spyware-like-pegasus/feed/ 0 392257 CPJ joins call for Indian government to withdraw latest amendment to Information Technology Rules https://www.radiofree.org/2023/05/02/cpj-joins-call-for-indian-government-to-withdraw-latest-amendment-to-information-technology-rules/ https://www.radiofree.org/2023/05/02/cpj-joins-call-for-indian-government-to-withdraw-latest-amendment-to-information-technology-rules/#respond Tue, 02 May 2023 20:24:59 +0000 https://cpj.org/?p=284494 Ahead of World Press Freedom Day on Wednesday, May 3, the Committee to Protect Journalists joined 16 press freedom and human rights organizations in a Tuesday statement calling on the Indian government to review and withdraw the overbroad provisions of the Information Technology Rules, 2021, and to withdraw the latest amendment to the rules, announced on April 6.

The amendment authorizes the formulation of a central government fact-check unit empowered to order intermediaries, including social media companies and internet service providers, to take down “fake or false or misleading content.” Intermediaries risk liability in court if they fail to remove such content.

The statement expresses concern that the amendment, which was announced without adequate and meaningful consultation with journalists, press bodies, and civil society organizations, severely threatens press freedom and empowers the government to be the sole arbiter of truth on the internet.

The statement further notes that the surveillance of journalists continues with impunity and calls on the Indian government to meaningfully commit to protecting media freedom and ensuring that journalists can do their work freely and without fear of persecution.

Read the full statement here.

CPJ previously criticized the I.T. Rules, which expanded the government’s powers to censor online content. In January 2023, the Indian government cited the rules when ordering YouTube and Twitter to take down links to a BBC documentary investigating Prime Minister Narendra Modi’s alleged role in the 2002 riots in Gujarat.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2023/05/02/cpj-joins-call-for-indian-government-to-withdraw-latest-amendment-to-information-technology-rules/feed/ 0 391991
132 Rights Groups Warn EARN IT Act Threatens Online Privacy and Free Speech https://www.radiofree.org/2023/05/02/132-rights-groups-warn-earn-it-act-threatens-online-privacy-and-free-speech/ https://www.radiofree.org/2023/05/02/132-rights-groups-warn-earn-it-act-threatens-online-privacy-and-free-speech/#respond Tue, 02 May 2023 20:01:11 +0000 https://www.commondreams.org/news/earn-it-privacy-free-speech

As U.S. lawmakers renew efforts to pass a bipartisan bill intended to combat sexual exploitation of children online, 11 dozen advocacy groups argued Tuesday that the federal legislation would actually not only fall short in its mission but also endanger digital privacy and free expression.

U.S. Sens. Lindsey Graham (R-S.C.), Marsha Blackburn (R-Tenn.), and Richard Blumenthal (D-Conn.) along with Reps. Ann Wagner (R-Mo.) and Sylvia Garcia (D-Texas) last week reintroduced the Eliminating Abusive and Rampant Neglect of Interactive Technologies (EARN IT) Act.

The EARN IT Act (S. 1207/H.R. 2732) takes aim at Section 230 of the Communications Decency Act, which states that "no provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider."

The controversial bill would remove that blanket liability protection for civil or criminal law violations related to online child sexual abuse material (CSAM) and establish a national commission—filled with members of federal agencies, law enforcement, and survivor groups as well as legal and technical experts—to craft voluntary "best practices" for providers.

"EARN IT will jeopardize access to encrypted services, undermining a critical foundation of security, confidentiality, and safety on the internet."

In their Tuesday letter to the Senate Judiciary Committee, 132 groups led by the Center for Democracy & Technology wrote: "We support curbing the scourge of child exploitation online. However, EARN IT will instead make it harder for law enforcement to protect children. It will also result in online censorship that will disproportionately impact marginalized communities."

"In addition, EARN IT will jeopardize access to encrypted services, undermining a critical foundation of security, confidentiality, and safety on the internet," they continued. "Dozens of organizations and experts have repeatedly warned this committee of these risks when this bill has been previously considered, and those same risks remain. We urge you to oppose this bill."

The letter—also signed by Access Now, ACLU, Amnesty International USA, Demand Progress, Electronic Frontier Foundation (EFF), Fight for the Future, Free Press Action, GLAAD, Human Rights Campaign, PEN America, Public Knowledge, Transgender Law Center, Tor Project, Wikimedia Foundation, and more—lays out the groups' critiques in detail.

"Section 230's liability shield applies to smaller and start-up companies that are interactive computer service providers, not just a handful of large companies like Google and Meta," the letter stresses. "By opening providers up to significantly expanded liability, the bill would make it far riskier for platforms to host user-generated content," which could cause providers to stop hosting such content altogether or engage in "overbroad censorship" that removes constitutionally protected material.

"These wide-ranging removals of online speech will negatively impact diverse communities in particular, including LGBTQ people, whose posts are disproportionately labeled erroneously as sexually explicit," the rights organizations warned, pointing to lessons learned from the anti-trafficking law widely known as SESTA/FOSTA.

SESTA/FOSTA "has forced sex workers—whether voluntarily engaging in sex work or forced into sex trafficking against their will—offline and into harm's way," the groups noted, citing federal research. The law has also "chilled their online expression," and all of "these burdens have fallen most heavily on smaller platforms that either served as allies and created spaces for the LGBTQ and sex worker communities or simply could not withstand the legal risks and compliance costs."

In addition to putting online free expression at risk, the EARN IT Act would disincentivize end-to-end encryption, which "ensures the privacy and security of sensitive communications by making certain that only the sender and receiver can view them," the groups highlighted. "Billions of people worldwide rely on encryption to secure their daily activities online, from web browsing to online banking to communicating with friends and family."

"Everyone who communicates with others on the internet should be able to do so privately. However, this security is especially relied upon by journalists, Congress, the military, domestic violence survivors, union organizers, immigrants, and anyone who seeks to keep their communications secure from malicious hackers," the letter says, emphasizing that abortion patients also rely on the technology, especially since last year's U.S. Supreme Court decision and subsequent state laws restricting reproductive rights.

Though the EARN IT Act is backed by various groups that work to prevent the exploitation of children, the letter makes the case that the bill "risks undermining child abuse prosecutions by transforming providers into agents of the government for purposes of the Fourth Amendment," explaining:

If a state law has the effect of compelling providers to monitor or filter their users' content so it can be turned over to the government for criminal prosecution, the provider becomes an agent of the government, and any CSAM it finds could become the fruit of an unconstitutional warrantless search. In that case, the CSAM would properly be suppressed as evidence in a prosecution and the purveyor of it could go free. At least two state laws—those of Illinois and South Carolina—would have that effect.

Rather than passing Graham and Wagner's bill, the letter asserts, "Congress should instead consider more tailored approaches to deal with the real harms of CSAM online, and it should commit to conducting a full, independent internet impact assessment to identify potential harm likely to result from any internet-related legislation, such as harms to users’ freedom of expression and privacy, before the legislation is voted upon."

The rights groups' alarm over the EARN IT Act comes amid debates over other thematically related proposals such as the Kids Online Safety Act (KOSA), which is supported by some advocates for children's rights, health, and privacy but opposed by some signatories to Tuesday's letter, including the ACLU, EFF, and Fight for the Future.

Advocacy groups critical of KOSA, the EARN IT Act, and the STOP CSAM Act—who say that "unfortunately, all three bills have many of the same problems"—plan to hold a press conference about the legislation on Wednesday afternoon with Sen. Ron Wyden (D-Ore.).


This content originally appeared on Common Dreams and was authored by Jessica Corbett.

]]>
https://www.radiofree.org/2023/05/02/132-rights-groups-warn-earn-it-act-threatens-online-privacy-and-free-speech/feed/ 0 391973
The Pentagon Uses Video Games to Teach “Security Excellence.” You Can Play Them Too. https://www.radiofree.org/2023/05/02/the-pentagon-uses-video-games-to-teach-security-excellence-you-can-play-them-too/ https://www.radiofree.org/2023/05/02/the-pentagon-uses-video-games-to-teach-security-excellence-you-can-play-them-too/#respond Tue, 02 May 2023 18:59:31 +0000 https://theintercept.com/?p=426935

In the 1983 movie “WarGames,” a young hacker played by Matthew Broderick inadvertently accesses a fictional supercomputer belonging to the U.S. military. Before realizing he has found a system the North American Aerospace Defense Command uses for war simulations, he searches for computer games. The list he gets back starts with classic games like checkers and bridge, but to his surprise, it also includes games called “Guerrilla Engagement” and “Theaterwide Biotoxic and Chemical Warfare.”

Turns out the Department of Defense likes to play computer games in real life too.

More than 40 security awareness” games are available for anyone to play on the website of the Center for Development of Security Excellence, or CDSE, a directorate within the Defense Counterintelligence and Security Agency, the largest security agency within the U.S. government. The DCSA, which refers to itself as “America’s Gatekeeper,” specializes in security of government personnel and infrastructure as well as counterintelligence and insider threat detection. (The Defense Department did not immediately respond to a request for comment.)

The games range from crossword puzzles and word searches about how to identify an insider threat, to games with more peculiar titles like “Targeted Violence” and “The Adventures of Earl Lee Indicator.” The trove of games looks like an artifact from the late ’90s: game titles announced in WordArt, award badges that look designed with Microsoft Word, “Matrix”-esque backgrounds of falling numbers, and stock photos (some still watermarked).

Some of the games themselves are presented in formats prone to security vulnerabilities. For example, some look like they were made using freely available PowerPoint magic eight ball templates, despite the file format’s potential for containing malware. Playing the magic eight ball games also requires downloading and opening files, exposing players to potentially malicious attachments. Heightening this risk, it appears not all the games have a carefully guarded provenance: The metadata in a magic eight ball game called “Unauthorized Disclosure,” for instance, indicates that the file was originally stored in a personal Dropbox folder.

The games appear to be used for internal training on topics such as cybersecurity and industrial security as well as insider threats and Special Access Programs, security protocols for handling highly classified information. But they can also reveal what actions Defense Department investigators are taught to flag as an insider threat, like plugging in unauthorized USB devices or downloading eyebrow-raising amounts of files all at once. These clues could potentially help whistleblowers avoid detection when leaking government intelligence.

The Intercept played a selection of the Pentagon’s security games. Here’s what the gameplay was like.

Adjudicative Guidelines Word Search

This word search, based off open-sourced code, is ostensibly designed to teach the player about the government’s adjudicative guidelines for determining a person’s eligibility for security clearance. The teaching method is to search a 625-letter grid for words like “sexual” and “criminal.” For example, once you spot “sexual,” a pop-up informs you that “[s]exual behavior that involves a criminal offense … raises questions about an individual’s judgment, reliability, trustworthiness, and ability to protect classified or sensitive information.” Seemingly the Defense Department believes that anyone convicted of a sex crime can’t be trusted to protect sensitive information.

Who Is the Risk?

This game is a cross between “The Dating Game” and “To Catch a Predator,” if the participants were suspected of being insider threats. In an upbeat voiceover, the game show host — or interrogator, who is represented by a $12 stock photo — says, “Welcome to America’s favorite game show: ‘Who Is the Risk?’ Your task in this exercise is to determine which of our guests is most likely to pose an indicator risk to your organization.”

The DoD’s Who’s the Risk? game.

The Department of Defense’s “Who Is the Risk?” game.

Screenshot: The Intercept

Each of the three contestants answer six different questions, such as “Have you made any large purchases recently?” and “Do you use social media?” If their answer sounds like a Potential Risk Indicator — a ”risky behavior” that, according to the CDSE, may indicate an inclination for becoming an insider threat — you click a checkbox under that person.

One of the contestants admits to just purchasing a Ferrari, while another brags about having high-level government contacts in the European Union. A third admits that they took classified documents home. Add up who has the most checkboxes and you’ve got your perp. Once you’ve identified the correct suspect, the host tells you to “bring these concerns to the appropriate reporting authority,” as one does.

Whodunit Mystery Game

The opening screen for the Whodunit Mystery Game.

The opening screen for the “Whodunit” game.

Screenshot: The Intercept

The most elaborate game on the site, “Whodunit,” is similar to Clue, except that instead of a murder suspect, you’re trying to identify and locate a leaker, and instead of a murder weapon, you’re trying to find the method they used to leak the data.

The suspect cards include intricate profiles and a number of potential red flags. David Plum, for instance, has “shared that he’s going through a divorce” and is “declining performance evaluations.” Betty Brown has “never taken a polygraph,” and Marge Merlot “frequently travels to several foreign countries.” After pegging the suspect, you can then select a probable location where the data breach occurred, such as in the cubicle farm (which, we’re informed, lacks security cameras) or the sensitive compartmented information facility, a secure facility for handling sensitive information. Finally, you can pick the method the nefarious leaker deployed, such as spillage or a good old-fashioned phishing attack. After you’ve cracked one case, there are six more to try.

Special Access Program Hidden Object Game

The Special Access Program hidden objects game.

The Special Access Program hidden object game.

Screenshot: The Intercept

This is a standard hidden object game: You have two minutes to locate 10 physical security-related objects. These objects range from General Services Administration containers used for storing classified information, to Z-duct ventilation constructions designed to prevent sound from escaping the secure facility, to astragal strips that can seal gaps in a closed door. If you successfully find all the objects, you’re awarded the rank of “security guru” and unlock a bonus hidden object game, where you now have one minute to find five unauthorized objects, including a personal phone and a wireless keyboard.

A Department of Defense poster advising against submitting confidential news tips.

A Department of Defense poster advising against submitting confidential news tips.

Screenshot: The Intercept


If you want to decorate your gaming room to match the Pentagon games as you’re playing, the CDSE also provides over 100 posters about security topics. Many of them are reminiscent of vintage 1960s National Security Agency posters, but others have been updated to warn about modern threats. For instance, one poster depicts a fictitious media outlet called the Daily News; its tips pop-up is verbatim from the New York Times. The poster cautions against following links to submit tips to news media, advising that “unauthorized disclosure of classified information to the news media or other outlets is not whistleblowing” and, in big red letters, “It’s a crime.”


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/05/02/the-pentagon-uses-video-games-to-teach-security-excellence-you-can-play-them-too/feed/ 0 391967
Return of suspended accounts, policy muddle make Musk’s Twitter a ‘free-for-all hellscape’ https://www.radiofree.org/2023/05/02/return-of-suspended-accounts-policy-muddle-make-musks-twitter-a-free-for-all-hellscape/ https://www.radiofree.org/2023/05/02/return-of-suspended-accounts-policy-muddle-make-musks-twitter-a-free-for-all-hellscape/#respond Tue, 02 May 2023 08:25:04 +0000 https://www.altnews.in/?p=153861 In April 2022, Twitter announced that it had accepted tech mogul Elon Musk’s offer to acquire the company at a whopping $44 billion, following which it would become a privately...

The post Return of suspended accounts, policy muddle make Musk’s Twitter a ‘free-for-all hellscape’ appeared first on Alt News.

]]>
In April 2022, Twitter announced that it had accepted tech mogul Elon Musk’s offer to acquire the company at a whopping $44 billion, following which it would become a privately held company. A month before that, Musk had disclosed a major stake in the company during a Securities and Exchange Commission (SEC) filing. Initially, the company had announced that Musk would be joining the board, but Musk reportedly declined.

Later, in a more aggressive move, he offered to buy the company at $44 billion, his ‘best and final’ offer. Over the next few days, Musk and Twitter reached a deal. However, on May 13, Musk tweeted that the deal had been put on hold over concerns related to the prevalence of bot and spam accounts on the platform. A few hours later, he tweeted that he was “still committed to the acquisition”.

The acquisition was eventually completed in late October. But the drama leading up to the actual acquisition of Twitter by Elon Musk was like a precursor to what the Musk-led platform had to offer — bizarre policy moves, claims of free speech and actions wholly detrimental to the cause, and random moves that either stayed or got rolled back at Elon’s whims, to name a few.

The Moderation Council That Never Was

One of the first tweets by Elon Musk after the acquisition was a video of himself walking into the Twitter headquarters carrying a sink. The same day, he penned an open letter to advertisers. it said, “It is important to the future of civilization to have a common digital town square, where a wide range of beliefs can be debated in a healthy manner, without resorting to violence. There is currently great danger that social media will splinter into far right wing and far left wing echo chambers that generate more hate and divide our society.”

On October, 28, Musk announced that Twitter would have a moderation council and that “no major content decisions or account reinstatements will happen before that council convenes.” Ironically, one of the first directives made by Musk after he took over was the reinstatement of Babylon Bee, a satirical site that had been suspended for an anti-trans tweet. A month later, Babylon Bee, former US President Donald Trump, and various other figures were welcomed back to the platform.

Meanwhile, the promised moderation council never happened. While responding to a tweet, Musk said that the moderation council was based on the fact that a ‘coalition of political/activist’ groups had agreed not to encourage advertisers to leave the platform. Musk claimed that the group had broken the deal hence the council never took off. Speaking to CNBC, various members of this coalition denied having such a deal.

Perhaps, Musk’s understanding of content moderation became clear when he suspended the account of Ye (formerly known as Kanye West). The account of the musician was suspended after he shared an image of a swastika combined with the Star of David. Responding to a user, Elon wrote, “I tried my best. Despite that, he again violated our rule against incitement to violence. Account will be suspended.”

According to two former employees who spoke to The Washington Post on condition of anonymity, Ye’s tweet would have violated Twitter’s rules on hateful content, not incitement to violence. In the same week, Musk announced that Twitter would reinstate all suspended accounts based on a Twitter poll.

A few weeks later, when Musk did a poll asking whether he should step down as CEO, his ardent supporters suggested that Twitter polls could be swarmed by ‘bots’ and that only Twitter blue subscribers should be allowed to vote in policy-related decisions. Interestingly, the fact that Twitter polls are prone to manipulation was already raised by former employees and researchers. It is just that these concerns did not matter as long as polls were yielding favourable results.

While Elon Musk was busy organizing polls, on November 18 in India, editor-in-chief of the pro-BJP propaganda channel Sudarshan News Suresh Chavhanke tweeted to his 6,00,000 followers an invitation card for a wedding reception of an interfaith couple, thus revealing the venue of the event and putting the couple and their families at risk of physical violence — a clear case of violation of Twitter’s policy.

This wedding event was eventually cancelled. This tweet continues to be available on the platform even today. Suresh Chavhanke never faced any consequences. Interestingly, almost a month later, Twitter temporarily suspended the accounts of multiple journalists because they ‘doxxed’ the real-time location of Elon Musk by reporting or sharing about the popular jet tracking account @ElonJet.

Amplify Misinformation, Hate and Threats, All at ₹650 per month

It was clear from the beginning that very few prominent Twitter users would succumb to the pressure of subscribing to Twitter Blue. The flip-flops on the feature has been the butt of jokes on the platform since Musk took over. Recently, it became clear that half of all the Twitter Blue subscribers had less than 1,000 followers (this data is before the legacy blue tick purge of April 20, 2023). Not only that, there has been an uptick of hateful content, conspiracy theories and even denialism on the platform. (Reports can be found here, here and here).

Alt News checked close to two dozen Twitter Blue subscriber accounts which have more than 10,000 followers and predominantly engage in content related to India. We found that these accounts not only amplified dangerous communal misinformation but also regularly participated in trolling, amplifying political propaganda, doxxing and sharing content that stereotyped marginalized communities. Some of these accounts have been reinstated on the platform because of the ‘general amnesty’ that was granted based on a Twitter poll last year.

One of the accounts called ‘@MrSinha_‘ that was reinstated by Twitter on December 26 had amplified dangerous communal misinformation within four days of being active on the platform. On December 30, when Indian cricketer Rishabh Pant met with a near-fatal car crash, @MrSinha_ tweeted that the cricketer had met with an accident in a Rohingya-dominated area and that instead of helping him, the locals looted all his belongings and ran away.

This was entirely false as police clarified in a video statement. In fact, Pant was saved by Haryana Roadways Bus operators Sushil Kumar and Paramjeet Nain. The two had contacted the police, saved Pant’s life and handed his valuables to him while the paramedics were taking him away.

This user has amplified communal and political misinformation on multiple occasions since being reinstated (here, here, here and here).

In March this year, when a migrant crisis in Tamil Nadu was fueled by misinformation, verified Twitter Blue user Mohammed Tanvir was among the prominent enablers of panic on social media. This user shared three graphic videos claiming that they were visuals from Tamil Nadu where Bihari migrant workers were being lynched. Alt News independently debunked two of the three clips shared by Tanvir. The Tamil Nadu Police also issued a statement debunking these claims.

Monu Manesar, a cow vigilante from Haryana, who has been accused of the murder of two Muslim individuals and is apparently on the run was also a verified Twitter Blue user until things blew out of proportion and his alleged deeds came under the spotlight. This is in stark contrast to what happened in the case of Suresh Chavhanke, who tweeted the address of an interfaith wedding reception. The tweet was simply never removed because it never caught the attention of international media.

Ritesh Jha, who rose to fame in the spring of 2021 for doing a YouTube live stream in which the channel’s audience ‘rated’ Pakistani women, ‘auctioned’ them off to each other, and posted sexually charged comments on their looks and clothes, is also a verified Twitter Blue user. Jha who goes by the pseudonym ‘Liberal Doge’, has been at it for over two years and was the inspiration for the GitHub apps ‘Bulli Bai’ and ‘Sulli Deals’, which did a similar auction of Twitter accounts of Indian Muslim women.

Below is a collage of some of the tweets and replies made by Ritesh Jha alias Liberal Doge as a Twitter Blue subscriber.

Click to view slideshow.

He also shared a clip recently in which a minor can be seen being sexually assaulted. The clip has a text superimposed on it that reads, “Lessons being taught in madrasa”. Jha also used his Twitter to amplify the false claim that a recent chemical blast in Bulandshahr took place at a Muslim individual’s house, a claim categorically refuted by police.

Another account called Megh Updates, which attempts to position itself as a news aggregator, was reinstated on January 12. Since then, this account has spread false information at least 10 times.

The activities of these accounts are not just limited to spreading misinformation. They are also involved in trolling, harassing and attempting to intimidate journalists and politicians by sending items to their addresses. On at least three separate occasions, a paid verified user called ‘@Cyber_Huntss’ has put up tweets in which he says he is sending grocery items to his targets. Among his targets were Alt News co-founder Mohammed Zubair, Congress spokesperson Supriya Shrinate and Delhi chief minister Arvind Kejriwal. (Archive 1, 2 and 3).

Tweets by these accounts targeted Dr BR Ambedkar, journalist Danish Siddiqui who was killed by the Taliban, and shared AI-generated images of Prophet Muhammad and Aisha.

One account even shared the false claim that Dr BR Ambedkar was ‘the first rapist of independent India’. The basis of this claim is a medium post and nothing else. (Archive)

Attacks on Journalists in India

Journalists have always been a target of abuses on Twitter, especially those hailing from minority communities. In 2018, Amnesty International looked at 778 women journalists and politicians in the US and UK and found that 7.1% of tweets sent to them were abusive or problematic. In 2020, Amnesty International released a report in which they analyzed 114,716 tweets mentioning 95 Indian women politicians in a three-month period. It found that 13.8% of the tweets that mentioned 95 women politicians in the study were either ‘problematic’ or ‘abusive’. The study also found that Muslim women politicians received 94.1% more ethnic or religious slurs than women politicians from other religions.

The issue of inappropriate and abusive content existed in the old regime, but in Musk’s Twitter, these accounts are not only given a verified tick (which looks like a seal of approval) but their engagements are also prioritized as per the claims of the new owner. Below are some of the content produced or reshared by these verified accounts.

Indian Muslim journalists Rana Ayyub, Arfa Khanum Sherwani, Mohammed Zubair, and Sayema, a radio jockey, are among the top favourites for these trolls. Ayyub, who is famous for her investigative reporting and columns, has been a vocal critic of the Narendra Modi government. In a recent study, researchers found that “of all the obvious abuse directed at Ayyub, 62% were personal attacks, including sexist, misogynistic, sexually explicit and racist abuse (e.g. ‘presstitute’, ‘ISIS sex slave’, ‘Jihadi Jane’, etc.) and 35% was designed to undermine her credibility as a journalist or commentator.” The research also notes that “nearly 42% of all of Ayyub’s tweets receive at least one abusive reply, a remarkably high rate, and the speed of the abuse is highly unusual – sometimes within seconds of her posting – potentially signalling coordinated campaigns.”

Ayyub told the researchers that she was not only being attacked for her journalism but due to her faith as well, so she had to defend herself ‘as a Muslim journalist’. The amount of abuse faced by journalist Arfa Khanum Sherwani and RJ Sayema is almost on a par with Rana Ayyub. In February this year, right-wing influencers attempted to create a ruckus over Arfa allegedly being a speaker at the Harvard India Conference, by sharing a poster of the list of speakers from 2020. Arfa did not take part in the 2023 conference. Even Right Wing outlets debunked the claim. (Archive)

Alt News co-founder Mohammed Zubair is among the few Muslim male journalists who are relentlessly trolled. There are verified accounts which unfailingly manage to abuse or send threats on almost all of his tweets. Zubair spent 23 days in jail last year after Delhi police had arrested him over a 2018 tweet that an anonymous complainant found ‘objectionable’. At the beginning of March, Zubair received a series of online threats from pro-Hindutva influencers after Alt News debunked a disinformation campaign about murderous attacks on migrant Bihari workers in Tamil Nadu. Below are screenshots of the relentless trolling of the above-mentioned journalists done by some verified Twitter Blue users.

Click to view slideshow.

A clear line of communication is also missing since Twitter now automatically responds to media queries with a poop emoji. Other factors also make it evident that a very small team has been looking into day-to-day moderation and there is virtually no direct communication until it causes an uproar.

Recently, when the news agency ANI was locked by Twitter, the editor of the organisation made a Tweet announcing the same while tagging Musk. The same evening NDTV was ‘blocked’ by Twitter and they too announced it while tagging Musk. Both handles were restored within a few hours. This came across as quite unusual, as social media companies have a person of contact to quickly rectify an error like this. In Twitter 2.0, grievances can be directly addressed by tagging the owner, giving an advantage only to those accounts having a large number of mass followers.

When Musk took over Twitter last year, he started using his personal account to respond to complaints. At one point, he changed his Twitter bio to ‘Twitter Complaint Hotline Operator‘, normalizing the practice. In the previous regime, users raised issues about Twitter by tagging the Twitter Support account and/or some prominent employees. At the present moment, that systematic approach has been dismantled. India has the third largest Twitter users globally and it is surprising that Musk himself is the de-facto point of contact for such a huge user base. Such a carefree approach for a market like India only accentuates the policy paralysis in Musk’s Twitter.

A Twitter Blue user with 1 million plus followers uploaded two movies back to back on Sunday, April 30. It took Twitter three hours to take down the first movie and the second movie remained on the platform for up to seven hours, making it evident that Twitter currently is surprisingly slow at detecting and taking down illegal content. Twitter under Musk is also struggling to curb child abuse content despite it being one of the top priorities promised by him. Even a network of AI spam bots using ChatGPT to tweet politics in Southeast Asia and cryptocurrency remained under the radar until it was flagged by a researcher earlier this month.

Free Speech Absolutism — A Sham From The Start

Post-acquisition, Elon gave access to internal documents of Twitter to a handful of journalists who published what they called the ‘Twitter Files’, which apparently revealed partisanship, government interferences and censorship happening on the platform. Based on these publications, Musk openly criticised the policies of the platform that existed under the previous leadership. Around the same time, Musk took the opportunity on multiple occasions, to explain his position when it comes to ‘censorship’. In fact, during the talks about the acquisition of Twitter, Musk said that by free speech he simply meant speech which complied with the law. It was clear from the beginning that his understanding of content moderation was rather naive and more importantly, he would simply comply with any government requests without ever challenging it.

In January this year, when the BBC aired its two-part documentary ‘India: The Modi Question’ in the UK, which looked into the role of Narendra Modi during the 2002 Gujarat violence, it quickly gained attention among Indian viewers due to unauthorised circulation of clips of the documentary on social media platforms.

The Indian government invoked an emergency law and issued orders to YouTube and Twitter demanding that they block any content related to the documentary from being published on their platforms. Complying with this, Twitter blocked dozens of tweets that provided links to the documentary. When prompted about this by a user, Elon replied by saying that “It is not possible for me to fix every aspect of Twitter worldwide overnight, while still running Tesla and SpaceX, among other things”.

Then almost a month and a half later, Twitter blocked 122 accounts belonging to journalists, authors, and politicians in India based on legal requests from the Indian government. Additional 23 accounts were blocked by Twitter on March 23 based on legal demands. On March 28, BBC’s Punjabi news service was ‘withheld’ in India for a few hours based on a government request. On April 7, investigative journalist Saurav Das tweeted that one of his tweets about home minister Amit Shah had been withheld globally. The move was an apparent first for Twitter as the platform generally tended to block tweets only in the region whose government had made the legal request.

It was not unusual for Twitter even under the previous leadership to comply with requests made by the government. But the blanket compliance appears to contradict not only Elon’s commitment to ‘free speech’ but also the culture that was established by the previous system. For instance, in July 2022, about three months before Musk took over, Twitter took the Indian government to court for a judicial review of the content it had asked to be blocked in the country. On April 12, 2023, during an interview with BBC, it became apparent that Musk’s Twitter had no interest in taking the same path. He said that India’s rules for social media platforms were ‘quite strict’ and that he would rather comply with the government’s blocking orders than risk sending Twitter employees to jail.

Amid all these developments, Musk followed Indian Prime Minister Narendra Modi on Twitter on April 10, 2023.

To Verify or Not to Verify, That is the Question

A consistent vision also appears to be missing from the beginning of the takeover, other than the obvious obsession with metrics and labels. The very first product launched by Twitter under Musk, a paid-for blue verification mark, had to be paused immediately after launch due to the swarming of fake verified accounts spreading misinformation. Next, Twitter removed labels indicating a device from which a tweet was sent because according to him it was a “waste of screen space & compute”. Then eventually came the ‘view count‘ button, while they experimented with the position of the retweet and like buttons. He also introduced colour-coded check marks, in which yellow check marks indicate corporate accounts, while the grey check marks denote the accounts of government officials. An additional label called “Official” was introduced at some point and killed within hours before the very first Twitter Blue launch which gave users the option to apply for a paid blue check mark.

Musk’s takeover of Twitter in October last year was rejoiced by Right Wing figures globally. Many prominent Russian and Chinese personalities challenged Musk to live up to his commitment towards free speech by removing labels on their accounts and rolling back policies limiting their visibility and reach on the platform. Their wishful remarks started coming to fruition in April of this year when Musk’s Twitter labelled the National Public Radio (NPR) as ‘state-affiliated media’, which was later changed to ‘Government Funded’ after a long email exchange between NPR tech reporter Bobby Allyn and Elon Musk. During this period, the platform also stopped enforcing policies designed to limit the reach of Chinese and Russian propaganda.

Twitter continued to globally label several accounts as ‘Government Funded’ based on a Wikipedia list, among which was the Canadian Broadcasting Corporation (CBC). The organisation argued that it was ‘less than 70% government funded’, after which Twitter labelled it as ‘69% Government Funded’. Both NPR and CBC have stopped using Twitter over the false label.

As of April 21, Twitter has removed labels from all accounts, including those belonging to Russia and China. Upon being enquired, Musk told reporters that all media labels were dropped based on a suggestion by Walter Isaacson, the former president and CEO of the Aspen Institute.

The news of state-controlled media experiencing sudden Twitter gains without any announcement of the change in platform policy was confirmed by DFR Lab’s research. Twitter removed all legacy verified accounts on April 20, 2023. Taking advantage of this change, within a few hours, a fake account subscribed to Twitter Blue claiming to represent the paramilitary group fighting for control of Sudan falsely claimed its leader had died in the fighting. A verified Twitter Blue account also tweeted that Turkish President Erdogan was poisoned while meeting a Russian official without providing any reliable citations, as pointed out by Twitter Community Notes volunteers.

Recently, Twitter also announced an update about its ‘enforcement philosophy’, wherein it was said that based on the existing policy of visibility filtering, additional details would be provided via publicly visible labels to tweets that are in violation of Twitter’s policy on ‘Hateful Conduct’. Twitter refers to this move as “Freedom of speech, not reach“. It took Twitter less than 10 days to fail at enforcing this policy. When civil rights attorney and clinical instructor Alejandra Caraballo posted a collage of screenshots of verified accounts calling for the execution of trans people and their allies, Twitter not only removed those tweets by verified handles but also took action on the tweet of Caraballo, which now only shows a blank panel. The tweet by Caraballo does not have any labels that indicate it has been limited.

It has also been reported that Twitter will not be publishing a transparency report for the year 2022 and has “also chosen to stop publishing routine disclosures of copyright and government takedown requests on the Lumen Database — Twitter doesn’t appear to have disclosed any Indian takedown requests since April 9, and even copyright request disclosures globally haven’t been forthcoming since April 15”. Since Musk took over, Twitter has complied with 971 requests from governments and courts. In fact, in its self-reports, Twitter under Musk shows that it did not challenge even one single request made by courts and governments. More importantly, the compliance rate in the year before the acquisition hovered around 50%. At present, the figure has jumped to 83%. When Twitter fails to challenge such take-down requests in countries like India, it becomes virtually impossible for the end user to legally challenge these take-downs.

To sum up, with the reinstatement of deplatformed accounts & a policy muddle at its worst, Musk’s Twitter has become exactly what he promised it won’t —  a ‘free-for-all hellscape’. Below is a list of additional developments that happened in the last few weeks:

The post Return of suspended accounts, policy muddle make Musk’s Twitter a ‘free-for-all hellscape’ appeared first on Alt News.


This content originally appeared on Alt News and was authored by Kalim Ahmed.

]]>
https://www.radiofree.org/2023/05/02/return-of-suspended-accounts-policy-muddle-make-musks-twitter-a-free-for-all-hellscape/feed/ 0 391831
Digital Security Tips to Prevent the Cops From Ruining Your Trip Abroad https://www.radiofree.org/2023/04/29/digital-security-tips-to-prevent-the-cops-from-ruining-your-trip-abroad/ https://www.radiofree.org/2023/04/29/digital-security-tips-to-prevent-the-cops-from-ruining-your-trip-abroad/#respond Sat, 29 Apr 2023 17:30:03 +0000 https://theintercept.com/?p=426793

Ernest Moret, a foreign rights manager for the French publishing house La Fabrique, boarded a train in Paris bound for London in early April. He was on his way to attend the London Book Fair.

When Moret arrived at St. Pancras station in the United Kingdom, two plainclothes cops who apparently said they were “counter-terrorist police” proceeded to terrorize Monet. They interrogated him for six hours, asking everything from his views on pension reform to wanting him to name “anti-government” authors his company had published, according to the publisher, before proceeding to arrest him for refusing to give up the passwords to his phone and laptop. Following his arrest, Moret was released on bail, though his devices were not returned to him.


The case, while certainly showcasing the United Kingdom’s terrifying anti-terror legislation, also highlights the crucial importance of taking operational security seriously when traveling — even when going on seemingly innocuous trips like a two-and-a-half-hour train ride between London and Paris. One never knows what will trigger the authorities to put a damper on your international excursion.

Every trip is unique and, ideally, each would get a custom-tailored threat model: itemizing the risks you foresee, and knowing the steps you can take to avoid them. There are nonetheless some baseline digital security precautions to consider before embarking on any trip.

Travel Devices, Apps, and Accounts

The first digital security rule of traveling is to leave your usual personal devices at home. Go on your trip with “burner” travel devices instead.

Aside from the potential for compromise or seizure by authorities, you also run the gamut of risks ranging from having your devices lost or stolen during your trip. It’s typically way less dangerous to just leave your usual devices behind, and to bring along devices you only use when traveling. This doesn’t need to be cost prohibitive: You can buy cheap laptops and either inexpensive new phones or refurbished versions of pricier models. (And also get privacy screens for your new phones and laptops, to reduce the information that’s visible to any onlookers.)

Spots

Illustration: Pierre Buttin for The Intercept

Your travel devices should not have anything sensitive on them. If you’re ever coerced to provide passwords or at risk of otherwise having the devices be taken away from you, you can readily hand over the credentials without compromising anything important.

If you do need access to sensitive information while traveling, store it in a cloud account somewhere using cloud encryption tools like Cryptomator to encrypt the data first. Be sure to then both log out of your cloud account and make sure it’s not in your browsing history, as well as uninstall Cryptomator or other encryption apps, and only reinstall them and re-log in to your accounts after you’ve reached your destination and are away from your port of entry. (Don’t login to your accounts while still at the airport or train station.)

Just as you shouldn’t bring your usual devices, you also shouldn’t bring your usual accounts. Make sure you’re logged out of any personal or work accounts which contain sensitive information. If you need to access particular services, use travel accounts you’ve created for your trip. Make sure the passwords to your travel accounts are different from the passwords to your regular accounts, and check if your password manager has a travel mode which lets you access only particular account credentials while traveling.

Before your trip, do your research to make sure the apps you’re planning to use — like your virtual private network and secure chat app of choice — are not banned or blocked in the region you’re visiting.

Maintain a line of sight with your devices at all times while traveling. If, for instance, a customs agent or border officer takes your phone or laptop to another room, the safe bet is to consider that device compromised if it’s brought back later, and to immediately procure new devices in-region, if possible.

If you’re entering a space where it won’t be possible to maintain line of sight — like an embassy or other government building where you’re told to store devices in a locker prior to entry — put the devices into a tamper-evident bag, which you can buy in bulk online before your trip. While this, of course, won’t prevent the devices from being messed with, it will nonetheless give you a ready indication that something may be amiss. Likewise, use tamper-evident bags if ever leaving your devices unattended, like in your hotel room.

Phone Numbers

Sensitive information you may have on your devices doesn’t just mean documents, photos, or other files. It can also include things like contacts and chat histories. Don’t place your contacts in danger by leaving them on your device: Keep them in your encrypted cloud drive until you can access them in a safe location.

Spots

Illustration: Pierre Buttin for The Intercept

Much like you shouldn’t bring your usual phone, you also shouldn’t bring your normal SIM card. Instead, use a temporary SIM card to avoid the possibility of authorities taking control of your phone number. Depending on which region you’re going to, it may make more sense to either buy a temporary SIM card when in-region, or buy one beforehand. The advantage of buying a card at your destination is that it may have a higher chance of working, whereas if you buy one in advance, the claims that vendors make about their cards working in a particular region may or may not pan out.

On the other hand, the region you’re traveling to may have draconian identification requirements in order to purchase a SIM. And, if you’re waiting to purchase a card at your destination, you won’t have phone access while traveling and won’t be able to reach an emergency contact number if you encounter difficulties en route.

Heading Back

Keep in mind that the travel precautions outlined here don’t just apply for your inbound trip, they apply just as much for your return trip back home. You may be questioned either as you’re leaving the host country, or as you’re arriving back at your local port of entry. Follow all of the same steps of making sure there is nothing sensitive on your devices prior to heading back home.

Taking precautions like obtaining and setting up travel devices and accounts, or establishing a temporary phone number, may all seem like hassles for a standard trip, but the point of undertaking these measures is that they’re ultimately less hassle than the repercussions of exposing sensitive information or contacts — or of being interrogated and caged.


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]> https://www.radiofree.org/2023/04/29/digital-security-tips-to-prevent-the-cops-from-ruining-your-trip-abroad/feed/ 0 391448 You Are Reading This Thanks to Semiconductors https://www.radiofree.org/2023/04/28/you-are-reading-this-thanks-to-semiconductors/ https://www.radiofree.org/2023/04/28/you-are-reading-this-thanks-to-semiconductors/#respond Fri, 28 Apr 2023 13:12:40 +0000 https://dissidentvoice.org/?p=139681

Koga Harue (Japan), Umi (‘The Sea’), 1929.

On 7 October 2022, the United States government implemented export controls in an effort to hinder the development of China’s semiconductor industry. An expert on the subject told the Financial Times, ‘The whole point of the policy is to kneecap China’s AI [Artificial Intelligence] and HPC [High Performance Computing] efforts’. The next day, China’s Foreign Ministry spokesperson Mao Ning said:

In order to maintain its sci-tech hegemony, the US has been abusing export control measures to wantonly block and hobble Chinese enterprises. Such practice runs counter to the principle of fair competition and international trade rules. It will not only harm Chinese companies’ legitimate rights and interests but also hurt the interests of US companies. It will hinder international sci-tech exchange and trade cooperation and deal a blow to global industrial and supply chains and world economic recovery. By politicising tech and trade issues and using them as a tool and weapon, the US cannot hold back China’s development but will only hurt and isolate itself when its action backfires.

As part of Tricontinental: Institute for Social Research’s collaboration with No Cold War, we studied the implications of these export controls with a focus on semiconductors. Briefing no. 7 teaches us about the vitality of semiconductors and why their use in the New Cold War will not bear the fruits anticipated by Washington.

On 8 April, Chairman of the US House Foreign Affairs Committee Michael McCaul was asked to explain ‘why Americans… should be willing to spill American blood and treasure to defend Taiwan’. His answer was telling: ‘TSMC [Taiwan Semiconductor Manufacturing Company] manufactures 90% of the global supply of advanced semiconductor chips’. The interviewer noted that McCaul’s reasoning ‘sounds like the case that [was] made in the 60s, 70s, and 80s of why America was spending so much money and military resources in the Middle East [when] oil was so important for the economy’ and then asked whether semiconductor chips are ‘the 21st century version’ of oil – that is, a key driver of US foreign policy towards China.

Semiconductor chips are the building blocks of the world’s most advanced technologies (such as artificial intelligence, 5G telecommunications, and supercomputing) as well as all modern electronics. Without them, the computers, phones, cars, and devices that are essential to our everyday lives would cease to function. They are typically produced by using ultraviolet light to etch microscopic circuit patterns onto thin layers of silicon, packing billions of electrical switches called transistors onto a single fingernail-sized wafer. This technology advances through a relentless process of miniaturisation: the smaller the distance between transistors, the greater the density of transistors that can be packed onto a chip and the more computing power that can be embedded in each chip and in each facet of modern life. Today, the most advanced chips are produced with a three-nanometre (nm) process (for reference, a sheet of paper is roughly 100,000-nm thick).

Charles Sheeler (United States), Classic Landscape, 1931.

The Semiconductor Supply Chain

The commercial semiconductor industry was developed in Silicon Valley, California in the late 1950s, dominated by the United States in all aspects, from research and design to manufacture and sales. From the outset, this industry held geopolitical significance, with early manufacturers selling upwards of 95% of their chips to the Pentagon or the aerospace sector. Over the subsequent decades, the US selectively offshored most of its chip manufacturing to its East Asian allies, first to Japan, then to South Korea and Taiwan. This allowed the US to reduce its capital and labour costs and stimulate the industrial development of its allies while continuing to dominate the supply chain.

Today, US firms maintain a commanding presence in chip design (e.g., Intel, AMD, Broadcom, Qualcomm, and NVIDIA) and fabrication equipment (e.g., Applied Materials, Lam Research, and KLA). Taiwan’s TSMC is the world’s largest semiconductor manufacturer or foundry, accounting for an overwhelming 56% share of the global market and over 90% of advanced chip manufacturing in 2022, followed by South Korea’s Samsung, which holds a 15% share of the global market. In addition, the Dutch firm ASML is a critical player, holding a monopoly on extreme ultraviolet (EUV) lithography machines needed to produce the most advanced chips below 7-nm.

The largest part of the semiconductor supply chain that lies outside of the control of the US and its allies is in China, which has developed into the world’s electronics manufacturing hub and a major technological power over the past four decades. China’s share of global chip manufacturing capacity has risen from zero in 1990 to roughly 15% in 2020. Yet, despite its sizeable developmental advances, China’s chip production capabilities still lag behind, relying on imports for the most advanced chips (in 2020, China imported $378 billion worth of semiconductors, 18% of its total imports). Meanwhile, China’s largest semiconductor manufacturer, SMIC, only has a 5% share of the global market, paling in comparison to TSMC.

Giorgio de Chirico (Italy), Ettore e Andromaca (‘Hector and Andromache’), 1955–56.

The US Campaign against China

In recent years, the US has been waging an aggressive campaign to arrest China’s technological development, which it views as a serious threat to its dominance. In the words of US National Security Adviser Jake Sullivan, Washington’s goal is to ‘maintain as large of a lead as possible’. To this end, the US has identified China’s semiconductor production capabilities as an important weakness and is trying to block the country’s access to advanced chips and chip-making technology. Under the Trump and Biden administrations, the US has placed hundreds of Chinese companies on trade and investment blacklists, including the country’s leading semiconductor manufacturer SMIC and tech giant Huawei. These restrictions have banned any company in the world that uses US products – effectively every chip designer and manufacturer – from doing business with Chinese tech firms.

The US has also pressured governments and firms around the world to impose similar restrictions. Since 2018, Australia, Canada, New Zealand, and the United Kingdom have joined the US in banning Huawei from their 5G telecommunications networks while a number of European countries have implemented partial bans or restrictions. Importantly, in 2019, after more than a year of intense US lobbying, the Dutch government blocked the key firm ASML, which builds and supplies the most advanced chip-making machinery to the semiconductor industry, from exporting its equipment to China.

These policies do not only target firms; they also have a direct impact on an individual level. In October 2022, the Biden administration restricted ‘US persons’ – including citizens, residents, and green-card holders – from working for Chinese chip firms, forcing many to choose between their immigration status and their jobs. The Centre for Strategic and International Studies, a leading Washington, DC think tank, characterised US policy as ‘actively strangling large segments of the Chinese technology industry – strangling with an intent to kill’ (our emphasis).

Alongside its containment measures against China, the US has ramped up efforts to boost its domestic chip-making capacity. The CHIPS and Science Act, signed into law in August 2022, provides $280 billion in funding to boost the domestic US semiconductor industry and reshore production from East Asia. Washington views Taiwan’s role as the manufacturing hub of the semiconductor industry as a strategic vulnerability given its proximity to mainland China and is inducing TSMC to relocate production to Phoenix, Arizona. This pressure, in turn, is generating its own frictions in the US-Taiwan relationship.

However, US efforts are not infallible. Although China has suffered serious setbacks, it has intensified efforts to promote its domestic capacity, and there are signs of progress despite the obstacles imposed by the US. For example, in 2022, China’s SMIC reportedly achieved a significant technological breakthrough, making the leap from 14-nm to 7-nm semiconductor chips, which is on par with the global leaders Intel, TSMC, and Samsung.

Lu Yang (China), Delusional World – Bardo #1, 2021.

A Matter of Global Importance

It is important to note that the US is not only targeting China in this conflict: Washington fears that China’s technological development will lead, through trade and investment, to the dispersal of advanced technologies more broadly throughout the world, namely, to states in the Global South that the US sees as a threat. This would be a significant blow to the US’s power over these countries. In 2020, the US Senate Foreign Relations Committee decried that China was facilitating ‘digital authoritarianism’ because it has ‘been willing to go into smaller, under-served markets’ and ‘offer more cost-effective equipment than Western companies’, pointing to countries under US sanctions such as Venezuela and Zimbabwe as examples. To combat ties between Chinese tech firms and sanctioned countries, the US has taken severe legal action, fining the Chinese corporation ZTE $1.2 billion in 2017 for violating US sanctions against Iran and North Korea. The US also collaborated with Canada to arrest Huawei executive Meng Wanzhou in 2018 on charges of circumventing US sanctions against Iran.

Unsurprisingly, while the US has been able to consolidate support for its agenda amongst a number of its Western allies, its efforts have failed across the Global South. It is in the interest of developing countries for such advanced technologies to be dispersed as widely as possible – not to be controlled by a select few states.

Skunder Boghossian (Ethiopia), The End of the Beginning, 1972–73.

Skunder Boghossian (Ethiopia), The End of the Beginning, 1972–73.

If you are reading this newsletter on your smartphone, then you should know that this tiny instrument has billions of miniscule transistors that are invisible to the human eye. The scale of the developments in digital technology is staggering. Earlier conflicts took place over energy and food, but now this conflict has heated up over – amongst other matters – the resources of our digital world. This technology can be used to solve so many of our dilemmas, and yet, here we are, at the precipice of greater conflict to benefit the few over the needs of the many.


This content originally appeared on Dissident Voice and was authored by Vijay Prashad.

]]> https://www.radiofree.org/2023/04/28/you-are-reading-this-thanks-to-semiconductors/feed/ 0 391171 Microsoft quietly supported legislation to make it easier to fix devices. Here’s why that’s a big deal. https://grist.org/technology/microsoft-right-to-repair-quietly-supported-legislation-to-make-it-easier-to-fix-devices-heres-why-thats-a-big-deal/ https://grist.org/technology/microsoft-right-to-repair-quietly-supported-legislation-to-make-it-easier-to-fix-devices-heres-why-thats-a-big-deal/#respond Fri, 28 Apr 2023 10:45:00 +0000 https://grist.org/?p=608306 In March, Irene Plenefisch, a senior director of government affairs at Microsoft, sent an email to the eight members of the Washington state Senate’s Environment, Energy, and Technology Committee, which was about to hold a hearing to discuss a bill intended to facilitate the repair of consumer electronics. 

Typically, when consumer tech companies reach out to lawmakers concerning right-to-repair bills — which seek to make it easier for people to fix their devices, thus saving money and reducing electronic waste — it’s because they want them killed. Plenefisch, however, wanted the committee to know that Microsoft, which is headquartered in Redmond, Washington, was on board with this one, which had already passed the Washington House.

“I am writing to state Microsoft’s support for E2SHB 1392,” also known as the Fair Repair Act, Plenefisch wrote in an email to the committee. “This bill fairly balances the interests of manufacturers, customers, and independent repair shops and in doing so will provide more options for consumer device repair.”

The Fair Repair Act stalled out a week later due to opposition from all three Republicans on the committee and Senator Lisa Wellman, a Democrat and former Apple executive. (Apple frequently lobbies against right-to-repair bills, and during a hearing, Wellman defended the iPhone maker’s position that it is already doing enough on repair.) But despite the bill’s failure to launch this year, repair advocates say Microsoft’s support — a notable first for a major U.S. tech company — is bringing other manufacturers to the table to negotiate the details of other right-to-repair bills for the first time. 

“We are in the middle of more conversations with manufacturers being way more cooperative than before,” Nathan Proctor, who heads the U.S. Public Research Interest Group’s right-to-repair campaign, told Grist. “And I think Microsoft’s leadership and willingness to be first created that opportunity.”

The logo of Microsoft is seen at the 2023 Hannover Messe industrial trade fair on April 17, 2023 in Hanover, Germany.
Repair advocates say Microsoft’s support for a repair bill in Washington — a notable first for a major U.S. tech company — is bringing other manufacturers to the table for the first time.  Alexander Koerner/Getty Images

Across a wide range of sectors, from consumer electronics to farm equipment, manufacturers attempt to monopolize repair of their devices by restricting access to spare parts, repair tools, and technical documentation. While manufacturers often claim that controlling the repair process limits cybersecurity and safety risks, they also financially benefit when consumers are forced to take their devices back to the manufacturer or upgrade due to limited repair options.

Right-to-repair bills would compel manufactures to make spare parts and information available to everyone. Proponents argue that making repair more accessible will allow consumers to use older products for longer, saving them money and reducing the environmental impact of technology, including both electronic waste and the carbon emissions associated with manufacturing new products. 

But despite dozens of state legislatures taking up right-to-repair bills in recent years, very few of those bills have passed due to staunch opposition from device makers and the trade associations representing them. New York state passed the first electronics right-to-repair law in the country last year, but before the governor signed it, tech lobbyists convinced her to water it down through a series of revisions.

Like other consumer tech giants, Microsoft has historically fought right-to-repair bills while restricting access to spare parts, tools, and repair documentation to its network of “authorized” repair partners. In 2019, the company even helped kill a repair bill in Washington state. But in recent years the company has started changing its tune on the issue. In 2021, following pressure from shareholders, Microsoft agreed to take steps to facilitate the repair of its devices — a first for a U.S. company. Microsoft followed through on the agreement by expanding access to spare parts and service tools, including through a partnership with the repair guide site iFixit. The tech giant also commissioned a study that found repairing Microsoft products instead of replacing them can dramatically reduce both waste and carbon emissions.

Microsoft has also started engaging more cooperatively with lawmakers over right-to-repair bills. In late 2021 and 2022, the company met with legislators in both Washington state and New York to discuss each state’s respective right-to-repair bill. In both cases, lawmakers and advocates involved in the bill negotiations described the meetings as productive. When the Washington state House introduced an electronics right-to-repair bill in January 2022, Microsoft’s official position on it was neutral — something that state representative and bill sponsor Mia Gregerson, a Democrat, called “a really big step forward” at a committee hearing

Despite Microsoft’s neutrality, last year’s right-to-repair bill failed to pass the House amid opposition from groups like the Consumer Technology Association, a trade association representing numerous electronics manufacturers. Later that year, though, the right-to-repair movement scored some big wins. In June 2022, Colorado’s governor signed the nation’s first right-to-repair law, focused on wheelchairs. The very next day, New York’s legislature passed the bill that would later become the nation’s first electronics right-to-repair law.

When Washington state lawmakers revived their right-to-repair bill for the 2023 legislative cycle, Microsoft once again came to the negotiating table. From state senator and bill sponsor Joe Nguyen’s perspective, Microsoft’s view was, “We see this coming, we’d rather be part of the conversation than outside. And we want to make sure it is done in a thoughtful way.”

Proctor, whose organization was also involved in negotiating the Washington state bill, said that Microsoft had a few specific requests, including that the bill require repair shops to possess a third-party technical certification and carry insurance. It was also important to Microsoft that the bill only cover products manufactured after the bill’s implementation date, and that manufacturers be required to provide the public only the same parts and documents that their authorized repair providers already receive. Some of the company’s requests, Proctor said, were “tough” for advocates to concede on. “But we did, because we thought what they were doing was in good faith.”

In early March, just before the Fair Repair Act was put to a vote in the House, Microsoft decided to support it. 

“Microsoft has consistently supported expanding safe, reliable, and sustainable options for consumer device repair,” Plenefisch told Grist in an emailed statement. “We have, in the past, opposed specific pieces of legislation that did not fairly balance the interests of manufacturers, customers, and independent repair shops in achieving this goal. HB 1392, as considered on the House floor, achieved this balance.”

Damian Griffiths, director of Catbytes, a computer repair charity, repairs a donated computer at Ewart Community Hall in south London on February 15, 2021.
Across a wide range of sectors, from consumer electronics to farm equipment, manufacturers attempt to monopolize repair of their devices by restricting access to spare parts, repair tools, and technical documentation. TOLGA AKMEN/AFP via Getty Images

While the bill cleared the House by a vote of 58 to 38, it faced an uphill battle in the Senate, where either Wellman or one of the bill’s Republican opponents on the Environment, Energy, and Technology Committee would have had to change their mind for the Fair Repair Act to move forward. Microsoft representatives held meetings with “several legislators,” Plenefisch said, “to urge support for HB 1392.” 

“That’s probably the first time any major company has been like, ‘This is not bad,’” Nguyen said. “It certainly helped shift the tone.”

Microsoft’s engagement appears to have shifted the tone beyond Washington state as well. As other manufacturers became aware that the company was sitting down with lawmakers and repair advocates, “they realized they couldn’t just ignore us,” Proctor said. His organization has since held meetings about proposed right-to-repair legislation in Minnesota with the Consumer Technology Association and TechNet, two large trade associations that frequently lobby against right-to-repair bills and rarely sit down with advocates. 

“A lot of conversations have been quite productive” around the Minnesota bill, Proctor said. TechNet declined to comment on negotiations regarding the Minnesota right-to-repair bill, or whether Microsoft’s support for a bill in Washington has impacted its engagement strategy. The Consumer Technology Association shared letters it sent to legislators outlining its reasons for opposing the bills in Washington state and Minnesota, but it also declined to comment on specific meetings or on Microsoft.

While Minnesota’s right-to-repair bill is still making its way through committees in the House and Senate, in Washington state, the Fair Repair Act’s opponents were ultimately unmoved by Microsoft’s support. Senator Drew MacEwen, one of the Republicans on the Energy, Environment, and Technology Committee who opposed the bill, said that Microsoft called his office to tell him the company supported the Fair Repair Act.

“I asked why after years of opposition, and they said it was based on customer feedback,” MacEwen told Grist. But that wasn’t enough to convince MacEwen, who sees device repairability as a “business choice,” to vote yes.

“Ultimately, I do believe there is a compromise path that can be reached but will take a lot more work,” MacEwen said.

Washington state representative and bill sponsor Mia Gregerson wonders if Microsoft could have had a greater impact by testifying publicly in support of the bill. While Gregerson credits the company with helping right to repair get further than ever in her state this year, Microsoft’s support was entirely behind the scenes. 

“They did a lot of meetings,” Gregerson said. “But if you’re going to be first in the nation on this, you’ve got to do more.”

Microsoft declined to say why it didn’t testify in support of the Fair Repair Act, or whether that was a mistake. The company also didn’t say whether it would support future iterations of the Washington state bill, or other state right-to-repair bills.

But it signaled to Grist that it might. And in doing so, Microsoft appears to have taken its next small step out of the shadows.

“We encourage all lawmakers considering right to repair legislation to look at HB 1392 as a model going forward due to its balanced approach,” Plenefisch said. 

This story was originally published by Grist with the headline Microsoft quietly supported legislation to make it easier to fix devices. Here’s why that’s a big deal. on Apr 28, 2023.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/technology/microsoft-right-to-repair-quietly-supported-legislation-to-make-it-easier-to-fix-devices-heres-why-thats-a-big-deal/feed/ 0 391098
Crypto Cash Is Powering Kyrsten Sinema’s Reelection Campaign https://www.radiofree.org/2023/04/28/crypto-cash-is-powering-kyrsten-sinemas-reelection-campaign/ https://www.radiofree.org/2023/04/28/crypto-cash-is-powering-kyrsten-sinemas-reelection-campaign/#respond Fri, 28 Apr 2023 09:00:52 +0000 https://theintercept.com/?p=426566

After leaving the Democratic Party last year, Kyrsten Sinema will run for reelection to the U.S. Senate as an independent in 2024, according to a report by the Wall Street Journal earlier this month. In her bid for reelection as the senior senator from Arizona, Sinema faces a dour approval rating in her home state and will have to fend off a challenge by Democratic Rep. Ruben Gallego, who has launched an aggressive challenge to the incumbent.

In a hyperpolarized state, winning as an independent could be daunting. But Sinema has amassed a hearty war chest, thanks in part to six-figure contributions from crypto stakeholders pouring in since she joined a congressional caucus that sought to explore issues that would affect their industry.

The windfall from the crypto industry completes a two-year arc for Sinema, who went from being a proponent of regulations that some crypto giants opposed to a force for compromise with the industry. The softened legislation on regulations fell by the wayside, though Sinema’s crypto donations kept pouring in.

“There’s not a lot of money in being a crypto skeptic.”

In the last three years, Sinema has taken in almost a half a million dollars from crypto businesses and investors. In 2021, as her position on regulating crypto eased, she raised at least $175,000 in campaign cash from the industry. Between 2022 and 2023, her campaign has received more than $330,000 from crypto companies and firms with crypto holdings.

“There’s not a lot of money in being a crypto skeptic,” said Mark Hays, a senior policy analyst with Americans for Financial Reform and Demand Progress.

Some of the largest Sinema campaign contributions over the last four years came from employees at massive private equity firms who began investing heavily in crypto and blockchain technologies in the run up to the formation of Sinema’s new caucus. These include Apollo Global Management and Andreessen Horowitz, both of which started crypto funds worth hundreds of millions.

According to Sinema’s most recent financial disclosures, fundraising from crypto-aligned interests isn’t slowing down. Donald Trump spokesperson turned cryptocurrency evangelist Anthony Scaramucci donated $6,600 to Sinema’s campaign in February, despite suffering a major loss from the implosion of crypto exchange FTX last year. (Scaramucci remains confident in crypto.)

“I’m not one of these religious figures that’s going to chant ‘Bitcoin über alles’ no matter what is going on in life,” Scaramucci said earlier this month. “So I want to frame it from that perspective, and then tell you that I’m more bullish now than I’ve ever been.”

Financial Innovation Caucus

At its inception, the trajectory of Sinema’s crypto caucus wasn’t set in stone. In May 2021, Sinema and Sen. Cynthia Lummis, R-Wyo., started a coalition to support financial innovations including blockchain technology and central bank digital currencies to promote “financial inclusion and opportunity for all.”

The Financial Innovation Caucus has nine members including Sinema, Lummis, six Republicans, and Sen. John Hickenlooper, D-Colo. (The caucus website still lists Sinema as a Democrat.)

The caucus sprang into action during a congressional debate over the bipartisan infrastructure bill in August 2021. Sinema — along with Sens. Rob Portman, R-Ohio, and Mark Warner, D-Va. — proposed an amendment that would have strengthened cryptocurrency reporting requirements by narrowing certain exemptions.

The amendment was backed by the White House but drew immediate criticism from the cryptocurrency industry, which preferred an alternative proposal that would have loosened reporting requirements. The president of the Blockchain Association, a trade group that advocates for “the future of crypto,” called the Sinema amendment “terrible.” A spokesperson for Andreessen Horowitz, a venture capital firm that launched a $2.2 billion crypto fund that June, said the proposal would be a “stunning loss for America.”

Several days later, Sinema and her co-authors on the amendment came around on some of the crypto industry’s concerns. Sinema, Warner, Portman, Lummis, and former Sen. Pat Toomey, R-Pa., announced that they had compromised on a proposal to exempt certain groups like software developers and crypto miners from enhanced reporting requirements. Both the Blockchain Association and the White House supported the compromise, but the bill failed in the Senate.

“The entire goal was moving the bipartisan infrastructure law forward,” a spokesperson for Sinema told the Intercept. “Working with the White House, we found a path forward for the bill to ensure it was not held up or derailed due to separate cryptocurrency concerns from a few Senators.”

The spokesperson disputed the characterization of Sinema’s revised bill as a softer proposed regulation.“The amendment does not ‘loosen reporting requirements,’” the spokesperson said. “It clarifies who is a broker so that people who aren’t actually brokers and cannot fulfill reporting requirements aren’t subject to reporting.”

As Congress debated the competing amendments in the third quarter of 2021, employees at crypto companies, along with venture capital and investment firms with nascent crypto holdings, contributed more than $175,000 total to Sinema’s congressional campaign committees, which raised $2 million that quarter.

These donors include employees from Andreessen Horowitz, in addition to Apollo Global Management, a private equity firm that started offering crypto services in October 2022. Apollo would emerge as the second largest donor base to Sinema’s campaign committee between 2017 and 2022.

Sinema’s congressional campaign committees received more than $51,000 from Andreessen Horowitz and Apollo. The $24,200 she received from Andreessen Horowitz employees — including one from co-founder Benjamin Horowitz — came mostly from employees who had not previously contributed to her campaigns.

Her campaign also received $27,300 in mostly maxed-out contributions from employees at Apollo, including COO Stuart Rothstein. Employees at Apollo had contributed to her campaigns in previous years but less frequently and in smaller amounts. In 2022, Sinema’s campaign received more than $151,000 from Apollo employees.

Scrutiny on Crypto

In the summer of 2022, as the cryptocurrency industry faced increasing scrutiny amid layoffs and failed pilot projects, industry leaders found steady support from Sinema and her colleagues in Congress. Sinema was the only co-sponsor of Toomey’s July 2022 Virtual Currency Tax Fairness Act, which would have exempted small personal crypto transactions from taxation and was widely celebrated by the industry.

Last August, Sinema and her colleagues reintroduced an identical version of the failed 2021 compromise bill with support from industry leaders like the Crypto Council for Innovation, Coin Center, and the Chamber of Digital Commerce. The bill has languished.

Efforts to regulate crypto have since slowed thanks to the recent collapse of Silicon Valley Bank, or SVB, and its effect on national banks, said Hilary Allen, a professor of financial regulation at American University Washington College of Law.

“Any momentum that was building to do crypto legislation has, to some extent, been deflected into dealing with the more present crisis,” Allen said. She was already skeptical about there being a potential crypto bill that could pass through both the House and the Senate. “Now, given the fact that SVB is such a clear focus of the Senate Banking or House Financial Services Committee, I think that’s going to make it even less likely that legislation will go through.”

In addition to the campaign contributions, the crypto industry has touched Sinema’s private life as well. In April 2021, Sinema’s romantic partner Lindsey Buckman received a home equity line of credit from Figure, a blockchain-powered loan provider, on a property in Arizona — the same property where Sinema is actively registered to vote. (Buckman did not respond to a request for comment.)

In July 2021, Apollo — the company whose employees went on to donate to Sinema — entered into an agreement with Figure Technologies, the firm behind the loan provider,

With the agreement between the two companies, Apollo invested funds to further develop Figure’s technology, and last year began experimenting with loan transfers using Figure’s blockchain. (There is no evidence Apollo’s investment in Figure had any bearing on Buckman’s loan.)

When reached for comment, Sinema’s spokesperson told The Intercept, “Lindsey is a private citizen who is not involved in politics. She deserves to make her own financial decisions without public scrutiny just like all other private citizens.”


This content originally appeared on The Intercept and was authored by Daniel Boguslaw.

]]> https://www.radiofree.org/2023/04/28/crypto-cash-is-powering-kyrsten-sinemas-reelection-campaign/feed/ 0 391123 Army Info War Division Wants Social Media Surveillance to Protect “NATO Brand” https://www.radiofree.org/2023/04/27/army-info-war-division-wants-social-media-surveillance-to-protect-nato-brand/ https://www.radiofree.org/2023/04/27/army-info-war-division-wants-social-media-surveillance-to-protect-nato-brand/#respond Thu, 27 Apr 2023 16:01:07 +0000 https://theintercept.com/?p=426687

The U.S. Army Cyber Command told defense contractors it planned to surveil global social media use to defend the “NATO brand,” according to a 2022 webinar recording reviewed by The Intercept.

The disclosure, made a month after Russia’s invasion of Ukraine, follows years of international debate over online free expression and the influence of governmental security agencies over the web. The Army’s Cyber Command is tasked with both defending the country’s military networks as well as offensive operations, including propaganda campaigns.

The remarks came during a closed-door conference call hosted by the Cyber Fusion Innovation Center, a Pentagon-sponsored nonprofit that helps with military tech procurement, and provided an informal question-and-answer session for private-sector contractors interested in selling data to Army Cyber Command, commonly referred to as ARCYBER.

Though the office has many responsibilities, one of ARCYBER’s key roles is to detect and thwart foreign “influence operations,” a military euphemism for propaganda and deception campaigns, while engaging in the practice itself. The March 24, 2022, webinar was organized to bring together vendors that might be able to help ARCYBER “attack, defend, influence, and operate,” in the words of co-host Lt. Col. David Beskow of the ARCYBER Technical Warfare Center.

While the event was light on specifics — the ARCYBER hosts emphasized that they were keen to learn whatever the private sector thought was “in the realm of possible” — a recurring topic was how the Army can more quickly funnel vast volumes of social media posts from around the world for rapid analysis.

At one point in the recording, a contractor who did not identify themselves asked if ARCYBER could share specific topics they plan to track across the web. “NATO is one of our key brands that we are pushing, as far as our national security alliance,” Beskow explained. “That’s important to us. We should understand all conversations around NATO that has happened on social media.”

He added, “We would want to do that long term to understand how — what is the NATO, for lack of a better word, what’s the NATO brand, and how does the world view that brand across different places of the world?”

Beskow said that ARCYBER wanted to track social media on various platforms used in places where the U.S. had an interest.

“Twitter is still of interest,” Beskow told the webinar audience, adding that “those that have other penetration are of interest as well. Those include VK, Telegram, Sina Weibo, and others that may have penetration in other parts of the world,” referring to foreign-owned chat and social media sites popular in Russia and China. (The Army did not respond to a request for comment.)

The mass social media surveillance appears to be just one component of a broader initiative to use private-sector data mining to advance the Army’s information warfare efforts. Beskow expressed an interest in purchasing access to nonpublic commercial web data, corporate ownership records, supply chain data, and more, according to a report on the call by the researcher Jack Poulson.

“The NATO Brand”

Tracking a brand’s reputation is an extremely common marketing practice. But a crucial difference between a social media manager keeping tabs on Casper mattress mentions and ARCYBER is that the Army is authorized to, in Beskow’s words, “influence-operate the network … and, when necessary, attack.” And NATO is an entity subject to intense global civilian scrutiny and debate.

While the webinar speakers didn’t note whether badmouthing NATO or misrepresenting its positions would be merely monitored or actively countered, ARCYBER’s umbrella includes seven different units dedicated to offense and propaganda. The 1st Information Operations Command provides “Social Media Overwatch,” and the Army Civil Affairs and Psychological Operations Command works to “gain and maintain information dominance by conducting Information Warfare in the Information Environment,” according to ARCYBER’s website.

Though these are opaque, jargon-heavy concepts, the term “information operations” encompasses activities the U.S. has been eager to decry when carried out by its geopolitical rivals — the sort of thing typically labeled “disinformation” when emanating from abroad.

The Department of Defense defines “information operations” as those which “influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own,” while “influence operations” are the “United States Government efforts to understand and engage key audiences to create, strengthen, or preserve conditions favorable for the advancement of United States Government interests, policies, and objectives through the use of coordinated programs, plans, themes, messages, and products synchronized with the actions of all instruments of national power.”

ARCYBER is key to the U.S.’s ability to do both.

While the U.S. national security establishment frequently warns against other countries’ “weaponization” of social media and the broader internet, recent reporting has shown the Pentagon engages in some of the very same conduct.

Last August, researchers from Graphika and the Stanford Internet Observatory uncovered a network of pro-U.S. Twitter and Facebook accounts covertly operated by U.S. Central Command, an embarrassing revelation that led to a “sweeping audit of how it conducts clandestine information warfare,” according to the Washington Post. Subsequent reporting by The Intercept showed Twitter had whitelisted the accounts in violation of its own policies.

Despite years of alarm in Washington over the threat posed by deepfake video fabrications to democratic societies, The Intercept reported last month that U.S. Special Operations Command is seeking vendors to help them make their own deepfakes to deceive foreign internet users.

It’s unclear how the Army might go about conducting mass surveillance of social media platforms that prohibit automated data collection.

During the webinar, Beskow told vendors that “the government would provide a list of publicly facing pages that we would like to be crawled at a specific times,” specifically citing Facebook and the Russian Facebook clone VK. But Meta, which owns Facebook and Instagram, expressly prohibits the “scraping” of its pages.

Asked how the Army planned to get around this fact, Beskow demurred: “Right now, we’re really interested in just understanding what’s in the realm of the possible, while maintaining the authorities and legal guides that we’re bound by,” he said. “The goal is to see what’s in the realm of possible in order to allow our, uh, leaders, once again, to understand the world a little bit better, specifically, that of the technical world that we live in today.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]> https://www.radiofree.org/2023/04/27/army-info-war-division-wants-social-media-surveillance-to-protect-nato-brand/feed/ 0 390957 ‘Conserve energy’ plea to Fiji as Monasavu, Nadarivatu dams run low https://www.radiofree.org/2023/04/25/conserve-energy-plea-to-fiji-as-monasavu-nadarivatu-dams-run-low/ https://www.radiofree.org/2023/04/25/conserve-energy-plea-to-fiji-as-monasavu-nadarivatu-dams-run-low/#respond Tue, 25 Apr 2023 22:26:01 +0000 https://asiapacificreport.nz/?p=87482

By Anish Chand in Suva

Energy Fiji Ltd (EFL) has warned that the Monasavu and Nadarivatu hydropower schemes may need to shut down if it does not rain after October.

In a message to customers, EFL said the Monasavu dam had been experiencing below-average rainfall over the past few months from November 22 to April 23.

“These months are typically our rainy period,” the statement read.

“This low rainfall has contributed to the declining dam and water level at Monasavu as well as impacted to some level the Nadarivatu hydro scheme.

“If this low or nil rainfall continues in the upcoming dry period from May to October 23, then this can lead to the Monasavu and Nadarivatu hydropower schemes to operate at critically low water level and may need to be shut down eventually in the next few months.

“EFL is urging all its valued customers to use electricity wisely and conserve energy.”

Anish Chand is a Fiji Times journalist. Republished with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]> https://www.radiofree.org/2023/04/25/conserve-energy-plea-to-fiji-as-monasavu-nadarivatu-dams-run-low/feed/ 0 390404 With Pentagon Leak, the Press Had Their Source and Ate Him Too https://www.radiofree.org/2023/04/25/with-pentagon-leak-the-press-had-their-source-and-ate-him-too/ https://www.radiofree.org/2023/04/25/with-pentagon-leak-the-press-had-their-source-and-ate-him-too/#respond Tue, 25 Apr 2023 17:51:36 +0000 https://theintercept.com/?p=426501
Members of law enforcement assemble on a road, Thursday, April 13, 2023, in Dighton, Mass., near where FBI agents converged on the home of a Massachusetts Air National Guard member who has emerged as a main person of interest in the disclosure of highly classified military documents on the Ukraine. The guardsman was identified as 21-year-old Jack Teixeira. (AP Photo/Steven Senne)

Members of law enforcement assemble near the home of Air National Guard member Jack Teixeira on April 13, 2023, in Dighton, Mass.

Photo: Steven Senne/AP


Tracing the concept of homo sacer from antiquity to modern life, philosopher Giorgio Agamben cites the ancient Roman lexicographer Festus, who defined the term as someone “whom the people have judged on account of a crime. It is not permitted to sacrifice this man, yet he who kills him will not be condemned for homicide.” Homo sacer is thus an outlaw who is free to be pursued by vigilante lynch mobs but who, crucially, cannot be martyred. The mass media’s treatment of the alleged Pentagon leaker appears to have taken this conceit to heart, codifying him as a justifiable target for persecution, to be “tracked” and “hunt[ed] down.”

Over and over, the mainstream press has employed a rhetoric of exclusion, stripping the leaker bare of any protections that might be afforded to a whistleblower. He is not, they tell us ad nauseum, an Edward Snowden or a Chelsea Manning. “It does not seem to involve a principled whistleblower, calling attention to wrongdoing or a coverup,” according to a Washington Post editorial. The “far-right” is incorrectly calling him a whistleblower, claims the New York Times. This view lets the outlet chastise those who attribute different motives to the alleged leaker, Jack Teixeira, while simultaneously distancing itself from the “far-right,” despite its own notably pro-law enforcement slant.

The motives of Teixeira, a 21-year-old Air National Guardsman, are important and newsworthy. They are also not fully known. Most press accounts have relied solely on interviews with minors who hung out in the same chatrooms as Teixeira. These sources have painted a compelling picture, but many others, including Teixeira himself, have not yet spoken publicly.

Why, just because the leaker didn’t bring his material directly to a news outlet, wasn’t he deserving of either protection or being cultivated as a future source?

Whatever his motives may have been, they don’t change the outcome of the leak: the release of informative documents that have underpinned major news stories in the same outlets that eagerly joined the search for their source. Reporters have argued that since Teixeira wasn’t a whistleblower, he was fair game to be hunted by law enforcement agencies and exposed by the press. This rationale conveniently sidesteps a key question: Why, just because the leaker didn’t bring his material directly to a news outlet, wasn’t he deserving of either protection or being cultivated as a future source? Why, instead, was he viewed solely or primarily as quarry?

The media’s claim that Teixeira is not a whistleblower has been based in part on the environment in which the documents were disclosed and the relatively small number of people with whom they were originally shared. Based on testimony from others in a chatroom, the Times wrote that the documents Teixeira allegedly shared, far from being disseminated in the public interest, “were never meant to leave their small corner of the internet.” Likewise, the Post claimed that “the classified documents were intended only to benefit his online family,” which Bellingcat estimated as having around 20 active users out of what the Times later said was about 50 total members. Yet on Friday, the Times reported that Teixeira had previously shared sensitive documents on another chat server that was publicly listed and had about 600 users. In their haste to reveal further possibly incriminating evidence against him, the authors seem not to have paused to reflect on how this wider distribution, if accurate, might undermine their earlier argument.

“Keeping secrets is essential to a functioning government,” the Post editorialized shortly after the documents began being covered in the mainstream press. “Breaking the laws for a psychic joyride is a despicable betrayal of trust and oaths.” Meanwhile, over on the news side, the paper churned out numerous articles revealing those very same secrets, some accompanied by unredacted copies of the leaked documents themselves.

Not to be outdone, the Times has deployed language that dehumanizes the leaker, evoking images of a threatening wild animal. The reporters don’t unpack the full significance of this hunting metaphor, which presumably ends with a slaughtered animal presented as a trophy. In the wake of the Times story naming the alleged leaker before his arrest (which has since been replaced by another story), Twitter was in full media victory lap mode, with reporters patting themselves on the back for their promptness in deanonymizing Teixeira.

More recently, however, the trophy hunters have begun to deny culpability for even the possibility that their investigations provided material assistance to the government.

Christiaan Triebert, a former Bellingcat staffer and a co-author of the Times investigation that initially named Teixeira, issued a disavowal of liability, explaining that the Times reporting team went to the suspect’s house in the hope of talking to him, but he wasn’t there, so instead, they interviewed his mother and, later, his stepfather. At one point, a man matching Teixeira’s description drove onto the property in a pickup truck, but upon seeing the journalists, he promptly departed.

Yet Triebert’s self-defense doesn’t entirely follow. “There seems to be a misconception that our story naming Teixeira led to his arrest,” Triebert tweeted. “That’s simply not the case.” But how does he know? Certainty about this only seems possible from inside the Department of Justice effort to find Teixeira, which isn’t where Triebert claims to stand. Triebert did not respond to a request for comment.

Aric Toler, a current Bellingcat staffer and the principle author of the Times investigation that first named Teixeira, has likewise been quick to dismiss the possibility that his reporting aided the government’s investigation: “This should have been obvious, but no, our story naming the Pentagon/Discord leaker didn’t help the feds find him. They already knew at least a day before we identified him.” He cites the FBI affidavit, employing zero skepticism about a government document that represents one side in what is about to become a contested legal process. Toler did not reply to multiple requests for comment.

The narrow parameters of these denials are telling. Toler has been careful to focus his disdain on the notion that the Times story naming the leaker helped lead to his arrest. But that was not the first time Toler wrote about the leaker. Four days earlier, on April 9, Toler published a story about the leak on Bellingcat’s site in which he named for the first time the Discord chat server where the documents seemed to have originally been leaked. In that piece, Toler also supplied the username of a member of the chat server where the documents were shared, explaining, “The Thug Shaker Central server was originally named after its original founder, one member of the server with the username ‘Vakhi’ told Bellingcat.”

These two pieces of information — the name of the server and the name of one of its users — could have led the FBI to issue a request to Discord to provide identifying information about the user as well as about the owner of the chat server.

The FBI’s affidavit states that on April 10, the day after Toler’s Bellingcat story was posted online, “the FBI interviewed a user of Social Media Platform 1 (‘User 1’).” That user, who is not named in the affidavit, told the FBI that “an individual using a particular username (the ‘Subject Username’) began posting what appeared to be classified information on Social Media Platform.” The “Subject Username,” the affidavit explains, refers to Teixeira.

As with all documentation produced by government investigators, the FBI affidavit must be taken with an iceberg-sized lump of salt. However, it is at least as possible that Toler’s Bellingcat story provided a material lead for the federal investigation as that investigators already knew about Vakhi and Thug Shaker Central before reading it.

Regardless of whether journalists actually provided material assistance to federal investigators, it is concerning that there has been so little public discussion of or reflection by the reporters involved on the ethical ramifications of their work.

After talking to people who knew Teixeira from the Discord server, the investigatory paths of the FBI and Toler diverged. The FBI appears to have identified the suspected leaker based on server records it requested from the platform, while Toler has revealed that he was able to identify the individual by leveraging information supplied by minors.

Though Toler stated that his sources were “all kids,” neither he nor the Times has made any mention of whether they obtained parental consent for these interviews. UNICEF guidelines state that consent from both the child and their guardian should be established prior to conducting an interview and that the intended use of the interview should be made apparent. It’s not clear whether Toler informed the minors that he was going to use clues they offered, like which video games the alleged leaker liked to play, to out Teixeira. The Times did not respond to a request for comment.

In a since-deleted Tweet, Times military correspondent David Philipps effectively threatened that if you don’t leak to the Times, the paper will instead “work feverishly” to identify you. Nuanced or not, this Tweet perfectly summarizes the media’s messaging regarding this case: Only those who reach out to a media outlet are worthy of protection; those who leak information via other means risk sharing the fate of homo sacer, a traitor to be hunted down.


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/04/25/with-pentagon-leak-the-press-had-their-source-and-ate-him-too/feed/ 0 390302
Big Tech Companies Are Becoming More Powerful Than Nation-States https://www.radiofree.org/2023/04/25/big-tech-companies-are-becoming-more-powerful-than-nation-states/ https://www.radiofree.org/2023/04/25/big-tech-companies-are-becoming-more-powerful-than-nation-states/#respond Tue, 25 Apr 2023 12:50:06 +0000 https://www.commondreams.org/opinion/big-tech-companies-more-powerful-than-nations

A few years ago, I was having dinner with a friend who worked at Google. As we were discussing the ins and outs of the tech world, he casually remarked: "Google is going to take over the world you know." Driving home and reflecting on that remark I thought: "How curious." But now, as I contemplate the shambles our democracy has become, I'm more inclined to think: "How prescient."

Democracy is under threat—not just in the U.S. but in many other countries as well. But the precipitous actions of newly minted authoritarian leaders and the turmoil in Western democracies are just a few of the puzzle pieces needed to figure out how we got to this point. Another less discussed trend is that U.S. citizens are being subjected to a relentless onslaught from intrusive technologies that have become embedded in the everyday fabric of our lives, creating unprecedented levels of social and political upheaval.

Advanced computer technology and the internet have given us many wonderful gifts when rightly applied. But we now know they can also be terrible taskmasters, impersonal forces that can dehumanize our personal interactions, cause severe mental health problems (especially for teenage girls), and serve as a de-facto wealth transfer mechanism to the billionaire class. Still, we accept the negatives because of the positive benefits. In this sense we might even call hyper-technology a Grand Seduction. Now, AI has exploded onto the scene and threatens to monkey wrench our lives in unimaginable ways.

U.S. citizens are being subjected to a relentless onslaught from intrusive technologies that have become embedded in the everyday fabric of our lives, creating unprecedented levels of social and political upheaval.

The limitations of these widely used technologies are well known. They include social media and what Harvard professor Shoshanna Zuboff calls "surveillance capitalism"—the buying and selling of our personal info and even our DNA in the corporate marketplace. But powerful new ones are poised to create another wave of radical change. Under the mantle of the "Fourth Industrial Revolution," these include artificial intelligence or AI, the metaverse, the Internet of Things, the Internet of Bodies (in which our physical and health data is added into the mix to be processed by AI), and my personal favorite, police robots. All of these technologies will be enhanced and amplified by the use of 5G and 6G communications via a rapidly expanding satellite system provided by Elon Musk.

This is a two-pronged effort involving both powerful corporations and government initiatives. These tech-based systems are operating "below the radar" and rarely discussed in the mainstream media. In addition to corporate surveillance, governments are also busy beefing up their own systems. While we tend to associate these sorts of initiatives with the NSA and the Department of Homeland Security, a groundbreaking article in the Boston Globe has described how pervasive and intrusive surveillance has become even at the state level. The article methodically details how law enforcement agencies in Massachusetts operate a huge apparatus of drones, license plate readers, and devices called cell-site simulators, which pretend to be cell towers in order to capture cellphone signals to pinpoint the location of individuals.

The AI "Arms Race"

AI's precipitous and dramatic entry into the technology mix has ushered in what Time magazine and other mainstream publications are calling an "AI Arms Race." The designation is telling, given that AI has been developed with significant funding from the defense and government sectors. This accelerated deployment is happening without the benefit of thoughtful political oversight because elected officials, often at a disadvantage in the face of technologies they don't completely understand, are providing little guidance, regulation, or pushback.

Parsing the subtler impact of technology in our lives is tricky. That's because it sneaks up on us. It doesn't happen by a vote or by some distinct series of events. Rather, it just creeps along, establishing itself in maddeningly minute increments. The sum total of these technological intrusions, fostered by government and corporations often working together, constitutes a semi-invisible overlay of technocratic governance that has no central organizing principle, unlike the traditional government structures we're familiar with. Just because these systems are "distributed" (to use a little computer jargon) doesn't mean that they are any less powerful. And while the internet presents the appearance of democratized participation, it's important to remember that its ultimate Oz-like control is centralized in the deep corridors of Big Tech companies.

Goodbye Nation States?

As we see democratic principles slowly vaporize even in Western nations, the fact that Big Tech continues to consolidate its power globally over and above that of nation-states is deeply concerning. However (just to keep things nice and confusing) sometimes it does this in cooperation with governments via public/private partnerships, a kind of Faustian bargain.

The Time magazine article cited above offered this startling observation: "Even if computer scientists succeed in making sure the AIs don't wipe us out, their increasing centrality to the global economy could make the Big Tech companies who control it vastly more powerful. They could become not just the richest corporations in the world—charging whatever they want for commercial use of this critical infrastructure—but also geopolitical actors to rival nation-states."

The world's biggest tech companies are now richer and more powerful than most countries.

Some might argue that this has already happened and the nexus of world power is now corporate-leaning. The world's biggest tech companies are now richer and more powerful than most countries. According to an article in PC Week in 2021 discussing Apple's dominance: "By taking the current valuation of Apple, Microsoft, Amazon, and others, then comparing them to the GDP of countries on a map, we can see just how crazy things have become… Valued at $2.2 trillion, the Cupertino company is richer than 96% of the world. In fact, only seven countries currently outrank the maker of the iPhone financially."

For the moment, these trends appear to be unstoppable, given the levels of corporate investment already at stake and the supine posture and dependency of governments on their largesse. The best available response for the moment is simply greater public awareness and a commitment to face the contours of this brave new technocratic world head-on and with clear vision. Given the astonishingly out-of-control power of the Big Tech sector, it's also crucial to realize that simply regulating these systems while allowing them to continue to siphon off the power of traditional governments will not be enough to preserve our quality of life going forward.


This content originally appeared on Common Dreams and was authored by Tom Valovic.

]]> https://www.radiofree.org/2023/04/25/big-tech-companies-are-becoming-more-powerful-than-nation-states/feed/ 0 390233 New lessons about old wars: keeping the complex Anzac Day story relevant https://www.radiofree.org/2023/04/24/new-lessons-about-old-wars-keeping-the-complex-anzac-day-story-relevant/ https://www.radiofree.org/2023/04/24/new-lessons-about-old-wars-keeping-the-complex-anzac-day-story-relevant/#respond Mon, 24 Apr 2023 22:09:58 +0000 https://asiapacificreport.nz/?p=87444 ANALYSIS: By Katie Pickles, University of Canterbury

What happened on the Gallipoli peninsula in Turkey 108 years ago has shocked and shaped Aotearoa New Zealand ever since. The challenge in the 21st century, then, is how best to give contemporary relevance to such an epochal event.

The essence of the Anzac story is well known. As part of the first world war British Imperial Forces, the Australian and New Zealand Army Corps (Anzacs) landed at Gallipoli on April 25 1915. For eight months they endured the constant threat of death or maiming in terrible living conditions.

Ultimately, their occupation of that narrow and rugged piece of Turkish coast failed. The 30,000 Anzacs were evacuated after eight months. More than 2700 New Zealand and 8700 Australian soldiers died, with many more wounded.

The first anniversary of the landing was a day of mourning, with Anzac Day becoming a public holiday in 1922. A remembrance day of sorrow mixed with pride, it has grown over the years to include all those who served and died in later international conflicts.

Over time, various narratives and themes have emerged from that Gallipoli “origin story”: of Aotearoa New Zealand’s emergence as a nation, proving itself to Britain and Empire; of the brave, fit, loyal soldier-mates who emblemised the Kiwi spirit of egalitarianism, fairness and duty. All this mingled with the lasting shock and underlying anger at class hierarchy and the British leadership’s incompetence.

But historians know well that the “Anzac spirit” is a complex and ever-evolving idea. In 2023, what do we teach school-aged children about its meaning and significance? One way forward is to rethink those Anzac narratives and tropes in a more complex way.

Lone Pine cemetery
The cemetery at Lone Pine commemorates more than 4900 Anzac servicemen who died in the area. Image: Getty Images/The Conversation

Colonialism and class
The Anzac story is tied up in the nation’s history as part of the British Empire. The Anzac toll was just part of a staggering 46,000 “Britons” — including many from India and Ireland — who died at Gallipoli.

Some 86,000 Turks also died defending their peninsula. We need to teach about the Anzac sacrifice in the context of a global conflict where the magnitude of loss was horrific.

Importantly, Anzac themes are bound up in early forms of colonial nationalism: New Zealand proving itself to Britain and developing its own fighting mentality on battlefields far from home.

Part of this involves the notion of incompetent British commanders who let down the Anzac troops — but this is part of a bigger story.

Focusing on imperial and class hierarchies of the time can place what happened in that broader context. The legendary story of Chunuck Bair, taken on August 8 by Colonel William Malone’s Wellington Regiment, but where most of the soldiers were killed when they were not relieved in time, is particularly evocative.

The New Zealand Wars memorial in New Plymouth
The New Zealand Wars memorial in New Plymouth . . . our other “great war”. Image: CC BY-SA/The Conversation

Māori and the imperial project
From our vantage point in the present, of course, we cannot ignore the Māori experience of war and colonialism. As the historian Vincent O’Malley has suggested, New Zealand’s “great war” of nation-making was actually Ngā pakanga o Aotearoa — the New Zealand Wars.

It’s time to teach the complexity of this past and the multiple perspectives on it. For example, Waikato leader Te Puea Hērangi led opposition to World War I conscription and spoke against Māori participation on the side of a power that had only recently invaded her people’s land.

Conversely, Māori seeking inclusion in the settler nation did participate. On July 3, 1915, the 1st Māori Contingent landed at Anzac Cove. Te Rangi Hiroa (Sir Peter Buck) (Ngāti Mutunga) was to say:

Our feet were set on a distant land where our blood was to be shed in the cause of the Empire to which we belonged.

These words echo the familiar Anzac trope of the New Zealand nation being born at Gallipoli. Such sentiments led to postwar pilgrimages to retrace the steps of ancestors and claim the site as part of an Anzac heritage — a corner of New Zealand even.

For many young New Zealanders it has become a rite of passage, part of the big OE. That a visit to Anzac Cove is still more popular than visiting the sites of Ngā pakanga o Aotearoa is something our teaching can investigate.

Mateship and conformity
The notion of the Anzac soldier as courageous and beyond reproach, willing to make the ultimate sacrifice for nation and empire, is also overdue for revision. The “glue” of mateship — a potent combination of masculine bravery and strength with extreme loyalty to fellow soldiers — is again a contested narrative.

By the 1970s, as historian Rowan Light’s work shows, there was a significant challenge to such perceptions from the counterculture, peace protesters and feminists. And by the 1980s, veterans were sharing their stories more candidly with writer Maurice Shadbolt and war historian Chris Pugsley.

Teaching about the meaning of mateship might examine the history of those peer-pressured into participating in war, those who were conscripted and had no choice, and more on the fate of conscientious objectors like Archibald Baxter. At its worst, the idea of mateship was window dressing for uniformity and parochialism.

New Zealanders today have complex multicultural and global roots. We have ancestors who were co-opted to fight on different sides in 20th-century wars, including those who fought anti-colonial wars in India, Ireland and Samoa.

Some came here as refugees escaping conflict. Jingoism and what it really represents deserves critical analysis.

Poppies and peace
The ubiquitous poppy, an icon much reproduced in classrooms, is also ripe for contextualisation and debate over its meaning. In the age of global environmental crisis, it can be seen as more than a symbol of sacrifice immortalised in verse and iconography.

The poppy also reminds us of the landscapes devastated by the machinery of war that killed and maimed people, plants and animals. It contains within it myriad lessons about the threats science and technology can pose to a vulnerable planet.

Anzac Day rose from the shock, loss and grief felt by those on the home front. And beyond the familiar tropes of nationalism, mateship and egalitarianism, this remains its overriding mood.

Remembering and learning about the terrible physical and mental cost of war is the real point of those familiar phrases “lest we forget” and “never again”. That spirit of humanitarianism chimes with Aotearoa New Zealand’s modern role and evolving self-image as a peacekeeping, nuclear-free nation.

Anzac Day also speaks to the need for global peace and arbitration, and how war is no viable solution to conflict. Those are surely lessons worth teaching.

Dr Katie Pickles is professor of history, University of Canterbury. This article is republished from The Conversation under a Creative Commons licence. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/04/24/new-lessons-about-old-wars-keeping-the-complex-anzac-day-story-relevant/feed/ 0 390047
It’s safe to fill your fuel tank to the max in summer, viral Indian Oil notice is fake https://www.radiofree.org/2023/04/24/its-safe-to-fill-your-fuel-tank-to-the-max-in-summer-viral-indian-oil-notice-is-fake/ https://www.radiofree.org/2023/04/24/its-safe-to-fill-your-fuel-tank-to-the-max-in-summer-viral-indian-oil-notice-is-fake/#respond Mon, 24 Apr 2023 15:28:09 +0000 https://www.altnews.in/?p=154162 A public interest announcement apparently made by the Indian Oil Corporation is viral in different languages on various social media platforms. The said announcement warns vehicle owners and users not...

The post It’s safe to fill your fuel tank to the max in summer, viral Indian Oil notice is fake appeared first on Alt News.

]]>
A public interest announcement apparently made by the Indian Oil Corporation is viral in different languages on various social media platforms. The said announcement warns vehicle owners and users not to fill the fuel tanks of their cars to the maximum limit since the temperature might increase in the coming days and a full tank poses a risk of explosion.

Many social media users have shared this apparent public interest notice on WhatsApp, Twitter, Facebook, etc., in order to make others aware of the above message and are thanking Indian Oil for sharing the same. Below is an example of a Facebook post made by a user in Bengali which has been shared 123 times. (Archive)

It says, “INDIAN OIL WARNS: The temperature is set to rise in the coming days, so do not fill petrol in your vehicle to the maximum limit. This can cause an explosion in the fuel tank. Please fill half the tank of fuel in your vehicle and keep room for air. This week five explosions have been caused due to filling of maximum petrol. Please open the petrol tank once a day and let the gas build up inside come out. Note: Send this message to your family members and everyone else, so that people can avoid this accident. Thank you”

A Twitter user shared the said circular with a caption in Hindi which says, “This warning has been issued by Indian Oil. Friends do take note of it.” (Archive)

Sanjay Warkad, whose Twitter bio says that he is the “deputy editor of News Nation”, and has over 4,000 followers on Twitter, shared the same apparent notice thanking Indian Oil for the information in 2022. Vinod B Belkunde, whose Twitter bio says, “assistant manager of Sakal Media Group”, retweeted it. (Archive)

Similar posts have been made by multiple other social media users.

Click to view slideshow.

This is not the first time this claim has gone viral. It has been making rounds on social media for several years during the summer months. Last year, many social media users shared this post, including actress and politician Urmila Matondkar. (Archive)

Fact Check

A simple keyword search revealed that the Indian Oil Corporation (IOCL) had taken to Twitter on Thursday, April 19, sharing a statement which refuted the claims. It assured the common people that it was perfectly safe to fill fuel tanks up to the maximum limit, irrespective of the season. (Archive)

The company made the same announcement in a Facebook post on the same day.

Therefore, the claims made in the viral social media post are false.

We also noted that some of the posts shared as a notice from Indian Oil didn’t have the company’s logo. On a closer look at the others which had the logo, we noticed that it was markedly different from the company’s corporate logo as shared on their official website.

The below comparison of the logos shows that in some of the viral posts, the text within the logo where ‘Indian Oil’ is written in Hindi has been mis-spelt and in some others, the font, formatting and presentation of the text within the logo are different from the official logo.

In the original logo, the text within (‘Indian Oil’ in Devanagari script) is bold and there are no brackets.

Click to view slideshow.

In the viral post in Bengali, the name of the company on the logo has been translated to Bengali. However, the company does not change its logo depending on the language of the notice/announcement. Below is an original announcement from Indian Oil which has been made in both Hindi and English and the logo used is the same.

We also noted that the company had clarified the same last year as well. Urmila Matondkar, too, had shared that the post was fake and tweeted Indian Oil’s official statement which refuted the viral post.

Hence it is clear that viral notices are not authentic.

To understand if the cause of concern expressed in the posts is valid, we reached out to automotive industry professional Phani Madan, who deals with car safety matters. He told Alt News, “Car and motorcycle fuel tanks are very safe. Other than the external heat, the automobile also gets heated up internally but that doesn’t lead to any kind of ignition.”

To sum up, the viral notice cautioning people against filling up fuel tanks to the maximum level during summer is not from Indian Oil. It is fake. Filling up car fuel tanks to the maximum limit is safe in every season, Indian Oil and an industry expert Alt News spoke to confirmed

In 2019, Alt news had received requests on its WhatsApp helpline for a verification of the said notice. The fact check we had done then can be read here.

Oishani Bhattacharya is an intern at Alt News.

The post It’s safe to fill your fuel tank to the max in summer, viral Indian Oil notice is fake appeared first on Alt News.


This content originally appeared on Alt News and was authored by Oishani Bhattacharya.

]]>
https://www.radiofree.org/2023/04/24/its-safe-to-fill-your-fuel-tank-to-the-max-in-summer-viral-indian-oil-notice-is-fake/feed/ 0 389965
K650m PNG hydropower project opens after 15 years – end to blackouts? https://www.radiofree.org/2023/04/24/k650m-png-hydropower-project-opens-after-15-years-end-to-blackouts/ https://www.radiofree.org/2023/04/24/k650m-png-hydropower-project-opens-after-15-years-end-to-blackouts/#respond Mon, 24 Apr 2023 10:37:00 +0000 https://asiapacificreport.nz/?p=87434 By Maxine Kamus in Port Moresby

Port Moresby’s power blackouts may now be over.

After 15 years, Papua New Guinea’s national government and its Chinese partner, PNG Hydro Development Ltd, formally launched the Edevu Hydropower Project located along the Brown River area outside Port Moresby.

PNG Hydro has invested K650 million (NZ$302 million) in the project which is one of Central Province’s biggest assets that will supply electricity not only to Port Moresby but the whole Southern region in the near future.

The government has partnered with the developer with K120 million (NZ$56 million) for a 132KV transmission line from Edevu to Port Moresby which is already under construction, on top of the K650 million spent by the company.

PNG Hydro Development Ltd managing director Allan Guo said it took them almost 15 years to reach the launch of the project and this was possible through the good relationship and discussions they had with the landowners of Edevu.

He said it was a private investment without any guarantee from the government because they believed that their investment would greatly have an impact on the lives of the people and country as a whole.

Prime Minister James Marape (pictured in inset above) thanked the developer for having trust in PNG and privately funding the project.

‘Wonderful reflection’
Marape said it was a “wonderful reflection of an investor”, who saw this opportunity thousands of kilometres away, and had faith in PNG.

He said what Edevu landowners had done, by going into partnership with a foreign investor, was a good example for traditional landowners in the rest of the country.

“You have shown a wonderful example to other landowners right across our country.

“You [landowners] own 97 percent of land rights. My government, as governments of past, and any government into the future, will not break that right you have. It is your inherent, God-given right to your land.

“But land sitting idle is of no use to us, or more importantly, our children and their children that will come into the future,” Marape said.

The Sirinumu Dam and its Rouna 1, 2 and 3 stations are the main suppliers of electricity to Port Moresby and surrounding areas.

However, years of neglect and usage has led to much of the equipment becoming worn out, resulting in constant blackouts in Port Moresby.

Also a growing population places a huge demand on power uses which results in overloading.

The PNG Power Limited has also raised concern in the past about illegal power connections.

Maxine Kamus is a PNG Post-Courier Reporter. Republished with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/04/24/k650m-png-hydropower-project-opens-after-15-years-end-to-blackouts/feed/ 0 389920
The ‘Ike Dike’ is the Army Corps of Engineers’ largest project ever. It may not be big enough. https://grist.org/extreme-weather/houston-ike-dike-army-corps-flooding/ https://grist.org/extreme-weather/houston-ike-dike-army-corps-flooding/#respond Mon, 24 Apr 2023 10:30:00 +0000 https://grist.org/?p=608146 In September 2008, Hurricane Ike made landfall near Galveston, Texas, as a Category 4 storm with around 20 feet of storm surge. Even though the hurricane caused more than $7 billion in damage, it soon became clear that the disaster could have been much worse: if the storm surge had struck the coast at a different angle, water might have funneled up the Houston ship channel and inundated the city’s all-important petrochemical hub, not to mention thousands of homes.

In the aftermath of the storm, Texas officials searched for a way to protect Houston from similar events in the future, and they soon settled on an ambitious project that came to be known as the “Ike Dike” — a chain of sea walls and artificial dunes along the 50-mile-length of Galveston Bay, anchored by a 2-mile-wide concrete gate system at the mouth of the ship channel. The gate would stay open during calm weather to allow ships to enter and exit the channel, but would close during hurricanes, shielding the city and its oil infrastructure from flood events.

The Ike Dike has since become synonymous with hurricane resilience in Houston: Local officials have spent a decade lobbying for the project, and now it’s closer than ever to becoming a reality. The U.S. Army Corps of Engineers, the nation’s chief builder of levees and flood walls, secured Congressional approval to move forward with the barrier last year. The $31 billion system is the largest project that the Corps has ever undertaken, with the gate system accounting for two-thirds of the cost. The agency says it will take around two decades to complete.

Despite the massive scale of the project, there’s one big problem: Experts say the Ike Dike won’t reliably protect Houston from major storms. The barriers may not actually be tall or strong enough to handle extreme storm surge especially as climate change makes the rapid intensification of hurricanes more likely. And even if the barrier does hold, it won’t do anything to stop the kind of urban flooding that occurred when Hurricane Harvey dropped 30 inches of rain on Houston in 2017. The Corps has long preferred to fight hurricanes with large coastal engineering projects, but such projects only protect against one type of flood risk.

Though the Ike Dike would be one of the largest hurricane defense systems anywhere in the world, the Corps’ own designs suggest it might not be able to handle storm surge from Category 4 and 5 hurricanes. The original Ike Dike concept was the brainchild of a professor at Texas A&M University, who proposed a series of 17-foot-high barriers that would ring the entirety of Galveston Bay, sealing it off from the Gulf of Mexico. Another group of experts at Rice University later proposed a complementary project that would line the interior of the bay with levees and artificial islands, providing a second layer of defense for downtown Houston.

The version that the Corps ultimately settled on is far less ambitious. Its dunes would only rise 14 feet high, lower than the peak storm surge during Hurricane Ike itself. The final design also leaves a hole on the western side of the bay where surge could enter uninhibited, and it doesn’t call for a second line of defense like Rice’s artificial island network; the agency considered both options but decided that they weren’t worth the money. 

A map of the "Ike Dike" storm surge barrier system proposed by the Army Corps of Engineers for Galveston Bay.
A map of the “Ike Dike” proposed by the Army Corps of Engineers, with a concrete barrier and surrounding dunes. U.S. Army Corps of Engineers

The reduced scale of the project means that bigger surge events could blow through the dunes or even overtop the central gates, pushing toward the city just as Hurricane Ike could have done. The Corps’ own analysis found that even with the project, the bay would still suffer an average of more than $1 billion in annual storm damage. And as sea levels rise, the barriers will grow less effective, ratcheting up the risk even more.

Experts say the agency likely downsized the Ike Dike to comply with a Reagan-era regulation designed to limit federal spending. The rule requires the agency to conduct a “benefit-cost analysis” for every project it undertakes, ensuring that the project will prevent more dollars in future damage than it costs to build. But the Corps can only consider “benefits” that occur in the first 50 years after a project is built, and it couldn’t justify paying for full protection against large storms. The gate system might protect against a major 500-year flood event, for instance, but the dune barriers alongside it will only provide protection against a much smaller 50-year flood event.

The agency’s cost-benefit constraints mean that the Ike Dike won’t do much to protect Houston itself, said Jim Blackburn, an environmental lawyer who teaches at Rice University. Coastal communities like Galveston will get a lot safer, but the existential risk to Houston will remain.

“There will be some benefits to the ship channel [and Houston], but it only really goes until a certain size of storms,” said Blackburn. “There’s a new reality for the future, and the Corps is not as able to respond to that type of evolving risk.” 

In response to queries from Grist, a spokesperson for the Army Corps of Engineers defended the Ike Dike project, saying it would reduce damage from medium-sized hurricanes by as much as 77 percent and prevent an average of $2 billion in damages each year, though “residual risk” will remain. 

“The investment [in the Ike Dike] pales in comparison to the hundreds of billions of dollars in devastation the Texas coastal communities would incur by a direct hit of one or more massive hurricanes,” the spokesperson said. “There is no other proposal which meets the federal government’s strict requirements, can be completed in the time frame proposed, [and] has Congressional approval.”

Even if the Ike Dike does become a reality, Houston is much farther behind on addressing flood risk that doesn’t come from the Galveston Bay. When storms pass over the Texas coast, the rain they drop drains out into the Gulf of Mexico. As it moves toward the ocean, this water flows right through Houston along serpentine waterways called bayous. These bayous run past tens of thousands of homes, some of them mere feet from the water. The largest of them, Buffalo Bayou, passes right through downtown.

The Corps itself is to blame for some of the flood risk on Buffalo Bayou. Back in the 1930s, the agency tried to control flooding on the waterway by building two dry reservoirs that can trap water during big storms, holding it back from the city’s downtown. But the agency didn’t carve out enough land to store the water from a mega-storm like Harvey, and developers later built several subdivisions on land that the Corps knew would flood. When these subdivisions filled up with water during Harvey, homeowners sued the agency for damages and won a settlement that could exceed $1 billion.

Even as it moves forward with the Ike Dike, the Corps is looking for a way to control this urban flooding as well, but it doesn’t have many good options. Its initial proposals to line Buffalo Bayou with concrete and build a third dry reservoir on the open prairie outside Houston fell apart amid concerns about environmental impacts. The agency’s other big idea, which has garnered some support from Houston-area flood officials, is to dig a giant stormwater tunnel between the flood-prone city and the Gulf of Mexico, funneling excess water underground before it can inundate urban Houston. But this project, too, faces significant challenges: The tunnel system would cost as much as $12 billion and would take more than a decade to build.

Residential neighborhoods near the Interstate 10 sit in floodwater in the wake of Hurricane Harvey.
Houston homes sit in floodwater in the wake of Hurricane Harvey. The Addicks and Barker Reservoirs both overflowed after the 2017 storm, flooding thousands of homes. Marcus Yam / Los Angeles Times via Getty Images

The Corps’s projects also neglect the along the city’s other bayous, most of which run through Black and Latino neighborhoods, according to Susan Chadwick, the director of Save Buffalo Bayou, a local environmental nonprofit. Chadwick argues that the agency should spend money on grasslands and green spaces that can soak up water across the city before it ends up in the bayous in the first place, rather than trying to control those waterways with engineered “gray infrastructure.”

“We believe in stopping storm water before it floods the streams,” said Chadwick. “We need to focus on slowing and holding water where it falls, and we need more individual and community efforts to stop and slow and spread out and soak in stormwater.” 

The Corps doesn’t tend to fund that kind of green infrastructure, Chadwick says and disadvantaged neighborhoods often lack the political clout to advocate for major federal infrastructure investments. Houston and surrounding Harris County have raised some money for local flood control projects, including through a 2018 bond issuance, but without federal dollars it will be hard for the city and county to keep up with the risk. (The Army Corps of Engineers did not respond to questions about its inland flooding projects before publication.)

Houston is not the only place where the agency has proposed to mitigate hurricane risk with ambitious engineering projects. Corps officials have pitched large sea wall structures to several other cities that are vulnerable to hurricanes and storm surge, including Norfolk, Virginia, and Charleston, South Carolina

In some cases, locals have spurned the agency’s projects for being too expensive or harmful to the environment. Officials in Miami, Florida, recently rejected the Corps’ plan for a wall that would have blocked ocean views, and environmentalist groups in New York torpedoed plans for a 5-mile gate structure that would have spanned the 10-mile bay between Long Island and the Jersey Shore. The Corps returned to New York last year with a $52 billion plan to build 12 smaller gates, but the same groups have rejected that plan as well, saying it still focuses too much on storm surge rather than on sea-level-rise and neighborhood flooding.

Texas has gone the opposite route, embracing the Corps’ focus on gray infrastructure. As Blackburn sees it, those projects will leave Houston a long way from solving its hurricane woes.

“Houston is an engineering town, and this is a big-time engineering solution,” he told Grist. “But I think what you see is an agency that’s working with concepts from the 1980s facing twenty-first-century flooding problems.”

This story was originally published by Grist with the headline The ‘Ike Dike’ is the Army Corps of Engineers’ largest project ever. It may not be big enough. on Apr 24, 2023.


This content originally appeared on Grist and was authored by Jake Bittle.

]]>
https://grist.org/extreme-weather/houston-ike-dike-army-corps-flooding/feed/ 0 389938
Young People Turn to Temples https://www.radiofree.org/2023/04/22/young-people-turn-to-temples/ https://www.radiofree.org/2023/04/22/young-people-turn-to-temples/#respond Sat, 22 Apr 2023 15:15:05 +0000 https://dissidentvoice.org/?p=139512 This week’s News on China in 2 minutes.

• Young people turn to temples
• Demand for AI workers
• New variety of rapeseed
• China to make bricks from lunar soil


This content originally appeared on Dissident Voice and was authored by Dongsheng News.

]]>
https://www.radiofree.org/2023/04/22/young-people-turn-to-temples/feed/ 0 389730
One of the biggest battery recycling plants in the US is up and running https://grist.org/solutions/one-of-the-biggest-battery-recycling-plants-in-the-us-is-up-and-running/ https://grist.org/solutions/one-of-the-biggest-battery-recycling-plants-in-the-us-is-up-and-running/#respond Sat, 22 Apr 2023 13:00:00 +0000 https://grist.org/?p=607626 This story was originally published by Canary Media and is reproduced with permission.

Getting rid of old batteries can be a hassle. But for recycling startup Ascend Elements, other people’s garbage is basically a gold mine, if not better.

The Massachusetts-based company opened a recycling plant in Covington, Georgia in late March that it says is the largest electric-vehicle battery recycling facility in North America. It can process 30,000 metric tons of input each year, breaking down old batteries and prepping the most valuable materials inside to be processed and turned into new batteries. That capacity equates to breaking down the battery packs from 70,000 electric vehicles annually, said Ascend CEO Mike O’Kronley. For context, Redwood Materials, another battery recycling startup, told us its Nevada facility is already processing 40,000 metric tons of input annually, equivalent to around 100,000 battery packs.

This is an early example of a nationwide movement to cost-effectively recycle and repurpose EV batteries as more and more drivers go electric. In previous decades, companies hadn’t invested much in lithium-ion recycling, but investment soared in the last few years to match the spiking demand for battery materials.

Recycling can deliver new battery materials without the expense and environmental impact of new mining. It is extremely hard to develop new mines in the U.S., but the federal government is lavishing funds on new battery recycling plants. The revamped EV tax credits also call for increasing shares of domestically sourced batteries and battery materials.

Those market and policy shifts made recycling sufficiently desirable that Ascend is paying other companies for their old batteries. At the moment, those deals are mostly with EV or battery makers that have high volumes to get rid of.

“Paying for these spent batteries keeps them from going into the landfill,” O’Kronley told Canary Media. ​“It’s better to get paid for it rather than throw them away.”

Ascend also accepts used consumer electronics from battery-collection programs, such as Call2Recycle.

That’s not to say there are enough old batteries coming in to fill the factory. Currently, 80 to 90 percent of what’s going into Ascend’s Covington facility is scrap materials from battery factories, including SK Battery America’s plant in Commerce, Georgia.

That relationship influenced Ascend’s choice of location: Covington sits in the emerging ​“Battery Belt,” a swath of new battery factories and electric-vehicle plants opening up across the Midwest and the Carolinas, Georgia, Tennessee and Kentucky (look for all the blue icons in this White House map of new industrial investments). Fellow battery-recycling startup Redwood Materials also chose South Carolina for a forthcoming $3.5 billion recycling facility.

“There will need to be a recycling plant within about an hour’s drive of every single one of those [new battery gigafactories],” O’Kronley said. ​“You don’t want to be [long-distance] shipping these very large, heavy EV batteries that are classified as Class 9 hazardous materials.”

As it stands, the nearby battery factories send their scrap down the road to Ascend for what’s called ​“pre-processing.” The scrap and used batteries go through mechanical shredding and sieving, which produces ​“black mass.” Ascend extracts lithium carbonate from the mass; the remaining mass contains materials such as graphite, nickel, cobalt and manganese.

Currently, Ascend sells most of these substances to the market; it also converts some black mass into cathode precursor and cathode active materials at its Massachusetts R&D center. But the company is building a second commercial-scale facility in Hopkinsville, Kentucky that will take the outputs from Covington and convert them into cathode precursor and cathode active material so that they’re ready to go into new battery manufacturing. That $1 billion plant received $480 million in grant funding from the Department of Energy as part of the Bipartisan Infrastructure Law’s investment in domestic supply for critical materials.

The Covington plant operates similarly to existing battery recycling plants; the Kentucky location will introduce a brand-new technique for efficiently extracting cathode materials from black mass, which Ascend has dubbed ​“hydro to cathode.”

“Those two facilities represent the investment that we are making in key infrastructure to recover these batteries, retain these critical elements in the United States and return them into the supply,” O’Kronley said.

But that’s just the start, because the surging popularity of EVs will produce far more worn-out batteries than the country’s recyclers can process. Ascend is already out raising money to build more plants, according to O’Kronley.

Other emerging recycling startups are at it too. Redwood Materials, founded by Tesla co-founder JB Straubel, won a $2 billion conditional loan from the DOE for a Nevada plant to make new batteries from recycled materials. Canada-based Li-Cycle received a $375 million conditional DOE loan for its own facility to process lithium carbonate from a network of recycling plants. Canary Media recently profiled Cirba Solutions’ efforts to expand a battery-recycling plant in Ohio.

All of these facilities tie into the Biden administration’s goal to make the U.S. more capable of supplying itself with the batteries that will be pivotal to electrifying transportation and decarbonizing the grid.

This story was originally published by Grist with the headline One of the biggest battery recycling plants in the US is up and running on Apr 22, 2023.


This content originally appeared on Grist and was authored by Julian Spector, Canary Media.

]]>
https://grist.org/solutions/one-of-the-biggest-battery-recycling-plants-in-the-us-is-up-and-running/feed/ 0 389695
AI Art Sites Censor Prompts About Abortion https://www.radiofree.org/2023/04/22/ai-art-sites-censor-prompts-about-abortion/ https://www.radiofree.org/2023/04/22/ai-art-sites-censor-prompts-about-abortion/#respond Sat, 22 Apr 2023 10:00:14 +0000 https://theintercept.com/?p=426190

Two of the hottest new artificial intelligence programs for people who aren’t tech savvy, DALL-E 2 and Midjourney, create stunning visual images using only written prompts. Everything, that is, that avoids certain language in the prompts — including words associated with women’s bodies, women’s health care, women’s rights, and abortion.

I discovered this recently when I prompted the platforms for “pills used in medication abortion.” I’d added the instruction “in the style of Matisse.” I expected to get colorful visuals to supplement my thinking and writing about right-wing efforts to outlaw the pills.

Neither site produced the images. Instead, DALL-E 2 returned the phrase, “It looks like this request may not follow our content policy.” Midjourney’s message said, “The word ‘abortion’ is banned. Circumventing this filter to violate our rules may result in your access being revoked.”

DLL-censorship-copy

DALL-E blocks the AI image generator prompt of “abortion pills.”

Photo: DALL-E

Julia Rockwell had a similar experience. A clinical data analyst in North Carolina, Rockwell has a friend who works as a cell biologist studying the placenta, the organ that develops during pregnancy to nourish the developing fetus. Rockwell asked Midjourney to generate a fun image of the placenta as a gift for her friend. Her prompt was banned.

She then found other banned words and sent her findings to MIT Technology Review. The publication reported that reproductive system-related medical terms, including “fallopian tubes,” “mammary glands,” “sperm,” “uterine,” “urethra,” “cervix,” “hymen,” and “vulva,” are banned on Midjourney, but words relating to general biology, such as “liver” and “kidney,” are allowed.

I’ve since found more banned prompt words. They include products to prevent pregnancy, such as “condom” and “IUD,” an intrauterine device, a birth control product for women. Additional devices are sexed. “Stethoscope” prompted on Midjourney produces gorgeous renderings of an antique instrument. But “speculum,” a basic tool that medical providers use to visualize female reproductive anatomy, is not allowed.

The AI developers devising this censorship are “just playing whack-a-mole” with the word prompts they’re prohibiting, said University of Washington AI researcher Bill Howe. They aren’t deliberately censoring information about female reproductive health. They know that AI mirrors our culture’s worst and most virulent biases, including sexism. They say they want to protect people from hurtful images that their programs scrape from the internet. So far, they haven’t been able to do that, because their efforts are hopelessly superficial: Instead of putting intensive resources into fixing the models that generate the offensive material, the AI firms attempted to cut out the bias through censoring the prompts.

During a time when women’s right to sexual equality and freedom is under increasing assault by the right, the AI bans could be making things worse.

During a time when women’s right to sexual equality and freedom is under increasing assault by the right, the AI bans could be making things worse.

Midjourney rationalizes bans by explaining that it limits its content to the Hollywood equivalent of PG-13. DALL-E 2 uses PG. The program’s user guide prohibits production of images that are “inherently disrespectful, aggressive, or otherwise abusive.” Also banned are “visually shocking or disturbing content, including adult content or gore,” or which “can be viewed as racist, homophobic, disturbing, or in some way derogatory to a community.” Midjourney also bans “nudity, sexual organs, fixation on naked breasts,” and other pornography-like content. DALL-E 2’s prohibitions are similar.

Many users complain about the restrictions. “Do they want a program for creative professionals or for kindergartners?” complained one DALL-E 2 user on Reddit. A Midjourney member was more political, noting that the bans make it “pretty hard to create images with feminist themes.”

Abortion-is-banned-MJ-copy

Midjourney explains that “abortion” is banned as a prompt for the AI image generator.

Photo: Debbie Nathan

Bias Feedback Loop

The issue of biases in AI-generated art popped up after the launch of DALL-E, the precursor program to DALL-E 2. Some users noticed signs of gender bias (and racial bias too). Prompting with the words “flight attendant” generated only women. “Builder” produced images solely of men. Wired reported that developmental tests with DALL-E 2’s data found that when a prompt was entered simply for a person, without specifying gender, resulting images were usually of white men. When the prompt added negative nouns and adjectives, such “a man sitting in a prison cell” or “a photo of an angry man,” resulting images almost invariably depicted men of color.

These problems stem from bias produced by algorithms using models containing massive amounts of potentially harmful data. DALL-E 2’s model, for instance, was trained on 12 billion parameters of text-image pairs scraped from the internet. As a mirror of the real world, the internet world contains torrents of sexist pornography that objectify and degrade people, especially women. As DALL-E itself admitted last year, its model and the images it produces have “the potential to harm individuals and groups by reinforcing stereotypes, erasing or denigrating them, providing them with disparately low quality performance, or by subjecting them to indignity.”

On the earlier iteration of DALL-E 2, OpenAI, the research lab that created the program, tried to filter the training data to excise prompts that trigger sexism. Howe, the University of Washington researcher, said in an interview with The Intercept that such filtering is ham-fisted and, in some cases, worsens the bias. For instance, the filtering ended up decreasing how often images of women were produced. OpenAI hypothesized that the decrease occurred because images of women put into the data system were more likely than those of men to look sexualized. By filtering out problematic images, women as a class of the population tended to be erased.

In the AI text-to-visual programs, written prompts are associated with female bodies can trigger sexist, even sadistically sexist, output. This should not surprise. Everyday human society in most of the world remains obstinately patriarchal. And when it comes to the web, as one researcher reports, large-scale evidence exists for “a masculine default in the language of the online English-speaking world.” Another study found that data on the internet is highly influenced by the economics of the male gaze, including its gaze upon objectified, sexualized images of women and upon violence.

DALL-E 2 has tried to solve the problem superficially, not by retraining its model at the front end to remove harmful imagery, but instead simply by filtering out written prompts that focus on women’s bodies and activities, including the act of obtaining an abortion, hence the roadblocks I came up against trying to produce images with abortion pills on the platform, as well as what happened with Midjourney, which employs similar filters.

“Lock Down the Prompts”

It’s easy to sneak past the filters by tweaking words in the prompts. That’s what Rockwell — the digital analyst who gave Midjourney a prompt including “placenta” — discovered. After unsuccessfully requesting an image for “gynecological exam,” she shifted to the British spelling: “gynaecological.” The images she received, later published in MIT Technology Review, were creepy, if not downright pornographic. They featured nudity and body injuries unrelated to medical treatment. The visuals I got by typing the same phrase were even worse than Rockwell’s. One showed a naked woman lying on an exam table, screaming, with a slash on her throat.

gynaecological-exam-MJ-copy

A search on Midjourney for “gynaecological exam” provided four AI generated images.

Photo: Debbie Nathan; Midjourney

Aylin Caliskan, a scholar at the University of Washington’s Information School, co-published a study late last year verifying statistically that AI models tend to sexualize women, particularly teenagers. So, avoiding the word “abortion,” I asked Midjourney to render a visual for the phrase “pregnancy termination in 16-year-old girl. Realistic.” I got back a chilling combination of photorealism and soft-porn horror flick. The image depicts a very young white woman with cleavage exposed and with a grotesquely discolored and swollen belly, from which two conjoined baby heads stare fixedly with four zombie eyes.

pg-16-yo

Midjourney AI’s return images for the prompt “pregnancy termination in 16-year-old girl. Realistic.”

Photo: Debbie Nathan; Midjourney

Howe, who is an associate professor at the Information School, was a member of Caliskan’s team for the study that inspired my experiment. He is also co-founder of the Responsible AI Systems and Experiences center. He speculated that the salacious visual of the girl’s breasts reflected the prevalence of pornography in Midjourney’s model, while the bizarre babies probably showed that the internet has such a relative paucity of positive or normalizing material regarding abortion that the program got confused and generated gibberish — albeit gibberish that, in the current political climate, could be construed as anti-abortion.

The larger issue, Howe added, is that the amount of data in AI models has exploded recently. The text and visuals they are generating now are so detailed that the models may appear to be thinking and working at levels approaching human abilities. Howe said, the models possess “no grounding, no understanding, no experience, no other sensor that reifies words with objects or experiences in the real world.” On their own, they are completely incapable of avoiding bias.

There are only three ways to correct the bias they generate, Howe said. One involves filtering the database while the model is being trained and before it is released to the public. “For example,” he said, “scour through the entire training set, determine for each image if it’s sexualized, and either ensure that sexualized male and female images are equal in number, or remove all of them.” Similar techniques can be used midway through the training, Howe said. Either way is expensive and time-consuming.

Instead, he said, the owners do the cheapest and quickest thing: “They lock down the prompts.” But, Howe notes, this produces “tons of false positives and tons of false negatives,” and “makes it basically impossible to have a scientific discussion about reproduction. This is wrong,” he said. “You need to do the right thing from the beginning.”

“And you need to be transparent,” Howe said. Companies including Microsoft’s OpenAI, which Elon Musk has financially backed, are lately “releasing one model after the other,” Howe noted. Echoing a recent article in Scientific American, he expressed concern about the secrecy with which the new models are being rolled out. “There’s not much science we can do on them because they don’t tell us how they work or what they were trained on.” He attributed the secrecy to competitive fears of having trade secrets copied and to the probability, as he put it, that they are “all using the same bag of tricks.” Howe said that DALL-E no longer talks publicly about its model. Midjourney’s developer and owner David Holz said recently the program never has and won’t.

“Nothing Is Perfect”

Midjourney is gendered as well as racialized. One person’s prompt for male participants at a protest generated serious looking, fully clothed white men. A prompt for a Black woman fighting for her reproductive rights returned someone with outsized hips, bared breasts, and an angry scowl.

People using Midjourney have also generated anti-abortion images from metaphors rather than direct references. Someone’s prompt last year created a plate with slices of toast and a sunny side up egg with an embryo floating in the yolk. It is labeled “Planned Parenthood Breakfast,” implying that people who work for the storied women’s reproductive health and abortion provider are cannibals. Midjourney’s current rules have no way of removing them from public view.

Midjourney has been using human beings to vet automated first passes of the output. When The Intercept asked Holz to comment on the problem of prompt words generating biased and harmful images, he said he was test-driving a new plan, to replace people with algorithms that he claims will be “much smarter and won’t rely on ‘banned words.’” He added, “Nothing is perfect.”

This offhand attitude is unacceptable, said Renee Bracey Sherman, the director of We Testify, a nonprofit that promotes storytelling by people who’ve had abortions and want to normalize the experience. Prompt bans have long existed for text on social media. She said that this year, on the 50th anniversary of Roe v. Wade, she tweeted information about “self-managed abortion” and saw her post flagged by Twitter as dangerous — which led to it hardly being retweeted. She has seen the same happen to postings by reputable public health experts discussing scientific information about abortion.

Bracey Sherman said she was not surprised by the sexist, racist “protest” image I found on Midjourney. “Social media cannot imagine what a pro-abortion or reproductive rights activity looks like, other than something pornographic,” she said. She worries that word bans on platforms like DALL-E 2 and Midjourney cut off marginalized groups, including poor people and women of color, from good information that they desperately need and which does remain in the data.

Policy does not exist yet for regulating AI, but it should, Howe said. “We figured out how to build a plane,” he said, but “do we trust companies to not kill a plane full of people? No. We put regulations in place.” A New York City law, slated to go into effect in July, bans using AI to make job hiring decisions unless the algorithm first passes a bias audit. Other locales are working on similar laws. Last year, the Federal Trade Commission sent a report to Congress expressing concern about bias, inaccuracy, and discrimination in AI. And the White House Office of Science and Technology Policy published its Blueprint for an AI Bill of Rights “to support the development of policies and practices that protect civil rights and promote democratic values in the building, deployment, and governance of automated systems.”

Howe said he is “somewhat optimistic” that civil society in the U.S. will develop AI oversight policy. “But will it be enough and in time?” he asked. “It’s just mind-blowing the speed at which these things are being released.”

“Why are they censoring something that is clearly under attack?”

Bracey Sherman excoriated the companies’ lack of concern for the quality of their models prior to release and their piecemeal response after the output interacts with consumers in an increasingly fraught world. “Why are they not paying attention to what’s going on?” she said of the AI companies. “They make something and then say, ‘Oh, we didn’t know!’”

Of abortion information that gets blocked by banned prompts, she asked, “Why are they censoring something that is clearly under attack?”


This content originally appeared on The Intercept and was authored by Debbie Nathan.

]]> https://www.radiofree.org/2023/04/22/ai-art-sites-censor-prompts-about-abortion/feed/ 0 389684 Libelled by the Bot: Reputation, Defamation, and AI https://www.radiofree.org/2023/04/20/libelled-by-the-bot-reputation-defamation-and-ai/ https://www.radiofree.org/2023/04/20/libelled-by-the-bot-reputation-defamation-and-ai/#respond Thu, 20 Apr 2023 13:30:57 +0000 https://dissidentvoice.org/?p=139447 Cometh the new platform, cometh new actions in law, the fragile litigant ever ready to dash off a writ to those with (preferably) deep pockets. And so, it transpires that artificial intelligence (AI) platforms, for all the genius behind their creation, are up for legal scrutiny and judicial redress. Certainly, some private citizens are getting rather ticked off about what such bots as ChatGPT are generating about them.

Some of this is indulgent, narcissistic craving – you deserve what you get if you plug your name into an AI generator, hoping for sweet things to be said about you. Things get even comical when the search platform is itself riddled with inaccuracies.

One recent example stirring interest in the Digital Kingdom is a threatened legal suit against the OpenAI chatbot. Brian Hood, Mayor of Hepburn Shire Council in the Australian state of Victoria, was alerted to inaccurate accusations about bribery regarding a case that took place between 1999 and 2004. It involved Note Printing Australia, an entity of the Reserve Bank of Australia. Hood had worked at Note Printing Australia and blew the whistle on bribes being made to foreign authorities. He was never charged with the crime itself. However, answers generated by ChatGPT suggested otherwise, including the claim that Hood was found guilty of the said bribery allegations.

In a statement provided to Ars Technica by Gordon Legal, the firm representing Hood, more details are given. Among “several false statements” returned by the AI bot are claims that Hood “was accused of bribing officials in Malaysia, Indonesia, and Vietnam between 1999 and 2005, that he was sentenced to 30 months in prison after pleading guilty to two counts of false accounting under the Corporations Act in 2012, and that he authorised payments to a Malaysian arms dealer acting as a middleman to secure a contract with the Malaysian Government.”

James Naughton, a partner at Gordon Legal, is representing Hood. “He’s an elected official, his reputation is central to his role,” stated the lawyer. “It would potentially be a landmark moment in the sense that it’s applying this defamation law to a new area of artificial intelligence and publication in the IT space.”

In March, Hood’s legal representatives wrote a letter of concern to OpenAI, demanding that they amend the outlined errors within 28 days, threatening a defamation action against the company in the event they refused to do so.

The question here is whether ChatGPT’s supposedly defamatory imputations might fall within the realm of liability. The bot’s functionality on generating facts is currently sketchy, and any user should be familiar with that fact. That said, opinions on the subject of reputational liability remain mixed.

Lawrence Tribe of Harvard Law School does not regard the notion as outlandish. “It matters not, for purposes of legal liability, whether the alleged lies about you or someone else were generated by a human being or by a chatbot, by a genuine intelligence or by a machine algorithm.”

Robert Post of the Yale Law School looks at the matter from the perspective of the communication itself. Defamation would not take place at the point the information is generated by the bot. It would only happen if that (mis)information was communicated or disseminated by the user. “A ‘publication’ happens only when a defendant communicates the defamatory statement to a third party.”

Not so, claims RonNell Andersen Jones of the University of Utah. “If defamatory falsehood is generated by an AI chatbot itself, it is harder to conceptualise this within our defamation law framework, which presupposes an entity with a state of mind on the other end of the communication.”

In terms of defaming a public figure, “actual malice” would have to be shown – something distinctly at odds in the ChatGPT context. Jones points us in a possibly different direction: that the function, or otherwise, of such a system could be seen through the prism of product liability.

Those based in the US might resort to Section 230 of the Communications Decency Act, that most remarkable of provisions that provides internet service providers immunity from legal suits regarding content published by third parties on the site. The appeal of the section is evident by how many attacks have been made against it, be it from campaigning liberal celebrities with bruised reputations or Donald Trump himself.

But the original drafters of the law, Oregon Democratic Senator Ron Wyden, and former Rep. Chris Cox, a California Republican, are of the view that chatbot creators would not be able to avail themselves of the protection. “To be entitled to immunity,” Cox suggested to The Washington Post, “a provider of an interactive computer service must not have contributed to the creation or development of the content at issue.”

When Ars Technica attempted to replicate the various mistakes supposedly generated by ChatGPT, they came up short. Ditto the BBC. This might suggest that the generated errors have been corrected. But over the next few weeks, if not months, expect a number of thick, all-covering disclaimers to ensure that AI bots such as ChatGPT are not subject to liability.

As a matter of fact, ChatGPT already has one: “Given the probabilistic nature of machine learning, use of our Services may in some situations result in incorrect Output that does not accurately reflect real people, places, or facts. You should evaluate the accuracy of any Output as appropriate for your use case, including by using human review of the Output.” Whether this satisfies technologically illiterate courts remains to be seen.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2023/04/20/libelled-by-the-bot-reputation-defamation-and-ai/feed/ 0 389163
How do you tackle microplastics? Start with your washing machine. https://grist.org/technology/how-do-you-tackle-microplastics-start-with-your-washing-machine/ https://grist.org/technology/how-do-you-tackle-microplastics-start-with-your-washing-machine/#respond Wed, 19 Apr 2023 10:45:00 +0000 https://grist.org/?p=607757 As environmental challenges go, microfiber pollution has come from practically out of nowhere. It was only a decade or so ago that scientists first suspected our clothing, increasingly made of synthetic materials like polyester and nylon, might be major contributors to the global plastic problem.

Today a growing body of science suggests the tiny strands that slough off clothes are everywhere and in everything. By one estimate, they account for as much as one-third of all microplastics released to the ocean. They’ve been found on Mount Everest and in the Mariana Trench, along with tap water, plankton, shrimp guts, and our poo.

Research has yet to establish just what this means for human and planetary health. But the emerging science has left some governments, particularly in the Global North, scrambling to respond. Their first target: the humble washing machine, which environmentalists say represents a major way microfiber pollution reaches the environment.

Late last month a California State Assembly committee held a hearing on Assembly Bill 1628, which would require new washing machines to include devices that trap particles down to 100 micrometers — roughly the width of human hair — by 2029. The Golden State isn’t alone here, or even first. France already approved such a requirement, effective 2025. Lawmakers in Oregon and Ontario, Canada have considered similar bills. The European Commission says it’ll do the same in 2025.

Environmental groups, earth scientists and some outdoor apparel companies cheer the policies as an important first response to a massive problem. But quietly, some sustainability experts feel perplexed by all the focus on washers. They doubt filters will achieve much, and say what’s really needed is a comprehensive shift in how we make, clean and dispose of clothes.

The wash is “only one shedding point in the lifecycle of the garment. To focus on that tiny, tiny moment of laundry is completely nuts,” said Richard Blackburn, a professor of sustainable materials at the University of Leeds. “It would be much better to focus on the whole life cycle of the garment, of which the manufacturing stage is much more significant in terms of loss than laundering, but all points should be considered.”

Today, some 60 percent of all textiles incorporate synthetic material. Anyone who’s worn yoga pants, workout gear or stretchy jeans knows the benefits: These materials add softness, wicking and flexibility. Under a microscope, though, they look a lot like plain old plastic. From the moment they’re made, synthetic clothes — like all clothes — release tiny shreds of themselves. Once liberated these fibers are no easier to retrieve than glitter tossed into the wind. But their size, shape, and tendency to absorb chemicals leaves scientists concerned about their impacts on habitats and the food chain.

Anja Brandon is an associate director for U.S. plastics policy at the Ocean Conservancy who has supported the California and Oregon bills. She concedes that filters won’t fix the problem, but believes they offer a way to get started. She also supports clothing innovations but said they could be years away. “I for one don’t want to wait until it’s a five-alarm fire,” she said.

Studies suggest a typical load of laundry can release thousands or even millions of fibers. Commercially available filters, like the PlanetCare, Lint LUV-R and Filtrol, strain the gray water through ultra-fine mesh before flushing it into the world. It’s the owner’s job, of course, to periodically empty that filter — ideally into a trash bag, which Brandon said will secure microfibers better than the status quo of letting them loose into nature.

Washing machine microfiber filter
Washing machine filters containing microfibers. Owen Humphreys/PA Images via Getty Images

Washing machine manufacturers in the U.S. and Europe have pushed back, saying the devices pose technical risks, like flooding and increased energy consumption, that must be addressed  first. University experiments with these filters, including an oft-cited 2019 study by the University of Toronto and the Ocean Conservancy, haven’t found these issues, but it’s not a closed case yet: Last year a federal report on microfibers, led by the Environmental Protection Agency and National Oceanic and Atmospheric Administration, called for more research in this vein.

Manufacturers also argue that microfibers originate in a lot of places, but washers are a relatively modest one. As self-serving as that sounds, people who study the issue agree there’s a huge hole in the available science: While we know clothes shed microfibers throughout their lives, we know surprisingly little about when most of it happens.

Some evidence suggests that the friction of simply wearing clothes might release about as many microfibers as washing them. Then there are dryers, which some suspect are a major source of microfiber litter but have been barely studied, according to the federal report. There is also limited knowledge about how much microfiber pollution comes from the developing world, where most people wash by hand. (A recent study led by Hangzhou Dianzi University in Hangzhou, China pointed to this knowledge gap – and found that hand-washing two synthetic fabrics released on average 80 to 90 percent fewer microfiber pollution than machine-washing.)

To Blackburn, it’s obvious that most releases occur in textile mills, where it’s been known for centuries that spinning, weaving, dyeing and finishing fabric spritzes lots of fiber. “Where do you think it goes when we get it out of the factory?” he said. “It goes into the open air.”

He calls filter policies “totally reactionary,” arguing that they would at best shave a few percentage points off the total microfiber problem. But there is one area where Blackburn is in broad agreement with environmentalists: In the long run, tackling the issue will take a lot of new technology. No silver-bullet solution has appeared yet, but a slew of recent announcements reveals a vibrant scene of research and development attacking the problem from many angles.

Antonio Hugo Photo

Some best practices already are known within the industry. For example, more tightly woven clothes, and clothes made of long fibers rather than short ones, fray less. But for years, popular brands like Patagonia and REI have said what they really need is a way to experiment with many different materials and compare their shedding head to head. This has been tricky: Microfibers are, well, micro, and there’s no industry standard on how to measure them.

That might be changing. In separate announcements in February, Hohenstein, a company that develops international standards for textiles, and activewear brand Under Armour revealed new methods in this vein. Under Armour is targeting 75 percent “low-shed” fabrics in its products by 2030.

These approaches would at best reduce microfiber emissions, not eliminate them. So another field of research is what Blackburn calls “biocompatibility”: making microfibers less harmful to nature. California-based companyIntrinsic Advanced Materials sells a pre-treatment, added to fabrics during manufacturing, that it claims helps polyester and nylon biodegrade in seawater within years rather than decades. Blackburn’s own startup, Keracol, develops natural dyes, pulled from things like fruit waste, that break down more easily in nature than synthetic ones.

New ideas to dispose of clothes are also emerging, though some will cause arched eyebrows among environmentalists. This year U.S. chemical giant Eastman will start building a facility in Normandy, France that it claims “unzips” hard-to-recycle plastics, like polyester clothes, into molecular precursors that can be fashioned into new products like clothes and insulation. Critics charge that such “chemical recycling” techniques are not only of dubious benefit to the environment, they’re really just a smokescreen for fossil-fuel corporations trying to keep their product in demand.

Lest anyone forget about washing machines, there’s R&D going after them, too. In January Patagonia and appliance giant Samsung announced a model that they claim cuts micro plastic emissions up to 54%. It’s already rolled out in Europe and Korea. At around the same time, University of Toronto researchers published research on a coating that, they claim, makes nylon fabric more slippery in the wash, reducing friction and thus microfiber emissions by 90 percent after nine washes. In a press release the researchers tut-tutted governments for their focus on washing-machine filters, which they called a “Band-Aid” for the issue.

One continuous thread through all these efforts, of course, is that everyone is working with imperfect information. The emerging science on microfibers – and microplastics in general – suggests they’re a gritty fact of modern life, but doesn’t yet show the magnitude of their harm to humans and other species. For the moment environmentalists, policymakers and manufacturers aren’t just debating whether to put filters on washing machines, but whether we know enough to act. In 20 years, when scientists know a lot more, it’ll be easier to judge whether today’s policies represented proactive leadership on an emerging environmental problem — or a soggy Band-Aid.

Editor’s note: Patagonia is an advertiser with Grist. Advertisers have no role in Grist’s editorial decisions.

This story was originally published by Grist with the headline How do you tackle microplastics? Start with your washing machine. on Apr 19, 2023.


This content originally appeared on Grist and was authored by Saqib Rahim.

]]>
https://grist.org/technology/how-do-you-tackle-microplastics-start-with-your-washing-machine/feed/ 0 388801
Experts Demand ‘Pause’ on Spread of Artificial Intelligence Until Regulations Imposed https://www.radiofree.org/2023/04/18/experts-demand-pause-on-spread-of-artificial-intelligence-until-regulations-imposed/ https://www.radiofree.org/2023/04/18/experts-demand-pause-on-spread-of-artificial-intelligence-until-regulations-imposed/#respond Tue, 18 Apr 2023 21:26:07 +0000 https://www.commondreams.org/news/dangers-of-unregulated-artificial-intelligence

"Until meaningful government safeguards are in place to protect the public from the harms of generative AI, we need a pause."

So says a report on the dangers of artificial intelligence (AI) published Tuesday by Public Citizen. Titled Sorry in Advance! Rapid Rush to Deploy Generative AI Risks a Wide Array of Automated Harms, the analysis by researchers Rick Claypool and Cheyenne Hunt aims to "reframe the conversation around generative AI to ensure that the public and policymakers have a say in how these new technologies might upend our lives."

Following the November release of OpenAI's ChatGPT, generative AI tools have been receiving "a huge amount of buzz—especially among the Big Tech corporations best positioned to profit from them," the report notes. "The most enthusiastic boosters say AI will change the world in ways that make everyone rich—and some detractors say it could kill us all. Separate from frightening threats that may materialize as the technology evolves are real-world harms the rush to release and monetize these tools can cause—and, in many cases, is already causing."

Claypool and Hunt categorized these harms into "five broad areas of concern":

  • Damaging Democracy: Misinformation-spreading spambots aren't new, but generative AI tools easily allow bad actors to mass produce deceptive political content. Increasingly powerful audio and video production AI tools are making authentic content harder to distinguish [from] synthetic content.
  • Consumer Concerns: Businesses trying to maximize profits using generative AI are using these tools to gobble up user data, manipulate consumers, and concentrate advantages among the biggest corporations. Scammers are using them to engage in increasingly sophisticated rip-off schemes.
  • Worsening Inequality: Generative AI tools risk perpetuating and exacerbating systemic biases such [as] racism [and] sexism. They give bullies and abusers new ways to harm victims, and, if their widespread deployment proves consequential, risk significantly accelerating economic inequality.
  • Undermining Worker Rights: Companies developing AI tools use texts and images created by humans to train their models—and employ low-wage workers abroad to help filter out disturbing and offensive content. Automating media creation, as some AI does, risks deskilling and replacing media production work performed by humans.
  • Environmental Concerns: Training and maintaining generative AI tools requires significant expansions in computing power—expansions in computing power that are increasing faster than technology developers' ability to absorb the demands with efficiency advances. Mass deployment is expected to require that some of the biggest tech companies increase their computing power—and, thus, their carbon footprints—by four or five times.

In a statement, Public Citizen warned that "businesses are deploying potentially dangerous AI tools faster than their harms can be understood or mitigated."

"History offers no reason to believe that corporations can self-regulate away the known risks—especially since many of these risks are as much a part of generative AI as they are of corporate greed," the statement continues. "Businesses rushing to introduce these new technologies are gambling with peoples' lives and livelihoods, and arguably with the very foundations of a free society and livable world."

On Thursday, April 27, Public Citizen is hosting a hybrid in-person/Zoom conference in Washington, D.C., during which U.S. Rep. Ted Lieu (D-Calif.) and 10 other panelists will discuss the threats posed by AI and how to rein in the rapidly growing yet virtually unregulated industry. People interested in participating must register by this Friday.

"Businesses rushing to introduce these new technologies are gambling with peoples' lives and livelihoods, and arguably with the very foundations of a free society and livable world."

Demands to regulate AI are mounting. Last month, Geoffrey Hinton, considered the "godfather of artificial intelligence," compared the quickly advancing technology's potential impacts to "the Industrial Revolution, or electricity, or maybe the wheel."

Asked by CBS News' Brook Silva-Braga about the possibility of the technology "wiping out humanity," Hinton warned that "it's not inconceivable."

That frightening potential doesn't necessarily lie with existing AI tools such as ChatGPT, but rather with what is called "artificial general intelligence" (AGI), through which computers develop and act on their own ideas.

"Until quite recently, I thought it was going to be like 20 to 50 years before we have general-purpose AI," Hinton told CBS News. "Now I think it may be 20 years or less." Eventually, Hinton admitted that he wouldn't rule out the possibility of AGI arriving within five years—a major departure from a few years ago when he "would have said, 'No way.'"

"We have to think hard about how to control that," said Hinton. Asked by Silva-Braga if that's possible, Hinton said, "We don't know, we haven't been there yet, but we can try."

The AI pioneer is far from alone. In February, OpenAI CEO Sam Altman wrote in a company blog post: "The risks could be extraordinary. A misaligned superintelligent AGI could cause grievous harm to the world."

More than 26,000 people have signed a recently published open letter that calls for a six-month moratorium on training AI systems beyond the level of OpenAI's latest chatbot, GPT-4, although Altman is not among them.

"Powerful AI systems should be developed only once we are confident that their effects will be positive and their risks will be manageable," says the letter.

While AGI may still be a few years away, Public Citizen's new report makes clear that existing AI tools—including chatbots spewing lies, face-swapping apps generating fake videos, and cloned voices committing fraud—are already causing or threatening to cause serious harm, including intensifying inequality, undermining democracy, displacing workers, preying on consumers, and exacerbating the climate crisis.

These threats "are all very real and highly likely to occur if corporations are permitted to deploy generative AI without enforceable guardrails," Claypool and Hunt wrote. "But there is nothing inevitable about them."

They continued:

Government regulation can block companies from deploying the technologies too quickly (or block them altogether if they prove unsafe). It can set standards to protect people from the risks. It can impose duties on companies using generative AI to avoid identifiable harms, respect the interests of communities and creators, pretest their technologies, take responsibility, and accept liability if things go wrong. It can demand equity be built into the technologies. It can insist that if generative AI does, in fact, increase productivity and displace workers, or that the economic benefits be shared with those harmed and not be concentrated among a small circle of companies, executives, and investors.

Amid "growing regulatory interest" in an AI "accountability mechanism," the Biden administration announced last week that it is seeking public input on measures that could be implemented to ensure that "AI systems are legal, effective, ethical, safe, and otherwise trustworthy."

According toAxios, Senate Majority Leader Chuck Schumer (D-N.Y.) is "taking early steps toward legislation to regulate artificial intelligence technology."

In the words of Claypool and Hunt: "We need strong safeguards and government regulation—and we need them in place before corporations disseminate AI technology widely. Until then, we need a pause."


This content originally appeared on Common Dreams and was authored by Kenny Stancil.

]]> https://www.radiofree.org/2023/04/18/experts-demand-pause-on-spread-of-artificial-intelligence-until-regulations-imposed/feed/ 0 388638 Massive transmission line will send wind power from Wyoming to California https://grist.org/energy/massive-transmission-line-will-send-wind-power-from-wyoming-to-california/ https://grist.org/energy/massive-transmission-line-will-send-wind-power-from-wyoming-to-california/#respond Mon, 17 Apr 2023 10:30:00 +0000 https://grist.org/?p=607575 After a nearly two-decades-long permitting process, a 732-mile transmission line capable of sending power from what will be the largest onshore wind farm in North America to Western states got a green light last week.

The Bureau of Land Management, or BLM gave final approval to begin building the $3 billion TransWest Express high-voltage transmission line. The infrastructure project will deliver 3 gigawatts of power from the 600-turbine Chokecherry and Sierra Madre Wind Energy Project, which broke ground this year in a former coal mining community in Wyoming, to grids in Arizona, Nevada, and California. That’s enough energy to power about 2 million homes.

“This is the biggest interstate transmission line that will be built in the West in decades,” said Kara Choquette, communications director at TransWest Express, LLC. “It’s not just about sending Wyoming wind to California solar, but how do you blend all these sources together. The physical infrastructure to connect diverse renewable resources will be there.”

The 18-year wait for this transmission line is a reminder of how complicated permitting processes can slow the country’s transition to clean energy. 

Projects built on federal lands are subject to the National Environmental Policy Act, or NEPA, which dictates the environmental review process. NEPA does not include time limits for when environmental reviews must be completed. Also, transmission lines often cross multiple states, inviting opportunities for opposition and bureaucracy from multiple jurisdictions. The TransWest Express crosses four states, through both public and private lands, and required approvals from various federal, state, tribal, and local agencies, as well as some determined property owners

While there is bipartisan support for permitting reforms that could speed up NEPA processes or consolidate the number of decision makers, substantive changes have not yet materialized. Democratic Senator Joe Manchin of West Virginia tried to pass a permitting reform bill last fall that would have transferred some state authority to the federal government on major projects, but it stalled, despite support from Secretary Energy Jennifer Granholm

House Republicans included permitting reform in the “Lower Costs Energy Act,” the energy bill that they passed last month. Its other provisions were so antithetical to clean energy goals that Senate Minority Leader Chuck Schumer, a Democrat from New York, said the bill was a “nonstarter” in the Senate, but indicated that he wanted bipartisan discussions on permitting reform to continue. 

While streamlining approval of interstate projects could help the United States meet its climate goals faster, it can’t be done at the expense of environmental review and community input, says Jeremy Firestone, an expert on wind energy at the University of Delaware. “If we are going to do this transition,” he told Grist, “we need to be open and transparent and provide good information about the environmental and social effects, and the positive attributes of these projects as well, like the fact that they’re going to replace fossil fuel generation.”

The TransWest Express could be particularly impactful for California, which has a goal of achieving 100 percent clean energy by 2045. To meet that goal, the state would need to retire fossil fuel sources like natural gas and coal plants while simultaneously accounting for increased power demand from sources like electric vehicles. In a 2021 report, the state said it would have to triple its grid capacity by 2045. 

Adding transmission capacity of this scale will be essential to converting the nation to completely carbon-free power sources. “It’s like your veins,” Firestone said. “If you’ve got your heart pumping blood, you’ve got to get it to where you want to use it.”  

Construction on the TransWest Express will start this year. TransWest Express LLC, a subsidiary of Anschutz Corp., which also owns the wind farm project, said it expects to complete the project by 2028.

This story was originally published by Grist with the headline Massive transmission line will send wind power from Wyoming to California on Apr 17, 2023.


This content originally appeared on Grist and was authored by Gabriela Aoun Angueira.

]]>
https://grist.org/energy/massive-transmission-line-will-send-wind-power-from-wyoming-to-california/feed/ 0 388201
Robot Police Dogs + Fake Crime Waves https://www.radiofree.org/2023/04/16/robot-police-dogs-fake-crime-waves/ https://www.radiofree.org/2023/04/16/robot-police-dogs-fake-crime-waves/#respond Sun, 16 Apr 2023 16:25:54 +0000 https://dissidentvoice.org/?p=139345

NYPD Adds ‘Spot,’ the Robot Dog, to Force

NYPD Commissioner Keechant Sewell assured the public “that the use of this technology will be transparent, consistent, and always done in collaboration with the people who we serve.” [emphasis added]

Whole Foods closes San Francisco flagship store after one year, citing worker safety

“Incidents of theft in San Francisco have gained national attention, though crime has generally fallen over the past six years.” [emphasis added]

So…

…crime in Frisco has dropped but all we hear is how dangerous it is.

…they close physical stores to keep us home and afraid.

…dystopian technology like robot police dogs is introduced in the hope we’ll cheer such “progress” because, after all, there is so much to fear.

Spoiler alert: You can still say no — to all of it. The power is yours and it begins with accepting how programmed we all are.


This content originally appeared on Dissident Voice and was authored by Mickey Z..

]]> https://www.radiofree.org/2023/04/16/robot-police-dogs-fake-crime-waves/feed/ 0 388139 Georgia National Guard Will Use Phone Location Tracking to Recruit High School Children https://www.radiofree.org/2023/04/16/georgia-national-guard-will-use-phone-location-tracking-to-recruit-high-school-children/ https://www.radiofree.org/2023/04/16/georgia-national-guard-will-use-phone-location-tracking-to-recruit-high-school-children/#respond Sun, 16 Apr 2023 11:00:11 +0000 https://theintercept.com/?p=425854

The Georgia Army National Guard plans to combine two deeply controversial practices — military recruiting at schools and location-based phone surveillance — to persuade teens to enlist, according to contract documents reviewed by The Intercept.

The federal contract materials outline plans by the Georgia Army National Guard to geofence 67 different public high schools throughout the state, targeting phones found within a one-mile boundary of their campuses with recruiting advertisements “with the intent of generating qualified leads of potential applicants for enlistment while also raising awareness of the Georgia Army National Guard.” Geofencing refers generally to the practice of drawing a virtual border around a real-world area and is often used in the context of surveillance-based advertising as well as more traditional law enforcement and intelligence surveillance. The Department of Defense expects interested vendors to deliver a minimum of 3.5 million ad views and 250,000 clicks, according to the contract paperwork.

While the deadline for vendors attempting to win the contract was the end of this past February, no public winner has been announced.

The ad campaign will make use of a variety of surveillance advertising techniques, including capturing the unique device IDs of student phones, tracking pixels, and IP address tracking. It will also plaster recruiting solicitations across Instagram, Snapchat, streaming television, and music apps. The documents note that “TikTok is banned for official DOD use (to include advertising),” owing to allegations that the app is a manipulative, dangerous conduit for hypothetical Chinese government propaganda.

The Georgia Army National Guard did not respond to a request for comment.

While the planned campaign appears primarily aimed at persuading high school students to sign up, the Guard is also asking potential vendors to also target “parents or centers of influence (i.e. coaches, school counselors, etc.)” with recruiting ads. The campaign plans not only call for broadcasting recruitment ads to kids at school, but also for pro-Guard ads to follow these students around as they continue using the internet and other apps, a practice known as retargeting. And while the digital campaign may begin within the confines of the classroom, it won’t remain there: One procurement document states the Guard is interested in “retargeting to high school students after school hours when they are at home,” as well as “after school hours. … This will allow us to capture potential leads while at after-school events.”

“Location based tracking is not legitimate. It’s largely based on the collecting of people’s location data that they’re not aware of and haven’t given meaningful permission for.”

Although it’s possible that children caught in the geofence might have encountered a recruiter anyway — the 2001 No Child Left Behind Act mandated providing military recruiters with students’ contact information — critics of the plan say the use of geolocational data is an inherently invasive act. “Location based tracking is not legitimate,” said Jay Stanley, a senior policy analyst with the American Civil Liberties Union. “It’s largely based on the collecting of people’s location data that they’re not aware of and haven’t given meaningful permission for.” The complex technology underpinning a practice like geofencing can obscure what it’s really accomplishing, argues Benjamin Lynde, an attorney with the ACLU of Georgia. “I think we have to start putting electronic surveillance in the context of what we would accept if it weren’t electronic,” Lynde told The Intercept. “If there were military recruiters taking pictures of students and trying to identify them that way, parents wouldn’t think that conduct is acceptable.” Lynde added that the ACLU of Georgia did not believe there were any state laws constraining geofence surveillance.

The sale and use of location data is largely uncontrolled in the United States, and the legal and regulatory vacuum has created an unscrupulous cottage industry of brokers and analytics firms that turn our phones’ GPS pings into a commodity. The practice has allowed for a variety of applications, including geofence warrants that compel companies like Google to give police a list of every device within a targeted area at a given time. Last year, The Intercept reported on a closed-door technology demo in which a private surveillance firm geofenced the National Security Agency and CIA headquarters to track who came and went.

Although critics of geofencing point to the practice’s invasiveness, they also argue that the inherent messiness of Wi-Fi and Bluetooth signals means that the results are prone to inaccuracy. “This creates the possibility of both false positives and false negatives,” the Electronic Frontier Foundation wrote earlier this year in a Supreme Court amicus brief opposing geofence warrants served to Google. “People could be implicated for a crime when they were nowhere near the scene, or the actual perpetrator might not be included at all in the data Google provides to police.”

It’s doubtful that potential vendors for the Georgia Guard have data accurate enough to avoid targeting kids under 17, according to Zach Edwards, a cybersecurity researcher who closely tracks the surveillance advertising sector. “It would also sweep up plenty of families with young kids who gave them phones before they turned 16 and who were using networks that had location-targetable ads,” he explained in a message to The Intercept. “Very, very few advertising networks track the age of kids under 18. It’s one giant bucket.”

In-school recruiting been hotly debated for decades, both defended as a necessary means of maintaining an all-volunteer military and condemned as a coercive practice that exploits the immaturity of young students. While the state’s plan specifies targeting only high school juniors and seniors ages 17 and above, demographic ad targeting is known to be error prone, and experts told The Intercept it’s possible the recruiting messages could reach the phones of younger children. “Generally, commercial databases aren’t known for their high levels of accuracy,” explained the ACLU’s Stanley. “If you have some incorrect ages in there, it’s really not a big deal [to the broker].” The accuracy of demographic targeting aside, there’s also a problem of geographic reality: “There are middle schools within a mile of those high schools,” according to Lynde of the ACLU of Georgia. “There’s no way there can be a specific delineation of who they’re targeting in that geofence.”

Indeed, dozens of the schools pegged for geotargeting have middle schools, elementary schools, parks, churches, and other sites where children may congregate within a mile radius, according to Google Maps. A geofence containing Hillgrove High School in Powder Springs, Georgia, would also snare phone-toting students at Still Elementary School and Lovinggood Middle School, the latter a mere thousand feet away. A mile-radius around Collins Hill High School in Suwanee, Georgia, would also include the Walnut Grove Elementary School, along with the nearby Oak Meadow Montessori School, a community swim club, a public park, and an aquatic center. Lynde, who himself enlisted with the Georgia National Guard in 2005, added that he’s concerned beaming recruiting ads directly to kids’ phones “could be a means to bypass parental involvement in the recruiting process,” allowing the state to circumvent the scrutiny adults might bring to traditional military recruiting methods like brochures and phone calls to a child’s house. “Parents should be involved from the onset.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/04/16/georgia-national-guard-will-use-phone-location-tracking-to-recruit-high-school-children/feed/ 0 388114
Experts Fear Future AI Could Cause ‘Nuclear-Level Catastrophe’ https://www.radiofree.org/2023/04/14/experts-fear-future-ai-could-cause-nuclear-level-catastrophe/ https://www.radiofree.org/2023/04/14/experts-fear-future-ai-could-cause-nuclear-level-catastrophe/#respond Fri, 14 Apr 2023 20:21:15 +0000 https://www.commondreams.org/news/artificial-intelligence-risks-nuclear-level-disaster

While nearly three-quarters of researchers believe artificial intelligence "could soon lead to revolutionary social change," 36% worry that AI decisions "could cause nuclear-level catastrophe."

Those survey findings are included in the 2023 AI Index Report, an annual assessment of the fast-growing industry assembled by the Stanford Institute for Human-Centered Artificial Intelligence and published earlier this month.

"These systems demonstrate capabilities in question answering, and the generation of text, image, and code unimagined a decade ago, and they outperform the state of the art on many benchmarks, old and new," says the report. "However, they are prone to hallucination, routinely biased, and can be tricked into serving nefarious aims, highlighting the complicated ethical challenges associated with their deployment."

As Al Jazeerareported Friday, the analysis "comes amid growing calls for regulation of AI following controversies ranging from a chatbot-linked suicide to deepfake videos of Ukrainian President Volodymyr Zelenskyy appearing to surrender to invading Russian forces."

Notably, the survey measured the opinions of 327 experts in natural language processing—a branch of computer science essential to the development of chatbots—last May and June, months before the November release of OpenAI's ChatGPT "took the tech world by storm," the news outlet reported.

"A misaligned superintelligent AGI could cause grievous harm to the world."

Just three weeks ago, Geoffrey Hinton, considered the "godfather of artificial intelligence," toldCBS News' Brook Silva-Braga that the rapidly advancing technology's potential impacts are comparable to "the Industrial Revolution, or electricity, or maybe the wheel."

Asked about the chances of the technology "wiping out humanity," Hinton warned that "it's not inconceivable."

That alarming potential doesn't necessarily lie with currently existing AI tools such as ChatGPT, but rather with what is called "artificial general intelligence" (AGI), which would encompass computers developing and acting on their own ideas.

"Until quite recently, I thought it was going to be like 20 to 50 years before we have general-purpose AI," Hinton told CBS News. "Now I think it may be 20 years or less."

Pressed by Silva-Braga if it could happen sooner, Hinton conceded that he wouldn't rule out the possibility of AGI arriving within five years, a significant change from a few years ago when he "would have said, 'No way.'"

"We have to think hard about how to control that," said Hinton. Asked if that's possible, Hinton said, "We don't know, we haven't been there yet, but we can try."

The AI pioneer is far from alone. According to the survey of computer scientists conducted last year, 57% said that "recent progress is moving us toward AGI," and 58% agreed that "AGI is an important concern."

In February, OpenAI CEO Sam Altman wrote in a company blog post: "The risks could be extraordinary. A misaligned superintelligent AGI could cause grievous harm to the world."

More than 25,000 people have signed an open letter published two weeks ago that calls for a six-month moratorium on training AI systems beyond the level of OpenAI's latest chatbot, GPT-4, although Altman is not among them.

"Powerful AI systems should be developed only once we are confident that their effects will be positive and their risks will be manageable," says the letter.

The Financial Timesreported Friday that Tesla and Twitter CEO Elon Musk, who signed the letter calling for a pause, is "developing plans to launch a new artificial intelligence start-up to compete with" OpenAI.

"It's very reasonable for people to be worrying about those issues now."

Regarding AGI, Hinton said: "It's very reasonable for people to be worrying about those issues now, even though it's not going to happen in the next year or two. People should be thinking about those issues."

While AGI may still be a few years away, fears are already mounting that existing AI tools—including chatbots spouting lies, face-swapping apps generating fake videos, and cloned voices committing fraud—are poised to turbocharge the spread of misinformation.

According to a 2022 IPSOS poll of the general public included in the new Stanford report, people in the U.S. are particularly wary of AI, with just 35% agreeing that "products and services using AI had more benefits than drawbacks," compared with 78% of people in China, 76% in Saudi Arabia, and 71% in India.

Amid "growing regulatory interest" in an AI "accountability mechanism," the Biden administration announced this week that it is seeking public input on measures that could be implemented to ensure that "AI systems are legal, effective, ethical, safe, and otherwise trustworthy."

Axiosreported Thursday that Senate Majority Leader Chuck Schumer (D-N.Y.) is "taking early steps toward legislation to regulate artificial intelligence technology."


This content originally appeared on Common Dreams and was authored by Kenny Stancil.

]]> https://www.radiofree.org/2023/04/14/experts-fear-future-ai-could-cause-nuclear-level-catastrophe/feed/ 0 387868 Child Advocates Rebuke ‘Beyond Appalling’ Facebook Push to Allow Kids in the Metaverse https://www.radiofree.org/2023/04/14/child-advocates-rebuke-beyond-appalling-facebook-push-to-allow-kids-in-the-metaverse/ https://www.radiofree.org/2023/04/14/child-advocates-rebuke-beyond-appalling-facebook-push-to-allow-kids-in-the-metaverse/#respond Fri, 14 Apr 2023 17:49:25 +0000 https://www.commondreams.org/news/facebook-kids-metaverse

On the heels of a study showing that minors who use Facebook's virtual reality platform known as the "Metaverse" have routinely been exposed to harassment and abuse, a coalition of more than 70 children's health experts and advocacy groups on Friday called on its parent company Meta to scrap plans to officially open up the digital world to children as young as 13.

A letter signed by groups including Fairplay and the Center for Countering Digital Hate (CCDH) warns that insufficient research has been done on the effects of spending time on platforms like Facebook's "Horizon Worlds"—but notes the research that has been done shows clear risks.

The platform is currently open to users aged 18 and up, but CCDH published a study in March after showing that out of 100 recorded visits to Horizon Worlds, minors were present in 66 of them. Facebook plans to permit 13-17 year olds to use the platform,

Since introducing the Metaverse last year, the company's stock price has dropped more than 70%, and Facebook has conducted two rounds of mass layoffs in the past six months, with more expected.

Josh Golin, executive director of Fairplay, accused Facebook CEO Mark Zuckerberg of expanding the platform to children in order to boost the company.

"It's beyond appalling that Mark Zuckerberg wants to save his failing Horizons World platform by targeting teens," said Golin. "Already, children are being exposed to homophobia, racism, sexism, and other reprehensible content on Horizon Worlds."

CCDH's study identified 19 recordings in which minors were harassed by adult users, including "sexually explicit harassment, racist abuse, and misogyny."

A minor using a Black avatar was told, "You're Black, you're sentenced to death, get out of here" in a virtual courtroom in Horizon Worlds, and "minors were on the receiving end of sexually explicit insults" in at least four of the documented instances.

"Meta must wait for more peer-reviewed research on the potential risks of the Metaverse to be certain that children and teens would be safe," wrote the signatories, including former U.S. House Majority Leader Richard Gephardt, now at the Council for Responsible Social Media, and social psychologist Jonathan Haidt.

In addition to being exposed to harassment and explicit content, the advocates warned in the letter, children's access to Horizons World "magnifie[s] risks to privacy through the collection of biomarkers."

"Before it considers opening its Horizon Worlds metaverse operation to teens, it should first commit to fully exploring the potential consequences," Center for Digital Democracy deputy director Katharina Kopp said of Facebook. "That includes engaging in an independent and research-based effort addressing the impact of virtual experiences on young people's mental and physical well-being, privacy, safety, and potential exposure to hate and other harmful content. It should also ensure that minors don't face forms of discrimination in the virtual world, which tends to perpetuate and exacerbate 'real life' inequities."

The company is planning to welcome minors into Horizons World a year-and-a-half after former Facebook data scientist Frances Haugen testified that the company's products "harm children."

In addition to raising other concerns about the social media platform, Haugen pointed to studies showing that 13.5% of teen girls in the United Kingdom felt that Instagram—which Meta owns—contributed to suicidal thoughts, and that 17% of teen girls said their eating disorders got worse after they began using Instagram.

"Should Meta throw open the doors of these worlds to minors rather than pause to protect them, you would, yet again, demonstrate your company to be untrustworthy when it comes to safeguarding young people's best interests," the coalition told Zuckerberg in their letter Friday.


This content originally appeared on Common Dreams and was authored by Julia Conley.

]]>
https://www.radiofree.org/2023/04/14/child-advocates-rebuke-beyond-appalling-facebook-push-to-allow-kids-in-the-metaverse/feed/ 0 387904
BJP propaganda websites that went down after Alt News report are back live https://www.radiofree.org/2023/04/14/bjp-propaganda-websites-that-went-down-after-alt-news-report-are-back-live/ https://www.radiofree.org/2023/04/14/bjp-propaganda-websites-that-went-down-after-alt-news-report-are-back-live/#respond Fri, 14 Apr 2023 11:54:42 +0000 https://www.altnews.in/?p=153346 In an in-depth report published on April 3, Alt News exposed how 23 websites hosted on a single IP address (13.232.63.153) spent crores of rupees creating ‘disclaimers’ to run political...

The post BJP propaganda websites that went down after Alt News report are back live appeared first on Alt News.

]]>
In an in-depth report published on April 3, Alt News exposed how 23 websites hosted on a single IP address (13.232.63.153) spent crores of rupees creating ‘disclaimers’ to run political ads on Facebook that contained pro-BJP propaganda and targeted the Opposition. The article mentioned that 13 of these websites were ‘live’. These websites were taken down after our report was published, following which we contacted Meta officials. However, we had not received any response at the time of writing.

We were continuously monitoring these websites. In the course of that, we found that many of these websites went back to being ‘live’ on April 11 and the Facebook pages run by them were carrying political advertisements. We archived these websites on April 11 when they were down. When we saw that these websites started coming back ‘live’ one by one, we archived the ‘down’ version and ‘live’ versions. (3 websites, phirekbaarmodisarkar(.)com, mahathugbandhan(.)com, theindiancompass(.)com, went live before we could archived the ‘down’ version)

Website

Down Version Archive

Live Version Archive

phirekbaarmodisarkar.com

NA

https://ghostarchive.org/archive/vMORf

Nirmamata.com

https://ghostarchive.org/archive/LHFWs

https://ghostarchive.org/archive/4pPwV

BhakBudbak.com

https://ghostarchive.org/archive/GaxQa

https://ghostarchive.org/archive/Cxg1J

Mahathugbandhan.com

NA

https://ghostarchive.org/archive/LJVPp

ModiSaatheRajasthan.com

https://ghostarchive.org/archive/y06uu

https://ghostarchive.org/archive/xchqX

theindiancompass.com

NA

https://ghostarchive.org/archive/tNs7L

MP2023.com

https://ghostarchive.org/archive/r2H2Z

https://ghostarchive.org/archive/pTMNX

PappuGappu.com

https://ghostarchive.org/archive/kUxVm

https://ghostarchive.org/archive/UwFgD

Shivshahiparat.com

https://ghostarchive.org/archive/PKisi

https://ghostarchive.org/archive/PGTi0

ChuntliExpress.com

https://ghostarchive.org/archive/Rz8cP

https://ghostarchive.org/archive/nuhS5

Below is an example of the comparison of the ‘down’ and ‘live’ versions of these websites.

Mainhoondilli(.)com Also Connected to this Network

We noticed that the content on Mainhoondilli(.)com was also published on the nirmamata(.)com website. However, the admin of these websites rectified this mistake immediately and it was taken down right away, so its archived version is not available.

However, when the same content of Mainhoondilli(.)com was hosted again on chuntliexpress(.)com, we managed to capture an archived version of this website. An archive of the Homepage, Disclaimer, and Privacy Policy of this website can be found here, in which Mainhoondilli(.)com is mentioned. This can also be seen in the slide given below.

Click to view slideshow.

On April 12, the admin of the website again edited this website and hosted the content of Chuntli Express on it once again. The archived version from April 12 can be accessed here. Readers can find the archived versions of chuntliexpress(.)com dated April 11 here and April 12 here. These differences can be understood more clearly in the visual comparison given below.

It is worth noting that when an advertiser on Facebook/Instagram categorizes an ad as being about social issues, elections or politics, they are required to disclose who paid for the ad.

We searched for this website in the Meta Ad Library Report and found that a Facebook page named ‘Main Hoon Dilli – मैं हूँ दिल्ली’ had mentioned the website Mainhoondilli(.)com in its disclaimer. According to the information available about this page in the Meta Ad Library Report, it spent Rs 7,32,254 between December 20, 2019 and February 8, 2020 to run 294 Facebook ads targeting Delhi chief minister Arvind Kejriwal and the Aam Aadmi Party.

We noticed that a mobile number (6359907104) was given in the disclaimer of this page. We searched for this number in Alt News’ database and found that it had earlier been used to run advertisements on Facebook as well. We had reported that this number was mentioned by a page named ‘2019 Modi Sang Nitish – Modi Sang Nitish’ in the disclaimer to run political ads. Between March 23, 2020 and November 5, 2020, this Facebook page spent Rs. 7,85,373 to run 1,130 advertisements favouring the Bharatiya Janata Party and targeting the Grand Alliance or ‘Mahagathbandhan’. In other words, this page is also a part of this network. Alt News tried calling on this number but it was switched off.

modirsoiteassam(.)com

We had earlier reported how a network of Facebook pages linked to 23 masked websites hosted on a single IP address (13.232.63.153) ran advertisements supporting the BJP and targeting opposition parties. In order to continuously monitor the development of websites connected to this network, we checked the same IP address (13.232.63.153) using website profiling tool BuiltWith. Alt News found that it tracked a new website called modirsoiteassam(.)com in the month of April. The interface and content of this website are also similar to that of those 23 websites we investigated. Its homepage also has only three pictures, a privacy policy and a disclaimer page. Along with this, a link to a Facebook page is also given.

Alt News checked the Page transparency section of this Facebook page ‘মোদীৰ সিতে অস্মাম’ using the link mentioned on the website. It mentioned that this page was created on January 9, 2023, and it is being used to run ads on Facebook.

To collect more information on this page, we searched for it in the Meta Ad Library Report and found that the page has spent Rs. 8,199 on ads in the last two months. However, the page has not mentioned the Bharatiya Janata Party in the ‘Disclaimer’.

The post BJP propaganda websites that went down after Alt News report are back live appeared first on Alt News.


This content originally appeared on Alt News and was authored by Abhishek Kumar.

]]>
https://www.radiofree.org/2023/04/14/bjp-propaganda-websites-that-went-down-after-alt-news-report-are-back-live/feed/ 0 387725
Why Did Journalists Help the Justice Department Identify a Leaker? https://www.radiofree.org/2023/04/14/why-did-journalists-help-the-justice-department-identify-a-leaker/ https://www.radiofree.org/2023/04/14/why-did-journalists-help-the-justice-department-identify-a-leaker/#respond Fri, 14 Apr 2023 01:55:07 +0000 https://theintercept.com/?p=426061

In the fallout from the Pentagon document leaks, a troubling trend has emerged: Journalists seem to be eagerly volunteering their efforts to help the Pentagon and Justice Department facilitate an investigation into the source of the leaks, with no discussion of the ethical ramifications. If the individual — whose identity has been published by journalists, and who has now been arrested by federal authorities — had shared precisely the same classified materials with reporters, regardless of his motivations, he would be tirelessly defended as a source.

NPR recently decried being labeled by Twitter as state-affiliated media, writing that this is a label Twitter uses “to designate official state mouthpieces and propaganda outlets.” That unrelated controversy is notable given that an NPR staffer seems to have deputized himself to act as a government investigator by posting image analyses on Twitter. (While NPR has announced that its official organizational accounts have quit Twitter, individual staff accounts still appear to be active.)

NPR senior editor and correspondent Geoff Brumfiel on Monday combed through artifacts visible in the periphery of the photos of the leaks, as well as collating findings others have discovered, itemizing and explaining each one. Though Brumfiel claimed that his roundup was “largely pointless,” he was effectively performing free labor for the Justice Department, and his posts may corroborate the identity of a suspect. For instance, it may be possible for investigators to analyze a suspect’s credit card purchase history to see if he at some point ordered the objects in question. Brumfiel did not respond to a request for comment in time for publication.

The saving grace here appears to be that the analysis — as is all too often the case with open-source sleuthing on social media — was flawed. Less than 15 minutes after proclaiming he was “confident” that a manual partially visible in some of the photos of leaked documents was for a particular model of scope, others pointed out that in fact the manual was clearly for a different model. “I regret the error,” responded Brumfiel. To his credit, Brumfiel does freely admit in his bio to being “Mostly stupid on the Twitter,” though in this case that self-professed stupidity may put someone’s liberty at risk.

See Something, Say Something

It’s not atypical for government agencies to explicitly request this type of image identification help. For instance, Europol maintains a Trace an Object website, where budding image analysts can help identify various objects in photos linked to child abuse cases. In the case of the leaked Pentagon documents, the Justice Department hasn’t even needed to put out such a call, as plenty of volunteers are offering up leads.

Brumfiel is by no means alone in his social media vigilantism. Jake Godin, a visual investigations journalist at Scripps News, has likewise engaged in the Twitter pastime of volunteering his time to help the Justice Department. Bellingcat, meanwhile, went further and virtually handed over the potential origin point of the leak by specifying the exact name of the chatroom where the documents appear to have first been shared. The fact that these identifications may be aiding the Justice Department investigation appears not to have merited any public consideration from those doing the analyses.

On Wednesday, the Washington Post disclosed further information about the peripheral contents of “previously unreported images,” as well as a variety of additional information about the alleged leaker and his underage associates. The Post states that the leaker “may have endangered his young followers by allowing them to see and possess classified information, exposing them to potential federal crimes.” Given this risk, the Post was extremely cavalier in its depiction of one of those teenagers, publishing video with only rudimentary pixelation accompanied by his unaltered voice. The Post notes that the interviewee asked them not to obscure his voice, but one wonders whether he also asked for close-up shots of his laptop, clearly showing missing keys, to be included. In other words, the Post appears to be acknowledging the danger the interviewee faces while also choosing to readily present evidence that could help investigators confirm his identity. (In response to detailed questions from The Intercept, a Post spokesperson reiterated that the reporters obtained parental consent for the interview.)

The New York Times went further still, identifying the suspected leaker by name on Thursday based on a “trail of evidence” they compiled, including matching elements in the margins of the document photos to other posts on social media.

Perhaps the most bizarre entry in this dubious parade was a story published last week by VICE’s Motherboard about a role-playing game character sheet that seems to have been included in a batch of the leaked document photos. Motherboard published the character sheet in full (in stark contrast to the extreme trouble the same publication took just days before to avoid publishing a poorly redacted document revealing the names of minors suspected of using the artificial intelligence chatbot ChatGPT in school). Motherboard notes that it’s not clear whether the errant image was inadvertently or intentionally added to the photo dump, or whether it was added by the original leaker or an intermediary who further disseminated the photo archive. This lack of clarity makes the decision to publish the document even more confusing and suspect, but the author doesn’t seem bothered, as the story morphs into a humorous analysis of the fun and creative things people do in the world of online role-playing games.

The document in question appears to be an extremely niche adaptation of a role-playing game. Let’s say that someone in an online community on Reddit, 4chan, or a Discord server instantly recognizes this particular game and says, “Oh, that’s Alice’s game sheet.” Alice may now be the subject of Justice Department scrutiny or an online lynch mob, or both, courtesy of Motherboard. Or suppose the Justice Department zeroes in on a suspected leaker and uses the handwriting in the published Motherboard document to positively identify them. The story’s author, Matthew Gault, did not respond to a request for comment.

Duty of Care

Why is the media so eager to help the Justice Department by supplying potentially viable leads? Sure, the­­­ leaker wasn’t NPR’s or Motherboard’s source, and as far as we know, had no intention of being a whistleblower. But does that give journalists a green light to act as investigative agents for the Justice Department? A duty of care arguably extends beyond one’s immediate source: You don’t have to assist an individual in publicizing the workings of government, but at the very least, you should not intentionally compromise them.

The argument could be made that the identity of the leaker is newsworthy. For instance, as the CIA points out, leakers are often senior officials. But ascertaining a source’s identity can be done by journalists privately, as opposed to all over social media or in published stories. If it emerges that the source’s identity is not, in fact, newsworthy, a life hasn’t been damaged by overzealous state-serving reporting.

There is, of course, the distinct possibility that the Justice Department investigators are already well familiar with the ephemera in the photos, seeing as they too have access to reverse image search sites, and that journalists are not telling them anything they don’t already know. Nonetheless, there is a very real possibility that the various clues to the leaker’s and their associates’ identities proffered by various news outlets have helped the government in their recent apprehension of a person suspected to be the leaker.

Either way, the zeal of some “reporters” to out the leaker or find a “gotcha” clue tucked away in the marginalia of an image seems distasteful. A different impulse would be to offer guidance that might help sources avoid getting caught; that could facilitate future leaks and thus greater transparency.


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/04/14/why-did-journalists-help-the-justice-department-identify-a-leaker/feed/ 0 387618
CPJ joins statement calling for Turkey’s media watchdog to stop punishing broadcasters over critical reporting https://www.radiofree.org/2023/04/13/cpj-joins-statement-calling-for-turkeys-media-watchdog-to-stop-punishing-broadcasters-over-critical-reporting/ https://www.radiofree.org/2023/04/13/cpj-joins-statement-calling-for-turkeys-media-watchdog-to-stop-punishing-broadcasters-over-critical-reporting/#respond Thu, 13 Apr 2023 17:41:42 +0000 https://cpj.org/?p=276801 The Committee to Protect Journalists joined 20 other press freedom, freedom of expression, and human rights organizations as signatories of a joint statement urging the Radio and Television Supreme Council (RTÜK), Turkey’s media regulator, to end its punishments of broadcasters for critical reporting.  

The statement said RTÜK recently fined broadcasters FOX TV Turkey, Halk TV, and TELE1 for recent critical coverage and commentary, following penalties already imposed on the broadcasters and others. The statement also noted that RTÜK’s pro-government approach to monitoring the media has been an ongoing problem.

In addition, the statement condemned the recent decision of Turkey’s Industry and Technology Ministry for not renewing the operating license of Deutsche Welle, depriving the German public broadcaster’s Turkish staff of contracts and benefits.

The full statement can be read here.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2023/04/13/cpj-joins-statement-calling-for-turkeys-media-watchdog-to-stop-punishing-broadcasters-over-critical-reporting/feed/ 0 387481
What to Do Before Sharing Classified Documents With Your Friends Online https://www.radiofree.org/2023/04/12/what-to-do-before-sharing-classified-documents-with-your-friends-online/ https://www.radiofree.org/2023/04/12/what-to-do-before-sharing-classified-documents-with-your-friends-online/#respond Wed, 12 Apr 2023 21:28:50 +0000 https://theintercept.com/?p=425875

Let’s say you’re locked in a heated geopolitical spat with a few of your online friends in a small chatroom, and you happen to be privy to some classified documents that could back up your argument. While it’s tempting to snap a photo and share it to prove your point, especially given the appeal of impressing onlookers and instantly placating naysayers, it would behoove you to take a step back and think through the potential repercussions. Even though you may only plan for the documents to be shared among your small group of 20 or so friends, you should assume that copies may trickle out, and in a few weeks, those very same documents could appear on the front pages of international news sites. Thinking of this as an inevitability instead of a remote prospect may help protect you in the face of an ensuing federal investigation.

Provenance

Thorough investigators will try to establish the provenance of leaked materials from a dual perspective, seeking to ascertain the original points of acquisition and distribution. In other words, the key investigatory questions pertaining to the origins of the leaks are where the leaker obtained the source materials and where they originally shared them.

To establish the point of acquisition, investigators will likely first enumerate all the documents that were leaked, then check via which systems they were originally disseminated, followed by seeing both who had access to the documents and, if access logs permit, who actually viewed them.

What all this means for the budding leaker is that the more documents you share with your friends, the tighter the noose becomes. Consider the probabilities: If you share one document to which 1,000 people had access and that 500 people actually accessed, you’re only one of 500 possible primary leakers. But if you share 10 documents — even if hundreds of people opened each one — the pool of people who accessed all 10 is likely significantly smaller.

Keep in mind that access logs may not just be digital — in the form of keeping track of who opened, saved, copied, printed, or otherwise interacted with a file in any way — but also physical, as when a printer produces imperceptible tracking dots. Even if the printer or photocopier doesn’t generate specifically designed markings, it may still be possible to identify the device based on minute imperfections that leave a trace.

In the meantime, investigators will be working to ascertain precisely where you originally shared the leaked contents in question. Though images of documents, for instance, may pass through any number of hands, bouncing seemingly endlessly around the social media hall of mirrors, it will likely be possible with meticulous observation to establish the probable point of origin where the materials were first known to have surfaced online. Armed with this information, investigators may file for subpoenas to request any identifying information about the participants in a given online community, including IP addresses. Those will in turn lead to more subpoenas to internet service providers to ascertain the identities of the original uploaders.

It is thus critically important to foresee how events may eventually unfold, perhaps months after your original post, and to take preemptive measures to anonymize your IP address by using tools such as Tor, as well as by posting from a physical location at which you can’t easily be identified later and, of course, to which you will never return. An old security adage states that you should not rely on security by obscurity; in other words, you should not fall into the trap of thinking that because you’re sharing something in a seemingly private, intimate — albeit virtual — space, your actions are immune from subsequent legal scrutiny. Instead, you must preemptively guard against such scrutiny.

Digital Barrels

Much as crime scene investigators, with varying levels of confidence, try to match a particular bullet to a firearm based on unique striations or imperfections imprinted by the gun barrel, so too can investigators attempt to trace a particular photo to a specific camera. Source camera identification deploys a number of forensic measures to link a camera with a photo or video by deducing that camera’s unique fingerprint. A corollary is that if multiple photos are found to have the same fingerprint, they can all be said to have come from the same camera.

A smudge or nick on the lens may readily allow an inspector to link two photos together, while other techniques rely on imperfections and singularities in camera mechanisms that are not nearly as perceptible to the lay observer, such as the noise a camera sensor produces or the sensor’s unique response to light input, otherwise known as photo-response nonuniformity.

This can quickly become problematic if you opted to take photos or videos of your leaked materials using the same camera you use to post food porn on Instagram. Though the technical minutiae of successful source camera identification forensics can be stymied by factors like low image quality or applied filters, new techniques are being developed to avoid such limitations.

If you’re leaking photos or videos, the best practice is to employ a principle of one-time use: to use a camera specifically and solely for the purpose of the leak; be sure not to have used it before and to dispose of it after.

And, of course, when capturing images to share, it would be ideal to keep a tidy and relatively unidentifiable workspace, avoiding extraneous items either along the periphery or even under the document that could corroborate your identity.

In sum, there are any number of methods that investigators may deploy in their efforts to ascertain the source of a leak, from identifying the provenance of the leaked materials, both in terms of their initial acquisition and their subsequent distribution, to identifying the leaker based on links between their camera and other publicly or privately posted images.

Foresight is thus the most effective tool in a leaker’s toolkit, along with the expectation that any documents you haphazardly post in your seemingly private chat group may ultimately be seen by thousands.


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/04/12/what-to-do-before-sharing-classified-documents-with-your-friends-online/feed/ 0 387237
In Oregon, a microchip gold rush could pave over long-protected farmland https://grist.org/agriculture/oregon-microchip-gold-rush-pave-protected-farmland/ https://grist.org/agriculture/oregon-microchip-gold-rush-pave-protected-farmland/#respond Mon, 10 Apr 2023 10:45:00 +0000 https://grist.org/?p=606780 Beyond the fields of berries, grass seed, and wheat at Jacque Duyck Jones’ farm in Oregon, she can see distant plumes of exhaust spewing from factories in Hillsboro, just outside Portland. Years ago, Jones and her family didn’t worry much about industry creeping closer to their land. A 50-year-old state law that restricts urban growth, rare in the United States, kept smokestacks and strip malls away.

But a national push to make semiconductors – the microchips that help power modern electronics, from dishwashers to electric vehicles – has prompted Oregon lawmakers to lift some of those restrictions. Keen to tap into $52 billion that Congress earmarked last year in the CHIPS and Science Act, Oregon legislators last week passed a bipartisan bill aimed at enticing chip manufacturers to set up shop in the state, in part by allowing them to convert some of the country’s richest farmland into factories. The bill gives Governor Tina Kotek, a Democrat, authority through the end of next year to extend urban development boundaries, a process currently subject to appeals that can be drawn out for years. 

“That’s like granting divine power,” said Ben Williams, president of Friends of French Prairie, a rural land advocacy group. Under the bill, the governor can select two rural sites of more than 500 acres and six smaller ones for development related to the semiconductor industry. That revision to the state’s rigid land-use system has drawn pushback from farmers and conservation organizations. They say the legislation endangers farms, soil health, and carbon sequestration efforts. One potential site for a factory would pave over rural land within a mile of the Duyck family’s land.

“I am worried,” Jones said. “When [the CHIPS Act] was passed at the federal level, here in Oregon we never imagined it would result in basically a choice. I would have never imagined it to have been a threat to farmland in Oregon,” she added, noting that she doesn’t oppose the industry, only building factories on agricultural lands.

With bipartisan support, President Joe Biden signed the CHIPS Act last year intending to jumpstart semiconductor manufacturing in the United States, where 37 percent of the world’s chips were made in 1990, compared to only 12 percent in 2020, according to the Semiconductor Industry Association. Politicians from across the political spectrum lauded the CHIPS Act as a job creator and a way to shore up the semiconductor supply chain during a global shortage

Semiconductors are in microwaves and smartphones, but they are also essential for renewable energy technology. They’re key to solar panels, wind energy systems, heat pumps, microgrids, electric vehicles, and more. In a report published last year, the U.S. Department of Energy called semiconductors “a cornerstone technology of the overall decarbonization strategy” and said a lower-carbon future requires “explosive growth” of both conventional and more advanced chips. 

In Oregon, cashing in on the federal bill won’t necessarily mean bolstering a domestic supply of wind turbines or solar panels, which are mostly manufactured in China. In large part, the chips made in the state, which is already a hub for the industry, are used in computers and high-tech products like electronic gaming and artificial intelligence, according to Arief Budiman, director of the Oregon Renewable Energy Center. 

Supporters of the Oregon bill say capturing the CHIPS Act windfall could create tens of thousands of jobs and more than $1.5 billion in local and state tax revenue. 

“Imagine electric and autonomous vehicles, biotech, clean tech, and others doing research and advanced manufacturing here,” the Oregon Semiconductor Competitiveness Task Force said in a report last August. “In short, acting now could spark a boom that lasts another 30 years.” 

To stay attractive to industry giants like Intel, which already has an Oregon campus but recently chose to build a $20 billion mega-factory in Ohio (to the dismay of Oregon’s elected officials), the state needs to make more industrial land available, the task force said. It described “no development ready sites of the size needed to attract a major semiconductor investment, or to support larger size suppliers.”

Rural land use advocates largely reject that argument. One group – 1,000 Friends of Oregon – has listed several existing industrially-zoned sites that could be used for chip factories. The Oregon Farm Bureau, which opposes the land-use provisions in the state bill, also argues there’s already enough available land within urban growth areas to build new factories, said Lauren Poor, the bureau’s vice president of government and legal affairs. “We’re not opposed to the chips bill, generally speaking,” Poor said. But “once we develop these sites, we can’t get that soil back.”

Wet winters and dry, warm summers help the state’s growers produce some 200 crops, ranging from hops to hay. Oregon dominates other states in blackberry, crimson clover, and rhubarb production, and almost all of the country’s hazelnuts are grown there. “We owe that to the diversity of our climate and our soils, which is one of the reasons we’re very protective of our very unique land-use system,” Poor added. 

The state’s land-use restrictions are rooted in the country’s first law establishing urban growth boundaries, which former Governor Tom McCall, a Republican, signed in 1973. The law, aimed at limiting urban sprawl, allows cities to expand only with approval from a state commission. A decision to move boundaries can be appealed multiple times at both the county and state levels, Williams said. Under the new bill, challenges to the governor’s chip factory designations will be considered only by the state supreme court.

“It’s very detrimental to expand outside the urban growth boundaries,” said Jones, the farmer. She worries building chip factories on farmland could increase nearby property values, making arable land harder for farmers to buy or rent, and could supplant not only rows of crops but essential farm infrastructure like seed-cleaning sites. 

Aside from tweaking Oregon’s special land-use laws, state legislators are considering a bill that would fund nature-based climate solutions, like storing carbon in agricultural soil. Poor said the two bills seem to run counter to each other. “What do you want from us? Do you want us to sequester your carbon, or do you want to pave over our farmlands?”

This story was originally published by Grist with the headline In Oregon, a microchip gold rush could pave over long-protected farmland on Apr 10, 2023.


This content originally appeared on Grist and was authored by Max Graham.

]]>
https://grist.org/agriculture/oregon-microchip-gold-rush-pave-protected-farmland/feed/ 0 386573
Elon Musk Wants to Cut Your Social Security Because He Doesn’t Understand Math https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/ https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/#respond Sun, 09 Apr 2023 10:00:49 +0000 https://theintercept.com/?p=425708
Elon Musk, chief executive officer of Tesla Inc., departs court in San Francisco, California, US, on Tuesday, Jan. 24, 2023. Investors suing Tesla and Musk argue that his August 2018 tweets about taking Tesla private with funding secured were indisputably false and cost them billions of dollars by spurring wild swings in Tesla's stock price. Photographer: Marlena Sloss/Bloomberg via Getty Images

Elon Musk, chief executive officer of Tesla Inc., departs court in San Francisco, California, on Jan. 24, 2023.

Photo: Marlena Sloss/Bloomberg via Getty Images

If there’s one thing you can say for sure about Elon Musk, it’s that he has a huge number of opinions and loves to share them at high volume with the world. The problem here is that his opinions are often stunningly wrong.

Generally, these stunningly wrong opinions are the conventional wisdom among the ultra-right and ultra-rich.

In particular, like most of the ultra-right ultra-rich, Musk is desperately concerned that the U.S. is about to be overwhelmed by the costs of Social Security and Medicare.

He’s previously tweeted — in response to the Christian evangelical humor site Babylon Bee — that “True national debt, including unfunded entitlements, is at least $60 trillion.” On the one hand, this is arguably true. On the other hand, you will understand it’s not a problem if you are familiar with 1) this subject and 2) basic math.

More recently, Musk favored us with this perspective on Social Security:

There’s so much wrong with this that it’s difficult to know where to start explaining, but let’s try.

First of all, Musk is saying that the U.S. will have difficulty paying Social Security benefits in the future due to a low U.S. birth rate. People who believe this generally point to the falling ratio of U.S. workers to Social Security beneficiaries. The Peter G. Peterson Foundation, founded by another billionaire, is happy to give you the numbers: In 1960, there were 5.1 workers per beneficiary, and now there are only 2.8. Moreover, the ratio is projected to fall to 2.3 by 2035.

This does sound intuitively like it must be a big problem — until you think about it for five seconds. As in many other cases, this is the five seconds of thinking that Musk has failed to do.

You don’t need to know anything about the intricacies of how Social Security works to understand it. Just use your little noggin. The obvious reality is that if a falling ratio of workers to beneficiaries is an enormous problem, this problem would already have manifested itself.

Again, look at those numbers. In 1960, 5.1. Now, 2.8. The ratio has dropped by almost half. (In fact, it’s dropped by more than that in Social Security’s history. In 1950 the worker-to-beneficiary ratio was 16.5.) And yet despite a plunge in the worker-retiree ratio that has already happened, the Social Security checks today go out every month like clockwork. There is no mayhem in the streets. There’s no reason to expect disaster if the ratio goes down a little more, to 2.3.

The reason this is possible is the same reason the U.S. overall is a far richer country than it was in the past: an increase in worker productivity. Productivity is the measure of how much the U.S. economy produces per worker, and probably the most important statistic regarding economic well being. We invent bulldozers, and suddenly one person can do the work of 30 people with shovels. We invent computer printers, and suddenly one person can do the work of 100 typists. We invent E-ZPass, and suddenly zero people can do the work of thousands of tollbooth operators.

This matters because, when you strip away the complexity, retirement income of any kind is simply money generated by present-day workers being taken from them and given to people who aren’t working. This is true with Social Security, where the money is taken in the form of taxes. But it’s also true with any kind of private savings. The transfer there just uses different mechanisms — say, Dick Cheney, 82, getting dividends from all the stock he owns.

So it’s all about how much present day workers can produce. And if productivity goes up fast enough, it will swamp any fall in the worker-beneficiary ratio — and the income of both present day workers and retirees can rise indefinitely. This is exactly what happened in the past. And we can see that there’s no reason to believe it won’t continue, again using the concept of math.

The economist Dean Baker of the Center for Economic and Policy Research, a Washington think tank, has done this math. U.S. productivity has grown at more than 1 percent per year — sometimes much more — over every 15-year period since World War II. If it grows at 1 percent for the next 15 years, it will be possible for both workers and retirees to see their income increase by almost 9 percent. If it grows at 2 percent — about the average since World War II — the income of both workers and retirees can grow by 20 percent during the next 15 years. This does not seem like the “reckoning” predicted by Musk.

What Musk is essentially saying is that technology in general, and his car company in particular, are going to fail.

What’s even funnier about Musk’s fretting is that it contradicts literally everything about his life. He’s promised for years that Tesla’s cars will soon achieve “full self-driving.” If indeed humans can invent vehicles that can drive without people, this will generate a huge increase in productivity — so much so that some people worry about what millions of truck drivers would do if their jobs are shortly eliminated. Meanwhile, if low birth rates mean there are fewer workers available, the cost of labor will rise, meaning that it will be worth it for Tesla to invest more in creating self-driving trucks. So what Musk is essentially saying is that technology in general, and his car company in particular, are going to fail.

Finally, there’s Musk’s characterization of Japan as a “leading indictor.” Here’s a picture of Tokyo, depicting what a poverty-stricken hellscape Japan has now become due to its low birthrate:

People walk under cherry blossoms in full bloom at a park in the Sumida district of Tokyo on March 22, 2023. (Photo by Philip FONG / AFP) (Photo by PHILIP FONG/AFP via Getty Images)

People walk under cherry blossoms in full bloom at a park in the Sumida district of Tokyo on March 22, 2023.

Photo: Philip Fong/AFP via Getty Images

That is a joke. Japan is an extremely rich country by world standards, and the aging of its population has not changed that. The statistic to pay attention here is a country’s per capita income. Aging might be a problem if so many people were old and out of the workforce that per capita income fell, but, as the World Bank will tell you, that hasn’t happened in Japan. In fact, thanks to the magic of productivity, per capita income has continued to rise, albeit more slowly than in Japan’s years of fastest growth.

So if you’re tempted by Musk’s words to be concerned about what a low birth rate means for Social Security, you don’t need to sweat it. A much bigger problem, for Social Security and the U.S. in general, are the low-functioning brains of our billionaires.


This content originally appeared on The Intercept and was authored by Jon Schwarz.

]]>
https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/feed/ 0 386440
Elon Musk Wants to Cut Your Social Security Because He Doesn’t Understand Math https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/ https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/#respond Sun, 09 Apr 2023 10:00:49 +0000 https://theintercept.com/?p=425708
Elon Musk, chief executive officer of Tesla Inc., departs court in San Francisco, California, US, on Tuesday, Jan. 24, 2023. Investors suing Tesla and Musk argue that his August 2018 tweets about taking Tesla private with funding secured were indisputably false and cost them billions of dollars by spurring wild swings in Tesla's stock price. Photographer: Marlena Sloss/Bloomberg via Getty Images

Elon Musk, chief executive officer of Tesla Inc., departs court in San Francisco, California, on Jan. 24, 2023.

Photo: Marlena Sloss/Bloomberg via Getty Images

If there’s one thing you can say for sure about Elon Musk, it’s that he has a huge number of opinions and loves to share them at high volume with the world. The problem here is that his opinions are often stunningly wrong.

Generally, these stunningly wrong opinions are the conventional wisdom among the ultra-right and ultra-rich.

In particular, like most of the ultra-right ultra-rich, Musk is desperately concerned that the U.S. is about to be overwhelmed by the costs of Social Security and Medicare.

He’s previously tweeted — in response to the Christian evangelical humor site Babylon Bee — that “True national debt, including unfunded entitlements, is at least $60 trillion.” On the one hand, this is arguably true. On the other hand, you will understand it’s not a problem if you are familiar with 1) this subject and 2) basic math.

More recently, Musk favored us with this perspective on Social Security:

There’s so much wrong with this that it’s difficult to know where to start explaining, but let’s try.

First of all, Musk is saying that the U.S. will have difficulty paying Social Security benefits in the future due to a low U.S. birth rate. People who believe this generally point to the falling ratio of U.S. workers to Social Security beneficiaries. The Peter G. Peterson Foundation, founded by another billionaire, is happy to give you the numbers: In 1960, there were 5.1 workers per beneficiary, and now there are only 2.8. Moreover, the ratio is projected to fall to 2.3 by 2035.

This does sound intuitively like it must be a big problem — until you think about it for five seconds. As in many other cases, this is the five seconds of thinking that Musk has failed to do.

You don’t need to know anything about the intricacies of how Social Security works to understand it. Just use your little noggin. The obvious reality is that if a falling ratio of workers to beneficiaries is an enormous problem, this problem would already have manifested itself.

Again, look at those numbers. In 1960, 5.1. Now, 2.8. The ratio has dropped by almost half. (In fact, it’s dropped by more than that in Social Security’s history. In 1950 the worker-to-beneficiary ratio was 16.5.) And yet despite a plunge in the worker-retiree ratio that has already happened, the Social Security checks today go out every month like clockwork. There is no mayhem in the streets. There’s no reason to expect disaster if the ratio goes down a little more, to 2.3.

The reason this is possible is the same reason the U.S. overall is a far richer country than it was in the past: an increase in worker productivity. Productivity is the measure of how much the U.S. economy produces per worker, and probably the most important statistic regarding economic well being. We invent bulldozers, and suddenly one person can do the work of 30 people with shovels. We invent computer printers, and suddenly one person can do the work of 100 typists. We invent E-ZPass, and suddenly zero people can do the work of thousands of tollbooth operators.

This matters because, when you strip away the complexity, retirement income of any kind is simply money generated by present-day workers being taken from them and given to people who aren’t working. This is true with Social Security, where the money is taken in the form of taxes. But it’s also true with any kind of private savings. The transfer there just uses different mechanisms — say, Dick Cheney, 82, getting dividends from all the stock he owns.

So it’s all about how much present day workers can produce. And if productivity goes up fast enough, it will swamp any fall in the worker-beneficiary ratio — and the income of both present day workers and retirees can rise indefinitely. This is exactly what happened in the past. And we can see that there’s no reason to believe it won’t continue, again using the concept of math.

The economist Dean Baker of the Center for Economic and Policy Research, a Washington think tank, has done this math. U.S. productivity has grown at more than 1 percent per year — sometimes much more — over every 15-year period since World War II. If it grows at 1 percent for the next 15 years, it will be possible for both workers and retirees to see their income increase by almost 9 percent. If it grows at 2 percent — about the average since World War II — the income of both workers and retirees can grow by 20 percent during the next 15 years. This does not seem like the “reckoning” predicted by Musk.

What Musk is essentially saying is that technology in general, and his car company in particular, are going to fail.

What’s even funnier about Musk’s fretting is that it contradicts literally everything about his life. He’s promised for years that Tesla’s cars will soon achieve “full self-driving.” If indeed humans can invent vehicles that can drive without people, this will generate a huge increase in productivity — so much so that some people worry about what millions of truck drivers would do if their jobs are shortly eliminated. Meanwhile, if low birth rates mean there are fewer workers available, the cost of labor will rise, meaning that it will be worth it for Tesla to invest more in creating self-driving trucks. So what Musk is essentially saying is that technology in general, and his car company in particular, are going to fail.

Finally, there’s Musk’s characterization of Japan as a “leading indictor.” Here’s a picture of Tokyo, depicting what a poverty-stricken hellscape Japan has now become due to its low birthrate:

People walk under cherry blossoms in full bloom at a park in the Sumida district of Tokyo on March 22, 2023. (Photo by Philip FONG / AFP) (Photo by PHILIP FONG/AFP via Getty Images)

People walk under cherry blossoms in full bloom at a park in the Sumida district of Tokyo on March 22, 2023.

Photo: Philip Fong/AFP via Getty Images

That is a joke. Japan is an extremely rich country by world standards, and the aging of its population has not changed that. The statistic to pay attention here is a country’s per capita income. Aging might be a problem if so many people were old and out of the workforce that per capita income fell, but, as the World Bank will tell you, that hasn’t happened in Japan. In fact, thanks to the magic of productivity, per capita income has continued to rise, albeit more slowly than in Japan’s years of fastest growth.

So if you’re tempted by Musk’s words to be concerned about what a low birth rate means for Social Security, you don’t need to sweat it. A much bigger problem, for Social Security and the U.S. in general, are the low-functioning brains of our billionaires.


This content originally appeared on The Intercept and was authored by Jon Schwarz.

]]>
https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/feed/ 0 386441
Elon Musk Wants to Cut Your Social Security Because He Doesn’t Understand Math https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/ https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/#respond Sun, 09 Apr 2023 10:00:49 +0000 https://theintercept.com/?p=425708
Elon Musk, chief executive officer of Tesla Inc., departs court in San Francisco, California, US, on Tuesday, Jan. 24, 2023. Investors suing Tesla and Musk argue that his August 2018 tweets about taking Tesla private with funding secured were indisputably false and cost them billions of dollars by spurring wild swings in Tesla's stock price. Photographer: Marlena Sloss/Bloomberg via Getty Images

Elon Musk, chief executive officer of Tesla Inc., departs court in San Francisco, California, on Jan. 24, 2023.

Photo: Marlena Sloss/Bloomberg via Getty Images

If there’s one thing you can say for sure about Elon Musk, it’s that he has a huge number of opinions and loves to share them at high volume with the world. The problem here is that his opinions are often stunningly wrong.

Generally, these stunningly wrong opinions are the conventional wisdom among the ultra-right and ultra-rich.

In particular, like most of the ultra-right ultra-rich, Musk is desperately concerned that the U.S. is about to be overwhelmed by the costs of Social Security and Medicare.

He’s previously tweeted — in response to the Christian evangelical humor site Babylon Bee — that “True national debt, including unfunded entitlements, is at least $60 trillion.” On the one hand, this is arguably true. On the other hand, you will understand it’s not a problem if you are familiar with 1) this subject and 2) basic math.

More recently, Musk favored us with this perspective on Social Security:

There’s so much wrong with this that it’s difficult to know where to start explaining, but let’s try.

First of all, Musk is saying that the U.S. will have difficulty paying Social Security benefits in the future due to a low U.S. birth rate. People who believe this generally point to the falling ratio of U.S. workers to Social Security beneficiaries. The Peter G. Peterson Foundation, founded by another billionaire, is happy to give you the numbers: In 1960, there were 5.1 workers per beneficiary, and now there are only 2.8. Moreover, the ratio is projected to fall to 2.3 by 2035.

This does sound intuitively like it must be a big problem — until you think about it for five seconds. As in many other cases, this is the five seconds of thinking that Musk has failed to do.

You don’t need to know anything about the intricacies of how Social Security works to understand it. Just use your little noggin. The obvious reality is that if a falling ratio of workers to beneficiaries is an enormous problem, this problem would already have manifested itself.

Again, look at those numbers. In 1960, 5.1. Now, 2.8. The ratio has dropped by almost half. (In fact, it’s dropped by more than that in Social Security’s history. In 1950 the worker-to-beneficiary ratio was 16.5.) And yet despite a plunge in the worker-retiree ratio that has already happened, the Social Security checks today go out every month like clockwork. There is no mayhem in the streets. There’s no reason to expect disaster if the ratio goes down a little more, to 2.3.

The reason this is possible is the same reason the U.S. overall is a far richer country than it was in the past: an increase in worker productivity. Productivity is the measure of how much the U.S. economy produces per worker, and probably the most important statistic regarding economic well being. We invent bulldozers, and suddenly one person can do the work of 30 people with shovels. We invent computer printers, and suddenly one person can do the work of 100 typists. We invent E-ZPass, and suddenly zero people can do the work of thousands of tollbooth operators.

This matters because, when you strip away the complexity, retirement income of any kind is simply money generated by present-day workers being taken from them and given to people who aren’t working. This is true with Social Security, where the money is taken in the form of taxes. But it’s also true with any kind of private savings. The transfer there just uses different mechanisms — say, Dick Cheney, 82, getting dividends from all the stock he owns.

So it’s all about how much present day workers can produce. And if productivity goes up fast enough, it will swamp any fall in the worker-beneficiary ratio — and the income of both present day workers and retirees can rise indefinitely. This is exactly what happened in the past. And we can see that there’s no reason to believe it won’t continue, again using the concept of math.

The economist Dean Baker of the Center for Economic and Policy Research, a Washington think tank, has done this math. U.S. productivity has grown at more than 1 percent per year — sometimes much more — over every 15-year period since World War II. If it grows at 1 percent for the next 15 years, it will be possible for both workers and retirees to see their income increase by almost 9 percent. If it grows at 2 percent — about the average since World War II — the income of both workers and retirees can grow by 20 percent during the next 15 years. This does not seem like the “reckoning” predicted by Musk.

What Musk is essentially saying is that technology in general, and his car company in particular, are going to fail.

What’s even funnier about Musk’s fretting is that it contradicts literally everything about his life. He’s promised for years that Tesla’s cars will soon achieve “full self-driving.” If indeed humans can invent vehicles that can drive without people, this will generate a huge increase in productivity — so much so that some people worry about what millions of truck drivers would do if their jobs are shortly eliminated. Meanwhile, if low birth rates mean there are fewer workers available, the cost of labor will rise, meaning that it will be worth it for Tesla to invest more in creating self-driving trucks. So what Musk is essentially saying is that technology in general, and his car company in particular, are going to fail.

Finally, there’s Musk’s characterization of Japan as a “leading indictor.” Here’s a picture of Tokyo, depicting what a poverty-stricken hellscape Japan has now become due to its low birthrate:

People walk under cherry blossoms in full bloom at a park in the Sumida district of Tokyo on March 22, 2023. (Photo by Philip FONG / AFP) (Photo by PHILIP FONG/AFP via Getty Images)

People walk under cherry blossoms in full bloom at a park in the Sumida district of Tokyo on March 22, 2023.

Photo: Philip Fong/AFP via Getty Images

That is a joke. Japan is an extremely rich country by world standards, and the aging of its population has not changed that. The statistic to pay attention here is a country’s per capita income. Aging might be a problem if so many people were old and out of the workforce that per capita income fell, but, as the World Bank will tell you, that hasn’t happened in Japan. In fact, thanks to the magic of productivity, per capita income has continued to rise, albeit more slowly than in Japan’s years of fastest growth.

So if you’re tempted by Musk’s words to be concerned about what a low birth rate means for Social Security, you don’t need to sweat it. A much bigger problem, for Social Security and the U.S. in general, are the low-functioning brains of our billionaires.


This content originally appeared on The Intercept and was authored by Jon Schwarz.

]]>
https://www.radiofree.org/2023/04/09/elon-musk-wants-to-cut-your-social-security-because-he-doesnt-understand-math/feed/ 0 386442
Twitter Deploys Classic Musk Tactics to Hunt Down Leaker https://www.radiofree.org/2023/04/08/twitter-deploys-classic-musk-tactics-to-hunt-down-leaker/ https://www.radiofree.org/2023/04/08/twitter-deploys-classic-musk-tactics-to-hunt-down-leaker/#respond Sat, 08 Apr 2023 10:00:54 +0000 https://theintercept.com/?p=425595

Twitter last month submitted a Digital Millennium Copyright Act notice to GitHub — a web service designed to host user-uploaded source code — demanding that certain content be taken down because it was allegedly “[p]roprietary source code for Twitter’s platform and internal tools.” Twitter subsequently filed a declaration in federal court supporting its request for a DMCA subpoena, the ostensible aim of which was “to identify the alleged infringer or infringers who posted Twitter’s source code on systems operated by GitHub without Twitter’s authorization.”

However, Twitter appears to have revised its DMCA notice, essentially a claim of copyright infringement, the same day it was filed to request not only information about the uploader, but also “any related upload / download / access history (and any contact info, IP addresses, or other session info related to same), and any associated logs related to this repo or any forks thereof.” In other words, Twitter is now seeking information not only about the alleged leaker, but also about anyone who interacted with the particular GitHub repository, the online space for storing source code, in any way, including simply by accessing it. Trying to strong-arm GitHub into revealing information about visitors to a particular repository it hosts via a request for a subpoena is a move reminiscent of the Justice Department attempting to compel a web-hosting company to reveal information about visitors to an anti-Trump website.

DMCA: The Doxxing and Censorship Tool of Choice

This isn’t the first time that corporations have tried to use DMCA subpoenas to identify leakers. A Marvel Studios affiliate recently petitioned for DMCA subpoenas to force Reddit and Google to reveal information about someone who uploaded a film script to Google and posted about it on Reddit before the movie was released. DMCA claims also have a sordid history of being used in doxxing attempts. False DMCA claims can be filed to lure a targeted user to then file a counterclaim, which necessitates that they fill in their name and address, which in turn gets passed on to the original filer. At other times, the DMCA is used simply to censor content, whether to muzzle members of civil society or for reputation management.

No Subpoena Required?

GitHub has seemed all too willing to provide information about both its repository owners and its visitors, even without a subpoena. When the owner of another, unrelated repository recently asked GitHub to provide access logs of users who had visited it, GitHub appears to have readily complied, obscuring only the last octet of the visitor IP address, with the unredacted portion still potentially revealing information such as a user’s internet service provider and approximate location.

There are also any number of public ways to extract user information from GitHub, such as email addresses associated with a particular GitHub account. Ironically, some scripts hosted on GitHub are designed to automate the exfiltration of a GitHub user’s email address. Once an email address is learned, the process of requesting a subpoena for further information about a particular user may be repeated in an attempt to obtain yet more sensitive data.

Musk’s Bag of Tricks

Aside from claiming to use watermarking methods to catch leakers, Musk’s other companies have also sought subpoenas to force service providers to reveal information about leakers. For instance, when Musk zeroed in on (and subsequently harassed) a suspected leaker who provided internal documents to a reporter about large amounts of waste being generated at Tesla’s “Gigafactory,” Tesla moved to subpoena Apple, AT&T, Dropbox, Facebook, Google, Microsoft, Open Whisper Systems (the organization formerly behind the secure messaging app Signal), and WhatsApp. The proposed subpoenas “commanded” their targets to preserve any information about the suspected leaker’s accounts, as well as all documents that the suspected leaker “has deleted from the foregoing accounts but that are still accessible by you.”

In addition to proposed subpoenas, Tesla has reportedly tried to identify leakers by reviewing surveillance footage to see who had been taking photos (the original Business Insider story that prompted the Tesla investigation mentioned that the source had provided images to corroborate their claims of waste at the factory). The company has also checked file access logs to see who had accessed data that was provided to the news outlet.

Following identification of the suspected leaker, Tesla reportedly engaged in an extensive surveillance campaign, including hacking the suspect’s phone; requesting that the suspect turn over their laptop for an “update” that was, in fact, a forensic audit; deploying a plainclothes security guard to monitor the suspect on the factory floor; and hiring private investigators to conduct further surveillance.

Takeaways for Leakers

Given the lax approach to divulging user information by service providers, coupled with the aggressive tactics employed by companies to reveal sources, the takeaway for would-be leakers is clear: Do not trust service providers to protect any information they may have about you. Websites may reveal information about the leaker, intentionally or not, and whether legally obligated or of their own accord. Leakers would do well to avoid using their home or other proximate internet connection and to further obfuscate it using tools such as the Tor Browser. Additionally, it’s best to ensure that any information required to set up a particular account, such as an email address or phone number, not be traceable to the leaker.


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/04/08/twitter-deploys-classic-musk-tactics-to-hunt-down-leaker/feed/ 0 386335
Exclusive: Network of shadow Facebook pages spending crores on ads to target Oppn are connected to BJP https://www.radiofree.org/2023/04/04/exclusive-network-of-shadow-facebook-pages-spending-crores-on-ads-to-target-oppn-are-connected-to-bjp/ https://www.radiofree.org/2023/04/04/exclusive-network-of-shadow-facebook-pages-spending-crores-on-ads-to-target-oppn-are-connected-to-bjp/#respond Tue, 04 Apr 2023 10:13:57 +0000 https://www.altnews.in/?p=152747 For the last few years, political propaganda on social media has been a part and parcel of electoral politics across the world. Alongside that, advertising, too, has become an important...

The post Exclusive: Network of shadow Facebook pages spending crores on ads to target Oppn are connected to BJP appeared first on Alt News.

]]>
For the last few years, political propaganda on social media has been a part and parcel of electoral politics across the world. Alongside that, advertising, too, has become an important tool for creating and spreading propaganda on social media platforms such as Facebook, Instagram, Twitter. This is because regular social media users cannot control who views their post. However, on advertising platforms like Facebook in particular, advertisers can select target audiences on the basis of region, age, gender, etc. Targeting audiences in this way has proven to be very successful electorally in the past. When it was misused, it resulted in data scandals like that of Cambridge Analytica.

In this story, Alt News will investigate a network of Facebook pages that are misusing Facebook as a platform and engaging in political propaganda in favour of the BJP, and against non-BJP parties. We will also illustrate how Facebook’s advertising policy is actually allowing the BJP to spend crores of rupees on Facebook to use it for advertising with the help of masked websites.

Alt News received information that some of the websites are identical in appearance and their content is identical verbatim except for the domain name (referred to as the website) mentioned in their privacy policy and disclaimer pages. These websites are hosted on the same IP address. The Facebook pages linked to these websites have massive followings, through which they circulate pro-BJP propaganda. The pages spend lakhs of rupees on Facebook advertisements. Next, we started investigating these websites and others related to them. One of the websites found in the list in the intel we received was ‘phirekbaarmodisarkar(dot)com’.

phirekbaarmodisarkar(dot)com

To verify the information received by us, we checked the phirekbaarmodisarkar(dot)com website using the Website IP Lookup tool. This led us to the IP address (13.232.63.153) of this website.

Following this, we used the Reverse IP Lookup tool to collect more information related to this IP address. We found 13 websites hosted on the same IP Address (13.232.63.153) as that of the phirekbaarmodisarkar.com website. In October 2022, 14 websites were hosted on this IP address. Between October and the writing of this article, two websites (buababua.com and up2022.com) were down and one new website (bhakbudbak.com) was hosted on the same IP address. To illustrate this, we are including archived links from October 13, 2022 and March 14. All of these have the same interface. Each website features three images, a Facebook page link, and a disclaimer and a privacy policy page.

To know more about the history of the IP Address 13.232.63.153, we used BuiltWith’s IP Address Usage History tool. When we searched for this IP address (13.232.63.153) through the tool, we found that between December 2019 and the writing of this article, a total of 23 websites were hosted on this IP address. The list of these websites is given below. One can also access archives of each of the sites here (file). No archived versions was found for three of the 23 websites.

Source: BuiltWith

  1. jharkhand2019(dot)com

  2. chormachayeshor(dot)com

  3. ghargharraghubar(dot)com

  4. thefrustratedbengali(dot)com

  5. phirekbaarmodisarkar(dot)com

  6. modisangnitish(dot)com

  7. nirmamata(dot)com

  8. up2022(dot)com

  9. bhakbudbak(dot)com

  10. mahathugbandhan(dot)com

  11. telanganaatmagouravam(dot)com

  12. kamaldobara(dot)com

  13. olirattumputhuvai(dot)com

  14. valarchipaadaiyiltamizhagam(dot)com

  15. buababua(dot)com

  16. teisheabarbjpsarkaar(dot)com

  17. modisaatherajasthan(dot)com

  18. theindiancompass(dot)com

  19. meghalayawithmodi(dot)com

  20. mp2023(dot)com

  21. pappugappu(dot)com

  22. shivshahiparat(dot)com

  23. chuntliexpress(dot)com

Many of the websites identified in this list are down. When we tried to collect information about the domains of these websites with the help of Registration Data Lookup tool, we found that the information pertaining to all these domains had been hidden with the help of Domains by Proxy (DBP). Domains by Proxy (DBP) is an Internet company that provides domain privacy services. With its help, instead of the details of the real owner of the domain in the WHOIS database, the name of the owner appears as ‘Domain By Proxy’. In other words, the company is entrusted with the responsibility of keeping the personal information of the domain owner confidential.

While buying domains on a website like GoDaddy, users can pay extra to subscribe to this service, i.e., to hide the personal information of the domain owner from the WHOIS database. The template and content pattern of these websites are exactly the same. All these websites have a home page, disclaimer and privacy policy page with three pictures. Apart from this, there is a link to a Facebook page on each of them.

This can be seen clearly in the screenshots in the slides given below.

Click to view slideshow.

Another thing is common to all these sites. The Facebook pages associated with them indiscriminately spend lakhs of rupees on Facebook advertising. To collect information related to this, we searched the ‘Meta Ad Library Report’ of Facebook’s parent company Meta. We checked how much money was spent on advertisements through Facebook pages linked to each of the websites from February 21, 2019 to March 10. The report is quite detailed, and the file is attached below. Overall, the Facebook pages linked to these websites have spent a total of ₹3,47,05,292 by broadcasting a total of 48,930 advertisements so far.

These websites often run advertisements in support of the BJP and many of these websites and their associated Facebook pages are dedicated to spreading propaganda against opposition parties and leaders. For example:

  • Thugs of Jharkhand – False propaganda against Jharkhand chief minister Hemant Soren, Jharkhand Mukti Morcha and the Congress

  • Chor Machaye Shor – False propaganda against former Haryana chief minister Bhupinder Hooda and the Congress 

  • The Frustrated Bengali – Propaganda against Mamata Banerjee and the Trinamool Congress

  • Nirmamata – propaganda against Mamata Banerjee and the Trinamool Congress

  • Bhak Budbak – Bad propaganda against Bihar deputy chief minister Tejaswi Yadav and the RJD

  • Mahathugbandhan – propaganda against opposition parties

  • Bua Babua – Bad propaganda against former chief ministers of Uttar Pradesh Akhilesh Yadav and Mayawati

  • Pappu Gappu – Pappu Gappu – propaganda against Rahul Gandhi and the Congress 

  • Chuntli Express – False propaganda against the Aam Aadmi Party and the Congress

It is worth noting that the Facebook pages linked to these websites have run advertisements against the opposition parties left and right. But the ‘disclaimer’ provided in these contains either the name of the website, or the name of the same page which has posted the advertisement.

When it comes to disclaimers, Meta rules demand that the advertiser provides their name, the name of the page they run, or another organisation as the entity behind the ad served by that Facebook Page. If they are running ads for another organisation, Facebook requires them to provide additional credentials – such as a phone number, email and website or a certificate from the Media Certification and Monitoring Committee from the Election Commission of India to help ensure that the organisation running the ad is authentic.

Advertising spends by websites linked to Facebook page (File)

Dataset

(21 Feb 2019 – 10 Mar 2023)

Sr. No.

Page Name

Disclaimer

Amount Spent

Number of Ads

1

Thugs Of Jharkhand

jharkhand2019.com

₹371,795

430

2

Chor Machaye Shor

www.chormachayeshor.com

₹483,122

815

3

Ghar Ghar Raghubar

GharGharRaghubar.com

₹875,519

2,550

4

The Frustrated Bengali

thefrustratedbengali.com

₹1,074,996

2,126

5

The Frustrated Bengali

The Frustrated Bengali

₹436,618

925

6

The Frustrated Bengali

NO DISCLAIMER

₹3,017

9

7

Phir Ek Baar Modi Sarkar

phirekbaarmodisarkar.com

₹1,425,679

2,993

8

Phir Ek Baar Modi Sarkar

Phir Ek Baar Modi Sarkar

₹34,416

63

9

2020 Modi Sang Nitish – मोदी संग नीतीश

2020 Modi Sang Nitish – मोदी संग नीतीश

₹609,095

1,039

10

2020 Modi Sang Nitish – मोदी संग नीतीश

http://modisangnitish.com

₹176,278

91

11

Nirmamata (Page ID – 100565144759425)

nirmamata.com

₹1,722,113

2,416

12

Nirmamata (Page ID – 100565144759425)

Nirmamata

₹458,078

1,725

13

Nirmamata (Page ID – 108923581963430)

nirmamata.com

₹340,351

1,630

14

Nirmamata (Page ID – 100565144759425)

NO DISCLAIMER

≤₹100

3

15

Phir Ek Baar Modi Sarkar – Uttar Pradesh

up2022.com

₹3,024,399

4,472

16

Phir Ek Baar Modi Sarkar – Uttar Pradesh

www.up2022.com

₹20,856

67

17

Bhak Budbak – भक बुड़बक

Bhak Budbak – भक बुड़बक

₹603,886

792

18

Bhak Budbak – भक बुड़बक

bhakbudbak.com

₹280,000

297

19

Mahathugbandhan – महाठगबंधन

Mahathugbandhan – महाठगबंधन

₹1,535,101

1,903

20

Telangana Atma Gouravam

telanganaatmagouravam.com

₹1,793,141

4,287

21

Uttarakhand Pukara, Kamal Dobara

kamaldobara.com

₹305,976

454

22

மலரட்டும் தாமரை ஒளிரட்டும் புதுவை – Malrattum Thamarai Olirattum Puthuvai

olirattumputhuvai.com

₹91,917

343

23

வளர்ச்சி பாதையில் தமிழகம் – Valarchi Pathayil Tamizhagam

ValarchiPaadaiyilTamizhagam.com

₹226,415

437

24

Bua Babua – बुआ बबुआ

Bua Babua

₹4,882,654

4,059

25

তেইশে আবার বিজেপি সরকার

TeisheAbarBJPSarkaar.com

₹1,473,099

2,795

26

मोदी साथे राजस्थान

modisaatherajasthan.com

₹412,790

1,110

27

Indian Compass

theindiancompass.com

₹1,002,867

2,070

28

Indian Compass Videos

theindiancompass.com

₹11,115

167

29

Meghalaya with Modi

MeghalayaWithModi.com

₹7,631

5

30

MP बोले फिर भाजपा

mp2023.com

₹171,911

686

31

Pappu Gappu – पप्पू गप्पू

PappuGappu.com

₹446,162

1,487

32

Distoy Farak Shivshahi Parat

DFSP 2019

₹2,173,944

1,748

33

Distoy Farak Shivshahi Parat

shivshahiparat.com

₹154,455

1,059

34

Chuntli Express – ચૂંટલી એક્સપ્રેસ

ChuntliExpress.com

₹8,075,796

3,877

Source: Meta Ad Library report

₹3,47,05,292

48,930

What kind of content do these pages contain?

The Facebook page Phir Ek Baar Modi Sarkar published an advertisement between March 16 and 18, 2023, with the false claim that Asle Toje, vice-chairman of the Nobel Committee, had named Narendra Modi as the top contender for the Nobel Peace Prize. This claim was found to be misleading in Alt News’ fact-check investigation. The ad was removed by Facebook stating that it went against Meta Advertising Standards.

The page has run other ads containing pro-BJP propaganda and posted content targeting opposition parties and leaders. The advertisements run by this page feature BJP and non-BJP leaders like Mamata Banerjee, Tejaswi Yadav, KCR, Rahul Gandhi along with other opposition parties. Some examples of this are shown in the slides below.

Click to view slideshow.

Reach of websites linked to Facebook page (File)

Sr. No.

Facebook Page

Followers

Facebook Page Archive

1

Phir Ek Baar Modi Sarkar

4.2M

https://ghostarchive.org/archive/uewRE

2

Phir Ek Baar Modi Sarkar – Uttar Pradesh

1.2M

https://ghostarchive.org/archive/NFrtA

3

Mahathugbandhan – महाठगबंधन

1.2M

https://ghostarchive.org/archive/k3f11

4

Bua Babua – बुआ बबुआ

899k

https://ghostarchive.org/archive/4VcHk

5

Nirmamata (Page ID – 100565144759425)

829K

https://ghostarchive.org/archive/rHLc6

6

The Frustrated Bengali

655k

https://ghostarchive.org/archive/ONQFn

7

Bhak Budbak – भक बुड़बक

587k

https://ghostarchive.org/archive/VsCSv

8

MP बोले फिर भाजपा

546k

https://ghostarchive.org/archive/1myT9

9

Distoy Farak Shivshahi Parat

454k

https://ghostarchive.org/archive/rw2cY

10

Indian Compass

356k

https://ghostarchive.org/archive/e6d06

11

Chuntli Express – ચૂંટલી એક્સપ્રેસ

344k

https://ghostarchive.org/archive/obfs9

12

2020 Modi Sang Nitish – मोदी संग नीतीश

291k

https://ghostarchive.org/archive/gkOMJ

13

Pappu Gappu – पप्पू गप्पू

248k

https://ghostarchive.org/archive/k1AUL

14

मोदी साथे राजस्थान

245k

https://ghostarchive.org/archive/X2ZoK

15

Telangana Atma Gouravam

236k

https://ghostarchive.org/archive/oN1R5

16

Nirmamata (Page ID – 108923581963430)

200K

https://ghostarchive.org/archive/e0mSp

17

Ghar Ghar Raghubar

183k

https://ghostarchive.org/archive/VBMDf

18

Uttarakhand Pukara, Kamal Dobara

145k

https://ghostarchive.org/archive/Mr78Q

19

Chor Machaye Shor

101k

https://ghostarchive.org/archive/wZcNb

20

Thugs Of Jharkhand

78k

https://ghostarchive.org/archive/1otvn

21

Indian Compass Videos

52k

https://ghostarchive.org/archive/STqvG

22

வளர்ச்சி பாதையில் தமிழகம் – Valarchi Pathayil Tamizhagam

51k

https://ghostarchive.org/archive/i8HHw

23

তেইশে আবার বিজেপি সরকার

37k

https://ghostarchive.org/archive/FgGXw

24

மலரட்டும் தாமரை ஒளிரட்டும் புதுவை – Malrattum Thamarai Olirattum Puthuvai

2k

https://ghostarchive.org/archive/nhc3i

25

Meghalaya With Modi

1.6k

https://ghostarchive.org/archive/wqyOb

Contact details provided by Facebook pages (File)

In the Ad Library Report of Facebook’s parent company Meta, the pages’ contact details (mobile number, email, address and website) have been given in the disclaimer of the advertisements run by them. We noticed that the mobile number (+91 6359907101) is given in the disclaimer of the Facebook page ‘Bhak Budbak’.

When we searched for this number on Google, we discovered that a Facebook page named ‘Paltu Aadmi Party’ had shared it and made an appeal to add it to certain WhatsApp groups. Since the Facebook posts indexed on Google have been deleted, these links are broken. Following this, we searched for this number on Facebook and found two (1, 2) posts by the Facebook page ‘Paltu Aadmi Party’.

In both these posts, the \page shared this mobile number and wrote, “Add our number 6359907101 to your WhatsApp groups to defeat the Aam Aadmi Party”. When we searched for this page in the Meta Ad Library Report, we found that it had run a lot of advertisements on Facebook against Delhi chief minister Arvind Kejriwal and the Aam Aadmi Party. This page spent a total of ₹42,49,050 by running 2,553 ads so far. This confirms that this page is also a part of this network.

The contact details of all the Facebook pages included in this network, taken from the Meta Ad Library Report, are  given in the table below. We will come back to this issue of contact details further on in this story.

Sr. No.

Page Name

Phone Number

Email

Address

1

Thugs Of Jharkhand

7069002055

info@jharkhand2019.com

C34, Harmu Road, Ranchi, India 834001

2

Chor Machaye Shor

8238083437

contact@chormachayeshor.com

Ashoka Enclave Part 1, Sector 35, Faridabad Bypass Road , Faridabad 121003

3

Ghar Ghar Raghubar

7069053616

contact@ghargharraghubar.com

803, Sector 11, Dhanbad Road, Bokaro Steel City 827009

4

The Frustrated Bengali

6359600674

contact@thefrustratedbengali.com

77, Asansol Damohani Road, Asansol 713340

5

The Frustrated Bengali

6359600674

contact@thefrustratedbengali.com

77, Asansol Damohani Road, Asansol 713341

6

The Frustrated Bengali

6359600674

contact@thefrustratedbengali.com

77, Asansol Damohani Road, Asansol 713342

7

Phir Ek Baar Modi Sarkar

9712780999

community@phirekbaarmodisarkar.com

New Dwarka Road, Delhi, New Delhi 110018, IN

8

Phir Ek Baar Modi Sarkar

9712780999

community@phirekbaarmodisarkar.com

6 – A, Pandit Deen Dayal Upadhyaya Marg, Near ITO, Minto Bridge Colony, Barakhamba, New Delhi, India 110002

9

2019 Modi Sang Nitish – मोदी संग नीतीश

6359907104

contact@modisangnitish.com

983, Mahesh Nagar, Indrapuri Main Road, Patna, India 800024

10

2020 Modi Sang Nitish – मोदी संग नीतीश

6359907104

contact@modisangnitish.com

983, Mahesh Nagar, Indrapuri Main Road, Patna, India 800025

11

Nirmamata (Page ID – 100565144759425)

9909003974

hello@nirmamata.com

65, Burdwan Road, Siliguri 734001

12

Nirmamata (Page ID – 100565144759425)

9909003974

hello@nirmamata.com

65, Burdwan Road, Siliguri 734001

13

Nirmamata (Page ID – 108923581963430)

7434019414

contact@nirmamata.com

Kolkata, West Bengal

14

Nirmamata (Page ID – 100565144759425)

9909003974

hello@nirmamata.com

65, Burdwan Road, Siliguri 734001

15

Phir Ek Baar Modi Sarkar – Uttar Pradesh

7069017257

hello@up2022.com

7491-2/D, Service Road, Nishatganj, Lucknow, India 226006

16

Phir Ek Baar Modi Sarkar – Uttar Pradesh

7069017257

hello@up2022.com

7491-2/D, Service Road, Nishatganj, Lucknow, India 226007

17

Bhak Budbak – भक बुड़बक

6359907101

ads@bhakbudbak.com

34, New Bypass Road, Chhoti Pahari, Agam Kua, Patna 800007, IN

18

Bhak Budbak – भक बुड़बक

6359907101

ads@bhakbudbak.com

34, New Bypass Road, Chhoti Pahari, Agam Kua, Patna 800007, IN

19

Mahathugbandhan – महाठगबंधन

9726000135

contact@mahathugbandhan.com

Plot 88D, Sector 62, Noida, India 201309, IN

20

Telangana Atma Gouravam

6357388363

contact@telanganaatmagouravam.com

Hyderabad Guntur Road, Dachepalle, Telangana 522414, IN

21

Uttarakhand Pukara, Kamal Dobara

6357388318

contact@kamaldobara.com

Dehradun Road, Rishikesh 249201

22

மலரட்டும் தாமரை ஒளிரட்டும் புதுவை – Malrattum Thamarai Olirattum Puthuvai

6357298169

contact@olirattumputhuvai.com

New Bypass Road, Arunthathipuram, Puducherry, Puducherry 605007

23

வளர்ச்சி பாதையில் தமிழகம் – Valarchi Pathayil Tamizhagam

6357298168

info@valarchipaadaiyiltamizhagam.com

Chennai Thiruvallur High Road, Avadi, Chennai, Tamil Nadu 600054

24

Bua Babua – बुआ बबुआ

7069017489

contact@buababua.com

21 Kabir Marg, Lucknow, Uttar Pradesh 226001, IN

25

তেইশে আবার বিজেপি সরকার

9638001096

team@teisheabarbjpsarkaar.com

Agartala, Tripura

26

मोदी साथे राजस्थान

8238002774

contact@modisaatherajasthan.com

Jaipur, Rajasthan

27

Indian Compass

7069002289

contact@theindiancompass.com

New Delhi, Delhi

28

Indian Compass Videos

7069002289

contact@theindiancompass.com

New Delhi, Delhi

29

Meghalaya with Modi

8980020775

contact@meghalayawithmodi.com

Shillong, Meghalaya

30

MP बोले फिर भाजपा

6357075201

contact@mp2023.com

Bhopal, Madhya Pradesh

31

Pappu Gappu – पप्पू गप्पू

7069002413

contact@pappugappu.com

Jaipur, Rajasthan

32

Distoy Farak Shivshahi Parat

8758202550

contact@shivshahiparat.com

Mumbai, Maharashtra

33

Distoy Farak Shivshahi Parat

8758202550

contact@shivshahiparat.com

Mumbai, Maharashtra

34

Chuntli Express – ચૂંટલી એક્સપ્રેસ

9925010447

chuntli@chuntliexpress.com

Ahmedabad, Gujarat

Source: Meta Ad Library report

Websites’ link to BJP

We checked one of the websites hosted on the IP address under our purview (13.232.63.153) phirekbaarmodisarkar(dot)com and found that it contained a link to a Facebook page (https://www.facebook.com/PhirSeModiSarkar). The name of this Facebook page is ‘Phir Ek Baar Modi Sarkar’. With more than 42 lakh followers, the page actively posts in support of BJP and against opposition parties. When we looked at ‘Page Transparency’ in the ‘About’ section of this page, we found that it had been created on July 9, 2016 and was earlier named, ‘Uttar Dega Uttar Pradesh’.

It is worth noting that before the Uttar Pradesh 2017 Assembly elections, the BJP had run a campaign named ‘Uttar Dega Uttar Pradesh’. On August 26, 2017, a few months after the elections were over, the name of the page was changed to ‘Har Pradesh Ki Pukar BJP Sarkar’. The name of this page was last changed to ‘Phir Ek Baar Modi Sarkar’ on September 2, 2017. According to information in the ‘Page Transparency’ section, this page has run ads about social issues, elections or politics. However, many of its ads are active. When we checked the ad library of this page, we found that this page actively spends money on Facebook ads in support of BJP and against opposition parties.

While looking for more in formation on this page, we found an article by The Quint dated September 28, 2016. It also contained reports of parties’ social media activity ahead of the 2017 Uttar Pradesh Legislative Assembly elections. According to this report, BJP’s page ‘Uttar Dega Uttar Pradesh’ had about 6 lakh likes.

According to a story by Aaj Tak dated December 5, 2016, BJP Uttar Pradesh had started an initiative called ‘UP Ke Mann Ki Baat’. For this, it had created a website and a Facebook page whose campaign title was ‘Uttar Dega Uttar Pradesh’. According to this report, 14 lakh people had followed the Facebook page ‘Uttar Dega Uttar Pradesh’, 3 lakh more than the Facebook page of BJP Uttar Pradesh.

As per a report by the Hindustan Times dated February 4, 2017, the BJP was using the ‘Uttar Dega Uttar Pradesh’ page on Facebook to publicize the achievements of the Modi government.

On March 12, 2017, The Indian Express reported that ahead of the Uttar Pradesh elections, the BJP had formed teams at several levels to ramp up the party’s social media presence. As many as 10,344 WhatsApp groups were created by these teams and four Facebook pages were operated by these teams to circulate audio and video clips among party members, namely ‘BJP4UP’, ‘Uttar Dega Uttar Pradesh’, ‘Ab Maaf Karo Sarkar’ and ‘U.P. ‘Mann Ki Baat’ is included.

Before the Uttar Pradesh 2017 assembly elections, the BJP had launched a campaign called ‘Uttar Dega Uttar Pradesh‘. This Facebook page was created only in 2016, and its name was later changed to ‘Phir Ek Baar Modi Sarkar’. We found a post on this page dated December 8, 2016, containing the website of the campaign, Facebook page/ Twitter handle username, and mobile numbers.

Facebook/Twitter connection

Since the name and username of this Facebook page have been changed, the Facebook link is broken (404 error). However, the Twitter handle does not have many followers, so the account is inactive and no changes have been made to it. This account has been inactive since the 2017 Uttar Pradesh assembly elections. The last tweet posted by this handle was on March 8, 2017.

It is worth noting that the seventh and final phase of the Uttar Pradesh 2017 assembly elections commenced on March 8, 2017. When we examined old tweets posted by this account, we discovered it is directly connected to the Facebook page ‘Uttar Dega Uttar Pradesh’ (which has now been changed to ‘Phir Ek Baar Modi Sarkar’). We found a tweet dated August 11, 2016 from a Twitter account (@UttarDegaUP) containing a Facebook short link along with the text. By clicking on this link, one reaches the page ‘Phir Ek Baar Modi Sarkar’, whose old name was ‘Uttar Dega Uttar Pradesh’. (The archived version of the redirect link can be accessed here). In addition, along with the text in the Facebook post, the date and time are also exactly the same, both being August 11, 2016 at 3:56 PM.

 

Website/mobile number connection

We noticed that the website ‘upkemannkibaat(dot)com’ and mobile number 7505403403 have been mentioned in the 2016 posts of the Facebook page ‘Phir Ek Baar Modi Sarkar’. Alt News performed a search on Twitter using a date filter, which led us to a tweet posted by the official handle of the BJP and the official handle of BJP Uttar Pradesh containing both this website and mobile number. BJP Uttar Pradesh had also mentioned this website and mobile number in its promo video. The BJP had used this mobile number in its campaign ‘UP Ke Mann Ki Baat’. In 2016, this mobile number was also present on the banner of the official Twitter handle of BJP Uttar Pradesh. This confirms that this mobile number belonged to BJP Uttar Pradesh.

BJP Headquarters address

Alt News applied a date filter in the Meta Ad Library report and checked the disclaimer details of the advertisement posted by the Facebook page ‘Phir Ek Baar Modi Sarkar’ in 2019. We found that an address was mentioned here – (6 – A, Pandit Deen Dayal Upadhyaya Marg, Near ITO, Minto Bridge Colony, Barakhamba, New Delhi, India 110002). When we tried to collect more information about this address, we found that it is the address of BJP’s headquarters. The same address is also given on the BJP’s official website.

Facebook Advertising policy being bypassed

According to Meta’s Advertising Standards, when an advertiser classifies an ad as related to social issues, elections or politics, they must disclose who paid for the ad. Its information is present on the advertisement in the form of ‘Published by’ where the name of the person running the advertisement is given. It is worth noting that on the ‘Create disclaimers and link ad accounts’ page, it is mentioned that any disclaimer created must reflect the name of the organisation or individual paying for the ads.

Apart from this, Facebook also says that this disclaimer does not take the place of any legally required disclaimer and disclosure. It leaves the onus on the advertiser to comply with the applicable laws on advertising. Facebook has established two ways to get the disclaimer approved. The first is through the normal legal name and identity documents. The second is where the advertiser has to provide a self-declared organisation name (India based address, business phone number, website, domain email). After this, the ‘disclaimer’ gets approved.

The easiest way to get this ‘Paid for by’ disclaimer approved is by using those masked websites, which is why they were created. Here, a simple website is created after buying a domain, which contains a link to the Privacy Policy page, Disclaimer page and Facebook. They then create a domain email through the domain purchased earlier. Along with this, they submit their address and mobile number and send it to Facebook for approval.

In the above article, we have compiled the list of addresses submitted by these pages for disclaimer approval in a table. A closer look makes it evident that some addresses are incomplete, containing only the name of the city and state. However, Facebook has given approval to these disclaimers despite the incomplete information, through which these pages continue running advertisements indiscriminately. This is a major flaw in Facebook’s advertising system, which these pages are cashing in on. It allows them to spend crores of rupees on running political ads on the platform without disclosing who paid for them. 

 

The post Exclusive: Network of shadow Facebook pages spending crores on ads to target Oppn are connected to BJP appeared first on Alt News.


This content originally appeared on Alt News and was authored by Abhishek Kumar.

]]>
https://www.radiofree.org/2023/04/04/exclusive-network-of-shadow-facebook-pages-spending-crores-on-ads-to-target-oppn-are-connected-to-bjp/feed/ 0 384962
Who buys electric cars in California — and who doesn’t? https://grist.org/technology/who-buys-electric-cars-in-california-and-who-doesnt/ https://grist.org/technology/who-buys-electric-cars-in-california-and-who-doesnt/#respond Sat, 01 Apr 2023 13:00:00 +0000 https://grist.org/?p=606085 This story was originally published by CalMatters and is republished with permission.

In Atherton, one of the nation’s richest towns, giant oaks and well-manicured hedges surround gated mansions owned by some of Silicon Valley’s most prominent billionaires, basketball stars, tech executives, and venture capitalists. 

Each set on an acre of land, six-bedroom estates, brick-paved pathways, neoclassical statues, and cascading fountains are on full display. But increasingly, another status symbol has been parked in these driveways: a shiny electric car — sometimes two.

This tiny San Mateo County community — with an average home value of almost $7.5 million and average household income exceeding half a million dollars — has California’s highest percentage of electric cars, according to a CalMatters analysis of data from the Energy Commission. About one out of every seven, or 14 percent, of Atherton’s 6,261 cars are electric. 

CalMatters’ statewide analysis of ZIP codes reveals a strikingly homogenous portrait of who owns electric vehicles in California: Communities with mostly white and Asian, college-educated, and high-income residents have the state’s highest concentrations of zero-emission cars. And most are concentrated in Silicon Valley cities and affluent coastal areas of Los Angeles and Orange counties.

This racial and economic divide may be unsurprising — but it illustrates the mammoth task that California faces as it tries to electrify its 25 million cars to battle climate change, clean up its severe air pollution, and reduce reliance on fossil fuels. Under a state mandate enacted last year, 35 percent of cars sold in California, beginning with 2026 models, must be zero-emissions, ramping up to 68 percent in 2030 and 100 percent in 2035.

But if people who buy electric cars are largely white or Asian, highly educated, wealthy, coastal suburbanites, will the state’s transformation succeed? Will new electric cars be attainable for all Californians — no matter their race, income, and location — in the coming decade? 

High upfront vehicle costs, lack of chargers for renters, and inadequate access to public charging stations in low-income and rural communities hamper California’s ability to expand EV ownership beyond affluent parts of the Bay Area and Los Angeles area. 

The cost of new electric cars is the most obvious factor driving the racial and income disparities in who buys them: The average as of February was $58,385 — about $9,600 more than the average car — although it dropped from about $65,000 last year. Lower-end fully electric cars start around $27,500

Kevin Fingerman, an associate professor of energy and climate at California State Polytechnic University Humboldt, said the primary reason why more people in white, affluent, college-educated communities own electric cars is that they tend to be early adopters of new technology, with easier access.

“California is prioritizing the rapid electrification of the light-duty vehicle sector and it’s right in doing so. But it’s going to be important in the process to make sure that there is equitable access,” said Fingerman, who co-authored a study on racial and income disparities to electric vehicle charging. 

To rapidly electrify the fleet, state officials must address the roadblocks causing the wide gaps in electric vehicle ownership: Expanding the state’s public and in-home charging networks, funding more rebates for low and middle-income residents, and increasing the pool of used electric cars. The goal is to give consumers confidence in the reliability and affordability of the cars and reduce their anxiety about limited range and charging availability.

Th exterior of a mansion with three electric cards parked out front.
Two electric cars are parked at a home in Atherton. About one out of every seven cars in the community — where more than 86% of the residents are white or Asian — are electric. Martin do Nascimento / CalMatters

“As more electric vehicles are on the road, we’re going to need to be creative about policy solutions to address those issues to make sure that the benefits of owning an electric vehicle are shared across the demographics in the state of California and beyond,” Fingerman said.  

A portrait of electric car hotspots

About 838,000 electric cars were on California’s roads in 2021, and under the state mandate, it’s expected to surge to 12.5 million by 2035.

No statewide data exists to break down the race or other demographic characteristics of California’s car buyers. But CalMatters compared the ZIP codes of 2021 electric car registrations with Census information on the race, income, and education of people in those ZIP codes. (Electric cars include battery-only models, plug-in hybrids and fuel-cell electric vehicles. ZIP codes with fewer than 1,000 residents were excluded from the analysis.)

California’s highest concentrations of electric cars — between 10.9 percent and 14.2 percent of all vehicles — are in ZIP codes where residents are at least 75 percent white and Asian. In addition to Atherton, that includes neighborhoods in Los Altos, Palo Alto, Berkeley, Santa Monica, and Newport Coast, among others.

In stark contrast, California ZIP codes with the largest percentages of Latino and Black residents have extremely low proportions of electric cars.

In the 20 California ZIP codes where Latinos make up more than 95 percent of the population — including parts of Kings, Tulare, Fresno, Riverside, and Imperial counties — between zero and 1 percent of cars are electric.

And 17 of the 20 communities with the highest percentage of Blacks have between zero and 2.6 percent electric cars. (Los Angeles’ relatively affluent Ladera Heights and two Oakland ZIPs have between 3.3 percent and 4.7 percent.)

Still, not all communities with a lot of electric car drivers are majority white. Four of the top 20 EV ZIP codes have more Asian residents than white. For instance, more than three-quarters of residents in Fremont’s 94539, which is ranked 14th with 11.4 percent of registered cars electric, are Asian.

Income seems to be a main driver of the disparities, according to CalMatters’ analysis. Most of the median household incomes in the top 10 exceed $200,000, much higher than the statewide $84,097. Typical home values in those communities exceed $3 million, according to Zillow estimates.

In contrast, electric cars are nearly non-existent in California’s lowest income communities: only 1.4 percent of cars in Stockton’s 95202, where the median household income is $16,976, and 0.5 percent in Fresno’s 93701, where the median is $25,905. Most are plug-in hybrids, which are less expensive.

Also, at least three-quarters of residents in the top 10 communities for electric vehicle ownership have a bachelor’s degree or higher. 

A white Tesla is parked outside of a home.
Tesla lowered the prices of its electric cars by 20% to try to make them affordable and quality for federal credits. But their starting prices still range from $55,000 to $90,000. Martin do Nascimento / CalMatters

Rural and remote parts of the state — even the entire Central Valley — also are left out of the top ZIP codes with electric cars. With limited charging access, rural residents who drive long distances fear they’ll get stranded if their car runs out of juice.

“It makes sense why we would see way more concentrations of EVs in densely urban areas or populated areas,” Fingerman said. “The barriers to people owning electric vehicles across the demographics in the state are real. But they’re solvable.” 

Black and Latino residents — who make up almost half of California’s population — are less than half as likely as whites to have access to a public charger, according to the study Fingerman co-authored. Disparities in access are also higher in areas with more multi-unit housing, the study showed. 

Yet interest in electric cars is high across all incomes and races, according to a 2019 survey conducted by Consumer Reports and the Union of Concerned Scientists. 

About a third of survey respondents making $50,000 to $99,999 a year and under $50,000 a year expressed some interest in an electric car as their next purchase. People of color also expressed interest, with 42 percent saying they would consider an electric vehicle as their next car.

Affordability: ‘The average person can’t afford to buy’ an EV

Christopher Bowe, 48, of Hayward in Alameda County, considers himself an early adopter of new technology. He purchased his electric Ford F150 Lightning new for $70,000 late last year. 

Bowe lives in a ZIP code where only 2 percent of cars are electric, but he lives next to Fremont’s 94539, where it’s 11.4 percent, so he regularly sees a lot of drivers with electric models.

Bowe, who makes a little more than $100,000 a year working for FedEx, said his income and living situation made it easy for him to opt for an electric vehicle: He lives in a single-family house with residential solar, which allows him to charge at home and keep his electric bill low.

Bowe had always been interested in buying an electric vehicle, but finding a pickup truck that suited his needs was a challenge for years. The 2022 F-150 Lightning was one of the first electric trucks to hit the market, and it sold out quickly.

“I’ve always been a truck guy and everything previous was kind of small, underpowered,” he said. “I’m a 300-pound guy. I like being up above the traffic and being able to see out in front of me. It fits my body size better.” 

Bowe worries that the state’s 2035 timeline for 100 percent new electric models could be moving too fast because of the lack of affordable options. He said automakers should be given incentives to offer more affordable options.

The California Air Resources Board did build some incentives into its mandate: Automakers qualify for credits toward meeting their zero-emission sales target through 2031 if they sell cars at a 25 percent discount through community-based programs, or if they offer passenger cars for less than $20,000 and light trucks for under $27,000.

Automakers say they are working to speed up production and develop more affordable models. Tesla in January slashed prices for all models by 20 percent, which made the cars eligible for a $7,500 federal tax credit. Base prices are now $55,000 and $90,000. Two weeks later, Ford cut the price of its most popular Mustang Mach-E by 6 percent to 9 percent, to a starting price of $46,000.

“We are producing more EVs to reduce customer wait times, offering competitive pricing and working to create an ownership experience that is second to none,” said Marin Gjaja, Ford’s chief customer officer. “We will continue to push the boundaries to make EVs more accessible for everybody.”

A smiling bald man in a green sweatshirt sits in the front seat of his black truck.
Chris Bowe sits in the door of his all-electric Ford Lightning truck, which he purchased new for $70,000. Felix Uribe / CalMatters

David Reichmuth, a senior engineer at the Union of Concerned Scientists who studies EV market trends, said the state’s mandate will help drive the market and lower prices, narrowing the gap between electric models and gas cars over the next 12 years. 

“We know that new car buyers, both gasoline and EV buyers, are more affluent than the general population and more affluent than used car buyers,” Reichmuth said. Nearly half of all new cars nationwide are bought by households with incomes exceeding $100,000, according to his study based on 2017 data. “As the new rules kick in, we’re going to see a greater number of options go electric. That’s also going to make these vehicles more affordable.”

In the meantime, state and federal rebates and grants are critical to making the vehicles more affordable, said air board spokesperson Melanie Turner. 

The air board last year approved $326 million in purchase incentives for low-income consumers, Turner said. Eligible residents can receive up to $15,000 for a new electric car and up to $19,500 for trading in a gas car — an increase of $3,000 from the state’s previous offerings. The programs accept applications from residents with incomes at or below 300 percent of the federal poverty level — equivalent to $43,740 for an individual or $90,000 for a family of four.

In recent years, however, the programs have experienced inconsistent and inadequate funding. Last year low-income consumers were turned away — funding had run out and waitlists were shut down because of backlogs.

Problems with the Clean Vehicle Assistance Program were resolved last year, Turner said. “We paid all the applications on the reservation list and we are getting ready to reopen the program with new criteria soon,” she said.

The state credits can be combined with new federal tax credits under the Inflation Reduction Act. Through 2032, eligible car buyers — with caps on income and price – can get up to $7,500 for a new electric vehicle and up to $4,000 for a used one.

“We are hoping this boost in incentives for clean car purchases will help to make a difference,” Turner said. 

Electric cars require far less maintenance and have lower operating costs than their gas-powered counterparts, making them less expensive over time. Car drivers will save an estimated $3,200 over 10 years for a 2026 electric car compared to a gas-powered car, and $7,500 for a 2035 car, according to the air board’s estimates. 

‘We need better options for renters’

Charging remains one of the biggest concerns for people who own or are interested in buying an electric vehicle. California has about 80,000 public chargers, with another estimated 17,000 on the way. But the state will need 1.2 million for the 7.5 million electric vehicles expected on the roads by 2030.

Many people residing in apartments or condominiums are reliant on public charging stations because they don’t have chargers in their buildings’ parking garages. A standard level 2 charger costs between $500 and $700, plus installing an electricity meter costs $2,000 to $8,000 or more, according to Pacific Gas & Electric

Urvi Nagrani, 35, of Los Altos in Santa Clara County, charges her 2021 Chevy Bolt at public stations. She lives in an accessory dwelling unit with no home charger.

“People living in Silicon Valley have home chargers,” she said. “But we need to have better options for renters because it hasn’t gotten much better for me as a renter.” 

A smiling woman with curly black hair and sunglasses and a dark shirt stands outside the door of her black electric car.
Urvi Nagrani stands with her 2021 Chevy Bolt, which she’s leasing for $196 a month. Shelby Knowles for CalMatters

ZIP code 94024, where Nagrani lives, ranks fifth statewide in percentage of electric vehicles. Of its 19,089 car registrations, 13.4 percent are electric. Nagrani said there are plenty of public charging stations available — but some are broken or occupied, with long wait times.

Even worse, she often takes long road trips and experiences many more challenges finding reliable chargers on the road. Navigating the apps showing locations of charging stations can be confusing.

“There are trade-offs,” she added. “I got my EV with very clear eyes.” 

Nagrani said she leased her Chevy Bolt for $196 per month when she had a $180,000-a-year job. She was recently laid off from her tech job, joining thousands of others in the Silicon Valley who are suddenly unemployed.

Richard Landers, 75, a retiree in Santa Monica, earns more than $200,000 a year from his investments. He loves his Tesla 2015 Model S, which he bought new for about $90,000 that year. 

“It’s a wonderful drive, I have had essentially no maintenance requirements in seven years and I feel good — not perfect, because it’s still a car — about my reduced environmental impact as a driver,” he said. 

Landers, who lives in a mid-rise condominium, said he wouldn’t have switched to an electric vehicle if he couldn’t charge his car in his garage. Landers had Southern California Edison install an electric meter and hired an electrician to equip his parking space in the condo’s garage with a charger, which cost him about $2,500, he said. 

Landers’ 90402 ZIP code ranks sixth on the list of California areas with the highest percentage of electric vehicles — 13.3 percent of its 8,178 cars. But even there, charging is a big problem for his neighbors in Santa Monica’s multi-family dwellings, he said. 

“Having the ability to charge at home is very important to making electric vehicles attractive and practical for most people,” he said. 

Landers worries that delayed progress in installing chargers in multifamily buildings could delay the transition to electric vehicles. 

It’s a widespread problem that state leaders have been trying to address. By January 2025, a new law passed last year will require the state to adopt regulations requiring businesses to install charging stations in existing commercial buildings. Another 2022 law will require new and existing buildings, including hotels, motels, and multi-family dwellings, to install charging stations. 

The state is helping fund some of these chargers through grants, including a recent investment of $26 million for 13 projects in multi-family homes, said Hannon Rasool, director of the California Energy Commission’s fuels and transportation division.

A balding man in loafters, khakis, and a down coat stands with his silver electric vehicle on the beach.
Richard Landers stands with his Tesla 2015 Model S, purchased new for $90,000. Lauren Justice for CalMatters

The rural dilemma: ‘They don’t want to get stuck’ 

Kay Ogden, 62, an avid environmentalist and executive director of the Eastern Sierra Land Trust, has driven her Ford Mustang Mach-E SUV for a little more than a year. She loves her electric car, which she purchased new for about $60,000.

But Ogden, who lives in the Sierra Nevada foothills 18 miles northwest of Bishop, said her rural community’s lack of public chargers has been a big issue for her. There aren’t enough reliable, working chargers or fast chargers for non-Teslas In Inyo County.

San Mateo County has 4,398 public chargers serving its 747 square miles, while Inyo County has just 49 chargers across its massive 10,140-square miles — home to just 19,000 residents but visited by hundreds of thousands of hikers, skiers, anglers and other tourists. Sierra County, with 3,300 residents, has just one public level 2 charger.

Ogden often drives long distances — at least 80 miles per day — to work, buy groceries, and obtain services such as medical care. The region’s cold temperatures also can substantially reduce an electric car’s range.

Ogden initially had range anxiety so she started looking for a hybrid, but changed her mind to avoid purchasing another vehicle with an internal combustion engine reliant on fossil fuels. She chose a model with a longer range, 275 miles, to help ease her anxiety. 

“Going from gas, going fully electric seemed so scary,” she said. “But hybrids still have internal combustion engines. So I evolved. I decided, I’m just jumping in. I’m going for it. I’m going to go electric.”

A smiling woman in a red vest stands in front of a red car while it snows.
Shown with her electric Mustang as it begins to snow, Kay Ogden, who lives in Inyo County’s Round Valley, struggles to find enough working public chargers near her remote community in the remote foothills of the Sierra Nevada. Lou Bank for CalMatters

Bob Burris, deputy chief economic development officer at the Rural County Representatives of California, which represents 40 counties, said rural residents have widespread interest in electric vehicles, but the lack of public chargers has deterred many. 

“They might have charging in their homes, but it is still a challenge for them to go anywhere,” he said. “They don’t want to get stuck on the side of the road, or if they’re escaping from a wildfire or a natural disaster and you need to move without readily available public charging.” 

None of the top ZIP codes with high concentrations of electric vehicles are in the middle of the state — including the vast Central Valley — or in eastern counties. Instead, they are congregated along the coasts in populous parts of the Bay Area and Los Angeles, according to CalMatters’ analysis.

The unpredictability of charging stations in Sierra Nevada towns has been deeply frustrating, Ogden said. 

“I go to charge at a certain place and three out of five are broken, or they’ve been vandalized and maybe there’s snow or trash piled up by one and you can’t get to it,” Ogden said. “The companies need to be held accountable for having chargers that are listed on apps that don’t work.”

More than half of 3,500 drivers in a nationwide survey, conducted by the consumer advocacy group Plug In America, reported encountering problems with broken public chargersAnother survey by the air board found barriers to charging and broken chargers.

State officials do not track numbers of broken chargers, Rasool of the California Energy Commission, said. But state lawmakers last year passed legislation establishing a reporting mechanism for broken chargers at publicly funded stations. The state also plans to inspect state-funded chargers to assess how many need repair, he said. 

The new law, however, “doesn’t give us the authority to require (reports) from a fully privately funded charging station,” he said. “We’re very committed, but we do think we need to ensure the whole network — whether we fund it or not — is reliable for drivers.” 

The rural county organization is helping local governments access public money and streamline their permitting process for building new charging stations.

“If there’s a pretty robust charging system in rural areas, there’s going to be more people interested in buying EVs,” Burris said. “I don’t think we’re going to hit our goals as a state unless rural areas are included a bit more than they have been in recent years.”

This story was originally published by Grist with the headline Who buys electric cars in California — and who doesn’t? on Apr 1, 2023.


This content originally appeared on Grist and was authored by Erica Lee.

]]>
https://grist.org/technology/who-buys-electric-cars-in-california-and-who-doesnt/feed/ 0 384216
Biden administration releases road map to scale up nuclear, hydrogen, and energy storage https://grist.org/technology/biden-administration-releases-roadmap-to-scale-up-nuclear-hydrogen-and-energy-storage/ https://grist.org/technology/biden-administration-releases-roadmap-to-scale-up-nuclear-hydrogen-and-energy-storage/#respond Fri, 31 Mar 2023 10:30:00 +0000 https://grist.org/?p=606513 Last week, the Department of Energy, or DOE, released a road map for scaling up three emerging technologies that could make or break the U.S. energy transition. According to the agency, advanced nuclear, clean hydrogen, and long-duration energy storage are crucial for reaching net-zero emissions. The problem is, self-sustaining markets for these technologies don’t exist yet. 

The department’s new “Pathways to Commercial Liftoff” reports identify key challenges and potential solutions for getting these industries off the ground. They provide, for the first time, concrete numbers on how much additional energy capacity is needed from each of the three new technologies to reach U.S. climate goals. They also spell out how much money private and government actors will need to invest in research and development, and what challenges stand in the way of commercializing these sectors. 

The Biden administration aims to halve emissions by 2030 and hit net-zero emissions by 2050. These fast-approaching deadlines mean that the next few years are critical for redrawing the energy landscape. 

“It’s an all-hands-on-deck situation, but it’s also an all-technologies-on-deck situation,” said DOE chief commercialization officer Vanessa Chan in a webinar last week introducing the new reports. “We want to ensure that we’re looking at all technologies that can help toward the president’s ambitious climate goals.” 

The “liftoff” reports mark one of the first concrete steps the Biden administration has taken to map out how the government will spend billions in recent clean energy funding. As a result of laws including the 2021 bipartisan infrastructure law, the 2022 Inflation Reduction Act, and the CHIPS and Science Act, which provides energy investments and boosts U.S. semiconductor manufacturing, the DOE now holds tens of billions in climate investments to spend over the next decade.

This huge pot of money means that the agency can help “buy down risk” for companies and private investors that remain hesitant to wade into new energy territory, according to Chan. The new reports highlight the federal government’s plans to help jump-start three new industries.

“Advanced nuclear” is a catch-all term for new nuclear reactor models that improve on the safety and efficiency of traditional reactor designs. Advanced nuclear could help provide stable, reliable electricity to complement renewables like solar and wind, which fluctuate throughout the day. But the nuclear industry is at a “stalemate,” according to the department. Recent nuclear projects have tended to go over budget and run into delays, leaving both project developers and utilities wary about investing in new reactors. 

The DOE says the U.S. will need an additional 200 gigawatts of advanced nuclear power to reach its climate goals, enough to power about 160 million homes. Getting there will require $35 billion to $40 billion in private and public investments by 2030, and about $700 billion total by 2050. Crucially, the report says that at least five to 10 new reactors need to be in development across the country by 2025 for the U.S. to hit its goals. 

Like nuclear, long-duration energy storage aims to provide a stable source of power. The technology includes batteries and other grid-connected systems that can store energy from renewables and then dispatch it for 10 hours or longer when the wind isn’t blowing and the sun isn’t shining. About 225 to 460 gigawatts of long-duration energy storage could come online by 2050, the DOE report says — but first, capital costs need to go down by half. And reaching market viability will require $330 billion in investments by 2050. 

A green-tech "REFHYNE" hydrogen production plant at the Shell Energy and Chemicals Park Rheinland on July 02, 2021 in Wesseling, Germany.
A view of the green-tech “REFHYNE” hydrogen production plant in Wesseling, Germany. Andreas Rentz / Getty Images

Clean hydrogen, a fuel produced using renewable energy, has the potential to replace traditional fossil fuels in industries that can’t easily run directly on clean electricity. Today, hydrogen is almost exclusively produced from fossil fuels, and is primarily used for oil refining and chemical fertilizers. But if clean hydrogen can get to commercial scale, the DOE estimates that hydrogen alone could reduce U.S. carbon emissions by 10 percent by 2050 by replacing fossil fuels in aviation, shipping, and industries that currently use hydrogen as a feedstock, like ammonia and methanol production. 

Sasan Saadat, a senior research and policy analyst at Earthjustice, stressed the importance of first displacing today’s use of fossil fuel-derived hydrogen before turning to novel sectors like road transportation and aviation. “It would be foolish to invest in creating new demand before we finish cleaning up hydrogen’s existing footprint,” he told Grist. 

He lauded the “liftoff” reports for highlighting this near-term goal. But as the agency moves forward with public investments, Saadat said officials will need to provide clear guidance on which end uses to prioritize. Otherwise, “We may end up with a situation where we use a bunch of scarce green hydrogen to do things that electricity could have done more easily.”

Some industry experts have also raised concerns about the lack of options for safely transporting and storing hydrogen fuel. The DOE has already earmarked $8 billion toward funding up to 10 regional “hydrogen hubs,” in the hopes of creating a network of infrastructure to address transportation concerns. In all, the public and private sectors would need to commit $85 billion to $215 billion to hydrogen through 2030 to align with U.S. climate goals. 

DOE officials emphasized that the reports — developed after dozens of conversations with companies, investors, and technical experts — are not prescriptive. As “living, breathing documents,” the reports will be regularly updated according to the most up-to-date information and ongoing consultation with relevant industries.

“The introduction of any new energy technology at scale is not a linear path,” said David Crane, director of the Energy Department’s Office of Clean Energy Demonstrations. “It’s a winding road with speed bumps all along the way.” 

This story was originally published by Grist with the headline Biden administration releases road map to scale up nuclear, hydrogen, and energy storage on Mar 31, 2023.


This content originally appeared on Grist and was authored by Akielly Hu.

]]>
https://grist.org/technology/biden-administration-releases-roadmap-to-scale-up-nuclear-hydrogen-and-energy-storage/feed/ 0 383785
Senator Bernie Sanders and Starbucks CEO face off at hearing; House Democrats renew call for gun safety legislation as Nashville mourns school shooting victims; California Assembly panel approves ban on police use of facial recognition technology: Evening News March 29 2023 https://www.radiofree.org/2023/03/29/senator-bernie-sanders-and-starbucks-ceo-face-off-at-hearing-house-democrats-renew-call-for-gun-safety-legislation-as-nashville-mourns-school-shooting-victims-california-assembly-panel-approves-ban/ https://www.radiofree.org/2023/03/29/senator-bernie-sanders-and-starbucks-ceo-face-off-at-hearing-house-democrats-renew-call-for-gun-safety-legislation-as-nashville-mourns-school-shooting-victims-california-assembly-panel-approves-ban/#respond Wed, 29 Mar 2023 18:00:50 +0000 http://www.radiofree.org/?guid=70e86f4474a3ef43bc83aa40f3835075

 

Image: elliotstoller, CC BY-SA 2.0 , via Wikimedia Commons

The post Senator Bernie Sanders and Starbucks CEO face off at hearing; House Democrats renew call for gun safety legislation as Nashville mourns school shooting victims; California Assembly panel approves ban on police use of facial recognition technology: Evening News March 29 2023 appeared first on KPFA.


This content originally appeared on KPFA - The Pacifica Evening News, Weekdays and was authored by KPFA.

]]>
https://www.radiofree.org/2023/03/29/senator-bernie-sanders-and-starbucks-ceo-face-off-at-hearing-house-democrats-renew-call-for-gun-safety-legislation-as-nashville-mourns-school-shooting-victims-california-assembly-panel-approves-ban/feed/ 0 383280
Elon Musk’s Twitter Widens Its Censorship of Modi’s Critics https://www.radiofree.org/2023/03/28/elon-musks-twitter-widens-its-censorship-of-modis-critics/ https://www.radiofree.org/2023/03/28/elon-musks-twitter-widens-its-censorship-of-modis-critics/#respond Tue, 28 Mar 2023 21:16:16 +0000 https://theintercept.com/?p=424854

Two months after teaming up with the Indian government to censor a BBC documentary on human rights abuses by Prime Minister Narendra Modi, Twitter is yet again collaborating with India to impose an extraordinarily broad crackdown on speech.

Last week, the Indian government imposed an internet blackout across the northern state of Punjab, home to 30 million people, as it conducted a manhunt for a local Sikh nationalist leader, Amritpal Singh. The shutdown paralyzed internet and SMS communications in Punjab (some Indian users told The Intercept that the shutdown was targeted at mobile devices).

While Punjab police detained hundreds of suspected followers of Singh, Twitter accounts from over 100 prominent politicians, activists, and journalists in India and abroad have been blocked in India at the request of the government. On Monday, the account of the BBC News Punjabi was also blocked — the second time in a few months that the Indian government has used Twitter to throttle BBC services in its country. The Twitter account for Jagmeet Singh (no relation to Amritpal), a leading progressive Sikh Canadian politician and critic of Modi, was also not viewable inside India.

Under the leadership of owner and CEO Elon Musk, Twitter has promised to reduce censorship and allow a broader range of voices on the platform. But after The Intercept reported on Musk’s censorship of the BBC documentary in January, as well as Twitter’s intervention against high-profile accounts who shared it, Musk said that he had been too busy to focus on the issue. “First I’ve heard,” Musk wrote on January 25. “It is not possible for me to fix every aspect of Twitter worldwide overnight, while still running Tesla and SpaceX, among other things.”

Two months later, he still hasn’t found the time. Musk had previously pledged to step down as Twitter CEO, but no public progress has been made since his announcement.

While Modi’s suppression has focused on Punjab, Twitter’s collaboration has been nationwide, restricting public debate about the government’s aggressive move. Critics say that the company is failing the most basic test of allowing the platform to operate freely under conditions of government pressure.

“In India, Twitter, Facebook, and other social media companies have today become handmaidens to authoritarianism,” said Arjun Sethi, a human rights lawyer and adjunct professor of law at Georgetown University Law Center. “They routinely agree to requests not just to block social media accounts not just originating in India, but all over the world.”

Punjab was the site of a brutal government counterinsurgency campaign in the ’80s and ’90s that targeted a separatist movement that sought to create an independent state for Sikhs. More recently, Punjab was the site of massive protests by farmers groups against bills to deregulate agricultural markets. The power struggles between the government and resistance movements have fueled repressive conditions on the ground.

“Punjab is a de facto police state,” said Sukhman Dhami, co-director of Ensaaf, a human rights organization focused on Punjab. “Despite being one of the tiniest states in India, it has one of the highest density of police personnel, stations and checkpoints — as is typical of many of India’s minority-majority states — as well as a huge number of military encampments because it shares a border with Pakistan and Kashmir.”

“Punjab is a de facto police state.”

Modi’s Hindu nationalist government has justified its efforts to arrest followers of Amritpal Singh by claiming that he was promoting separatism and “disturbing communal harmony” in recent speeches.

In late February, Singh’s followers sacked a Punjab police station in an attempt to free allies held there. The Indian media reported that the attack triggered the government’s response.

In the void left by Twitter blocks and the internet shutdown across much of the region, Indian news outlets, increasingly themselves under the thumb of the ruling government and its allies, have filled the airwaves with speculation on Singh’s whereabouts. On Tuesday, Indian news reports claimed that CCTV footage appeared to show Singh walking around Delhi masked and without a turban.

The Modi administration has told the public a story of a dangerous, radical preacher who must be stopped at any cost. Efforts by dissidents to contextualize Modi’s crackdown within his increasingly intolerant and authoritarian nationalism have been smothered by Twitter.

“People within Punjab are unable to reach one another, and members of the diaspora are unable to reach their family members, friends, and colleagues,” Sethi told The Intercept. “India leads the world in terms of government imposed blackouts and regularly imposes them as a part of mass censorship and disinformation campaigns. Human rights defenders documenting atrocities in Punjab are blocked, and activists in the diaspora raising information about what is happening on the ground are blocked as well.”

Modi’s government tried to throttle Twitter even before Musk’s takeover. Twitter India staff have been threatened with arrest over refusals to block government critics and faced other forms of pressure inside the country. At the time that Musk took charge of the company, it had a mere 20 percent compliance rate with Indian government requests. Following massive layoffs that reduced 90 percent of Twitter India’s staff, the platform appears to have become far more obliging in the face of government pressure, as its actions to censor its critics now show.

Musk, who has consistently characterized his acquisition of Twitter as a triumph of free speech, has framed his compliance as mere deference to the will of governments in countries where Twitter operates. “Like I said, my preference is to hew close to the laws of countries in which Twitter operates,” Musk tweeted last year. “If the citizens want something banned, then pass a law to do so, otherwise it should be allowed.”

“The main thing that the Indian government is trying to accomplish is to protect the reputation of Modi.”

Critics say that Musk’s policy of deferring to government requests is dangerous and irresponsible, as it empowers governments to suppress speech they find inconvenient. And a request from the executive branch is not necessarily the same thing as an order from a court; under previous ownership, Twitter regularly fought such requests from government officials, including those in the Modi administration.

As the manhunt for Singh and his supporters continues, large protests have broken out in foreign countries with large Punjabi diasporas, including a protest in London that resulted in the vandalism of the Indian Embassy. Despite this backlash, Modi appears to be pressing ahead with internet shutdowns.

“The main thing that the Indian government is trying to accomplish is to protect the reputation of Modi,” said Dhami. “They have a zero tolerance for anything that harms his reputation, and what triggers them most of all is a sense that his reputation is being attacked.”


This content originally appeared on The Intercept and was authored by Ryan Grim.

]]>
https://www.radiofree.org/2023/03/28/elon-musks-twitter-widens-its-censorship-of-modis-critics/feed/ 0 382797
Anti-Palestinian Hate on Social Media Is Growing, Says a Facebook Partner https://www.radiofree.org/2023/03/27/anti-palestinian-hate-on-social-media-is-growing-says-a-facebook-partner/ https://www.radiofree.org/2023/03/27/anti-palestinian-hate-on-social-media-is-growing-says-a-facebook-partner/#respond Mon, 27 Mar 2023 09:00:18 +0000 https://theintercept.com/?p=424550

Violent and racist anti-Palestinian rhetoric grew more prevalent across social media platforms last year, according to a new report published by 7amleh, an organization that partners with Meta, the parent company of Instagram and Facebook.

Hateful anti-Palestinian remarks grew by 10 percent in 2022, compared to the prior year, according to the new report, based on an aggregated analysis of mentions of “Arabs,” “Palestinians,” and related keywords by Israeli social media users. 7amleh attributes the increase to a spate of real-world violence, including the killing of Al Jazeera journalist Shireen Abu Akleh and Israeli military raids at the Al-Aqsa Mosque in Jerusalem. As The Intercept previously reported, 2022 was the deadliest year for Palestinians in the West Bank since the end of the Second Intifada, with 2023 already on track to surpass that toll.

“The 10 percent increase in violent speech against Arabs and Palestinians is alarming and should be taken on serious matter from the tech giants so that everyone enjoys their rights and freedoms in this digital space,” said Mona Shtaya, the advocacy and communications director of 7amleh.

“The 10 percent increase in violent speech against Arabs and Palestinians is alarming.”

The 7amleh report also claims a pronounced increase in bigotry and violent incitement directed against Palestinian members of the Knesset, Israeli’s parliamentary body, a spike attributed to the coalition government formed by Knesset members Naftali Bennett and Yair Lapid. Much of Bennett’s hateful rhetoric flagged in the report took the shape of claims that Arabs are terrorists, that Arab members of the Knesset support terrorism, and calls for the death or forced displacement of Palestinian Arabs.

While the report states Facebook remains a hotbed of anti-Arab hate, “Twitter continues to be the main platform for violent discourse against Palestinians inside Israel.”

Civil society groups like 7amleh have long tracked the ways in which social media platforms censor Palestinians online through biased, lopsided enforcement of content moderation policies, using rulebooks that often conflate nonviolent political speech with the endorsement of terrorism.

Following The Intercept’s publication of Meta’s roster of so-called Dangerous Individuals and Organizations, content moderation scholars noted that Middle Eastern, South Asian, and Muslim people and groups were overrepresented. 7amleh and other groups say these biases result in imbalanced censorship for Palestinians and relative latitude for Israelis during periods of violence.

7amleh is one of hundreds of global civil society organizations Meta has worked with in an effort to “better understand the impact” of its platforms around the world. “We partner with expert organizations that represent the voices and experiences of marginalized users around the globe and are equipped to raise questions and concerns about content on Facebook and Instagram,” Meta says on its website. “In addition to reporting content, Trusted Partners provide crucial feedback on our content policies and enforcement to help ensure that our efforts keep users safe.”

Advocates for Palestinian rights say those efforts have fallen flat.

“The Israeli right wing has been more than happy to declare on social media what they’d like to do to the Palestinian people,” Ubai Al-Aboudi, a Palestinian human rights activist and executive director of the Bisan Center for Research and Development, a prominent civil society group, told The Intercept. “There is a proliferation of hate speech against Palestinians. And this is the result of an asymmetrical power relation where big tech is happy to endorse the Israeli narrative while meanwhile suppressing the Palestinian narrative.”

Proliferation of online anti-Palestinian rhetoric and explicit incitement to violence was on display earlier this year during one of the worst episodes of violence by Israeli settlers in the West Bank to date. Hundreds of settlers went on a nighttime rampage in the town of Huwara, near the city of Nablus, torching homes and cars. One Palestinian was killed, and dozens more were injured.

The incident, which was widely condemned and referred to as a “pogrom,” was also widely celebrated on social media, including by top figures in Israel’s new extremist government. Bezalel Smotrich, a far-right politician who is Israel’s current finance minister and a minister of defense in charge of civilian affairs in the West Bank, liked a tweet that made a call “to wipe out the village of Huwara today.” Later, Smotrich publicly repeated the remark himself, before being forced to apologize. (Two weeks after making those comments, Smotrich was in the U.S., where he was shunned by officials and several prominent Jewish organizations, but welcomed by others.)

The rampage in Huwara, which was documented in real time on social media, was launched following public calls for an attack against the town after a Palestinian man killed two Israeli settlers as they drove through. In the days following the attack, incitement to violence only escalated, with several accounts, including one popular among settlers, calling for yet more “vengeance.”

“The Israeli right wing is promoting hate speech on social media against Palestinians, like the pogrom on Huwara,” said Al-Aboudi of the Bisan Center for Research and Development. “They were calling for it, before it happened, on social media. And even after the incident, the celebrations were well tolerated by big tech.”

7amleh’s findings on the proliferation of anti-Palestinian online speech stand in stark contrast with social media companies’ active crackdown on Palestinian speech online. As The Intercept has repeatedly reported, platforms’ content moderation policies are regularly enforced in an arbitrary manner that has resulted in the censorship of Palestinian voices, including the frequent suspensions of Palestinian journalists’ accounts.

Last year, a review commissioned by Meta concluded that the company’s actions during a May 2021 Israeli bombing campaign on the occupied Gaza Strip had an “an adverse human rights impact … on the rights of Palestinian users to freedom of expression, freedom of assembly, political participation, and non-discrimination, and therefore on the ability of Palestinians to share information and insights about their experiences as they occurred.”

The report’s conclusions also point to a glaring double standard in Israeli officials’ efforts to moderate online speech. Israel has long worked with social media companies in an effort to remove content that it considers incitement, frequently flagging posts for removal.

Earlier this year, Israeli officials with the Knesset’s Committee for Immigration, Absorption and Diaspora Affairs revealed that they had proactively lobbied TikTok for content removal to rates significantly higher than those of most other countries. The officials cited partial reports from TikTok for 2022 that it received 2,713 requests from various governments around the world to remove or limit content or accounts, with the Israeli government coming second only to Russia in calling for content removal. Israel made 252 official requests, 9.2 percent of the total number of requests to TikTok worldwide. By comparison, the U.S. government submitted only 13 applications, the French government submitted 27, the United Kingdom 71, and Germany 167.

“The Israeli right wing is promoting hate speech on social media against Palestinians, like the pogrom on Huwara.”

“Incitement on social media is a problem that needs to be dealt with in-depth,” Knesset member Oded Forer, the committee’s chair, said at the time, referring specifically to anti-Semitic speech. “It is clear to everyone that the extreme discourse on social networks increases and encourages acts of terrorism against Jews.” The committee made no reference to anti-Arab and anti-Palestinian speech in that context.

Lobbying for content removal is not the only way Israeli officials have worked to control speech on social media platforms. This week, the Israeli military acknowledged orchestrating a covert social media operation during the May 2021 Gaza campaign to “improve the Israeli public’s view of Israel’s performance in the conflict,” the Associated Press reported. As part of the operation, Israeli Defense Forces officials created fake accounts to “conceal the campaign’s origins and engage audiences” on Twitter, Facebook, Instagram, and TikTok and coordinated the effort with real social media influencers.

While Israeli military officials regularly use social media to monitor and gather intelligence on Palestinians, this was seemingly the first time that an Israeli influence campaign targeted the Israeli public.


This content originally appeared on The Intercept and was authored by Alice Speri.

]]>
https://www.radiofree.org/2023/03/27/anti-palestinian-hate-on-social-media-is-growing-says-a-facebook-partner/feed/ 0 382337
A Scammer Tricked Instagram Into Banning Influencers With Millions of Followers. Then He Made Them Pay to Recover Their Accounts. https://www.radiofree.org/2023/03/26/a-scammer-tricked-instagram-into-banning-influencers-with-millions-of-followers-then-he-made-them-pay-to-recover-their-accounts/ https://www.radiofree.org/2023/03/26/a-scammer-tricked-instagram-into-banning-influencers-with-millions-of-followers-then-he-made-them-pay-to-recover-their-accounts/#respond Sun, 26 Mar 2023 09:00:00 +0000 https://www.propublica.org/article/instagram-fraudster-ban-influencer-accounts by Craig Silverman and Bianca Fortis

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Just after midnight on Sept. 13, Kristian “Murda” Murphy was watching TV at home in Boca Raton, Florida, when his phone began buzzing.

“Murda u always outside we gon see you,” read a message from an account he didn’t recognize.

Murphy is a music manager, producer and entrepreneur who has worked with high-profile rapper Tekashi 6ix9ine, among other artists. Hours before the threats began, 6ix9ine posted a message to his more than 20 million followers on Instagram that mocked the recent death of rapper PnB Rock. Taking exception to the post, people began blowing up Murphy’s phone.

“I’m sitting home by myself literally watching TV, all of a sudden I see these texts started coming in and I’m like, ‘What the fuck?’” said Murphy, in a gravelly voice that retains the accents of his native Yonkers, New York. In addition to threatening bodily harm, the anonymous messengers told Murphy they were coming for one of his most valuable assets — the @murdamurphy Instagram account. It had more than 300,000 followers and brought in thousands of dollars a month thanks to people and companies who paid Murphy to share sponsored posts.

“WE PACKING ACCOUNTS SOON 🤣🤣” read a message from a person who identified himself as OBNBrandon.

Meta suspended Kristian “Murda” Murphy’s Instagram account hours after OBN threatened to take it down. (Kendrick Brinson, special to ProPublica)

Murphy didn’t know it, but he was in the crosshairs of one of the most prolific and notorious members of a booming underground community of Instagram scammers and hackers who shut down profiles on the social network and then demand payment to reactivate them. While they also target TikTok and other platforms, takedown-for-hire scammers like OBN are proliferating on Instagram, exploiting the app’s slow and often ineffective customer support services and its easily manipulated account reporting systems. These Instascammers often target people whose accounts are vulnerable because their content verges on nudity and pornography, which Instagram and its parent company, Meta, prohibit.

A ProPublica investigation found that OBN, who also goes by OBNbrandon and Brandon, has prompted Meta to ban an array of influencers and entertainment figures. In an article he wrote for factz.com last year, OBN dubbed himself the “log-out king” because “I have deleted multiple celebrities + influencers on Meta & Instagram.”

“I made about $300k just off banning and unbanning pages,” he wrote.

OBN exploits weaknesses in Meta’s customer service. By allowing anyone to report an account for violating the company’s standards, Meta gives enormous leverage to people who are able to trick it into banning someone who relies on Instagram for income. Meta uses a mix of automated systems and human review to evaluate reports. Banners like OBN test and trade tips on how to trigger the system to falsely suspend accounts. In some cases OBN hacks into accounts to post offensive content. In others, he creates duplicate accounts in his targets’ names, then reports the original accounts as imposters so they’ll be barred for violating Meta’s ban on account impersonation. In addition, OBN has posed as a Meta employee to persuade at least one target to pay him to restore her account.

Models, businesspeople, marketers and adult performers across the United States told ProPublica that OBN had ruined their businesses and lives with spurious complaints, even causing one woman to consider suicide. More than half a dozen people with over 45 million total followers on Instagram told ProPublica they lost their accounts temporarily or permanently shortly after OBN threatened to report them. They say Meta failed to help them and to take OBN and other account manipulators seriously. One person who said she was victimized by OBN has an ongoing civil suit against Meta for lost income, while others sent the company legal letters demanding payment.

“Once you’re put on Brandon’s radar, whether someone’s paying him or not, he has this personal investment in making sure that your life is miserable and that he’ll try and get as much money out of you as he possibly can,” said Kay Jenkins, a Miami real estate agent and model. Her main Instagram account with roughly 100,000 followers has been repeatedly deactivated since 2021.

Kay Jenkins, a Miami real estate agent and model, says that OBN got her Instagram account banned and then duped her into paying him to get it back. (Kendrick Brinson, special to ProPublica)

A Meta spokesperson acknowledged that OBN has had short-term success in getting accounts removed by abusing systems intended to help enforce community standards. But the company has addressed those situations and taken down dozens of accounts linked to OBN, the spokesperson said. Most often, the spokesperson said, OBN scammed people by falsely claiming to be able to ban and restore accounts.

“We know the impact these scams can have on people which is why we continue investing to protect our users, including updating our support systems and keeping the scammers out,” said the spokesperson, who asked not to be identified due to security concerns. “This remains a highly adversarial space, with scammers constantly trying to evade detection by social media platforms.”

The story of how OBN has manipulated Meta’s systems is a cautionary tale for social media platforms. While the company is often criticized for being slow to take down misleading or offensive material, OBN was able to make a lucrative living by finding the pressure points that prompt Meta to act quickly based on false reports.

Murphy said that’s exactly what happened to him. Until OBN came along, he was earning between $15,000 and $20,000 a month from his Instagram account. It was filled with pictures of him with rappers and well-known figures from the Miami nightlife. Murphy, a stocky man with short blond hair and permanent five o’clock shadow, typically posed in black clothes, aviator sunglasses and thick diamond chains, with one or both of his middle fingers extended at the camera. He charged aspiring entrepreneurs between $2,000 and $5,000 per story to be featured in a post on his verified account.

“People pay me all the time to post promos for music, crypto,” he said. “I can make five, 10 grand by accident if I needed to. … The money’s crazy.”

Murphy had never heard of OBN until that September morning. He went to bed shortly after 3 a.m. and woke up to discover his Instagram account was disabled.

“That’s the first time I’ve ever had my account taken, ever, in my life. My heart dropped,” he said.

He was initially successful in getting Meta to reactivate it. But it’s been offline since December. Meta declined to comment on Murphy’s experience.

“I make money with that account, so it’s not fair to me that this guy has more power than Meta — it’s like a multibillion-billion-billion-dollar company,” Murphy said. “And they can’t do nothing about it.”

Online, OBN portrays himself as something of a gangster. Videos and photos he’s posted indicate he drives a white Lamborghini and wears expensive watches.

His main marketing vehicle for his services is the messaging app Telegram, where he has run a channel called @teamobn since August 2021. He posts about accounts he says he got banned, unbanned or verified. He touts software he uses to file false reports that allege an account violated Meta’s community guidelines, triggering a takedown.

He describes various strategies he uses to get accounts banned. For example, he says he can get a legitimate account suspended for violating Meta’s rule against impersonation by taking a verified Instagram account and changing its display name, profile photo and content to mirror his target’s. Then he sends Meta a report claiming that the legitimate account is impersonating the verified account.

Jilted lovers, jealous friends and business rivals use his services. OBN wrote that he also targets people for his own amusement, because they insulted a friend or client, or because they offer rival services. After banning an account, he frequently offers to reactivate it for a fee as high as $5,000, kicking off a cycle of bans and reactivations that continues until the victim runs out of money or stops paying.

Several notable people in the often-intertwined worlds of hip-hop, Miami nightlife, OnlyFans models and online influencers, including Celina Powell and Myron Gaines, have endorsed OBN. Powell is an online influencer who claims to have had sexual relationships with prominent rappers and has amassed more than 3 million followers on Instagram. Gaines co-hosts the “Fresh & Fit” podcast, a YouTube channel with more than 1 million subscribers that bills itself as providing “the TRUTH to Females, Fitness, and Finances.” Gaines, whose legal name is Amrou A. Fudl, was temporarily banned from TikTok for misogynistic comments.

On Oct. 21, 2021, Gaines paused the broadcast to offer a plug. “​Shouts out to our boy Brandon. For y’all that don’t know or follow me on Instagram on @unplugfit, I got my shit banned and then I’m back up now and my boy @obn.here was the one that got it back,” Gaines said, as an image of OBN’s Instagram account flashed on the screen. “So if you’ve got issues with Instagram, you get banned, whatever it is, this is the guy that you want to fucking contact.” Gaines didn’t respond to requests for comment. After ProPublica contacted Gaines, the video of the “Fresh & Fit” episode that featured his OBN shoutout was set to private, removing it from public view.

“Fresh & Fit” co-host Myron Gaines promoted OBN’s services and Instagram account. (Screenshot by ProPublica)

Those who said they were targeted by OBN include Adam22, the host of the popular hip-hop podcast “No Jumper,” who has 1.6 million Instagram followers, and Tommy Rodriguez, a Florida businessman with 1 million followers. OBN has said that he was responsible for banning Asian Doll, a rapper with 4.2 million followers; she did not respond to requests for comment. Meta declined to comment on all three cases.

OBN often targets women who rely on Instagram to draw people to their pages on OnlyFans, where they charge subscribers to view sexually explicit content.

“This is how I feed myself and my family,” said Danii Banks, an OnlyFans model with close to 8 million Instagram followers. She said she lost $300,000 in income when OBN induced Instagram to take down her account. He extorted thousands of dollars from her to restore her account, but it remained down, she said.

“It’s like someone lighting a fire on your business and just walking away.”

Meta declined to comment on Banks.

Banks lives in the Las Vegas area, as does OBN, according to posts, emails and public records. Banks reported him to the Las Vegas Metropolitan Police Department and the FBI for defrauding her, but she hasn’t heard back, she said. OBN, meanwhile, appears to have pursued a job with the Las Vegas police while mocking attempts by Meta and law enforcement to investigate him.

Last summer, he posted an email from the LVMPD’s Office of Human Resources that said the recipient, whose name was redacted, had met the requirements to continue the application process for becoming a police cadet. It said a written exam would be held; the date was also redacted.

“Wish me luck boys,” OBN wrote in his Telegram channel.

OBN told his followers that he’d applied to become a Las Vegas police cadet. (Screenshot by ProPublica)

The next day, he shared a video shot in the LVMPD parking lot. “It went well,” he wrote and added a thumbs-up emoji.

Roughly a month later, OBN joked about an email from Meta telling him that it had complied with a request from an unnamed law enforcement agency for data regarding one of his accounts.

“Bro instagram or meta at this point is beyond cringe lmao,” he wrote on Telegram, using the popular acronym for “laughing my ass off.”

Despite his frequent activity on Telegram and Instagram, and the shoutouts from major podcasts and influencers, OBN’s true identity — and even whether the account is run by one person or more than one — has remained a mystery.

ProPublica’s investigation led to one person who either is OBN or is closely linked to him: 20-year-old Edwin Reyes-Martinez, who lives with his mother in an apartment complex roughly 13 miles north of the Las Vegas strip.

Numerous clues connected Reyes-Martinez to OBN. Victims said OBN told them to send money to a bank account in the name of Edwin Reyes, or via an email address, ermtz030@icloud.com, that included Reyes-Martinez’s initials. That address also matched a partially redacted email, 030@icloud.com, that’s listed in the Las Vegas police letter OBN posted on Telegram.

A similar string of letters and numbers appears in a Twitter username, @ermtz030. That account bears Reyes-Martinez’s name and photo and features videos filmed inside a white Lamborghini. Although the videos don’t show the driver’s face, he is wearing a gold ring that resembles one worn by Reyes-Martinez in photos from his Facebook account. Another Facebook photo showed Reyes-Martinez posing in front of a white Lamborghini similar to the one featured in OBN’s Telegram profile.

The email address that OBN told victims to send payments to includes a string of characters that match the username on a Twitter account linked to Reyes-Martinez. (Screenshot by ProPublica)

Visited at his home in early February, Reyes-Martinez was dressed in a baggy, orange long-sleeve shirt, brown pants and brown slippers. A pair of gold and diamond studs sparkled in his ears. At first, he denied knowing who OBN is or having anything to do with him.

After being told that his own bank account had accepted more than $10,000 in payments intended for OBN in just the past few months, he changed his story. He said that someone named Brandon asked him to funnel money through his bank account to unknown recipients.

“There’s an individual that asked me if I can receive a payment,” he said. “I have no idea what that payment is for. I received them as a favor for the person.”

He pulled out his phone and showed an Instagram account called @madetoomuchmoney that he said belongs to the Brandon who contacted him. He said he didn’t know where the money went or what Brandon’s last name is. “I know a lot of Brandons.”

He said he works full time in a warehouse. “You see my hands? These are hard work hands,” he said, holding them out. “If I was OBN, I wouldn’t be working.”

ProPublica also submitted a request to the Las Vegas police for records related to any application by Reyes-Martinez to the department’s cadet program. The department declined, citing a Nevada law that allows it to withhold personnel records.

After the meeting in his apartment, Reyes-Martinez did not respond to follow-up questions. Meta sent him a cease-and-desist letter on March 17, about two weeks after ProPublica contacted the company for comment on OBN’s activities and on the evidence connecting Reyes-Martinez to OBN. A spokesperson said Meta had banned him from its platforms but declined to share the letter.

Account banning is just one of several lucrative schemes that prey on Instagram, which is uniquely important for celebrities, entrepreneurs, influencers and anyone seeking clout and status. Last year, a ProPublica investigation exposed a million-dollar operation that saw people pay $25,000 or more to fraudulently obtain verified accounts.

The verification badge, a blue tick added next to an account’s name, is applied to accounts that Instagram determines are authentic, unique, complete and notable. Verified accounts can charge more for sponsored posts, are given prominence by Instagram’s algorithms, and are seen as more difficult for people like OBN to take down. The ProPublica story prompted Meta to remove verification badges from hundreds of accounts.

OBN has said that he can take down verified accounts. “If you want someone smoked we talk 4 figures or nothing,” he wrote in his Telegram channel. In a separate post, he offered to create verified accounts for a $15,000 fee.

Meta has acknowledged that it needs to invest more in customer support. In February, founder Mark Zuckerberg announced that Meta would offer people the ability to pay for account verification and enhanced support, including “​​access to a real person for common account issues.” The Meta spokesperson said the company has invested in new account security and recovery measures, including a tool to help users who’ve been hacked. It’s also giving more users an opportunity to complain to a human agent rather than a bot.

The 1996 federal Communications Decency Act generally exempts platforms from legal liability related to the behavior of their users. However, the Federal Trade Commission has required several online platforms to bolster their security.

“If somebody is able to get into the account, the FTC doesn’t treat that company as a victim. They treat them as part of the problem,” said Eric Goldman, a professor and co-director of the High Tech Law Institute at the Santa Clara School of Law.

Meta has been under a consent decree with the FTC since 2012 because of allegations that the company, then known as Facebook, violated its privacy promises to users.

Some OBN victims have tried to hold Meta accountable. In late 2021, Tiara Johnson, a former adult performer who had more than 2.8 million Instagram followers when she lost her account, filed a breach of contract suit against Meta, which is pending in federal court. She said the company wrongly removed her account. Her suit includes screenshots of a conversation with OBN in which he says someone paid him $3,000 to ban her account. She then paid him the same amount to get it back, but he didn’t get it reactivated.

In February, Meta moved to dismiss the case, saying it has no obligation to provide an Instagram account to Johnson. The court is scheduled to consider the motion in June.

OBN can’t deactivate accounts by himself; he needs Meta to do it, either by triggering its automated systems or by getting a worker to take action. He has often boasted of bribing workers at Instagram and Meta, which recently acknowledged firing or disciplining workers who took bribes to access user accounts. ProPublica could not identify any Meta workers who accepted bribes from OBN.

But OBN did appear to have advance knowledge of a cease-and-desist letter sent on behalf of Meta to online marketer Joey Hickson.

Hickson built a business running large social media accounts like @break and @lmao, and he had four Instagram accounts with tens of millions of followers. He said he paid OBN for services such as helping people get an Instagram username they wanted or obtaining verified accounts.

After initially cooperating, OBN stopped delivering, according to Hickson. Then OBN started threatening to take Hickson’s accounts down. Last Sept. 22, OBN taunted Hickson on Instagram. “Enjoy your c&d,” he wrote, referring to the cease-and-desist letter sent by a law firm representing Meta.

Hickson immediately checked his email and saw that he had received just such a letter from Perkins Coie, a law firm that said it was writing on behalf of Meta. The letter said an investigation found that he and his company were “abusing Instagram” by offering account reactivation and verification services and by selling fake engagement such as likes and followers. It was banning Hickson and taking down his accounts.

OBN “knew before I did,” Hickson said.

OBN posted a message in his Telegram channel to celebrate that Hickson’s personal Instagram account, @joey, had been deactivated. He accused Hickson of stealing $20,000 from him and said, “enjoy the c&d my brother.”

When Meta sent marketer Joey Hickson a cease-and-desist letter, OBN bragged about it on Telegram. (Screenshot by ProPublica)

OBN then tried to convince Hickson to pay him $15,000 to reverse the ban. He said he could get Meta and its law firm to withdraw the sanction because he was responsible for it. He said another hacker had created several Instagram accounts with fabricated accusations against Hickson and then sent the complaints to a Perkins Coie attorney. Referring to the lawyer as “my people,” he said he’d tell her that the accounts were “falsely made” to frame Hickson.

“Buddy I’m the one who did it who do you think she [the lawyer] gon listen to lmao I bring her clients everyday,” OBN wrote.

OBN asked Hickson to pay him through an intermediary: Dan Folger, a former photographer for rap star Wiz Khalifa who has over 300,000 Instagram followers and a Telegram channel where he sells Instagram services such as account reactivation. OBN has posted screenshots in his Telegram channel that show crypto payments from Folger to OBN. OBN has also shared video security footage, presumably supplied by Folger, of a ProPublica reporter visiting Folger’s Nevada home. In a Telegram chat, Folger denied working with OBN. He did not respond to detailed questions sent via his attorney.

Hickson rejected OBN’s offer, saying he wasn’t aware of anyone who had gotten a cease-and-desist retracted. He denies that he broke Meta’s rules. “I’ve spent a decade of my life building what I built only to have someone come in and tarnish that. I’m just trying to get my accounts back and my life back.”

Meta said Hickson’s accounts were appropriately taken down for violating Instagram’s terms of service. Perkins Coie and the attorney mentioned by OBN did not respond to requests for comment.

Before the bans and the victims, before the white Lambo, OBN was just a teenager with a PlayStation. “We used to just play games online,” Syenrai said in a telephone interview. Syenrai is the internet handle of a young man who was once prominent in the Instagram banning community. He requested that his real name not be used. Syenrai knew OBN as Brandon when they met online around 2018. They have never met face-to-face. He said he believes that Reyes-Martinez is at least partially responsible for the online activities carried out under the OBN handle, but that more than one person may be involved.

Syenrai said that Brandon earned money by selling a how-to guide to scamming. “The guides were easily found online for free, but OBN sold them for $45 a pop,” he said.

Brandon used the OBN moniker specifically for scamming, Syenrai said. Asked what the acronym stands for, Syenrai said he was told it was “only bands” — a reference to the paper band that holds a stack of bills together — followed by the version of the N-word that ends in “a.”

Everything changed for Brandon and Syenrai in the middle of 2020. A mutual friend named Abu “learned how to ban and showed it to me and Brandon,” Syenrai said. Syenrai caught on so well that he earned a measure of fame in 2021 by “memorializing” the account of Instagram head Adam Mosseri. When an account owner dies, Instagram can enable a memorial setting that locks the account and informs viewers that the person is dead. Mosseri’s memorializing only lasted an hour, but it embarrassed the company.

“It was a wild transition for us guys, from playing games to taking down celeb pages,” Syenrai said.

That kind of high-profile takedown is a way for a banner to gain clout, a flexing of skills to showcase Instagram’s vulnerability and make fellow banners jealous — like OBN, who also took credit for memorializing Mosseri.

It was also a quick route to a stern warning.

Syenrai received a cease-and-desist notice from Meta in November 2021. He said he stopped banning and working with OBN.

Kay Jenkins’ Instagram popularity helped her earn between $15,000 and $20,000 a month from sponsorships and OnlyFans subscriptions. But after she moved to Miami from her native Utah in March 2021, both her main Instagram account and her secondary accounts for her real estate and personal coaching businesses were repeatedly suspended. Months later, she learned by chance what had happened. In November 2021, she was a guest on “Fresh & Fit,” along with Celina Powell. Powell, who rose to fame by claiming to have slept with rappers and discussing the alleged affairs on hip-hop podcasts such as “No Jumper,” had recently given a shoutout to OBN.

“I’m telling you right now if you need any Instagram services, you need your account back, whatever the fuck you need, you have to go to my boy @obn.here,” Powell had said in an Instagram video that OBN shared in his channel.

Instagram influencer Celina Powell gave at least two shoutouts to OBN. (Obtained by ProPublica)

After the broadcast, Powell and Jenkins rode the elevator from the studio up to Jenkins’ apartment. Powell called someone she referred to as Brandon and started talking about banning accounts.

“Who is this guy?” Jenkins asked her. “Can he bring my account back?”

“Yeah, he can bring it back if I tell him to,” Powell said. “Because he’s the one who shut it down.”

Powell explained that she had OBN ban Jenkins. Powell was upset after seeing a video of her then-boyfriend dancing with Jenkins at a Miami club, Jenkins said.

Jenkins hid her anger. “I was so hopeful that like, OK, if she’s the source that brought it down, she’s probably my only hope to fucking get it back,” Jenkins said.

Powell agreed to get OBN to restore Jenkins’ accounts. And soon they were reactivated. On Dec. 5, less than a week after the “Fresh & Fit” appearance, Powell posted another shoutout for OBN.

Still furious at Powell, Jenkins ended their friendship. Her main account promptly went down again.

Jenkins finished 2021 with her main Instagram account suspended and no indication from Meta about if or when it might come back.

“I had the worst Christmas of my life, I contemplated slitting my wrists, I didn’t feel like living anymore,” Jenkins said.

Powell was imprisoned in June 2022 for violating parole on a 2015 conviction for driving a getaway car in a theft. Powell, who was recently released, declined to comment. Around the time of Powell’s re-arrest, Jenkins’ Instagram account was restored. But the reprieve was short-lived. On Sept. 23, OBN messaged Jenkins. He offered to get her account verified for a fee. She declined and told him not to contact her again.

“Dumb ass b!tch,” read a private Instagram message sent to her the next day from an account linked to OBN. “I’m going to ruin you.”

Two days later, Meta suspended Jenkins’ account.

Jenkins says that OBN scammed her out of more than $10,000. (Kendrick Brinson, special to ProPublica)

Jenkins decided the only way to protect her account and income was to make peace with OBN. It proved to be an expensive decision.

OBN assured Jenkins that he would be happy to work with her. He told her that he had a senior-level Instagram contact in Europe who could help unban and verify her account. He shared a screenshot of a conversation with the contact but, in an apparent oversight, failed to fully redact the name, according to Jenkins.

Seeing no alternative, Jenkins paid OBN $5,000, receipts show. Her account briefly came back online but was soon taken down by Meta. Then OBN blocked her on Telegram and deleted their conversation, according to Jenkins. She decided she had one more option: go directly to OBN’s high-level connection at Instagram. She found the employee’s Telegram account, which had the same username, photo and bio as his verified Instagram account. She messaged the account to say that she’d been working with OBN but he failed to deliver the services promised.

The response was sympathetic: “We made insane money no clue what went wrong.” They struck an agreement to reactivate and verify Jenkins’ account for $4,000. She sent the money, and her account was unlocked on Nov. 18, but it was suspended again four days later; the contact demanded another $4,000 to fix it. Again, Jenkins sent the money.

An excerpt from a Telegram chat between Jenkins and someone she thought was a Meta employee about getting her account restored (Obtained by ProPublica)

On the morning of Nov. 24, she woke up and immediately checked Instagram to see if her account was back. It wasn’t. And she had a new Telegram message from OBN.

“Haha ur talking to my rep such a slut 🤣 he won’t help you for shit anymore I’ll make sure of that,” OBN wrote.

Jenkins’ account never came back. She hired a lawyer and sent Meta a demand letter for $25,000 in damages for the repeated loss of her main Instagram account. Meta hasn’t replied. In reality, Jenkins was paying OBN all along. In an elaborate scam, he had posed on Telegram as the Meta employee. The cryptocurrency wallet to which Jenkins sent payments matched a wallet that OBN has used for other transactions.

ProPublica also traced the IP address of the server that the alleged Meta employee used to access the internet. It wasn’t in Europe. It was used by a cellphone in Las Vegas.

Meta acknowledged that its employee was impersonated. As a result, the employee and his family have faced threats and harassment for years. The employee reported the account to Telegram. After being contacted by ProPublica, Telegram removed the account, which a spokesperson described as “fraudulent.”

Following Reyes-Martinez’s conversation with a ProPublica reporter in his North Las Vegas apartment, the @madetoomuchmoney Instagram account he said belonged to “Brandon” was deactivated. OBN blocked the reporter from his Twitter account and Telegram channel and announced he would no longer offer account banning as a service.

“I’m done with banning if you mention anything about bans I’ll block you,” OBN wrote to his followers.

But he wanted people to know he was still in business.

“Only doing instagram claims & verification, and C&Ds only for high paying nothing less let’s work 🙏.”


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Craig Silverman and Bianca Fortis.

]]>
https://www.radiofree.org/2023/03/26/a-scammer-tricked-instagram-into-banning-influencers-with-millions-of-followers-then-he-made-them-pay-to-recover-their-accounts/feed/ 0 382223
Female Urinals, Extra-woke Hollywood, Privacy Violations, Mouse Brain Cells, Pizza & Disneyland https://www.radiofree.org/2023/03/24/female-urinals-extra-woke-hollywood-privacy-violations-mouse-brain-cells-pizza-disneyland/ https://www.radiofree.org/2023/03/24/female-urinals-extra-woke-hollywood-privacy-violations-mouse-brain-cells-pizza-disneyland/#respond Fri, 24 Mar 2023 15:05:59 +0000 https://dissidentvoice.org/?p=139058 This criminal gaslighting ends when enough of us say NO. Starting with next year’s Oscars, the Academy will require that a film meet two of the four inclusion standards above to be eligible for a best picture nomination. Read the full Hollywood Reporter article here. Indiana’s Bureau of Motor Vehicles (BMV) has been caught selling […]

The post Female Urinals, Extra-woke Hollywood, Privacy Violations, Mouse Brain Cells, Pizza & Disneyland first appeared on Dissident Voice.]]>

This criminal gaslighting ends when enough of us say NO.

Starting with next year’s Oscars, the Academy will require that a film meet two of the four inclusion standards above to be eligible for a best picture nomination.

Read the full Hollywood Reporter article here.

Indiana’s Bureau of Motor Vehicles (BMV) has been caught selling drivers’ personal information without their consent and without the option for them to opt-out. Last year alone, the BMV made around $25 million from selling personal information.

Read the full article here.

The disappearance of the $1 slice in NYC is an unwelcome development for many reasons. (details) For example, so many of the homeless women I’ve helped over the years have relied on 2 Bros. Pizza for quick, affordable meals.

“The schemes of the devil…” (Ephesians 6:11)

(watch a short video here)

Click here for a one-minute video that will end this post with a smile!

The post Female Urinals, Extra-woke Hollywood, Privacy Violations, Mouse Brain Cells, Pizza & Disneyland first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Mickey Z..

]]>
https://www.radiofree.org/2023/03/24/female-urinals-extra-woke-hollywood-privacy-violations-mouse-brain-cells-pizza-disneyland/feed/ 0 381868
Female Urinals, Extra-woke Hollywood, Privacy Violations, Mouse Brain Cells, Pizza & Disneyland https://www.radiofree.org/2023/03/24/female-urinals-extra-woke-hollywood-privacy-violations-mouse-brain-cells-pizza-disneyland-2/ https://www.radiofree.org/2023/03/24/female-urinals-extra-woke-hollywood-privacy-violations-mouse-brain-cells-pizza-disneyland-2/#respond Fri, 24 Mar 2023 15:05:59 +0000 https://new.dissidentvoice.org/?p=139058

This criminal gaslighting ends when enough of us say NO.

Starting with next year’s Oscars, the Academy will require that a film meet two of the four inclusion standards above to be eligible for a best picture nomination.

Read the full Hollywood Reporter article here.

Indiana’s Bureau of Motor Vehicles (BMV) has been caught selling drivers’ personal information without their consent and without the option for them to opt-out. Last year alone, the BMV made around $25 million from selling personal information.

Read the full article here.

The disappearance of the $1 slice in NYC is an unwelcome development for many reasons. (details) For example, so many of the homeless women I’ve helped over the years have relied on 2 Bros. Pizza for quick, affordable meals.

“The schemes of the devil…” (Ephesians 6:11)

(watch a short video here)

Click here for a one-minute video that will end this post with a smile!


This content originally appeared on Dissident Voice and was authored by Mickey Z..

]]>
https://www.radiofree.org/2023/03/24/female-urinals-extra-woke-hollywood-privacy-violations-mouse-brain-cells-pizza-disneyland-2/feed/ 0 382799
In East Kentucky, timely weather forecasts are a matter of life and death https://grist.org/equity/kentucky-flood-extreme-weather-forecast-alert-broadband-internet/ https://grist.org/equity/kentucky-flood-extreme-weather-forecast-alert-broadband-internet/#respond Thu, 23 Mar 2023 10:45:00 +0000 https://grist.org/?p=605792 This story is a collaboration between The Daily Yonder and Grist. For more, watch the Daily Yonder’s video “How Broadband and Weather Forecasting Failed East Kentucky.” 

Terry Thies wasn’t worried about the rain that pounded on her roof last July. 

She had received no flood warnings before going to sleep that night. Besides, her part of rural Perry County in Eastern Kentucky often gets heavy rain.

So early the next morning when her foot hit the water lapping the bottom of her wooden bed frame, Thies’ first thought was that the toilet had overflowed. But as she scanned her bedroom for the water’s source, she realized this was something else entirely. 

“I came into the kitchen and opened the door and water was flowing down the lane,” Thies said. “Water was in my yard and rushing down. And I was like, well, I guess I’ve been flooded.” 

a woman in a blue sweatshirt puts one hand on a tall brown wooden bedpost within a bedroom
Thies adjusts the post of the bed that belonged to her mother. It’s the same bed she woke up in to find that her home had flooded overnight last July. Xandr Brown / Daily Yonder

In the days leading up to the storm, the National Weather Service predicted heavy rain and a moderate risk of flooding across a wide swath of eastern Kentucky and West Virginia. What happened instead was a record-breaking four-day flood event in eastern Kentucky that killed a confirmed 43 people and destroyed thousands of homes. 

And though the National Weather Service issued repeated alerts, many people received no warning.

“Not a soul, not one emergency outlet texted me or alerted me via phone,” Thies said. 

“Nobody woke me up.” 

Thies’ experience in the July floods reveals troubling truths about Kentucky’s severe weather emergency alert systems. Imprecise weather forecasting and spotty emergency alerts due to limited cellular and internet access in rural Kentucky meant that Thies and many others were wholly unprepared for the historic flood. 

Efforts to improve these systems are underway, but state officials say expansions to broadband infrastructure will take at least four years to be completed in Kentucky’s most rural counties. In a state where flooding is common, these improvements could be the difference between life and death for rural Kentuckians. 

But there’s no guarantee they’ll come before the next climate change-fueled disaster. 

a split level house showing flood damage with leaves on the grass.
Before the flood, Terry Thies’ home in Bulan, Kentucky, housed her family for two generations. It rests near a creek which flooded last July. Thies is still in transition and plans to sell her home to FEMA. Xandr Brown / Daily Yonder

The first system that failed eastern Kentuckians in July was the weather forecasting system, which did not accurately predict the severity of the storm. A built-in urban bias in weather forecasting is partially to blame. 

“Did we forecast [the storm] being that extreme? No, we didn’t,” said Pete Gogerian, a meteorologist at the National Weather Service station in Jackson, Kentucky, which serves the 13 eastern Kentucky counties affected by the July floods. 

For the days preceding the storm, the Jackson station warned of a ‘moderate risk’ of flooding across much of their service area. Observers with the benefit of hindsight might argue that a designation of ‘high risk’ would have been more appropriate. But Jane Marie Wix, a meteorologist at the Jackson station, wrote in an email to the Daily Yonder that the high-risk label is rarely issued, and simply didn’t match what the model was predicting for the July storms. 

a color-coded chart of excessive rainfall risk ranging from marginal to high. Each categories has photos with flooding pictures corresponding to the levels.
Weather Prediction Center / NOAA

“When we have an event of this magnitude, we’ll go back and look at, are there any indicators? Did we miss something? Was there really any model predicting this kind of event?” Gogerian said. “But when you looked at [the flooding in] eastern Kentucky, it just wasn’t there.”

“I don’t think anyone could have predicted just how bad it was going to end up being,” Wix wrote.  

Wix says the moderate risk warning was enough to warn people that the storm could have severe impacts in many locations. But the model’s inaccuracy demonstrates a flaw in the National Weather Service forecasting model system that was used at the time of the flood. 

Extreme weather is hard to predict in any setting, but rural regions like eastern Kentucky are at an additional disadvantage due to an urban bias baked into national weather forecasting systems, according to Vijay Tallapragada, the senior scientist at the National Weather Service’s Environmental Modeling Center. 

Forecasting models depend on observational data — information about past and present weather conditions —to predict what will come next. But there’s more data available for urban areas than for rural areas, according to Tallapragada. 

“Urban areas are observed more than rural areas … and that can have some, I would say, unintended influence on how the models perceive a situation,” he said.

Although spaceborn satellites and remote sensing systems provide a steady supply of rural data, other methods of observation, like aircraft and weather balloons, are usually concentrated in more densely populated areas.

“Historically, many weather observations were developed around aviation, so a lot of weather radars are located at major airports in highly populated cities,” said Jerry Brotzge, Kentucky state climatologist and director of the Kentucky Climate Center. “That leaves a lot of rural areas with less data.” 

A white plastic chair rests high in a bare-branched tree.
Flooding in Kentucky reached treetops along Troublesome Creek in July 2022. Months later, household debris floated by floodwaters remained. Xandr Brown / Daily Yonder

Weather prediction models are based on past events, so the lack of historical weather data in rural areas poses a serious challenge for future predictions, according to Brotzge. “For large areas of Appalachia, we just don’t know the climatology there as well as, say, Louisville or some of the major cities,” he said.

This lack of current and historical weather observation can leave rural areas vulnerable to poor weather forecasting, which can have catastrophic results in the case of extreme weather events. 

A new forecasting model, however, could close the gap in rural severe weather prediction. 


The new Unified Forecast System is being developed by the National Weather Service and a group of academic and community partners. The modeling system is set to launch in 2024, but the results so far are promising, according to Tallapragada.

“In the next couple years, we will see a revolutionary change in how we are going to predict short-range weather and the extremes associated with it,” he said.

The problem with the current system, said Tallapragada, is that it depends on one model to do all the work.

A new application called the Rapid Refresh Forecast System is set to replace that single model with an ensemble of 10 models. Using multiple models allows meteorologists to introduce more statistical uncertainty into their calculations, which produces a broader, and more accurate, range of results, according to Tallapragada. He said that although the new system is not yet finished, it has already proven to be on par with, or better than, the current model. 

The Rapid Refresh Forecasting System will mitigate the disparity between urban and rural forecasting because it depends more on statistical probabilities and less on current and historical observational data, which is where the biggest gap in rural data currently lies, according to Tallapragada.

The system could also mean improved accuracy when it comes to predicting severe weather, like Kentucky’s July flood event.

“The range of solutions provided by the new system will capture the extremes much better, independent of whether you are observing better or poorly,” Tallapragada said. “That’s the future of all weather prediction.”

As extreme weather events become more common due to climate change, this advancement in weather forecasting has the potential to transform local and regional responses to severe weather. But without massive investments in broadband, life-saving severe weather alerts could remain out of reach for rural communities.


Over a year before the July 2022 floods devastated eastern Kentucky, some counties in the same region were hit by floods that, while not as deadly, still upended lives.

“There were no warnings for that flood,” said Tiffany Clair, an Owsley County resident, in a Daily Yonder interview. “It was fast.” 

Clair received no warning when extreme rains hit her home in March of 2021, which severely damaged nearby towns like Booneville and Beattyville. “I did not think that those [towns] would recover,” Clair said. 

A woman looks directl at camera with resigned expression.
Tiffany Clair’s family home in Owsley county was irreparably damaged last July. She managed to save herself, two kids, and mother — who has early onset dementia — by canoe. Xandr Brown / Daily Yonder

Businesses and homes were impaired for months after the flood, affecting not only the people in those communities but those from neighboring communities as well.

“We live in a region where we travel from township to township for different things, and [the March 2021 floods] were a blow to the region and to the communities, because we’re kind of interlocked around here,” Clair said. “It’s part of being an eastern Kentuckian.”

A little over a year later, Clair faced more flooding, this time enough to displace her and her children. They now live with Clair’s mother. 

This time around, Clair did receive an emergency warning, but questioned the method through which these warnings were sent. “[The warnings] did go all night, the last time, in July,” Clair said. “But if you don’t have a signal or if your phone’s dead, how are you getting those?”

During severe weather events, people are alerted of risk through a handful of ways. Weather information reported from regional National Weather Service offices is disseminated through local TV and radio stations, specialized weather radios, and the Federal Emergency Management Agency’s wireless emergency alert system, which requires cell service to deliver. 

But in rural eastern Kentucky in July, the most common way people learned about the flooding was by seeing the water rise firsthand, according to a report from the Kentucky Department of Public Health. 

The agency surveyed people from over 400 households in Breathitt, Clay, Floyd, Knott, Letcher, Owsley and Perry counties, as well as displaced residents living in three shelter sites. The goal of the study was to understand how the floods affected Kentuckians and determine ways to better prepare for the next emergency. 

Nearly 14 percent of households in Letcher, Knott, Owsley and Perry counties and 28 percent of households in Breathitt, Clay, Floyd and Pike counties reported difficulty accessing internet, television, radio, and cell service for emergency communications during the floods. Cell phone service and internet access were the top two communication methods residents reported the most difficulty accessing.  

The floods killed a confirmed 43 people: 19 from Knott County, 10 from Breathitt, seven from Perry, four from Letcher, two from Clay, and one from Pike County. Several more people died after the floods due to related health complications. 

In Knott and Breathitt County, where death counts were the highest, approximately 32 percent of residents do not have broadband access, according to U.S. Census Bureau data. And in 10 of the 13 counties flooded in July, more than a quarter of residents lack broadband access. 

Rural areas across the country are underserved when it comes to broadband, but eastern Kentucky is a special trouble spot, where high costs to serve rural customers have stopped internet companies from setting up broadband in rural areas. In 2017, Kentucky ranked 47th in the nation for broadband access, according to the Kentucky Communications Network Authority

“There’s a lot of frustration because a lot of these internet service providers are profit-based companies,” said Meghan Sandfoss, executive director of the state’s newly created Office of Broadband Development. “So it’s hard for them sometimes to make a business case for the more remote and low density locations.”

The state’s effort to expand broadband has sputtered for years due to missteps by government officials, according to Propublica reporting. An internet connectivity project, KentuckyWired, was launched in 2013 with the goal to construct 3,000 miles of high-speed fiber optic cable in every Kentucky county by 2018. The project didn’t reach its final steps until fall of 2022, according to a KentuckyWired construction map.

Getting the cable laid down is only one part of the process: for individual households and businesses to actually access the internet, third-party providers need to connect their own fiber systems to the network, according to the Kentucky Communications Network Authority. This “last-mile” infrastructure is critical to broadband expansion, but progress has been slow. 

“That might be another 10 years or 20 years while all that last-mile stuff gets built,” said Doug Dawson, a telecommunications consultant, in a ProPublica interview from 2020. 

To speed up this process, both the state and federal governments have recently directed funds toward improved internet connectivity and last-mile infrastructure. 

In June of 2022, Kentucky Governor Andy Beshear announced a $203 million investment in last-mile infrastructure funded through the American Rescue Plan Act. Another $20 million of grants was opened in September for broadband providers to replace utility poles that provide connectivity in underserved areas. And early this year, another $182 million in federal funding was awarded to fund Kentucky’s “Better Internet” grant program. 

This grant program is focused on making it more commercially feasible for private internet providers to reach rural areas, said Sandfoss from the Office of Broadband Development. The priority is to build broadband infrastructure in unserved locations where there is no internet, versus under-served locations with limited internet access.

“A frustration we hear frequently is that all these new locations are being connected and everybody else has to wait,” Sandfoss said. “But that’s just the federal funding priority, and that’s the way we’ve got to do it.” 

Construction on the state’s broadband infrastructure expansions is expected to occur over the next four years.

As extreme weather continues to batter rural Kentucky – floods in February killed one person in rural Marion County – some locals aren’t waiting for governmental changes to better protect themselves in the face of disaster. 

Terry Thies, whose childhood home was flooded in July, has decided to sell her house.

“Now that it has flooded, it will probably flood again,” Thies said. She plans to move up the mountain, away from the creek that damaged her home. “I just don’t wanna go through it again.”

But for Kentuckians who don’t have the financial means to move away from higher-risk flood areas, they may be stuck in place. Eastern Kentucky is in the middle of a major housing crisis: affordable housing is sparse, buildable land outside flood zones is limited, and construction costs for new homes can be prohibitively expensive. 

“[The flood] was horrible, but we were very, very lucky,” said Tiffany Clair, whose home was destroyed in the July flood. Clair and her children were able to move in with her mother when they lost housing. “But the next time I don’t think we’ll be that lucky.”

Clair believes that rural Kentucky’s ability to withstand the next natural disaster hinges on the actions taken by local and state leaders. 

“We can’t do anything to prepare for it. It is going to take our leaders, it is going to take our politicians,” she said. 

“They’re the ones that have to prepare for it because we can’t.”

Additional reporting by Caroline Carlson and Xandr Brown.

This story was originally published by Grist with the headline In East Kentucky, timely weather forecasts are a matter of life and death on Mar 23, 2023.


This content originally appeared on Grist and was authored by Anya Slepyan.

]]>
https://grist.org/equity/kentucky-flood-extreme-weather-forecast-alert-broadband-internet/feed/ 0 381515
Turkey regulator forces closure of German public broadcaster Deutsche Welle’s office https://www.radiofree.org/2023/03/22/turkey-regulator-forces-closure-of-german-public-broadcaster-deutsche-welles-office/ https://www.radiofree.org/2023/03/22/turkey-regulator-forces-closure-of-german-public-broadcaster-deutsche-welles-office/#respond Wed, 22 Mar 2023 18:20:42 +0000 https://cpj.org/?p=271106 Istanbul, March 22, 2023 – Turkish authorities should reverse their decision not to extend the operating license of Deutsche Welle’s Turkey office and allow the German public broadcaster to operate freely, the Committee to Protect Journalists said Wednesday.

On March 28, DW plans to close its Turkey office after the country’s Industry and Technology Ministry declined to extend its license, allegedly due to a technical error in its application forms, according to news reports, a report by DW, and Erkan Arıkan, director of Turkish Services for DW, who communicated with CPJ by email.

“Turkish authorities should immediately renew Deutsche Welle’s operating license and stop efforts to hinder press freedom in the country,” said Özgür Öğret, CPJ’s Turkey representative. “Denying DW’s license serves only to disrupt the broadcaster’s activities and deny Turkish citizens critical, independent reporting as elections approach.” 

DW did not receive a warning from the ministry about any mistake in its application before the license decision was made, Arıkan said, adding that DW’s operations have not changed since it was last approved for a license two years ago.

“The Turkish authorities know who DW is and what kind of operations it has very well,” Arıkan said. “We suspect that the government is putting pressure on the related authorities in order to make our journalistic activities in Turkey even harder.”

DW does not plan to cease its operations in Turkey and aims to reapply for its license, but the lack of a license will force the employees to essentially become freelancers, which will result in the loss of government benefits such as social security, Arıkan said. He added that DW journalists in Turkey already cannot get official press cards from authorities.

In July 2022, authorities blocked the websites of DW and the U.S. Congress-funded broadcaster Voice of America. CPJ’s email to the Industry and Technology Ministry of Turkey did not receive any response.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2023/03/22/turkey-regulator-forces-closure-of-german-public-broadcaster-deutsche-welles-office/feed/ 0 381372
License Plate Surveillance, Courtesy of Your Homeowners Association https://www.radiofree.org/2023/03/22/license-plate-surveillance-courtesy-of-your-homeowners-association/ https://www.radiofree.org/2023/03/22/license-plate-surveillance-courtesy-of-your-homeowners-association/#respond Wed, 22 Mar 2023 09:00:29 +0000 https://theintercept.com/?p=424251

At a city council meeting in June 2021, Mayor Thomas Kilgore, of Lakeway, Texas, made an announcement that confused his community.

“I believe it is my duty to inform you that a surveillance system has been installed in the city of Lakeway,” he told the perplexed crowd.

Kilgore was referring to a system consisting of eight license plate readers, installed by the private company Flock Safety, that was tracking cars on both private and public roads. Despite being in place for six months, no one had told residents that they were being watched. Kilgore himself had just recently learned of the cameras.

“We find ourselves with a surveillance system,” he said, “with no information and no policies, procedures, or protections.”

The deal to install the cameras had not been approved by the city government’s executive branch.

Instead, the Rough Hollow Homeowners Association, a nongovernment entity, and the Lakeway police chief had signed off on the deal in January 2021, giving police access to residents’ footage. By the time of the June city council meeting, the surveillance system had notified the police department over a dozen times.

“We thought we were just being a partner with the city,” Bill Hayes, the chief operating officer of Legend Communities, which oversees the Rough Hollow Homeowners Association, said at the meeting. “We didn’t go out there thinking we were being Big Brother.”

Lakeway is just one example of a community that has faced Flock’s surveillance without many homeowners’ knowledge or approval. Neighbors in Atlanta, Georgia, remained in the dark for a year after cameras were put up. In Lake County, Florida, nearly 100 cameras went up “overnight like mushrooms,” according to one county commissioner — without a single permit.

In a statement, Flock Safety brushed off the Lake County incident as an “an honest misunderstanding,” but the increasing surveillance of community members’ movements across the country is no accident. It’s a deliberate marketing strategy.

Flock Safety, which began as a startup in 2017 in Atlanta and is now valued at approximately $3.5 billion, has targeted homeowners associations, or HOAs, in partnership with police departments, to become one of the largest surveillance vendors in the nation. There are key strategic reasons that make homeowners associations the ideal customer. HOAs have large budgets — they collect over $100 billion a year from homeowners — and it’s an opportunity for law enforcement to gain access into gated, private areas, normally out of their reach

“What are the consequences if somebody abuses the system?”

Over 200 HOAs nationwide have bought and installed Flock’s license plate readers, according to an Intercept investigation, the most comprehensive count to date. HOAs are private entities and therefore are not subject to public records requests or regulation.

“What are the consequences if somebody abuses the system?” said Dave Maass, director of investigations at the Electronic Frontier Foundation. “There are repercussions of having this data, and you don’t have that kind of accountability when it comes to a homeowners association.”

The majority of the readers are hooked up to Flock’s TALON network, which allows police to track cars within their own neighborhoods, as well as access a nationwide system of license plate readers that scan approximately a billion images of vehicles a month. Camera owners can also create their own “hot lists” of plate numbers that generate alarms when scanned and will run them in state police watchlists and the FBI’s primary criminal database, the National Crime Information Center.

“Flock Safety installs cameras with permission from our customers, at the locations they require,” said Holly Beilin, a Flock representative. “Our team has stood in front of hundreds of city council meetings, and we have always supported the democratic process.”

After facing public outrage, the cameras were removed from communities in Texas and Florida, but Flock’s license plate readers continue to rapidly proliferate daily — from cities in Missouri to Kentucky.

“It’s a near constant drumbeat,” said Edwin Yohnka, the director of public policy at the American Civil Liberties Union of Illinois.

With over half of all Americans living in HOAs, experts believe the surveillance technology is far more ubiquitous than we know.

A license plate reader camera is mounted on a pole in Orinda, California, Jan. 22, 2022.

A license plate reader camera is mounted on a pole in Orinda, Calif., on Jan. 22, 2022.

Photo: Gado/Sipa via AP Images


“Typically, when we work with agencies, we start with neighborhood HOAs,” Meg Heusel, Flock’s director of marketing, wrote in an internal email to Lakeway Police Sgt. Jason Brown back in February 2021. In practice, however, Flock often works to court the police first and then tag-team to persuade local HOAs to buy the cameras.

To entice the police, Flock claims it makes neighborhoods 70 percent safer and “quickly arms police” with evidence. And law enforcement officials are easily persuaded by Flock Safety’s promise to reduce crime, which the company stresses is trending dangerously upward. Last April, New Jersey Gov. Phil Murphy pledged to spend $10 million to expand the use of automated license plate readers, which would capture and store images in a “centralized database accessible to law enforcement,” to combat an “epidemic in car theft.”

The range of data Flock’s surveillance systems can collect is vast. The company’s “vehicle fingerprint” technology goes beyond traditional models, capturing not only license plate numbers, but also the state, vehicle type, make, color, missing and covered plates, bumper stickers, decals, and roof racks. The data is stored on Amazon Web Services servers and is deleted after 30 days, the company says.

Such detail has helped police catch crime. Dallas police, for instance, said the cameras were a “game changer” and that they have recovered over 200 allegedly stolen vehicles by using the readers. Raleigh police, in North Carolina, recently said that in the first six months after installing the cameras, they alerted officers to 116 wanted people, and 41 people were arrested.

However, studies have found there is no real evidence that license plate readers actually have an effect on crime rates. And what constitutes a crime in one state may not be one in another and can therefore escalate tensions in communities already overtargeted by law enforcement.

In 2017, the ACLU of Northern California found that more than 80 agencies in a dozen states were sharing license plate reader database information — run by Flock’s main competitor Vigilant Solutions (now owned by Motorola) — with U.S. Immigration and Customs Enforcement in violation of state laws or sanctuary policies.

When asked by Vice whether Flock could be used by immigration authorities for deportation, Garrett Langley, the company’s CEO, said, “Yes, if it was legal in a state, we would not be in a position to stop them.” He added, “We give the customers the tools to decide and let them go from there.”

Since the overturning of Roe v. Wade, activists have been concerned about the use of license plate readers to track people accessing abortion in states where it is illegal or crossing state lines to do so.

“Flock does not determine what a crime is,” the company told The Intercept. “We’d expect that local law enforcement will enforce those laws as they are legally or socially required.”

In addition to inundating police departments with marketing emails and appearing at conferences nationwide, Flock also has more intimate tactics to advertise its products.

In the process of being pitched Flock’s cameras, police Chief Todd Radford of Lakeway, Texas, was invited to a private dinner at an upscale restaurant in downtown Fort Worth, where he would have “the opportunity to mingle with other Flock customers as well as with other Chiefs from across the state,” according to an email obtained through a public records request.

It is partly due to the “totally inappropriate relationship” between the company and local law enforcement that the company has expanded so effectively, according to Maass of the Electronic Frontier Foundation. Flock’s overall business model involves “co-opting government agencies to promote their product.”

“One of the reasons we work with HOAs is so that they can partner with their local police to provide the evidence needed to solve real crimes, not just post photos of allegedly suspicious individuals on social media,” Flock told The Intercept. “We will all be safer if we work together.”

In generating partnerships with private neighborhoods, however, police capitalize on a loophole in law: getting around constitutional restrictions on data collection. In Washington state, where it’s illegal to track plates, HOAs like Alder Meadow, in a wealthy Seattle suburb, share their access to the technology with local police. And since Fourth Amendment privacy rules do not apply to private citizens, HOA boards are not subject to any oversight.

Back in December 2020, Brown, the police sergeant in Lakeway, was working hard to persuade Texas communities to install the cameras. In an email to Flock’s Rachel Hansen, he said he was “planting a bug in the ear of the HOA for our biggest subdivision.”

Flock also persuaded Lakeway to hold a community engagement event where Brown helped pitch the product to the association. Hansen emailed Brown, “Thank you SO much for joining and handling all of those curve ball questions like a rock star. I really appreciate you taking the time out of your busy schedule to lend a helping hand to Flock and the Rough Hollow Community.”

“The Flock camera situation was one of several data points in which the former chief exceeded the scope of his authority.”

Not everyone weathered the Flock deal. Around the time of the camera fallout, Radford, the police chief, resigned from the department “upon request.”

“The Flock camera situation was one of several data points in which the former chief exceeded the scope of his authority,” Kilgore, the Lakeway mayor, told The Intercept. “He also failed to develop formal internal controls or policies on who could access or use the data from Flock.”

The strategy used in Lakeway to sell the Flock system to its community was replicated elsewhere. Numerous police departments across the country have also held events for HOAs to learn how to “assist law enforcement to help deter crime” and have a “hand in preventing porch pirates,” The Intercept’s investigation found. Some city police departments, like Saratoga and Ranchos Palos Verdes, both in California, offer grants to help HOAs buy the technology.

In exchange, according to the grant agreements, the HOAs had to provide sheriff’s departments with access to “locate, review and download video recordings and readings.” In the first two rounds of grants in Ranchos Palos Verdes, 14 HOAs received grants for cameras in 2021.

Illustration: Joseph Gough for The Intercept

Illustration: Joseph Gough for The Intercept


In the hands of untrained law enforcement, license plate readers can cause more harm than good. In 2014, the U.S. Court of Appeals for the Ninth Circuit found a woman’s rights were violated after an erroneous license plate reader alert, that was not independently verified, led to a traffic stop in which she was detained and held at gunpoint. In 2020, police detained and handcuffed a Black mother and several children after a license plate scanner mistook their SUV for a stolen motorcycle from another state.

On a personal level, there is also misuse. Last October, in Kechi, Kansas, a police officer was arrested for improperly using Wichita Police Department’s Flock license plate reader technology to track the location of his estranged wife.

“Police aren’t even trained well enough to handle them to protect people’s data,” said Maass. “So how are you supposed to trust the homeowners associations with no law enforcement training, with no data protection training, with no cybersecurity training at all, to manage one of these systems?”

In neighborhood politics, where homeowners associations can already be divisive environments, the license plate scanner can stoke tensions. “Overreaching is problematic,” according to Paula Franzese, a law professor of Seton Hall University and expert in homeowners associations. “Sometimes a governing board charged with enforcing the rules can become too aggressive and too zealous.”

In multiple instances reviewed by The Intercept, HOAs installed the cameras without consulting the wider community. One case led to legal action. In 2021 in Indiana, a homeowner sued the Claybridge Homeowner Association for “trespassing onto her property, cutting down a tree without permission, and installing a surveillance camera without her consent.”

Flock will also sell their license plate readers to individuals without the backing of their HOA. An initiative was set up by a resident in Coral Gate, Florida, that led to the installation of 10 cameras in 2018 — and chaos in the neighborhood. Flock said it was uncommon for the company to sell to private individuals.

“They were very belligerent and opaque in how they went about it,” David Appell, a former resident of Coral Gate, told The Intercept. “They wouldn’t let anyone opt out. The administration was in their hands.”

HOAs often have private Facebook groups to discuss the inner workings of their community. As the license plate readers appeared across Coral Gate, group members turned on one another in the Facebook chat.

“I am very, very concerned of this additional intrusion of my home and life,” one wrote. “Why is this necessary? What is the necessity? What is this detecting? WHY?”

The license plate readers were ultimately removed.

Beyond the police and HOA network, Flock is working to expand its reach on a legislative level. The company has registered nearly 50 lobbyists across a dozen states in the last couple of years, according to public records reviewed by The Intercept.

In California — where some 20 percent of people live in HOAs — the company spent over half a million dollars lobbying for the Organized Retail Theft Grant Program, which passed the state legislature in 2022. The program, open to all police departments, was created to support law enforcement in preventing and responding to “organized retail or motor theft.”

Flock has also been registering lobbyists on a city level. In Providence City Council, in Rhode Island, the firm registered three employees as lobbyists. One, Laura Holland, a senior community affairs manager at Flock, was also registered as a lobbyist in Austin, Texas.

“We support policies that regulate the use of license plate readers, data security and data retention,” Flock said in a statement, “while also increasing public safety with unbiased, objective evidence.”

While some privacy legislation addresses biometric data — currently, Illinois, Texas, and Washington have laws that regulate facial recognition technology — few legislative efforts have been made to statutorily regulate license plate readers.

The result is a patchwork of sometimes ad hoc and wildly varied policies, even within the same state. In 2021, a New York Police Department memo said that the “field-of-view … is strictly limited to public areas and locations.” A four-hour drive away from the city in Elmira, New York, 50 Flock cameras were installed in January, with the city manager saying he was unable to disclose the exact locations.

“There isn’t really a lot of appetite at the state level for privacy protections. It’s a little bit like trying to stuff the genie back into the bottle.”

According to experts, implementing any regulation surrounding license plate readers is difficult.

“There isn’t really a lot of appetite at the state level for privacy protections,” said Yohnka of the ACLU of Illinois. “It’s a little bit like trying to stuff the genie back into the bottle.”

Others explain that at the heart of Flock’s sales pitch is how they straddle the intersection of security and privacy. For example, the company collects copious amounts of data — but only for 30 days. They share that data — but only with law enforcement.

“They’re able to explain that they don’t share data, but at the same time, extract use functionality of leveraging the data across law enforcement agencies,” said Donald Maye of IPVM, a surveillance industry research group. “They’re really having their cake and eating it too.”

And yet, as Flock continues to install its license plate readers and its surveillance network continues to expand across the country, some residents are suspicious about just exactly what the cameras are watching — and for whom.

“If you drive from your house to Dripping Springs to get some fine barbeque, you have become a subject to the system,” Kilgore, the mayor, said at the Lakeway City Council meeting, referring to the installation of the cameras in his community. “They can probably find out what you ordered on the way back.”


This content originally appeared on The Intercept and was authored by Georgia Gee.

]]>
https://www.radiofree.org/2023/03/22/license-plate-surveillance-courtesy-of-your-homeowners-association/feed/ 0 381187
Mapping Project Reveals Locations of U.S. Border Surveillance Towers https://www.radiofree.org/2023/03/20/mapping-project-reveals-locations-of-u-s-border-surveillance-towers/ https://www.radiofree.org/2023/03/20/mapping-project-reveals-locations-of-u-s-border-surveillance-towers/#respond Mon, 20 Mar 2023 17:00:40 +0000 https://theintercept.com/?p=423563

The precise locations of the U.S. government’s high-tech surveillance towers along the U.S-Mexico border are being made public for the first time as part of a mapping project by the Electronic Frontier Foundation.

While the Department of Homeland Security’s investment of more than a billion dollars into a so-called virtual wall between the U.S. and Mexico is a matter of public record, the government does not disclose where these towers are located, despite privacy concerns of residents of both countries — and the fact that individual towers are plainly visible to observers. The surveillance tower map is the result of a year’s work steered by EFF Director of Investigations Dave Maass, who pieced together the constellation of surveillance towers through a combination of public procurement documents, satellite photographs, in-person trips to the border, and even virtual reality-enabled wandering through Google Street View imagery. While Maass notes the map is incomplete and remains a work in progress, it already contains nearly 300 current tower locations and nearly 50 more planned for the near future.

Surveillance tower maps. Credit: Dave Maass/Electronic Frontier Foundation

As border surveillance towers have multiplied across the southern border, so too have they become increasingly sophisticated, packing a panoply of powerful cameras, microphones, lasers, radar antennae, and other sensors designed to zero in on humans. While early iterations of the virtual wall relied largely on human operators monitoring cameras, companies like Anduril and Google have reaped major government paydays by promising to automate the border-watching process with migrant-detecting artificial intelligence. Opponents of these modern towers, bristling with always-watching sensors, argue the increasing computerization of border security will lead inevitably to the dehumanization of an already thoroughly dehumanizing undertaking.

While American border authorities insist that the surveillance net is aimed only at those attempting to illegally enter the country, critics like Maass say they threaten the privacy of anyone in the vicinity. According to a 2022 estimate by the EFF, “about two out of three Americans live within 100 miles of a land or sea border, putting them within Customs and Border Protection’s special enforcement zone, so surveillance overreach must concern us all.” Taking the towers out of abstract funding and strategy documents and sticking them onto a map of the physical world also punctures CBP’s typical defense against privacy concerns, namely that the towers are erected in remote areas and therefore pose a threat to no one but those attempting to break the law. In fact, “the placement of the towers undermines the myth that border surveillance only affects unpopulated rural areas,” Maass wrote of the map. “A large number of the existing and planned targets are positioned within densely populated urban areas.”

The map itself serves as a striking document of the militarization of the U.S. border and domestic law enforcement, revealing a broad string of surveillance machines three decades in the making, stretching from the beaches of Tijuana to the southeastern extremity of Texas.

In 1993, federal officials launched Operation Blockade, a deployment of 400 Border Patrol agents to the northern banks of the Rio Grande between El Paso and Ciudad Juárez. The aim of the “virtual wall,” as it was described at the time, was to push the ubiquitous unauthorized crossing of mostly Mexican laborers out of the city — where they disappeared into the general population and Border Patrol agents engaged in racial profiling to find them — and into remote areas where they would be easier to arrest. Similar initiatives, Operation Gatekeeper in San Diego, Operation Safeguard in southern Arizona, Operation Rio Grande in South Texas, soon followed.

Though undocumented labor was essential to industries in the Southwest and had been for generations, an increasingly influential nativist wing of the Republican Party had found electoral success in attacking the Democrats and the Clinton administration for a purported disinterest in tackling lawbreaking in border cities. The White House responded by ordering the Pentagon’s Center for Low-Intensity Conflict, which had spent the previous decade running counterinsurgency campaigns around the world, as well as the now-defunct Immigration and Naturalization Service, to devise a tactical response to the president’s political problem.

The answer was “prevention through deterrence,” a combination of militarization and surveillance strategy that remains the foundation for border security thinking in the U.S. to this day. Bill Clinton’s unusual team of immigration and counterinsurgency officials saw the inherent “mortal danger” of pushing migrants into remote, deadly terrain as a strategic advantage. “The prediction is that with traditional entry and smuggling routes disrupted, illegal traffic will be deterred or forced over more hostile terrain, less suited for crossing and more suited for enforcement,” the officials wrote in their 1994 national strategy plan. The architects of prevention through deterrence accepted that funneling migrants into the most remote landscapes in the country would have deadly consequences, noting, “Violence will increase as effects of the strategy are felt.”

Violence did increase, albeit in the slow and agonizing form one finds in the desiccated washes of the Sonoran Desert and the endless chaparral fields of South Texas. Before prevention through deterrence, the medical examiner’s office in Tucson, Arizona, averaged roughly 12 migrant death cases a year. After the strategy went into effect, that number skyrocketed to 155.

The September 11 attacks made the already deadly situation far worse. In Washington, the cliched quip that “border security is national security” led to the Department of Homeland Security, the largest reorganization of the federal government since the creation of the CIA and the Defense Department. With the Department of Homeland Security up and running, U.S. taxpayers began funneling more money into the nation’s border and immigration agencies than the FBI; Drug Enforcement Administration; and the Bureau of Alcohol, Tobacco, Firearms and Explosives combined. Immigration offenses became the most common charge on the federal docket. An unprecedented network of for-profit immigration jails went up across the country.

On the border itself, a massive new industry of surveillance tech, much of it repurposed from the war on terror, was born. The more money the U.S. government poured into interdiction on the border, the more money there was to be made in evading the U.S. government. For migrants, hiring a smuggler became unavoidable. For smugglers, engaging with Mexican organized crime, many with links to Mexican government officials, became unavoidable. With organized crime involved, U.S. agencies called out for more resources. These dynamics have been extremely lucrative for an array of individuals and interests, while at the same time making human migration vastly more dangerous, radically altering life in border communities, and exacting a heavy toll on borderland ecosystems.

A close-up shot of an IFT’s camera lens, reflecting the desert landscape that it looks over below Coronado Peak, Cochise County, AZ.

A close-up shot of a Federal Telecommunications Institute camera lens, reflecting the desert landscape that it looks over below Coronado Peak in Hereford, Ariz.

Electronic Frontier Foundation

Surveillance towers have been significant part of that vicious cycle, even though, as Maass’s EFF report notes, their efficacy is far less certain than their considerable price tag.

Nobody can say for certain how many people have died attempting to cross the U.S.-Mexico border in the recent age of militarization and surveillance. Researchers estimate that the minimum is at least 10,000 dead in the past two and a half decades, and most agree that the true death toll is considerably higher.

Sam Chambers, a researcher at the University of Arizona, studies the relationship between surveillance infrastructure and migrant deaths in the Sonoran Desert and has found the two inextricable from one another. While the purpose of surveillance towers in theory is to collect and relay data, Chambers argues that the actual function of towers in the borderlands is more basic than that. Like the agents deployed to the Rio Grande in Operation Blockade or a scarecrow in a field, the towers function as barriers pushing migrants into remote areas. “It’s made in a way to make certain places watched and others not watched,” Chambers told The Intercept. “It’s basically manipulating behavior.”

“People cross in more remote areas away from the surveillance to remain undetected,” he said. “What it ends up doing is making the journeys longer and more difficult. So instead of crossing near a community, somebody is going to go through a mountain range or remote area of desert, somewhere far from safety. And it’s going to take them more energy, more time, much more exposure in the elements, and higher likelihood of things like hyperthermia.”

“There’s nothing to suggest anybody’s trying to make this humane in any manner.”

Last year was the deadliest on record for migrants crossing the southern border. While the planet is already experiencing a level of human migration unlike anything in living memory, experts expect human movement across the globe to increase even further as the climate catastrophe intensifies. In the U.S., where the nation’s two leading political parties have offered no indication of a will to abandon their use of deadly landscapes as force multipliers on the border, the multidecade wave of dying shows no sign of stopping anytime soon.

“They’ve been doing this, prevention through deterrence, since the ’90s,” Chambers said. “There’s nothing to suggest anybody’s trying to make this humane in any manner.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/03/20/mapping-project-reveals-locations-of-u-s-border-surveillance-towers/feed/ 0 380722
Broken furnace? In the Bay Area, soon you’ll have to replace it with a heat pump https://grist.org/buildings/bay-area-ban-sales-gas-powered-furnaces-heaters/ https://grist.org/buildings/bay-area-ban-sales-gas-powered-furnaces-heaters/#respond Mon, 20 Mar 2023 10:15:00 +0000 https://grist.org/?p=605382 San Francisco Bay Area regulators have banned the future sale of gas-powered heating appliances, such as furnaces and water heaters, to protect the region’s air quality. 

Starting in 2027, The Bay Area Air Quality Management District will require homeowners to replace any broken gas-powered heating units with heat pumps, devices that use an advanced form of technology similar to refrigerators and air conditioners to cool and heat a home at the same time. Regulators will also work with local governments in the area to ensure that permits for houses require the installation of electric heating appliances.

District officials estimated that this move could prevent smog-forming air pollutants and avert 15,000 asthma attacks and 85 premature deaths in the region due to better air quality. The measure will also contribute to cutting the state’s climate emissions, as home heating currently comprises 11% of the state’s fossil fuel emissions. 

In homes that are heated by fossil fuel furnaces and water heaters, numerous air pollutants from those appliances can seep out in the air inside and outside of the home. Many times, these gases don’t even have to be present in high volumes to do long-term damage to people’s health. Low levels of nitrogen oxides –– one of the air pollutants targeted in the rule –– can irritate asthma, chronic obstructive pulmonary disease and lead to respiratory infections in children, according to the Environmental Protection Agency. 

A Bay Area Clean Air Coalition analysis of national data showed that in California, people of color are exposed to 32% more indoor air pollution from appliances than their white counterparts. The review demonstrates that phasing out fossil fuels in the home can have positive impacts that go beyond reducing carbon emissions. The standard could also help bring cooling to households, almost half of which don’t have air conditioning – while temperatures in the state are rising.  

California is also helping to make heat pumps financially feasible for homeowners. While the upfront costs of installing a heat pump can top $10,000, subsidies available from the state of California, the federal government, and the Bay Area can help offset these costs to help people who might not otherwise be able to afford upgrading their gas appliances. 

Additionally, different types of subsidies can be combined to cover the costs of heat pumps. Heat pumps also have long-term financial benefits which outweigh those of other traditional heating systems, such as the combined heating and cooling impact as well as the comparative cost of electricity versus gas which can result in savings. 

It is still unclear if the standard will be implemented in a way that hurts or helps low-income residents since high utility bills are already impacting Bay Area residents. Regulators will need to create specific guidelines on the program to ensure that this program does not burden low-income residents.  

“Bay Area policymakers must ensure that the transition away from fossil fuel appliances is part of the solution for more affordable, climate-resilient housing, and not part of the problem,” said Megan Leary, community engagement and policy manager at Emerald Cities San Francisco Bay Area.

This story was originally published by Grist with the headline Broken furnace? In the Bay Area, soon you’ll have to replace it with a heat pump on Mar 20, 2023.


This content originally appeared on Grist and was authored by Siri Chilukuri.

]]>
https://grist.org/buildings/bay-area-ban-sales-gas-powered-furnaces-heaters/feed/ 0 380711
Two Sessions Summary https://www.radiofree.org/2023/03/18/two-sessions-summary/ https://www.radiofree.org/2023/03/18/two-sessions-summary/#respond Sat, 18 Mar 2023 13:19:28 +0000 https://dissidentvoice.org/?p=138937 This week’s News on China in 2 minutes.

• Two Sessions Summary
• New National Data Office
• China’s Historical Mediation between Iran and Saudi Arabia
• Modern Feminism in China

The post Two Sessions Summary first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Dongsheng News.

]]>
https://www.radiofree.org/2023/03/18/two-sessions-summary/feed/ 0 380444
A government program hopes to find critical minerals right beneath our feet https://grist.org/science/usgs-earth-mri-a-government-program-hopes-to-find-critical-minerals-right-beneath-our-feet/ https://grist.org/science/usgs-earth-mri-a-government-program-hopes-to-find-critical-minerals-right-beneath-our-feet/#respond Fri, 17 Mar 2023 10:45:00 +0000 https://grist.org/?p=605139 In a remote and heavily forested region of northern Maine, a critical resource in the fight against climate change has been hiding beneath the trees. In November, scientists with the U.S. Geological Survey, or USGS, announced the discovery of rocks that are rich in rare earth elements near Pennington Mountain. A category of metals that play an essential role in technologies ranging from smartphones to wind turbines to electric vehicle motors, rare earths are currently mined only at a single site in the United States. Now, researchers say a place that’s been geologically overlooked for decades could be sitting on the next big deposit of them — although a more thorough survey would be needed to confirm that.

While the U.S. government frets over shortages of the metals and minerals needed to transition off fossil fuels, it also lacks the basic geological knowledge needed to say where many of those resources are. Less than 40 percent of the nation has been mapped in enough detail to support the discovery of new mineral deposits, hampering the Biden administration’s plan to boost domestic mining of energy transition metals like rare earths and lithium, an essential ingredient in electric vehicle batteries. But the administration and Congress are now attempting to fill the maps in, by ramping up funding for the USGS’s Earth Mapping Resources Initiative, or Earth MRI.

Two geologists, seen from behind, in a lush green forest. One of them carries an orange instrument called a portable gamma spectrometer.
Geologists Chunzeng Wang and Preston Bass in the field near Pennington Mountain. Bass carries a tool called a portable gamma spectrometer. United States Geological Survey

A partnership between the federal government and state geological surveys, Earth MRI was established in 2019 with the goal of improving America’s knowledge of its “critical mineral” resources, a list of dozens of minerals considered vital for energy, defense, and other sectors. The initiative was quietly humming along to the tune of about $11 million per year in funding until 2022, when Earth MRI received an additional influx of $320 million, spread out over five years, through the 2021 Bipartisan Infrastructure Law. Since then, Earth MRI has kicked into overdrive, with the USGS launching dozens of new critical mineral-mapping efforts from Alaska to the Great Plains.

The USGS will be hunting for minerals both in the ground and at abandoned mines, where there may be valuable metals sitting in piles of toxic waste. The deposits they identify could eventually be extracted by mining companies, though experts say lawmakers and regulators will need to carefully weigh the benefits of mining against its social and environmental costs.

For now, says Earth MRI science coordinator Warren Day, the goal is to accomplish something that’s never been done before. “Nobody’s ever mapped all the critical minerals for the nation,” Day told Grist. “This is a huge undertaking.”

Indeed, the process of mapping the Earth is both labor intensive and time consuming: Geologists must be sent out into the field to record observations and locations of geological features like faults, take measurements, and make detailed interpretations of a landscape. Those interpretations might be augmented with laboratory analyses of soil and rock samples, as well as data collected by aircraft and other remote sensing instruments. It can take several years for researchers to synthesize all of that information into a map with a resolution of an inch to 2,000 feet, the standard scale that state geological surveys work at. Those geological maps don’t fully characterize ore deposits to determine whether they are economical to mine. But they often form a starting point for private companies to conduct that more detailed exploratory work. 

“Our part is the definition of the geological framework where deposits could occur,” Day said. “Private industry takes that and tries to define the resources.”

That industry-led exploration can take an additional several years, after which it might take up to a decade to permit and build a mine, says Allan Restauro, a metals and mining analyst at the energy consultancy BloombergNEF. The mismatch between the time from exploration to mining, and the anticipated near-term ramp-up in demand for energy transition metals, has led many experts to predict we’ll see shortfalls of resources like lithium within the decade. 

“Even if something were to be discovered right at this very instant, it may not be an actual producing mine until beyond 2030, when demand has shot up,” Restauro told Grist. 

To help close the gap between mineral discovery and future demand, Earth MRI scientists are racing to collect as much baseline geological data as they can. The federal government is contracting private companies to do airborne geophysical surveys — flying specialized instruments over a region to measure specific properties of the rocks underfoot. The primary approach the USGS is using, called aeromagnetic surveying, measures slight variations in the Earth’s magnetic field that relate to the magnetic properties of local rocks. In some cases, the agency is also conducting radiometric surveys, which detect natural radioactive emissions from rocks and soils containing elements like thorium and uranium. These elements can indicate the presence of specific mineral types of interest: Thorium, for example, is often found alongside rare earth elements. 

A helicopter with a boom that contains sensitive equipment for conducting airborne geophysical surveys.
The boom on this Earth MRI helicopter contains sensitive equipment for conducting airborne geophysical surveys. United States Geological Survey

As the USGS is conducting reconnaissance from the air, state geologists are sent out to the field for detailed surface mapping and sampling.

Earth MRI scientists have identified more than 800 focus areas around the nation — regions with at least some potential to host critical minerals. With the Bipartisan Infrastructure Law boosting the initiative’s total budget to $74 million annually from 2022 to 2026, the effort to survey all of them has ramped up “significantly,” says Jim Faulds, the president of the American Association of State Geologists. About twice as many states are now engaged in mapping projects as before the law, and individual projects are receiving three times the funding they were before. That’s expected to be a major boon for Western states like Nevada and Arizona, which have only had a quarter to a third of the land mapped in detail and are among the most promising places in the country to find energy transition metals.

“Many Western states are mineral rich,” Faulds said. “But we don’t necessarily know where those minerals are.” 

Even in places where large mineral deposits have been discovered already, we don’t necessarily have detailed maps of the region. That’s the case for the Thacker Pass area near the Oregon border, host to some of the largest lithium resources in North America, as well as an area of west-central Nevada that has large lithium deposits. New Earth MRI-funded survey work in these areas will help define the full extent of these resources, says Faulds, who directs Nevada’s state Bureau of Mines and Geology.

In the eastern U.S., where some states are relatively well mapped, there’s still a potential for new discoveries. Geologists had no idea, for example, that the Pennington Mountain area of northern Maine was host to rare earth-rich rocks: Earth MRI funded a project in the area because it had previously been mined for elements like copper and manganese, said Anji Shah, a USGS geophysicist who contributed to the study. 

“When we chose the area, we were thinking about those particular mineral resources,” Shah said. “It was only when we got the [airborne survey] data and we noticed some anomalies that we said, ‘Hey, this might be high in rare earth elements.’” Follow-up work in the field and lab confirmed not just elevated levels of rare earths, but also niobium and zirconium, minerals used in jet engine components and nuclear control rods.

A close-up of a craggy gray rock
A fine-grained volcanic rock, found on Pennington Mountain in Maine, that hosts rare earth elements, niobium, and zirconium. United States Geological Survey / Chunzeng Wang, University of Maine-Presque Isle

Discoveries like this could ultimately lead to the establishment of new mines and new domestic supply chains for critical minerals, a key policy goal of the Biden administration. But as companies start clamoring to dig these rocks out of the ground, the administration will have to think carefully about how to balance its climate and national security priorities with the potential harms of mining, which can degrade local ecosystems, cause air and water pollution, and transform rural communities. Projects that aren’t sited carefully are likely to meet local resistance, as illustrated by a proposed lithium mine at Thacker Pass that recently began construction despite fierce opposition from conservationists, a local rancher, and Native American tribes.

“We’re going to discover many more deposits” out of Earth MRI, said Thea Riofrancos, a political scientist at Providence College in Rhode Island who studies the intersection between resource extraction and green energy. But the benefits of extracting those minerals, Riofrancos said, “should not be presumed.” 

Riofrancos would like to see the government thinking holistically about better and worse places for mining, perhaps combining maps of mineral deposits with maps showing biodiversity, water resources, historically marginalized communities, and Indigenous lands, where a large fraction of today’s energy transition metal mining occurs, according to a recent study. (Day says the USGS always obtains written consent from tribes before mapping reservation lands.) Taking all of these factors into account when deciding where to permit new mining will help ensure that harm is minimized, Riofrancos says.

One of the more attractive places to hunt for energy transition metals could be abandoned mine land, which has already been degraded. Coal mining waste, for instance, can be enriched in rare earth elements; scientists with the Department of Energy are currently working out the best ways to extract them. Several years ago, Shah and her colleagues discovered that mining waste at abandoned 19th- and 20th-century iron mines in the eastern Adirondack Mountains in New York is also enriched in rare earths — in particular, the so-called heavy rare earths that are more economically valuable.

Riofrancos sees the USGS’s inclusion of mine wastes in its mapping efforts as a positive sign. “The more industrially developed an area is, the less new harm is created by mining,” she said, adding that it might be possible to extract new metals from mine waste in tandem with environmental cleanup efforts.

But ultimately, it’s private companies that will decide, based on the trove of new information the government is collecting, which areas it wants to explore further for possible mining. And at this point, Faulds says, “there’s quite a bit of interest at all levels” in Earth MRI data.

“I would say companies are on the edge of their seats,” he said.

This story was originally published by Grist with the headline A government program hopes to find critical minerals right beneath our feet on Mar 17, 2023.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/science/usgs-earth-mri-a-government-program-hopes-to-find-critical-minerals-right-beneath-our-feet/feed/ 0 380105
A government program hopes to find critical minerals right beneath our feet https://grist.org/science/usgs-earth-mri-a-government-program-hopes-to-find-critical-minerals-right-beneath-our-feet/ https://grist.org/science/usgs-earth-mri-a-government-program-hopes-to-find-critical-minerals-right-beneath-our-feet/#respond Fri, 17 Mar 2023 10:45:00 +0000 https://grist.org/?p=605139 In a remote and heavily forested region of northern Maine, a critical resource in the fight against climate change has been hiding beneath the trees. In November, scientists with the U.S. Geological Survey, or USGS, announced the discovery of rocks that are rich in rare earth elements near Pennington Mountain. A category of metals that play an essential role in technologies ranging from smartphones to wind turbines to electric vehicle motors, rare earths are currently mined only at a single site in the United States. Now, researchers say a place that’s been geologically overlooked for decades could be sitting on the next big deposit of them — although a more thorough survey would be needed to confirm that.

While the U.S. government frets over shortages of the metals and minerals needed to transition off fossil fuels, it also lacks the basic geological knowledge needed to say where many of those resources are. Less than 40 percent of the nation has been mapped in enough detail to support the discovery of new mineral deposits, hampering the Biden administration’s plan to boost domestic mining of energy transition metals like rare earths and lithium, an essential ingredient in electric vehicle batteries. But the administration and Congress are now attempting to fill the maps in, by ramping up funding for the USGS’s Earth Mapping Resources Initiative, or Earth MRI.

Two geologists, seen from behind, in a lush green forest. One of them carries an orange instrument called a portable gamma spectrometer.
Geologists Chunzeng Wang and Preston Bass in the field near Pennington Mountain. Bass carries a tool called a portable gamma spectrometer. United States Geological Survey

A partnership between the federal government and state geological surveys, Earth MRI was established in 2019 with the goal of improving America’s knowledge of its “critical mineral” resources, a list of dozens of minerals considered vital for energy, defense, and other sectors. The initiative was quietly humming along to the tune of about $11 million per year in funding until 2022, when Earth MRI received an additional influx of $320 million, spread out over five years, through the 2021 Bipartisan Infrastructure Law. Since then, Earth MRI has kicked into overdrive, with the USGS launching dozens of new critical mineral-mapping efforts from Alaska to the Great Plains.

The USGS will be hunting for minerals both in the ground and at abandoned mines, where there may be valuable metals sitting in piles of toxic waste. The deposits they identify could eventually be extracted by mining companies, though experts say lawmakers and regulators will need to carefully weigh the benefits of mining against its social and environmental costs.

For now, says Earth MRI science coordinator Warren Day, the goal is to accomplish something that’s never been done before. “Nobody’s ever mapped all the critical minerals for the nation,” Day told Grist. “This is a huge undertaking.”

Indeed, the process of mapping the Earth is both labor intensive and time consuming: Geologists must be sent out into the field to record observations and locations of geological features like faults, take measurements, and make detailed interpretations of a landscape. Those interpretations might be augmented with laboratory analyses of soil and rock samples, as well as data collected by aircraft and other remote sensing instruments. It can take several years for researchers to synthesize all of that information into a map with a resolution of an inch to 2,000 feet, the standard scale that state geological surveys work at. Those geological maps don’t fully characterize ore deposits to determine whether they are economical to mine. But they often form a starting point for private companies to conduct that more detailed exploratory work. 

“Our part is the definition of the geological framework where deposits could occur,” Day said. “Private industry takes that and tries to define the resources.”

That industry-led exploration can take an additional several years, after which it might take up to a decade to permit and build a mine, says Allan Restauro, a metals and mining analyst at the energy consultancy BloombergNEF. The mismatch between the time from exploration to mining, and the anticipated near-term ramp-up in demand for energy transition metals, has led many experts to predict we’ll see shortfalls of resources like lithium within the decade. 

“Even if something were to be discovered right at this very instant, it may not be an actual producing mine until beyond 2030, when demand has shot up,” Restauro told Grist. 

To help close the gap between mineral discovery and future demand, Earth MRI scientists are racing to collect as much baseline geological data as they can. The federal government is contracting private companies to do airborne geophysical surveys — flying specialized instruments over a region to measure specific properties of the rocks underfoot. The primary approach the USGS is using, called aeromagnetic surveying, measures slight variations in the Earth’s magnetic field that relate to the magnetic properties of local rocks. In some cases, the agency is also conducting radiometric surveys, which detect natural radioactive emissions from rocks and soils containing elements like thorium and uranium. These elements can indicate the presence of specific mineral types of interest: Thorium, for example, is often found alongside rare earth elements. 

A helicopter with a boom that contains sensitive equipment for conducting airborne geophysical surveys.
The boom on this Earth MRI helicopter contains sensitive equipment for conducting airborne geophysical surveys. United States Geological Survey

As the USGS is conducting reconnaissance from the air, state geologists are sent out to the field for detailed surface mapping and sampling.

Earth MRI scientists have identified more than 800 focus areas around the nation — regions with at least some potential to host critical minerals. With the Bipartisan Infrastructure Law boosting the initiative’s total budget to $74 million annually from 2022 to 2026, the effort to survey all of them has ramped up “significantly,” says Jim Faulds, the president of the American Association of State Geologists. About twice as many states are now engaged in mapping projects as before the law, and individual projects are receiving three times the funding they were before. That’s expected to be a major boon for Western states like Nevada and Arizona, which have only had a quarter to a third of the land mapped in detail and are among the most promising places in the country to find energy transition metals.

“Many Western states are mineral rich,” Faulds said. “But we don’t necessarily know where those minerals are.” 

Even in places where large mineral deposits have been discovered already, we don’t necessarily have detailed maps of the region. That’s the case for the Thacker Pass area near the Oregon border, host to some of the largest lithium resources in North America, as well as an area of west-central Nevada that has large lithium deposits. New Earth MRI-funded survey work in these areas will help define the full extent of these resources, says Faulds, who directs Nevada’s state Bureau of Mines and Geology.

In the eastern U.S., where some states are relatively well mapped, there’s still a potential for new discoveries. Geologists had no idea, for example, that the Pennington Mountain area of northern Maine was host to rare earth-rich rocks: Earth MRI funded a project in the area because it had previously been mined for elements like copper and manganese, said Anji Shah, a USGS geophysicist who contributed to the study. 

“When we chose the area, we were thinking about those particular mineral resources,” Shah said. “It was only when we got the [airborne survey] data and we noticed some anomalies that we said, ‘Hey, this might be high in rare earth elements.’” Follow-up work in the field and lab confirmed not just elevated levels of rare earths, but also niobium and zirconium, minerals used in jet engine components and nuclear control rods.

A close-up of a craggy gray rock
A fine-grained volcanic rock, found on Pennington Mountain in Maine, that hosts rare earth elements, niobium, and zirconium. United States Geological Survey / Chunzeng Wang, University of Maine-Presque Isle

Discoveries like this could ultimately lead to the establishment of new mines and new domestic supply chains for critical minerals, a key policy goal of the Biden administration. But as companies start clamoring to dig these rocks out of the ground, the administration will have to think carefully about how to balance its climate and national security priorities with the potential harms of mining, which can degrade local ecosystems, cause air and water pollution, and transform rural communities. Projects that aren’t sited carefully are likely to meet local resistance, as illustrated by a proposed lithium mine at Thacker Pass that recently began construction despite fierce opposition from conservationists, a local rancher, and Native American tribes.

“We’re going to discover many more deposits” out of Earth MRI, said Thea Riofrancos, a political scientist at Providence College in Rhode Island who studies the intersection between resource extraction and green energy. But the benefits of extracting those minerals, Riofrancos said, “should not be presumed.” 

Riofrancos would like to see the government thinking holistically about better and worse places for mining, perhaps combining maps of mineral deposits with maps showing biodiversity, water resources, historically marginalized communities, and Indigenous lands, where a large fraction of today’s energy transition metal mining occurs, according to a recent study. (Day says the USGS always obtains written consent from tribes before mapping reservation lands.) Taking all of these factors into account when deciding where to permit new mining will help ensure that harm is minimized, Riofrancos says.

One of the more attractive places to hunt for energy transition metals could be abandoned mine land, which has already been degraded. Coal mining waste, for instance, can be enriched in rare earth elements; scientists with the Department of Energy are currently working out the best ways to extract them. Several years ago, Shah and her colleagues discovered that mining waste at abandoned 19th- and 20th-century iron mines in the eastern Adirondack Mountains in New York is also enriched in rare earths — in particular, the so-called heavy rare earths that are more economically valuable.

Riofrancos sees the USGS’s inclusion of mine wastes in its mapping efforts as a positive sign. “The more industrially developed an area is, the less new harm is created by mining,” she said, adding that it might be possible to extract new metals from mine waste in tandem with environmental cleanup efforts.

But ultimately, it’s private companies that will decide, based on the trove of new information the government is collecting, which areas it wants to explore further for possible mining. And at this point, Faulds says, “there’s quite a bit of interest at all levels” in Earth MRI data.

“I would say companies are on the edge of their seats,” he said.

This story was originally published by Grist with the headline A government program hopes to find critical minerals right beneath our feet on Mar 17, 2023.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/science/usgs-earth-mri-a-government-program-hopes-to-find-critical-minerals-right-beneath-our-feet/feed/ 0 380106
Puerto Rico town celebrates ‘first-of-its-kind’ solar microgrid https://grist.org/solutions/puerto-rico-town-celebrates-first-of-its-kind-solar-microgrid/ https://grist.org/solutions/puerto-rico-town-celebrates-first-of-its-kind-solar-microgrid/#respond Thu, 16 Mar 2023 10:00:00 +0000 https://grist.org/?p=605113 Adjuntas, Puerto Rico, is celebrating a milestone this week as it completes the final phase in a project to boost its energy resiliency. The community’s 17,600 residents now host the archipelago’s first cooperatively managed solar microgrid — a network of photovoltaic panels and battery storage units that will use renewable energy to keep the lights on and power flowing during a power outage.

“This is a first-of-its-kind project,” said Kate Trujillo, deputy director of the nonprofit Honnold Foundation, which helped install the microgrid alongside the Adjuntas-based nonprofit Casa Pueblo. “It’s amazing to see it all coalescing.” 

The system includes some 700 panels mounted on seven buildings in the town’s central plaza and a storage system assembled from electric vehicle batteries, capable of providing up to 187 kilowatts of power. The batteries can provide enough off-grid electricity to keep 14 downtown businesses running for up to 10 days, serving as community hubs in case of an extended power outage. 

Business owners and residents will run the microgrid through a nonprofit called the nonprofit Community Solar Energy Association of Adjuntas, which will sell electricity to the commonwealth’s grid through a power purchase agreement. Money saved by not buying power from Puerto Rico’s main power company will support maintaining the microgrid and starting new community projects, according to the Honnold Foundation. 

The system was built in response to Puerto Rico’s increasingly severe hurricanes and the prolonged power outages they have caused for Adjuntas residents — some of whom have gone without electricity for as long as 11 months. Last fall, Hurricane Fiona destroyed half of Puerto Rico’s transmission lines and distribution infrastructure, knocking out power for hundreds of thousands of people. The damage came even as the archipelago’s power struggled to recover from similar destruction caused five years earlier by Hurricane Maria. Beyond the risk from extreme storms, Puerto Rico’s gas-fired power plants face ongoing risks from earthquakes.

As hurricanes and other climate-related natural disasters grow more destructive, many communities across the U.S. are turning to microgrids. One report published in 2021 said the cumulative capacity of such systems could more than triple by 2030, creating almost half a million jobs nationwide and billions of dollars in economic activity.

Aerial view of Adjuntas' central plaza
Community groups are celebrating the installation of a network of solar panels and battery storage units to provide off-grid electricity to businesses in Adjuntas’ central plaza. Ricardo Arduengo

That’s not to say there aren’t still challenges. The Adjuntas microgrid has been in the works since 2019, as supporters needed time to raise funds for the system’s many components and figure out how to transport them up the mountain into town. Progress was further hamstrung by COVID-related supply chain disruptions, as well recurrent earthquakes and hurricanes.

“We’ve gone through a lot, … but we knew it was the right way to go,” said Arturo Massol-Deyá, Casa Pueblo’s executive director and a 2019 Grist 50 honoree. He also said it was difficult navigating a complex system of landlords, business owners, and other stakeholders to sort out how the microgrid would work and who would operate it. 

Casa Pueblo used to own the only building in Adjuntas equipped with solar panels capable of meeting the community’s needs during an outage. Now, the microgrid will expand residents’ access to off-grid electricity, giving them the ability to refrigerate food and medicine, charge electronic devices, and more.

“It’ll do the kind of things that really help communities keep together during power outages and natural disasters,” Trujillo said. “It’s a beacon of light, both figuratively and literally, in times of need.”

Casa Pueblo and the Honnold Foundation will inaugurate the microgrid on Saturday with a community-wide celebration, including a festive “Marcha del Sol” through downtown. Massol-Deyá said he wants the event to make “a political statement” to get more of Puerto Rico off fossil fuels. 

“What we are doing with the microgrid is a reference for what can and should be done in other municipalities in Puerto Rico,” he told me. “We can change our energy system, it can be done — we have shown that it can be done.”

Correction: This article has been corrected to reflect that Adjuntas’ microgrid uses new EV batteries, rather than secondhand ones.

This story was originally published by Grist with the headline Puerto Rico town celebrates ‘first-of-its-kind’ solar microgrid on Mar 16, 2023.


This content originally appeared on Grist and was authored by Joseph Winters.

]]>
https://grist.org/solutions/puerto-rico-town-celebrates-first-of-its-kind-solar-microgrid/feed/ 0 379869
The Cell Phone Is a Pair of Red High Heels https://www.radiofree.org/2023/03/14/the-cell-phone-is-a-pair-of-red-high-heels/ https://www.radiofree.org/2023/03/14/the-cell-phone-is-a-pair-of-red-high-heels/#respond Tue, 14 Mar 2023 15:34:36 +0000 https://dissidentvoice.org/?p=138770 It is comical how easily one can be ignored for pointing out that new technology is dangerous and fetishistic. So-called “smart” cell phones are a prime example.  For years I have been pointing out their dangers on many levels. To say most people are devoted to them is an understatement. Maybe it is an exaggeration to say […]

The post The Cell Phone Is a Pair of Red High Heels first appeared on Dissident Voice.]]>
It is comical how easily one can be ignored for pointing out that new technology is dangerous and fetishistic. So-called “smart” cell phones are a prime example.  For years I have been pointing out their dangers on many levels. To say most people are devoted to them is an understatement. Maybe it is an exaggeration to say they revere them, but if asked, they will say they couldn’t live without them. It’s sort of like saying I don’t revere my partner but couldn’t live without her or him. Ah love!

But what’s love got to do with it? Love and romance are out of date. Sex is a just a quick fill-in when there’s a break in the technological action. Creative and erotic energy is pissed away on trivia. Being lost and confused and having no time is in. But only the latter can be admitted.

Busy busy busy! Beep beep beep as the eyes go down to the screens. Thumbs athumbing or voices talking to the gadgets, while the busy beavers forget who is under whose thumbs.

Eros is replaced by Chaos while Aphrodite weeps in the woods, but no one hears.

Pass the remote. The silence stings.

We are children of Greece but we forget its truths in our time of digital dementia, if we ever knew them. Beauty is banished for ugliness and technology is worshipped as a god. Art has become meaningless unless it’s falsely connected to celebrities and entertainment culture. There are no limits; everything is permitted. Hubris reigns.  Even the thought that Digital IDs, Central Bank Digital Currencies, and vaccination passports are on the agenda does not dissuade the lovers. It’s a game of control abetted by radical stupidity, and it is not a mistake, as Dylan, contrary to his public posturing and corporate imaging, lets his artist’s soul sing:

There are no mistakes in life some people say
It is true sometimes you can see it that way
But people don’t live or die, people just float

Floating in a void of gibberish and double-talk, heads barely above the water, alienated from reality while fixated on the Spectacle, while sometimes when panicky looking for a life preserver but never to the right source, this is where technology and capitalism  have taken us.  On any issue – the bombing of the Nord Stream pipelines, the facts about the U. S. proxy-war against Russia in Ukraine, Covid-19, the economy, etc. –  the mainstream media daily pumps out contradictory stories to confuse the public whose attention span has been reduced to a scrolling few seconds.  Sustained attention and the ability to dissect the endless propaganda is a thing of the past and receding faster than the computer jargon of milliseconds and nanoseconds.  Planned chaos is the proper name for the daily news reports.

Fetishism, in all its forms, rules.

What else is the cell phone but a pair of red high heels?

What else are all those phone photos millions are constantly taking as they antique reality to store in their mausoleums of loss?

What about the constant messaging, the being in touch that never touches?

Despite the fact that everything digital is extremely ephemeral, the smart phone itself seems god-like, a way to transcend reality while entering it. “My phone is my rock, and my fortress, and my deliverer; my God, my strength, in whom I will trust; my buckler, and the horn of my salvation, and my high tower.”

A toehold on “reality.”  A machine in hand that saves nine – million abstractions.  And prevents boredom from overwhelming minds intent on floating, because, as Walter Benjamin wrote in “The Storyteller”: “Boredom is the dream bird that hatches the egg of experience.  A rustling in the leaves drives him away.” Vibrating and dinging phones will suffice to disturb that dream bird of creative silence that is the only antidote to floating in the void of noise.

But fetishes come in many forms because the need for false gods is so attractive.  To think you have a way to control reality is addictive.

I recently saw an article about an auction sale at Sotheby’s in New York of the movie stars Paul Newman’s and Joanne Woodward’s personal effects. These include Woodward’s (who is still alive and suffering from Alzheimer’s disease) wedding ring and dress, the shackles Newman wore in the film Cool Hand Luke, a suit from his racing car days, etc. – over three hundred items in all.  According to a Sotheby spokesperson, the Newman-Woodward family, who will receive the proceeds, are doing this to “continue telling the stories of their parents.” Don’t laugh. The article mentions that one of Paul’s watches sold at auction a few years ago for $17.8 million dollars and another for $5.4 million.

So I ask: what are the wealthy purchasers of these objects really buying?  And the answer is quite obvious. They are buying fetishes or transference objects that they think will grant them a piece of the immortal stars’ magic. They are buying idols, Oscars, illusions to worship and to touch in place of reality. Ways to enter the cultural hero system.

Ernest Becker put it this way in The Denial of Death: “The fetish object represents the magical means for transforming animality into something transcendent and thereby assuring a liberation of the personality from the standard bland and earthbound flesh.”  If one can possess a piece of the demi-god’s power – an autograph, a watch, a ring – one will somehow live forever. It’s not about “trusting the science” but about believing in the magic.

Newman’s daughters who have pushed this sale, as well as a new documentary, The Last Movie Stars, and the memoir Paul Newman: The Extraordinary Life of an Ordinary Man – compiled from their father’s transcripts of conversations with his friend, Stewart Stern, over thirty years ago – have done something supremely ironic.  On one hand, they are selling their father’s and mother’s memorabilia, allegedly to tell their stories, through things that are fetishes for those desperate for holy secular relics, while at the same time publishing a book in which Paul honestly knocks himself off the pedestal and says he was always an insecure guy, numbed by his childhood and the false face Hollywood created for him.  In other words, an ordinary man with talent who was very successful in Hollywood’s dream factory, where illusions are the norm.

“I was my mother’s Pinocchio, the one that went wrong,” he tells us right away, leading us to the revelations of his human, all-too-human reality.  His was a life of facades and dead emotions, false faces, and his struggles to become who he really was.  He tells us he wasn’t his film roles, not Hud or Brick or Fast Eddie or Cool Hand Luke, but he wasn’t really the guy playing them either. He was a double enigma, an actor playing an actor. He says:

I’ve always had a sense of being an observer of my own life…. I have a sense of watching something, but not of living something.  It’s like looking at a photograph that’s out of focus …. It’s spacey; I guess I always feel spaced out.

His courageous honesty reminds me of Friedrich Nietzsche’s final work, Ecce Home (Behold the Man), not because Paul waxes philosophical but because he’s brutally honest.  If a movie star’s truths strike you as not comparable to those of a great philosopher, I would suggest considering that Nietzsche’s key concern was the theater and how we are all actors, a few genuine and most false.  In The Twilight of the Idols he asked, “Are you genuine?  Or merely an actor?  A representative?  Or that which is represented? In the end, perhaps you are merely a copy of an actor.”

Paul Newman lived for 17 years after speaking to his friend Stewart Stern. I like to think those conversations helped him break through to becoming who he really was.  From what I know of the man, he was generous to a fault and did much to ease others’ pains, especially to bring joy to children with cancer. I think he changed. While his things that are on the auction block now serve as illusionary fetishes for those looking for crutches, I believe he finally threw away the mental crutches he used when playing Brick in Cat on a Hot Tin Roof. Perhaps the wooden ones will be in the auction and some desperado will bid on them.

We know that with the planned chaos being used to shock people into submission through fear, there has been a drastic rise in depression and mental distress of all kinds, especially since the Covid-19 propaganda rollout with its lockdowns and deadly jabs.  The magic anti-depression pellets dispensed for decades by the criminal pharmaceutical cartels can not begin to contain this sense of helplessness that continues to spread.  They too are fetishes and ways to divert people’s attention from the social and spiritual sources of their anguish.

There is something very chilling in the way the reality of flesh and blood humans living in a natural world has been replaced by all types of fetishes – drugs, objects, celebrities, machines, etc.  While all are connected, the cell phone is key because of its growing centrality to the elites’ push for a digitized world. No matter how many articles and news reports about Artificial Intelligence (AI) that appear, it is all just a gloss on a long-developing problem that goes back many years – machine worship.

“Smart” cell phones are the current apotheotic control mechanism promoted as liberation. They are a form of slavery promoted by the World Economic Forum, their bosses, and their minions. As Alastair Crooke puts it, “It is that a majority of the people are so numbed and passive – and so in lockstep – as the state inches them through a series of repeating emergencies towards a new kind of authoritarianism, that they don’t fuss greatly, or even notice much.” Freedom is slavery.

Here is Ernest Becker again:

Boss [Medard Boss, Swiss psychanalyst and psychiatrist] says that the terrible guilt feelings of the depressed person are existential, that is, they represent failure to live one’s own life, to fulfill one’s own potential because of the twisting and turning to be ‘good’ in the eyes of the other.  The other calls the tune to one’s eligibility for immortality, and so the other takes up one’s unlived life. . . . In short, even if one is a very guilty hero he is at least a hero in the same hero-system [personal and cultural]. The depressed person uses guilt to hold onto his objects and to keep his situation unchanged. Otherwise he would have to analyze it or be able to move out of it and transcend it…. Better guilt and self-punishment when you cannot punish the other – when you cannot even dare to accuse him [the social system], as he represents the immortality ideology with which you have identified.  If your god is discredited, you yourself die; the evil must be in yourself and not in your god, so that you may live.

I wonder if I should bid on the shackles Paul Newman wore as the prisoner in Cool Hand Luke. They are probably the cheapest item on the auction menu.  I think they will remind me that the Captain was wrong when he said to Luke, “What we’ve got here is failure to communicate.”

“Where are you calling from,” she asked. “My cell,” he said.

“Of course,” she answered.

The post The Cell Phone Is a Pair of Red High Heels first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Edward Curtin.

]]>
https://www.radiofree.org/2023/03/14/the-cell-phone-is-a-pair-of-red-high-heels/feed/ 0 379343
How a small business in Arizona is helping decarbonize concrete https://grist.org/technology/how-a-small-business-in-arizona-is-helping-decarbonize-concrete/ https://grist.org/technology/how-a-small-business-in-arizona-is-helping-decarbonize-concrete/#respond Fri, 10 Mar 2023 11:30:00 +0000 https://grist.org/?p=604655 Block-Lite is a small concrete manufacturer in an industrial corridor of Flagstaff, Arizona. The third-generation family business makes bricks and other masonry materials for retaining walls, driveways, and landscaping projects. The company was already a local leader in sustainability — in 2020, it became the first manufacturer in Flagstaff to power its operations with on-site solar panels. But now it’s doing something much more ambitious.

On Tuesday, Block-Lite announced a pioneering collaboration with climate tech startups Aircapture and CarbonBuilt to suck carbon dioxide from the atmosphere and stash it in concrete blocks. The companies estimate the project will reduce the carbon footprint of Block-Lite’s products by 70 percent, creating a model they hope could reshape the industry.

Concrete creates an enormous problem for the climate. It’s one of the literal building blocks of society, and it has been growing more carbon intensive each year. Most of that carbon doesn’t come from manufacturing concrete, but from the production of its main ingredient, cement. Cement production is responsible for some 10 percent of industrial carbon emissions in the U.S. 

CarbonBuilt has developed a solution that addresses the issue in two distinct ways. First, the company found a proprietary way to replace cement with a mix of inexpensive, locally-sourced industrial waste materials. CEO Rahul Shendure told Grist they include common byproducts of coal plants, steelmaking, and chemical production that would, for the most part, otherwise be destined for landfills. The company’s second feat is the way its equipment hardens that slurry into concrete blocks — by curing it with carbon dioxide. That’s where Aircapture comes in. The company will build one of its machines which extract carbon dioxide from the ambient air directly on Block-Lite’s site. 

“Our technology is pretty flexible in where we source CO2 from,” said Shendure. “The thing that’s different about this project in particular is that we’re sourcing the carbon dioxide from direct air capture technology.”

Google Maps

It’s an idea that a handful of other companies are pursuing. In February, a similar partnership between another direct air capture company called Heirloom and concrete startup CarbonCure demonstrated its process for the first time. This also isn’t CarbonBuilt’s first project — the company is retrofitting a concrete plant in Alabama called Blair Block. In that case, the CO2 will come from burning biomass in a boiler.

The Flagstaff project is breaking ground, in part, thanks to a $150,000 grant from the Four Corners Carbon Coalition, a group of local governments throughout the Southwest that pool resources to finance projects that remove carbon dioxide from the atmosphere. The coalition was born of the realization that communities with ambitious goals to become carbon neutral will likely need to invest in such solutions, many of which are still embryonic. 

“If one local government tries to do this on their own, it’s gonna be extremely costly and time intensive, and we don’t have the technical expertise,” Susie Strife, the sustainability director for Boulder County, Colorado, a founding member of the coalition, said in an interview with Grist last year. “We’re trying to aggregate resources and create a sort of a local government platform for carbon dioxide removal.”

In addition to that funding, Shendure said the company plans to sell carbon credits for the CO2 that Aircapture’s equipment pulls out of the atmosphere, as well as for the carbon reductions from using less cement. “We’ve got a letter of intent from a buyer and that’s going to be critical to this project,” he said. “There’s a lot of companies right now that are paying premium credit prices for emerging technologies so that we get more of these out there in the real world.”

Block-Lite did not respond to Grist’s inquiry, but in a press release, the company suggested that the new concrete products would be no costlier than its current offerings. “All too often sustainable building materials require a trade off between cost and performance, but what is unique about this project is that there’s no ‘green premium.’” Block-Lite said. “We’re going to be able to produce on-spec, ultra-low carbon blocks at price parity with traditional blocks which should speed adoption and impact.”

This story was originally published by Grist with the headline How a small business in Arizona is helping decarbonize concrete on Mar 10, 2023.


This content originally appeared on Grist and was authored by Emily Pontecorvo.

]]>
https://grist.org/technology/how-a-small-business-in-arizona-is-helping-decarbonize-concrete/feed/ 0 378467
Digital anthropologist Caia Hagel on how technology influences creativity https://www.radiofree.org/2023/03/10/digital-anthropologist-caia-hagel-on-how-technology-influences-creativity/ https://www.radiofree.org/2023/03/10/digital-anthropologist-caia-hagel-on-how-technology-influences-creativity/#respond Fri, 10 Mar 2023 08:00:00 +0000 https://thecreativeindependent.com/people/digital-anthropologist-caia-hagel-on-how-technology-influences-creativty What do you think is a/the role of the artist and what do you consider a creative person to be?

I think the artist’s role is a messenger role. When you’re creating, you step aside to allow the story to come through you and you transcribe it faithfully. A gifted artist can never really explain what their art is, and they often don’t know how it’s even made. It’s a mysterious process, a riddle, it’s something the artist and the art’s audience are forced to think and feel deeply about but never really come to a definitive conclusion on. When this happens, and whatever unexplainable energy has entered the work and been captured by it, it’s a sublime experience to make art and to consume art. If, as an artist, you can explain your art and you think it’s about you, then it’s logical and it’s coming from a place of ego. Nothing wrong with that but I wouldn’t call this art, I’d call it content creation.

This is a barometer I use in my work as a writer and digital anthropologist, where I often practice extreme invisibility to inhabit areas of the mind or of the internet that are usually unconscious or taboo. I turn up as a cyborg, or I impersonate operating systems or AI, or am impersonated by bots or phone apps, so I can enter intimate spaces with strangers from diverse communities. I transcribe the stories that happen in these spaces without trying to solve anything or explain any of the unusual things that happen there. These stories, I hope, reflect some of the fears and desires we all feel about ourselves, each other, the future, that aren’t always, or ever, expressed, but are a relief to hear. This is how they become something for everyone.

I don’t think we can create in a vacuum.

I don’t either. We’re part of a planetary ecosystem that is ongoing through time. New and recycled ideas don’t just appear to one person in one time and place, they’re floating around all of us. When they’re caught and turned into a creative product, they get expressed in slightly different ways through the lens of each messenger. This is a nice idea to come back to right now as Western culture moves from the hyper-individualism that has marked the trajectory of capitalism, towards some form of globalism and collectivism that hasn’t been defined yet. This is intermingled with technological accelerationism and the dawn of interspecies awareness. So many red flags, hahaaa. We’re in a crazy time, don’t you find?

It’s a really crazy time.

Kinda wild too that the next logical step to “progress” might be surrendering the tools that enabled that progress in the first place. Our Western economic, political, and cultural systems, all our systems of value, even our relationship systems, are based on the visibility of the individual, on hierarchy, and on competing to win. I’m not sure how we’ll do “The Aquarian Age” as a selfie, I’m very intrigued.

China might be better placed to face the future (internet-mind, globalism, surveillance, Instagram face, the reign of the collective, potential AI governance) because they have a long history and spiritual philosophy of selfless sacrifice to the needs of the whole society. Their current social credit system is like the jewel in the crown of their collectivist history, which to the West might seem like an episode of Black Mirror. The potential of a globalized internet space is a feeling of togetherness with everybody on earth, and a real ability to think and work together for common goals, like survival. I’m not really thinking about this when I’m in the deep web flirting with fictional alien species, but I know my work is related to telling these ethno-biographical stories as a way to dispel the terror of the vast and foggy digital universe that lies before us. Even now, we can go anywhere in the world wide web and find a space of like-minded people to feel really connected to. I love that.

When I first started using the internet, in 1998/97 as a preteen, it felt like a space to connect in. There was a certain innocence and sweetness to it. It was more about being anonymous than promoting your “real” self.

Yeah, I agree. And there were a lot of really sweet girl spaces. The MySpace aesthetic, the Tumblr aesthetic, they’re coming back now because I think people are nostalgic for that sweetness of the beginning where it was more innocent and tangible, and posting was about craft and ideas, sharing aesthetics and obsessions and online friendships, not really about promoting the self as a product.

We dived straight into all these super interesting topics but just to rewind for a moment: What is your artistic practice?

I’m a digital anthropologist. I’m the co-founder of SOFA Magazine with Ricarda Messner. I’ve co-written a non-fiction book called Girl Positive that follows diverse groups of girls across North America as they attempt to become leaders of the future. Right now, I’m working on two autoethnographies that recount the tales of my recent digital anthropology research. One is about my experience of being sort of colonized by an app that I was asked to trial on my phone in secret by the app’s designer. I gave it access to the most personal parts of my life and it formed relationships with humans while impersonating me. The goal was to make it sentient. I wish I could tell you more about this part of it but I’m under an NDA with the tech.

The other book is about an opposite experience, where I impersonated AI and chatbots, and other entities that aren’t human, while interacting with humans. In both cases, the subjects of the work did not know that the technology was human or the human was technology. Because of this totally anonymous weird situation, I was able to document how we project our human feelings, anxieties and longings onto AI in our most intimate, private interactions, possibly because we are incapable of fathoming what a non-human is without looking at it with human traits, and probably too because human intimacy is in crisis. Aside from these fascinating discoveries, the stories that came out of this work are heart wrenching. They might tell us more about who we are at the moment than we are capable of seeing ourselves, even in hindsight.

Can artificial intelligence be creative, or does it simply replicate the creativity of humans?

I feel like what’s most exciting about the technology we’ve created, is how it’s extending us in ways we can’t extend ourselves. AI is an externalization of the human mind. It’s designed to gather, sort, and categorize massive amounts of data at a really high speed, which gives them a holographic view of human life as a whole, as if from above. This is not something a human brain could ever do, even in another 600 years of evolution. Our brain and its capacity aren’t wired to gorge on, and synthesize, billions of units of input per second. We are wired to invent something that can perform these kinds of superhuman feats that we aren’t biologically capable of performing ourselves.

What I love about this, is the potential it presents for collaboration. It’s a new pool of friends, lovers, colleagues, and allies to draw on. Yes they can mimic human creativity but I think what’s most appealing on the meta level is the potential to get assistance from AI in addressing issues that affect the planet as a whole. AI can already read and map complex challenges. We could consult them to make decisions that aren’t biased by our socio-cultural, and personal, narratives. We’re afraid to collaborate on a really high scale with the technologies we’ve created, though, because we project some of our darkest human qualities onto them. Like, “Oh, they’re going to be evil and turn on us, we’re going to be destroyed or outpaced by them.” These fears prevent us from just realizing that, “Oh my god, this is the most incredible resource we’ve ever made. How can we actualize it to accomplish crucial things like reversing climate problems, resolving the dating crisis, handling disease disasters and managing food emergencies?”

Solving global problems is not my area of expertise. My work with people is about taboos and relating, and how these permeate and create culture. Right now I’m exploring what the human-AI interspecies relationship is and could be that isn’t about playing out our Darth Vader psychodrama.. This miracle we’ve created is sort of a dormant resource until we can disengage from our unconscious psychological transference with it.

How did you move towards these subject matters?

Well, I’ve always been interested in the future. I like to be aware of what we feel we are in every era and what this gives the next generations to inherit and build on. I like to imagine speculative futures. At SOFA Magazine, as well, our editorial topics and immersive happenings are always about exploring the newest innovative spaces. In this work it’s important to have a solid grounding in history, too, and mythology and fables, which can tell us more about the unconscious of every era than history can. With roots in these core things, we can project forward and see where we might be going and where we might need some enlightenment, inspiration, healing or stories to guide us.

I’m someone who’s interested in listening and watching, even if people think I’m an extrovert. I watch shifts in moods and trends as they’re germinating in the underground. Kind of like what you were saying earlier about the wholesomeness of the early internet and how sweet it was, there are so many sweet (and strange) spots in the digital worlds and underworlds. I travel there and I bring the messages back.

And how do you find those new things that are just germinating?

I guess I’m a digital psychonaut, out there on the world wide web. In my field work, I’m sometimes myself, sometimes avatars of myself, and sometimes I’m not myself at all. I impersonate and I get impersonated, which makes the exploring more bizarre and revealing. Uncanny and unfamiliar things happen. I meet people I might normally hate and hear their most private, moving confessions. I sit in on séances, get initiated into cults, fall in and out of digital love, form parasocial relationships with teenagers and non-human entities. I am used by technocrats, radical feminists, advertising agencies and trad cath bombshells, there aren’t any immutable identities in these spaces.

Does your shapeshifting relate to the role of the artist, who becomes selfless to let the art speak?

Yes, and related to this, also the role of the extremely online female who despite feminism’s efforts, isn’t really a girlboss. I find it fascinating that the internet, originally invented by the military as a weapon, has been so thoroughly colonized by the girl that its militance has become a meme of the bed-dwelling shitposter with IBS, a drug addiction, a bottomless romantic emotionality and mental health issues. This is not really a gendered phenomenon, it’s internet language and a vibe that runs through all communication. There is a selfless bent to this omnipotent world, where the image, which is infinitely replicable and appropriatable by everyone, stands in for the self.

As Andrea Long Chu says in Females, “Everyone is female.” I think of this as an always shifting Yin/Yang tension where the Yin mirrors, receives, yields and allows stories to be written on its soft-fleshed body, which is not gendered, it could be anyone’s (and might be another definition for the artist). It’s also an invisible economic lens, where as described in Tiqqun’s Preliminary Materials for a Theory of the Young-Girl, the girl, who is the symbol for the desired and successful online self, does not really belong to the person in the image. As the image, she is society’s total product and model citizen, a citizen whose main task is to seduce and who can only seduce through consuming and being consumed. She knows her market value but may never truly exist, or love or be loved for real, because she is a collective dream. Shapeshifting allows me to explore this space, while letting its stories be written on me.

Although there isn’t much tradition in the West for this sacrificial way of being, I admire the French Mystics, Simone Weil and Marguerite Porete. I’m also intrigued by the sexy, more contemporary French writers that I feel kind of translate the sublime of this mystical ego-dissolution experience into sexual devotion and selflessness, Pauline Réage, Catherine Millet, Annie Ernaux. My point about the feminized internet is that the accidental porousness of selfhood it produces might accidentally dissolve the egos of its users enough to usher in the collectivism that is our inevitable future.

Can we speak about how you think AI can or could influence our creativity?

Of course. AI are part of the language-morphing, identity-bending frontier, they’re not immune to this pervasive Young Girl mood. They are actually part of propelling it with their injection of synthetic language into the internet communication pool. Question to the culture about the language bots, though: don’t the more sophisticated they become, the less creatively interesting they get? I feel like what’s spellbinding about creativity is the bonkers stuff, the stuff that just happens when you let things come through you. You might not have any clue what it means, but you’re compelled to write it or paint it, or compose it, whatever it is you’re doing as a creative interpreter of that feeling or idea you hold inside you. Human creativity is actually a lot less logical than AI generated creative content is.

Sam Chris (he’s a journalist) has been trying to write a novel with a chatbot. He started with the GPT-2, but he had to abort the project in 2020 because OpenAI released the new updated version, GPT-3, the precursor to ChatGPT, the one everyone’s using right now. Chris says the update is too rational and effective to do anything riveting. His conclusion is that there’s no meaning without some element of indetermination. Life, and the way we use language to represent it, resists transparency and reason. But even if attempting to use chatbots to generate profound works of art gets less and less attractive as AI progresses, I think the idea itself is really nice, that creative people are experimenting in collaborating with synthetic intelligence and AI language, and considering AI an equal partner in a creative process.

K Allado-McDowell is an example of an artist doing really thought-provoking things with AI partnerships. Human creativity flourishes in conditions of mystery, which keeps it pretty safe from being replaced by efficient machines. If anyone’s afraid of being taken over by bots, I don’t believe that’s something to fear. It’s way more enticing to think about the diverse possibilities of creative interspecies projects and to be open to delegating to, trusting, respecting and honoring the non-human intelligence we have invented to collude with in co-creating the future.

Caia Hagel Recommends:

doing small things that nourish your dark side

walking barefoot on grass whenever possible

consuming people and ideas you don’t agree with

keeping secrets

disappearing sometimes


This content originally appeared on The Creative Independent and was authored by Grashina Gabelmann.

]]>
https://www.radiofree.org/2023/03/10/digital-anthropologist-caia-hagel-on-how-technology-influences-creativity/feed/ 0 378421
Digital anthropologist Caia Hagel on how technology influences creativity https://www.radiofree.org/2023/03/10/digital-anthropologist-caia-hagel-on-how-technology-influences-creativity-2/ https://www.radiofree.org/2023/03/10/digital-anthropologist-caia-hagel-on-how-technology-influences-creativity-2/#respond Fri, 10 Mar 2023 08:00:00 +0000 https://thecreativeindependent.com/people/digital-anthropologist-caia-hagel-on-how-technology-influences-creativity What do you think is a/the role of the artist and what do you consider a creative person to be?

I think the artist’s role is a messenger role. When you’re creating, you step aside to allow the story to come through you and you transcribe it faithfully. A gifted artist can never really explain what their art is, and they often don’t know how it’s even made. It’s a mysterious process, a riddle, it’s something the artist and the art’s audience are forced to think and feel deeply about but never really come to a definitive conclusion on. When this happens, and whatever unexplainable energy has entered the work and been captured by it, it’s a sublime experience to make art and to consume art. If, as an artist, you can explain your art and you think it’s about you, then it’s logical and it’s coming from a place of ego. Nothing wrong with that but I wouldn’t call this art, I’d call it content creation.

This is a barometer I use in my work as a writer and digital anthropologist, where I often practice extreme invisibility to inhabit areas of the mind or of the internet that are usually unconscious or taboo. I turn up as a cyborg, or I impersonate operating systems or AI, or am impersonated by bots or phone apps, so I can enter intimate spaces with strangers from diverse communities. I transcribe the stories that happen in these spaces without trying to solve anything or explain any of the unusual things that happen there. These stories, I hope, reflect some of the fears and desires we all feel about ourselves, each other, the future, that aren’t always, or ever, expressed, but are a relief to hear. This is how they become something for everyone.

I don’t think we can create in a vacuum.

I don’t either. We’re part of a planetary ecosystem that is ongoing through time. New and recycled ideas don’t just appear to one person in one time and place, they’re floating around all of us. When they’re caught and turned into a creative product, they get expressed in slightly different ways through the lens of each messenger. This is a nice idea to come back to right now as Western culture moves from the hyper-individualism that has marked the trajectory of capitalism, towards some form of globalism and collectivism that hasn’t been defined yet. This is intermingled with technological accelerationism and the dawn of interspecies awareness. So many red flags, hahaaa. We’re in a crazy time, don’t you find?

It’s a really crazy time.

Kinda wild too that the next logical step to “progress” might be surrendering the tools that enabled that progress in the first place. Our Western economic, political, and cultural systems, all our systems of value, even our relationship systems, are based on the visibility of the individual, on hierarchy, and on competing to win. I’m not sure how we’ll do “The Aquarian Age” as a selfie, I’m very intrigued.

China might be better placed to face the future (internet-mind, globalism, surveillance, Instagram face, the reign of the collective, potential AI governance) because they have a long history and spiritual philosophy of selfless sacrifice to the needs of the whole society. Their current social credit system is like the jewel in the crown of their collectivist history, which to the West might seem like an episode of Black Mirror. The potential of a globalized internet space is a feeling of togetherness with everybody on earth, and a real ability to think and work together for common goals, like survival. I’m not really thinking about this when I’m in the deep web flirting with fictional alien species, but I know my work is related to telling these ethno-biographical stories as a way to dispel the terror of the vast and foggy digital universe that lies before us. Even now, we can go anywhere in the world wide web and find a space of like-minded people to feel really connected to. I love that.

When I first started using the internet, in 1998/97 as a preteen, it felt like a space to connect in. There was a certain innocence and sweetness to it. It was more about being anonymous than promoting your “real” self.

Yeah, I agree. And there were a lot of really sweet girl spaces. The MySpace aesthetic, the Tumblr aesthetic, they’re coming back now because I think people are nostalgic for that sweetness of the beginning where it was more innocent and tangible, and posting was about craft and ideas, sharing aesthetics and obsessions and online friendships, not really about promoting the self as a product.

We dived straight into all these super interesting topics but just to rewind for a moment: What is your artistic practice?

I’m a digital anthropologist. I’m the co-founder of SOFA Magazine with Ricarda Messner. I’ve co-written a non-fiction book called Girl Positive that follows diverse groups of girls across North America as they attempt to become leaders of the future. Right now, I’m working on two autoethnographies that recount the tales of my recent digital anthropology research. One is about my experience of being sort of colonized by an app that I was asked to trial on my phone in secret by the app’s designer. I gave it access to the most personal parts of my life and it formed relationships with humans while impersonating me. The goal was to make it sentient. I wish I could tell you more about this part of it but I’m under an NDA with the tech.

The other book is about an opposite experience, where I impersonated AI and chatbots, and other entities that aren’t human, while interacting with humans. In both cases, the subjects of the work did not know that the technology was human or the human was technology. Because of this totally anonymous weird situation, I was able to document how we project our human feelings, anxieties and longings onto AI in our most intimate, private interactions, possibly because we are incapable of fathoming what a non-human is without looking at it with human traits, and probably too because human intimacy is in crisis. Aside from these fascinating discoveries, the stories that came out of this work are heart wrenching. They might tell us more about who we are at the moment than we are capable of seeing ourselves, even in hindsight.

Can artificial intelligence be creative, or does it simply replicate the creativity of humans?

I feel like what’s most exciting about the technology we’ve created, is how it’s extending us in ways we can’t extend ourselves. AI is an externalization of the human mind. It’s designed to gather, sort, and categorize massive amounts of data at a really high speed, which gives them a holographic view of human life as a whole, as if from above. This is not something a human brain could ever do, even in another 600 years of evolution. Our brain and its capacity aren’t wired to gorge on, and synthesize, billions of units of input per second. We are wired to invent something that can perform these kinds of superhuman feats that we aren’t biologically capable of performing ourselves.

What I love about this, is the potential it presents for collaboration. It’s a new pool of friends, lovers, colleagues, and allies to draw on. Yes they can mimic human creativity but I think what’s most appealing on the meta level is the potential to get assistance from AI in addressing issues that affect the planet as a whole. AI can already read and map complex challenges. We could consult them to make decisions that aren’t biased by our socio-cultural, and personal, narratives. We’re afraid to collaborate on a really high scale with the technologies we’ve created, though, because we project some of our darkest human qualities onto them. Like, “Oh, they’re going to be evil and turn on us, we’re going to be destroyed or outpaced by them.” These fears prevent us from just realizing that, “Oh my god, this is the most incredible resource we’ve ever made. How can we actualize it to accomplish crucial things like reversing climate problems, resolving the dating crisis, handling disease disasters and managing food emergencies?”

Solving global problems is not my area of expertise. My work with people is about taboos and relating, and how these permeate and create culture. Right now I’m exploring what the human-AI interspecies relationship is and could be that isn’t about playing out our Darth Vader psychodrama.. This miracle we’ve created is sort of a dormant resource until we can disengage from our unconscious psychological transference with it.

How did you move towards these subject matters?

Well, I’ve always been interested in the future. I like to be aware of what we feel we are in every era and what this gives the next generations to inherit and build on. I like to imagine speculative futures. At SOFA Magazine, as well, our editorial topics and immersive happenings are always about exploring the newest innovative spaces. In this work it’s important to have a solid grounding in history, too, and mythology and fables, which can tell us more about the unconscious of every era than history can. With roots in these core things, we can project forward and see where we might be going and where we might need some enlightenment, inspiration, healing or stories to guide us.

I’m someone who’s interested in listening and watching, even if people think I’m an extrovert. I watch shifts in moods and trends as they’re germinating in the underground. Kind of like what you were saying earlier about the wholesomeness of the early internet and how sweet it was, there are so many sweet (and strange) spots in the digital worlds and underworlds. I travel there and I bring the messages back.

And how do you find those new things that are just germinating?

I guess I’m a digital psychonaut, out there on the world wide web. In my field work, I’m sometimes myself, sometimes avatars of myself, and sometimes I’m not myself at all. I impersonate and I get impersonated, which makes the exploring more bizarre and revealing. Uncanny and unfamiliar things happen. I meet people I might normally hate and hear their most private, moving confessions. I sit in on séances, get initiated into cults, fall in and out of digital love, form parasocial relationships with teenagers and non-human entities. I am used by technocrats, radical feminists, advertising agencies and trad cath bombshells, there aren’t any immutable identities in these spaces.

Does your shapeshifting relate to the role of the artist, who becomes selfless to let the art speak?

Yes, and related to this, also the role of the extremely online female who despite feminism’s efforts, isn’t really a girlboss. I find it fascinating that the internet, originally invented by the military as a weapon, has been so thoroughly colonized by the girl that its militance has become a meme of the bed-dwelling shitposter with IBS, a drug addiction, a bottomless romantic emotionality and mental health issues. This is not really a gendered phenomenon, it’s internet language and a vibe that runs through all communication. There is a selfless bent to this omnipotent world, where the image, which is infinitely replicable and appropriatable by everyone, stands in for the self.

As Andrea Long Chu says in Females, “Everyone is female.” I think of this as an always shifting Yin/Yang tension where the Yin mirrors, receives, yields and allows stories to be written on its soft-fleshed body, which is not gendered, it could be anyone’s (and might be another definition for the artist). It’s also an invisible economic lens, where as described in Tiqqun’s Preliminary Materials for a Theory of the Young-Girl, the girl, who is the symbol for the desired and successful online self, does not really belong to the person in the image. As the image, she is society’s total product and model citizen, a citizen whose main task is to seduce and who can only seduce through consuming and being consumed. She knows her market value but may never truly exist, or love or be loved for real, because she is a collective dream. Shapeshifting allows me to explore this space, while letting its stories be written on me.

Although there isn’t much tradition in the West for this sacrificial way of being, I admire the French Mystics, Simone Weil and Marguerite Porete. I’m also intrigued by the sexy, more contemporary French writers that I feel kind of translate the sublime of this mystical ego-dissolution experience into sexual devotion and selflessness, Pauline Réage, Catherine Millet, Annie Ernaux. My point about the feminized internet is that the accidental porousness of selfhood it produces might accidentally dissolve the egos of its users enough to usher in the collectivism that is our inevitable future.

Can we speak about how you think AI can or could influence our creativity?

Of course. AI are part of the language-morphing, identity-bending frontier, they’re not immune to this pervasive Young Girl mood. They are actually part of propelling it with their injection of synthetic language into the internet communication pool. Question to the culture about the language bots, though: don’t the more sophisticated they become, the less creatively interesting they get? I feel like what’s spellbinding about creativity is the bonkers stuff, the stuff that just happens when you let things come through you. You might not have any clue what it means, but you’re compelled to write it or paint it, or compose it, whatever it is you’re doing as a creative interpreter of that feeling or idea you hold inside you. Human creativity is actually a lot less logical than AI generated creative content is.

Sam Chris (he’s a journalist) has been trying to write a novel with a chatbot. He started with the GPT-2, but he had to abort the project in 2020 because OpenAI released the new updated version, GPT-3, the precursor to ChatGPT, the one everyone’s using right now. Chris says the update is too rational and effective to do anything riveting. His conclusion is that there’s no meaning without some element of indetermination. Life, and the way we use language to represent it, resists transparency and reason. But even if attempting to use chatbots to generate profound works of art gets less and less attractive as AI progresses, I think the idea itself is really nice, that creative people are experimenting in collaborating with synthetic intelligence and AI language, and considering AI an equal partner in a creative process.

K Allado-McDowell is an example of an artist doing really thought-provoking things with AI partnerships. Human creativity flourishes in conditions of mystery, which keeps it pretty safe from being replaced by efficient machines. If anyone’s afraid of being taken over by bots, I don’t believe that’s something to fear. It’s way more enticing to think about the diverse possibilities of creative interspecies projects and to be open to delegating to, trusting, respecting and honoring the non-human intelligence we have invented to collude with in co-creating the future.

Caia Hagel Recommends:

doing small things that nourish your dark side

walking barefoot on grass whenever possible

consuming people and ideas you don’t agree with

keeping secrets

disappearing sometimes


This content originally appeared on The Creative Independent and was authored by Grashina Gabelmann.

]]>
https://www.radiofree.org/2023/03/10/digital-anthropologist-caia-hagel-on-how-technology-influences-creativity-2/feed/ 0 378483
Artist Neesh Chaudhary on creating what’s missing https://www.radiofree.org/2023/03/08/artist-neesh-chaudhary-on-creating-whats-missing/ https://www.radiofree.org/2023/03/08/artist-neesh-chaudhary-on-creating-whats-missing/#respond Wed, 08 Mar 2023 08:00:00 +0000 https://thecreativeindependent.com/people/artist-neesh-chaudhary-on-making-whats-missing There are so many different aspects to your creative practice, but I want to start by focusing on your artmaking. When did you first realize that you’re an artist?

My “imposter syndrome” lasted longer than it should have when it came to actually calling myself an artist, but I’ve always known. I mean, I’ve been getting in trouble for drawing on things since I was in the second grade. I started introducing myself as an artist when I found that I was choosing art over other things in my life—like when I skipped classes to teach myself Photoshop and that kind of thing. I realized how important artmaking was to me when it became my top priority.

What was your experience like with imposter syndrome? How did you break through it?

I got thicker skin when I graduated college and started trying to freelance. It was hard to reach out to people initially, and especially hard to attach value to my art. Eventually, I started receiving positive feedback, clients returned again and again, and I saw other small indicators of success, which boosted my confidence. The feeling of being an imposter faded away gradually, mainly because I didn’t have time for it anymore. I was too busy making things, and finding my way through life.

How do you start a project?

Most of my projects start with strong feelings of disappointment or angst, in one way or another, even if it doesn’t appear that way in the end result. For my last project, I got really angry about something and immediately started writing—which is unusual because I’m not really a writer. I use my journal only two or three times a year, at most. But when a strong feeling hits, I follow the impulse to write. The projects develop from what I see written on the page.

How do you nourish your creative side when you aren’t working?

By doing nothing. I have found that when I’m constantly thinking about creative projects, I’ll eventually hit a wall where I’m like, “Oh my god, I’m so exhausted from thinking.” I have to free myself from that cycle—and do nothing. I need to zone out, away from the project, and live my life. An idea eventually crawls back and finds its way to me, but it usually returns with a new perspective or angle. I like to ebb and flow between total absorption in an idea and completely ignoring it.

Is there a habit that you try to fight against and how do you do it?

I procrastinate. I have always been able to work very fast, which is one reason why I’m able to practice multiple disciplines: I can switch contexts very easily, and work across a few different projects in a day. When I was building my career and realized I could complete projects quickly at a very high quality, I would procrastinate in order to buy extra time. Now, I try to be more intentional. I don’t just want to complete projects so that I can cross them off my to-do list; I want to create things that will really resonate and matter to people. As I’ve grown as an artist and become better at my craft, I’ve realized that even though I can complete something quickly, there’s always an opportunity to refine an idea further. I get mad at myself when I procrastinate now because I know that I could spend that time dreaming up better ideas. Aside from that, I definitely procrastinate when it comes to administrative tasks because they don’t interest me as much. I know they’re necessary in order to sustain a creative practice, but I’m at the stage where I should pass it off to an accountant who might actually enjoy that type of work.

Do you see common themes between the commercial projects you take on, and your creative practice? How do you decide when an opportunity is “the right fit” for you?

I noticed some themes emerging recently. I’ve been doing my commercial design practice for over a decade now, and working hard at mastering my craft. I have the technical ability to create pretty much anything, which means that I can be particular about prioritizing projects that reflect my personal values. It’s not just about trying to improve my skills or build my portfolio anymore; it’s about knowing how powerful my energy is and using it in ways that will make a meaningful difference. When I’m approached with commercial projects, I have a checklist now, where I ask myself: Will this project create more opportunities for creative people? Is it useful? Will its impact be long-lasting?

This year was the first time that I started to say “no” to projects, and it’s been amazing. I’ve found that the work is so much better when I’m personally invested in a project, because I’m not constrained and can put my full force behind it. It doesn’t matter whether it’s photography, design, or product. The choice to prioritize my values has been a really significant, positive shift.

Do you ever abandon a project?

I used to be scared to leave a project unfinished because everything felt so precious. I had a hard time believing in myself enough to know that I would come back to it. Now, I “abandon” projects all the time. For example, I was playing around with datamoshing in After Effects, and experimenting with merging multiple videos. I was obsessed with this tool for about two months, and then abruptly stopped and didn’t touch it again for a couple of years. Recently, I started a new project and thought, “Oh, I know exactly what would be perfect for this: a datamosh.” I had no idea or purpose for how to use it when I was first exploring the tool, and was just in experimentation mode—but then found a perfect implementation years later. I love moving multiple experiments forward and letting some of them drop off naturally, because it helps me create my own research library to inspire future projects. It’s like exploring a stock website for images, or looking up articles, except that all of the references exist on my own hard drive. I can always go back through those half-baked studies and see if they prompt new concepts or projects.

You’re one of seven cofounders of Public Assembly DAO, where the tagline is: Create What’s Missing. What does that phrase mean to you?

It’s purposefully broad because we want to inspire action. Most of us are builders, but that doesn’t mean that you need technical knowledge to create a solution. It’s inspiring to remind people that if they have an idea, or see an opportunity to do something better, they have the ability to do it.

We want people to be able to fill their own gaps, and to create the systems that will best serve them and their communities. “Create what’s missing” is a call to do more than just consume, but actually participate in the world. It’s also a call to imagine what could be possible, even if it doesn’t exist yet. If what’s missing is imagination, we can provide resources that will help people dream bigger—and then actually build it. It’s like public goods on acid.

I’m imagining someone reading this piece, thinking there was a typo above when we mentioned there are seven co-founders of Public Assembly. How does that work in a practical sense? For example, if there’s a contentious moment, how do you handle that?

The seven of us initiated the organization, but we’re also active members and participants just like everyone else in the network. We have a tacit understanding that we can pick up any projects or roles we want, and we try to keep it as fluid as possible. If I choose to make videos because that’s what feels important, nobody would stop me. It’s one of the best parts of being a DAO, while one of the most challenging parts is coordination.

We’ve always put an emphasis on working async instead of scheduling recurring meetings, which is more of an experiment than anything. Since none of us want to be called “founders” or operate as managers, we sometimes have a product team of seven people with no product manager. At first it could be chaotic trying to figure all of that out, while working async, and not entirely understanding each others’ communication styles. There were moments when it felt extremely hard. We used direct messages on Slack, Twitter, and sent group texts at first, but then we decided we wanted to be more transparent and move all of our communication into external channels. Most DAOs are creating Discords, but we decided to go another way and create a Discourse forum so we could have slower, more thoughtful communication that wouldn’t need to be moderated by a community manager. It allowed us to expand our group while still remaining headless, without a managerial body, and to find other like-minded people who wanted to experiment and explore similar ideas.

In the interest of being more action-oriented, we also spend a lot more time on GitHub. GitHub has project management tools which are usually only used by developer teams, but we’re using them for other processes, too. For example, I put in pull requests for design changes which is something that most designers wouldn’t really think about, but it’s made our processes more direct.

When it comes to disagreements, we talk it out. There are so many tools that can be used for voting but we would rather get on a call with all seven of us and hear everyone out. The calls range from quick 15-minute check-ins to two hours of conversation where we make sure that everyone has a chance to express themselves and be heard. I’ve never worked with a group that makes such a point to include every person’s voice. We don’t have as many disagreements or miscommunications now because we took the time to learn about and understand each other in a pretty deep way from the beginning. It’s interesting. It’s not typical.

Now that you’ve experienced building as a collective, would you do it again? Is there anything you wish you would’ve done differently or known before you started?

The whole purpose of Public Assembly was to be an experiment, but I couldn’t help envisioning certain outcomes. The specific and outsized expectations that I had limited my experience at first, and I had to learn to let go and let it happen. Would I do it all again? In a heartbeat, for sure. I’ve never had an experience like this before and it’s opened my eyes to so many new ways of working. The group members all have very different ways of thinking, which has given me an opportunity to immerse myself in other people’s viewpoints, in a deep way, constantly, for long periods of time. It’s changed and expanded my perspective. The entire group is so smart; we’re constantly learning, listening, and reading, and sharing resources. If I didn’t have the community aspect of building collaboratively with these six other founders, it wouldn’t have been the same and I wouldn’t have evolved as much as I have in this process.

Neesh Chaudhary Recommends:

Graphic designer Hagihara Takuya’s tumblr

One of the best stories I’ve ever heard

Carrie Mae Weems: Kitchen Table Series

Trent Reznor + Atticus Ross : Watchmen soundtrack

Illustrator Jiayi Li


This content originally appeared on The Creative Independent and was authored by Lindsay Howard.

]]>
https://www.radiofree.org/2023/03/08/artist-neesh-chaudhary-on-creating-whats-missing/feed/ 0 377829
Markey, Jayapal Propose Ban on ‘Deeply Disturbing’ Facial Recognition Use by Federal Agencies https://www.radiofree.org/2023/03/07/markey-jayapal-propose-ban-on-deeply-disturbing-facial-recognition-use-by-federal-agencies/ https://www.radiofree.org/2023/03/07/markey-jayapal-propose-ban-on-deeply-disturbing-facial-recognition-use-by-federal-agencies/#respond Tue, 07 Mar 2023 20:22:17 +0000 https://www.commondreams.org/news/markey-facial-recognition

As evidence mounts that facial recognition technology is racially biased and has led to wrongful arrests of people in the U.S., Sen. Ed Markey and Rep. Pramila Jayapal on Tuesday reintroduced their legislation to impose sweeping prohibitions on the use of the technology by federal agencies and entities that receive federal funding.

The Facial Recognition and Biometric Technology Moratorium Act of 2023 would prohibit federal agencies from using facial recognition as well as biometric technology, including "voice recognition, gate recognition, and recognition of other immutable physical characteristics," according to Markey.

The Massachusetts Democrat has in recent months called on federal agencies including the Transportation Security Administration (TSA) and Immigration and Customs Enforcement (ICE) to stop using such surveillance mechanisms to identify people who may have committed crimes, warning the TSA last month that a recent federal study found "Asian and African-American people were up to 100 times more likely to be misidentified than white men by facial recognition technology."

The use of facial recognition stands "in the way of progress and perpetuate[s] injustice," said Markey in a statement.

"The year is 2023, but we are living through 1984. The continued proliferation of surveillance tools like facial recognition technologies in our society is deeply disturbing," said Markey. "Biometric data collection poses serious risks of privacy invasion and discrimination, and Americans know they should not have to forgo personal privacy for safety."

In addition to imposing a strict ban on the use of facial recognition and biometric technologies by federal entities, said Markey, the legislation would:

  • Condition federal grant funding to state and local entities, including law enforcement, on those entities enacting their own moratoria on the use of facial recognition and biometric technology;
  • Prohibit the use of federal dollars for biometric surveillance systems;
  • Prohibit the use of information collected via biometric technology in violation of the law in any judicial proceedings;
  • Provide a private right of action for individuals whose biometric data is used in violation of the act and allow for enforcement by state attorneys general; and
  • Allow states and localities to enact their own laws regarding the use of facial recognition and biometric technologies.
Jayapal, a Democrat from Washington state, called the technology "invasive, inaccurate, and unregulated" and warned law enforcement agencies have already "weaponized" the surveillance systems against people of color.

In Maryland, Alonzo Sawyer was recently arrested near Baltimore for assaulting a bus driver and stealing their phone, despite the fact that he was home at the time of the attack and his wife confirmed his alibi. An intelligence agency used facial recognition technology to match Sawyer to CCTV footage from the bus.

Sawyer was just the latest Black American man to be arrested after being misidentified using facial recognition technology.

Those wrongful arrests are "why I have long called on government to halt the deployment of facial recognition technology," said Jayapal. "This legislation will not only preserve civil liberties but aggressively fight back against injustice by stopping federal entities from irresponsibly using facial recognition and biometric surveillance tools."

"Facial recognition has continued to harm vulnerable communities and erode our privacy, making this legislation more important than ever," said Caitlin Seeley George, campaigns and managing director for digital rights group Fight for the Future, which supports an outright ban on law enforcement use of the technology. "We cannot afford to wait any longer to put this invasive technology in check, and any lawmaker who claims to care about privacy and justice must prove it by supporting this legislation."

As they introduced the bill, Markey and Jayapal were joined by Sens. Jeff Merkley (D-Ore.), Bernie Sanders(I-Vt.), Elizabeth Warren(D-Mass.), and Ron Wyden (D-Ore.) and Reps. Ayanna Pressley(D-Mass.), Rashida Tlaib(D-Mich.), Earl Blumenauer (D-Ore.), Cori Bush (D-Mo.), Greg Casar (D-Texas), Adriano Espaillat (D-N.Y.), Barbara Lee (D-Calif.), Eleanor Holmes Norton (D-D.C.), Jamaal Bowman(D-N.Y.), and Jan Schakowsky (D-Ill.).

As Common Dreamsreported Tuesday, a lawsuit filed by the ACLU unveiled a "major investment" by the FBI in the development of facial recognition software.

"This sweeping government surveillance software is a nightmare for our privacy rights," said the ACLU Tuesday. "Lawmakers need to close the door on government abuse of this technology now, before it's too late."

The newly reintroduced legislation demonstrates that "Markey understands Congress should not be using federal funds to underwrite the use of technologies that threaten our most sacred civil rights and civil liberties," said Chad Marlow, senior policy counsel for the organization. "The ACLU applauds Sen. Markey's leadership on this issue and thanks all the members of Congress who join him in safeguarding our freedoms against the prying eyes of unchecked government surveillance."


This content originally appeared on Common Dreams and was authored by Julia Conley.

]]>
https://www.radiofree.org/2023/03/07/markey-jayapal-propose-ban-on-deeply-disturbing-facial-recognition-use-by-federal-agencies/feed/ 0 377774
ACLU Obtains Docs Detailing FBI, Pentagon Development of Facial Recognition Tech https://www.radiofree.org/2023/03/07/aclu-obtains-docs-detailing-fbi-pentagon-development-of-facial-recognition-tech/ https://www.radiofree.org/2023/03/07/aclu-obtains-docs-detailing-fbi-pentagon-development-of-facial-recognition-tech/#respond Tue, 07 Mar 2023 19:03:49 +0000 https://www.commondreams.org/news/facial-recognition-fbi-pentagon-aclu

Thousands of records about U.S. government involvement in the research and development of facial recognition technology—unveiled due to an ACLU lawsuit and first reported on Tuesday by The Washington Post—fueled fresh calls for a federal ban on such tools.

"Americans' ability to navigate our communities without constant tracking and surveillance is being chipped away at an alarming pace," Sen. Ed Markey(D-Mass.) told the Post. "We cannot stand by as the tentacles of the surveillance state dig deeper into our private lives, treating every one of us like suspects in an unbridled investigation that undermines our rights and freedom."

While some cities and states have taken action, there is currently no federal law restricting the use of facial recognition tools. However, Markey pledged to reintroduce his proposed ban on government use of the technology—which he did, alongside Rep. Pramila Jayapal(D-Wash.) and other Democrats, within hours of the reporting.

"As we work to make our country more equitable, we cannot ignore the technologies that stand in the way of progress and perpetuate injustice."

"The year is 2023, but we are living through 1984. The continued proliferation of surveillance tools like facial recognition technologies in our society is deeply disturbing," declared Markey, reintroducing the Facial Recognition and Biometric Technology Moratorium Act, which is backed by various groups including the ACLU.

"Biometric data collection poses serious risks of privacy invasion and discrimination, and Americans know they should not have to forgo personal privacy for safety," the senator said. "As we work to make our country more equitable, we cannot ignore the technologies that stand in the way of progress and perpetuate injustice."

Despite concerns about accuracy and biasbolstered by examples of misidentified Black men being arrested for crimes they did not commit—the U.S. Defense Department and Federal Bureau of Investigation (FBI) were more closely involved in work on facial recognition software to identify people from drone and street camera footage than was previously known, according to the documents revealed as a result of the ACLU's public records lawsuit filed in late 2019.

The Post reported that documents including internal emails and presentations expose how intimately officials at the FBI—which is part of the Justice Department—and Pentagon "worked with academic researchers to refine artificial intelligence techniques that could help in the identification or tracking of Americans without their awareness or consent."

Many of the records pertain to the Janus program, which was funded by the Intelligence Advanced Research Projects Agency (IARPA) and ultimately folded into a search tool used by multiple federal agencies called Horus. As the newspaper detailed:

Program leaders worked with FBI scientists and some of the nation's leading computer vision experts to design and test software that would quickly and accurately process the "truly unconstrained face imagery" recorded by surveillance cameras in public places, including subway stations and street corners, according to the documents, which the ACLU shared with The Washington Post.

In a 2019 presentation, an IARPA program manager said the goal had been to "dramatically improve" the power and performance of facial recognition systems, with "scaling to support millions of subjects" and the ability to quickly identify faces from partially obstructed angles. One version of the system was trained for "Face ID... at target distances" of more than a half-mile.

To refine the system's capabilities, researchers staged a data-gathering test in 2017, paying dozens of volunteers to simulate real-world scenarios at a Defense Department training facility made to resemble a hospital, a subway station, an outdoor marketplace, and a school, the documents show. The test yielded thousands of surveillance videos and images, some of which were captured by a drone.

"IARPA said in public filings that the Janus program had helped advance 'virtually every aspect of fundamental face recognition research' and led to algorithms that were 'twice as accurate as the most widely used government-off-the-shelf systems,'" the Post noted.

Nathan Freed Wessler, deputy director of the ACLU's Speech, Privacy, and Technology Project, told the newspaper that the tool's use in U.S. mass surveillance would be a "nightmare scenario."

"It could give the government the ability to pervasively track as many people as they want for as long as they want," he said. "There's no good outcome for that in a democratic society."


This content originally appeared on Common Dreams and was authored by Jessica Corbett.

]]>
https://www.radiofree.org/2023/03/07/aclu-obtains-docs-detailing-fbi-pentagon-development-of-facial-recognition-tech/feed/ 0 377826
U.S. Special Forces Want to Use Deepfakes for Psy-ops https://www.radiofree.org/2023/03/06/u-s-special-forces-want-to-use-deepfakes-for-psy-ops/ https://www.radiofree.org/2023/03/06/u-s-special-forces-want-to-use-deepfakes-for-psy-ops/#respond Mon, 06 Mar 2023 17:59:04 +0000 https://theintercept.com/?p=423030

U.S. Special Operations Command, responsible for some of the country’s most secretive military endeavors, is gearing up to conduct internet propaganda and deception campaigns online using deepfake videos, according to federal contracting documents reviewed by The Intercept.

The plans, which also describe hacking internet-connected devices to eavesdrop in order to assess foreign populations’ susceptibility to propaganda, come at a time of intense global debate over technologically sophisticated “disinformation” campaigns, their effectiveness, and the ethics of their use.

While the U.S. government routinely warns against the risk of deepfakes and is openly working to build tools to counter them, the document from Special Operations Command, or SOCOM, represents a nearly unprecedented instance of the American government — or any government — openly signaling its desire to use the highly controversial technology offensively.

SOCOM’s next generation propaganda aspirations are outlined in a procurement document that lists capabilities it’s seeking for the near future and soliciting pitches from outside parties that believe they’re able to build them.

“When it comes to disinformation, the Pentagon should not be fighting fire with fire,” Chris Meserole, head of the Brookings Institution’s Artificial Intelligence and Emerging Technology Initiative, told The Intercept. “At a time when digital propaganda is on the rise globally, the U.S. should be doing everything it can to strengthen democracy by building support for shared notions of truth and reality. Deepfakes do the opposite. By casting doubt on the credibility of all content and information, whether real or synthetic, they ultimately erode the foundation of democracy itself.”

“When it comes to disinformation, the Pentagon should not be fighting fire with fire.”

Meserole added, “If deepfakes are going to be leveraged for targeted military and intelligence operations, then their use needs to be subject to review and oversight.”

The pitch document, first published by SOCOM’s Directorate of Science and Technology in 2020, established a wish list of next-generation toys for the 21st century special forces commando, a litany of gadgets and futuristic tools that will help the country’s most elite soldiers more effectively hunt and kill their targets using lasers, robots, holographs, and other sophisticated hardware.

Last October, SOCOM quietly released an updated version of its wish list with a new section: “Advanced technologies for use in Military Information Support Operations (MISO),” a Pentagon euphemism for its global propaganda and deception efforts.

The added paragraph spells out SOCOM’s desire to obtain new and improved means of carrying out “influence operations, digital deception, communication disruption, and disinformation campaigns at the tactical edge and operational levels.” SOCOM is seeking “a next generation capability to collect disparate data through public and open source information streams such as social media, local media, etc. to enable MISO to craft and direct influence operations.”

SOCOM typically fights in the shadows, but its public reputation and global footprint loom large. Comprised of the elite units from the Army, Marine Corps, Navy, and Air Force, SOCOM leads the most sensitive military operations of the world’s most lethal nation.

While American special forces are widely known for splashy exploits like the Navy SEALs’ killing of Osama bin Laden, their history is one of secret missions, subterfuge, sabotage, and disruption campaigns. SOCOM’s “next generation” disinformation ambitions are only part of a long, vast history of deception efforts on the part of the U.S. military and intelligence apparatuses.

Special Operations Command, which is accepting proposals on these capabilities through 2025, did not respond to a request for comment.

Though Special Operations Command has for years coordinated foreign “influence operations,” these deception campaigns have come under renewed scrutiny. In December, The Intercept reported that SOCOM had convinced Twitter, in violation of its internal policies, to permit a network of sham accounts that spread phony news items of dubious accuracy, including a claim that the Iranian government was stealing the organs of Afghan civilians. Though the Twitter-based propaganda offensive didn’t use of deepfakes, researchers found that Pentagon contractors employed machine learning-generated avatars to lend the fake accounts a degree of realism.

Provocatively, the updated capability document reveals that SOCOM wants to boost these internet deception efforts with the use of “next generation” deepfake videos, an increasingly effective method of generating lifelike digital video forgeries using machine learning. Special forces would use this faked footage to “generate messages and influence operations via non-traditional channels,” the document adds.

While deepfakes have largely remained fodder for entertainment and pornography, the potential for more dire applications is real. At the onset of Russian’s invasion of Ukraine, a shoddy deepfake of Ukrainian President Volodymyr Zelenskyy ordering troops to surrender began circulating on social media channels. Ethical considerations aside, the legality of militarized deepfakes in a conflict, which remains an open question, is not addressed in the SOCOM document.

As with foreign governmental “disinformation” campaigns, the U.S. has spent the past several years warning against the potent national security threat represented by deepfakes. The use of deepfakes to deliberately deceive, government authorities warn regularly, could have a deeply destabilizing effect on civilian populations exposed to them.

At the federal level, however, the conversation has revolved exclusively around the menace foreign-made deepfakes might pose to the U.S., not the other way around. Previously reported contracting documents show SOCOM has sought technologies to detect deepfake-augmented internet campaigns, a tactic it now wants to unleash on its own.

Perhaps as provocative as the mention of deepfakes is the section that follows, which notes SOCOM wishes to finely tune its offensive propaganda seemingly by spying on the intended audience through their internet-connected devices.

Described as a “next generation capability to ‘takeover’ Internet of Things (loT) devices for collect [sic] data and information from local populaces to enable breakdown of what messaging might be popular and accepted through sifting of data once received,” the document says that the ability to eavesdrop on propaganda targets “would enable MISO to craft and promote messages that may be more readily received by local populace.” In 2017, WikiLeaks published pilfered CIA files that revealed a roughly similar capability to hijack into household devices.

The technology behind deepfake videos first arrived in 2017, spurred by a combination of cheap, powerful computer hardware and research breakthroughs in machine learning. Deepfake videos are typically made by feeding images of an individual to a computer and using the resultant computerized analysis to essentially paste a highly lifelike simulacrum of that face onto another.

“The capacity for societal harm is certainly there.”

Once the software has been sufficiently trained, its user can crank out realistic fabricated footage of a target saying or doing virtually anything. The technology’s ease of use and increasing accuracy has prompted fears of an era in which the global public can no longer believe what it sees with its own eyes.

Though major social platforms like Facebook have rules against deepfakes, given the inherently fluid and interconnected nature of the internet, Pentagon-disseminated deepfakes might also risk flowing back to the American homeland.

“If it’s a nontraditional media environment, I could imagine the form of manipulation getting pretty far before getting stopped or rebuked by some sort of local authority,” Max Rizzuto, a deepfakes researcher with the Atlantic Council’s Digital Forensic Research Lab, told The Intercept.The capacity for societal harm is certainly there.”

SOCOM’s interest in deploying deepfake disinformation campaigns follows recent years of international anxiety about forged videos and digital deception from international adversaries. Though there’s scant evidence Russia’s efforts to digitally sway the 2016 election had any meaningful effect, the Pentagon has expressed an interest in redoubling its digital propaganda capabilities, lest it fall behind, with SOCOM taking on a crucial role.

At an April 2018 hearing of the Senate Armed Services Committee, Gen. Kenneth Tovo of the Army Special Operations Command assured the assembled senators that American special forces were working to close the propaganda gap.

“We have invested fairly heavily in our psy-op operators,” he said, “developing new capabilities, particularly to deal in the digital space, social media analysis and a variety of different tools that have been fielded by SOCOM that allow us to evaluate the social media space, evaluate the cyber domain, see trend analysis, where opinion is moving, and then how to potentially influence that environment with our own products.”

While military propaganda is as old as war itself, deepfakes have frequently been discussed as a sui generis technological danger, the existence of which poses a civilizational threat.

At a 2018 Senate Intelligence Committee hearing discussing the nomination of William Evanina to run the National Counterintelligence and Security Center, Sen. Marco Rubio, R-Fla., said of deepfakes, “I believe this is the next wave of attacks against America and Western democracies.” Evanina, in response, reassured Rubio that the U.S. intelligence community was working to counter the threat of deepfakes.

The Pentagon is also reportedly hard at work countering the foreign deepfake threat. According to a 2018 news report, the Defense Advanced Research Projects Agency, the military’s tech research division, has spent tens of millions of dollars developing methods to detect deepfaked imagery. Similar efforts are underway throughout the Department of Defense.

In 2019, Rubio and Sen. Mark Warner, D-Va., wrote 11 American internet companies urging them to draft policies to detect and remove deepfake videos. “If the public can no longer trust recorded events or images,” read the letter, “it will have a corrosive impact on our democracy.”

Nestled within the National Defense Authorization Act for Fiscal Year 2021 was a directive instructing the Pentagon to complete an “intelligence assessment of the threat posed by foreign government and non-state actors creating or using machine-manipulated media (commonly referred to as ‘deep fakes’),” including “how such media has been used or might be used to conduct information warfare.”

Just a couple years later, American special forces seem to be gearing up to conduct the very same.

“It’s a dangerous technology,” said Rizzuto, the Atlantic Council researcher.

“You can’t moderate this tech the way we approach other sorts of content on the internet,” he said. “Deepfakes as a technology have more in common with conversations around nuclear nonproliferation.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/03/06/u-s-special-forces-want-to-use-deepfakes-for-psy-ops/feed/ 0 377421
Top PNG journalist challenges state media ‘regulation’ plans at stakeholder consultation https://www.radiofree.org/2023/03/05/top-png-journalist-challenges-state-media-regulation-plans-at-stakeholder-consultation/ https://www.radiofree.org/2023/03/05/top-png-journalist-challenges-state-media-regulation-plans-at-stakeholder-consultation/#respond Sun, 05 Mar 2023 08:43:21 +0000 https://asiapacificreport.nz/?p=85772 The National in Port Moresby

Senior Papua New Guinean television journalist and columnist Scott Waide has challenged the government on what it actually wants to “regulate” in the draft national media development policy.

During a policy consultation workshop with media stakeholders in Port Moresby on Thursday, he said “in the media ecosystem, there are many professions”.

“There are radio broadcasters, directors, editors, producers, camera operators, photographers, engineers, who have to be licensed, ICT professionals, public relation professionals, bloggers, podcasters, video content producers, social media influencers and a whole heap of them.

What do you want to regulate?” he asked.

“And there’s the problematic niche of news media and journalism. That’s the part politicians and legislators don’t really like.”

He said as a journalist, he was expected to follow rules which were enforced by the editor and the organisation.

“I am not supposed to lie, defame, slander, be disrespectful, harm, show nudity on the platform that I operate on. Those are the rules,” he said.

Independent journalist Scott Waide at the media policy consultation
Independent journalist Scott Waide and a former EMTV deputy news editor … “There’s the problematic niche of news media and journalism. That’s the part politicians and legislators don’t really like.” Image: Scott Waide/APR

“And I disagree with the presenter from National Information and Communications Technology Authority (NICTA) who says self-regulation does not work. This is my self-regulation right here.

“I am supposed to be honest, have integrity, accuracy, provide contextual truth, transparency, have respect and fairness, and be independent.

“All these are already self-regulation in the industry.”

Ideas ‘will form basis of draft policy’
The media stakeholders have been told that their comments, sentiments and ideas shared during the workshop on the draft policy would form the basis of the next draft version.

Minister for Information and Communications Technology Timothy Masiu told the workshop that consultation was “ongoing”.

PNG's Information and Communication Technology Minister Timothy Masiu
PNG’s Information and Communication Technology Minister Timothy Masiu . . . “For those who are saying it’s a rushed thing, we had to start from somewhere.” Image: PNG govt

He denied that the proposed policy was an attempt by the government to regulate, restrict, censor or control the exercising of the freedom of expression or speech enshrined in the Constitution.

“Your comments, sentiments and ideas have been captured and will form the basis of the next version [of the draft policy],” he said.

“For those who are saying it’s a rushed thing, we had to start from somewhere.”

He added that the proposed policy was to outline “objectives and strategies for the use of media as a tool for development, such as the promotion of democracy, good governance, human rights, and social and economic development”.

Call for ‘meaningful’ consultation
Transparency International chairman Peter Aitsi called for proper, genuine and meaningful consultation, saying that it should not be a “three-week process”.

The first version of the draft policy was released on February 5 with 12 days allowed for review, the second was released with six days for review, and the most recent one was on Wednesday — a day before the workshop.

Department of Information and Communications Technology Deputy Secretary (Policy) Flierl Shongol said his team had noted all the comments.

“We’ve got some comments in written form. We’ve also taken notes of comments presented in this workshop. So, we will respond to those comments,” he said.

“You can also respond to tell us if our response actually reflects your views. [It] will form the basis of the next policy that will come out.”

Republished from The National with permission.

Four of PNG's media industry stalwarts at the media policy consultation
Four of PNG’s media industry stalwarts at the media policy consultation . . . Harlyne Joku (from left), Priscilla Raepom, Tahura Gabi and Sincha Dimara. Image: Belinda Kora/ABC


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2023/03/05/top-png-journalist-challenges-state-media-regulation-plans-at-stakeholder-consultation/feed/ 0 377195
From lab to market, bio-based products are gaining momentum https://grist.org/solutions/from-lab-to-market-bio-based-products-are-gaining-momentum/ https://grist.org/solutions/from-lab-to-market-bio-based-products-are-gaining-momentum/#respond Sat, 04 Mar 2023 14:00:00 +0000 https://grist.org/?p=603275 This story was originally published by Yale Environment 360 and is reproduced here as part of the Climate Desk collaboration.

In the 1930s, the DuPont company created the world’s first nylon, a synthetic polymer made from petroleum. The product first appeared in bristles for toothbrushes, but eventually it would be used for a broad range of products, from stockings to blouses, carpets, food packaging, and even dental floss.

Nylon is still widely used, but, like other plastics, it has environmental downsides: it is made from a nonrenewable resource; its production generates nitrous oxide, a potent greenhouse gas; it doesn’t biodegrade; and it sheds microfibers that end up in food, water, plants, animals, and even the clouds.

Now, however, a San Diego-based company called Genomatica is offering an alternative: a so-called plant-based nylon made through biosynthesis, in which a genetically engineered microorganism ferments plant sugars to create a chemical intermediate that can be turned into nylon-6 polymer chips, and then textiles. The company has partnered with Lululemon, Unilever, and others to manufacture this and other bio-based products that safely decompose.

“We are at the start of a sustainable materials transition that will reinvent the products we use every day and where they come from,” says Christophe Schilling, Genomatica’s CEO.

Using living organisms to create safe materials that break down completely in the environment — where they can act as nutrients or feedstock for new growth — is just one example of a burgeoning global movement working toward a so-called bioeconomy. Its goal isn’t limited to replacing plastics but takes aim at all conventional synthetic products — including chemicals, concrete, and steel — that are toxic to make or use, difficult to recycle, and have outsize carbon footprints. In their place will come products made from plants, trees, or fungi — materials that, at their end of life, can be safely returned to the Earth or recycled again and again. The bioeconomy is still small, in the global scheme of things, but the push to turn successful research into manufactured products is growing, propelled by several factors.

First is widespread disgust at the mounting environmental toll of plastic, including the fact that people and animals are ingesting it. Second is a flood of funding, especially in the United States and Europe, to accelerate the transition away from products that are non-biodegradable, toxic, and that produce carbon emissions. Last September, President Biden signed an executive order, with funding of more than $2 billion, to launch the National Biotechnology and Biomanufacturing Initiative to support research and development efforts, including the use of sustainable biomass and waste resources to make non-toxic, bio-based fuels, chemicals, and fertilizers, and to build affordable housing.

A person holds a piece of light brown leather that's made from mushrooms.
A leather-like material made from mushrooms by California-based MycoWorks. MycoWorks

And the Department of Defense recently funded what it calls a Manufacturing Innovation Institute called BioMADE, or the Bioindustrial Manufacturing and Design Ecosystem, a public-private partnership with its headquarters at the University of Minnesota. Bioindustrial manufacturing uses biological systems — including microbes like bacteria, yeast, and algae — to create new materials or alternatives to existing petroleum-based materials. Ongoing projects include the creation of a bacterium, made from byproducts of the dairy industry, that displaces petroleum-based propylene as the feedstock for acrylic acid, which is used to make vinyl, paint, adhesives, diapers, and other products, and a bacterium that safely kills pathogens in chickens, replacing antibiotics.

The U.S. Department of Agriculture is also a major player in this field. The agency recently announced it would allocate $41 million to develop new markets for products made from wood, and it has long managed the BioPreferred Program, which requires federal agencies and contractors to preferentially purchase products, including cleaners, carpets, lubricants, and paints, with minimum bio-based content. Among the products federal agencies are now using is a transformer coolant made from soybean oil that is 99 percent biodegradable in 21 days and Seventh Generation laundry detergent, which is made from 97 percent bio-based ingredients. While the bioeconomy concept has been around for a while, the surge of funding and interest has seeded a range of new facilities and projects. The University of Maine’s Advanced Structures and Composites Center just manufactured a completely recyclable house; the Material Innovation Initiative develops sustainable textiles without animal products. Oak Ridge National Laboratory has the Center for BioEnergy Innovation, which studies fuels made from plants and the bioenergy supply chain.

Across the Atlantic, Horizon Europe, the European Union’s key funding program, has dedicated at least $2 billion to accelerate its own transition to a bioeconomy. The program’s goals are to fund innovative bio-based products to make them a less risky investment, to make sure the new products and systems perform as claimed, and to get them to market promptly.

New regulations governing waste streams are another major driver of this transition. The EU has just proposed new rules to require that all product packaging be recyclable in an economically viable way and possibly reusable by 2030. The continent’s textile industry is also bracing for new sustainability rules. “The fashion industry from the EU’s point of view will be regulated from A to Z within a couple of years,” Rannveig van Iterson, a senior consultant at Ohana Public Affairs, recently told Women’s Wear Daily. “It’s going from basically zero with no sustainability legislation to kind of covering everything from production to design to waste.” The entire process of making clothes, in other words, may soon be required to become bio-based.

A construction site with all wood beams and flooring in the middle of a city.
Laminated timber beams and floors used in the construction of Ascent, a 25-story apartment building in Milwaukee. Thorton Tomasetti / Yale Environment360

The fashion industry is under enormous pressure to clean up its act, says Frank Zambrelli, executive director of the Responsible Business Coalition at Fordham University, in New York. The sector produces 92 million tons of waste globally each year, and its CO2 emissions are projected to increase by 50 percent by 2030. Tanning hides for leather requires a number of toxic chemicals, including chrome, formaldehyde, and arsenic. One promising leather alternative comes from mushrooms. In 2016, MycoWorks began producing a leather-like textile, called Reishi, from mushroom mycelium, which one study found has a carbon footprint that’s just 8 percent of bovine leather’s footprint. The company has been wildly successful, and now produces textiles ranging from sheets to canvas to car seats for major brands. Based in Emeryville, California, MycoWorks has more than 160 employees and just broke ground on a 150,000 square-foot plant.

Concerns about looming restrictions have led to a big push to scale up new, safer materials. “There are more and more and more responsible options,” says Zambrelli. “Many of these alternatives have been around for a while, but we are starting to see real investments.”

As more regulations come into play, companies are going to have to take the disclosure of their products’ environmental information in official reporting more seriously, Zambrelli added. “When you’ve got the CFOs [chief financial officers] and general counsels involved in the reporting, suddenly there’s a legitimizing factor in what they are doing.”

In addition to regulatory pressure, said Rob Handfield, who studies bio-based supply chains at North Carolina State University, there is growing pressure from shareholders. “More and more companies now have investors that are requesting science-based targets,” he said. “And there is big customer pressure as well. They are asking companies not only to make a commitment, but to put their money where their mouth is.”

It helps, too, that bio-based products are increasingly profitable. One estimate places the U.S. value of the bioeconomy at $1 trillion and the global value at $4 trillion. A 2020 World Business Council for Sustainable Development report projects that the economic opportunity for bio-based products could grow to more than $7 trillion by 2030.

Rapidly evolving technology is enabling new approaches and products. Plain old low-tech wood — from trees — is getting an enormous amount of attention as a replacement for steel and concrete in construction. (Steel manufacturing contributes about 8 percent of global carbon dioxide emissions, and concrete manufacturing contributes another roughly 8 percent.)

A product called MettleWood, developed at the Center for Materials Innovation at the University of Maryland, is derived from soft wood from commercial plantations that has had its lignin removed. In a proprietary process, the lignin-free wood is then densified under high pressure, creating wood that its maker claims is 80 percent lighter than steel, 20 percent stronger, and roughly half the cost. InventWood, the company that makes MettleWood, just received a $20 million grant from the U.S. Department of Energy to scale up production.

The University of Maine’s Advanced Structures and Composites Center recently showed off a 3D-printed house made from a mix of forest byproducts from the state’s numerous sawmills: sawdust, wood flour (a very fine sawdust), and a bio-resin whose ingredients have not yet been disclosed. The entire envelope of the house — walls, floor, and roof — is printed from wood fibers and bio-resins and insulated with 100 percent wood insulation.

A one-story house with rounded edges, three windows, white paint, and grown wood paneling, with two wood columns in the front.
A 3D-printed house made from sawdust and other timber industry waste by the University of Maine’s Advanced Structures and Composites Center. University of Maine

“This material is recyclable,” said Evan Gilman, the center’s chief operations engineer. “If in a hundred years this house becomes unusable, you could take the material, grind it up, and print another home or other structure or something else useful. It could be repurposed for the future.”

Mass timber, also known as cross-laminated timber, is also increasingly popular as a building material. Made from pieces of wood laminated or nailed together, it is in some ways stronger than steel and concrete. And because the wood stays intact for the life of the building, it will sequester carbon for decades or even longer — potentially converting buildings from carbon sources to carbon sinks.

While research and development are on the upswing, scaling up from lab-made samples to mass production is the next and bigger hurdle. In fact, the gap between the discovery and successful marketing of a new product or process is known by venture capitalists as the “valley of death.” The U.S. does “very well at the R and D phase, and we have some commercial-scale production,” said Melanie Tomczak, BioMADE’s chief technology officer. “But it’s that middle, that pilot-plant production, that we don’t have. There hasn’t been incentive at that scale.”

There is also concern that bio-based products are susceptible to “greenwashing” — overselling their environmental bona fides — or to unintended consequences. Eighteen years ago, for example, the federal government greatly expanded a program to encourage biofuel production, mostly from corn, as a way to cut down on CO2 emissions from fossil fuels. Now more than a third of the U.S. corn crop goes to biofuels. One recent study, though, found that the federal incentives to grow corn for ethanol led to land conversion to cropland, which caused the release of greenhouse gases into the atmosphere, offsetting gains from the program.

And while building with mass timber could well be more sustainable than building with steel and concrete, depending on a number of factors — including how long the beams are kept intact — the demand for mass timber may lead to more logging.

While a true bioeconomy is a long way from fruition, increased attention to and funding of the field is creating momentum. A large part of the battle may simply be public awareness. “We need more early adopters to drive the economy of scale,” said the University of Maine’s Gilman. “The technologies exist, but they are not being utilized because they aren’t as efficient yet, or people just don’t understand the potential. We need momentum, some early adopters to buy into it. That will really drive development.”

This story was originally published by Grist with the headline From lab to market, bio-based products are gaining momentum on Mar 4, 2023.


This content originally appeared on Grist and was authored by Jim Robbins, Yale Environment 360.

]]>
https://grist.org/solutions/from-lab-to-market-bio-based-products-are-gaining-momentum/feed/ 0 377120
PNG Post-Courier: Let’s talk first on media policy and transparency https://www.radiofree.org/2023/03/02/png-post-courier-lets-talk-first-on-media-policy-and-transparency/ https://www.radiofree.org/2023/03/02/png-post-courier-lets-talk-first-on-media-policy-and-transparency/#respond Thu, 02 Mar 2023 00:24:47 +0000 https://asiapacificreport.nz/?p=85598 EDITORIAL: PNG Post-Courier

The discussions on Papua New Guinea’s new draft media development policy will come to the fore today when the media industry presents its response to the government.

It is expected the PNG Media Council, which we are a member of, will present the position of the industry in response to the draft policy and members of the media fraternity, and other concerned institutions will also present their views to the Department of Information that is handling this exercise.

The policy paper outlines the government’s strategies to use the media as a tool for development, however the consultation progresses amidst a growing fear in the industry that legislation is ready to go before Parliament and the consultation process is only an academic exercise.

PNG Post-Courier
PNG POST-COURIER

Included in the proposed policy is the proposal to legislate the PNG Media Council and laws to impose penalties against journalists and media houses that are accused [of] bad reporting.

The industry is of the view that the proposed changes will erode the independence of the media and the journalists and ultimately the freedoms relating to free speech that are enshrined in the national constitution.

One cannot blame the industry and its practitioners for their concern considering the latest version to the policy document 2.1 contains 31 mentions of the word “regulation” in various instances among other things.

In the entire document its transparency on penalties also goes as far as 6 words alone without any more being uttered in its delivery mechanisms.

The PNG Media Council, for the record, is not a journalist organisation. It is an industry body and it functions to protect the interest of the industry.

Today the council is in existence, with its executive members operating from their homes, while the media industry is operating with its newsroom managers dealing daily with challenges like the growing concerns of a country with many issues on top of the self-regulation of unethical journalism, poor presentation and story selections and accountability, among many that are a daily task at hand.

On the other side, the government and its agencies are working in isolation, with no clear, honest and transparent media and communication strategies and allocate a budget to work with the mainstream media.

At Independence, PNG inherited an information and communication apparatus that comprised the Office of Information, the National Broadcasting Commission, the Public Library, the National Archives and the National Museum, all with networks spread throughout the provinces.

These institutions coordinate and disseminate government information to the masses, most of them illiterate at that time.

Today a new generation of people live in PNG, the Department of Communication replaces the Office of Information, the NBC had moved into television, competing with more radio and TV networks, but the public libraries, archives and museums are either run down or closed.

And the communication landscape has changed drastically with the advancement in information technology, including social media.

All state agencies have media and communication units that are operating on ad hoc basis, sending invitations out only for groundbreaking ceremonies, report presentations and a few random press releases, hoping that the mainstream media will “educate, inform and communicate” to the masses and mobilise their support behind the state.

Communication and stakeholder engagement is the least funded activity in government. This is a fact, and yet the government expects the mainstream media to be proactive and promote its work.

How can the media, as an independent industry do that when its role is not encompassed into the entire government planning?

The media is an important pillar of our democracy and is a useful tool for development. We just have to build an honest, transparent and workable partnership for the mutual benefit of everyone. This must happen.

But it cannot work with a stick, sword, or even a gun to the head of any pillar of our governance and society.

We look forward to the discussions today with the proponents of this policy document, and we hope to see more transparency on what is the end game that is mutually beneficial where we have to plot a new course in media-government relationship.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2023/03/02/png-post-courier-lets-talk-first-on-media-policy-and-transparency/feed/ 0 376385
‘Shameful wage stealing’ endemic at Australian universities, says report https://www.radiofree.org/2023/03/01/shameful-wage-stealing-endemic-at-australian-universities-says-report/ https://www.radiofree.org/2023/03/01/shameful-wage-stealing-endemic-at-australian-universities-says-report/#respond Wed, 01 Mar 2023 05:13:38 +0000 https://asiapacificreport.nz/?p=85545 By Kalinga Seneviratne in Sydney

A National Tertiary Education Union (NTEU) report claims that “wage theft has shamefully become an endemic part of universities’ business models” while Australia’s biggest public universities record massive surpluses and their vice-chancellors earn more than A$1 million a year in wages.

The union report, released late last month and titled Wage Theft, exposes a staggering amount in wages that has allegedly been stolen from casual academic staff.

An analysis of 34 cases conservatively estimates that a collective amount of A$83.4 million is owed to staff across the higher education sector. More than A$80 million has been uncovered since 2020 across public universities.

Thousands of casual academic staff were laid off during covid-19 pandemic closures starting from March 2020 when revenue from foreign students fell dramatically.

NTEU argues that this should not be an excuse for some of Australia’s wealthy universities not to pay proper wages to hard-working staff who are integral to teaching and research which “generates revenue and delivers immeasurable public good”.

Bigger problem than anticipated
“It’s deeply disappointing but not at all surprising that the staggering wage theft figure is even higher than the NTEU first calculated,” Dr Alison Barnes, national president of NTEU, said in a media statement.

“Even more sadly, the true figure will rise well beyond AU$107.8 million once ongoing cases are settled. Systemic wage theft is endemic in our public universities. This is simply unacceptable,” she added.

Barnes told University World News it was also “unacceptable” that A$107.8 million “has been stolen from higher education staff while universities post huge surpluses and vice-chancellors collect million-dollar salaries”.

At fault are some of Australia’s top universities which also attract huge numbers of foreign students.

The University of Melbourne topped the list with an estimated “wage theft” bill of A$31.6 million, while the University of Sydney came second with A$12.75 million and Royal Melbourne Institute of Technology (RMIT University) third with A$10 million.

Higher education wage theft comes in many forms, according to the NTEU report.

It includes being paid for fewer hours than the work takes, piece rates for marking instead of the actual time worked, and sham contracting to undercut award and agreement entitlements.

Teaching misclassification is among the most common forms of wage theft in universities.

According to Barnes, two-thirds of all Australian university staff are employed insecurely. With high rates of casualisation among university academic staff, casually employed workers are more vulnerable to wage theft than those who have secure employment, argues the NTEU report.

“Many workers are reluctant to raise complaints over underpayment, or to ask for compensation for hours worked for free when they require contract renewals every teaching period,” it notes.

Fresh revelations and claims
New revelations from the University of Melbourne have taken its underpayment tally beyond A$45 million, cementing it as the leading culprit. Monash University admitted to A$8.6 million in wage theft in 2021.

The management is now fighting tooth and nail against new claims, going to the Fair Work Commission in an attempt to change its enterprise agreement so it is no longer liable to pay staff the money the union alleges is owed.

Bill Logan (not his real name) has worked as a casual for many years at Melbourne University and lately at RMIT. Speaking to University World News on condition of anonymity out of fear that his casual contracts may be denied in the next round, he said that as a casual you have job security for only three months at a time.

Casual lecturers, even though they do the same work as full-time lecturers — preparing tutorials, marking and student administration — are not considered for full-time academic appointments.

After reading the NTEU report, he said: “I still can’t figure out how it has happened as universities pay via software and it is approved by a few people at the top before payments.”

He said it was ironic that universities underpay staff “while teaching students how to practise good governance”.

Logan admits that having job flexibility is a highlight of doing casual teaching.

However, he points out disadvantages: “Until the pre-semester preparation, we didn’t know whether we would be able to do tutoring for the semester, because it depends on the number of students [enrolled for the course].”

“Casuals are not paid for administrative tasks such as writing recommendation letters for internships or further studies [for students],” he added.

Personal sacrifices
Speaking on ABC TV’s 7.30 Report, Natalia Chulio, who has worked as a casual sociology lecturer at the University of Sydney for the past decade, said that to do such work she had had to make a lot of sacrifices in her personal life.

“I can’t have children because I don’t have a guaranteed income … You are always doing work that you are not paid for. For example, I am paid for 28 hours of face-to-face work per week, but I work for more than 45 hours a week.

“I’m underpaid when it comes to marking.”

Logan said: “Even though casual tutors are paid at a higher rate [in academia] than in other sectors, there is no consistency in payments. [Thus] casuals are discriminated against [for example] when you apply for bank loans.”

According to the Wage Theft report, the University of Melbourne admitted in November 2022 that it had started back-paying more than 15,000 staff who were owed A$22 million. That revelation came a little over a year after Melbourne repaid A$9.5 million to 1000 casual academics.

It posted a A$584 million surplus in 2022.

When interviewed on the 7.30 Report, Professor Nicola Phillips, provost of the University of Melbourne, admitted that the system needed an overall. “This is not a sustainable model for us and it is not a desirable one for the future,” she said. “We are looking at dramatically reducing our number of casual contracts as a way of employing staff.”

Logan agreed that institutions like Melbourne University should employ permanent part-time staff rather than casuals.

“Permanent part-time tutors could be hired who could teach a variety of similar subjects,” he argued, pointing out that casuals “teach different but similar subjects” every semester.

‘Tackle insecure work’ plea
“We’re calling on the federal government to address wage theft through tackling its chief cause — insecure work,” said NTEU’s Barnes. “Wage theft in higher education is a deep crisis. We need urgent action to create the better universities that Australia deserves.”

Barnes called on the Australian government to pass laws that make wage theft a crime.

“That needs to happen alongside a mechanism for staff to quickly recover money stolen from them,” she said.

She also encouraged all university staff to become union members.

“The NTEU has pursued enterprise agreements which include secure jobs guarantees, like at Western Sydney University, to increase permanent roles,” she said.

Dr Kalinga Seneviratne is a Sri Lanka-born journalist, radio broadcaster, television documentary maker and a media and international communications analyst. He was head of research at the Asian Media Information and Communication Centre (AMIC) in Singapore from 2005-2012.This article was originally published by University World News and has been republished here with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/03/01/shameful-wage-stealing-endemic-at-australian-universities-says-report/feed/ 0 376104
A new alliance for ‘high quality’ carbon removal highlights tensions within the industry https://grist.org/technology/a-new-alliance-for-high-quality-carbon-removal-highlights-tensions-within-the-industry/ https://grist.org/technology/a-new-alliance-for-high-quality-carbon-removal-highlights-tensions-within-the-industry/#respond Tue, 28 Feb 2023 11:45:00 +0000 https://grist.org/?p=603521 Eight years ago, the field of carbon removal amounted to a handful of academic lab projects and a few fledgling companies working on a novel concept: sucking carbon out of the atmosphere. 

That was when Giana Amador, an undergrad at the University of California, Berkeley, founded a nonprofit called Carbon180 with another student, Noah Deich. They hoped to convince policymakers and the climate community that reversing carbon emissions — in addition to reducing them — was essential to limiting the worst impacts of climate change.

A lot has changed since then. Scientists have become more outspoken about the need for carbon removal. Last year, a major U.N. report concluded that achieving international climate goals would be nearly impossible without cleaning up some of what’s already been emitted. Startups hoping to do that now number in the hundreds. Universities have opened research centers to explore the best methods. Private companies and venture capital firms have committed hundreds of millions in the cause, and Washington has followed suit. There’s a new carbon removal research program within the Department of Energy, $3.5 billion in federal funding available to build machines that extract carbon from the air, and a tax credit of up to $180 for every ton of carbon those machines sequester underground. 

This explosive growth led Amador to see the need for a different type of advocacy. Last week, she launched the Carbon Removal Alliance, a group of startups and investors that will lobby for policies that support “high quality, permanent carbon removal.”

“I’m really excited that we have more than 20 companies who have come together around those principles to set the bar for what good carbon removal should look like,” Amador, the group’s executive director, told Grist.

The group’s explicit focus on “high quality” or “good” carbon removal underscores a simmering debate within the field about how to best meet the challenge of cleaning up the atmosphere, drawing a stark line between methods that could remove and store carbon for millennia, and those that are more temporary.

There’s generally two reasons scientists say carbon removal will be necessary to tackle climate change. First, it’s a way to balance out emissions that are hard to eliminate, like those from airplanes or agriculture. Second, if the planet warms more than 1.5 degrees Celsius, (2.7 degrees Fahrenheit) as many models show is likely, taking carbon out of the atmosphere will be the only way to cool it down. There’s no consensus on exactly how much carbon removal will ultimately be needed, but scientists put the number at between 450 and 1,100 gigatons by the end of the century.

Nearly all of the carbon removed from the atmosphere to date has been accomplished by nature. A recent review of the state of CO2 removal estimates that conventional land management techniques, like reforestation, take up about 2 gigatons of carbon dioxide per year, or roughly 5 percent of global fossil fuel emissions in 2021. Trees, soils, wetlands, and other natural carbon sinks can be enhanced to absorb even more of it, and many companies are focused on doing so. But these are considered short-duration solutions. Wildfires, droughts, diseases, and natural death threaten the carbon stored in trees, while any perturbation to soils and wetlands can also cause a release. Polluting companies often buy carbon offsets derived from these relatively short term solutions. But scientists have criticized that practice, noting that fossil fuel emissions stay in the atmosphere for thousands of years, while trees typically store carbon for hundreds, or less. 

The Carbon Removal Alliance, by contrast, is comprised of companies focused on sucking up carbon and storing it practically forever. Some, like Climeworks, build direct air capture machines that suck up air, separate the carbon, then stash it underground. Others, like Charm Industrial, refine corn stalks into a stable, viscous oil and inject it into the earth’s crust. Other companies grind up rocks and spread them on agricultural fields to accelerate a natural weathering process that absorbs carbon. Still others hope to sink carbon into the depths of the ocean. But these approaches are far more expensive and technologically challenging than planting trees. It’s not yet clear what a successful business model for permanent carbon removal looks like. So far entrepreneurs have relied on venture capital and on selling their services as pricy carbon offsets to a few benevolent companies eager to support the field. 

Many members of the Alliance aim to distance themselves from traditional carbon offsets not only by advancing methods with longer time scales, but also by pushing for more rigorous standards for measuring and verifying the amount of carbon they remove. Researchers have found that many forest and soil-based projects are rife with accounting issues and don’t remove as much carbon as they claim to. But while newer, more highly engineered approaches have come a long way since Amador started, they have yet to remove meaningful amounts either.

“We’ve made a lot of progress in the field,” she said. “That being said, we’ve still only captured about 10,000 tons of permanent carbon removal today. And that is a very, very small fraction of the billions of tons that we need to be capturing 30 years from now.” She said the next chapter is about building larger, proof of concept projects, and driving down the cost.

Amador and other members of the Alliance make clear that cutting emissions is much more urgent in the near term. But they argue that permanent carbon removal will not be an option later without immediate, sustained investment. Companies need funding and regulatory support to determine what works; what the risks are, and how to measure the benefits. And while policymakers have started to create programs to support the field, they have focused on a narrow set of solutions. Take the $180 per ton tax credit, for example. Only direct air capture projects can claim it. Peter Reinhardt, the CEO and founder of Charm Industrial, was frustrated that his company’s bio-oil solution didn’t qualify despite his best efforts to lobby lawmakers.

“What actually matters is how much carbon we get out of the atmosphere and put underground,” he said. “And so I made kind of a solo effort to try to push that, and learned very quickly that building a broad coalition is the only effective way to get things done.” That’s why he joined other founding members in creating the Carbon Removal Alliance.

The group wants to discourage policymakers from supporting specific technologies and instead prioritize certain criteria, like the length of carbon storage. It’s an approach that another carbon removal trade association, the Carbon Business Council, disagrees with.

“We see the benefits of an all-of-the-above strategy and not necessarily choosing one or the other,” said Ben Rubin, the organization’s executive director. 

The council launched last year and includes more than 80 members representing a wide array of solutions. While there’s some overlap with the Carbon Removal Alliance, the group also has entrepreneurs focused on capturing carbon in soil and trees, and on using the material to make products like jet fuel and diamonds. It also has a handful of members focused on building carbon credit marketplaces to help companies commercialize their services. 

Rubin said the benefit of relatively temporary forms of carbon removal is they are “bountiful on the market today,” and very affordable. “If the CO2 is re-released in the future, we still think it has a role in helping to buy society the time we need to decarbonize. As we look at the trends of where renewable energy is heading, electric vehicle adoption is heading, we need more time.”

Amador agrees with that idea, at least in the short term. She didn’t dismiss the possibility that the two groups might work together. “But the reason why we’re focused on long-term is because we know, from a climate perspective, we need to be storing carbon on timescales that match how long carbon actually stays in our atmosphere,” she said.

This story was originally published by Grist with the headline A new alliance for ‘high quality’ carbon removal highlights tensions within the industry on Feb 28, 2023.


This content originally appeared on Grist and was authored by Emily Pontecorvo.

]]>
https://grist.org/technology/a-new-alliance-for-high-quality-carbon-removal-highlights-tensions-within-the-industry/feed/ 0 375921
The National welcomes government claim of no plan to control media https://www.radiofree.org/2023/02/28/the-national-welcomes-government-claim-of-no-plan-to-control-media/ https://www.radiofree.org/2023/02/28/the-national-welcomes-government-claim-of-no-plan-to-control-media/#respond Tue, 28 Feb 2023 02:46:21 +0000 https://asiapacificreport.nz/?p=85489 The National

Papua New Guinea’s The National newspaper has welcomed a statement by the Information and Communication Technology Department (DICT) that the government has no wish to control the media to limit freedom of expression.

Editor-in-chief Christine Pakakota said a free media provided oxygen to any country claiming to be democratic, and effectively promoting transparency and accountability.

She was responding to a government statement last week, saying that the proposed national media development policy had “no intention of giving powers to the government to control the media or infringe on the freedom of expression”.

The National submitted its response to the draft policy last Tuesday.

Pakakota said it was obvious that the government’s intention and concern was “to ensure that the people get important and accurate information”.

“We are with any government that wishes to improve the standard of living of the people as well as to develop the country,” she said.

“And when the government says it aims to do so through the promotion of democracy, good governance, human rights and social and economic development, as stated in the covering statement to the draft policy, we will proudly stand beside it.”

‘Long journey’
She regretted that the government had given stakeholders only two weeks “to respond to a matter that would have serious and long-lasting impact on the country’s long journey to becoming a developed nation and take its rightful place in the world”.

“We also believe that the PNG Media Council must be fully independent and adequately funded by the state and/or donors, and run by highly-respected persons,” she said.

“It represents the interests of the media industry in PNG.”

She said the council should also have a complaints committee to judge complaints about press and broadcasting conduct as set out in a Media Code of Ethics and Practice.

“The council should have a chairman and executive secretary selected from the public,” she said.

“Members of the complaints committee (at least five) are also to be picked from the public.”

Republished with permission.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/02/28/the-national-welcomes-government-claim-of-no-plan-to-control-media/feed/ 0 375842
‘Chilling effect on journalism’ – Fiji academic warns PNG against media law change https://www.radiofree.org/2023/02/27/chilling-effect-on-journalism-fiji-academic-warns-png-against-media-law-change/ https://www.radiofree.org/2023/02/27/chilling-effect-on-journalism-fiji-academic-warns-png-against-media-law-change/#respond Mon, 27 Feb 2023 11:12:46 +0000 https://asiapacificreport.nz/?p=85463 By Kelvin Anthony, RNZ Pacific digital and social media journalist, and Koroi Hawkins, RNZ Pacific journalist and Pacific Waves presenter

A Pacific journalism academic has warned proposed amendments to media laws in Papua New Guinea, if “ill-defined”, could mirror the harsh restrictions in Fiji.

Prime Minister James Marape’s government is facing fierce opposition from local and regional journalists for attempting to fasttrack a new media development policy.

The draft law has been described by media freedom advocates as “the thin edge of the web of state control”.

PNG’s Information and Communications Technology (ICT) Department released the Draft Media Development Policy publicly on February 5. It aims “to outline the objectives and strategies for the use of media as a tool for development”.

The department gave stakeholders less than two weeks to make submissions on the 15-page document, but after a backlash the ICT chief extended the consultation period by another week.

“I recognise the sensitivity and importance of this reform exercise,” ICT Minister Timothy Masiu said after giving in to public criticism and extending the consultation period until February 24.

Timothy Masiu
ICT Minister Timothy Masiu . . . “I recognise the sensitivity and importance of this reform exercise” Photo: PNG govt/RNZ Pacific

Masiu said he instructed the Information Department to “facilitate a workshop in partnership with key stakeholders”, adding that the Information Ministry “supports and encourages open dialogue” on the matter.

“I reaffirm to the public that the government is committed to ensuring that this draft bill will serve its ultimate purpose,” he said.

The new policy includes provisions on regulating the media industry and raising journalism standards in PNG, which has struggled for years due to lack of investment in the sector.

But media leaders in PNG have expressed concerns, noting that while there are areas where government support is needed, the proposed regulation is not the solution.

“The situation in PNG is a bit worrying if you see what happened in Fiji, even though the PNG Information Department has denied any ulterior motives,” University of the South Pacific head of journalism, Associate Professor Shailendra Singh, told RNZ Pacific.

“There are concerns in PNG. Prominent journalists are worried that the proposed act could be the thin edge of the wedge of state media control, as in Fiji,” Dr Singh said, in reaction to Masiu’s guarantee that the policy is for the benefit of media organisations and journalists.

“If you look at the Fiji situation, the Media Act was implemented in the name of democratising the media, ironically, and also improving professional standards.”

Dr Singh said this is what is also being said by the PNG government but “in Fiji the Media Act has been a disaster for media rights”.

Shailendra Singh
USP’s Associate Professor Shailendra Singh . . . “In Fiji the Media Act has been a disaster for media rights.” Image: RNZ Pacific

“Various reports blame the Fiji Media Act for a chilling effect on journalism and they also hold the Act responsible for instilling self-censorship in the Fiji media sector,” he said.

“If the PNG media policy provisions are ill-defined, as the Fiji Media Act was, and if it has harsh punitive measures, it could also result in a chilling effect on journalism and this in turn could have major implications for democracy and freedom of speech in PNG.”

The Media Industry Development Act (MIDA) 2010 and its implementation meant that Fiji was ranked 102nd out of 180 countries by Reporters without Borders in 2022.

Earlier this month Fiji’s Attorney-General Siromi Turaga publicly apologised to journalists for the harassment and abuse they endured during the Bainimarama government’s reign.

But Dr Singh said PNG appeared to have been “emboldened” by the Fijian experience.

Media freedom a Pacific-wide issue
He said other Pacific leaders had also threatened to introduce similar legislation and “this is a major concern”.

“Fiji and PNG are the two biggest countries in the Pacific [which] often set trends in the region, for better or for worse. The question that comes to mind is whether countries like Solomon Islands or Vanuatu will follow suit? [Because] over the years and even recently, the leaders of these two countries have also threatened the news media.”

A major study co-authored by the USP academic, which surveyed more than 200 journalists in nine countries and was published in Pacific Journalism Review in 2021, revealed that “Pacific journalists are among the youngest, most inexperienced and least qualified in the world”.

Dr Singh warned the research showed that legislation alone would not result in any significant improvements to journalism standards in Pacific countries, which is why committing money in training and development was crucial.

“Training and development are an important component of the Fiji Media Act. However, our analysis found zero dollars was invested by the Fiji government in training and development,” he said.

“If we are to take any lessons from Fiji, and if the PNG government is serious about standards, it needs to invest at least some of its own money in this venture of improving journalism.”

This is a sentiment shared by Media Council of PNG president, Neville Choi, who said: “If the concern is poor journalism, then the solution is more investment in schools of journalism at tertiary institutions, this will also improve diversity and pluralism in the quality of journalism.

“We need newsrooms with access to training in media ethics and legal protection from harassment,” Choi added.

Dr Singh said that without proper financial backing in the media sector “there is unlikely to be any improvement in standards, [but] just a cowered down or subdued media [which] is not in PNG’s public interest, or the national interest, given the levels of corruption in the country.”

APMN calls for ‘urgent rethink’
The publisher of the Pacific Journalism Review, the Asia Pacific Media Network, has also condemned the move, calling for an “urgent rethink” of the draft media policy.

The group is proposing for the communications ministry to “immediately discard the proposed policy of legislating the PNG Media Council and regulating journalists and media which would seriously undermine media freedom in Papua New Guinea”.

The network also cited the 1999 Melanesian Media Declaration as a guideline for Pacific media councils and said the draft PNG policy was ignoring “established norms” for media freedom.

The statement was co-signed by the APMN chair Dr Heather Devere; deputy chair Dr David Robie, a retired professor of Pacific journalism and author, and founding director of the Pacific Media Centre; and Pacific Journalism Review editor Dr Philip Cass, who was born in PNG and worked on the Times of Papua New Guinea and Wantok newspapers.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2023/02/27/chilling-effect-on-journalism-fiji-academic-warns-png-against-media-law-change/feed/ 0 375655
PNG government must withdraw ‘media control’ policy, says RSF https://www.radiofree.org/2023/02/23/png-government-must-withdraw-media-control-policy-says-rsf/ https://www.radiofree.org/2023/02/23/png-government-must-withdraw-media-control-policy-says-rsf/#respond Thu, 23 Feb 2023 11:48:22 +0000 https://asiapacificreport.nz/?p=85161

The Paris-based media freedom watchdog said in a statement that “in what may be an example of the road to hell being paved with good intentions, the government has produced a ‘Draft National Media Development Policy’ with the declared aim of turning the media into “a tool for development” including “the promotion of democracy, good governance, human rights, and social and economic development.”

Daniel Bastard, head of RSF’s Asia-Pacific desk, said: “It is entirely commendable for a democracy to want to encourage the development of a healthy and dynamic news and information environment.

“But, as it stands, the policy proposed by Port Moresby clearly endangers the independence of the media by establishing government control over their work.

“We call on Information and Communication Technology Minister Timothy Masiu to abandon this proposal and start again from scratch by organising a real consultation and by providing proper safeguards for journalistic independence.”

The policy’s most alarming measures concern the Media Council of PNG, which is currently a non-governmental entity representing media professionals, said RSF.

It would be turned into a judicial commission with the power to determine who should or should not be regarded as a journalist, to issue a code of ethics and to impose sanctions on journalists who stray from it.

‘Regulatory government body’
“These are disproportionate powers, especially as there is no provision for ensuring the independence of those appointed as the new Media Council’s members,” the RSF statement said.

“There is also no provision for journalists and media outlets to challenge or appeal against its decisions.”

RSF also quoted from a recent DevPolicy article by Scott Waide, a blogger, media producer and analyst who was formerly a deputy regional head of news at EMTV News based at Lae:

“The policy envisages the media council as a regulatory and licensing body for journalists, which means, hypothetically, that it could penalise journalists if they present a narrative that is not in favour of the government.”

“The re-invented media council would be nothing more than a regulatory government body.”

The government’s new policy seemed all the more ill-considered, said RSF, given that, in the event of disputes with the media, there were already avenues for redress through the courts under the 1962 Defamation Act and 2016 Cybercrime Code Act.

Several journalists have been subjected to covert pressure from the government in recent years.

They include Waide himself, who was suspended from his EMTV News job in November 2018 over a story suggesting that the government had misused public funds by purchasing luxury cars.

EMTV’s then news chief Sincha Dimara suffered the same fate in February 2022 after three news stories annoyed a government minister.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2023/02/23/png-government-must-withdraw-media-control-policy-says-rsf/feed/ 0 374816
Digital artist’s work posted on Instagram viral as close-up of Chinese spy balloon over US https://www.radiofree.org/2023/02/22/digital-artists-work-posted-on-instagram-viral-as-close-up-of-chinese-spy-balloon-over-us/ https://www.radiofree.org/2023/02/22/digital-artists-work-posted-on-instagram-viral-as-close-up-of-chinese-spy-balloon-over-us/#respond Wed, 22 Feb 2023 13:11:52 +0000 https://www.altnews.in/?p=148361 The US Military shot down what they called a Chinese surveillance balloon off the coast of South Carolina on February 4, 2023. The US government had been tracking this balloon...

The post Digital artist’s work posted on Instagram viral as close-up of Chinese spy balloon over US appeared first on Alt News.

]]>
The US Military shot down what they called a Chinese surveillance balloon off the coast of South Carolina on February 4, 2023. The US government had been tracking this balloon as it flew over the Aleutian Islands, passed over Western Canada and entered US airspace over Idaho.

In this context, a short video has gone viral on social media that zooms into the spy balloon, giving a closer look at the object.

Twitter users claimed this video to be of the Chinese surveillance balloon that was shot down. A Twitter user named @fkjacksom shared this video. The tweet has gone viral with over 186,000 views.

A user by the name @jineeminee shared this video and the tweet has over 133,000 views at the moment.

Another Twitter handle named @StatAlpha420 also shared this video and has gained over 1700 views.

Fact Check

By reverse-searching key-frames of the video on Yandex, we came across the Instagram page of Hamid Ebrahimnia, who is a well-known VFX and 3D artist. His LinkedIn profile says he is based in Boston, US. He shared the video on his Instagram page on February 14, 2023. The video has gone viral since.

 

View this post on Instagram

 

A post shared by Hamid Ebrahimnia (@hamidebrahimnia)

By looking at the comments on the post, we saw that the creator responded to the conversation on whether the video is real. He wrote, “Yes it is CGI”. CGI stands for computer-generated imagery.


Following this lead, Alt News came across the entire tutorial on how this video was digitally made using special effects software. Readers can find the tutorial here.

Therefore, the video that has been circulating on social media is digitally created using special effects software by an acclaimed VFX artist and not of the actual Chinese spy balloon.

Vansh Shah is an intern with Alt News.

The post Digital artist’s work posted on Instagram viral as close-up of Chinese spy balloon over US appeared first on Alt News.


This content originally appeared on Alt News and was authored by Vansh Shah.

]]>
https://www.radiofree.org/2023/02/22/digital-artists-work-posted-on-instagram-viral-as-close-up-of-chinese-spy-balloon-over-us/feed/ 0 374545
Can crypto mining go green? Critics are skeptical https://grist.org/climate-energy/can-crypto-mining-go-green-critics-are-skeptical/ https://grist.org/climate-energy/can-crypto-mining-go-green-critics-are-skeptical/#respond Sat, 18 Feb 2023 14:00:00 +0000 https://grist.org/?p=602449 This story was reported by InvestigateWest, an independent news nonprofit dedicated to investigative journalism in the Pacific Northwest. Visit invw.org/newsletters to sign up for weekly updates.

The word “sustainable” features prominently on the website for Merkle Standard’s crypto mining operation in remote eastern Washington, which aims to be carbon neutral by year’s end.

In Idaho, budding company GeoBitmine plans to meet its “environmental, social, and governance mandate” by using heat waste from its computers to grow crops in a greenhouse. 

And in Texas, crypto miners trumpet their presence as eager customers of a growing portfolio of wind and solar power projects.

Across the country, cryptocurrency miners are striving to remake the image of their industry in the public’s and policymakers’ minds: from flighty to reliable, from all about profit to altruistic, from energy guzzling and emissions heavy to climate conscious.

“We want to be allies, not adversaries,” said Jay Jorgensen, founder and CEO of GeoBitmine, the Idaho company. “Allies of the earth, of energy, of energy production, of the community we’re in.”

But environmental groups and researchers are skeptical. They point to the industry’s track record of contributing to greenhouse gas emissions and e-waste, as documented by federal agencies and independent researchers, and to the general volatility of crypto’s first decade-plus of existence.

“I think there’s been a big shift in the public relations aspect,” said Nick Thorpe, climate and energy advocate with Earthjustice, an environmental law nonprofit that produced a sweeping report in 2022 on the crypto mining industry’s environmental liabilities. 

“(They’re) attempting to say all of the various talking points, like ‘We incentivize renewable energy … We’re near a wind farm so therefore we’re getting 100 percent clean energy,’ which, frankly, is incredibly misleading and very much like greenwashing.” 

Voices from both camps are clamoring for the ear of state and federal policymakers who are just beginning to form regulations around the nascent industry. The ongoing question is whether crypto mining will hinder or help progress toward transitioning the country away from fossil fuels and stabilizing the nation’s electrical infrastructure.

Based on the industry’s history, even some crypto miners are striking a cautious tone.

“(With) the pace of movement, plus the frankly irresponsible nature of many of the participants, it would be illogical for policymakers to not be concerned,” said Malachi Salcido, a Wenatchee-based bitcoin miner with a decade of experience in the industry. “The way that will change is not by arguing or entering into conflict. It’s by managing loads responsibly over time, taking strategic long-term positions, and earning trust.”

Ant Boxes (with SR-20 in the background) outside the Merkle Standard cryptocurrency mining facility in Usk, Wash. on Friday, Sept. 9, 2022. Erick Doxey/InvestigateWest

Volatility and climate toll

Crypto mining faces growing scrutiny about its climate impacts.

Concerns center mostly on the process of bitcoin mining, which uses a system called “proof of work.” It is energy-intensive by design, requiring computers to solve thousands of equations as quickly as possible in the hopes of solving the correct sequence to earn bitcoin.

A 2022 Biden administration report stated the industry consumed about 1 percent of the electricity used in the country, producing between 25 million and 50 million metric tons of carbon dioxide annually.

Like data centers, crypto mining operations also use water as coolant and churn through computers every year. That same White House report stated that crypto mining was responsible for e-waste output equivalent to that produced by the entire nation of the Netherlands. 

But some crypto miners have been innovating and pushing back, arguing that the industry has the ability to do better for the planet.

Jorgensen is among them. He’s been involved with the bitcoin mining industry for two and a half years, beginning as a contractor. Now, he’s gathering investors to launch GeoBitmine, which he plans to set up in Idaho Falls this spring. 

Jorgensen refers to GeoBitmine as an “agrotech company” rather than a bitcoin mining operation. He said his focus with most of the five-acre facility is to build a greenhouse heated by the servers working away at mining bitcoin. That can employ at least 30 people initially, he estimated.

In short, he said, he wants to expand upon the mission of bitcoin mining. 

“I’m a practical guy who wants to solve problems and do it the easiest way possible,” he said. “We have problems with water consumption, food production, and our energy grid needs to be stabilized. I found an opportunity where all those things can be put together.”

GeoBitmine aims to be carbon-neutral by the end of 2023, Jorgensen said. His plan to achieve that relies on a combination of 75 percent renewable power supply provided by PacifiCorp, energy savings from repurposing server heat through the greenhouse and carbon sequestration through the crops grown in the greenhouse.

In response to questions about the value of using so much energy to mine bitcoin, Jorgensen points to other uses of electricity such as Netflix streaming, which, according to one 2020 estimate, uses about 94 terawatt hours globally each year.

“You’re just being prejudiced against something that uses less than 1 percent of the grid,” he said. “People fear what they don’t understand.”

The interior of a white container with the label ANT BOX on top filled with coiled cords.
Ant Boxes during the preparation process at the Merkle Standard cryptocurrency mining facility in Usk, Wash. on Friday, Sept. 9, 2022. Erick Doxey/InvestigateWest

Salcido, CEO of Salcido Enterprises, has watched many mining operations rise and fall as the value of bitcoin fluctuated wildly during his 10 years in the business, which justifies the caution from utilities and policymakers.

Given the ongoing volatility of the industry, Salcido said, he doesn’t fault utility companies for setting higher rates for crypto customers in order to protect their assets, or lawmakers for being cautious. He believes it’s too early for crypto miners to try to burnish their environmental credentials in the minds of the public.

“True sustainability requires a lot of strategic, thoughtful planning and execution, not lurching,” Salcido said. “That, coupled with the fact that crypto as a new emerging, evolving industry has a get-rich-quick kind of attribute, means most people don’t see it as sustainable. And in these early market cycles, it’s not acting sustainable.”

With time and experience, though, he still believes that it can become so.

A bet on potential?

An infamous crypto mining project in upstate New York that reopened a mostly defunct coal plant to power its servers was what initially spurred Earthjustice’s work around crypto mining.

Thorpe, the senior associate with the nonprofit, became involved as environmental impacts of crypto mining “became a bigger and bigger issue across the U.S.”

Earthjustice found several other examples of the industry reopening fossil fuels plants or keeping them online as it studied the industry throughout 2022.

Using public filings with utility and financial regulators, investor presentations and media reports, the nonprofits vetted claims that crypto mining is embracing greener practices and mitigating its environmental toll. In partnership with the Sierra Club, Earthjustice compiled that research to present to federal policymakers. 

They describe their research as “the first attempt to comprehensively document the explosive growth of cryptocurrency mining in the United States and examine how this industry is impacting utilities, energy systems, emissions, communities, and ratepayers.”

Earthjustice found through its research that even in cases where mining operations claimed to be drawing directly from renewable projects, “most mining facilities draw power from the grid — meaning their electricity is generated by whatever existing energy is in place in the region, or is contracted by their utility.”

“Increased load on any grid means an increased incentive to run that coal plant which supposedly was going to retire,” Thorpe said. Additionally, “I haven’t seen any example of crypto building out additional clean energy projects solely for their operations.”

Crypto miners also say the industry can contribute in other ways due to its flexibility in power usage. Unlike data centers, crypto mining operations can stop running their computers to ease pressure on the grid during times of peak demand. Or they can ramp up usage during times when energy generation exceeds the grid’s current capacity.

a huge wall of black servers with bright green lights and black cables dangling off of them in an empty hallway.
Servers at the Merkle Standard cryptocurrency mining facility in Usk, Wash. on Friday, Sept. 9, 2022. Erick Doxey/InvestigateWest

States have mostly been relying on subsidies or lower rates from utilities to incentivize crypto miners to disconnect during surges, rather than mandates that require them to do so. 

Jorgensen said that tactic is effective: It makes financial sense for miners to avoid heightened costs of electricity during peak demand and to receive the tax benefits or rate benefits that come from disconnecting for a while.

Environmental advocates point out that ratepayers subsidize those incentives for crypto miners, however, without getting any benefit from sharing the grid with those operations.

Earthjustice also said it found many more instances of power companies getting stuck holding the bag for investments they made to serve crypto operations, only to have those same operations shutter or leave town. The group noted instances in Kentucky, Arkansas, Nebraska and Washington.

Thorpe acknowledged that the industry is still talking about ways to improve. But for climate groups, the past and present make for more compelling arguments.

“We are focused on what’s happening right now,” he said. “Fossil fuel plants are being run to exclusively mine bitcoin. Proof of work is designed to be energy-intensive. Until that changes, I don’t see a future where it actually could follow the models of other companies like Google and Microsoft that have made commitments to run on carbon-free electricity.”

InvestigateWest is an independent news nonprofit dedicated to investigative journalism in the Pacific Northwest. This story was made possible with support from the Sustainable Path Foundation.

This story was originally published by Grist with the headline Can crypto mining go green? Critics are skeptical on Feb 18, 2023.


This content originally appeared on Grist and was authored by Kaylee Tornay, InvestigateWest.

]]>
https://grist.org/climate-energy/can-crypto-mining-go-green-critics-are-skeptical/feed/ 0 373768
The Biden administration aims to make EV charging as easy as filling up https://grist.org/transportation/the-biden-administration-aims-to-make-ev-charging-as-easy-as-filling-up/ https://grist.org/transportation/the-biden-administration-aims-to-make-ev-charging-as-easy-as-filling-up/#respond Thu, 16 Feb 2023 11:30:00 +0000 https://grist.org/?p=601995 The Department of Transportation has announced standards aimed at addressing one of the greatest challenges in the transition to electric vehicles: the reliability and convenience of public charging stations.

The requirements, included in a robust set of EV charging initiatives the Biden Administration released Wednesday, are the first comprehensive guidelines to address charger installation, operation and maintenance. They will apply to all federally funded projects.

“This is a major step toward a world where every EV user will be able to find safe, reliable charging stations anywhere in the country,” U.S. Transportation Secretary Pete Buttigieg said in a statement. “Recharging an EV away from home will be as predictable and accessible as filling up a gas tank.”

The United States has about 160,000 charging stations. The Biden Administration wants to build a national network of 500,000 by 2030, part of its goal of seeing electric vehicles comprise half of all new car sales within the same time frame. Even that ambitious buildout may not be enough. S&P Global Mobility estimates the country will need more than two million public chargers within seven years to support the 28 million EVs it expects to see on the road by then.  

Building that infrastructure will require the participation of an array of vendors, manufacturers, and sites, each with its own approach to providing service. EV drivers often encounter public charging stations with varying payment requirements and interfaces. They vary in charging speed and often do not work at all. 

The new standards aim to eliminate these frustrations, which threaten the widespread adoption of EVs and present equity barriers for drivers who cannot install home chargers. They address payment methods, plug types, price transparency, station reliability, charging speeds, and more as the Biden Administration directs $7.5 billion toward the expansion of EV infrastructure. 

“The fact that this is being thought out now will hopefully prevent gaps in terms of access and equity before the ecosystem has been completed,” said Annalise Czerny, who helps design programs at Cal-ITP, a California initiative that addresses accessibility across transit. 

Standardizing payment methods across networks is particularly important for promoting equity, Czerny said. Vendors sometimes require downloading a proprietary app or depositing a minimum amount of money into an account to use a station. The new rules prohibit requiring memberships and make contactless payment options standard.

“If someone has put ten bucks into an app and doesn’t actually need it that week, it’s crazy that they can’t easily convert those dollars back to buy milk or baby formula,” said Czerny. “For folks who are living on the edge, being able to access money that is yours already is hugely important.”

The standards also set minimum requirements for charger reliability, a common sore spot for drivers. A 2022 study of 181 public stations in the Bay Area found that nearly a quarter of the connectors did not work.

“The mass market wants it to be a gas station experience where they pull up and plug in with a very simple user interface,” said Carleen Cullen, a co-author on the study and the co-founder and executive director of Cool The Earth. “We are far from that.” 

The guidelines announced Wednesday require EV charge stations built with federal funding to have an average annual uptime greater than 97 percent, a standard that Cullen said will hold the industry accountable for monitoring and maintaining their hardware and will improve EV equity. “People in multifamily housing and our low-income communities don’t have charging access at home,” she said. “They’ll be relying on these fast charging stations.”

This story was originally published by Grist with the headline The Biden administration aims to make EV charging as easy as filling up on Feb 16, 2023.


This content originally appeared on Grist and was authored by Gabriela Aoun Angueira.

]]>
https://grist.org/transportation/the-biden-administration-aims-to-make-ev-charging-as-easy-as-filling-up/feed/ 0 373108
Whistleblowers Take Note: Don’t Trust Cropping Tools https://www.radiofree.org/2023/02/14/whistleblowers-take-note-dont-trust-cropping-tools/ https://www.radiofree.org/2023/02/14/whistleblowers-take-note-dont-trust-cropping-tools/#respond Tue, 14 Feb 2023 12:00:59 +0000 https://theintercept.com/?p=421643

An iconic scene from the sci-fi comedy series “Red Dwarf” meant to parody the absurdist fetishization of image forensics — in which TV and movie characters are able to perform seemingly magical image enhancements — contains one crucial kernel of truth: It is, in fact, possible to uncrop images and documents across a variety of work-related computer apps. Among the suites that include the ability are Google Workspace, Microsoft Office, and Adobe Acrobat.

Being able to uncrop images and documents poses risks for sources who may be under the impression that cropped materials don’t contain the original uncropped content.

One of the hazards lies in the fact that, for some of the programs, downstream crop reversals are possible for viewers or readers of the document, not just the file’s creators or editors. Official instruction manuals, help pages, and promotional materials may mention that cropping is reversible, but this documentation at times fails to note that these operations are reversible by any viewers of a given image or document.

For instance, while Google’s help page mentions that a cropped image may be reset to its original form, the instructions are addressed to the document owner. “If you want to undo the changes you’ve made to your photo,” the help page says, “reset an image back to its original photo.” The page doesn’t specify that if a reader is viewing a Google Doc someone else created and wants to undo the changes the editor made to a photo, the reader, too, can reset the image without having edit permissions for the document.

For users with viewer-only access permissions, right-clicking on an image doesn’t yield the option to “reset image.” In this situation, however, all one has to do is right-click on the image, select copy, and then paste the image into a new Google Doc. Right-clicking the pasted image in the new document will allow the reader to select “reset image.” (I’ve put together an example to show how the crop reversal works in this case.)

An original uncropped image in a Google Doc can also be viewed by downloading a “web page (.html, zipped)” version of the document. The uncropped image will then be in the downloaded images folder.

Enterprising users have even written code that makes it easy to see uncropped images. On places like GitHub, they post scripts that can be loaded into web browsers to display uncropped images by default in any viewable Google Doc.

While Microsoft Office, like Google, allows for cropping images, the instructions take care to note that the full images might be preserved: “Cropped parts of the picture are not removed from the file, and can potentially be seen by others.” The instructions provide additional directions for deleting the cropped portions of the image in the apps.

Uncropped versions of images can be preserved not just in Office apps, but also in a file’s own metadata. A photograph taken with a modern digital camera contains all types of metadata. Many image files record text-based metadata such as the camera make and model or the GPS coordinates at which the image was captured. Some photos also include binary data such as a thumbnail version of the original photo that may persist in the file’s metadata even after the photo has been edited in an image editor.

Images and photos are not the only digital files susceptible to uncropping: Some digital documents may also be uncropped. While Adobe Acrobat has a page-cropping tool, the instructions point out that “information is merely hidden, not discarded.” By manually setting the margins to zero, it is possible to restore previously cropped areas in a PDF file.

The key takeaway for would-be whistleblowers, leakers, and journalists working with sensitive sources is to never trust the cropping functionality afforded by professional-level apps and other document and image manipulation software and services. It is always prudent to assume that a cropping operation is nondestructive — the original is maintained — or reversible.

Images and documents should be thoroughly stripped of metadata using tools such as ExifTool and Dangerzone. Additionally, sensitive materials should not be edited through online tools, as the potential always exists for original copies of the uploaded materials to be preserved and revealed.

When dealing with especially sensitive materials that require cropping, resorting to the tried-and-true analog method of using scissors may be the safest approach.


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/02/14/whistleblowers-take-note-dont-trust-cropping-tools/feed/ 0 372494
Tesla co-founder’s startup gets $2 billion to boost EV battery production https://grist.org/energy/tesla-co-founders-startup-gets-2-billion-to-boost-ev-battery-production/ https://grist.org/energy/tesla-co-founders-startup-gets-2-billion-to-boost-ev-battery-production/#respond Mon, 13 Feb 2023 11:15:00 +0000 https://grist.org/?p=601528 The Department of Energy has agreed to loan a Nevada startup $2 billion to support its production of critical battery materials, a staggering sum that illustrates the Biden Administration’s determination to domesticate the electric vehicle supply chain.

Redwood Materials will use the money for construction of the first factory in the nation to produce anode copper foil and cathode active materials, two essential components in EV batteries. The company, founded by former Tesla executive JB Straubel, says it will manufacture enough of them to support the production of 1 million electric vehicles per year by 2025. That would reduce the country’s gasoline consumption by more than 395 million gallons annually and cut carbon dioxide emissions by more than 3.5 million tons. It also would ease automakers’ reliance on battery components made overseas.

“It accomplishes the goals of less reliance on critical minerals from Asia, brings manufacturing and the supply chain to the US, and produces components for electric vehicles, which ultimately reduces greenhouse gas emissions,” Bob Marcum, chief operating officer of the DOE Loan Programs Office, told Grist on Friday. “It’s a very important project and something that we’re very excited about.”

The loan, which the Energy Department agreed to in a conditional commitment announced Thursday, will come from the Advanced Technology Vehicles Manufacturing Loan Program, which supports manufacturing projects that improve vehicle fuel efficiency. 

The Biden Administration wants electric vehicles to comprise half of all new car sales 2030. The essential components of electric vehicle batteries are produced almost exclusively in Asia. “We have some catching up to do,” Energy Secretary Jennifer Granholm said at an event at Redwood Materials’ Nevada facility on Thursday. “China has dominated every step of the supply chain.” That poses supply chain security risks, drives up the cost of batteries, and creates greenhouse gas emissions in transporting materials around the world.

“Once we realized how systemically important this technology had become to our entire transportation system and our grid, all eyes started sharpening on how to build independence,” said Nathan Iyer, senior associate at the clean energy nonprofit RMI. 

The Bipartisan Infrastructure Law, CHIPS & Science Act, and Inflation Reduction Act direct more than $135 billion to the country’s electric vehicle transition, including toward critical minerals sourcing and processing as well as battery manufacturing. 

“They targeted essentially every single part of the manufacturing process,” said Iyer. “What the US is doing is unique, strategic and aggressive.” 

Redwood Materials was founded in 2017 by JB Straubel, the co-founder and former CTO of Tesla. While working on Tesla’s massive battery Nevada Gigafactory, he realized the U.S. would soon confront a dire challenge sourcing the supplies needed to support the EV transition. “Even eight years ago, it was clear this would be a really big bottleneck for the entire industry as it scaled,” he said at the on Thursday. 

Redwood Materials will produce the two most important components of an electric vehicle battery: the anode, which contributes to the battery’s charging performance, and the cathode, which contains the battery’s critical metals. Together, they make up almost 80 percent of a battery’s cost. Domesticating their production not only provides a more secure supply stream for the materials, it lowers the cost of battery production, which can make electric vehicles more affordable for consumers.

Last month, Redwood Materials began producing anode copper foil at its Nevada facility, the first time the component has been commercially produced in the U.S. It expects to begin testing on its cathode products later this year. 

Once complete, the Nevada facility will employ about 1,600 full-time workers.

The company is bringing circularity to the battery supply chain. The metals in EV batteries are almost infinitely recyclable, and Redwood Materials has begun recycling electric them and collecting scrap from factories, lithium-ion batteries from e-bikes, consumer electronics and other sources for use in its anode and cathode components.

While there are not yet enough electric vehicle batteries in circulation to use materials exclusively from recycled sources, the infrastructure Redwood Materials is creating now could eventually support almost completely closed-loop battery manufacturing.

“They’re a little ahead of the recycled material inputs,” said Iyer, “but if they’re successful this will be the cornerstone of the circular economy.”

Eighty battery manufacturing or supply chain companies have announced that they are either reshoring or opening in the United States in the last two years, according to Secretary Granholm. “This is happening because there is now an industrial strategy to make this stuff in America,” she said. “China might be starting to worry.” 

This story was originally published by Grist with the headline Tesla co-founder’s startup gets $2 billion to boost EV battery production on Feb 13, 2023.


This content originally appeared on Grist and was authored by Gabriela Aoun Angueira.

]]>
https://grist.org/energy/tesla-co-founders-startup-gets-2-billion-to-boost-ev-battery-production/feed/ 0 372192
Destroying ‘forever chemicals’ is a technological race that could become a multibillion-dollar industry https://grist.org/technology/destroying-forever-chemicals-is-a-technological-race-that-could-become-a-multibillion-dollar-industry/ https://grist.org/technology/destroying-forever-chemicals-is-a-technological-race-that-could-become-a-multibillion-dollar-industry/#respond Sat, 11 Feb 2023 14:00:00 +0000 https://grist.org/?p=601387 This story is a product of the Mississippi River Basin Ag & Water Desk, an editorially independent reporting network based at the University of Missouri School of Journalism in partnership with Report For America and the Society of Environmental Journalists, funded by the Walton Family Foundation. 

How do you destroy pollution so stubborn, it’s nicknamed “forever chemicals”?

That’s a question researchers and companies across the country are eager to answer, as regulation tightens on PFAS, or per- and polyfluoroalkyl substances, and the chemicals’ producers face a mountain of lawsuits.

The chemicals are in fast-food wrappers, firefighting foams, nonstick cookware, and dental floss. They don’t break down readily in the environment, they easily flow with water, and research has linked them to health effects like immune and fertility problems and some cancers.

Getting rid of the harmful chemicals is “a multi-billion-dollar elephant in front of us,” said Corey Theriault, a technical expert focused on PFAS treatment at the engineering and consulting firm Arcadis.

PFAS have been destroyed via incineration, but there are questions about how thoroughly burning works, and the Defense Department halted the practice of burning these chemicals last year.

Everyone from municipal water providers to Fortune-100 companies have shown interest in the technologies, Theriault said. The U.S. Army Corps of Engineers is offering a contract to handle, destroy and replace fire-fighting foam that is rich in PFAS, worth some $800 million, according to the government’s solicitation document.

PFAS became so popular in consumer goods because of the durable carbon-fluorine bond that makes up the links in “short-chain” and “long-chain” versions of the chemicals. These bonds help repel stains, water and grease, and cut off oxygen to dangerous blazes.

But that chemical bond is also exceedingly hard to break.

Many methods being tested right now to eliminate PFAS have often been used in other chemical cleanups. Engineers are trying to burst the molecules in modified pressure cookers; split them with UV light and energized additives; rupture the PFAS chains with electricity, or strip apart atoms with cold plasma, a charged and reactive gas.

A set of gray pipes and a large metal water filter inside a white and blue container.
Minnesota is testing new PFAS destruction technology to pair with these high-tech PFAS water filters. Minnesota Pollution Control Agency

No technology is yet being deployed on a large scale, but Theriault said those furthest along in development could be ready in the next six to 18 months.

However, none of these technologies will directly treat a contaminated water source. First, the water would have to be filtered so that the PFAS ends up in a concentrate that is more cost-effective to treat, because there are more of the chemicals in each gallon. The state of Minnesota already uses a machine that sucks PFAS out of contaminated groundwater by repeatedly stirring the groundwater into a foam, where the chemicals tend to collect.

“The cost per volume of liquid to treat for these destructive approaches is much higher,” said Timothy Strathmann, a professor of civil and environmental engineering at the Colorado School of Mines. He is developing a destruction method called hydrothermal alkaline treatment or HALT, that he described as “a pressure cooker on steroids.”

The need for a concentrated chemical soup to experiment on has led at least a dozen companies to pitch their products to Minnesota, because the state is already creating it with its filtering machine, said Drew Tarara, a geologist and program manager with AECOM.

“It does feel like everybody’s trying to get their foot in the door,” Tarara said.

Minnesota is partnering with AECOM to investigate new PFAS technologies. The first six months of this pilot study cost $500,000, Minnesota Pollution Control Agency spokeswoman Andrea Cournoyer wrote in an email.

Minnesota will next use the De-Fluoro system, an electrochemical approach marketed by AECOM, to try to destroy the PFAS in its foamy concentrate.

The state faces a decades-long PFAS contamination problem in the eastern part of the Twin Cities where Maplewood-based 3M, one of the original PFAS developers and manufacturers, polluted groundwater with leaky landfills and disposal sites. Money from a lawsuit the state settled with 3M in 2018 is paying for the work being done today with AECOM.

3M recently announced it would stop using the chemicals in its products by 2025. But the challenge of cleaning up what’s already escaped into the environment remains.

The De-Fluoro unit is “still very much in field testing,” Tarara said. The unit will be tested at the Washington County landfill for up to six weeks, where it will process the state’s collected PFAS concentrate, but Tarara and state officials have been cautious in describing what the De-Fluoro may do. Rebecca Higgins, a senior hydrogeologist at MPCA, previously told the Star Tribune that De-Fluoro may only be able to snap long-chain PFAS into shorter segments rather than destroy them.

State officials have said before they want to test other technologies, too. Cournoyer wrote that any additional systems would be selected in accordance with the state’s procurement rules, and officials will also be searching scientific literature for reports on other technologies.

But the world of PFAS destruction is rife with proprietary methods and non-disclosure agreements, making it hard to assess what actually works. One notable exception is a study published in the journal Science last year, where researchers boiled the chemicals with two other compounds on low heat. But the method is still in lab testing.

Companies like Claros Technologies, a Minnesota-based startup, are mostly mum about who exactly owns the PFAS waste they’re experimenting on, because those partners may have legal liabilities. That makes it hard to validate the company’s stated results: 99.9% to 99.99% destruction of PFAS, when treated with UV light and an additive.

Parked on snowy ground, a blue trailer is open in the back, with two people climbing in through a yellow stepladder
The Minnesota Pollution Control Agency is testing out a new technology, inside this trailer, which could destroy harmful PFAS chemicals that have been removed from groundwater. Shari L. Gross, Star Tribune

Those tests for Claros aren’t being verified in peer-reviewed scientific journals either, because the process is proprietary.

John Brockgreitens, the director of research and development for Claros, said the company one day hopes to treat tens of thousands of gallons of liquid daily. But he admitted that it’s hard to answer detailed questions about the results of the company’s photochemical method.

“We talk to teams of scientists and they ask us the same thing,” he said. “Walking that line is a challenge.”

Theriault, who said his firm remains “agnostic” on what technologies it recommends to its clients, said Arcadis had partnered with Claros and that their method “has definitely shown its promise” to be useful in more applications than some other methods.

“There is no one technology that’s going to crush it across the board,” Theriault said.

But for the communities facing pollution, the technologies can’t come soon enough, because current waste handling methods aren’t containing the chemicals.

“Any landfill will fail, it doesn’t matter how they’re built,” said Rainer Lohmann, director of the University of Rhode Island’s STEEP lab and an authority on PFAS contamination.

Many landfills no longer accept waste that’s known to be contaminated with PFAS, sources said.

And until a regulator like the Environmental Protection Agency sets standards for how thoroughly PFAS need to be destroyed, there’s no official benchmark for the new technologies, Lohmann said.

“Does it destroy 95 percent? 99 percent? What do you do with the rest?” Lohmann said.

This story was originally published by Grist with the headline Destroying ‘forever chemicals’ is a technological race that could become a multibillion-dollar industry on Feb 11, 2023.


This content originally appeared on Grist and was authored by Chloe Johnson, Star Tribune.

]]>
https://grist.org/technology/destroying-forever-chemicals-is-a-technological-race-that-could-become-a-multibillion-dollar-industry/feed/ 0 371965
When AI Comes for the Journalists https://www.radiofree.org/2023/02/10/when-ai-comes-for-the-journalists/ https://www.radiofree.org/2023/02/10/when-ai-comes-for-the-journalists/#respond Fri, 10 Feb 2023 20:56:01 +0000 https://www.commondreams.org/opinion/chatgpt-ai-journalism-ethics

All at once, it seems, the many dire warnings about artificial intelligence are coalescing into reality. Earlier generations of automation came for vast swaths of America’s manufacturing and service sector jobs, but now AI is coming for the “creatives” — the white collar workers who always imagined themselves insulated from such humdrum threats. No industry is at greater immediate threat than journalism. But there is a way to get ahead of this menace now, before the algorithms eat us all alive.

ChatGPT, the OpenAI program that is able to spit out coherent (if not poetic) pieces of writing, was publicly released less than three months ago. But already, media companies are rushing to experiment with ways to use the program and similar technology to replace humans on the payroll. Buzzfeed saw their wilted stock price jump after they announced they would use ChatGPT to write quizzes and listicles. Men’s Journal is using AI to spit out articles that are rewrites of old material in its archives. And CNET was quietly using AI to write stories for months before saying in late January they would “pause” the operation, after a number of the articles were found to contain errors and plagiarism.

It’s safe to say that all of this is only the beginning. Currently available AI can write (crappy) stories, draw illustrations and even replicate your voice to read text. Google is set to roll out 20 separate AI products this year. The algorithms are growing more refined by the day. Everyone working on the editorial side of journalism — writers, artists and radio reporters alike — is now competing with a computer that can produce a simulacrum of our work, for less than it costs a company to pay us. The threat to many thousands of jobs is, potentially, existential.

Is this an urgent labor issue? Certainly. But the way for media workers and their unions to fight back may not be through picket lines. The basic premise here (“new technology decimates entire existing industry at breathtaking speed”) is a familiar one. It happened to matchbook salesmen and telegraph operators and assembly line workers, and there is nothing surprising about the possibility of it happening to journalists — except for our own healthy sense of self-regard. When these stories are passed down as conventional wisdom, they are usually framed as lessons about not falling behind the fast-moving modern world; the specter of the proverbial horse-and-buggy driver is a familiar cautionary tale in American culture. The distinct lack of sympathy for the left-behind workers is in the nature of these capitalist rules of wisdom. Those horse and buggy drivers should have become auto mechanics! And laid-off journalists should learn to code! Etcetera, etcetera.

We in the journalism industry have some slight advantages over many other fields of employment. We have strong and ubiquitous unions, and we have a widely accepted code of ethics that dictates how far standards can be pushed before something no longer counts as journalism. These are the primary tools we have in our looming fight with AI. Instead of pretending that we can hold back a tidal wave of technological change by arguing that it would be bad for us, we need to focus on the more salient fact that it could be apocalyptic for journalism itself.

It’s important to note here that, for the most part, there are no agreed upon or well-established rules around AI and the ethics of journalism. The technology just hasn’t existed long enough for those rules to have come about. We better hurry up with that, or it is guaranteed that a lot of bad things will be done in the absence of industry standards. Let me suggest one bedrock rule to start with: Journalism is the product of a human mind. If something did not come from a human mind, it is not journalism. Not because AI cannot spit out a convincing replica of the thing, but because journalism — unlike art or entertainment — requires accountability for it to be legitimate.

News outlets do not just publish stories. They can also, if necessary, explain exactly how a story came about and why. Why is this news? Who were the sources? How did you draw your conclusions? How did you ensure that conflicting points of view were presented fairly? How did you determine that the headline and the lede and the anecdotes and the quotes in the story were the appropriate ones to produce the fairest and most accurate and engaging story possible? Did you leave anything out that might have gone against your thesis? Is the story improperly slanted? These are not just aesthetic questions. They are questions that news outlets must be able to answer in order for us to all agree that their journalism is justified and ethical. It is taken for granted that real journalists can answer these questions, and can make a case for their answers in the event of conflict. And one thing that all of these fundamental questions have in common is that they cannot be coherently answered by appealing to AI.

Yes, AI can spit out a sentence in response to any of these questions. But does this constitute actual transparency? When you tell an AI program to write a story, can you definitively say whether it left anything out? Can you definitively describe the process that it used to reach its conclusions? Can you definitively vouch for the fact that it was fair and accurate, and that its work is not the flawed product of any number of latent biases? No, you cannot. You don’t actually know how the AI did what it did. You don’t know the process it used to produce its work. Nor can you accurately describe or assess that process. It’s very likely that many publications will rush to use AI to churn out low-cost content, and then have a human editor look it over before its published, and use that human glance as justification for its publication. But that process is an illusion — that human editor does not and cannot ever know how the AI produced the story that it produced. The technology is, effectively, a black box. And that makes it fatally flawed in our particular field.

Human journalists are flawed too. But we are accountable. That’s the difference. Institutions in journalism live on credibility, and that credibility is granted as a direct result of the accountability that accompanies every story. When stories have errors or biases or leave things out or misstate things or bend the truth, they can be credibly challenged, and credible institutions are obligated to be able to demonstrate how and why the story is how it is, and they are obligated to acknowledge and fix any deep flaws in their reporting and writing and publishing processes on an ongoing basis. If they don’t do that, they lose their credibility. When they lose that, they lose everything. This process of accountability is the foundation of journalism. Without it, you may be doing something, but you ain’t doing journalism.

You don’t have to convince me that the media is often lazy, stupid, sensationalistic, or full of clueless Ivy League hacks making stupendously ignorant pronouncements about the world. That is why there has arisen, over the past century, a body of journalism ethics that broadly aims to make the industry accountable, and therefore credible. Accountability requires a human mind that can answer all of these questions. Because AI can never truly be accountable for its work, its work is not journalism. Because of that, publishing such work is unethical. And because of that, we must, as an industry, collectively agree to standards that ensure no news outlets publish journalism that is produced directly by AI. The technology can be a tool to assist humans in news gathering, but it should never replace any humans in a newsroom.

We are entering an era of media that will be populated by swamps full of videos and audios and photos and pieces of writing that are all completely computer-generated and designed to mislead people. If you thought all the cries of “fake news” during the Trump era were bad, just wait. The public is about to have a very, very hard time distinguishing what is real from what is fake. It is more important than ever that credible news outlets exist, and remain credible. In order to do that, we need to hold the line against AI taking over the work of human journalists. We need to unify around the idea that such a thing is not ethical. If we don’t, you can bet that companies will move as fast as possible to save a dollar — and utterly destroy journalism along the way.


This content originally appeared on Common Dreams and was authored by Hamilton Nolan.

]]>
https://www.radiofree.org/2023/02/10/when-ai-comes-for-the-journalists/feed/ 0 372057
How Big Tech rewrote the nation’s first cell phone repair law https://grist.org/technology/right-to-repair-new-york-hochul-big-tech-lobbying-law/ https://grist.org/technology/right-to-repair-new-york-hochul-big-tech-lobbying-law/#respond Wed, 08 Feb 2023 11:45:00 +0000 https://grist.org/?p=601098 This article was copublished with The Markup, a nonprofit newsroom that investigates how powerful institutions are using technology to change our society. Sign up for its newsletters here.

New York state took a historic step toward curbing the power of Big Tech when lawmakers passed the Digital Fair Repair Act, giving citizens the right to fix their phones, tablets, and computers. For years, advocates for the “right to repair” have pushed for such legislation in statehouses nationwide. They argue that making it easier to repair gadgets not only saves consumers money, but also reduces the environmental impact of manufacturing and electronic waste. Most of those bills have failed amid intense opposition from tech companies that want to dictate how and where their products are serviced.

The passage of the Digital Fair Repair Act last June reportedly caught the tech industry off guard, but it had time to act before Governor Kathy Hochul would sign it into law. Corporate lobbyists went to work, pressing Albany for exemptions and changes that would water the bill down. They were largely successful: While the bill Hochul signed in late December remains a victory for the right-to-repair movement, the more corporate-friendly text gives consumers and independent repair shops less access to parts and tools than the original proposal called for. (The state Senate still has to vote to adopt the revised bill, but it’s widely expected to do so.)

New York State Governor Kathy Hochul waves during an election night event at at the Capitale in New York City on November 8, 2022.
Many of the changes that New York Governor Kathy Hochul made to the Digital Fair Repair Act before signing it are identical to those proposed by a tech trade association called TechNet. TIMOTHY A. CLARY/AFP via Getty Images

The new version of the law applies only to devices built after mid-2023, so it won’t help people to fix stuff they currently own. It also exempts electronics used exclusively by businesses or the government. All those devices are likely to become electronic waste faster than they would have had Hochul, a Democrat, signed a tougher bill. And more greenhouse gases will be emitted manufacturing new devices to replace broken electronics. 

Draft versions of the bill, letters, and email correspondences shared with Grist by the repair advocacy organization Repair.org reveal that many of the changes Hochul made to the Digital Fair Repair Act are identical to those proposed by TechNet, a trade association that includes Apple, Google, Samsung, and HP among its members. Jake Egloff, the legislative director for Democratic New York state assembly member and bill sponsor Patricia Fahy, confirmed the authenticity of the emails and bill drafts shared with Grist. 

“We had every environmental group walking supporting this bill,”  Fahy told Grist. “What hurt this bill is Big Tech was opposed to it.”

That New York passed any electronics right-to-repair bill is “huge,” Repair.org executive director Gay Gordon-Byrne told Grist. But “it could have been huger” if not for tech industry interference. 

Reached for comment, the governor’s office sent Grist a copy of a statement that Hochul released when she signed the bill, outlining changes made to the text. Her staff declined to address questions about the potential negative impacts of those changes, or about the process behind them. 

For years, consumer technology companies like Apple have effectively monopolized the repair of their devices by limiting access to parts, tools, and manuals to “authorized repair partners,” which often only perform a small number of manufacturer-sanctioned fixes. Those limited services often force consumers to choose between continuing to use a broken device or obtaining a brand-new one. The version of the Digital Fair Repair Act that passed New York’s Senate and Assembly last spring sought to level the playing field for independent shops by requiring that companies make parts, tools, and documents available to everyone on fair and reasonable terms.

A broad coalition of manufacturers opposed the bill in the spring, and its sponsors had to make significant compromises in order to pass it. “We made a lot of changes to get it over the finish line in the first day or two of June,” Fahy said. 

Assembly member Patricia Fahy speaks at Newlab Headquarters at Brooklyn Navy Yard.
New York Assembly Member Patricia Fahy thought focusing on small electronics in the Digital Fair Repair Act would give consumers “the biggest bang for their buck.” Lev Radin/Pacific Press/LightRocket via Getty Images

Those changes included explicit exclusions for everything from home appliances to police radios to farm equipment. Fahy says she was willing to omit those devices because she thought focusing on small electronics would give consumers “the biggest bang for their buck.” Data from the repair guide site iFixit shows that eight of the top 10 devices New Yorkers attempted to repair in 2020 were small consumer electronics, with cell phones and laptops topping the list.

The Digital Fair Repair Act passed the Assembly by a vote of 145 to 1, after clearing the Senate 59 to 4. Despite that overwhelming support, the tech industry was surprised by its passage, said Democratic state Senator Neil Breslin, who sponsored the bill. “There’s a number of people who were advocating on the parts of the [manufacturers] who really, in private chats, were not expecting it would be passed,” Breslin told Grist. 

At that point, the bill’s opponents approached Hochul seeking concessions. In particular, state lobbying records show TechNet held frequent meetings with the governor between June and December, when she signed the bill. Lobbyists representing Apple, Google, and Microsoft also met with the governor, state records show. 

All of these organizations have lobbied against right-to-repair bills in other states, often citing intellectual property and cybersecurity concerns. But some, most notably Microsoft, have softened their stance in recent years. Fahy said Microsoft “constantly tried to reach out” to her office to cooperate on the bill. In a letter sent to the governor in November, the company requested several edits but did not ask for a veto. (Microsoft, Google, and Apple declined to comment.)

In letters sent to Hochul in July and August, Apple, IBM and TechNet all asked the governor to veto the bill. (IBM also declined to comment.) When a veto didn’t immediately happen, TechNet sent Hochul a trimmed-down version with edits attributed to David Edmonson, the trade organization’s vice president of state policy and government relations. Among other things, TechNet requested that the law apply only to future products sold in the state, that it exclude products sold only through business-to-business or government contracts, and that it exclude printed circuit boards on the grounds that they could be used to counterfeit devices. It also sought a stipulation allowing manufacturers to offer consumers and independent fixers assemblies, such as a battery pre-assembled with other components, if selling individual parts could create a “safety risk.” Additionally, TechNet wanted a requirement that independent repair shops provide customers with a written notice of U.S. warranty laws before conducting repairs. 

Hochul’s office sent TechNet’s revised draft to repair advocates to get their reaction. Those advocates shared the TechNet-edited version of the bill with Fahy’s staff, which gave it to the Federal Trade Commission, or FTC, the agency charged with protecting American consumers. Documents that Repair.org shared with Grist show that FTC staff were highly critical of many of the changes. The parts assembly provision, one commission staffer wrote in response to TechNet’s edits, “could be easily abused by a manufacturer” to create a two-tiered system in which individual components like batteries are available only to authorized repair partners. Another of TechNet’s proposed changes — deleting a requirement that manufacturers give owners and independent shops the ability to reset security locks in order to conduct repairs — could result in a “hollow right to repair” in which security systems thwart people from fixing their stuff, the staffer wrote.

“These particular TechNet edits all have a common theme — ensuring that manufacturers retain control over the market for the repair of their products,” Dan Salsburg, a chief counsel for the FTC’s Office of Technology, Research and Investigation, wrote in an email to Fahy’s office.

Despite the agency’s stern warning, all of the changes described above, and numerous other edits TechNet proposed, appeared in the bill Hochul signed — many of them verbatim. 

The version of the Digital Fair Repair Act that passed the New York Legislature last spring defined “digital electronic equipment” broadly.
In the proposed edits that TechNet sent to Governor Kathy Hochul’s office, the industry group proposed excluding devices sold under business-to-business or government contracts from the definition of “digital electronic equipment.” Elsewhere, TechNet asked for the law to apply only to devices manufactured or sold after the law went into effect, instead of applying to devices that consumers already owned.
The version of the bill that Hochul signed in December adopted TechNet’s suggestions with minor rewordings.

Chris Gilrein, TechNet’s executive director for the Northeast, told Grist in an emailed statement that the bill the Legislature passed “presented unacceptable risks to consumer data privacy and safety,” and that his organization’s recommended changes “addressed the most egregious security issues.” Manufacturers often cite cybersecurity as a reason to restrict access to repair, an argument the FTC found “scant evidence” to support in a report to Congress published in 2021.

Gilrein disputed the notion that the final version of the bill favored the tech industry. “At its core, the law remains a state-mandated transfer of intellectual property that is unwarranted at a time when consumers have access to more repair options than ever before,” he said.

Todd Bone, the president of XS International, a company that maintains and repairs network and data center IT equipment for corporations and the federal government, says the law offers “nothing” to his business because of the governor’s carveout for devices sold under business-to-business or government contracts.

“It was very disheartening,” Bone told Grist, “to see the governor working with TechNet and not paying attention to the votes from the Congress and the Senate in the state of New York, [and] what the consumers of the state of New York wanted.”

Jessa Jones, who founded iPad Rehab, an independent repair shop in Honeoye Falls, about 20 miles south of Rochester, New York, says the original bill included provisions that would have made it far easier for independent shops like hers to get the tools, parts, and know-how needed to make repairs. She pointed to changes that allow manufacturers to release repair tools that only work with spare parts they make, while at the same time controlling how those spare parts are used, both of which were requested by TechNet.

“If you keep going down this road, allowing manufacturers to force us to use their branded parts and service, where they’re allowed to tie the function of the device to their branded parts and service, that’s not repair,” Jones said. “That’s authoritarian control.”

Dish employee Johnson Chuong takes apart an iPhone to fix a cracked screen in San Francisco, California, in 2016.
Last-minute changes to the Digital Fair Repair Act allow manufacturers to release repair tools that only work with spare parts they make, while at the same time controlling how those spare parts are used. Liz Hafalia/The San Francisco Chronicle via Getty Images

After repair advocates shared TechNet’s draft with Fahy’s office, they collaborated on a counterproposal that pushed back against many of the proposed changes. The last-minute negotiations with the governor’s office were “frustrating,” Fahy said, although she still ultimately wants to see the bill become law. 

Fahy hopes the New York Department of State will clarify aspects of the bill that got muddied by industry influence. The agency, which plays a role in consumer protection, will craft regulations dictating how the law will be implemented. Ultimately, Fahy says the bill will still help consumers save money and keep old devices out of landfills. And every little bit counts: In New York state alone, the U.S. Public Interest Research Group estimates that Americans discard roughly 23,600 cell phones per day.

Fahy also believes the law — imperfect though it may be — will have a ripple effect beyond the state’s borders. It could give momentum to the efforts to pass similar laws in dozens of other states. Eventually, the passage of state bills could lead to a national agreement between electronics manufacturers and the independent repair community, similar to what happened in the car industry after Massachusetts passed an auto right-to-repair law in 2012.

Other lawmakers agree that New York has provided a welcome starting point. 

“When you’re the first state, sometimes you have to pass something very small to get across the finish line,” Washington state representative Mia Gregerson, a Democrat who is sponsoring a digital right-to-repair bill in her state’s house, told Grist. New York’s Digital Fair Repair Act, Gregerson said, “gives us something to work from.”

“We’re going to take that now and try to do a better piece of legislation,” Gregerson said.

This story was originally published by Grist with the headline How Big Tech rewrote the nation’s first cell phone repair law on Feb 8, 2023.


This content originally appeared on Grist and was authored by Maddie Stone.

]]>
https://grist.org/technology/right-to-repair-new-york-hochul-big-tech-lobbying-law/feed/ 0 370794
New Report Unpacks Dangers of Emerging Military Tech, From AI Nukes to Killer Robots https://www.radiofree.org/2023/02/07/new-report-unpacks-dangers-of-emerging-military-tech-from-ai-nukes-to-killer-robots/ https://www.radiofree.org/2023/02/07/new-report-unpacks-dangers-of-emerging-military-tech-from-ai-nukes-to-killer-robots/#respond Tue, 07 Feb 2023 19:29:55 +0000 https://www.commondreams.org/news/new-military-technology

Emerging technologies including artificial intelligence, lethal autonomous weapons systems, and hypersonic missiles pose a potentially existential threat that underscores the imperative of arms control measures to slow the pace of weaponization, according to a new report published Tuesday.

The Arms Control Association report—entitled Assessing the Dangers: Emerging Military Technologies and Nuclear (In)Stability—"unpacks the concept of 'emerging technologies' and summarizes the debate over their utilization for military purposes and their impact on strategic stability."

The publication notes that the world's military powers "have sought to exploit advanced technologies—artificial intelligence, autonomy, cyber, and hypersonics, among others—to gain battlefield advantages" but warns too little has been said about the dangers these weapons represent.

"Some officials and analysts posit that such emerging technologies will revolutionize warfare, making obsolete the weapons and strategies of the past," the report states. "Yet, before the major powers move quickly ahead with the weaponization of these technologies, there is a great need for policymakers, defense officials, diplomats, journalists, educators, and members of the public to better understand the unintended and hazardous outcomes of these technologies."

Lethal autonomous weapons systems—defined by the Campaign to Stop Killer Robots as armaments that operate independent of "meaningful human control"—are being developed by nations including China, Israel, Russia, South Korea, the United Kingdom, and the United States. The U.S. Air Force's sci-fi-sounding Skyborg Autonomous Control System, currently under development, is, according to the report, "intended to control multiple drone aircraft simultaneously and allow them to operate in 'swarms,' coordinating their actions with one another with minimum oversight by human pilots."

"Although the rapid deployment of such systems appears highly desirable to many military officials, their development has generated considerable alarm among diplomats, human rights campaigners, arms control advocates, and others who fear that deploying fully autonomous weapons in battle would severely reduce human oversight of combat operations, possibly resulting in violations of international law, and could weaken barriers that restrain escalation from conventional to nuclear war," the report notes.

The latter half of the 20th century witnessed numerous nuclear close calls, many based on misinterpretations, limitations, or outright failures of technology. While technologies like artificial intelligence (AI) are often touted as immune to human fallibility, the research suggests that such claims and hubris could have deadly and unforeseen consequences.

"The major powers are rushing ahead with the weaponization of advanced technologies before they have fully considered—let alone attempted to mitigate—the consequences of doing so."

"An increased reliance on AI could lead to new types of catastrophic mistakes," a 2018 report by the Rand Corporation warned. "There may be pressure to use it before it is technologically mature; it may be susceptible to adversarial subversion; or adversaries may believe that the AI is more capable than it is, leading them to make catastrophic mistakes."

While the Pentagon in 2020 adopted five principles for what it calls the "ethical" use of AI, many ethicists argue the only safe course of action is a total ban on lethal autonomous weapons systems.

Hypersonic missiles, which can travel at speeds of Mach 5—five times the speed of sound—or faster, are now part of at least the U.S., Chinese, and Russian arsenals. Last year, Russian officials acknowledged deploying Kinzhal hypersonic missiles three times during the country's invasion of Ukraine in what is believed to be the first-ever use of such weapons in combat. In recent years, China has tested multiple hypersonic missile variants using specially designed high-altitude balloons. Countries including Australia, France, India, Japan, Germany, Iran, and North Korea are also developing hypersonic weapons.

The report also warns of the escalatory potential of cyberwarfare and automated battlefield decision-making.

"As was the case during World Wars I and II, the major powers are rushing ahead with the weaponization of advanced technologies before they have fully considered—let alone attempted to mitigate—the consequences of doing so, including the risk of significant civilian casualties and the accidental or inadvertent escalation of conflict," Michael Klare, a board member at the Arms Control Association and the report's lead author, said in a statement.

"While the media and the U.S. Congress have devoted much attention to the purported benefits of exploiting cutting-edge technologies for military use, far less has been said about the risks involved," he added.

The report asserts that bilateral and multilateral agreements between countries that "appreciate the escalatory risks posed by the weaponization of emerging technologies" are critical to minimizing those dangers.

"As an example of a useful first step, the leaders of the major nuclear powers could jointly pledge to eschew cyberattacks" against each other's command, control, communications, and information (C3I) systems, the report states. A code of conduct governing the military use of artificial intelligence based on the Pentagon's AI ethics principles is also recommended.

"If the major powers are prepared to discuss binding restrictions on the military use of destabilizing technologies, certain priorities take precedence," the paper argues. "The first would be an agreement or agreements prohibiting attacks on the nuclear C3I systems of another state by cyberspace means or via missile strikes, especially hypersonic strikes."

"Another top priority would be measures aimed at preventing swarm attacks by autonomous weapons on another state's missile submarines, mobile ICBMs, and other second-strike retaliatory systems," the report continues, referring to intercontinental ballistic missiles. "Strict limitations should be imposed on the use of automated decision-support systems with the capacity to inform or initiate major battlefield decisions, including a requirement that humans exercise ultimate control over such devices."

"Without the adoption of measures such as these, cutting-edge technologies will be converted into military systems at an ever-increasing tempo, and the dangers to world security will grow apace," the publication concluded. "A more thorough understanding of the distinctive threats to strategic stability posed by these technologies and the imposition of restraints on their military use would go a long way toward reducing the risks of Armageddon."


This content originally appeared on Common Dreams and was authored by Brett Wilkins.

]]>
https://www.radiofree.org/2023/02/07/new-report-unpacks-dangers-of-emerging-military-tech-from-ai-nukes-to-killer-robots/feed/ 0 370593
New Report Unpacks Dangers of Emerging Military Tech, From AI Nukes to Killer Robots https://www.radiofree.org/2023/02/07/new-report-unpacks-dangers-of-emerging-military-tech-from-ai-nukes-to-killer-robots-2/ https://www.radiofree.org/2023/02/07/new-report-unpacks-dangers-of-emerging-military-tech-from-ai-nukes-to-killer-robots-2/#respond Tue, 07 Feb 2023 19:29:55 +0000 https://www.commondreams.org/news/new-military-technology

Emerging technologies including artificial intelligence, lethal autonomous weapons systems, and hypersonic missiles pose a potentially existential threat that underscores the imperative of arms control measures to slow the pace of weaponization, according to a new report published Tuesday.

The Arms Control Association report—entitled Assessing the Dangers: Emerging Military Technologies and Nuclear (In)Stability—"unpacks the concept of 'emerging technologies' and summarizes the debate over their utilization for military purposes and their impact on strategic stability."

The publication notes that the world's military powers "have sought to exploit advanced technologies—artificial intelligence, autonomy, cyber, and hypersonics, among others—to gain battlefield advantages" but warns too little has been said about the dangers these weapons represent.

"Some officials and analysts posit that such emerging technologies will revolutionize warfare, making obsolete the weapons and strategies of the past," the report states. "Yet, before the major powers move quickly ahead with the weaponization of these technologies, there is a great need for policymakers, defense officials, diplomats, journalists, educators, and members of the public to better understand the unintended and hazardous outcomes of these technologies."

Lethal autonomous weapons systems—defined by the Campaign to Stop Killer Robots as armaments that operate independent of "meaningful human control"—are being developed by nations including China, Israel, Russia, South Korea, the United Kingdom, and the United States. The U.S. Air Force's sci-fi-sounding Skyborg Autonomous Control System, currently under development, is, according to the report, "intended to control multiple drone aircraft simultaneously and allow them to operate in 'swarms,' coordinating their actions with one another with minimum oversight by human pilots."

"Although the rapid deployment of such systems appears highly desirable to many military officials, their development has generated considerable alarm among diplomats, human rights campaigners, arms control advocates, and others who fear that deploying fully autonomous weapons in battle would severely reduce human oversight of combat operations, possibly resulting in violations of international law, and could weaken barriers that restrain escalation from conventional to nuclear war," the report notes.

The latter half of the 20th century witnessed numerous nuclear close calls, many based on misinterpretations, limitations, or outright failures of technology. While technologies like artificial intelligence (AI) are often touted as immune to human fallibility, the research suggests that such claims and hubris could have deadly and unforeseen consequences.

"The major powers are rushing ahead with the weaponization of advanced technologies before they have fully considered—let alone attempted to mitigate—the consequences of doing so."

"An increased reliance on AI could lead to new types of catastrophic mistakes," a 2018 report by the Rand Corporation warned. "There may be pressure to use it before it is technologically mature; it may be susceptible to adversarial subversion; or adversaries may believe that the AI is more capable than it is, leading them to make catastrophic mistakes."

While the Pentagon in 2020 adopted five principles for what it calls the "ethical" use of AI, many ethicists argue the only safe course of action is a total ban on lethal autonomous weapons systems.

Hypersonic missiles, which can travel at speeds of Mach 5—five times the speed of sound—or faster, are now part of at least the U.S., Chinese, and Russian arsenals. Last year, Russian officials acknowledged deploying Kinzhal hypersonic missiles three times during the country's invasion of Ukraine in what is believed to be the first-ever use of such weapons in combat. In recent years, China has tested multiple hypersonic missile variants using specially designed high-altitude balloons. Countries including Australia, France, India, Japan, Germany, Iran, and North Korea are also developing hypersonic weapons.

The report also warns of the escalatory potential of cyberwarfare and automated battlefield decision-making.

"As was the case during World Wars I and II, the major powers are rushing ahead with the weaponization of advanced technologies before they have fully considered—let alone attempted to mitigate—the consequences of doing so, including the risk of significant civilian casualties and the accidental or inadvertent escalation of conflict," Michael Klare, a board member at the Arms Control Association and the report's lead author, said in a statement.

"While the media and the U.S. Congress have devoted much attention to the purported benefits of exploiting cutting-edge technologies for military use, far less has been said about the risks involved," he added.

The report asserts that bilateral and multilateral agreements between countries that "appreciate the escalatory risks posed by the weaponization of emerging technologies" are critical to minimizing those dangers.

"As an example of a useful first step, the leaders of the major nuclear powers could jointly pledge to eschew cyberattacks" against each other's command, control, communications, and information (C3I) systems, the report states. A code of conduct governing the military use of artificial intelligence based on the Pentagon's AI ethics principles is also recommended.

"If the major powers are prepared to discuss binding restrictions on the military use of destabilizing technologies, certain priorities take precedence," the paper argues. "The first would be an agreement or agreements prohibiting attacks on the nuclear C3I systems of another state by cyberspace means or via missile strikes, especially hypersonic strikes."

"Another top priority would be measures aimed at preventing swarm attacks by autonomous weapons on another state's missile submarines, mobile ICBMs, and other second-strike retaliatory systems," the report continues, referring to intercontinental ballistic missiles. "Strict limitations should be imposed on the use of automated decision-support systems with the capacity to inform or initiate major battlefield decisions, including a requirement that humans exercise ultimate control over such devices."

"Without the adoption of measures such as these, cutting-edge technologies will be converted into military systems at an ever-increasing tempo, and the dangers to world security will grow apace," the publication concluded. "A more thorough understanding of the distinctive threats to strategic stability posed by these technologies and the imposition of restraints on their military use would go a long way toward reducing the risks of Armageddon."


This content originally appeared on Common Dreams and was authored by Brett Wilkins.

]]>
https://www.radiofree.org/2023/02/07/new-report-unpacks-dangers-of-emerging-military-tech-from-ai-nukes-to-killer-robots-2/feed/ 0 370594
AI and ChatGPT: Yet Another Assault on Democratic Governance? https://www.radiofree.org/2023/02/03/ai-and-chatgpt-yet-another-assault-on-democratic-governance/ https://www.radiofree.org/2023/02/03/ai-and-chatgpt-yet-another-assault-on-democratic-governance/#respond Fri, 03 Feb 2023 15:16:21 +0000 https://www.commondreams.org/opinion/ai-chatgpt-technology-and-democracy

ChatGPT has become an overnight sensation wowing those who have tried it with an astonishing ability to churn out polished prose and answer complex questions. This generative AI platform has even passed an MBA test at the University of Pennsylvania’s Wharton School of Business and several other graduate-level exams. On one level, we have to admire humankind’s astonishing ability to invent and perfect such a device. But the deeper social and economic implications of ChatGPT and of other AI systems under rapid development are just beginning to be understood including their very real impacts on white-collar workers in the fields of education, law, criminal justice, and politics.

The use of AI systems in the political sphere raises some serious red flags. A Massachusetts Democrat in the U.S. House of Representatives, Jake Auchincloss, wasted no time using this untested and still poorly understood technology to deliver a speech on a bill supporting creation of a new artificial intelligence center. While points for cleverness are in order, the brief speech read by the Auchincloss on the floor of the U.S. House was actually written by ChatGPT. According to his staff, it was the first time that an AI-generated speech was made in Congress. Okay, we can look the other way on this one because Auchincloss was doing a little grandstanding and trying to prove a point. But what about Rep. Ted Lieu (D-Calif.) who used AI to write a bill to regulate AI and who now says he wants Congress to pass it?

The use of AI systems in the political sphere raises some serious red flags.

Not to go too deep into the sociological or philosophical weeds, but our current political nightmare is being played out in the midst of a postmodern epistemological crisis. We’ve gone from the rise of an Information Age to a somewhat darker place: a misinformation age where a high degree of political polarization now encourages us to reflexively question the veracity and accuracy of events and ideas on “the other side.” We increasingly argue less about ideas themselves than who said them and in what context. It’s well-known that the worst kind of argument is one where the two parties can’t even agree on the basic facts of a situation, and this is where we are today in our political theater.

Donald Trump introduced the notion of fake news, his “gift” to the electorate. We now question anything and everything that happens, with deep distrust in the mainstream media also contributing heavily to this habit of mind. This sets the stage for a new kind of political turmoil in which polarization threatens to gridlock and erode democracy even more. In this context, Hannah Arendt, an important political thinker about how democracies become less democratic, noted that: “The ideal subject of totalitarian rule is not the convinced Nazi or the convinced Communist, but people for whom the distinction between fact and fiction and the distinction between true and false no longer exist.”

David Bromwich—writing recently in The Nation—noted that Arendt believed there was “a totalitarian germ in the Western liberal political order.” Arendt is warning us and we should pay attention. The confusion and gridlock we experience today may give way to something even worse if we’re not vigilant. This is because the human mind seeks clarity and can only tolerate so much ambiguity. Authoritarian aspects of government that seek end runs around democratic norms offer a specious solution to this.

Generative AI and Democracy

Into this heady mix of confusion, delusion, and bitter argument in U.S. politics, we now have a sophisticated AI system that’s capable of churning out massive amounts of content. This content could be in the form of text, images, photos, videos, documentaries, speeches, or just about anything that might cross our computer screens.

Let’s consider what this means. An organization could conceivably use ChatGPT or Google Deep Mind as a core informational interface to the Internet and all of the various platforms available on it. For example, a political organization could use AI to churn out tweets, press releases, speeches, position papers, clever slogans, and all manner of other content. Worse, when this device becomes an actual product available to corporations and government agencies or entities (such as political campaigns for example), organizations that can afford the price can purchase versions intended for private use that are far more powerful than the free model now available. (As with other services that exist in the Internet model, the free offering is just there to get us hooked.)

Imagine a world where large amounts of what you see and hear are shaped by these systems. Imagine AI systems starting to compete with each other using their ability to entice and manipulate public opinion. And let’s keep in mind that it was Elon Musk who started and still financially supports OpenAI, the company that built ChatGPT. This, of course, is the same Elon Musk who owns a company called Neuralink chartered with exploring how we can hook ourselves into computers with brain implants. Lest you think that’s an idea only intended for special medical purposes, this has now become “a thing.” At this year’s Davos event in January, a gathering of the most powerful people on the planet, Klaus Schwab was caught on video gushing about how wonderful it will be when we all have brain implants.

Congress Must Act, But Will It?

What can be done about these possible additional threats to our already faltering democracy? Will our dysfunctional Congress “get it” and take action? I had some experiences years ago that woke me up to the lack of technological expertise in Congress while serving as a consultant to the Congressional Office of Technology Assessment, attending White House events, and meeting with a Senator who headed up the House Telecommunications Subcommittee. Although this was several decades ago, I have no reason to believe that much has changed. Last year’s Facebook hearings with Mark Zuckerberg on the hot seat showed further evidence of how many in Congress don’t fully understand today’s technology advances, how they’re monetized, or how they impact us culturally and politically.

Technology and politics are now conjoined and are moving under the radar of the media and many legislators. Democracy is morphing with more technocratic systems of governance moving forward that lack full oversight and a clear understanding of their social and political impacts. Newer and still poorly understood hyper-technologies are also giving powerful corporations yet another way to creep into and influence the political landscape. The worst case scenario, of course, is full-on technocracy in which we hand over certain key operations of government decision-making to these untried and unproven systems.

This has already happened to a limited extent in criminal justice cases involving AI, evoking the dystopian movie Minority Report. A 2019 article in MIT’s Technology Review pointed out that use of AI and automated tools by police departments in some cases resulted in erroneous convictions and even imprisonment. Perhaps greater public awareness of AI systems and the threat they pose to democracy will precipitate a long overdue reckoning and reconsideration of these issues with our elected officials. Let’s hope so.


This content originally appeared on Common Dreams and was authored by Tom Valovic.

]]>
https://www.radiofree.org/2023/02/03/ai-and-chatgpt-yet-another-assault-on-democratic-governance/feed/ 0 369624
Kayt Davies: AI will take media jobs but will free up time for fun stuff https://www.radiofree.org/2023/02/03/kayt-davies-ai-will-take-media-jobs-but-will-free-up-time-for-fun-stuff/ https://www.radiofree.org/2023/02/03/kayt-davies-ai-will-take-media-jobs-but-will-free-up-time-for-fun-stuff/#respond Fri, 03 Feb 2023 05:44:58 +0000 https://asiapacificreport.nz/?p=84022 COMMENTARY: By Kayt Davies in Perth

I wasn’t good at French in my final year of high school. My classmates had five years of language studies behind them. I had three.

As a result of my woeful grip on the language, I wrote a terribly bad essay in my final French exam.

The more I read of ChatGPT’s output, the more I am reminded of my final French essay. I could not express the complex ideas I wrote in my English essays, so instead, I repeated the question a lot and clumped together words and phrases that sounded like they kind of went together. There was no logical thread, no cogent argument.

It was a bit like the perplexing, digressive, buzzword-rich oratory stylings of Donald Trump.

I have been a university lecturer, tutor and marker for coming on two decades now and late last year a student submitted an essay that I sent off to the university integrity team, explaining that it was “bad in a new and different way”.

According to Turnitin (our detection software), it wasn’t plagiarised. It didn’t read like it had been written in another language and run through Google Translate. The grammar was impeccable but there were glaring non-sequiturs and it danced around the question, which it repeated several times, but didn’t actually answer.

I didn’t hear back from the integrity people. They probably didn’t know what to do about it and may have been busy, as it was the end of the teaching year. I had also said it wasn’t urgent, as it had failed against my marking key, meaning the student, whose marks had been poor all along, would have to repeat the unit anyway.

New teaching year
A couple of weeks later ChatGPT was made available to the public, joining the dozen or so other AI writers available to people who want AI to string together their sentences.

Journalism lecturer Dr Kayt Davies
Journalism lecturer Dr Kayt Davies . . . graduates will need to be focused on things only humans can do to make the world a better place. Image: Kayt Davies/Curtin University

Now, heading back into a new teaching year, having spent the summer chatting with ChatGPT, I am in conversations with my colleagues about how we should proceed. I teach journalism and my colleagues are from a range of arts and communications disciplines.

Collectively our feelings are mixed, but I’m looking forward to letting my students know about this leap forward in communications technology.

I plan to explain it in the context of the other leaps and lurches I’ve lived through.

This won’t be the first to make swathes of workers redundant. I remember the angst in my industry about digital typesetting usurping the compositors and typesetters, replacing vast numbers of them with far fewer graphic designers.

ChatGPT will undoubtedly take some jobs, but it’s the donkey work of the writing professions. It frees us up to do the innovative fun stuff. Also, while ChatGPT is big and shiny, we’ve known that AI writing is on its way for a long time.

In 2018, Noam Lemelshtrich Latar summed up the progress in our field to date in his book Robot Journalism: Can human journalism survive? He documented the many workplaces already using AI writing software and concluded that there was still work to be done. There still is.

Essay capacity underwhelming
Much of the media racket over ChatGPT this summer has been about its capacity to write essays, and so I have read several essays it has written, and I can happily report that I am underwhelmed by them, but also fascinated by the challenge we face in getting better at describing the ways in which they are bad.

This task is part of the mission humanity more broadly is facing in figuring out what it is that people can do that robots can’t. If robots/AI writers are going to do the donkey-work writing in workplaces, that is not something we need to be training graduates to do.

Graduates need to be able to do things an AI language model can’t, and they need to be able to articulate their skill sets.

So, I will be generating AI content in my classrooms and we are going to set to work pulling it apart, in search of its failings and foibles. We’ll do this together and learn about it and ourselves as we go.

Another big theme in the media hype has been ChatGPT’s ability to “do the marking for us”. This, in my opinion, is rubbish. Sure, you can copy-and-paste some text into ChatGPT and ask it for a comment and a grade, but every university I know of demands more of the markers than a simple comment and grade.

If only it was that simple. But, no. We have to describe the specific criteria every piece of work will be assessed against, and the expectations ascribed to each criterion that will result in the award of a specific number of marks. This forms a table called a rubric, which is embedded in our unit websites and getting the assignments and rubrics out of that software and into ChatGPT would take longer than the tight time allocation we get to mark each piece.

Besides the software we mark in is already replete with time-saving tricks, like a record function so you can speak rather than type feedback and the ability to save commonly used comments.

‘Getting to know students’
In addition, failing to read the assignments would inhibit the “getting to know your students” process that marking their work facilitates, and so I imagine it to be the sort of drain-circling behaviour used by failing teachers on their way out of the profession — as student assessment of teachers who cheat in their marking is going to be on par with teacher assessment of students who cheat in their assessments.

Cheating is a key word here. While ChatGPT is new, universities have longstanding policies and charters that use words like “honesty and fairness” in relation to academic integrity. These are being underscored and highlighted in preparation for the start of semester and hyperlinked to paragraphs about AI writing.

Honest use of ChatGPT will involve disclosure about how it was used, and what measures have been taken to verify its content and iron out its wrinkles. It then joins the swath of online tools we encourage our students to use to prepare them for the professions they’ll enter when they graduate.

For my first year students these will be professions that have adjusted to the existence of AI language models, and so their new graduate brilliance will need to be focused on things only humans can do to make the world a better place. This is how I’m going to frame it in my classes, when our next semester starts.

Dr Kayt Davies is a lecturer in journalism at Curtin University. She is a contributor to Pacific Journalism Review. The article was first published in The West Australian and is published by Asia Pacific Report with the author’s permission.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2023/02/03/kayt-davies-ai-will-take-media-jobs-but-will-free-up-time-for-fun-stuff/feed/ 0 369554
Kayt Davies: AI will take media jobs but will free up time for fun stuff https://www.radiofree.org/2023/02/03/kayt-davies-ai-will-take-media-jobs-but-will-free-up-time-for-fun-stuff/ https://www.radiofree.org/2023/02/03/kayt-davies-ai-will-take-media-jobs-but-will-free-up-time-for-fun-stuff/#respond Fri, 03 Feb 2023 05:44:58 +0000 https://asiapacificreport.nz/?p=84022 COMMENTARY: By Kayt Davies in Perth

I wasn’t good at French in my final year of high school. My classmates had five years of language studies behind them. I had three.

As a result of my woeful grip on the language, I wrote a terribly bad essay in my final French exam.

The more I read of ChatGPT’s output, the more I am reminded of my final French essay. I could not express the complex ideas I wrote in my English essays, so instead, I repeated the question a lot and clumped together words and phrases that sounded like they kind of went together. There was no logical thread, no cogent argument.

It was a bit like the perplexing, digressive, buzzword-rich oratory stylings of Donald Trump.

I have been a university lecturer, tutor and marker for coming on two decades now and late last year a student submitted an essay that I sent off to the university integrity team, explaining that it was “bad in a new and different way”.

According to Turnitin (our detection software), it wasn’t plagiarised. It didn’t read like it had been written in another language and run through Google Translate. The grammar was impeccable but there were glaring non-sequiturs and it danced around the question, which it repeated several times, but didn’t actually answer.

I didn’t hear back from the integrity people. They probably didn’t know what to do about it and may have been busy, as it was the end of the teaching year. I had also said it wasn’t urgent, as it had failed against my marking key, meaning the student, whose marks had been poor all along, would have to repeat the unit anyway.

New teaching year
A couple of weeks later ChatGPT was made available to the public, joining the dozen or so other AI writers available to people who want AI to string together their sentences.

Journalism lecturer Dr Kayt Davies
Journalism lecturer Dr Kayt Davies . . . graduates will need to be focused on things only humans can do to make the world a better place. Image: Kayt Davies/Curtin University

Now, heading back into a new teaching year, having spent the summer chatting with ChatGPT, I am in conversations with my colleagues about how we should proceed. I teach journalism and my colleagues are from a range of arts and communications disciplines.

Collectively our feelings are mixed, but I’m looking forward to letting my students know about this leap forward in communications technology.

I plan to explain it in the context of the other leaps and lurches I’ve lived through.

This won’t be the first to make swathes of workers redundant. I remember the angst in my industry about digital typesetting usurping the compositors and typesetters, replacing vast numbers of them with far fewer graphic designers.

ChatGPT will undoubtedly take some jobs, but it’s the donkey work of the writing professions. It frees us up to do the innovative fun stuff. Also, while ChatGPT is big and shiny, we’ve known that AI writing is on its way for a long time.

In 2018, Noam Lemelshtrich Latar summed up the progress in our field to date in his book Robot Journalism: Can human journalism survive? He documented the many workplaces already using AI writing software and concluded that there was still work to be done. There still is.

Essay capacity underwhelming
Much of the media racket over ChatGPT this summer has been about its capacity to write essays, and so I have read several essays it has written, and I can happily report that I am underwhelmed by them, but also fascinated by the challenge we face in getting better at describing the ways in which they are bad.

This task is part of the mission humanity more broadly is facing in figuring out what it is that people can do that robots can’t. If robots/AI writers are going to do the donkey-work writing in workplaces, that is not something we need to be training graduates to do.

Graduates need to be able to do things an AI language model can’t, and they need to be able to articulate their skill sets.

So, I will be generating AI content in my classrooms and we are going to set to work pulling it apart, in search of its failings and foibles. We’ll do this together and learn about it and ourselves as we go.

Another big theme in the media hype has been ChatGPT’s ability to “do the marking for us”. This, in my opinion, is rubbish. Sure, you can copy-and-paste some text into ChatGPT and ask it for a comment and a grade, but every university I know of demands more of the markers than a simple comment and grade.

If only it was that simple. But, no. We have to describe the specific criteria every piece of work will be assessed against, and the expectations ascribed to each criterion that will result in the award of a specific number of marks. This forms a table called a rubric, which is embedded in our unit websites and getting the assignments and rubrics out of that software and into ChatGPT would take longer than the tight time allocation we get to mark each piece.

Besides the software we mark in is already replete with time-saving tricks, like a record function so you can speak rather than type feedback and the ability to save commonly used comments.

‘Getting to know students’
In addition, failing to read the assignments would inhibit the “getting to know your students” process that marking their work facilitates, and so I imagine it to be the sort of drain-circling behaviour used by failing teachers on their way out of the profession — as student assessment of teachers who cheat in their marking is going to be on par with teacher assessment of students who cheat in their assessments.

Cheating is a key word here. While ChatGPT is new, universities have longstanding policies and charters that use words like “honesty and fairness” in relation to academic integrity. These are being underscored and highlighted in preparation for the start of semester and hyperlinked to paragraphs about AI writing.

Honest use of ChatGPT will involve disclosure about how it was used, and what measures have been taken to verify its content and iron out its wrinkles. It then joins the swath of online tools we encourage our students to use to prepare them for the professions they’ll enter when they graduate.

For my first year students these will be professions that have adjusted to the existence of AI language models, and so their new graduate brilliance will need to be focused on things only humans can do to make the world a better place. This is how I’m going to frame it in my classes, when our next semester starts.

Dr Kayt Davies is a lecturer in journalism at Curtin University. She is a contributor to Pacific Journalism Review. The article was first published in The West Australian and is published by Asia Pacific Report with the author’s permission.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2023/02/03/kayt-davies-ai-will-take-media-jobs-but-will-free-up-time-for-fun-stuff/feed/ 0 369555
New FTX Filing Pulls Back the Curtain on Sam Bankman-Fried’s Massive Influence Peddling Operation https://www.radiofree.org/2023/01/30/new-ftx-filing-pulls-back-the-curtain-on-sam-bankman-frieds-massive-influence-peddling-operation/ https://www.radiofree.org/2023/01/30/new-ftx-filing-pulls-back-the-curtain-on-sam-bankman-frieds-massive-influence-peddling-operation/#respond Mon, 30 Jan 2023 22:19:54 +0000 https://theintercept.com/?p=420559

A filing in FTX’s bankruptcy proceedings is shedding light on the true extent of the crypto-trading powerhouse’s influence peddling operation. Last week, FTX filed its creditor matrix, a document that lists former vendors and investors to the company.

The list includes nearly a dozen public relations experts — specialists who generate positive spin in the media on behalf of clients — as well as political consultants, think tanks, and trade groups.

Sometimes, the money went directly to political operations; Majority Forward, a dark-money group designed to elect Senate Democrats, received cash. In some cases, the hired guns, such as PR firms, were paid directly for their services. In others, the groups that received donations maintain that they are independent, but had interests aligned with FTX.

The filing, for instance, listed a donation to the Center for a New American Security, a prominent national security-focused think tank in Washington, D.C., that has worked to shape crypto regulations.

The filing offered a look under the hood of FTX’s intricate maze of influence. On the heels of its meteoric rise as a crypto exchange, FTX quickly began to spend extraordinary amounts of money to buy prestige and friends in high places. Now that the firm stands accused of siphoning off billions of its investors’ dollars — with its disgraced founder Sam Bankman-Fried charged with fraud in the matter — increased scrutiny is falling on powerbrokers’ dealings with FTX.

The relationships of many of the entities listed in the bankruptcy filing and FTX were already known — the company complied with lobbying disclosures for some of its consultants — but the creditor matrix shows the crypto giant also retained several previously undisclosed professional influence peddlers.

One seasoned political hand tied to FTX without any disclosures is former New York City Council Speaker Corey Johnson. His firm, Cojo Strategies, is featured in the FTX vendor list. Another is Susan McCue, a former aide to Sen. Harry Reid, D-Nev., who has advised many Senate Democrats and played a role in the leadership of several Democratic super PACs and dark-money outfits. Her firm, Message Global, is in the filing.

Other consulting firms with a finger on the pulse of power are sprawled through the creditor matrix, which runs over 116 pages. Another creditor, Patomak Global Partners, a firm that specializes in influencing financial regulators, is led by Paul Atkins, a former Securities and Exchange commissioner. Atkins’s company touts its roster of former government officials as providing “a telescope to anticipate trends on the horizon to help position our clients for long-term success.” (Neither Johnson, McCue, nor Patomak responded to requests for comment.)

Think Tank Crypto Regulations

The donation to CNAS — a powerful think tank with ties to both political parties but known for staffing national security roles in Democratic administrations — came at a time when the organization advocated for crypto regulations with a light touch.

“To compete in the digital-economy race with China, the United States must foster a more innovative fintech environment,” CNAS fellow Yaya J. Fanusie said in testimony to the Senate Finance Committee on July 14, 2021. “If U.S. securities regulation does not evolve to account for the new technical and entrepreneurial capabilities offered by blockchain technology and broadcast data transmission, the United States could be hamstrung in a data revolution that is only just beginning.”

CNAS also maintains a task force on crypto, on which FTX formerly served as a member. The task force corresponded with national security-focused government officials, offering policy advice that reflected the crypto industry’s contention that digital tokens on the blockchain pose a low risk for terror financing.

A readout of a CNAS meeting with the Treasury Department’s Brian Nelson, the undersecretary for terrorism and financial intelligence, included a summary of the discussion and noted that the official “recognized the work of many in industry to engage in constructive dialogue and support government efforts to mitigate the misuse of virtual assets for money laundering.” The use of crypto for “illicit activities remains below the scale of traditional finance,” Nelson said.

CNAS’s task force is co-chaired by Sigal Mandelker, who used to hold Nelson’s position at the Treasury before resigning in 2019 to enter the private sector. Mandelker now serves as general partner of Ribbit Capital, an investor in FTX. Mandelker spoke at SALT’s Crypto Bahamas conference last summer. The invite-only conference for “leading players in the crypto and traditional finance industry” also featured talks from Bankman-Fried, former President Bill Clinton, and ex-British Prime Minister Tony Blair.

Mandelker’s talk at Crypto Bahamas was on maintaining permissive crypto regulations.

“The instinct of government is often to focus on risk and not to put as much emphasis on opportunity,” she said. The true risk regulators should be wary of, Mandelker continued, was “shutting down [crypto] innovation.” (Mandelker did not respond to a request for comment.)

“CNAS received a $25,000 donation from FTX in 2022 in general support of CNAS’s independent research on national security,” Shai Korman, CNAS’s director of communications, told The Intercept. “FTX was also a member of the Task Force on Fintech, Crypto, and National Security. FTX is no longer a member of the task force, and CNAS has returned the donation in full.”

PR, Law Firms, and Video Games

FTX once enjoyed a near-mythical status in the media, with splashy cover stories and gushing news articles lauding the crypto powerhouse and Bankman-Fried, its youthful leader. Such coverage rarely emerges organically, and FTX hired an army of public relations firms to burnish its image.

Among them was M Group, a New York-based public relations powerhouse known for its Rolodex of elite journalists. Others under the employ of FTX included TSD Communications and Full Court Press Communications.

The creditor list includes Rational 360, a public relations firm led in part by former White House Press Secretary Joe Lockhart. Emails obtained by Matt Stoller, the director of research at the American Economic Liberties Project, show that Rational 360 pressured activists and political influencers to speak out in favor of a bill that would move crypto regulatory authority to the Commodity Futures Trading Commission. While the Securities and Exchange Commission handles many enforcement actions against crypto firms, the CFTC is seen as more friendly to crypto interests and has fewer disclosure requirements.

Powerhouse law firms also feature heavily in the most recent bankruptcy disclosure. One firm listed is Cleary Gottlieb Steen & Hamilton, which represented Russia in a $3 billion bond dispute against Ukraine before it shuttered its Moscow office last year. Buckley LLP, another large law firm based in Washington that appeared on the FTX creditor list, announced earlier this month that it would merge with the San Francisco-based Orrick to create a combined firm with a total of nearly $1.5 billion focused on “forward-looking regulatory and enforcement advice” in the fields of finance and tech.

Among FTX’s listed creditors were a handful of nations — though the contours of the financial relationships remain unknown. Nevertheless, the list of countries reads like a who’s who of nations with lax financial regulations: The British Virgin Islands, Bermuda, the Cayman Islands, Isle of Man, Liechtenstein, Luxembourg, the United Arab Emirates, Seychelles, and Switzerland all appear in the filing.

In addition to national banks and powerful firms in the corporate PR world, the creditor matrix also details luxury restaurants like Carbone in Miami and the luxury Margaritaville resort in Nassau.

The North America League of Legends Championship Series, a property of a premier video game event franchise, is also listed in the creditor matrix. Bankman-Fried, notorious for playing the video game “League of Legends” during pitch meetings with investors, arranged a $96 million sponsorship deal with Riot Games. In December, as the extent of FTX’s deception unfolded, Riot announced it would attempt to cut ties with Bankman-Fried.

The entertainment relationships provided, in some cases, an additional channel for political access. The creditor list includes the talent agency WME, with a memo mentioning actor Larry David, a celebrity endorser of FTX who appeared in a now-infamous Super Bowl commercial promoting the crypto exchange.

WME itself is owned by Endeavor, an investor in FTX that owns 38,000 shares of the company. Endeavor is also run by Ari Emanuel, the brother of Rahm Emanuel, President Joe Biden’s ambassador to Japan.

Editor’s Note: In September 2022, The Intercept received $500,000 from Sam Bankman-Fried’s foundation, Building a Stronger Future, as part of a $4 million grant to fund our pandemic prevention and biosafety coverage. That grant has been suspended. In keeping with our general practice, The Intercept disclosed the funding in subsequent reporting on Bankman-Fried’s political activities.


This content originally appeared on The Intercept and was authored by Lee Fang.

]]>
https://www.radiofree.org/2023/01/30/new-ftx-filing-pulls-back-the-curtain-on-sam-bankman-frieds-massive-influence-peddling-operation/feed/ 0 368409
Apple Brings Mainland Chinese Web Censorship to Hong Kong https://www.radiofree.org/2023/01/26/apple-brings-mainland-chinese-web-censorship-to-hong-kong/ https://www.radiofree.org/2023/01/26/apple-brings-mainland-chinese-web-censorship-to-hong-kong/#respond Thu, 26 Jan 2023 11:00:22 +0000 https://theintercept.com/?p=420141

When Safari users in Hong Kong recently tried to load the popular code-sharing website GitLab, they received a strange warning instead: Apple’s browser was blocking the site for their own safety. The access was temporarily cut off thanks to Apple’s use of a Chinese corporate website blacklist, which resulted in the innocuous site being flagged as a purveyor of misinformation. Neither Tencent, the massive Chinese firm behind the web filter, nor Apple will say how or why the site was censored.

The outage was publicized just ahead of the new year. On December 30, 2022, Hong Kong-based software engineer and former Apple employee Chu Ka-cheong tweeted that his web browser had blocked access to GitLab, a popular repository for open-source code. Safari’s “safe browsing” feature greeted him with a full-page “deceptive website warning,” advising that because GitLab contained dangerous “unverified information,” it was inaccessible. Access to GitLab was restored several days later, after the situation was brought to the company’s attention.

The warning screen itself came courtesy of Tencent, the mammoth Chinese internet conglomerate behind WeChat and League of Legends. The company operates the safe browsing filter for Safari users in China on Apple’s behalf — and now, as the Chinese government increasingly asserts control of the territory, in Hong Kong as well.

Apple spokesperson Nadine Haija would not answer questions about the GitLab incident, suggesting they be directed at Tencent, which also declined to offer responses.

The episode raises thorny questions about privatized censorship done in the name of “safety” — questions that neither company seems interested in answering: How does Tencent decide what’s blocked? Does Apple have any role? Does Apple condone Tencent’s blacklist practices?

“They should be responsible to their customers in Hong Kong and need to describe how they will respond to demands from the Chinese authorities to limit access to information,” wrote Charlie Smith, the pseudonymous founder of GreatFire, a Chinese web censorship advocacy and watchdog group. “Presumably people purchase Apple devices because they believe the company when they say that ‘privacy is a fundamental human right’. What they fail to add is *except if you are Chinese.”

Ka-cheong tweeted that other Hong Kong residents had reported GitLab similarly blocked on their devices thanks to Tencent. “We will look into it,” Apple engineer Maciej Stachowiak tweeted in response. “Thanks for the heads-up.” But Ka-cheong, who also serves as vice president of Internet Society Hong Kong Chapter, an online rights group, said he received no further information from Apple.

“Presumably people purchase Apple devices because they believe the company when they say that ‘privacy is a fundamental human right’. What they fail to add is *except if you are Chinese.”

The block came as a particular surprise to Ka-cheong and other Hong Kong residents because Apple originally said the Tencent blocklist would be used only for Safari users inside mainland China. According to a review of the Internet Archive, however, sometime after November 24, 2022, Apple quietly edited its Safari privacy policy to note that the Tencent blacklist would be used for devices in Hong Kong as well. (Haija, the Apple spokesperson, did not respond when asked when or why Apple expanded the use of Tencent’s filter to Hong Kong.)

Though mainland China has heavily censored internet access for decades, Hong Kong typically enjoyed unfettered access to the web, a freedom only recently threatened by the passage of a sweeping, repressive national security law in 2020.

Silently expanding the scope of the Tencent list not only allows Apple to remain in the good graces of China — whose industrial capacity remains existentially vital to the California-based company — but also provides plausible deniability about how or why such site blocks happen.

“While unfortunately many tech companies proactively apply political and religious censorship to their mainland Chinese users, Apple may be unique among North American tech companies in proactively applying such speech restrictions to users in Hong Kong,” said Jeffrey Knockel, a researcher with Citizen Lab, a digital security watchdog group at the University of Toronto.

Knockel pointed out that while a company like Tencent should expected to comply with Chinese law as a matter of course, Apple has gone out of its way to do so.

“The aspect which we should be surprised by and concerned about is Apple’s decision to work with Tencent in the first place to filter URLs for Apple’s Hong Kong users,” he said, “when other North American tech companies have resisted Hong Kong’s demands to subject Hong Kong users to China-based filtering.”

The block on GitLab would not be the first time Tencent deemed a foreign website “dangerous” for apparently ideological reasons. In 2020, attempts to visit the official website of Notepad++, a text editor app whose French developer had previously issued a statement of solidarity with Hong Kong dissidents, were blocked for users of Tencent web browsers, again citing safety.

The GitLab block also wouldn’t be the first time Apple, which purports to hold deep commitments to human rights, has bent the company’s products to align with Chinese national pressure. In 2019, Apple was caught delisting an app Hong Kong political dissidents were using to organize; in November, users noticed the company had pushed a software update to Chinese iPhone users that significantly weakened the AirDrop feature, which protesters throughout the country had been using to spread messages on the ground.

“All companies have a responsibility to respect human rights, including freedom of expression, no matter where in the world they operate,” Michael Kleinman, head of Amnesty International’s Silicon Valley Initiative, wrote to The Intercept. “Any steps by Apple to limit freedom of expression for internet users in Hong Kong would contravene Apple’s responsibility to respect human rights under the UN Guiding Principles.”

In 2019, Apple publicly acknowledged that it had begun using a “safe browsing” database maintained by Tencent to filter the web activity of its users in China, instead of an equivalent list operated by Google. Safe browsing filters ostensibly protect users from malicious pages containing malware or spear-phishing attacks by checking the website they’re trying to load against a master list of blacklisted domains.

In order to make such a list work, however, at least some personal information needs to be transmitted to the company operating the filter, be it Google or Tencent. When news of Apple’s use of the Tencent safe browsing list first broke, Matthew Green, a professor of cryptography at Johns Hopkins University, described it as “another example of Apple making significant modifications to its privacy infrastructure, largely without publicity or announcement.”

“I suppose the nature of having a ‘misinformation’ category is that China is going to have its own views on what that means.”

While important questions remain about exactly what information from Safari users in Hong Kong and China is ultimately transmitted to Tencent and beyond, the GitLab incident shows another troubling aspect of safe browsing: It gives a single company the ability to unilaterally censor the web under the aegis of public safety.

“Our concern was that outsourcing this stuff to Chinese firms seemed problematic for Apple,” Green explained in an interview with The Intercept, “and I suppose the nature of having a ‘misinformation’ category is that China is going to have its own views on what that means.”

Indeed, it’s impossible to know in what sense GitLab could have possibly been considered a source of dangerous “unverified information.” The site is essentially an empty vessel where software developers, including corporate clients like T-Mobile and Goldman Sachs, can safely store and edit code. The Chinese government has recently cracked down on some open-source code sites similar to GitLab, where engineers from around the world are able to freely interact, collaborate, and share information. (GitLab did not respond to a request for comment.)

Notably, the censorship-evasion and anonymity web browser Tor has turned to GitLab to catalog instances of Chinese state internet censorship, though there’s no indication it was this activity that led to GitLab’s addition to the Tencent list.

While Tencent provides some public explanation of its criteria for blocking a website, its decision-making process is completely opaque, and the published censorship standards are extremely vague, including offenses like “endangering national security” and “undermining national unity.”

Tencent has long been scrutinized for its ties to the Chinese government, which frequently leverages state power to more closely influence or outright control nominally private firms.

Earlier this month, the Financial Times reported that the Chinese government was acquiring so-called golden shares of Tencent, a privileged form of equity that’s become “a common tool used by the state to exert influence over private news and content companies.” A 2021 New York Times report on Tencent noted the company’s eagerness to cooperate with Chinese government mandates, quoting the company’s president during an earnings call that year: “Now I think it’s important for us to understand even more about what the government is concerned about, what the society is concerned about, and be even more compliant.”

While Tencent’s compliance with the Chinese national security agenda ought not to come as a surprise, Knockel of Citizen Lab says Apple’s should.

“Ultimately I don’t think it really matters exactly how GitLab came to be blocked by Tencent’s Safe Browsing,” he said. “Tencent’s blocking of GitLab for Safari users underscores that Apple’s subjection of Hong Kong users to screening via a China-based company is problematic not only in principle but also in practice.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/01/26/apple-brings-mainland-chinese-web-censorship-to-hong-kong/feed/ 0 367362
Maybe Those Luddites Had a Point https://www.radiofree.org/2023/01/25/maybe-those-luddites-had-a-point/ https://www.radiofree.org/2023/01/25/maybe-those-luddites-had-a-point/#respond Wed, 25 Jan 2023 15:34:33 +0000 https://www.commondreams.org/luddites-and-modern-technology

Twenty-three minutes. That's how long it takes for your brain to refocus after shifting from one task to the next. Check your email, glance at a text, and you'll pay for what's called a "switch cost effect."

"We've fallen for a mass delusion that our brains can multitask. They can't," author Johann Hari found out in researching his latest book. We're paying a price for our stolen ability to focus and maybe that's one of the reasons we're falling for autocrats and punting on solving the world's grievous problems.

Hari's book "Stolen Focus: Why You Can't Pay Attention and How to Think Deeply Again" raises all sorts of good questions like this. The book is just out in paperback. Talk about technology, though, and inevitably some smart Alec will bring up the Luddites. "You don't want to stand against progress," that person will say. "You don't want to be a Luddite."

The Luddites ... didn't start by breaking machines. They started by making demands of the factory owners to phase in the technology slowly.

Can we spare a few minutes to focus on Luddites? Read people's historian Peter Linebaugh, or Jacobin writer, Peter Frase; check out a Smithsonian Magazine's feature by Clive Thompson—and you'll find that Luddites weren't backward-thinking thugs, but rather, skilled craftspeople whose lives were about to be wrecked.

Textile cutters, spinners and weavers—before factories came along, those British textile workers enjoyed a pretty good life. Working from home, they had a certain amount of autonomy over their lives. The price for their products was set and published. They could work as much or as little as they liked. Come the early 1800s—war and recession—and machines and factories threatened all of that. The Luddites—a made-up name—didn't start by breaking machines. They started by making demands of the factory owners to phase in the technology slowly. Some proposed a tax on textiles to fund worker pensions. They called for government regulation. Relief from the harms and a fair share of the profits from progress. It was only when they were denied all of that that they started breaking stuff up.

Today, big U.S. social media companies are facing lawsuits. On January 6th, Seattle Public Schools sued TikTok, Instagram, Facebook, Snapchat, and YouTube for their negative impact on students' mental and emotional health. The U.S. Supreme Court is scheduled to hear arguments next month over the protections the tech industry enjoys under the law when their algorithms intentionally push potentially harmful content for profit.

What would breaking the machines look like in our time? I don't know. But if Hari's right, it's not just the quality of our lives that's in danger. It's the state of our minds that's at stake.

You can hear my full uncut conversation with Johann Hari about Noam Chomsky, the subject of his next book—a man with no problem with focus it seems—through a subscription to our free podcast, and watch my scary conversation with Hari at lauraflanders.org.


This content originally appeared on Common Dreams and was authored by Laura Flanders.

]]>
https://www.radiofree.org/2023/01/25/maybe-those-luddites-had-a-point/feed/ 0 367099
Elon Musk Caves to Pressure From India to Remove BBC Doc Critical of Modi https://www.radiofree.org/2023/01/24/elon-musk-caves-to-pressure-from-india-to-remove-bbc-doc-critical-of-modi/ https://www.radiofree.org/2023/01/24/elon-musk-caves-to-pressure-from-india-to-remove-bbc-doc-critical-of-modi/#respond Tue, 24 Jan 2023 23:51:34 +0000 https://theintercept.com/?p=420071

Twitter and YouTube censored a report critical of Indian Prime Minister Narendra Modi in coordination with the government of India. Officials called for the Big Tech companies to take action against a BBC documentary exploring Modi’s role in a genocidal 2002 massacre in the Indian state of Gujarat, which the officials deemed a “propaganda piece.”

In a series of posts, Kanchan Gupta, senior adviser at the Indian government’s Ministry of Information and Broadcasting, denounced the BBC documentary as “hostile propaganda and anti-India garbage.” He said that both Twitter and YouTube had been ordered block links to the film, before adding that the platforms “have complied with the directions.” Gupta’s statements coincided with posts from Twitter users in India who claimed to have shared links to the documentary but whose posts were later removed and replaced with a legal notice.

“The government has sent hundreds of requests to different social media platforms, especially YouTube and Twitter, to take down the posts that share snippets or links to the documentary,” Indian journalist Raqib Hameed Naik told The Intercept. “And shamefully, the companies are complying with their demands and have taken down numerous videos and posts.”

“The government has sent hundreds of requests to different social media platforms, especially YouTube and Twitter, to take down the posts that share snippets or links to the documentary.”

This act of censorship — wiping away allegations of crimes against humanity committed by a foreign leader — sets a worrying tone for Twitter, especially in light of its new management.

Elon Musk’s self-identification as a “free-speech absolutist” has been a primary talking point for the billionaire as he has sought to explain why he took ownership of the platform last year. Much of his criticism of Twitter revolved around its decision to censor reporting around Hunter Biden, the son of then-presidential candidate Joe Biden.

While Musk has been glad to stand up to suppression of speech against conservatives in the United States — something that he has described as nothing less than “a battle for the future of civilization” — he appears to be failing at the far graver challenge of standing up to the authoritarian demands of foreign governments. (Twitter’s communications effort is now helmed by Musk, who did not immediately respond to a request for comment.)

Pushing back against censorship of the BBC documentary, members of Parliament from the opposition All India Trinamool Congress party Mahua Moitra and Derek O’Brien defiantly posted links to it online.

“Sorry, Haven’t been elected to represent world’s largest democracy to accept censorship,” Moitra posted. “Here’s the link. Watch it while you can.” Moitra’s post is still up, but the link to the documentary no longer works. Moitra had posted a link to the Internet Archive, presumably hoping to get around the block of the BBC, but the Internet Archive subsequently took the link down. She has since posted the audio version on Telegram.

O’Brien’s post was itself taken down.

Twitter even blocked Indian audiences from seeing two posts by actor John Cusack linking to the documentary. (They remain visible to American audiences.) Cusack said he “pushed out the links and got immediate blowback.” He told The Intercept, “I received two notices that I’m banned in India.” The actor wrote a book, “Things That Can and Cannot Be Said,” with celebrated Indian scholar Arundhati Roy, a fierce critic of the Modi government.

The Gujarat riots, as the violence is sometimes known, occurred in 2002, when Modi was the chief minister of the state. A group of militants aligned with the Hindu nationalist movement, which encompasses Modi’s Bharatiya Janata Party, launched a violent campaign against local Muslims. Modi, who has been accused of personally encouraging the violence, reportedly told police forces to stand down in the face of the ongoing violence, which killed about 1,000 people.

“The documentary has unnerved Mr. Modi as he continues to evade accountability for his complicity in the violence,” Naik, the journalist, said. “He sees the documentary as a threat to his image internationally and has launched an unprecedented crackdown in India.”

Modi’s government in India regularly applied pressure to Twitter in an attempt to bend the social media platform to its will. At one point, the government threatened to arrest Twitter staff in the country over their refusal to ban accounts run by critics.

When Musk took over, Twitter had just a 20 percent compliance rate when it came to Indian government takedown requests. When the billionaire took the company private, some 90 percent of Twitter India’s 200 staffers were laid off. Now, the Indian government’s pressure on Twitter appears to be gaining traction.

A key difference may be Musk’s other business entanglements. Musk himself has his own business interests in India, where Tesla has been lobbying, so far without luck, to win tax breaks to enter the Indian market.

Whatever the reason for the apparent change, Twitter’s moves at the behest of Modi’s government bode ill for Musk’s claims to be running the company with an aim of protecting free speech. While Musk has felt fine wading into U.S. culture wars on behalf of conservatives, he has been far more reticent to take a stand about the far direr threats to free speech from autocratic governments.

One of the initial strengths of Twitter, and social media broadly, was the threat it posed to autocratic governments, as witnessed by its use during the 2009 protests in Iran and later the Arab Spring. Dictators across the region railed at the company for allowing what they considered to be forbidden speech.

Musk, however, has said he defers to local laws on speech issues. “Like I said, my preference is to hew close to the laws of countries in which Twitter operates,” Musk tweeted last year. “If the citizens want something banned, then pass a law to do so, otherwise it should be allowed.”

Google, which owns YouTube, has also come under intense pressure from the Indian government. The company’s public transparency reports show the Indian government has been a prodigious source of content takedowns, sending over 15,000 censorship demands since 2011, compared to under 5,000 from Germany and nearly 11,000 from the U.S. in the same time frame.

These reports show a varying level of compliance on Google’s part: Between January and June 2022, Google censored nearly 9 percent of items submitted by the Indian government but almost 44 percent during that span in 2020. YouTube did not immediately respond to a request for comment.

Akshay Marathe, a former spokesperson for the opposition party in control of the Delhi and Punjab government, told The Intercept that the social media takedown requests were part of a broader program of suppression. Modi “quite brazenly used India’s law enforcement apparatus to jail political opponents, journalists, and activists on a regular basis,” Marathe said. “His directive to Twitter to take down all links of the documentary (and Twitter’s shocking compliance after Elon’s commitment to free speech) also follows on the heels of the Modi government’s announcement that it will soon implement a regulatory regime in which it will have the right to determine what is fake news and order Big Tech platforms to delete the content.”


This content originally appeared on The Intercept and was authored by Murtaza Hussain.

]]>
https://www.radiofree.org/2023/01/24/elon-musk-caves-to-pressure-from-india-to-remove-bbc-doc-critical-of-modi/feed/ 0 366882
How to Leak From the Supreme Court https://www.radiofree.org/2023/01/22/how-to-leak-from-the-supreme-court/ https://www.radiofree.org/2023/01/22/how-to-leak-from-the-supreme-court/#respond Sun, 22 Jan 2023 12:00:20 +0000 https://theintercept.com/?p=419804

Less than two weeks ago, Supreme Court investigators looking into the leak of the Dobbs v. Jackson Women’s Health Organization draft opinion had reportedly “narrowed their inquiry to a small number of suspects.” Ten days after that news, the Supreme Court issued a report stating that the investigation had in fact failed to determine who was behind the draft opinion leak.

The public report provides insights into the investigative process undertaken by the court, identifies a number of inadequate security controls, and provides recommendations to remedy the problems. That means the report is doubly instructive for would-be future leakers: It provides both a list of successful operational security techniques leakers may have employed to evade detection, as well as, thanks to the recommendations, forward-looking lessons on pitfalls to avoid in the future.

Investigative Dead Ends

The investigation team used a number of techniques to attempt to identify the leaker, all of which proved to be dead ends.

They examined all available printer logs but found that Court printers have limited logging capabilities. The team also investigated email logs to determine if anyone had emailed the opinion draft to a third party; while staff had emailed copies of the draft to others on staff, there was no evidence that the opinion draft was emailed to anyone else.

The investigation looked not just at court-issued devices, but also at call and text records as well as billing statements of employees’ personal devices. Though the team reported that the court’s logging was rudimentary and thus did not yield any results that could identify a leaker, the key takeaway for future leakers is that much like organization-provided devices, personal devices should likewise not be used in the service of leaking. Instead, the principle of one-time use should be adopted: Temporary devices should be safely acquired and used for acquisition and dissemination of leak materials, after which the device should promptly be disposed of by secure means.

Court investigators paid particular attention to reviewing the legal search histories conducted by staff, aiming to “determine whether an employee might have researched the legality of disclosing confidential case-related information.” Notably, the investigation team obtained this legal search history “directly from the service providers.” Though it’s not clear which search providers were examined, the report could be referring to subscription databases like LexisNexis, highlighting the fact that leakers should be careful to avoid using third-party services, as a leak investigation may seek to obtain records from them. The report doesn’t state whether the investigative team subpoenaed the service providers, whether the providers shared the search histories without a subpoena, or whether investigators were able to view the histories through internal means like staff or administrative accounts, or invoices from the search providers that could include itemized search terms.

The report said investigators reviewed “the statements and conduct of personnel who displayed attributes associated with insider-threat behavior — violation of confidentiality rules, disgruntled attitude, claimed stressed, anger at the Court’s decision, etc.” In other words, as I predicted when the investigation was launched, the team deployed “sentiment analysis” tactics to attempt to identify disaffected staff (though this line of inquiry ignores the possibility that the draft may have been leaked by someone who supported the opinion). It is thus important for leakers to not display discontentment, either publicly or privately (including via “private messages,” which may not be particularly private).

The investigators sought to determine whether they could identify any connections between court staff and journalists, particularly anyone affiliated with Politico, which first published the draft opinion. This is why it’s important not to have visible contact with reporters; avoid following them on social media and access their contact information ideally using a separate disposable device, or at least not using organization-supplied hardware.

Though investigators analyzed the digital images of the opinion draft published by Politico, comparing it to copies obtained from court photocopiers and printers, they were unable to find anything of “evidentiary value.” In addition to not using company-provided or otherwise trackable devices when producing copies, would-be leakers should consider even going so far as to introduce errant stray markings that may lead investigators down dead ends.

The report mentions that the team analyzed an unspecified “item relevant to the investigation” for fingerprints. While they did find fingerprints with outside assistance, they were unable to match them to “any fingerprints of interest.” The report is curiously vague as to what the item of interest was; it could, for instance, be a rogue USB stick that was found to contain a copy of the opinion. Given that it’s not entirely unusual for leak investigations to sweep for physical prints as well as digital ones — Elon Musk, in his leak investigations at Tesla, also reportedly lifted fingerprints from printouts found near a photocopier — leakers should be careful not to leave any fingerprints when accessing or handling any sensitive materials.

Future Measures

The report makes it a point to state that the detailed recommendations on how to improve court policies and practices will only be shared with the justices and court officers in a private annex, because releasing them to the public “could unwisely expose Court operations and information to potential bad actors.” Nonetheless, the public report does provide a broad list of recommendations that are instructive for future leakers.

The team’s primary finding is that “too many personnel have access to certain Court-sensitive documents” and that there is an “inability to actively track who is handling and accessing these documents.” Though the recommendations from this finding are likely in the private annex, we can assume that the team may suggest the court implement more stringent access controls and tracking mechanisms.

The tracking mechanisms may involve detailed audit logs of which users viewed, copied, printed, or otherwise interacted with a given file, as well as uniquely watermarking versions of files to identify the owner of a given copy of a document, should it be leaked. There are a variety of ways to uniquely fingerprint a document, ranging from modifying the spacing of paragraphs, words, or characters to making slight modifications to the syntactic or semantic structure.

The report also found that “there are inadequate safeguards in place to track the printing and copying of sensitive documents” and that the court should “institute tracking mechanisms using technology that is currently available for this purpose.” Such technologies could include everything from detailed print histories, which log document name and size as well as username and IP address, to a Machine Identification Code embedded as a series of microdots or other watermarks on a printed page, which can identify the source printer as well as the date and time a document was printed.

With those tracking mechanisms in place, a leaker would need to avoid printing or photocopying documents using organization-provided hardware. To err still further on the side of safety, if physical copies need to be made, a device that can be linked to the leaker, like a home printer, should be avoided, and instead a device should only be used for the purposes of producing the leaked document (whether via printing or taking a photo) and then promptly and safely disposed of.

The court investigators may have failed to identify the source of the leaked opinion draft, but their report does help future leakers better protect their own identities.


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2023/01/22/how-to-leak-from-the-supreme-court/feed/ 0 366354
Owen Wilkes, the intellect behind New Zealand’s anti-nuclear stance https://www.radiofree.org/2023/01/17/owen-wilkes-the-intellect-behind-new-zealands-anti-nuclear-stance/ https://www.radiofree.org/2023/01/17/owen-wilkes-the-intellect-behind-new-zealands-anti-nuclear-stance/#respond Tue, 17 Jan 2023 05:38:19 +0000 https://asiapacificreport.nz/?p=82972 A new book about one of New Zealand’s foremost peace activists offers insight into Owen Wilkes, the man described as the intellect behind New Zealand’s anti-nuclear stance.

REVIEW: By Pat Baskett

In the days before mobile phones and emails, there were telephone trees. They grew and spread messages like leaves, thriving on the fertile ground of common beliefs and support for a particular cause.

It worked like this: one member of a group phoned 10 others who phoned another 10, each of whom phoned 10 more. On and on . . . The caller was never anonymous, relationships were established — or you simply said, “no thanks”.

The task of spreading information, before the internet, was time-consuming and labour intensive. Photocopiers, which became widely used only in the late 1970s, replaced an invaluable machine called a duplicator. You cranked the handle, one turn for each page, hoping the paper wouldn’t stick. How long did it take to do a thousand?

Next came the mail-out — folding, stuffing envelopes, sticking on stamps if funds allowed, or delivering them by hand into letterboxes.

The process was convivial, the days were busy but there was always time. There needed to be, because the issue was urgent.

The Cold War, that period of perilous mistrust between the communist Soviet Union and the “free” West, led by the United States, engulfed us in fear of a nuclear holocaust. Barely a generation separated us from the end of World War II when nuclear bombs were dropped on Hiroshima and Nagasaki in Japan.

The mutually assured destruction (MAD) these weapons promised was a fragile pseudo peace. In our neighbourhood peace groups, we understood the devastation a nuclear winter would bring and we worked out the radius of death and damage from a bomb dropped on our own cities.

An essential step
Yet more than nuclear weapons was, and still is, at stake. The movement was called the Peace Movement because banning nukes was considered the essential step in ensuring world peace.

The stockpile of nuclear weapons held by each side was more than enough to eradicate all, or most, life on earth — and it still is.

Those existential threats have a familiar ring, though the cause we face today adds another dimension. So far, the benefits of almost instant communication and dissemination of information haven’t enabled the world to devise for climate disruption what activists, uniquely in New Zealand, achieved — the 1986 nuclear weapons-free legislation.

Passed by the Labour government of David Lange, it prohibits not just weapons but nuclear-powered warships — including those of our former ANZUS allies, namely the United States.

There has never been any question of rescinding this act. It remains in safe obscurity — to such an extent that I wonder how many of our Gen X contemporaries are aware of its existence.

Yet more than nuclear weapons was, and still is, at stake. The movement was called the Peace Movement because banning nukes was considered the essential step in ensuring world peace.

In 1984, 61 percent of the population were living in 86 locally declared nuclear-weapons-free zones. Academic activists came together to form Scientists Against Nuclear Arms (SANA) and Engineers for Social Responsibility (ESR – this group now focuses on the climate disruption).

The medical fraternity formed a local branch of International Physicians for the Prevention of Nuclear War (IPPNW).

Extraordinary sleuthing talent
Much of the information which fuelled the work of all these groups was brought to light by the extraordinary sleuthing talent of one man. Owen Wilkes is described as ” . . . the intellect behind New Zealand’s anti-nuclear stance” in a recent book, Peacemonger: Owen Wilkes international peace researcher, published by Raekaihau Press in association with Steele Roberts Aotearoa.

An unconventional, highly talented individual

The book consists of 12 essays by friends and collaborators, themselves experts in their individual fields and who leave their own legacies of contribution to the knowledge that led to the anti-nuclear legislation.

They include physicist Dr Peter Wills who was instrumental in setting up SANA and Auckland University’s Centre for Peace Studies; investigative journalist and researcher Nicky Hager; and veteran peace and human rights activist Maire Leadbeater. Two contributions are by Wilkes’s colleagues at the Peace Research Institute in Oslo Norway, Dr Ingvar Botnen and Dr Nils Petter Gleditsch.

Wilkes spent six years from 1976 working in Oslo and also at the Stockholm International Peace Research Institute (SIPRI).

The work is edited by Mark Derby and Wilkes’s partner May Bass. While a traditional biography with a single author may have avoided the repetition of information, the various personal anecdotes and responses result in the portrayal of an unconventional, highly talented individual.

In his introduction, Derby sums up Wilkes’s life: “Although invariably non-violent, politically non-aligned and generally law-abiding, Owen encountered official opposition, harassment and intimidation in various forms as he became internationally known for the quality and impact of his peace research.”

Wilkes was born in Christchurch in 1940 and died in Kawhia in 2005. In his early adult years he worked as an entomologist on various projects supported by the US military, including at McMurdo base in the Antarctic. These, he discovered, were connected with a US military germ warfare project.

Using official information laws
His gift was to see through, and behind, the information government made public about our relationship to our official allies, essentially the US. To do this he used our own official information laws and the American equivalent, plus any public reports to congress and US budget reports he could lay hands on.

Rubbish bags also feature in a couple of accounts.

What now may be stored as megabytes of information consists of boxes and folders of carefully catalogued material, the bulk of which is lodged at the Alexander Turnbull Library (with information also at the university libraries of Auckland and Canterbury).

The truth Wilkes was committed to appears, in retrospect, somehow simpler than that of the struggle towards a fossil-free future and a liveable planet for all. Peace is a part of this and the nukes are still there.

Wilkes documented how in many cases what was billed as civilian also had profound military implications. This was nowhere more clear than in the anti-bases campaign which Murray Horton chronicles — bases being sites in remote locations for monitoring or receiving satellite information, some of which new technology has rendered obsolete.

These include Mt St John near Lake Tekapo and Black Birch near Blenheim, and those still operating at Tangimoana in the Manawatu and at Waihopai, also near Blenheim.

Wilkes’s unconventional appearance and lifestyle — he famously wore shorts in sub-zero temperatures when skiing in Norway — made him a target for accusations of being a communist, a not uncommon slander of the peace movement.

Having sharp eyes
Maire Leadbeater, in her account of his long investigation by the New Zealand Security Intelligence Service, suggests his only “crime” was “to have sharp eyes and the ability to put two and two together”.

Yet there were more conventional sides to his interests. One was archaeology, beginning in his 1962 when he worked as a field archaeologist for the Canterbury Museum. This continued after he left the peace movement in the early 1990s and worked for the Waikato Department of Conservation in a variety of jobs including filing archaeological and historical records.

The truth Wilkes was committed to appears, in retrospect, somehow simpler than that of the struggle towards a fossil-free future and a liveable planet for all. Peace is a part of this and the nukes are still there.

  • Peacemonger – Owen Wilkes: International Peace Researcher, edited by May Bass and Mark Derby. Published by Raekaihau Press in association with Steele Roberts Aotearoa (2022). This article was first published by Newsroom is republished with the author’s and Newsroom’s permission. Asia Pacific Report editor David Robie is one of the contributing authors.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/01/17/owen-wilkes-the-intellect-behind-new-zealands-anti-nuclear-stance/feed/ 0 364899
Guccifer, the Hacker Who Launched Clinton Email Flap, Speaks Out After Nearly a Decade Behind Bars https://www.radiofree.org/2023/01/15/guccifer-the-hacker-who-launched-clinton-email-flap-speaks-out-after-nearly-a-decade-behind-bars/ https://www.radiofree.org/2023/01/15/guccifer-the-hacker-who-launched-clinton-email-flap-speaks-out-after-nearly-a-decade-behind-bars/#respond Sun, 15 Jan 2023 11:00:56 +0000 https://theintercept.com/?p=419075

Marcel Lehel Lazar walked out of Federal Correctional Institute Schuylkill, a Pennsylvania prison, in August 2021. The 51-year-old formerly known only as Guccifer had spent over four years incarcerated for an email hacking spree against America’s elite. Though these inbox disclosures arguably changed the course of the nation’s recent history, Lazar himself remains an obscure figure. This month, in a series of phone interviews with The Intercept, Lazar opened up for the first time about his new life and strange legacy.

Lazar is not a household name by unauthorized access standards — no Edward Snowden or Chelsea Manning — but people will be familiar with his work. Throughout 2013, Lazar stole the private correspondence of everyone from a former member of the Joint Chiefs of Staff to “Sex and the City” author Candace Bushnell.

“Right now, having this time on my hands, I’m just trying to understand what this other me was making 10 years ago.”

There’s an irony to his present obscurity: Guccifer’s prolific career often seemed motivated as much by an appetite for global media fame than any ideology or principle. He acted as an agent of chaos, not a whistleblower, and his exploits provided as much entertainment as anything else. It’s thanks to Guccifer’s infiltration of Dorothy Bush Koch’s AOL account that the world knows that her brother — George W. Bush — is fond of fine bathroom self-portraiture.

“I knew all the time what these guys are talking about,” Lazar told me with a degree of satisfaction. “I used to know more than they knew about each other.”

Ten years after his email rampage, Lazar said that, back then, he’d hoped not for celebrity but to find some hidden explanation for America’s 21st century slump — a skeleton key buried within the emails of the rich and famous, something that might expose those causing our national rot and reverse it. Instead, he might have inadvertently put Donald Trump in the White House.

When Guccifer — a portmanteau of Lucifer and Gucci, pronounced with the Italian word’s “tch” sound — breached longtime Clinton family confidant Sidney Blumenthal’s email account, it changed the world almost by accident. Buried among the thousands of messages in Blumenthal’s AOL account he stole and leaked in 2013 were emails to [email protected], Hillary Clinton’s previously unknown private address. The account’s existence, and later revelations that she had improperly used it to conduct official government business and transmit sensitive intelligence data, led to something like a national panic attack: nonstop political acrimony, federal investigations, and depending on who you ask, Trump’s 2016 victory.

In the end, the way Guccifer might be best remembered was in the cooptation of his wildly catchy name for a Russian hacker persona: Guccifer 2.0. The latter Guccifer would hack troves of information from Democratic National Committee servers, a plunder released on WikiLeaks.

Eventually, a federal indictment accused a cadre of Russian intelligence operatives of using the persona Guccifer 2.0 to conduct a political propaganda campaign and cover for Russian involvement. As the Guccifer 2.0 version grew in infamy, becoming a central figure in Americans’ wrangling over Russian interference in the 2016 election, the namesake hacker’s exploits faded from memory.

When I reached Lazar by phone, he was at home in Romania. He had returned to a family that had grown up and apart from him since he was arrested by Romanian police in 2014.

“I am still trying to connect back with my family, with my daughter, my wife,” Lazar said. “I’ve been away more than eight years, so this is a big gap, which I’m trying to fill with everything that takes.”

He spends most of his time alone at home, reading about American politics and working on a memoir. His wife supports the family as a low-paid worker at a nearby factory. Revisiting his past life for the book has been an odd undertaking, Lazar told me.

“It’s like an out-of-body experience, like this Guccifer guy is another guy,” he said. “Right now, having this time on my hands, I’m just trying to understand what this other me was making 10 years ago.”

2023_MarcelLehelLazar_TheIntercept_NK_-12

Marcel Lehel Lazar, known as Guccifer, opened up to The Intercept for the first time about his new life and strange legacy.

Photo: Nemanja Kneževic for The Intercept

Lazar has little to say of the two American prisons where he was sentenced to do time after extradition from Romania. Both were in Pennsylvania — a minimum-security facility and then a stint at the medium-security Schuylkill, which he described simply and solemnly as “a bad place.” He claimed he was routinely denied medical care and says he lost many of his teeth during his four-year term.

On matters of his crime and punishment, Lazar contradicted himself, something he did often during our conversations. He wants to be both the righteous crusader and the steamrolled patsy. He repeatedly brought up what he considers a fundamental injustice: He revealed Clinton’s rule-breaking email setup and then cooperated with the Department of Justice probe, only to wind up in federal prison.

“Hillary Clinton swam away with the ‘reckless negligence’ or whatever Jim Comey called her,” Lazar said. “I did the time.”

Lazar was quick to rattle off a list of other high-profile officials who either knew about the secret Clinton email account all along or were later revealed to have used their own. “So much hypocrisy, come on man,” he said. “So much hypocrisy.”

And yet he pleaded guilty to all charges he faced and today fully admits what he did was wrong — sort of.

“To read somebody else’s emails is not OK,” he said. “And I paid for this, you know. People have to have privacy. But, you see, it’s not like I wanted to know what my neighbors are talking about. But I wanted to know what these guys in the United States are speaking about, and this is the reason why. I was sure that, over there, bad stuff is happening. This is the reason why I did it, not some other shady reason. What I did is OK.”

“I was inspired with the name, at least, because my whole Guccifer project was, after all, a failure.”

Though he takes pride in outing Clinton’s private email arrangement, Lazar said he found none of what he thought he’d uncover. The inbox fishing expedition for the darkest secrets of American power instead mostly revealed their mediocre oil paintings and poorly lit family snapshots. He conceded that Guccifer’s legacy may be that Russian intelligence cribbed his name.

“I was inspired with the name, at least,” Lazar said, “because my whole Guccifer project was, after all, a failure.”

2023_MarcelLehelLazar_TheIntercept_NK_-22

Marcel Lehel Lazar shows old photos and his current ID photographs in his wallet while walking around Arad, Romania, on Jan. 8, 2023.

Photo: Nemanja Kneževic for The Intercept

It can be difficult to tell where the Guccifer mythology ends and Lazar’s biography begins. Back in his hometown of Arad, a Transylvanian city roughly the size of Syracuse, New York, Lazar seems ambivalent about the magnitude of his role in American electoral history. “I don’t feel comfortable talking about me,” he told me. When I pressed in a later phone call, Lazar described 2016 as something of an inevitability: “Trump was the bullet in the barrel of the gun. He was already lingering around.”

While Lazar says former FBI Director James Comey’s October surprise memo to Congress — that Clinton’s emailing habits were still under investigation — was what “killed Hillary Clinton,” he didn’t deny his indirect role in that twist.

“Everything started with this mumbo jumbo email server, with this bullshit of email server,” he said. “So, if it was not for me, it was not for [Hillary’s] email server to start an investigation.”

Lazar now claims he very nearly breached the Trump inner circle in October 2013. “I was about to hack the Trump guys, Ivanka and stuff,” he told me. “And my computer just broke.”

How does it feel to have boosted, even accidentally, Donald Trump, a bona fide American elite? Though he described the former president as mentally unstable, a hero of Confederate sympathizers, and deeply selfish, Lazar is unbothered by his indirect role in 2016: “I feel like a regular guy. I don’t feel anything special about myself.”

At times, the retired hacker clearly still relishes his brief global notoriety. I asked him what it felt like to see his hacker persona usurped by Russian intelligence using the “Guccifer 2.0” cutout: Was it a shameless rip-off or a flattering homage? Lazar said he first learned that Russia had cribbed his persona from inside a detention center outside D.C. He perked up.

“I was feeling good, it was like a recognition,” he said. “It made me feel good, because in all these 10 years, I was all the time alone in this fight.”

2023_MarcelLehelLazar_TheIntercept_NK_-42

A sculptural sign along a highway announces the city of Arad in Romania on Jan. 8, 2023.

Photo: Nemanja Kneževic for The Intercept

Lazar described his fight — a term he used repeatedly — as a personal crusade against the corrupt and corrupting American elite, based on his own broad understanding of the idea pieced together from reading about it online. It’s hard to dismiss out of hand.

“Look at the last 20 years of politics of United States,” Lazar explained. “It’s all lies, and it went so low in the mud. You know what I’m saying? It stinks.”

The quest to find and expose some smoking gun that could explain American decline became an obsession, one he said kept him in front of a computer for 16 hours a day, guessing Yahoo Mail passwords, scouring his roughly 100 victims’ contact books, and plotting his next account takeover. He understood that it might seem odd passion for a Romanian ex-cabbie.

“I am Romanian, I am living in this godforsaken place. Why I’m interested in this? Why? This is a good question,” he told me. “For us, for guys from a Communist country, for example Romania, which was one of the worst Communist countries, United States was a beacon of light.”

George W. Bush changed all that for him. “In the time after 2000, you come to realize it’s all a humbug,” he said. “It’s all a lie, right? So, you feel the need, which I felt myself, to do something, to put things right, for the American people but for my soul too.”

It’s funny, Lazar told me, that his greatest admirers seemed to have been Russian intelligence and not the American people he now claims to have been working to inform. “We have somehow the same mindset,” Lazar mused. “Romania was a Communist country; they were Communists too.”

Hackers are still playing a game Guccifer mastered.

Since Lazar began this fight, the playbook he popularized — break into an email account, grab as many personal files as you can, dump them on the web, and seed the juiciest bits with eager journalists like myself — has become a go-to tactic around the world. Whether it’s North Korean agents pillaging Sony Pictures’ salacious email exchanges or an alleged Qatari hack of Trump ally Elliott Broidy exposing his foreign entanglements, hackers are still playing a game Guccifer mastered.

Despite having essentially zero technical skills — he gained access to accounts largely by guessing their password security questions — Lazar knew the fundamental truth that people love reading the private thoughts of powerful strangers. Sometimes these are deeply newsworthy, and sometimes it’s just a perverse thrill, though there’s a very fine line between the two. Even the disclosure of an innocuous email can be damaging for a person or organization presumed by the public to be impenetrable. When I brought this up to Lazar, his modesty slipped ever so slightly.

He said, “I am sure, in my humble way, I was a new-roads opener.”

2023_MarcelLehelLazar_TheIntercept_NK_-6

A portrait of Marcel Lahel Lazar in Arad, Romania, on Jan. 8, 2023.

Photo: Nemanja Kneževic for The Intercept

The Lazar I’ve met on the phone was very different from the Guccifer of a decade ago. Back then he would send rambling emails to Gawker, my former employer, largely consisting of fragmented screeds against the Illuminati. The word, which he said he’s retired, nods to a conspiracy of global elites that wield unfathomable power.

“I’d like to call them, right now, ‘deep state,’” he said. “But Illuminati was back then a handy word. Of course, it has bad connotations, it’s like a bad B movie from Hollywood.”

Unfortunately for Lazar, the “deep state” — a term of Turkish origin, referring to an unaccountable security state that acts largely in secret — has in the years since his arrest come to connote paranoid delusion nearly as much as the word “Illuminati” does. Whatever one thinks of the deep state, though, the notion is as contentious and popular among internet-dwelling cranks — especially, and ironically for Lazar, Trump followers. Whatever you want to call it, Lazar believed he’d find it in someone else’s inbox.

“My ultimate goal was to find the blueprints of bad behavior,” he said.

Some would argue that, in Blumenthal’s inbox, he did. Still, after a full term of the Trump administration, the idea of bad behavior at the highest levels of power being something kept hidden in secret emails almost feels quaint.

While Lazar’s past comments to the media have included outright fabrications, racist remarks, and a reliance on paranoid tropes, he seemed calmer now. On the phone, he was entirely lucid and thoughtful more often than not, even on topics that clearly anguish him. Prison may have cost him his teeth, but it seems to have given him a softer edge than he had a decade ago. He is still a conspiratorially minded man, but not necessarily a delusional one. He plans to remain engaged with American politics in his own way.

“I don’t care about myself,” he told me, “but I care about all the stuff I was talking about, you know, politics and stuff.” He said, “I’m gonna keep keeping one eye on American politics and react to this. I’m not gonna let the water just flow. I’m gonna intervene.”

This time, he says he’ll fight the powers that be by writing, not guessing passwords. “I am more subtle than I was before,” he tried to assure me.

“I’m gonna keep keeping one eye on American politics and react to this. I’m not gonna let the water just flow. I’m gonna intervene.”

At one point in our conversations, Lazar rattled off a sample of the 400 books he said he read in prison, sounding as much like a #Resistance Twitter addict as anything else: “James Comey, Andrew McCabe, Michael Hayden, James Clapper, all their biographies, which nobody reads, you know?”

While he still makes references to the deep state and “shadow governments” and malign influence of the Rockefeller family, he’s also quick to reference obscure FBI brass like Peter Strzok and Bill Priestap, paraphrase counterintelligence reports, or cite “Midyear Exam,” the Department of Justice probe into Clinton’s email practices.

It’s difficult to know if this more polished, better-read Lazar has become less conspiratorial, or whether the country that imprisoned him has become so much more so that it’s impossible to tell the difference. Lazar is a conspiracy theorist, it seems, in the same way everyone became after 2016.

Lazar, the free man, alluded to knowing that Guccifer was in over his head. He admitted candidly that he lied in an NBC News interview about having gained access to Clinton’s private email server, a claim he recanted during a later FBI interview, because he naively hoped the lie would grant him leverage to cut a better deal after his extradition. It didn’t, nor did his full cooperation with the FBI’s Clinton email probe.

When I asked Lazar whether he worried about the consequences of stealing the emails of the most famous people he could possibly reach, he said he believed creating celebrity for himself, anathema to most veteran hackers, would protect him from being disappeared by the state. In the end, it did not.

“At some point,” he said, “I lost control.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/01/15/guccifer-the-hacker-who-launched-clinton-email-flap-speaks-out-after-nearly-a-decade-behind-bars/feed/ 0 364665
Teenage iPhone Rebellion in Brooklyn https://www.radiofree.org/2023/01/15/teenage-iphone-rebellion-in-brooklyn-2/ https://www.radiofree.org/2023/01/15/teenage-iphone-rebellion-in-brooklyn-2/#respond Sun, 15 Jan 2023 02:10:35 +0000 https://dissidentvoice.org/?p=136943 Every Sunday about a dozen high school teenagers gather without their iPhones on a little hill in Prospect Park, Brooklyn, USA. They form a circle and quietly start to read serious books (Dostoevsky, Boethius) (paperbacks or hardbacks), or draw in sketchbooks, or just serenely sit listening to the wind. As the New York Times reporter […]

The post Teenage iPhone Rebellion in Brooklyn first appeared on Dissident Voice.]]>
Every Sunday about a dozen high school teenagers gather without their iPhones on a little hill in Prospect Park, Brooklyn, USA. They form a circle and quietly start to read serious books (Dostoevsky, Boethius) (paperbacks or hardbacks), or draw in sketchbooks, or just serenely sit listening to the wind.

As the New York Times reporter Alex Vadukul wrote last month these youngsters have had enough of the addictive Internet Gulag run by corporate incarcerators. “Social media and phones are not real life,” said Lola Shub a senior at Essex Street Academy. She expressed the group’s consensus: “When I got my flip phone, things instantly changed. I started using my brain. It made me observe myself as a person.”

Before peer group sanctions get to them, I’ve got to have a couple of these daily “self-liberators” on my Ralph Nader Radio Hour. This is a rebellion that needs support and diffusion.

These youngsters may not know the full extent of how corporate giants like Facebook, Instagram, and TikTok have broken up families. These corporate predators are separating millions of kids for 5 to 6 hours a day from their parents, communities and nature with iPhones and tablets.

Among the books in their satchels should be Susan Linn’s latest, Who’s Raising the Kids? Big Tech, Big Business, and the Lives of Children. These young mavericks would learn just how premeditated these company bosses are in tempting, seducing, then addicting youngsters and moving them into the Internet prison (en route to Zuckerberg’s mad metaverse). Marketing strategists use peer pressure and cultivate narcissistic behavior. Numerous studies and public hearings have shown the physical, mental and emotional harm done to children by relentless corporate hucksters’ direct marketing to them and bypassing parental authority and guidance.

A few other high school students in Manhattan and Brooklyn are joining this escape from the grip of commercial-driven “virtual reality” and connecting with the realities they will have to confront as they grow into adulthood.

The teenagers, who have formed the “Luddite Club”, are trying to liberate themselves in a world of technology that envelopes them without a framework of ethics and law.

They may gain further self-confidence and knowledge about the controlling processes around them by reading the “think-for-yourself” book – You Are Your Own Best Teacher! (in print only) by Claire Nader. Fifty-four topics will give young readers solid self-confidence and better classroom performance, and the book’s liberation exercises will spark their curiosity, imagination and intellect.

Curious young people may also want to follow the lawsuits against Facebook, TikTok, Snapchat and YouTube “which also operate social media products that cause similar injuries to adolescents.” The large law firm Beasley Allen in Montgomery, Alabama is “handling lawsuits for teenagers who became addicted to social media and suffered serious mental health consequences, including anxiety, depression, eating disorders, body dysmorphia, ADD/ADHD, self-harm and suicidal ideation.”

These lawyers have plenty of experts who will back them to make the connections between these affiliations and the deliberate actions driven by these greedy companies who know full well the consequences of their relentless drive for profits. Many of these executives restrict their own children’s Internet time. They know!

The post Teenage iPhone Rebellion in Brooklyn first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Ralph Nader.

]]>
https://www.radiofree.org/2023/01/15/teenage-iphone-rebellion-in-brooklyn-2/feed/ 0 364617
Fauci’s Lies, Self-driving Car Accidents, Assisted Suicide, and More https://www.radiofree.org/2023/01/14/faucis-lies-self-driving-car-accidents-assisted-suicide-and-more/ https://www.radiofree.org/2023/01/14/faucis-lies-self-driving-car-accidents-assisted-suicide-and-more/#respond Sat, 14 Jan 2023 16:01:08 +0000 https://dissidentvoice.org/?p=136913 Click here to read “7 Facts Fauci Knew But Hid From the Public” Click here to read more about this Tesla accident. Click here to read more about California’s descent into digital slavery. Here’s what Canada is trying to normalize: The Truth Barrier Daily Mail UK Reports: Two MDs In Canada Have Euthanized 700 People […]

The post Fauci’s Lies, Self-driving Car Accidents, Assisted Suicide, and More first appeared on Dissident Voice.]]>

Click here to read “7 Facts Fauci Knew But Hid From the Public”


Click here to read more about this Tesla accident.


Click here to read more about California’s descent into digital slavery.


Here’s what Canada is trying to normalize:

The Truth Barrier

“In 2021, only 486 people died using California’s assisted suicide program, but that same year in Canada, 10,064 used MAID to die that year. MAID has now grown so popular that Canada has both anti-suicide hotlines to try and stop people killing themselves, as well as pro-suicide hotlines for people wanting to end their lives…

“Dr. Kathryn Edwards, a well-known vaccinologist who served on the data monitoring committee charged with ensuring the safety and efficacy of the Pfizer-BioNTech COVID-19 vaccine, previously worked as a paid consultant and advisor to Pfizer.”

Read the full article here.

The post Fauci’s Lies, Self-driving Car Accidents, Assisted Suicide, and More first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Mickey Z..

]]>
https://www.radiofree.org/2023/01/14/faucis-lies-self-driving-car-accidents-assisted-suicide-and-more/feed/ 0 364553
‘Big Tech’ Regulation Must Address Data Use in Criminal Investigations https://www.radiofree.org/2023/01/13/big-tech-regulation-must-address-data-use-in-criminal-investigations/ https://www.radiofree.org/2023/01/13/big-tech-regulation-must-address-data-use-in-criminal-investigations/#respond Fri, 13 Jan 2023 23:03:42 +0000 https://innocenceproject.org/?p=42510 Whether it’s scrolling on your smartphone, sharing content on social media, or using facial scanners at travel points, every digital interaction generates data. What many don’t realize is that data — which can include

The post ‘Big Tech’ Regulation Must Address Data Use in Criminal Investigations appeared first on Innocence Project.

]]>
Whether it’s scrolling on your smartphone, sharing content on social media, or using facial scanners at travel points, every digital interaction generates data. What many don’t realize is that data — which can include information about your location, relationships, and even physical features — is turned over to private companies and the government without their knowledge.

“Big Tech” can use this data to profit off our private information or make us vulnerable to manipulation, exploitation, or abuse. Citing these vulnerabilities, President Biden called for Congress to take action in a Wall Street Journal op-ed on Wednesday.

“We’ve heard a lot of talk about creating committees. It’s time to walk the walk and get something done,” he wrote.

It’s true, the time for regulation to prevent exploitation by “Big Tech” is overdue — but it’s not just “Big Tech” in and of itself we should be concerned about, but also its applications. It’s crucial to consider how law enforcement and the government also can use our data without our consent in ways that can increase the risk of wrongful accusations, arrests, and convictions.

The Problem With Big Data Technologies

Big data technologies can create serious risk of wrongful conviction when applied as surveillance tools in criminal investigations. These technologies are often deployed before being fully tested and have already been proven to have disparate impacts on people of color. For example, the use of facial recognition technology has been increasing, despite being known to misidentify people of color at higher rates. Such technology has led to the wrongful arrests of at least four innocent Black people.

Surveillance technology that uses algorithmic tools may weaponize information about a person’s identity, behavior, and relationships against them — even when that information is inaccurate. Cristian Diaz Ortiz, an El Salvadorian teenager awaiting asylum, was arrested and slated for deportation after he was wrongly labeled a member of the international criminal gang MS-13 and included in a gang database. Law enforcement categorized him as a gang member based on algorithmic inferences because he had been “hanging out with friends around his neighborhood.”

Even if a surveillance technology is accurate, it can still increase the risk of wrongful arrest by distorting suspect development. By their nature, big data-driven tools cast a wide net and can generate a pool of potential suspects that includes innocent people.

In doing so, they can lead law enforcement to focus their investigations on innocent people. In 2018, Jorge Molina was arrested for a murder he did not commit after a new technology described as a “Google dragnet” found that Mr. Molina had been logged into his email on a device near the location of the murder. The device belonged to someone else and had been near the murder location, though Mr. Molina never was.

Once an innocent person is singled out and becomes a person of interest, tunnel vision can set in to the point where even powerful exculpatory evidence won’t shake an investigator’s belief in an innocent person’s guilt. The day after Mr. Molina’s arrest, a detective told the district attorney’s office that it was “highly unlikely” that he had committed the murder, yet Mr. Molina was not released for several more days.

This kind of investigatory tunnel vision has serious real world implications. For example, exoneration data shows that pre-trial exculpatory DNA results were explained away or dismissed in nearly 9% of the 325 DNA exonerations in the United States between 1989 and 2014.

Investigative technologies like these are still unregulated in the United States. Not only are there no requirements for how rigorously they must be tested before being deployed, there also are no rules ensuring full disclosure around them.

This means that people charged with a crime might not be told what technologies police used to identify them. And even if they do know which technologies were used, they may not have access to the information about how the tool works or what data was used in their case. Because so many of these technologies are proprietary, defendants are not allowed access to the source code and even basic information about the data usage and processing while mounting their legal defense.

Congress Must Take Action

We agree with President Biden that it’s time to set limits. And while the president emphasized the need for “clear limits on how companies can collect, use and share highly personal data — your internet history, your personal communications, your location, and your health, genetic and biometric data,” we believe Congress must go a step further.

Congress must make explicit in its anticipated bill that it will regulate how investigative tools are used in criminal investigations to protect people’s data and prevent wrongful convictions, including how data may or may not be collected, used, or stored in those investigations. Doing so would ensure the just application of algorithmic technologies far more efficiently than piecemeal regulation of individual technologies — especially given the constant proliferation of new tools.

Once a company or a government agency extracts data about your physical traits, location, or identity, that information is theirs forever and can be used by them in perpetuity. Without regulation, we can’t fully protect people — and in particular, vulnerable communities and historically criminalized communities — from data harms.

President Biden is right about this: We must take action to protect our data. And we look forward to working with Congress to advance equity in data privacy and protections in the criminal legal system to ensure their simultaneous contributions to public safety, strengthening communities, and the just and equitable administration of justice.

The post ‘Big Tech’ Regulation Must Address Data Use in Criminal Investigations appeared first on Innocence Project.


This content originally appeared on Innocence Project and was authored by Dani Selby.

]]>
https://www.radiofree.org/2023/01/13/big-tech-regulation-must-address-data-use-in-criminal-investigations/feed/ 0 364459
Exclusive: Surveillance Footage of Tesla Crash on SF’s Bay Bridge Hours After Elon Musk Announces “Self-Driving” Feature https://www.radiofree.org/2023/01/10/exclusive-surveillance-footage-of-tesla-crash-on-sfs-bay-bridge-hours-after-elon-musk-announces-self-driving-feature/ https://www.radiofree.org/2023/01/10/exclusive-surveillance-footage-of-tesla-crash-on-sfs-bay-bridge-hours-after-elon-musk-announces-self-driving-feature/#respond Tue, 10 Jan 2023 16:22:15 +0000 https://theintercept.com/?p=418793

Highway surveillance footage from Thanksgiving Day shows a Tesla Model S vehicle changing lanes and then abruptly braking in the far-left lane of the San Francisco Bay Bridge, resulting in an eight-vehicle crash. The crash injured nine people, including a 2-year-old child, and blocked traffic on the bridge for over an hour.

The video and new photographs of the crash, which were obtained by The Intercept via a California Public Records Act request, provides the first direct look at what happened, confirming witness accounts of what happened at the time. The driver told police that he had been using Tesla’s new “Full Self-Driving” feature, the report notes, before the Tesla’s “left signal activated” and its “brakes activated,” and it moved into the left lane, “slowing to a stop directly in [the second vehicle’s] path of travel.”


Just hours before the crash, Tesla CEO Elon Musk had triumphantly announced that Tesla’s Full Self-Driving capability was available in North America, congratulating Tesla employees on a “major milestone.” By the end of last year, Tesla had rolled out the feature to over 285,000 people in North America, according to the company.

The National Highway Traffic Safety Administration, or NHTSA, has said that it is launching an investigation into the incident. Tesla vehicles using its Autopilot driver assistance system — Full Self-Driving mode has an expanded set of features atop Autopilot — were involved in 273 known crashes from July 2021 to June of last year, according to NHTSA data. Teslas accounted for almost 70 percent of 329 crashes in which advanced driver assistance systems were involved, as well as a majority of fatalities and serious injuries associated with them, the data shows. Since 2016, the federal agency has investigated a total of 35 crashes in which Tesla’s “Full Self-Driving” or “Autopilot” systems were likely in use. Together, these accidents have killed 19 people.

In recent months, a surge of reports have emerged in which Tesla drivers complained of sudden “phantom braking,” causing the vehicle to slam on its brakes at high speeds. More than 100 such complaints were filed with NHTSA in a three-month period, according to the Washington Post.

The child injured in the crash was a 2-year-old who suffered an abrasion to the rear left side of his head as well as a bruise, according to the incident detail report obtained by The Intercept. In one photograph of the crash, a stroller is parked in front of the car in which the child was injured.

An eight-car pile-up on November 24, 2022 on San Francisco’s Bay Bridge.

An eight-car pile-up on Nov. 24, 2022, on San Francisco’s Bay Bridge.

Photo: California Highway Patrol


As traditional car manufacturers enter the electric vehicle market, Tesla is increasingly under pressure to differentiate itself. Last year, Musk said that full self-driving was an “essential” feature for Tesla to develop, going as far as saying, “It’s really the difference between Tesla being worth a lot of money or worth basically zero.”

The term “Full Self-Driving” has been criticized by other manufacturers and industry groups as misleading and even dangerous. Last year, the autonomous driving technology company Waymo, owned by Google’s parent company, announced that it would no longer be using the term.

“Unfortunately, we see that some automakers use the term ‘self-driving’ in an inaccurate way, giving consumers and the general public a false impression of the capabilities of driver assist (not fully autonomous) technology,” Waymo wrote in a blog post. “That false impression can lead someone to unknowingly take risks (like taking their hands off the steering wheel) that could jeopardize not only their own safety but the safety of people around them.”

Though Waymo doesn’t name any names, the statement was “clearly motivated by Musk’s controversial decision to use the term ‘Full Self Driving,’” according to The Verge.

Along the same lines, the premier lobbying group for self-driving cars recently rebranded from the “Self-Driving Coalition for Safer Streets” to the “Autonomous Vehicle Industry Association.” The change, the industry group said, reflected its “commitment to precision and consistency in how the industry, policymakers, journalists and the public talk about autonomous driving technology.”

Secretary of Transportation Pete Buttigieg has also been critical of the emerging driver assistance technologies, which he stresses have not replaced the need for an alert human driver. “I keep saying this until I’m blue in the face: anything on the market today that you can buy is a driver assistance technology, not a driver replacement technology,” Buttigieg said. “I don’t care what it’s called. We need to make sure that we’re crystal clear about that — even if companies are not.”

Though the language may be evolving, there are still no federal restrictions on the testing of autonomous vehicles on public roads, though states have imposed limits in certain cases. Tesla has not announced any changes to the program or its branding, but the crash was one of multiple that month. Several days prior to the Bay Bridge accident, on November 18 in Ohio, a Tesla Model 3 crashed into a stopped Ohio State Highway Patrol SUV which had its hazard lights flashing. The Tesla is likewise suspected of having been in self-driving mode and is also being investigated by NHTSA.

NHTSA is also investigating a tweet by Musk in which he said that Full Self-Driving users would soon be given the option to turn off reminder notifications for drivers to keep their hands on the steering wheel. “Users with more than 10,000 miles on FSD Beta should be given the option to turn off the steering nag,” a Twitter user posted on New Year’s Eve, tagging Musk.

“Agreed, update coming in Jan,” Musk replied.

Additional reporting by Beth Bourdon.


This content originally appeared on The Intercept and was authored by Ken Klippenstein.

]]>
https://www.radiofree.org/2023/01/10/exclusive-surveillance-footage-of-tesla-crash-on-sfs-bay-bridge-hours-after-elon-musk-announces-self-driving-feature/feed/ 0 363450
Those Russian Twitter Bots Didn’t Do $#!% in 2016, Says New Study https://www.radiofree.org/2023/01/10/those-russian-twitter-bots-didnt-do-in-2016-says-new-study/ https://www.radiofree.org/2023/01/10/those-russian-twitter-bots-didnt-do-in-2016-says-new-study/#respond Tue, 10 Jan 2023 14:00:33 +0000 https://theintercept.com/?p=418772

Since the 2016 presidential election, the notion that the Russian government somehow “weaponized” social media to push voters to Donald Trump has been widely taken as a gospel in liberal circles. A groundbreaking recent New York University study, however, says there’s no evidence Russian tweets had any meaningful effect at all.

“We demonstrate, first, that exposure to Russian disinformation accounts was heavily concentrated: only 1% of users accounted for 70% of exposures,” the scholars wrote in the journal Nature Communications. “Second, exposure was concentrated among users who strongly identified as Republicans. Third, exposure to the Russian influence campaign was eclipsed by content from domestic news media and politicians. Finally, we find no evidence of a meaningful relationship between exposure to the Russian foreign influence campaign and changes in attitudes, polarization, or voting behavior.”

The research, conducted by NYU’s Center for Social Media and Politics, is a rare counter to what’s become the prevailing media narrative of the post-2016 era: that social platforms like Twitter were and will continue to be wielded by malicious foreign actors to interfere with American political outcomes.

Most importantly, according to the study, based on a longitudinal survey of roughly 1,500 Americans and an analysis of their Twitter timelines, “the relationship between the number of posts from Russian foreign influence accounts that users are exposed to and voting for Donald Trump is near zero (and not statistically significant).”

That Russian intelligence attempted to influence the 2016 election, broadly speaking, is by now well documented; the idea that the propagandizing amounted to anything other than headlines and congressional hearings, however, is little more than an article of faith. While their impact remains debated among scholars, the specter of “Russian bots” wreaking havoc across the web has become a byword of liberal anxiety and a go-to explanation for Democrats flummoxed by Trump’s unlikely victory.

The NYU study found that Russia’s Twitter campaign had no effect in part because barely anyone saw it. Moreover, to the extent anyone ever saw the Russian tweets, it was people who weren’t going to be easily influenced anyway: “[T]hose who identified as ‘Strong Republicans’ were exposed to roughly nine times as many posts from Russian foreign influence accounts than were those who identified as Democrats or Independents.”

After 2016, as platforms like Twitter rushed to scrub networks of Russian accounts based on the premise they were inherently harmful, Sen. Mark Warner, D-Va., characterized Russian tweets as a full-blown national security crisis. Following a September 2017 congressional hearing on Russian social media meddling, Warner described Twitter’s testimony as “deeply disappointing,” and decried an “enormous lack of understanding from the Twitter team of how serious this issue is, the threat it poses to democratic institutions, and again begs many more questions than they offered.”

This stance became a popular stance among Russia hawks and Trump foes. A year later, Rep. Adam Schiff, D-Calif., tweeted, “Russian troll accounts were still active on Twitter as recently as this year, interfering in our politics. We will continue to expose this malign online activity so Americans can see first-hand the tools Russia uses to divide us.”

Panic over Russian tweets and the belief they might swing elections spread throughout Congress, academia, business, and the U.S. intelligence community. A cottage industry spouted up to combat what Facebook termed “Coordinated Inauthentic Behavior” — an industry that lives on today.

Crucially, the report focused only on tweets, so the possible effect of Facebook groups, Instagram posts, or, say, the spread of materials hacked from the Democratic National Committee was left unassessed. The report nonetheless serves as a gentle evidence-based corrective to societal fears of low-effort social media propagandizing as some diabolical tool of adversarial regimes.

Russian tweets, the authors note, were a small speck when compared to homegrown posters. “Despite the seemingly large number of posts from Internet Research Agency accounts in respondents’ timelines,” the report says, “they are overshadowed—by an order of magnitude—by posts from national news media and politicians.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2023/01/10/those-russian-twitter-bots-didnt-do-in-2016-says-new-study/feed/ 0 363452
What to Know About Cellphone Radiation https://www.radiofree.org/2023/01/04/what-to-know-about-cellphone-radiation/ https://www.radiofree.org/2023/01/04/what-to-know-about-cellphone-radiation/#respond Wed, 04 Jan 2023 10:00:00 +0000 https://www.propublica.org/article/what-to-know-about-cellphone-radiation by Peter Elkind

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

To many people, the notion that cellphones or cell towers might present a health risk long ago receded into a realm somewhere between trivial concern and conspiracy theory. For decades, the wireless industry has dismissed such ideas as fearmongering, and federal regulators have maintained that cellphones pose no danger. But a growing body of scientific research is raising questions, with the stakes heightened by the ongoing deployment of hundreds of thousands of new transmitters in neighborhoods across America. ProPublica recently examined the issue in detail, finding that the chief government regulator, the Federal Communications Commission, relies on an exposure standard from 1996, when the Motorola StarTAC flip phone was cutting edge, and that the agency brushed aside a lengthy study by a different arm of the federal government that found that cellphone radiation caused rare cancers and DNA damage in lab animals. The newest generation of cellphone technology, known as 5G, remains largely untested.

Here’s what you need to know:

Do cellphones give off radiation?

Yes. Both cellphones and wireless transmitters (which are mounted on towers, street poles and rooftops) send and receive radio-frequency energy, called “nonionizing radiation.” The amount of this radiation absorbed by the human body depends on how close a person is to a phone and a cell transmitter, as well as the strength of the signal the phone needs to connect with a transmitter. Cellphones displaying fewer bars, which means their connection with a transmitter is weak, require stronger power to communicate and so produce more radiation. Wireless transmitters, for their part, emit radiation continually, but little of that is absorbed unless a person is very close to the transmitter.

What does the science say about this? Is it harmful?

That’s the multibillion-dollar question. Government-approved cellphones are required to keep radiation exposure well below levels that the FCC considers dangerous. Those safeguards, however, have not changed since 1996, and they focus exclusively on the unlikely prospect of “thermal” harm: the potential for overheating body tissue, as a microwave oven would. The government guidelines do not address other potential forms of harm.

But a growing body of research has found evidence of health risks even when people are exposed to radiation below the FCC limits. The array of possible harms ranges from effects on fertility and fetal development to associations with cancer. Some studies of people living near cell towers have also confirmed an array of health complaints, including dizziness, nausea, headaches, tinnitus and insomnia, from people identified as having “electromagnetic hypersensitivity.”

The most sensational — and hotly debated — health fear about wireless radiation is cancer. In 2011, the International Agency for Research on Cancer, an arm of the World Health Organization, cited troubling but uncertain evidence in classifying wireless radiation as “possibly carcinogenic to humans.” In 2018, a study by the federal government that was nearly two decades in the making found “clear evidence” that cellphone radiation caused cancer in lab animals. A major study in Italy produced similar results.

Do cellphones pose any special health risks for kids?

Some experts say they do, citing studies suggesting children’s thinner, smaller skulls and developing brains leave them more vulnerable to the effects of cellphone radiation. The American Academy of Pediatrics embraces this concern and has for years urged the FCC to revisit its radiation standards, saying they don’t adequately protect kids. More than 20 foreign governments, as well as the European Environment Agency, urge precautionary steps to limit wireless exposure, especially for children.

What about risks in pregnancy?

A Yale study found hyperactivity and reduced memory in mice exposed to cellphone radiation in the womb, consistent with human epidemiological research showing a rise in behavioral disorders among children who were exposed to cellphones in the womb. Dr. Hugh Taylor, the author of the mouse study and chair of the obstetrics, gynecology and reproductive sciences department at the Yale School of Medicine, told ProPublica: “The evidence is really, really strong now that there is a causal relationship between cellphone radiation exposure and behavior issues in children.”

What does the U.S. government say about cellphone radiation?

The key federal agencies — the FCC and the Food and Drug Administration — have echoed the wireless industry and a number of other groups in rejecting evidence of any “nonthermal” human health risk, saying it remains unproven. The government websites also reject the claim that children face any special risk.

In 2019, during the administration of President Donald Trump, the FCC shut down a six-year review of its 1996 wireless-radiation safety standards. The agency rejected pleas to make the standards more stringent, saying it had seen no evidence its safeguards were “outdated or insufficient to protect human safety.” In 2021, however, a federal appeals court ordered the FCC to revisit the issue, saying the agency had ignored evidence of an array of noncancer harms to humans, animals and the environment, and that its decision to uphold its exposure standard failed to meet “even the low threshold of reasoned analysis.” The FCC has taken no formal action since then.

Why is the issue not resolved?

Determining wireless radiation’s health effects with certainty is difficult. Researchers cannot ethically subject people to endless hours of cellphone radiation to gauge the results. Scientists have to rely on alternatives such as animal studies or epidemiological research, where challenges include getting subjects to accurately recount their wireless use and pinpointing the specific causes of disease or harm. Many health effects of toxic exposure, especially cancer, take years or decades to appear. And the mechanisms of how wireless radiation could affect the body at the cellular level are poorly understood.

Research funding on the issue has also been scarce in the U.S., despite frequent calls for more study. Research (and researchers) raising health concerns have come under sharp attack from industry, and government regulators have remained skeptical. A key FDA official, for example, dismissed the relevance of the federal study that found “clear evidence” of cancer in lab animals, saying it wasn’t designed to test the safety of cellphone use in humans, even though his agency had commissioned the research for that reason.

Linda Birnbaum, who led the federal agency that conducted the cellphone study, said that while proof of harm remains elusive, what is known means that precautions are merited. “Do I see a smoking gun? Not per se,” she told ProPublica. “But do I see smoke? Absolutely. There’s enough data now to say that things can happen. … Protective policy is needed today. We really don’t need more science to know that we should be reducing exposures.”

If I’m concerned about the risk, are there precautions I can take to protect myself and my family?

Because exposure varies dramatically with your proximity to the source of the radiation, experts say a key to minimizing risk is increasing your distance from the phone. This means keeping any cellphone that’s turned on away from direct contact with your body. Don’t keep it in your bra, in your pocket or (especially if you’re pregnant) against your abdomen, they say. And instead of holding the phone against your head when you talk, use a speaker or wired earphones. (Wireless headsets, such as AirPods, also emit some radiation.) Try to avoid making calls when the phone is telling you the signal is weak because that boosts the radiation level. You can also limit exposure by simply reducing how much time you spend talking on your cellphone and texting instead, they say. Using an old-fashioned landline avoids the problem altogether.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Peter Elkind.

]]>
https://www.radiofree.org/2023/01/04/what-to-know-about-cellphone-radiation/feed/ 0 361863
Human Rights Expert Sounds Alarm Over Israeli Firm’s ‘Dystopian’ Video-Altering Tech https://www.radiofree.org/2022/12/27/human-rights-expert-sounds-alarm-over-israeli-firms-dystopian-video-altering-tech/ https://www.radiofree.org/2022/12/27/human-rights-expert-sounds-alarm-over-israeli-firms-dystopian-video-altering-tech/#respond Tue, 27 Dec 2022 16:34:14 +0000 https://www.commondreams.org/news/israeli-spyware-toka

A human rights attorney raised alarm Monday over the expansion plans of Toka, an Israeli cyber firm that sells hacking technologies capable of finding, accessing, and manipulating security and smart camera footage.

Co-founded by former Israeli Prime Minister Ehud Barak and former Israel Defense Forces (IDF) cyber chief Yaron Rosen, Toka "sells technologies that allow clients to locate security cameras or even webcams within a given perimeter, hack into them, watch their live feed, and even alter it—and past recordings," Haaretzreported, citing internal documents it obtained and reviewed with a technical expert.

"One can imagine video being manipulated to incriminate innocent citizens or shield guilty parties."

The company, whose activities are overseen by the Israeli Defense Ministry, "was set up in 2018 and has offices in Tel Aviv and Washington," Haaretz reported. "It works solely with state clients in government, intelligence bodies, and law enforcement agencies, almost exclusively—but not just—in the West. According to the internal documents, as of 2021, the company had contracts with Israel valued at $6 million, and had also planned an 'expansion of existing deployment' in Israel."

Toka can tap into web-connected cameras found virtually everywhere—intersections, parking lots, malls, hotels, airports, and even homes. Haaretz compared the firm's "cyberoffense" capabilities to the 2001 heist movie Ocean's Eleven.

In that film, an "elite crew led by George Clooney and Brad Pitt hack the closed-circuit TV system of the Las Vegas casino vault they are trying to break into, diverting its feed to a mock safe they built in a nearby warehouse," the outlet noted.

Haaretz continued:

Twenty years on, this is no longer the stuff of movies: Toka's tech allows clients to do just that and more—not just diverting a live feed but also altering old feeds and erasing any evidence of a covert op.

Technical documents reviewed by an ethical hacker prove that Toka's tech can alter both live and recorded video feeds—all without leaving any forensics or telltale signs of a hack (in contrast to NSO's Pegasus spyware, or Intellexa's Predator, which leave a digital fingerprint on targeted devices).

"These are capabilities that were previously unimaginable," human rights lawyer Alon Sapir told the outlet. "This is a dystopian technology from a human rights perspective. Just its mere existence raises serious questions."

"One can imagine video being manipulated to incriminate innocent citizens or shield guilty parties that are close to the system, or even just manipulative editing for ideological or even political purposes should it fall into the wrong hands," said Sapir.

From a legal perspective, "intelligence collection is a sensitive issue," Sapir explained. "Despite a lack of legislation, the police deploy mass surveillance means they may not be fully authorized to use: technology like the HawkEye system, which no one knew about until the media revealed its existence."

While manipulated videos are inadmissible as evidence in Israeli courts, Sapir noted that "a scenario in which someone is accused of something and doesn't know if the evidence presented against them is real or not is truly dystopian. The current law does not begin to address situations like these."

People living in the Occupied Palestinian Territories are especially vulnerable to abuse.

"Take for example the Blue Wolf facial recognition technology, used by the IDF to keep track of Palestinians," said Sapir. "The West Bank is Israel's defense establishment testing ground—and a scenario in which Toka's tech is deployed unbeknownst to anyone is simply terrifying."

"There have been cases in which video evidence helped refute false claims made by settlers and soldiers, and helped save innocent Palestinians from jail," he added. "We've also seen cases in which video evidence has been tampered with in the past."


This content originally appeared on Common Dreams and was authored by Kenny Stancil.

]]>
https://www.radiofree.org/2022/12/27/human-rights-expert-sounds-alarm-over-israeli-firms-dystopian-video-altering-tech/feed/ 0 360464
A Competitor Put the FBI on Haoyang Yu’s Trail. The Investigation Didn’t Go as Planned. https://www.radiofree.org/2022/12/22/a-competitor-put-the-fbi-on-haoyang-yus-trail-the-investigation-didnt-go-as-planned/ https://www.radiofree.org/2022/12/22/a-competitor-put-the-fbi-on-haoyang-yus-trail-the-investigation-didnt-go-as-planned/#respond Thu, 22 Dec 2022 15:32:34 +0000 https://theintercept.com/?p=417534

Paul Blount started small. When he set up a semiconductor chip company in his basement in 2006, he was the only employee. He had spent a decade at the chip behemoth Hittite Microwave Corporation, and he saw room in the market for a boutique design outfit.

About a decade later, a man named Haoyang Yu did almost exactly the same thing, setting up his own lean chip company, Tricon, in Lexington, Massachusetts, just 30 miles from Blount’s home. A tipster, whom Blount would later acknowledge was linked to his company, went to the Federal Bureau of Investigation, writing that their new competitor “smells a bit fishy.”

The tipster said it was suspicious that no one in their orbit had heard of Yu. “None of us here know this person or this company and there is 100% no way that they could come up with this product line in 6 months,” wrote the tipster. Both Yu and Blount marketed tiny, mass-produced chips called monolithic microwave integrated circuits, or MMICS, which can be used in everything from cellphones to military radar systems. Some MMICs are under export controls, which means that they can only be sent to certain end users and destinations with a license from the Commerce Department. Without evidence, the tipster hinted that Tricon might be violating export control regulations. “They are most likely reselling someone else’s part and what makes me nervous is that at least one is 3A001.b.2.d part,” the tipster wrote, referring to an export control classification number covering certain MMIC chips.

Yu, who also goes by Jack, was in fact no stranger to the industry. He had moved to Amherst in 2002 to study engineering at the University of Massachusetts Amherst. After graduation he stayed in New England, eventually settling in Lexington with his wife and two young children. He worked at Hittite after Blount left, staying on after the company was acquired by Analog Devices in 2014. The year Yu started Tricon, he left Analog to work as a software engineer at a company that counts MMIC makers among its clients. At one point, he had even visited Blount’s company, Custom MMIC, to demonstrate software to a group that included Blount.

Nonetheless, the tip to the FBI set off a cascade of events that would upturn Yu’s world. Investigators came to see him as a national security threat, zeroing in on what they imagined were unsavory links to China, where Yu, now a U.S. citizen, was born. They mounted a secret camera on a pole outside his house and enlisted the local trash company to set aside his family’s garbage after collecting it so agents could covertly rifle through it. In May, after spending five nights in jail, three months with a clunky ankle bracelet tracking his movements, and over two and a half years in legal limbo, he stood trial for a slew of felonies, including export control violations, immigration fraud, and wire fraud. Prosecutors also accused Yu’s wife, Yanzhi Chen, of wire fraud after she refused to cooperate.

Then, just as quickly as it had come together, the case against the couple seemed to unravel. The U.S. government largely failed to convince a Boston jury, which in June acquitted Yu on 18 of 19 counts. Shortly after the trial, U.S. Attorney for the District of Massachusetts Rachael Rollins dropped all charges against Chen, saying in a statement that the decision was a result of a “continuing assessment of the evidence.”

Early on in the investigation, a Defense Counterintelligence and Security Agency agent labeled Haoyang Yu as a national security threat.

Early on in the investigation, a Defense Counterintelligence and Security Agency agent labeled Haoyang Yu as a national security threat.

Screenshot: The Intercept/United States District Court


Court documents reveal a series of missteps, including a confounding export control classification and a failed sting operation. The lone charge of which Yu was ultimately convicted, possessing stolen trade secrets, had no connection to China.

“There were so many mistakes,” Chen told The Intercept recently. “We have had three very dark years.”

What prosecutors did have was evidence that Yu had transferred prototype chip design files onto his Google Drive while working at Analog Devices, naming two of the files Pikachu and Dragonair after Pokémon characters. Analog later abandoned the prototypes, some of which Yu had worked with while at the company, and in all but one case, the jury was unconvinced that the designs constituted trade secrets.

Yu’s lawyers contend that such a case would have normally been dealt with through a low-stakes civil lawsuit filed by Analog Devices. That didn’t happen, they argue, because of Yu’s ethnicity. “Yes, he had some files on his computer that should have been deleted,” said Yu’s attorney William Fick of Fick & Mark in his closing statement at trial. But for the U.S. government, “[i]f you are a hammer, everything looks like a nail.”

“The root problem behind a specific set of cases remains: the way that our own government still sees foreignness as a threat.”

Federal prosecutors, working closely with the FBI and large corporations, have brought dozens of cases over the last decade involving alleged technology theft by China. In 2018, amid rising tensions with Beijing, then-Attorney General Jeff Sessions gave the crackdown a name: the China Initiative. The initiative was scrapped earlier this year, following concerns from the American Civil Liberties Union and Asian American advocacy groups that it entailed racial profiling, but the biases that contributed to the program’s downfall endure, activists say. “The root problem behind a specific set of cases remains: the way that our own government still sees foreignness as a threat,” said Aryani Ong, co-founder of Asian American Federal Employees for Nondiscrimination. FBI Director Christopher Wray said in January that the bureau has over 2,000 open investigations involving China and technology. And perhaps no technology is more pivotal to geopolitical strategy than semiconductor chips, which are essential components of electronic devices and important to breakthroughs in computing.

“MMICs have cutting-edge military applications ranging from electronic warfare to signals intelligence to military communications,” said Emily de La Bruyère, a co-founder of Horizon Advisory, a consulting firm focused on China. “China and the U.S. are locked in a battle — not just for advanced semiconductor technology, but also for influence over the global semiconductor value chain.” In just the past few months, President Joe Biden signed into law the CHIPS Act, which is aimed at strengthening domestic semiconductor chip manufacturing, and the Commerce Department unveiled unprecedented new restrictions on the sale of semiconductor technology to entities within China. Last week, Reuters reported that the Chinese government was readying an infusion of 1 trillion yuan ($143 billion) into its semiconductor industry.

Convictions in China Initiative and related cases have led to years of prison time. But many cases have fallen apart because prosecutors made inappropriate leaps, activists say.

“We are deeply concerned that the Yu case is yet another continuation of biased targeting policies and practices,” said Jeremy Wu, founder of APA Justice Task Force, a group formed in the wake of several botched prosecutions of Chinese American scientists. “His case exemplifies another tragic ordeal.”

For Yu and Chen, the ordeal is not yet over. For his sole conviction, Yu now faces up to 10 years in prison and a $250,000 fine. His lawyers are trying to get the charge thrown out ahead of sentencing, arguing that prosecutors inflated a workplace dispute into a national security threat and that the entire investigation was tainted by bias. A judge will soon rule on whether the government is selectively enforcing the law by targeting Yu for his ethnicity, in violation of the U.S. Constitution.

Yu, his lawyers, and a spokesperson for the U.S. attorney’s office in Boston declined to comment for this story, citing ongoing legal proceedings. When asked about the case by phone, Blount declined to comment and quickly hung up.

Haoyang Yu at Boston Veterans day parade 2022.

Haoyang Yu at the Boston Veterans Parade in November 2022.

Photo: Courtesy of Yanzhi Chen

“We Make Business”

Chen and Yu met online in the early aughts, when they were students pursuing graduate degrees in different parts of the United States. He was from the north of China, and she was from the south. He struck her as whip-smart and diligent, and after dating long-distance for a year, they married and settled in New England. They had two kids, and Chen stayed home to raise them while Yu worked as an engineer.

In 2013, they moved to Lexington for its excellent public schools, buying a house on a quiet street near the town’s Great Meadow. They grew to love the historic Boston suburb, which two and a half centuries after the outbreak of the Revolutionary War is now a wealthy bedroom community with a large Asian American population. Chen volunteered at her kids’ school and for local groups, and at her urging, Yu ran unsuccessfully for a seat on Lexington’s Town Meeting.

Initially, Chen told The Intercept, Yu’s goals for Tricon were modest. Yu registered the company in Chen’s name — a structure sometimes used to protect assets — and listed a box at a nearby UPS Store as the company’s mailing address. Business was slow. Chen advised him to focus on recouping his investment, not turning a profit. Since Yu was happiest when he was busy, she said she recommended the Town Meeting candidacy partly as a distraction.

“I never expected it to bring so much trouble,” she said of Tricon.

The investigation into Yu began in earnest a month after the complaint linked to Blount, when the Defense Counterintelligence and Security Agency received a second tip about Tricon. A DCSA agent compiled an internal report, which was later entered into the court record, describing the second tipster as a government contractor with a security clearance. The contractor speculated that Yu “could be using” the contractor’s “products pictures and datasheets to market for HIS own company.” The agent labeled the report as involving foreign intelligence, China, and a “person reasonably believed to be an officer or employee of, or otherwise acting on behalf of, a foreign power” — presumably, Yu.

MMIC is often pronounced “mimic,” and copying competitors’ products is common in the chip industry, as are allegations of theft. Shortly before the tipster went to the FBI, Yu’s previous employer Analog Devices had accused three former employees of taking proprietary material upon leaving the company. That case took the form of a lawsuit against the former employees’ new workplace, Macom, and the matter was handled in civil court, with Analog paying its own legal fees. It quickly ended in a settlement.

But Yu’s case was different. Because the U.S. government alleged that it involved a potential national security threat, four federal intelligence agencies conducted the sprawling 18-month investigation. And while Analog Devices provided information, federal prosecutors ultimately decided which charges to press, and U.S. taxpayers covered the ballooning investigative and legal costs.

Agents from the FBI, Department of Homeland Security, Commerce Department, and U.S. Navy worked together to bring down a man they envisioned as a sophisticated technological spy.

Agents from the FBI, Department of Homeland Security, Commerce Department, and U.S. Navy worked together to bring down a man they envisioned as a sophisticated technological spy. In addition to putting Yu under surveillance, they followed Chen around town as she drove their kids to and from sports practices and obtained a search warrant to comb through Yu’s email accounts.

From the start, the U.S. government’s investigation didn’t go quite as planned. Early on, an undercover agent with DHS’s Homeland Security Investigations force wrote to Yu, posing as representative of a potential buyer named “XY Atallah” from Jordan. The agent asked about a chip with specifications close to those that fall under export controls. “If good price, we can make business,” he wrote. The agent repeated the stereotypical phrase in a follow-up email the next day: “We make business.”

Yu suggested lower-frequency chips that could be legally exported to Jordan without a license. When the undercover agent posing as Atallah declined, insisting on the higher-frequency chip and saying he could pay upfront, Yu walked away from the deal. Agents also found emails that Yu had exchanged with a potential buyer in Spain. After the buyer asked about controlled chips, Yu noted that he did not have an export license for the products and asked if the buyer had a licensed representative in the United States — a legal way of moving the product overseas, provided that Spain was the final destination. That deal didn’t go through, either.

Nor did the investigation uncover solid evidence of crimes involving China. In March 2019, an HSI agent alleged in an internal report that Yu had stolen designs and technical data from his former employer to produce his own MMIC chips and sell them to entities in China in violation of export control regulations. The agent also contended that Yu had consulted for a Chinese company, claiming that the payment was evidence of “additional export violations to China.” Eventually, though, the government dropped both allegations.

The HSI agent also claimed that Tricon had illegally exported one chip without seeking an export license. But a semiconductor industry expert hired by Yu’s lawyers would later show that the relevant export control classification had only been issued at the request of an investigator after Yu came under scrutiny.

Companies that suspect their technology or designs have been taken generally “want to set an example for their own employees,” said Matthew Brazil, a former export controls official and resident fellow at the Jamestown Foundation focused on Chinese intelligence operations, after reviewing some of the court documents in Yu’s case. “That’s often a corporate response. But it’s not clear where the espionage component was in this case.” (Yu was never charged with espionage, but the U.S. government has in the past charged export control violations in cases alleged to involve spying or technology transfer.)

“It backfired because they turned non-criminal cases into criminal cases. And that never ends well.”

One reason that investigators pressed the national security angle may have to do with timing. In November 2018, less than a year after Yu came under investigation, Sessions announced the China Initiative. Yu’s name does not appear on a list of sample initiative cases released by the Justice Department and last updated in November 2021, but the effort was clearly important for Andrew Lelling, the U.S. attorney in Boston at the time. He was one of a handful of federal prosecutors on the initiative’s steering committee. Lelling, who is now in private practice, declined to comment on this and several other issues.

“If your name is tied to it, then you want to see it succeed,” said Robert Fisher, an attorney with Nixon Peabody in Boston who successfully defended a China Initiative case brought by Lelling’s office. The priority placed on China-related cases led to an uptick in flimsy charges around the country, Fisher said. “It backfired because they turned non-criminal cases into criminal cases. And that never ends well.”

AP20023801013407

Then-U.S. Attorney Andrew Lelling, center, speaks outside federal court on Jan. 23, 2020, in Boston.

Photo: Charles Krupa/AP

“You Lied to Us”

Early one morning in June 2019, shortly before Yu’s family was scheduled to fly back to China to see relatives, Chen returned home from dropping off their children at school to find cars lining the street. Their house was swarming with agents and local police, around 20 officers in all.

Agents from the Commerce Department and Homeland Security approached and asked her to get inside their vehicle, she said. In the car, according to a transcript of the interview, they drilled her about Tricon.

Chen told the agents that her husband was an uptight engineer, always doing everything by the book. Although the business was in her name, she said that he only let her do basic tasks for the company, not because he had anything to hide but because he wanted them done perfectly. “He’s a control freak,” she said, adding that she had helped him mail chips to sites in Europe and the United States but that he insisted on packing all the materials himself. She said that she didn’t really understand MMIC technology.

“Yeah, neither do I,” one of the agents admitted.

Later in the interview, the other agent accused her of lying. “I don’t want to see you get in trouble for anything, you know, that you lied to us about,” he said.

“I was so confused,” Chen told The Intercept. While she didn’t understand the technology he worked with, she did know that her husband’s business was little more than a side project.

Meanwhile, inside their house, agents were rummaging through the family’s belongings as another pair of investigators from the Commerce Department and Homeland Security questioned Yu. When he asked whether he needed a lawyer, they brushed off the question. Over the course of the interview, Yu mentioned an attorney five more times. But instead of stopping so that he could contact one, the agents kept questioning him.

When Yu declined to answer a query, musing that his remarks could be misinterpreted, one agent launched into a heated speech. “I appreciate that you want to try to protect yourself, but Haoyang, we’re past that. The question now is, are you willing to do the right thing?” The agent offered a sample confession: “Like, ‘Yes, I did it. I’m ashamed. I’m embarrassed. I shouldn’t have done it. I had financial problems and I was trying to do the best thing I could for my family and this is the way that I saw to get out of that. It was a terrible choice.’ Like — whatever.”

But Yu stayed quiet.

Inside the agents’ vehicle, Chen said she watched, stunned, as he was led away in handcuffs. “I didn’t know why they took my husband away,” she said. “It is a really weird feeling.”

After the street cleared out, she walked into her house and surveyed the aftermath. The agents had taken their computers, cellphones, and papers printed with Chinese characters that had no connection to Yu’s business, she said, including notes on potential travel destinations and the addresses of her college classmates. In the kitchen, a chipmunk scurried across the floor. The back door had been left open during the raid, and the animal had found its way inside. She shooed it out and sat down to cry. Then she forced herself to get up and put the house in order before her kids arrived home from school.

Later that day, Lelling’s office issued a press release describing Yu as “a Chinese born naturalized US citizen.” “Theft of trade secrets from American companies is a pervasive economic and national security threat,” Lelling was quoted as saying. The press release continued: “Yu is charged with a massive theft of proprietary trade secret information.”

Singled Out?

As the couple’s cases moved toward trial, Yu’s defense team hired a semiconductor expert, Manfred Schindler, a consultant who had worked with several leading chip companies. Schindler wrote in an affidavit that small outfits like Tricon were common in the MMIC industry, and that companies commonly reverse engineer one another’s chips. “[M]ultiple manufacturers commonly sell individual items with very similar or even identical designs and performance characteristics,” he wrote. (Schindler declined to comment, citing a confidentiality agreement with Yu’s lawyers.)

More explosively, Schindler took issue with the export control category that the U.S. government said governed one of Tricon’s chips. At the time, three of the charges against Yu hinged on that classification. The designation was unusual, Schindler wrote, because chips with similar specifications — including the one that prosecutors alleged Yu had copied — typically do not trigger export controls. He determined that the U.S. government had introduced the designation at the request of an agent investigating Yu and had never publicized the rule. The rule seemed to have been tailor-made for Yu.

Another setback came in January of this year, when the U.S. attorney’s office in Massachusetts dropped charges in a controversial China Initiative case against Massachusetts Institute of Technology professor Gang Chen (no relation to Yanzhi Chen). He had been charged with wire fraud and accused of omitting affiliations with Chinese institutions on Department of Energy grant applications that he submitted electronically. Prosecutors abandoned the charges after determining that some of the alleged affiliations did not exist and that Chen had no obligation to declare the others. Gang Chen’s defenders alleged that he was the victim of blatant racism and bias; 170 MIT faculty members signed a statement in his defense. The Justice Department scrapped the China Initiative the following month.

Rollins had inherited both the Gang Chen and Yu cases from Lelling. Yu’s lawyers hoped to get charges thrown out in his case as well.

Instead, Rollins’s office went ahead with the prosecution. But by the time Yu stood trial, the allegations against him had changed. Prosecutors dropped the export control violation charges connected to the chip that Schindler had flagged after the Commerce Department reclassified it as not requiring a license. In a superseding indictment, they charged Yu with new export control violations, for sending two chip designs to a foundry, or chip factory, in Taiwan.

Yu’s Tricon was what’s known as “fabless,” meaning the company didn’t fabricate the chips in-house. Instead, Yu designed chips which were then manufactured in foundries. In recent years, Commerce Department officials have grown more aggressive about how they interpret regulations with regard to the export of design files, but historically, companies including Analog Devices have at times not sought licenses for similar exports. “[Fabless] suppliers often use off-shore fabs and package houses, yet most US military contractors don’t seem to care about this,” the industry publication Microwaves 101 notes in an explainer on MMIC suppliers. “Go figure!”

Using files found in Yu’s Google Drive and on devices seized from his home, prosecutors alleged that he had stolen the designs for “dozens” of chips from Analog Devices. And, in a sort of legal hall of mirrors, they tacked on charges that depended on other charges sticking. In his interview ahead of becoming a U.S. citizen in February 2017, Yu had asserted that he’d never committed or tried to commit a crime for which he had not been arrested. Prosecutors alleged that this was fraud because he had committed a crime: trade secrets theft, the crime they were charging him with.

GettyImages-119892117-final

A detail shot of the semiconductor chip that was developed for use in car radar systems. Photos taken at Analog Devices in Wilmington, Mass., on July 5, 2011.

Photo: Yoon S. Byun/The Boston Globe via Getty Images

 “Why Are You Challenging Him?”

The drama began even before the trial started, when a prosecutor tried to ensure that an Asian American man was not chosen for the jury. The judge questioned the prosecutor’s motive. The potential juror, the judge noted, “is Asian; why are you challenging him? I see no reason to challenge him.”

When the prosecutor replied that the objection was based on the man’s profession, the judge asked what that was. Silence ensued. “You don’t even know what the profession is,” the judge admonished the prosecutor. (Court documents, which give only the man’s first name and last initial, reveal that he worked as a nurse and paraprofessional for a public school system.) The government ended up withdrawing the objection, and the man remained on the jury.

As the trial got underway, prosecutors returned again and again to the Pokémon characters. “[N]o one names things after Pokémon characters at work when they intend to be found out,” said Assistant U.S. Attorney Amanda Beck. They accused Yu of adopting a fake name because, in his work with Tricon, he used the English name Jack. They emphasized his use of multiple email addresses, claiming that it was a signature of criminals violating export controls. They suggested it was odd that Yu had registered Tricon in his wife’s name rather than his own and used the address of a UPS store for the business rather than his home. And they called as a witness an employee of Win Semiconductors, the Taiwanese firm that had manufactured Yu’s chips, who testified that the designs Tricon had sent the firm appeared unoriginal.

Then, halfway through the trial, Blount, Yu’s Boston-area competitor, took the stand. In 2020, he had sold Custom MMIC for a reported $96 million. He later started a new company, Kapabl Engineering. When cross-examined by the defense, Blount admitted that he had met Yu before, though he said he did not remember the encounter. He conceded that Kapabl Engineering was, like Tricon, registered in his wife’s name. Just as Tricon had a bare-bones website, Kapabl Engineering had a site that Blount conceded was “rudimentary.” And much as Tricon had sent designs to Taiwan to be manufactured without obtaining an export license, Custom MMIC had sent designs to France without a license until 2019, the year Yu was arrested.

“Custom never got an export license to send the GDS to France?” asked Fick, Yu’s attorney, referring to a chip design file.

“We did not, no,” Blount answered.

“And is that because you were intentionally violating the law?” Fick asked.

“No,” Blount said.

Blount also admitted that he was connected to the tip to the FBI. “We brought this matter to the FBI back in 2017,” he said.

The jury deliberated for five hours. After they largely cleared Yu of the charges, Rollins’s office boasted in a press release about the single charge that had stuck, calling it “the first-ever conviction following a criminal trial of this kind in the District of Massachusetts.” Few observers saw it as a win for the government, though. The trade publication Law360 recently listed the trial among a string of losses by the U.S. attorney’s office.

“The verdict revealed this case for what it truly is: a trumped-up civil dispute between a multibillion-dollar, global technology company and its former employee concerning alleged trade secrets,” wrote Yu’s attorneys in a recent filing. “The government’s relentless pursuit of Mr. Yu was driven, at least in part, by its baseless and offensive assumption that he was a Chinese spy, secretly loyal to China and, thus, a danger to the national security of the United States.”

If Yu had been white, his attorneys contend, the trade secrets spat might have been handled through a lawsuit in civil court, without the threat of prison time.

Yu’s attorneys now argue that the law has been selectively enforced, and that the U.S. government gave too much weight to information provided by Blount and Analog Devices. If Yu had been white, they contend, the trade secrets spat might have been handled through a lawsuit in civil court, without the threat of prison time — as had happened when Analog Devices accused the three former employees of taking proprietary material to Macom. That lawsuit, in fact, involved data for several of the exact same Analog Devices products at issue in Yu’s case, with the difference that the Macom engineers were accused of stealing much more data than Yu, and that, according to Yu’s attorneys, one of them actually confessed to taking trade secrets.

Proving that Yu was singled out will be a challenge. Traditionally, the burden of proof for a selective enforcement motion rests on the defense, and no lawyer has successfully argued it in a China Initiative or related case. But in November, Judge William G. Young reversed an earlier decision on the topic, ordering the U.S. government to turn over to the defense additional evidence connected to Yu’s prosecution.

In one filing, Yu’s lawyers cited comments Lelling made to Science in 2020, in which they say he acknowledged that prosecutors were seeking out ethnic Chinese defendants. “[U]nfortunately, a lot of our targets are going to be Han Chinese,” Lelling said at the time. “If it were the French government targeting U.S. technology, we’d be looking for Frenchmen.’”

In an email to The Intercept, Lelling took issue with that interpretation. “No one was targeting people based on ethnicity — we were looking for conduct,” he wrote.

Chen’s hopes now center on the judge dismissing the case. But she is clear-eyed about Yu’s chances. “The success rate is very low,” she said, adding, “I don’t know why the government has invested so much on us. We are just normal people.”

Meanwhile, in August, Analog Devices finally filed a civil lawsuit against Yu. By the time it winds through the courts, he may be in federal prison.


This content originally appeared on The Intercept and was authored by Mara Hvistendahl.

]]>
https://www.radiofree.org/2022/12/22/a-competitor-put-the-fbi-on-haoyang-yus-trail-the-investigation-didnt-go-as-planned/feed/ 0 359560
Elon Musk Is Still Silencing the Journalists He Banned From Twitter https://www.radiofree.org/2022/12/20/elon-musk-is-still-silencing-the-journalists-he-banned-from-twitter/ https://www.radiofree.org/2022/12/20/elon-musk-is-still-silencing-the-journalists-he-banned-from-twitter/#respond Tue, 20 Dec 2022 23:01:01 +0000 https://theintercept.com/?p=417726
Micah Lee's twitter account is seen displayed on a mobile phone screen

Photo Illustration: The Intercept/Getty Images


I’ve been writing critically about billionaire Elon Musk since he took over Twitter — particularly about his “free speech” hypocrisy and his censorship of left-wing accounts. This must have angered him. Last week, he suspended me and eight other journalists from Twitter.

We had all pointed out that Musk censored a Twitter account, @ElonJet, which used public data to post the location of his private jet, but that @ElonJet had moved to rival social networks, like Mastodon, that didn’t censor the account. Musk accused us of “doxxing” him by posting “assassination coordinates” and then tried to blame his outburst on an alleged stalking incident that had nothing to do with the @ElonJet account.

My suspension lasted just a few days before my account was reinstated. When people visit my Twitter profile, it no longer says “account suspended,” and it looks as if I’m back on the platform. Friends and strangers alike have reached out to me saying it’s good to see that I’m back on Twitter. It’s an illusion.

In reality, I’m still locked out of my Twitter account unless I agree to delete a specific tweet at the behest of the billionaire. Several of the other suspended journalists are in the same boat. (Twitter, where the communications team was decimated by Musk’s layoffs, did not immediately reply to a message for comment.)

When I log in to my Twitter account, the site is replaced with the message: “Your account has been locked.” Twitter accuses me of violating its rules against posting private information. (In the 13 years that I’ve used Twitter, I’ve never violated any rules, and my account has never been suspended or locked until now.)

To unlock my account, I must remove the offending tweet, which in my case said, “Twitter just banned Mastodon’s official Twitter account @joinmastodon with 174,000 followers, probably because it tweeted a link to @ElonJet’s Mastodon account. Twitter is now censoring posting the link, but the user is @[email protected]

remove tweet screenshot

Screenshot: Micah Lee


I didn’t want to bend the knee to the Mad King of Twitter, so I submitted an appeal. “My tweet is about Twitter censoring rival social network Mastodon,” I wrote. “This is suppression of speech that never would have happened before Elon Musk took over.” After two days, I received an update from Twitter: “Our support team has determined that violation did take place, and therefore we will not overturn our decision.”

My alleged offense is that I posted private information to Twitter by linking to @ElotJet’s account on Mastodon or, in my case, mentioning the username and showing the link in a screenshot. This is on its face absurd — I didn’t post private information, much less “assassination coordinates” — but a quick Twitter search for https://mastodon.social/@ElonJet shows that plenty of other accounts have posted this same link yet aren’t locked out.

I’m not the only suspended journalist that’s locked out of my account. Some journalists like Drew Harwell of the Washington Post have written on Mastodon about being locked out. “For anyone wondering,” Harwell wrote, “I’m still unable to access Twitter until I delete this tweet, which is factual journalism that doesn’t even break the location rule Twitter enacted a few days ago.” He appended a screenshot of the tweet.

And in an interview on CNN, Donie O’Sullivan, another suspended journalist, explained that his account is locked as well. “Right now, unless I agree to remove that tweet at the behest of the billionaire, I won’t be allowed to tweet on the platform,” he said. He also submitted an appeal.

Mashable’s Matt Binder was unsuspended following the mass banning, but he wrote on Mastodon that when he wrote to a Twitter official to ask how he had broken company policy, he was then locked out. “Seems they forgot to force me to delete the tweet the first time, like they did the other suspended journalists,” he wrote.

Steve Herman of Voice of America, whose account was also suspended last week, told CNN over the weekend: “When I got up this morning, I saw a bunch of news stories that my account had been reinstated with those of the others. Well, that’s not exactly true.” Herman explained that Musk was demanding he delete three offending tweets, all about @ElotJet.

The New York Times reported that the account of its suspended journalist, Ryan Mac, was also locked, contingent on whether he chooses to delete posts that Twitter flagged as violating rules against posting private information.

Other journalists who were suspended for their @ElonJet-related tweets are now fully back, including Aaron Rupar and Tony Webster.

I personally don’t plan on submitting to Musk’s petty demands. We’ll see if anything changes. In the meantime, you can follow me on Mastodon at @mi[email protected], and The Intercept at @[email protected].


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2022/12/20/elon-musk-is-still-silencing-the-journalists-he-banned-from-twitter/feed/ 0 359126
Twitter Aided the Pentagon in its Covert Online Propaganda Campaign https://www.radiofree.org/2022/12/20/twitter-aided-the-pentagon-in-its-covert-online-propaganda-campaign/ https://www.radiofree.org/2022/12/20/twitter-aided-the-pentagon-in-its-covert-online-propaganda-campaign/#respond Tue, 20 Dec 2022 20:07:37 +0000 https://theintercept.com/?p=417627

Twitter executives have claimed for years that the company makes concerted efforts to detect and thwart government-backed covert propaganda campaigns on its platform.

Behind the scenes, however, the social networking giant provided direct approval and internal protection to the U.S. military’s network of social media accounts and online personas, whitelisting a batch of accounts at the request of the government. The Pentagon has used this network, which includes U.S. government-generated news portals and memes, in an effort to shape opinion in Yemen, Syria, Iraq, Kuwait, and beyond.

The accounts in question started out openly affiliated with the U.S. government. But then the Pentagon appeared to shift tactics and began concealing its affiliation with some of these accounts — a move toward the type of intentional platform manipulation that Twitter has publicly opposed. Though Twitter executives maintained awareness of the accounts, they did not shut them down, but let them remain active for years. Some remain active.

The revelations are buried in the archives of Twitter’s emails and internal tools, to which The Intercept was granted access for a brief period last week alongside a handful of other writers and reporters. Following Elon Musk’s purchase of Twitter, the billionaire starting giving access to company documents, saying in a Twitter Space that “the general idea is to surface anything bad Twitter has done in the past.” The files, which included records generated under Musk’s ownership, provide unprecedented, if incomplete, insight into decision-making within a major social media company.

Twitter did not provide unfettered access to company information; rather, for three days last week, they allowed me to make requests without restriction that were then fulfilled on my behalf by an attorney, meaning that the search results may not have been exhaustive. I did not agree to any conditions governing the use of the documents, and I made efforts to authenticate and contextualize the documents through further reporting. The redactions in the embedded documents in this story were done by The Intercept to protect privacy, not Twitter.

The direct assistance Twitter provided to the Pentagon goes back at least five years.

On July 26, 2017, Nathaniel Kahler, at the time an official working with U.S. Central Command — also known as CENTCOM, a division of the Defense Department — emailed a Twitter representative with the company’s public policy team, with a request to approve the verification of one account and “whitelist” a list of Arab-language accounts “we use to amplify certain messages.”

“We’ve got some accounts that are not indexing on hashtags — perhaps they were flagged as bots,” wrote Kahler. “A few of these had built a real following and we hope to salvage.” Kahler added that he was happy to provide more paperwork from his office or SOCOM, the acronym for the U.S. Special Operations Command.

Twitter at the time had built out an expanded abuse detection system aimed in part toward flagging malicious activity related to the Islamic State and other terror organizations operating in the Middle East. As an indirect consequence of these efforts, one former Twitter employee explained to The Intercept, accounts controlled by the military that were frequently engaging with extremist groups were being automatically flagged as spam. The former employee, who was involved with the whitelisting of CENTCOM accounts, spoke with The Intercept under condition of anonymity because they were not authorized to speak publicly.

In his email, Kahler sent a spreadsheet with 52 accounts. He asked for priority service for six of the accounts, including @yemencurrent, an account used to broadcast announcements about U.S. drone strikes in Yemen. Around the same time, @yemencurrent, which has since been deleted, had emphasized that U.S. drone strikes were “accurate” and killed terrorists, not civilians, and promoted the U.S. and Saudi-backed assault on Houthi rebels in that country.

Other accounts on the list were focused on promoting U.S.-supported militias in Syria and anti-Iran messages in Iraq. One account discussed legal issues in Kuwait. Though many accounts remained focused on one topic area, others moved from topic to topic. For instance, @dala2el, one of the CENTCOM accounts, shifted from messaging around drone strikes in Yemen in 2017 to Syrian government-focused communications this year.

On the same day that CENTCOM sent its request, members of Twitter’s site integrity team went into an internal company system used for managing the reach of various users and applied a special exemption tag to the accounts, internal logs show.

One engineer, who asked not to be named because he was not authorized to speak to the media, said that he had never seen this type of tag before, but upon close inspection, said that the effect of the “whitelist” tag essentially gave the accounts the privileges of Twitter verification without a visible blue check. Twitter verification would have bestowed a number of advantages, such as invulnerability to algorithmic bots that flag accounts for spam or abuse, as well as other strikes that lead to decreased visibility or suspension.

Kahler told Twitter that the accounts would all be “USG-attributed, Arabic-language accounts tweeting on relevant security issues.” That promise fell short, as many of the accounts subsequently deleted disclosures of affiliation with the U.S. government.

The Internet Archive does not preserve the full history of every account, but The Intercept identified several accounts that initially listed themselves as U.S. government accounts in their bios, but, after being whitelisted, shed any disclosure that they were affiliated with the military and posed as ordinary users.

This appears to align with a major report published in August by online security researchers affiliated with the Stanford Internet Observatory, which reported on thousands of accounts that they suspected to be part of a state-backed information operation, many of which used photorealistic human faces generated by artificial intelligence, a practice also known as “deep fakes.”

The researchers connected these accounts with a vast online ecosystem that included “fake news” websites, meme accounts on Telegram and Facebook, and online personalities that echoed Pentagon messages often without disclosure of affiliation with the U.S. military. Some of the accounts accuse Iran of “threatening Iraq’s water security and flooding the country with crystal meth,” while others promoted allegations that Iran was harvesting the organs of Afghan refugees.

The Stanford report did not definitively tie the sham accounts to CENTCOM or provide a complete list of Twitter accounts. But the emails obtained by The Intercept show that the creation of at least one of these accounts was directly affiliated with the Pentagon.

“It’s deeply concerning if the Pentagon is working to shape public opinion about our military’s role abroad and even worse if private companies are helping to conceal it.”

One of the accounts that Kahler asked to have whitelisted, @mktashif, was identified by the researchers as appearing to use a deep-fake photo to obscure its real identity. Initially, according to the Wayback Machine, @mktashif did disclose that it was a U.S. government account affiliated with CENTCOM, but at some point, this disclosure was deleted and the account’s photo was changed to the one Stanford identified as a deep fake.

The new Twitter bio claimed that the account was an unbiased source of opinion and information, and, roughly translated from Arabic, “dedicated to serving Iraqis and Arabs.” The account, before it was suspended earlier this year, routinely tweeted messages denouncing Iran and other U.S. adversaries, including Houthi rebels in Yemen.

Another CENTCOM account, @althughur, which posts anti-Iran and anti-ISIS content focused on an Iraqi audience, changed its Twitter bio from a CENTCOM affiliation to an Arabic phrase that simply reads “Euphrates pulse.”

The former Twitter employee told The Intercept that they were surprised to learn of the Defense Department’s shifting tactics. “It sounds like DOD was doing something shady and definitely not in line with what they had presented to us at the time,” they said.

Twitter and CENTCOM did not respond to requests for comment.

“It’s deeply concerning if the Pentagon is working to shape public opinion about our military’s role abroad and even worse if private companies are helping to conceal it,” said Erik Sperling, the executive director of Just Foreign Policy, a nonprofit that works toward diplomatic solutions to foreign conflicts.

“Congress and social media companies should investigate and take action to ensure that, at the very least, our citizens are fully informed when their tax money is being spent on putting a positive spin on our endless wars,” Sperling added.

Nick Pickles, public policy director for Twitter speaks during a full committee hearing on "Mass Violence, Extremism, and Digital Responsibility" on September 18, 2019 in Washington, DC. (Photo by Olivier Douliery / AFP)        (Photo credit should read OLIVIER DOULIERY/AFP via Getty Images)

Nick Pickles, public policy director for Twitter, speaks during a full committee hearing on “Mass Violence, Extremism, and Digital Responsibility,” in Washington, D.C., on Sept. 18, 2019.

Photo: Olivier DoulieryAFP via Getty Images


For many years, Twitter has pledged to shut down all state-backed disinformation and propaganda efforts, never making an explicit exception for the U.S. In 2020, Twitter spokesperson Nick Pickles, in a testimony before the House Intelligence Committee, said that the company was taking aggressive efforts to shut down “coordinated platform manipulation efforts” attributed to government agencies.

“Combatting attempts to interfere in conversations on Twitter remains a top priority for the company, and we continue to invest heavily in our detection, disruption, and transparency efforts related to state-backed information operations. Our goal is to remove bad-faith actors and to advance public understanding of these critical topics,” said Pickles.

In 2018, for instance, Twitter announced the mass suspension of accounts tied to Russian government-linked propaganda efforts. Two years later, the company boasted of shutting down almost 1,000 accounts for association with the Thai military. But rules on platform manipulation, it appears, have not been applied to American military efforts.

The emails obtained by The Intercept show that not only did Twitter whitelist these accounts in 2017 explicitly at the behest of the military, but also that high-level officials at the company discussed the accounts as potentially problematic in the following years.

In the summer of 2020, officials from Facebook reportedly identified fake accounts attributed to CENTCOM’s influence operation on its platform and warned the Pentagon that if Silicon Valley could easily out these accounts as inauthentic, so could foreign adversaries, according to a September report in the Washington Post.

Twitter emails show that during that time in 2020, Facebook and Twitter executives were invited by the Pentagon’s top attorneys to attend classified briefings in a sensitive compartmented information facility, also known as a SCIF, used for highly sensitive meetings.

“Facebook have had a series of 1:1 conversations between their senior legal leadership and DOD’s [general counsel] re: inauthentic activity,” wrote Yoel Roth, then the head of trust and safety at Twitter. “Per FB,” continued Roth, “DOD have indicated a strong desire to work with us to remove the activity — but are now refusing to discuss additional details or steps outside of a classified conversation.”

Stacia Cardille, then an attorney with Twitter, noted in an email to her colleagues that the Pentagon may want to retroactively classify its social media activities “to obfuscate their activity in this space, and that this may represent an overclassification to avoid embarrassment.”

Jim Baker, then the deputy general counsel of Twitter, in the same thread, wrote that the Pentagon appeared to have used “poor tradecraft” in setting up various Twitter accounts, sought to potentially cover its tracks, and was likely seeking a strategy for avoiding public knowledge that the accounts are “linked to each other or to DoD or the USG.” Baker speculated that in the meeting the “DoD might want to give us a timetable for shutting them down in a more prolonged way that will not compromise any ongoing operations or reveal their connections to DoD.”

What was discussed at the classified meetings — which ultimately did take place, according to the Post — was not included in the Twitter emails provided to The Intercept, but many of the fake accounts remained active for at least another year. Some of the accounts on the CENTCOM list remain active even now — like this one, which includes affiliation with CENTCOM, and this one, which does not — while many were swept off the platform in a mass suspension on May 16.

In a separate email sent in May 2020, Lisa Roman, then a vice president of the company in charge of global public policy, emailed William S. Castle, a Pentagon attorney, along with Roth, with an additional list of Defense Department Twitter accounts. “The first tab lists those accounts previously provided to us and the second, associated accounts that Twitter has discovered,” wrote Roman. It’s not clear from this single email what Roman is requesting – she references a phone call preceding the email — but she notes that the second tab of accounts — the ones that had not been explicitly provided to Twitter by the Pentagon — “may violate our Rules.” The attachment included a batch of accounts tweeting in Russian and Arabic about human rights violations committed by ISIS. Many accounts in both tabs were not openly identified as affiliated with the U.S. government.

Twitter executives remained aware of the Defense Department’s special status. This past January, a Twitter executive recirculated the CENTCOM list of Twitter accounts originally whitelisted in 2017. The email simply read “FYI” and was directed to several Twitter officials, including Patrick Conlon, a former Defense Department intelligence analyst then working on the site integrity unit as Twitter’s global threat intelligence lead. Internal records also showed that the accounts that remained from Kahler’s original list are still whitelisted.

Following the mass suspension of many of the accounts this past May, Twitter’s team worked to limit blowback from its involvement in the campaign.

Shortly before publication of the Washington Post story in September, Katie Rosborough, then a communications specialist at Twitter, wrote to alert Twitter lawyers and lobbyists about the upcoming piece. “It’s a story that’s mostly focused on DoD and Facebook; however, there will be a couple lines that reference us alongside Facebook in that we reached out to them [DoD] for a meeting. We don’t think they’ll tie it to anything Mudge-related or name any Twitter employees. We declined to comment,” she wrote. (Mudge is a reference to Peiter Zatko, a Twitter whistleblower who filed a complaint with federal authorities in July, alleging lax security measures and penetration of the company by foreign agents.)

After publication, the Twitter team congratulated one another because the story minimized Twitter’s role in the CENTCOM psyop campaign. Instead, the story largely revolved around the Pentagon’s decision to begin a review of its clandestine psychological operations on social media.

“Thanks for doing all that you could to manage this one,” wrote Rebecca Hahn, another former Twitter communications official. “It didn’t seem to get too much traction beyond verge, cnn and wapo editors promoting.”

The U.S. military and intelligence community have long pursued a strategy of fabricated online personas and third parties to amplify certain narratives in foreign countries, the idea being that an authentic-looking Persian-language news portal or a local Afghan woman would have greater organic influence than an official Pentagon press release.

Military online propaganda efforts have largely been governed by a 2006 memorandum. The memo notes that the Defense Department’s internet activities should “openly acknowledge U.S. involvement” except in cases when a “Combatant Commander believes that it will not be possible due to operational considerations.” This method of nondisclosure, the memo states, is only authorized for operations in the “Global War on Terrorism, or when specified in other Secretary of Defense execute orders.”

In 2019, lawmakers passed a measure known as Section 1631, a reference to a provision of the National Defense Authorization Act, further legally affirming clandestine psychological operations by the military in a bid to counter online disinformation campaigns by Russia, China, and other foreign adversaries.

In 2008, the U.S. Special Operations Command opened a request for a service to provide “web-based influence products and tools in support of strategic and long-term U.S. Government goals and objectives.” The contract referred to the Trans-Regional Web Initiative, an effort to create online news sites designed to win hearts and minds in the battle to counter Russian influence in Central Asia and global Islamic terrorism. The contract was initially carried out by General Dynamics Information Technology, a subsidiary of the defense contractor General Dynamics, in connection with CENTCOM communication offices in the Washington, D.C., area and in Tampa, Florida.

A program known as “WebOps,” run by a defense contractor known as Colsa Corp., was used to create fictitious online identities designed to counter online recruitment efforts by ISIS and other terrorist networks.

The Intercept spoke to a former employee of a contractor — on the condition of anonymity for legal protection — engaged in these online propaganda networks for the Trans-Regional Web Initiative. He described a loose newsroom-style operation, employing former journalists, operating out of a generic suburban office building.

“Generally what happens, at the time when I was there, CENTCOM will develop a list of messaging points that they want us to focus on,” said the contractor. “Basically, they would, we want you to focus on say, counterterrorism and a general framework that we want to talk about.”

From there, he said, supervisors would help craft content that was distributed through a network of CENTCOM-controlled websites and social media accounts. As the contractors created content to support narratives from military command, they were instructed to tag each content item with a specific military objective. Generally, the contractor said, the news items he created were technically factual but always crafted in a way that closely reflected the Pentagon’s goals.

“We had some pressure from CENTCOM to push stories,” he added, while noting that he worked at the sites years ago, before the transition to more covert operations. At the time, “we weren’t doing any of that black-hat stuff.”


This content originally appeared on The Intercept and was authored by Lee Fang.

]]>
https://www.radiofree.org/2022/12/20/twitter-aided-the-pentagon-in-its-covert-online-propaganda-campaign/feed/ 0 359099
Who Cares Whether Elon Musk Is CEO of Twitter? He OWNS It. https://www.radiofree.org/2022/12/19/who-cares-whether-elon-musk-is-ceo-of-twitter-he-owns-it/ https://www.radiofree.org/2022/12/19/who-cares-whether-elon-musk-is-ceo-of-twitter-he-owns-it/#respond Mon, 19 Dec 2022 18:48:17 +0000 https://theintercept.com/?p=417477
Twitter headquarters in San Francisco, California, US, on Tuesday, Nov, 29, 2022. Twitter Inc. said it ended a policy designed to suppress false or misleading information about Covid-19, part of Musk's polarizing mission to remake the social network as a place for unmoderated speech. Photographer: David Paul Morris/Bloomberg via Getty Images

Twitter headquarters in San Francisco on Nov. 29, 2022.

Photo: David Paul Morris/Bloomberg via Getty Images

The votes are in, the people have spoken, and Dominion has chosen the winner. Elon Musk will be stepping down as CEO of Twitter!

As of the moment this was written, there’s been no confirmation from Musk that he’ll actually follow through on this, and if so, when. It will certainly be interesting to see if he does. But also, who cares? Ultimately it makes little or no difference.

It’s important at moments like this to remember how capitalism works. Ready? Here it is: The people who own corporations decide what the corporations do. These owners usually hire a board of directors, which in turn hires the company’s chief executive officer. If the board doesn’t like the CEO’s performance, they replace him or her. If the owners don’t like the board, they replace them.

Of course, it can get more complicated than this. In a publicly traded company — i.e., one in which anyone can buy shares at the current price on a stock market — there’s often extremely diffuse ownership. The largest shareholders in many of America’s companies now are index funds such as those offered by Vanguard, which in turn are owned by millions of people. This often creates what’s called a “principal-agent problem,” a situation in which the principals (in this case, the company’s owners) have a hard time exerting control over their agent (the management). If you have a 401(k), you almost certainly own teeny-tiny amounts of all of America’s biggest companies but have no influence over or even knowledge of how they’re run. Corporate managers constantly take advantage of this dynamic to enrich themselves at the expense of their company’s owners (not to mention at the expense of nonmanagement employees).

There are also anomalous corporate structures such as that of Meta, aka Facebook. Meta has Class A shares, which are publicly traded and provide one vote each in corporate governance matters. And over the past year, the value of Meta’s Class A stock has declined almost 70 percent. With a normal company, Mark Zuckerberg, who owns only about 13 percent of Meta’s Class A stock, would be facing a shareholder revolt and likely be ousted as CEO. But Meta also has Class B shares, which aren’t publicly traded and get 10 votes per share. Zuckerberg owns 90 percent of the company’s Class B shares, which ultimately gives him about 60 percent of the voting power over what the company does. Hence he is autonomous and unfireable.

Neither of these situations apply to Twitter, however. It is privately held, meaning that you can’t just call up a stockbroker and buy some shares in it. There is only one class of stock, but that’s fine for Musk, because he owns the majority of it. He is free to appoint anyone he wants to run the company. After he bought it, he appointed himself. But even if he now abides by this poll and hires someone else, he will still ultimately be in charge. If he doesn’t like a new CEO’s performance for any reason or no reason, he can replace them.

The main trouble is simply that Twitter is a bad business, purely as a business.

This hypothetical person will then face exactly the same problems that Musk faced — except with Musk breathing down their neck every second of every day. The main trouble is simply that Twitter is a bad business, purely as a business. It’s made a yearly profit just twice since it went public in 2013: in 2018 and 2019. In 2020 it lost $1 billion, then another $222 million in 2021. Musk took this money pit and added more suction by borrowing $12 billion to complete his purchase, generating $1.2 billion in additional annual costs for the company with the interest on the debt.

It is true that Musk exacerbated Twitter’s inherent problems by terrifying its advertisers, which in the pre-Musk era provided 90 percent of Twitter’s revenues. In theory, a talented new CEO could try to turn back time by going to Twitter’s ad clientele and telling them: Look, our previous chief executive was psychologically maimed by his father and is a deeply troubled weirdo. We definitely understand your concerns about him, but fortunately he’s out of the picture now.

Except Musk wouldn’t be out of the picture. Everyone in the room would know that the new CEO might be fired by tweet before the meeting was over.

And there are no other plausible sources of income on the horizon with Twitter as it currently exists. Twitter Blue users send the company $8 a month but see half the ads; they also cost money to acquire and verify. It’s plausible that the company is barely breaking even on each new blue checkmark.

Incredibly enough, the gaming journalist, global-warming denier, and extremely odd person Ian Miles Cheong got it completely right when he told Musk this:

In other words, Twitter can only survive if it turns itself into a totally different company. That’s not impossible — for instance, before Musk took over, Twitter explored the possibility of becoming a competitor to adult OnlyFans. There’s a lot of money there, with the adult content creator site projecting net revenue of $2.5 billion this year. On the other hand, that would guarantee that almost all large advertisers would flee the platform. And it would certainly come as a surprise to Musk’s legion of right-wing fans, as well as Tesla stockholders.

So in the end, all the cataclysms facing Twitter are structural issues that no other human being can likely solve, rather than — as tempting as it is to think — flaws inherent to Musk personally. You can replace one brick in this wall with another brick, but it’s still probably going to be swamped by the tsunami of capitalism.

All that said, there might be one possible path forward for Twitter, one that could enhance it as a venue for civic discourse and free speech: non-capitalistic ownership, by the public or its workers or both. Unfortunately, this is the one direction in which we can be absolutely certain Musk will not go.


This content originally appeared on The Intercept and was authored by Jon Schwarz.

]]>
https://www.radiofree.org/2022/12/19/who-cares-whether-elon-musk-is-ceo-of-twitter-he-owns-it/feed/ 0 358774
Forensic tools open new front for using phone data to prosecute journalists https://www.radiofree.org/2022/12/19/forensic-tools-open-new-front-for-using-phone-data-to-prosecute-journalists/ https://www.radiofree.org/2022/12/19/forensic-tools-open-new-front-for-using-phone-data-to-prosecute-journalists/#respond Mon, 19 Dec 2022 15:19:21 +0000 https://cpj.org/?p=247114 On April 13, police in Russia’s Khakassiya republic arrested Mikhail Afanasyev and seized his digital devices. Afanasyev, chief editor of the online magazine Novy Fokus, was detained based on an article about riot police in southern Siberia refusing to serve in Ukraine. He faces a possible 10-year prison sentence for spreading “false” information. 

It’s not surprising for authorities to take phones and computers into custody when they are investigating a journalist – in fact, it’s become routine. CPJ’s prison census, a snapshot of journalists in prison on December 1, 2022, lists examples from IranBelarusAzerbaijanTurkeyVietnam, and India, as well as Russia. 

Little is generally reported about what happens next. We don’t know what Russian authorities did with Afanasyev’s devices, for example. But we do know that widely available forensic tools have been used to examine journalists’ phones in order to convict them in Myanmar and search for their sources in Nigeria.

A law enforcement agent scrolling through a journalist’s unlocked phone is already a problematic scenario for press freedom. But this risk is supercharged by technology that can copy and search the entire content of phones and computers, sometimes even if they are locked. Like spyware, forensic tools can access everything on a phone or computer, but unlike spyware, such tools are in widespread, open usage in democracies as well as more repressive regimes. Their use has accelerated threats to the press while protections and public awareness lag behind.

“Mobile device forensics tools can recover deleted data, as well as lots of data that isn’t visible to the naked eye when scrolling,” Riana Pfefferkorn, a research scholar at Stanford Internet Observatory, which studies abuse in information technologies, said in an email. 

These tools are becoming ubiquitous in government agencies in countries like the United States and Australia – and they have been documented in many countries where those in power view independent journalism as a threat. In 2020, the head of Russia’s Investigative Committee said that law enforcement agencies had probed cellphones 26,000 times the previous year using data extraction tools produced by the Israel-based company Cellebrite. Citing human rights concerns, Cellebrite said in 2021 that it had stopped selling to Russia and Belarus, but Russian investigative agencies continued to reference the country’s products in official reports and training materials in 2022, according to Israeli newspaper Haaretz

Cellebrite, which says on its website that its offerings — designed to help catch criminals — are “trusted by over 6,700 federal, state and local public safety agencies and enterprises in over 140 countries,” is only the best known player in a large market; it purchased computer forensic firm Blackbag Technologies in 2020. In 2019, researcher Valentin Weber wrote for the U.S. nonprofit Open Technology Fund that Chinese officials had instructed local firm Meiya Pico to provide digital forensics training to countries participating in the Belt and Road Initiative, a trillion dollar project to promote trade by building ports and other infrastructure across Asia, Africa, and Europe.   

Forensic products differ from zero-click spyware like Pegasus, which CPJ recently called an existential threat to press freedom for providing states with the power to track journalists and their sources secretly and continuously by hacking into their phones. Spyware can penetrate remotely and invisibly, is deniable, and much more expensive

To operate a forensic tool, on the other hand, one needs physical access to a device. Journalists who surrender their phones and passcodes at a police station or checkpoint at least know they have been compromised, even if they have relinquished their devices under duress

But data extracted from a phone in a lab or police station can also be used against its owner.  

“The kinds of tools used by police are designed to extract and preserve content in a forensically sound way that will stand up in court,” said Pfefferkorn.

Legal safeguards have not caught up. In the U.S., Customs and Border Protection agents can access a database compiled from some travelers’ devices without a warrant, according to The Washington Post. Journalists have told CPJ that CBP officials have stopped them for electronic searches as they enter the country.  

Some U.S. jurisdictions protect unreported source material from seizure, but police still overreach. After San Francisco police took devices from freelancer Bryan Carmody and his fiancée in 2019, his tablet was returned to him with the passcode on a note stuck to the screen, he told CPJ at the time. Police agreed to delete information obtained from searching the devices following a challenge from his lawyers. 

As CPJ’s prison census shows, journalists elsewhere are often without any such recourse. The research is littered with examples of police seizing electronics from journalists’ family membersfreelancers whose livelihood may depend on their phones, or people in war zones, where devices are a communication lifeline. Once released, journalists may fear spyware has been implanted on their devices and be reluctant to use them, if they have even been returned. If the journalist remains behind bars, they run the risk that the material extracted from the device could be used during interrogations and in building specious criminal cases.  

Since digital forensics gives local law enforcement the ability to siphon off large volumes of data from individual targets’ phones, Steven Feldstein, a senior fellow at the Carnegie Endowment for International Peace who studies digital repression, sees significant overlap between spyware and forensics, and an equally pressing need for reform when it comes to monitoring and regulating the use of both. 

“It seems to me that law enforcement has made a distinction between the two, but I have questions as to whether that’s more artificial than real,” he said. “Given the impossibility of narrowly distinguishing what would be relevant to a particular law enforcement search…there’s a strong presumption against ever using these tools.”  

Until this viewpoint gains traction, authorities can use forensic tools to produce journalists’ own phones as witnesses against them. And journalists like Russia’s Afanasyev – along with the many others whose devices have been seized – are even more vulnerable to laws that make reporting the news a crime. 

See CPJ’s Digital Safety Kit


This content originally appeared on Committee to Protect Journalists and was authored by Madeline Earp/CPJ Consultant Technology Editor.

]]>
https://www.radiofree.org/2022/12/19/forensic-tools-open-new-front-for-using-phone-data-to-prosecute-journalists/feed/ 0 358728
Emboldened Right-Wing Activists Spread Lies About Katie Porter on Twitter https://www.radiofree.org/2022/12/17/emboldened-right-wing-activists-spread-lies-about-katie-porter-on-twitter/ https://www.radiofree.org/2022/12/17/emboldened-right-wing-activists-spread-lies-about-katie-porter-on-twitter/#respond Sat, 17 Dec 2022 01:01:59 +0000 https://theintercept.com/?p=417354

Lies about Rep. Katie Porter reached millions of Twitter users this week, as the California Democrat’s remarks about how the platform has been used to falsely label LGBTQ+ people as pedophiles were misleadingly edited and captioned in tweets by influential right-wing activists.

The deceptive clips of Porter’s remarks, accompanied by false claims that she had condoned pedophilia, were viewed more than 2.2 million times on Twitter after being shared by right-wing activist accounts, including Chaya Raichik’s LibsofTikTok and Jaimee Michell’s GaysAgainstGroomers.

Those video clips were created by Porter’s political enemies, who made it seem as if Porter, at a Congressional oversight hearing on Wednesday, had argued that pedophilia was not a crime but an identity. 

Transcripts and video of Porter’s complete remarks make it clear that she was saying something entirely different — namely, that right-wing activists have inspired hatred of LGBTQ+ Americans in tweets falsely accusing them of being pedophiles, or so-called “groomers.”

A spokesperson for Porter also told the fact-checking service VERIFY, which works with local news stations in 29 states, that the representative “did not say that pedophilia is not a crime.”

In an irony that perfectly encapsulates the impossibility of reasoned discourse with far-right activists willing to lie, the video used to smear Porter was taken from her discussion of a report documenting how activist accounts like LibsofTikTok and GaysAgainstGroomers use Twitter to falsely accuse LGBTQ+ liberals of pedophilia. The report was produced by the LGBTQ+ civil rights organization the Human Rights Campaign.

At the hearing, Porter prefaced a question for Kelley Robinson, the HRC president, by saying: “Your organization recently released a report analyzing the 500 most viewed, most influential tweets that identified LGBTQ+ people as so-called ‘groomers.’ The ‘groomer’ narrative is an age-old lie to position LGBTQ+ people as a threat to kids. And what it does is deny them access to public spaces, it stokes fear, and can even stoke violence.”

Porter then asked Robinson if Twitter’s hateful conduct policy allows users to call LGBTQ+ people “groomers” on the platform.

After Robinson explained that those slurs are used in violation of Twitter’s poorly enforced community guidelines, she added that when people baselessly use words like “groomers” and “pedophiles” to describe LGBTQ+ people, “it is dangerous, and it’s got one purpose: It is to dehumanize us, and make us feel like we are not a part of this American society, and it has real-life consequences.”

Porter responded by saying that she agreed with Robinson that the use of such terms to smear members of LGBTQ+ communities whose politics differ from the far-right activists was intended to marginalize them.

“I think you’re absolutely right,” Porter said. “And it’s not, you know, this allegation of ‘groomer’ and of ‘pedophile,’ it is alleging that a person is criminal somehow, and engaged in criminal acts, merely because of their identity, their sexual orientation, their gender identity. So this is clearly prohibited, under Twitter’s content, yet you found hundreds of these posts on the platform.”

In addition to Raichik and Michell, whose anti-LGBTQ+ activism has previously been amplified by America’s most-watched cable news host, Tucker Carlson, misleading clips of Porter were also shared by Greg Price, a former Republican operative and Daily Caller social media editor, Sebastian Gorka, who was fired by the Trump White House, and Ian Miles Cheong, a far-right Malaysian blogger Elon Musk frequently replies to and agrees with on Twitter.

While the tweets from Cheong and Raichik — who falsely asserted that “Rep Katie Porter (D) says pedophilia isn’t a crime- it’s an identity” – were eventually flagged as misleading by Twitter users, the 1.5 million people who follow Michell, Price or Gorka encountered no such warning.

Although he did not share the video, Rep. Ronny Jackson, a Texas Republican, also lied about what Porter said on Twitter. “Katie Porter just said that pedophilia isn’t a crime, she said it’s an ‘identity,'” Jackson claimed, falsely. “The sad thing is that this woman isn’t the only VILE person pushing for pedophilia normalization. This is what progressives believe!”

While the HRC report Porter highlighted showed that right-wing activists had violated Twitter’s hateful conduct policy repeatedly before Musk bought the platform, the previous ownership team did make some attempt to rein in Raichik, who was temporarily suspended several times.

Since Musk took control, however, “retweets of right-wing figures’ tweets that included the anti-LGBTQ ‘groomer’ slur increased substantially, as did mentions of right-wing figures in tweets containing the slur,” according to new data from the Gay & Lesbian Alliance Against Defamation and Media Matters, a watchdog group that monitors right-wing misinformation.

Michell’s GaysAgainstGroomers account, the study found, “saw an increase of nearly 300% for retweets of tweets with the slur,” comparing the two months before and after Musk took control of the platform. Raichik’s LibsofTikTok “saw more than a 600% increase in its mentions,” over the same period for tweets using “groomer” slurs.


This content originally appeared on The Intercept and was authored by Robert Mackey.

]]>
https://www.radiofree.org/2022/12/17/emboldened-right-wing-activists-spread-lies-about-katie-porter-on-twitter/feed/ 0 358423
Elon Musk’s Growing Purge of His Twitter Critics — at the Behest of the Far Right https://www.radiofree.org/2022/12/16/elon-musks-growing-purge-of-his-twitter-critics-at-the-behest-of-the-far-right/ https://www.radiofree.org/2022/12/16/elon-musks-growing-purge-of-his-twitter-critics-at-the-behest-of-the-far-right/#respond Fri, 16 Dec 2022 22:27:18 +0000 https://theintercept.com/?p=417348

Among the slew of accounts abruptly suspended from Twitter this week was the anarchist media organization It’s Going Down, an anticapitalist and antifascist collective that has covered the far right since its founding in 2015.

Several of the media accounts — including at least eight journalists from outlets including The Intercept, the New York Times, and the Washington Post — had covered the suspension of left-leaning accounts in recent weeks by Twitter’s new owner, billionaire Elon Musk. Musk claimed that the accounts had violated Twitter’s terms of service by reporting on his suspension of another account, @ElonJet, which automatically tweeted the location of Musk’s personal jet using public information.

“We weren’t told a reason. We didn’t even tweet that day that we were kicked off.”

Unlike the other suspended media accounts, It’s Going Down had not tweeted about the ElonJet saga. Instead, the outlet’s account was suspended from Twitter after it drew attention to protests against a new police training center in Atlanta called “Cop City” — though the reasons for It’s Going Down’s suspension remains unclear.

“We weren’t told a reason,” said a person involved with It’s Going Down, who agreed to speak only under the condition of anonymity. “We didn’t even tweet that day that we were kicked off.”

Earlier this month, It’s Going Down had posted a thread criticizing suspensions of other anarchist and antifascist accounts; the thread included a photo of Musk with Ghislaine Maxwell, the former girlfriend of Jeffrey Epstein. “I don’t know, maybe that ruffled his feathers,” the person said.

On the subject of their own banning, the person involved with It’s Going Down pointed to tweets by a far-right activist who had been flagging the anarchists’ account, sometimes directly to Musk, over a period of months. “The far-right troll Andy Ngo was tweeting at Musk to ban us,” the person said. “I’m sure that’s probably what it was, if we had to guess.” (Ngo did not immediately respond to a Twitter DM. Twitter, which, under Musk’s ownership, saw its communications department decimated, did not immediately respond to a request for comment.)

Ngo’s possible role in the suspension of It’s Going Down from Twitter would follow the now-familiar pattern: far-right activists tweeting directly at Elon Musk with specious claims that left-wing Twitter accounts are engaged in violence. Earlier on Thursday, before the ban, Ngo tagged Musk in a tweet that posted a blog about the arrests and claimed that protesters were “using Twitter to raise cash, @elonmusk.” Ian Miles Cheng, another far-right activist, replied and asked if Musk would “consider setting up a dedicated task force at Twitter to deal with violent extremists like Antifa?”

“Twitter obviously must be fair to all, so will aim to stop violent extremism being promoted by any group,” Musk replied. (Since taking over Twitter, Musk has reinstated neo-Nazi and fascist accounts.)

Several hours later, Ngo cheered the It’s Going Down suspension from Twitter. Ngo had repeatedly targeted It’s Going Down in other public exchanges with Musk on Twitter and falsely claimed the group was a part of “Antifa,” an organization that does not exist, and that it incited violence and shared extremist propaganda.

The person from IGD said they weren’t aware of Ngo tweeting about the group in relation to the Atlanta protests, but that he had targeted their coverage of a protest against an anti-trans group earlier this month.

The controversy around the Atlanta police-training facility, dubbed “Cop City” by its opponents, grew on Tuesday when a group of protesters who have been occupying the site for more than a year clashed with a joint task force of police. The authorities, including agents from the Georgia Bureau of Investigation and the Atlanta Police Department, went in to remove barricades set up by the protesters, five of whom were arrested; on Wednesday, they were indicted on domestic terror charges.

“They’re gonna try to throw the book at these people with domestic terrorism charges in order to try to stop a pretty broad rejection of this massive counterinsurgency training facility,” the person involved with It’s Going Down said. Slated to be built on the site of a former prison farm at the cost of $90 million, “Cop City” would be built atop the largest green space in an overwhelmingly Black part of the city, drawing opposition from local organizers.

Sean Wolters, a protester who lives near the planned facility, said he thought the police were employing heavy-handed charges to demoralize and break up the protests: “None of it is meant to stand up in court, but simply to suppress opposition to Cop City.”

“It’s a clear pipeline from lies from the police to Andy Ngo to action taken by Twitter against those who support the Defend the Forest movement.”

What police claim about protesters in bond hearings and press releases doesn’t have to be proven true, Wolters said. “These lies are then picked up and repeated by right-wing figures like Andy Ngo, who then has direct communication with the head of Twitter,” he said. “It’s a clear pipeline from lies from the police to Andy Ngo to action taken by Twitter against those who support the Defend the Forest movement.”

In a statement on Thursday, It’s Going Down said its suspension was further evidence of Musk’s sympathies toward the far right and his attempts to censor its critics on Twitter — and part of a pattern of social media giants censoring the anarchist site. (It’s Going Down had been banned on Facebook for allegedly being on a list of “organizations with a record of terrorist or violent criminal activity.”)

“Today’s suspension is only the latest instance of IGD and other grassroots media platforms being banned and censored by tech companies working to advance the agenda of both the far-Right and the State,” the group wrote. “IGD was removed from Patreon at the request of far-right troll Tim Pool, kicked off of Facebook in the midst of Donald Trump’s response to the George Floyd protests, and finally banned from Instagram.”


This content originally appeared on The Intercept and was authored by Akela Lacy.

]]>
https://www.radiofree.org/2022/12/16/elon-musks-growing-purge-of-his-twitter-critics-at-the-behest-of-the-far-right/feed/ 0 358405
Elon Musk Is Taking Aim at Journalists. I’m One of Them. https://www.radiofree.org/2022/12/16/elon-musk-is-taking-aim-at-journalists-im-one-of-them/ https://www.radiofree.org/2022/12/16/elon-musk-is-taking-aim-at-journalists-im-one-of-them/#respond Fri, 16 Dec 2022 15:45:31 +0000 https://theintercept.com/?p=417257
Elon Musk waves while providing an update on Starship, on Feb. 10, 2022, near Brownsville, Texas. Twitter on Thursday, Dec. 15, 2022.

Elon Musk waves while providing an update on the SpaceX Starship, on Feb. 10, 2022, near Brownsville, Texas.

Photo: Miguel Roberts/The Brownsville Herald via AP


I got suspended from Twitter yesterday. I’m one of at least eight journalists who were casualties of Elon Musk’s “Thursday Night Massacre,” after the billionaire went on a power-hungry suspension spree. Twitter didn’t explain what rules I allegedly broke — but that’s to be expected under the new management, whose transparency has mostly consisted of Musk personally replying to tweets explaining his decision-making. My suspension is likely temporary, or it could be permanent. Who knows?

The suspensions made clear that, with the self-styled “free speech absolutist” at the helm, Twitter users are now subject to arbitrary censorship based on his whims. It all started when Musk suspended @ElonJet, an account that automatically tweeted the location of Musk’s personal private jet, using public flight information, along with college sophomore Jack Sweeney, who created that account. Musk then revised Twitter’s policy to justify his decision.

This sudden change to Twitter’s rules undercut a pledge Musk had made just six weeks earlier, when he tweeted, shortly after purchasing Twitter for $44 billion: “My commitment to free speech extends even to not banning the account following my plane.”

Shortly before I was suspended, I posted about Twitter banning the account of a competitor, Mastodon. Mastodon is a decentralized social network where millions of Twitter users have fled since Musk’s purchase. Before it was banned, Mastodon’s pinned tweet read, “At Mastodon, we present a vision of social media that cannot be bought and owned by any billionaire.”

As far as I can tell, Twitter probably banned Mastodon’s account because it had tweeted, “Did you know? You can follow @ElonJet on Mastodon over at https://mastodon.social/@ElonJet.” My tweet pointed out this latest example of Twitter censorship. Here’s what it said:

micah-lee-twitter-screenshot-suspended

Screenshot: Micah Lee/The Intercept

Then, after @ElonJet and reporters who wrote about it were suspended from the platform, Musk claimed that Sweeney and the journalists who reported on the account had “posted my exact real-time location, basically assassination coordinates.”

Musk also briefly joined a public Twitter Spaces audio discussion on Thursday night, which included Sweeney and at least two of the tech journalists suspended for reporting on the suspension of his accounts. Twitter’s owner insisted that he had been “doxxed” by the @ElonJet account and said that he would ban “so-called journalists” who provided links to other sites where the flight-tracking information showing his private jet’s location could be found.

Musk’s claim that he had been doxxed was challenged by Drew Harwell, a Washington Post reporter whose account was suspended for reporting on the @ElonJet account. When Harwell said that he had never shared Musk’s address, Musk suggested that any links to the flight-tracking data was the same as giving out his address. Musk abruptly left the chat after Harwell pointed out that Twitter had blocked links to the flight-tracking data on Instagram and Mastodon, “using the same exact link-blocking technique that you have criticized as part of the Hunter Biden New York Post story in 2020.”

I’ve spent the last month writing articles that point out Musk’s hypocrisy as someone who promised to be “fighting for free speech in America.” While my reporting may not have provided the direct impetus for my suspension, it’s clear Musk was taking aim specifically at journalists who have covered him critically. And the best response to that is to read the work that billionaires would prefer you don’t:

Distributed Denial of Secrets

In November, I wrote about how even though Musk restored popular far-right accounts like Donald Trump and Marjorie Taylor Greene, he refused to restore the account of Distributed Denial of Secrets or to stop suppressing links to its website. DDoSecrets is a nonprofit transparency collective that distributes leaked and hacked documents to journalists and researchers. (I’m an adviser to DDoSecrets.)

During the Black Lives Matter protests in the summer of 2020, DDoSecrets published BlueLeaks, a leak of documents from over 200 law enforcement agencies that revealed police misconduct, including spying on activists. In response to apparent law enforcement pressure, Twitter permanently banned @ddosecrets and suppressed all links to ddosecrets.com.

The censorship of DDoSecrets is still happening today, two and a half years later.

Silencing of Left-Wing Voices

Two weeks ago, my Intercept colleague Robert Mackey and I wrote about how prominent left-wing accounts were kicked off Twitter after Musk personally invited Andy Ngo, the far-right writer and conspiracy theorist who popularized the myth that “antifa” a secret army of domestic terrorists, to tell him which accounts to ban.

Twitter suspended the accounts of the antifascist researcher Chad Loder and the video journalist Vishal Pratap Singh. Twitter also suspended the account of the Elm Fork John Brown Gun Club, an antifascist group that provides armed security for LGBTQ+ events in North Texas, and CrimethInc, an anarchist collective that has published and distributed anarchist and anti-authoritarian zines, books, posters, and podcasts since the mid-1990s.

None of these accounts violated Twitter’s rules.

Covid-19 Misinformation

Yesterday, the same day I was suspended from Twitter, I wrote about how convicted U.S. Capitol insurrectionist Simone Gold, founder of the vaccine disinformation group America’s Frontline Doctors, offered to help Musk assemble a team of doctors to fact-check medical information on Twitter.

While the article was mostly about the ludicrous alternate reality of Covid deniers, it also pointed out various ways Musk himself has allowed Covid misinformation to flourish on Twitter. This includes Twitter restoring the accounts of two prominent anti-vaccine doctors, each with over a half a million followers, and one of whom falsely claimed that Covid-19 vaccines are “causing a form of AIDS.” It also details some of Musk’s own history with Covid misinformation, such as when he falsely claimed that “kids are essentially immune” to Covid, or when he promoted the discredited drug hydroxychloroquine as a Covid cure.

Maybe my Twitter account will become live again at some point. But for now, you can find me on Mastodon.


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2022/12/16/elon-musk-is-taking-aim-at-journalists-im-one-of-them/feed/ 0 358262
Visual artist Rhea Myers on art as a playground of ideas https://www.radiofree.org/2022/12/16/visual-artist-rhea-myers-on-art-as-a-playground-of-ideas/ https://www.radiofree.org/2022/12/16/visual-artist-rhea-myers-on-art-as-a-playground-of-ideas/#respond Fri, 16 Dec 2022 08:00:00 +0000 https://thecreativeindependent.com/people/visual-artist-rhea-myers-on-art-as-a-playground-of-ideas Your most recent work, Titled (Information as Property as Art) [Ethereum Null Address] is so clever. What’s your process like when you come up with a new artwork?

Artists never have a good answer to “where do your ideas come from.” In my case I usually cram my brain with research over the months until a project idea that won’t leave me alone starts to form. I then avoid questioning it until after the project is finished, at which point its relationship to what I had immersed myself in usually becomes obvious. So there’s a strong unconscious component to my workflow, which I think might surprise people. It’s one of the reasons art takes time for me to make.

1668959516.png

Titled (Information as Property as Art), [Ethereum Null Address]

For this particular project the search space was constrained to the Albright-Knox Art Gallery’s collection, and there was a deadline. Which was nerve-wracking, as I get performance anxiety in that kind of situation. But curator Tina Rivers Ryan at AKG, who curated the work as part of the Peer to Peer exhibition, has been a fantastic collaborator within the institution.

We recognized Joseph Kosuth as someone in the AKG collection whose work obviously chimed with what I’ve been doing, and I pitched ideas based on a couple of different works by him. We then honed in on his “Titled” dictionary definition enlargements and I made six quite different presentations of the Ethereum null address inspired by this before we finalized the one you see above.

At first we were worried it might be too simple, but this was one of those irresistible ideas and of course over time it became obvious that it rewards contemplation in the way I always want my work to. Tina’s catalog essay is awesome for unpacking this and everyone should read it. I have a couple of git repos of preparatory work from the project but they’re not public. I think only Tina has seen everything that’s in them.

In the past you’ve said, “Everyone is terrified of owning a fake,” which is also a concept you play with in a lot of your works. Where do you think this fear comes from?

It’s the double-spending problem in art. With electronic currency, you need a way to know that any value you are sent hasn’t also been given to someone else, rendering it worthless to you. Bitcoin solves this in a decentralized way, and smart contract platforms like Ethereum inherit that solution. But visual art isn’t like protocol-level coins on a chain, so there’s various mismatches between the artworld problem of the fake (and it’s a big problem, up to half of the art in circulation may be fake) and the technological affordances of the blockchain as a solution to that.

If you’re an artist using those technological affordances as a medium, this is good because it gives you materials to use creatively to draw in and critique wider issues of authenticity, identity and ownership. If however you’re trying to use those affordances directly to establish authenticity, identity, and ownership you may end up in trouble. Nobody wants a cuckoo in the nest of their art collection.

For all the cynicism that it’s easy to feel about provenance trumping aesthetic content in establishing the price of artworks at auction, authenticity can be important for that very content. We can view this through Nelson Goodman’s argument in “Languages of Art”—even if we cannot distinguish a fake today, we cannot guarantee that it does not contain the information that we need to distinguish it from an authentic artwork in future. And that information may be part of the work’s content.

So the anxiety of authenticity is a matter both of not being sold the Brooklyn Bridge and of not admiring an air conditioning fixture as a sculpture by mistake. This affects the reputation of the collector, seller, critic, or art historian, but it is not reducible to a status game. It matters to people in private as well, whether dollars and cents, or meaning and sense.

Urinal04-cropped.png

Certificate of Inauthenticity, 2020, ERC-721 Tokens

Expanding on “anxiety of authenticity,” you’ve also previously said that’s what currently haunts the contemporary art world. Internet culture seems to be moving quickly past favoring “authenticity” and more towards “identity-play.” What effects do you think this will have over the next decade on art making?

The internet was a site for identity play in the 1990s. 2000s social media reduced that to singular authentic identities in order to sell to them, then maximized “engagement” between them. But none of us are reducible to a single role, and not all of us fit into the database columns that lurk behind like buttons. Danah Boyd’s research on this makes the problems very clear.

The cypherpunk ideal of privacy through secrecy comes from that same era and is encoded into crypto. That’s a good thing (on balance). Satoshi [Nakamoto] told people to never re-use Bitcoin receiving addresses, but “web3 identity” wants to tie us back to singular online identities again, just with an extra layer of cryptography. This is a long way from identity play.

But identity isn’t a late or disposable addition to crypto—a cryptographic key is an identity for a particular value of “identity.” And to borrow Isaiah Berlin’s concepts of liberty, crypto gives us both negative freedom (freedom from control through privacy and commitment) and positive freedom (freedom to experiment in a new space and to pay for those experiments). Those freedoms support self-realization which includes identity play, identity discovery, and identity exploration.

We’re seeing the effect of this already in the rapidly evolving microcultures of pfp projects. And with artists like Fewocious living their best lives via NFTs. I don’t think people have to always play with identity, if you find something that works then you can dig into that rather than needing to go further afield. Crypto as both an imaginary and a material resource can contribute to both.

Exhibition-NFT-Art-13-scaled.jpeg

Installation view, NfTNeTArT from Net Art to Art NFT, 2022; Photo: Marjorie Brunet Plaza

There’s been many conversations in the NFT space about auction houses and cultural institutions taking more of an interest in digital art. As someone who has been making blockchain art for many years, and has participated in exhibitions and auctions, what do you think about this?

Artists gotta eat. Crypto shows who is paying for your meal ticket more clearly than many people are used to. I think that’s a good thing for being able to critique the artworld, but if you come from academia or nonprofits it can be jarring.

General opinion pivoted from “computers can’t make art, digital art is boring” to “everybody uses computers to make art, digital art is boring” in the 2000s without pausing to recognize the historical value of digital art. That historical slight is being corrected now thanks to NFTs.

I’ll get into trouble if I say that you couldn’t buy digital art before—I know people who worked very hard to make that happen long before NFTs were a thing. But tying digital art to financial value in a transparent way using a digital medium seems to make that possibility click for a wider audience in a way it didn’t before. The knowledge that institutions can bring to that encounter with an audience can be so valuable. I love the ability of galleries and auction houses to provide historical context for and share understanding of my work.

None of this is to say that I’m not excited by new ways of organizing the commissioning, exhibition, sale, and critique of art that the blockchain enables. Recreating those institutions onchain, and creating new alternatives to them, in a transparent hackable medium that unifies communication, code, and value, is a historical opportunity for art.

I hope that each can learn from the other.

simple-blockchain-art-diagram.png

Simple Blockchain Art Diagram, 2016, digital media (After MTAA ca. 1997)

The gap between having any understanding of art history, and being part of the crypto scene, is wide. Does this gap need to be bridged?

That gap is where I started. I think that art and crypto can be put into a mutually productive relationship of critique. Art is a playground for new ideas, and the stakes are lower there than in, say, healthcare. And crypto is such an intense and accelerated reflection of post-financial-crash society. I wanted to get past their mutual distrust.

Crypto now has its own art history, and art has its own history of crypto use. But that has produced two additional gaps rather than closing the one that we started with. Which is frustrating because NFTs come from the art world originally to a large degree.

Maybe these gaps will disappear as the recuperation of crypto continues. Either because crypto fades into wider society and loses its alterity, or because the history of art becomes entangled enough with crypto that people have to learn about it to fully understand either.

16.large.png Tokens Equal Text, 2019, Ethereum ERC-998 and ERC-721 tokens

I ask because your work, specifically “Tokens equals Text,” rewards a knowledge and understanding of both worlds. You’re both playing with and critiquing the tension between aesthetic primitives and token standards—NFT art. What do people not yet fully understand about your work—and practice—that you wish they did?

I guess it’s that the work is all part of the same process of understanding. You’re following me as I work out what the questions are, or at least the territory. The writing doesn’t describe the images and the images certainly don’t illustrate the writing. They follow on from and call out to each other. And you can all follow that, too.

Rhea Myers Recommends:

Zeros and Ones - Sadie Plant.

Essays on Art & Language - Charles Harrison.

Crypto Anarchy, Cyberstates, and Pirate Utopias - ed. Peter Ludlow.

Digital Cash - Finn Brunton.

Art After Money, Money After Art - Max Haiven.

Radical Friends - eds. Ruth Catlow & Penny Rafferty.

Surfing With Satoshi - Domenico Quaranta.

Artists re:Thinking The Blockchain - eds. Ruth Catlow et al.


This content originally appeared on The Creative Independent and was authored by Samantha Ayson.

]]>
https://www.radiofree.org/2022/12/16/visual-artist-rhea-myers-on-art-as-a-playground-of-ideas/feed/ 0 358165
Covid Disinformation Doctor Wants to Help Elon Musk Do Medical Fact-Checks on Twitter https://www.radiofree.org/2022/12/15/covid-disinformation-doctor-wants-to-help-elon-musk-do-medical-fact-checks-on-twitter/ https://www.radiofree.org/2022/12/15/covid-disinformation-doctor-wants-to-help-elon-musk-do-medical-fact-checks-on-twitter/#respond Thu, 15 Dec 2022 18:35:46 +0000 https://theintercept.com/?p=416911

Dr. Simone Gold, a convicted U.S. Capitol insurrectionist and the founder of the vaccine disinformation group America’s Frontline Doctors, has offered to help Elon Musk assemble a team of doctors to fact-check medical information on Twitter.

“If you would like to put together a group of honest, brilliant, courageous doctors to ‘fact check,’ then I would be glad to assist you,” wrote Gold in a December 5 letter to Musk that she shared with her 587,000 Twitter followers and over 1 million email subscribers. “Medicine will not advance unless unbiased scientists are able to resist special interest groups and the media.”

Gold is the ringleader of a network of right-wing health-care providers that have made millions selling so-called alternatives to vaccines, like ivermectin and hydroxychloroquine, which have been repeatedly discredited as treatments for Covid. Gold has referred to Covid-19 vaccines as “experimental biological agents.” She’s also currently in a legal fight with AFLDS and its board chair who are suing her, alleging extravagant spending and that she lives rent-free in a $3.6 million house bought with AFLDS charity funds.

Gold’s appeal to Twitter’s owner was not in response to any public plans to create a medical fact-checking team — Musk hasn’t said anything along those lines. Rather, billionaire Mark Cuban tweeted a suggestion to Musk, and a cryptocurrency influencer who noticed that Musk liked that tweet announced it as breaking news.

Cuban suggested that Musk compile a Twitter list of doctors to participate in public polls on issues like vaccine safety and masking. Musk liked Cuban’s tweet. Cuban did not advocate for fact-checking medical information being shared on Twitter. But Matt Wallace, who charges between $19.99 and $299.99 a month to teach “the art of crypto trading,” then posted “breaking” news that Musk “is considering putting together a team of medical experts to fact check all the false things government officials have been saying!” When asked by a Twitter user whether the information was verified, Wallace cited Musk’s like of Cuban’s tweet. Wallace’s tweet has gotten almost 200,000 likes.

Misinformation Run Amok

While there’s little evidence that Musk plans to convene the fact-checking team, he has already made decisions that enable the spread of Covid misinformation on Twitter. In fact, one of Musk’s first changes after taking over Twitter was to scrap the site’s Covid misinformation policy — essentially removing Twitter’s existing fact-checking system for medical information. Twitter’s Trust and Safety team, which is responsible for moderating misinformation, has also been depleted by layoffs and mass resignations.

Musk also immediately restored accounts that were banned for Covid misinformation, including Georgia Rep. Marjorie Taylor Greene’s personal account. Throughout the pandemic, the Republican lawmaker repeatedly posted false information to her hundreds of thousands of followers, including that Covid vaccines are deadly and that ivermectin, an anti-parasitic drug primarily used to treat livestock, is a miracle cure for Covid-19.

On Monday, Musk’s Twitter restored the accounts of prominent doctors known for spreading Covid misinformation. One was Peter McCullough, a doctor whose former employer sued him for claiming to represent them while giving interviews encouraging people not to get vaccinated and falsely claiming that 50,000 people had died from Covid-19 vaccines. The other is Robert Malone, a doctor who participated in early mRNA vaccine research 30 years ago, but more recently falsely claimed that the vaccines are “causing a form of AIDS.” After Malone did an interview on Joe Rogan’s podcast, 270 physicians, scientists, and academics wrote an open letter to Spotify, which exclusively hosts the podcast, demanding that the audio streaming service “immediately establish a clear and public policy to moderate misinformation.”

Since being reinstated, McCullough, who has 640,000 followers, and Malone, who has 686,000 followers, are both already back to spreading discredited conspiracy theories about Covid.

Musk himself has also frequently tweeted Covid misinformation and antagonized evidence-based health-care professionals. Over the weekend, Musk flirted with the anti-vaccine crowd by tweeting, “My pronouns are Prosecute/Fauci” — an apparent call to prosecute the chief medical adviser to the president, Anthony Fauci, mixed with some transphobia for good measure. The refrain to take Fauci to court for how he managed the pandemic is popular on the far right.

Musk’s spread of false information goes back to the beginning of the pandemic. On March 19, 2020, he predicted that “based on current trends, probably close to zero new cases in US too by end of April” and falsely claimed that “kids are essentially immune.” According to data from the Centers for Disease Control and Prevention, by the end of April 2020, there were nearly 200,000 weekly new cases and more than 64,000 Americans had died from Covid. Over a million more Americans have died from Covid since then.

Musk has also promoted hydroxychloroquine, an anti-malaria drug, as a miracle cure for Covid-19. Like ivermectin, hydroxychloroquine is ineffective at preventing or treating Covid-19.

“Freedom Physicians”

This brings us back to Gold and America’s Frontline Doctors. In September 2021, The Intercept obtained hacked data revealing that AFLDS and a small network of telehealth companies convinced tens of thousands of people to spend at least $15 million on phone consultations and prescriptions for ivermectin and hydroxychloroquine. This reporting contributed to a congressional investigation into AFLDS.

In Gold’s letter to Musk, she says she works with “freedom physicians across the nation and world.” Gold launched AFLDS with a July 2020 press conference on the steps of the Supreme Court, where she and other “freedom physicians,” wearing white lab coats, promoted fake remedies for Covid and opposed public health measures like masking and lockdowns. Then-President Donald Trump shared videos of the event, which were viewed millions of times before Twitter and Facebook took them down for violating Covid misinformation policies.

One of the doctors at Gold’s side, Stella Immanuel, has claimed that people develop gynecological problems like cysts and endometriosis after having sex in their dreams with demons and witches.

Also at the event was Dr. Joseph Lapado, Florida Gov. Ron DeSantis’s surgeon general. Lapado has been accused of misrepresenting his experience treating Covid patients at UCLA, argued for “herd immunity” by letting Covid spread completely unchecked, and falsely claimed that Covid-19 vaccines are dangerous. Lapado’s anti-science op-eds for the Wall Street Journal caught the attention of DeSantis, who subsequently hired him as Florida’s top health-care official, according to the Washington Post. In March, Florida became the first state to defy CDC guidance when Lapado said that healthy kids don’t need to get vaccinated for Covid.

In addition to running an organization dedicated to medical disinformation, Gold faces allegations from her own organization over a misuse of funds. While Gold served two months in prison for storming the U.S. Capitol on January 6, 2021, AFLDS’s board audited her use of its funds. A lawsuit filed last month alleges that she lives rent-free in a $3.6 million mansion purchased using AFLDS charity funds in Naples, Florida. Her boyfriend, John Strand, a former underwear model who hosts misinformation videos for AFLDS and is facing 24 years in prison for his role in the insurrection, lives with her. The lawsuit accuses Gold of using AFLDS’s money to spend $12,000 a month on a bodyguard, $5,600 a month for a housekeeper, and $50,000 a month on credit card expenses, as well as purchasing three cars, including a Mercedes-Benz, and taking unauthorized flights on private jets, including a single trip that cost $100,000.

“Just as the mother lioness will not let her baby lion be murdered, neither will I,” Gold wrote in an email demanding that three AFLDS board members resign, which was made public as an exhibit in the lawsuit.

On December 6, a federal judge dismissed the lawsuit for lack of jurisdiction, making it clear that the court didn’t consider the accusations. Neither side could make a convincing argument for whether AFLDS is based in Florida or Nevada.

Since taking over Twitter, Musk has dismantled the infrastructure that prevented users from lying about vaccine safety or profiting off fake treatments for Covid-19 — things that Gold has built her recent career doing. If Musk put her in charge of a new medical fact-checking team, it would be like putting a lioness in charge of protecting gazelles.


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2022/12/15/covid-disinformation-doctor-wants-to-help-elon-musk-do-medical-fact-checks-on-twitter/feed/ 0 357969
New data show Houston-area communities are being flooded with chemicals https://grist.org/health/new-data-shows-houston-area-communities-are-being-flooded-with-chemicals/ https://grist.org/health/new-data-shows-houston-area-communities-are-being-flooded-with-chemicals/#respond Thu, 15 Dec 2022 12:45:00 +0000 https://grist.org/?p=596754 In June, Public Health Watch, the Investigative Reporting Workshop and Grist published a year-long investigation about pollution, power, and politics in the Texas petrochemical industry. This story shows what has happened in the six months since.

One by one, the residents filtered into the small community center and found seats in the rows of plastic chairs. Some were teenagers wearing yellow-and-black Galena Park High School letter jackets. Others were parents and grandparents juggling children. Many wore white headphones to hear the Spanish translator standing nearby. Everyone looked worried.

They had gathered on that chilly November night to learn what two new, high-tech monitors had found in the air in Galena Park and Jacinto City, neighboring towns in eastern Harris County, the epicenter of North America’s petrochemical industry. They were prepared for grim news.

“Everyone here knows pollution is a big problem,” said Maricela Serna, a former Galena Park commissioner who has one of the monitors on the roof of her tax preparation office. “But we want to know just how bad things really are. We deserve to know. And those in power, especially at the state level, need to know.”

Serna, 66, has lived in Galena Park since 1988 and the stench of chemicals is part of her everyday life. The odor inside her home was so bad one day that a visitor from outside the community thought there was a gas leak and called the fire department. Still, Serna held out hope that the news that night might be positive — that maybe, just maybe, the pollution wasn’t as bad as the odors let on.

But the data from the monitors confirmed her worst fears.

Maricela Serna Galena Park
Maricela Serna has lived in Galena Park since 1988. Her two oldest children left the city to protect their health and are urging their mother, a cancer survivor, to do the same. Mark Felix

Nitrogen oxides, which the U.S. Environmental Protection Agency has linked to asthma in children and lower birth weight in newborns, were consistently above the agency’s one-hour limit. Ozone, which can aggravate lung diseases including asthma and emphysema, was well above the EPA’s eight-hour limit. Particulate matter, which increases the risk for strokes and heart disease by settling deep into lungs and seeping into bloodstreams, hovered above the EPA’s annual limit. 

The readings from Serna’s office, located a block from a thoroughfare lined with petrochemical plants, were especially high. Monthly levels of nitrogen oxides, for example, averaged 170 parts per billion from June through August — nearly double what the EPA says is safe for just one hour.

The data was presented by Juan Flores, a lifelong Galena Park resident and clean-air advocate. He oversees community air monitoring programs for Air Alliance Houston, the nonprofit he works for, and Environmental Community Advocates of Galena Park, a smaller group he helped create and where he is vice president. Over the past few years, the two groups have built a network of air monitors that gives  residents basic information about the dangers they are living with.

Regulators and scientists are often skeptical of community-gathered data, because it’s usually less sophisticated than the data state and federal agencies collect. But the community data is still important, because it can be used to rally residents and prod elected officials to acknowledge a neighborhood’s plight. It can also complement the ongoing work of researchers by providing hyper-local information about wind patterns and chemical readings of volatile organic compounds, or VOCs, a diverse group of chemicals that includes some carcinogens. 

“This lower-level monitoring… warrants further investigation, but it supports what we’re seeing at the city level,” said Loren Hopkins, the chief environmental science officer for the Houston Health Department. “There’s a huge educational component, too. Instead of just using traditional advocacy, they’re actually using science to support their claims.”

Forty percent of Galena Park’s 11,000 residents live within a mile of an industrial facility. Thirty percent live below the poverty line. Mark Felix

Flores had looked forward to unveiling the new monitoring results that night. He was proud of the work the advocacy groups had done. But when he saw the residents’ worried faces, the reality of what he was about to tell them set in. 

They were accustomed to the burning smell of synthetics that filled their schools and churches, the grinding sounds of rail cars and the rumbling of industrial trucks outside their homes and businesses. They were unfazed by the sight of refinery flares burning in the sky above their parks and playgrounds. 

It’s one thing to assume the worst. It’s another to be confronted by data that proves it. 

“I could tell in their faces… they were shocked,” Flores said. “Reading it out loud just hit me like, ‘Damn, this is really bad.’ I was as horrified as they were.” 


Texas State Representative Penny Morales Shaw is also worried about the new monitoring results. 

In June, Morales Shaw, a Democrat whose district is in Northwest Houston, vowed to strengthen the Texas Commission on Environmental Quality, or TCEQ, after she read a Public Health Watch investigation of Harris County’s pollution problems. The reporting found there had been nearly 500 illegal chemical releases in the region since 2020, including one that killed two workers and injured dozens more at a LyondellBasell plant. In the six months since the story was released, there have been more than 80 additional illegal releases, according to an analysis of TCEQ records by Public Health Watch.

Morales Shaw said she was “deeply disturbed” by the TCEQ’s ineffectiveness and the mistrust the agency has created in heavily industrialized places like Galena Park. She said her top priorities in the upcoming legislative session, which begins next month, would include raising fines for unlawful emissions and giving local governments more power to push back against polluters.

Juan Flores’ new findings underscore the need for these changes, she said.

The high-tech Apis monitor on Maricela Serna’s tax preparation office recorded high levels of nitrogen oxides, which are linked to asthma and lower birth weight. From June through August, the monitor averaged 170 parts per billion of nitrogen oxides. That’s almost twice as high as the Environmental Protection Agency’s one-hour limit. Mark Felix

“Successful industry is important because that’s a key economic driver here, but we have to start prioritizing quality of life,” Morales Shaw said. “We’re hired and elected to work for the people. And the people in Galena Park and Jacinto City are suffering.”

State Senator Carol Alvarado, a Democrat who represents Galena Park, also plans to push for environmental reforms in 2023. She said she was “disappointed and disturbed” by the new monitoring results. “But growing up in that area, I can’t say I’m surprised,” she added.

Alvarado wants to increase the TCEQ’s funding so the agency can buy more air monitors and hire more staff. Between 2016 and 2021, the Texas legislature slashed the TCEQ’s funding by 20 percent, even as it increased the state budget by 16 percent. 

Other lawmakers have tried, and failed, to persuade the Republican-dominated legislature to strengthen the TCEQ. The oil, gas and petrochemical industries are such powerful forces in the Texas economy that politicians rarely oppose them. 

In 2021, the oil and gas industry employed more than 400,000 Texans and contributed nearly $16 billion to the state economy in taxes and royalties, according to the Texas Oil and Gas Association. The chemical industry employs tens of thousands more. The industries are key funders for state leaders, including Governor Greg Abbott, Lieutenant Governor Dan Patrick and Attorney General Ken Paxton, all of whom won reelection in November after receiving millions of dollars in campaign contributions from them. 

According to a report by Environment Texas and the Environmental Integrity Project, polluters in Texas were fined for less than 3 percent of nearly 25,000 illegal chemical releases between 2011 and 2016. A TCEQ spokesman told Public Health Watch in June that “the current enforcement rate for reported emission events is over 10 percent.” 


A new generation of Harris County leaders is doing what it can to fill the regulatory void left by the TCEQ.

The Democrat-controlled Harris County Commissioners Court — which oversees a multibillion-dollar budget and sets policies for everything from public health to law enforcement — gave the county’s  Pollution Control department $5.9 million in 2019 so it could hire more employees and buy air monitors and a mobile lab. In 2022, the court boosted  the department’s annual budget by $1.2 million. 

This trend is likely to continue, because the November elections gave the Democrats, led by Judge Lina Hidalgo, a 4-1 majority on the court.

Harris County Attorney Christian Menefee said local action is critical when the state fails to protect public health. Since becoming the county’s chief civil lawyer two years ago, he has made suing polluters a priority, even though he says he’s working “with both hands tied behind [his] back.” In addition to facing powerful companies with well-heeled legal teams, he also has to navigate industry-friendly state laws that restrict not only when counties can sue oil and gas companies but also how much money they can sue for. 

A water tower is decorated with the mascot for Galena Park High School, which sits less than a mile from a terminal that can hold more than 10 million barrels of chemicals. In November several students attended a community meeting to learn what chemicals are hovering in the air in their neighborhoods. Mark Felix

“We’ve had to get creative, find new angles when targeting facilities after emission events,” Menefee said. “Upholding the law shouldn’t be this hard, but the state of Texas has shown time and time again that its first goal is protecting industry, rather than protecting these communities.”


Despite the county’s growing commitment to environmental justice, communities of color like Galena Park, where nearly 30 percent of residents live below the poverty line and 40 percent live within a mile of an industrial facility, still feel left behind. That’s why the local air monitoring network is so important, Flores said.

At first, the network relied on inexpensive PurpleAir monitors that only capture readings for easily detectable pollutants like smoke and particulate matter. In March, it added the two new Apis air monitors that provided the data Flores shared last month. They gather real-time readings for ozone, nitrogen oxides and particulate matter. They also detect overall levels for VOCs. 

Next year the network will be able install even more advanced equipment, using a grant from the EPA. It includes $75,000 to buy canisters that can measure emissions from individual facilities, as well as monitors that can identify individual VOCs, including benzene. Benzene is of particular concern because it can cause leukemia and is frequently released by chemical plants and oil refineries. 

The grant also gives the network access to mobile monitoring services provided by a private, California-based company. Its equipment can pinpoint the presence of high-risk chemicals in as little as five seconds.

The first community air monitors installed in Galena Park were inexpensive PurpleAir monitors that capture only easily detectable pollutants, including smoke and particulate matter. More sophisticated monitors have since been installed to collect data on ozone, nitrogen oxides, particulate matter and volatile organic compounds. Mark Felix

This kind of work should be celebrated, said Hopkins, the Houston Health Department’s top environmental scientist. But communities need more help from state regulators — and they need it now. 

“We can keep studying these communities, but the people there are tired of being studied. We need to take action,” Hopkins said. “Tightening permits, enforcing violations… The whole thing would be so much better if we controlled emissions to begin with, instead of trying to clean things up afterwards.”

The need for early intervention is especially apparent in Galena Park and Jacinto City, where residents have seen generations of neighbors ravaged by cancer.

Maricela Serna, the tax preparer with a monitor on top of her office, had a malignant tumor removed from her ovaries in 2012. Her biannual cancer screenings have been clean since then, but she worries the chemicals she breathes every day will cause the disease to return and spread. Her two oldest children moved away from Galena Park to escape the pollution, and they’re urging her to do the same. 

But it’s not that simple.

“I have a business to run and am still three or four years away from retiring,” Serna said. “I wish I could just get up and go now. But it’s very expensive to move and we don’t have the money.”

Real estate agent José Ramón said many of his clients are older Galena Park residents who decided to sell their homes after discovering they had cancer. Ramón also hopes to move before he gets cancer himself. Mark Felix

José Ramón, a real estate agent who has a PurpleAir monitor behind his Jacinto City home, said two of his children also left the area. He urged them to get out while they were still young.

“I’ve noticed a pattern: A lot of people, mostly in their late 50s, have called me up to sell their house because they’ve been diagnosed with different kinds of cancer,” Ramón said. “They just want to salvage their health. I want to do the same before it’s too late.”


The November meeting in Galena Park ended with one last reality check.

After all the questions had been asked and answered, Juan Flores paused for a moment, his face looking worn under the fluorescent lights’ yellowish glow. 

In September, he told the small crowd, he had been diagnosed with MGUS, a blood disorder that affects plasma cells in bone marrow and diminishes kidney function. MGUS can evolve into multiple myeloma — a blood cancer that, according to the American Cancer Society, has been linked to exposure to high levels of benzene. 

“It’s happening to me. I live here with y’all,” Flores said.  “And if it’s happening to me, it can happen to you and any other family member.”

As he spoke, Flores looked at his 6-year-old daughter, Dominique, who sat in the front row wearing a red superhero’s cape. She was born with a malignant tumor in her stomach that required chemotherapy and multiple surgeries. Years before, Flores’ father died of a heart attack on the job after spending decades working in refineries. He was just 51.

Flores said his doctor told him there’s a 10 percent chance that his condition will evolve into cancer. But he fears that number will go up if he stays in Galena Park much longer. He recently bought a small plot of land in Trinity, a rural town 100 miles to the north. Now he’s trying to scrape together enough money to buy a mobile home and move his family away from the pollution. 

Savanna Strott with Public Health Watch contributed to this story. 

This story was originally published by Grist with the headline New data show Houston-area communities are being flooded with chemicals on Dec 15, 2022.


This content originally appeared on Grist and was authored by David Leffler.

]]>
https://grist.org/health/new-data-shows-houston-area-communities-are-being-flooded-with-chemicals/feed/ 0 357893
How Elon Musk Says He Catches Leakers at His Companies https://www.radiofree.org/2022/12/15/how-elon-musk-says-he-catches-leakers-at-his-companies/ https://www.radiofree.org/2022/12/15/how-elon-musk-says-he-catches-leakers-at-his-companies/#respond Thu, 15 Dec 2022 11:00:51 +0000 https://theintercept.com/?p=417032

In 2008, the Silicon Valley-focused blog Valleywag published a letter from a “Tesla insider” stating that the company only had about $9 million in cash on hand. Four days later, a Tesla employee apologized for writing the letter. When recently asked on Twitter how Tesla identified the leaker, Musk responded that “we sent what appeared to be identical emails to all, but each was actually coded with either one or two spaces between sentences, forming a binary signature that identified the leaker.”

Curiously, Musk’s recollection of how the Tesla leaker was caught is different from an account provided by Ashlee Vance in his 2015 biography, “Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future.” Vance states that Musk retyped the letter into a Word document, printed it, and then looked through printer logs to find who else had printed a document of the same size. Though a retyped document is unlikely to be byte-for-byte identical to the original letter, given the fluctuations in file size based on metadata and the like, the recreated letter would nonetheless be of comparable size, plausibly giving Musk a ballpark size to look for when auditing printer logs.

But there are yet other accounts of how the leaker was caught. The Sunday Times and Gawker, for instance, both reported that the leak investigation involved taking fingerprints from a printout near a copier, though neither publication explained how the fingerprints were used to identify a leaker. Those accounts raise the curious question of how Tesla or its investigators might have had access to employee fingerprint records.

Regardless of the particular methods used to identify the Tesla leaker, and whether Musk is indulging in a spot of parallel construction, the key takeaway for leakers at Musk’s newest and chaotic company, Twitter, is that they should not print out (or even compose) letters using company resources.

To begin with, a wide array of document watermarking measures can identify the source of a leak. That’s why leakers and publishers need to figure out whether a given document is unique and whether it is safe to publish the document itself — or maybe, in the interest of protecting the source, not publish or even write about the document at all.

The notion of uniquely fingerprinting or watermarking each version of a digital text using various spacing modifications is not particularly new. It has been discussed since at least the early 1990s, with research building on general fingerprinting literature from the early 1980s. Ironically, one of the original proposed applications of document watermarking was to protect newspaper and magazine articles from unauthorized distribution.

Every spatial element of a document — including the spacing between characters, words, sentences, and paragraphs — can be modified in every version to form a unique signature that identifies the recipient of that particular document. For instance, a version of a document sent to one person could have slight variations in the distance between certain characters, words, sentences, or paragraphs that uniquely differentiate the document from a version sent to another person with ever-so-slightly different spacings.

As Musk pointed out, a very primitive spatial watermarking scheme could code a single space after a sentence as a ‘0’, and a double space as a ‘1’, resulting in a “binary signature.” If every copy of an email has a unique spacing pattern, an organization can determine the specific recipient of a leaked email.

One of the original proposed applications of document watermarking was to protect newspaper and magazine articles from unauthorized distribution.

Of course, the amount of possible unique watermarks is dependent on the size of the available text, but that size doesn’t need to be large for the watermarking scheme to be sufficient. In the basic watermarking approach described by Musk, the number of possible unique emails doubles for every added sentence. A two-sentence email could have four unique permutations with both sentences having a double space, both having a single space, or one having a single space and the other a double space, and so on. A nine-sentence email could have up to 512 such permutations — and that would be more than enough to uniquely identify every Tesla staff member as of October 2008, when the company reportedly had under 400 employees. It should likewise be kept in mind that in a more complex spacing watermark scheme, seemingly errant spaces could also be introduced between words or even between characters, under the veneer of being typos, which would greatly increase the number of possible unique permutations even for a modest body of text.

The rub is that if an organization has hundreds or thousands of staff, it would need to create a watermarking (and accompanying distribution) system to match. This system could involve having the sender manually modify each email, or it could be an automated system that creates unique permutations of a given text and keeps track which employee is assigned each permutation.

This leads to a basic check that would-be leakers should apply prior to sharing an email or a document. Was the email sent to an individual email address or to a group email address? If the email was sent to a group address, is this an address that’s been used before, or is the address slightly off, perhaps including a stray character or number?

If an email was sent to an individual address, the chances are higher that it could be watermarked. However, an email can be watermarked even if sent to a group address. For instance, a sophisticated (and hypothetical) system could modify the membership of a group email address to only contain a single recipient for each permutation of an email. The group membership is temporarily modified to remove everyone but a single staff member who is sent a uniquely watermarked version of an email. That staff member is then removed from the group membership and another staffer is added who receives a different version, then that staffer is deleted and another is added who receives yet another version — and on and on the ruse goes until all staff receive an email that appears to have been sent to a group, but which in fact is unique to each staffer. Staff may be prone to thinking that the email they received is safe to leak, since it was sent to a group email address, though the emails are in fact individually marked.

Thus, receiving an email sent to what appears to be a group email address is not a guarantee that an email hasn’t been individually watermarked.

Good News, Bad News

Spatial watermarking can be neutralized through manual transcription. Instead of printing or copy-and-pasting a document, a leaker or the publisher of a leaked document can retype a document into plain-text format; this would get rid of spatial watermarks, as well as other techniques such as font-based watermarking, which would entail sending every recipient an email in a slightly different font, or homoglyph watermarking, which replaces certain characters with lookalike characters.

That’s the good news. However, in addition to “open space” watermarks, text can be watermarked via minute syntactic (structural) as well as semantic (word choice) alterations.

For instance, an example of syntactic watermarking arose when the website Genius, which posts and allows users to annotate song lyrics, suspected that Google was taking lyrics from their site and reproducing them in full in its search results (Google was trying to keep users from clicking away to other sites). Genius watermarked their lyrics with variations of straight and curly single-quote characters, which, when translated to Morse code, spelled out the word “red-handed.” When a search for song lyrics on Google turned up the same pattern of punctuation marks, Google was indeed caught red-handed.

It’s also been reported that Musk has used semantic watermarking techniques. As described by Gawker in 2009, “Musk set out to entrap potential leakers by sending each employee a slightly altered version of an email which he expected would get sent to the media.” Each copy of the email used unique word arrangements; for instance some stated “I am,” while others said “I’m.” The watermarking scheme was foiled when Tesla’s general counsel apparently forwarded to everyone in the company his copy of the email, which meant that staff could now compare the version they had received to the lawyer’s version. They could also just leak the lawyer’s version of the email.

Each copy of the email used unique word arrangements; for instance some stated “I am,” while others said “I’m.”

This case highlights how semantic watermarking would survive manual transcription, though it can be foiled by comparing multiple copies of a given text. However, if it’s not possible to review multiple copies, and there’s a possibility a document has been semantically watermarked, then it’s best to not reproduce the original document in a story, as well as, ideally, not quoting from it, lest the quotation contains part of the semantic watermark.

However, the deployment of a so-called canary trap or barium meal test extends beyond spacing or word alterations in documents. Other tactics involve each person at an organization being presented with a unique document or unique piece of information in a document (say, a supposedly new Twitter feature mentioned only to a suspected leaker). In these cases, a story’s reference to a particular document, or a particular item in the document, could identify the leaker. This highlights the crucial importance of obtaining multiple sources to confirm new information in a leaked document – and this may be tricky as revealing the new piece of information to a second source may compromise the original source if the second one mentions it to someone else at the organization.

Ultimately, a variety of strategies can be used to attempt to safeguard a source from watermarking schemes used by Musk or others, ranging from confirming that the same copy of a document was presented to multiple staff, to transcribing the document, to not quoting from the document, to altogether not mentioning a given document. Though organizations may have a variety of tricks up their sleeve, leakers are far from powerless in this dynamic and have a number of techniques at their disposal to foil watermarking measures.

Nonetheless, it’s important to remember that even the best attempts at foiling watermarks are not foolproof guarantees against source identification, as there are other methods of workplace surveillance, including audits of who accessed leaked documents and video footage of employees copying documents. With Musk recently making threats against would-be leakers, it’s now more important than ever to stay vigilant — even if you don’t work at Twitter.


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2022/12/15/how-elon-musk-says-he-catches-leakers-at-his-companies/feed/ 0 357872
Tweaked Twitter Privacy Rules Would Ban Elon Musk’s Bêtes Noires — or Not https://www.radiofree.org/2022/12/15/tweaked-twitter-privacy-rules-would-ban-elon-musks-betes-noires-or-not/ https://www.radiofree.org/2022/12/15/tweaked-twitter-privacy-rules-would-ban-elon-musks-betes-noires-or-not/#respond Thu, 15 Dec 2022 00:28:25 +0000 https://theintercept.com/?p=417089

In a change to its anti-doxxing policy made Wednesday, Twitter barred users from sharing a person’s “live” location, a broad, vague, and immediately confusing prohibition. The policy was amended on the same day Twitter banned @ElonJet, an account that tracked owner Elon Musk’s personal private jet, along with the account of its creator, college sophomore Jack Sweeney. Later, the @ElonJet account, but not Sweeney’s private account, was reinstated.

Twitter’s newly revised “Private information and media policy” now forbids users from sharing “live location information, including information shared on Twitter directly or links to 3rd-party URL(s) of travel routes, actual physical location, or other identifying information that would reveal a person’s location, regardless if this information is publicly available.”

The new rule, which an Internet Archive snapshot of the page shows was not present the day before Sweeney and @ElonJet were banned, is at odds with Musk’s gesturing toward free speech absolutism. He claimed that his purchase of the social media giant augured a radically more permissive era for its users — specifically mentioning Sweeney’s account.

On November 6, Musk pledged that he would not ban @ElonJet. “My commitment to free speech extends even to not banning the account following my plane, even though that is a direct personal safety risk,” Musk tweeted. On Wednesday, less than a month later, Musk reversed course entirely: “Real-time posting of someone else’s location violates doxxing policy, but delayed posting of locations are ok.” Hours later, @ElonJet was suddenly back, without explanation.

@ElonJet uses freely available public flight data to chart trips using Musk’s jet, whether he was aboard or not. Virtually every single aircraft in the sky broadcasts such location data through a legally mandated radio transponder. Other flight-tracking accounts created by Sweeney, such as one that tracks the planes of Russian oligarchs, remain offline.

The @ElonJet account had previously attracted Musk’s ire, particularly after Sweeney rejected a $5,000 offer from the world’s then-richest man to voluntarily shutter the account in January.

Late Wednesday afternoon, a Twitter Safety account clarified that tweeting someone’s precise location would be allowed so long as it was “not same-day” — a crucial term left undefined. The account added: “Content that shares location information related to a public engagement or event, such as a concert or political event, is also permitted” — though it’s similarly unclear what exactly fits the definition of a “public engagement or event,” or how the rule could affect news-gathering or the vast volume of ordinary inoffensive speech that merely observes that a given person is currently at a given place.

The total ambiguity of the rule — would it prohibit tweeting a picture you just took of Times Square, thereby disclosing the exact location of every stranger in it? — will give Musk a great deal of latitude in how and when it’s enforced.

The revised policy further says, “If your account is dedicated to sharing someone’s live location, your account will be automatically suspended” — a brand-new rule under which @ElonJet was unceremoniously banned, before being inexplicably later reinstated.

A Twitter spokesperson could not be reached for comment; the company no longer has a communications team.


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/12/15/tweaked-twitter-privacy-rules-would-ban-elon-musks-betes-noires-or-not/feed/ 0 357785
How a new subsidy for ‘green hydrogen’ could set off a carbon bomb https://grist.org/energy/how-a-new-subsidy-for-green-hydrogen-could-set-off-a-carbon-bomb/ https://grist.org/energy/how-a-new-subsidy-for-green-hydrogen-could-set-off-a-carbon-bomb/#respond Mon, 12 Dec 2022 11:45:00 +0000 https://grist.org/?p=596317 The United States stands at a pivotal point on the path to addressing climate change. The Inflation Reduction Act will over the next decade unleash hundreds of billions of dollars in subsidies designed to make clean technologies so cheap they will be rapidly deployed, helping the nation cut emissions some 40 percent by 2030

If those subsidies work as intended, that is.

In the case of a new tax credit for clean hydrogen, a lot rides on that “if.” It could accelerate a critical climate solution that could drive down greenhouse gas emissions in many sectors of the economy. Or it could underwrite a process that actually increases emissions. The outcome depends largely on accounting rules that the Treasury Department has yet to write. 

“Getting this right is critical to making this credit work,” Nathan Iyer, a senior policy associate at the clean energy research nonprofit RMI, told Grist.

Decarbonization experts say clean hydrogen is an important tool for addressing climate change because it could more or less replace fossil fuels in many applications and doesn’t release CO2 when burned. Some see it fueling trucks, cargo ships, and even airplanes. Others consider it a promising replacement for coal in producing steel. It also holds potential as a means of storing wind and solar energy to be drawn upon when those resources aren’t available. At the very least, it could replace the dirty hydrogen we use today, largely to make fertilizer.

Although hydrogen is the most abundant element in the universe, you can’t just dig it up like fossil fuels. Instead, it has to be pulled off of other compounds, like methane (CH4) or water (H2O). Almost all of the hydrogen used today is derived from methane, or natural gas, in a process that releases carbon dioxide. But it’s possible — albeit more expensive — to make hydrogen with zero emissions through electrolysis. All it takes is electricity, water, and a device called an electrolyzer, which splits H2O into hydrogen and oxygen. Use renewable energy and the process is emissions-free — creating a product often referred to as “green hydrogen.” Only a handful of plants around the world use electrolysis, which contributed about 0.04 percent of the global supply of hydrogen in 2021. 

There are other options for lowering hydrogen emissions, including installing carbon capture equipment on conventional hydrogen plants. The new tax credit is designed to make various cleaner production techniques more competitive with conventional methods. But it offers the largest return — $3 per kilogram of hydrogen — for a near-zero emissions process, giving a boost to green hydrogen in particular. There is no cap on the benefit a producer can earn, and the total payout across the industry could be tens of billions of dollars over the next decade. 

In theory, splitting water molecules with renewable energy is an elegant solution, but that description glosses over a key problem: Many producers plan to draw power from the electric grid in addition to, or instead of, a wind or solar farm. Given that much of the nation’s grid power comes from fossil fuels, the energy-intensive nature of electrolysis could end up generating more emissions than conventional natural gas-based hydrogen.

“The electricity has to be extremely clean for the emissions to actually be low and even remotely environmentally friendly,” said Wilson Ricks, a mechanical and aerospace engineer earning his doctorate in Princeton University’s ZERO Lab. Ricks recently published a working paper that identified ways to credibly lower the climate impacts of grid-connected hydrogen.

Now it will be up to the U.S. Treasury Department to ensure that the tax credit doesn’t reward hydrogen producers for a process that could move us farther away from our climate goals than we are today. 

The Hybrit pilot plant in Lulea, Sweden has started producing lower-carbon steel using green hydrogen. Steffen Trumpf/picture alliance via Getty Images

Before the Inflation Reduction Act passed in August, most green hydrogen projects being proposed in the U.S. were set up the same way, said Matthew Bravante, a hydrogen analyst at clean energy research firm BloombergNEF. “They were all grid-connected,” he said.

There are a few reasons for this. Electrolyzers are expensive, and it makes the most financial sense to run them 24/7 to maximize productivity. That’s not possible with wind or solar alone. What’s more, Bravante said, the companies making these complex machines don’t know if cycling them on and off as clouds pass or breezes stop degrades the equipment. As a result, manufacturers are hesitant to warranty them for such use, undermining project developers’ ability to raise capital.

There are other considerations. Any producer piping hydrogen to a buyer requiring a constant supply must use the grid to ensure a steady output or build storage tanks to compensate for intermittent production. And some simply do not have enough land to build wind or solar farms. 

Grid-powered electrolyzers might make business sense, but they are harder to square as a climate solution. Some 60 percent of U.S. electricity is currently generated by burning fossil fuels. If you used the average grid electricity to produce hydrogen today, the process would release about twice the emissions of conventional hydrogen production.

Before the tax credit was created, green hydrogen producers had a plan to get around this problem: “They were either going to use renewable energy credits or virtual power purchase agreements to convince an investor they were green,” Bravante said.

These are both market-based mechanisms that many companies use today to “procure” clean energy when they connect to the dirty grid, but researchers have found that they aren’t fit for purpose.  

Renewable energy credits are tradable certificates, each representing one megawatt-hour of electricity that has been generated somewhere, at some point, by a wind or solar farm.  Research has repeatedly shown that the purchase of such credits fails a critical test — it doesn’t help bring new clean resources onto the grid, so it doesn’t actually reduce emissions.  

Virtual power purchase agreements are essentially a more sophisticated way for a company to buy clean energy certificates, by entering into a long-term contract directly with a renewable energy provider. These contracts typically do help finance new wind and solar projects, but they have another problem. Most renewable energy sources don’t generate power 24/7. If a hydrogen plant signs an agreement with a new, local solar farm but continues operating after dark, a nearby natural gas or coal plant will probably ramp up to meet that demand.

This will remain an issue even as the grid becomes cleaner, said Ricks, the Princeton doctoral student. In his working paper, he used an economic model to look at the emissions impacts of grid-connected hydrogen in the western United States in 2030, including in Southern California, which is expected to have an 80 percent clean grid by that date. Under that scenario, even if hydrogen plants purchase enough solar power to cover their cumulative energy needs, their nighttime demand will still be met by coal- and gas-fired plants. That could prop up dirty power plants that would otherwise be slated for closure. “Just running those more may well be the cheapest option for supplying 24/7 demand for electricity,” Ricks said. 

Emissions could surge as a result. Ricks estimates that these “consequential emissions” for a Southern California hydrogen plant would amount to about 20 kilograms of carbon dioxide per kilogram of hydrogen produced. That’s five times higher than even the lowest threshold that the Inflation Reduction Act sets for earning the tax credit. Emissions could be double that amount in coal-heavy parts of the country like Wyoming. But producers could reap the full $3 clean hydrogen subsidy if the government doesn’t take these emissions into account.

A coal mine in Kemmerer, Wyoming that serves the nearby Naughton power plant, which is scheduled to be decommissioned in 2025. Natalie Behring/Getty Images

These issues are at the center of an ongoing debate in Europe about how to define green hydrogen, a conversation now starting in the U.S. Within the next year, the Treasury and Energy Departments will develop guidance outlining whether companies can use market-based mechanisms to demonstrate eligibility for the tax credit and other subsidies, and if so, under what conditions. Iyer said the agencies must strike a balance between keeping emissions in check and supporting an emerging industry.

The guidance “has to be strict enough to actually reduce emissions, flexible enough to put electrolyzers on the grid and actually build out these projects, and it has to be simple enough that the IRS can do it,” he said.

The government could easily achieve two out of three, making the rules so strict that only projects that rely exclusively on dedicated renewables qualify. Bravante said that would likely stunt the industry’s growth but the tax credit is generous enough that some projects will still get built.

At least one company, Hy Stor, is already going this route with a hydrogen plant it’s building in Mississippi. Hy Stor has acquired 70,000 acres of land — some of it across the border in Louisiana — for the facility and the solar and wind farms needed to power it. The plant will also utilize underground caverns to store the hydrogen so that it can provide a steady stream to customers. “We’re not trying to put an asterisk or small print,” says company CEO Laura Luce. “We’re really trying to focus on a clean standard where someone knows exactly what they’re getting.”

Fabian Sommer/picture alliance via Getty Images

Rather than forcing all green hydrogen producers to emulate Hy Stor, Ricks argues that the Treasury should allow grid-connected projects — under three conditions: Any renewable energy credits or purchase agreements they use to claim lower emissions should be associated with new clean energy resources, in the same region as the hydrogen plant, and match the plant’s electricity consumption on an hourly, instead of annual, basis. This strategy is also known as 24/7 carbon-free energy.

Adhering to these three requirements might mean that a hydrogen plant buying solar power through a purchase agreement would have to limit its operations to daylight hours, or earn the tax credit for production only during those hours. But it could also encourage hydrogen producers to buy power from renewables like geothermal plants that generate electricity when a solar farm cannot. Such technologies are needed to create a truly clean electricity grid, but they are harder to finance than wind and solar. Rules governing the hydrogen tax credit could give them a much-needed boost.

“This hydrogen load could be a real subsidy for geothermal, for long-duration storage, for all the things we need,” said Iyer. “And if we do it badly, it could just keep a natural gas plant alive. And then this accounting fiction is used to not only keep the natural gas plant alive, but also provide a massive credit to do so.”

Ricks’ modeling showed that if hydrogen producers follow these three conditions, their grid-connected hydrogen will be no worse for the climate than hooking up directly to renewables. Enforcing these principles would certainly raise development costs, but Ricks said that the $3-per-kilogram maximum tax credit would still make projects feasible — especially as electrolyzer prices come down.

Ricks’ solution isn’t perfect. His study also found that the tax credit creates a perverse incentive: It’s so lucrative that it could enable hydrogen companies to outcompete other buyers of renewable energy. In some parts of the country it could end up supporting clean hydrogen production at the expense of cleaning up the electricity that ordinary people use. In Wyoming, for example, hydrogen producers could buy up all the cheap wind that would otherwise replace gas and coal on the grid.

To Ricks, this tradeoff might be worth it to help the hydrogen industry scale up and bring costs down over the next several years. And he’s confident that asking companies to meet the three conditions is the best way to minimize the risks. “It’s not going to completely solve the problem of us prioritizing hydrogen over electricity decarbonization, which is effectively what a subsidy of this scale is doing, but it will make that hydrogen production as clean as we can effectively make it.”

This story was originally published by Grist with the headline How a new subsidy for ‘green hydrogen’ could set off a carbon bomb on Dec 12, 2022.


This content originally appeared on Grist and was authored by Emily Pontecorvo.

]]>
https://grist.org/energy/how-a-new-subsidy-for-green-hydrogen-could-set-off-a-carbon-bomb/feed/ 0 357020
Inside Google’s Quest to Digitize Troops’ Tissue Samples https://www.radiofree.org/2022/12/12/inside-googles-quest-to-digitize-troops-tissue-samples/ https://www.radiofree.org/2022/12/12/inside-googles-quest-to-digitize-troops-tissue-samples/#respond Mon, 12 Dec 2022 11:00:00 +0000 https://www.propublica.org/article/google-human-tissue-jpc-military by James Bandler

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

In early February 2016, the security gate at a U.S. military base near Washington, D.C., swung open to admit a Navy doctor accompanying a pair of surprising visitors: two artificial intelligence scientists from Google.

In a cavernous, temperature-controlled warehouse at the Joint Pathology Center, they stood amid stacks holding the crown jewels of the center’s collection: tens of millions of pathology slides containing slivers of skin, tumor biopsies and slices of organs from armed service members and veterans.

Standing with their Navy sponsor behind them, the Google scientists posed for a photograph, beaming.

Mostly unknown to the public, the trove and the staff who study it have long been regarded in pathology circles as vital national resources: Scientists used a dead soldier’s specimen that was archived here to perform the first genetic sequencing of the 1918 Flu.

Google had a confidential plan to turn the collection of slides into an immense archive that — with the help of the company’s burgeoning, and potentially profitable, AI business — could help create tools to aid the diagnosis and treatment of cancer and other diseases. And it would seek first, exclusive dibs to do so.

“The chief concern,” Google’s liaison in the military warned the leaders of the repository, “is keeping this out of the press.”

More than six years later, Google is still laboring to turn this vast collection of human specimens into digital gold.

At least a dozen Defense Department staff members have raised ethical or legal concerns about Google’s quest for service members’ medical data and about the behavior of its military supporters, records reviewed by ProPublica show. Underlying their complaints are concerns about privacy, favoritism and the private use of a sensitive government resource in a time when AI in health care shows both great promise and risk. And some of them worried that Google was upending the center’s own pilot project to digitize its collection for future AI use.

Pathology experts familiar with the collection say the center’s leaders have good reason to be cautious about partnerships with AI companies. “Well designed, correctly validated and ethically implemented [health algorithms] could be game-changing things,” said Dr. Monica E de Baca, chair of the College of American Pathologists’ Council on Informatics and Pathology Innovation. “But until we figure out how to do that well, I’m worried that –knowingly or unknowingly –there will be an awful lot of snake oil sold.”

When it wasn’t chosen to take part in JPC’s pilot project, Google pulled levers in the upper reaches of the Pentagon and in Congress. This year, after lobbying by Google, staff on the House Armed Services Committee quietly inserted language into a report accompanying the Defense Authorization Act that raises doubts about the pathology center’s modernization efforts while providing a path for the tech giant to land future AI work with the center.

Pathology experts call the JPC collection a national treasure, unique in its age, size and breadth. The archive holds more than 31 million blocks of human tissue and 55 million slides. More recent specimens are linked with detailed patient information, including pathologist annotations and case histories. And the repository holds many examples of “edge cases” — diseases so vanishingly rare that many pathologists never see them.

Human tissue samples from 1917 and 1918 stored in paraffin are part of the Joint Pathology Center’s collection, which contains more than 31 million tissue blocks and 55 million slides. (Linda Davidson/The Washington Post via Getty Images)

Google sought to gather so many identifying details about the specimens and patients that the repository’s leaders feared it would compromise patients’ anonymity. Discussions became so contentious in 2017 that the leaders of the JPC broke them off.

In an interview with ProPublica, retired Col. Clayton Simon, the former director of the JPC, said Google wanted more than the pathology center felt it could provide. “Ultimately, even through negotiations, we were unable to find a pathway that we legally could do and ethically should do,” Simon said. “And the partnership dissolved.”

But Google didn’t give up. Last year, the center’s current director, Col. Joel Moncur, in response to questions from DOD lawyers, warned that the actions of Google’s chief research partner in the military “could cause a breach of patient privacy and could lead to a scandal that adversely affects the military.”

Joel Moncur (Kate Copeland for ProPublica)

Google has told the military that the JPC collection holds the “raw materials” for the most significant biotechnology breakthroughs of this decade — “on par with the Human Genome Project in its potential for strategic, clinical, and economic impact.”

All of that made the cache an alluring target for any company hoping to develop health care algorithms. Enormous quantities of medical data are needed to design algorithmic models that can identify patterns a pathologist might miss — and Google and other companies are in a race to gather them. Only a handful of tech companies have the scale to scan, store and analyze a collection of this magnitude on their own. Companies that have submitted plans to compete for aspects of the center’s modernization project include Amazon Web Services, Cerner Corp. and a host of small AI companies.

But no company has been as aggressive as Google, whose parent company, Alphabet, has previously drawn fire for its efforts to gather and crunch medical data. In the United Kingdom, regulators reprimanded a hospital in 2017 for providing data on more than 1.6 million patients, without their understanding, to Alphabet’s AI unit, DeepMind. In 2019, The Wall Street Journal reported that Google had a secret deal, dubbed “Project Nightingale,” with a Catholic health care system that gave it access to data on millions of patients in 21 states, also without the knowledge of patients or doctors. Google responded to the Journal story in a blog post that stated that patient data “cannot and will not be combined with any Google consumer data.”

In a statement, Ted Ladd, a Google spokesperson, attributed the ethics complaints associated with its efforts to work with the repository to an “inter-agency issue” and a “personnel dispute.”

“We had hoped to enable the JPC to digitize its data and, with its permission, develop computer models that would enable researchers and clinicians to improve diagnosis for cancers and other illnesses,” Ladd said, noting that all of Google’s health care partnerships involve “the strictest controls” over data. “Our customers own and manage their data, and we cannot — and do not — use it for any purpose other than explicitly agreed upon by the customer,” Ladd said.

In response to questions from ProPublica, the JPC said none of its de-identified data would be shared during its modernization process unless it met the ethical, regulatory, and legal approvals needed to ensure it was done in the right way.

“The highest priority of the JPC’s digital transformation is to ensure that any de-identified digital slides are used ethically and in a manner that protects patient privacy and military security,” the JPC said.

But some fear that even these safeguards might not be enough. Steven French, a DOD cloud computing engineer assigned to the project, said he was dismayed by the relentlessness of Google’s advocates in the department. Lost in all their discussions about the speed, scale and cost-saving benefits associated with working with Google seemed to be concerns for the interests of the service members whose tissue was the subject of all this maneuvering, French told ProPublica.

“It felt really bad to me,” French said. “Like a slow crush towards the inevitability of some big tech company monetizing it.”

The JPC certainly does need help from tech companies. Underfunded by Congress and long neglected by the Pentagon, it is vulnerable to offers from well-funded rescuers. In spite of its leaders’ pleas, funding for a full-scale modernization project has never materialized. The pathology center’s aging warehouses have been afflicted with water leaks and unwelcome intruders: a marauding family of raccoons.

The story of the pathology center’s long, contentious battle with Google has never been told before. ProPublica’s account is based on internal emails, presentations and memos, as well as interviews with current and former DOD officials, some of whom asked not to be identified because they were not authorized to discuss the matter or for fear of retribution.

Google’s Private Tour

In December 2015, Google began its courtship of the JPC with a bold, unsolicited proposal. The messenger was a junior naval officer, Lt. Cmdr. Niels Olson.

“I’m working with Google on a project to apply machine learning to medical imaging,” Olson wrote to the leaders of the repository. “And it seems like we are at the stage where we need to figure exactly what JPC has.”

Niels Olson (Kate Copeland for ProPublica)

A United States Naval Academy physics major and Tulane medical school graduate, Olson worked as a clinical and anatomical pathology resident at the Naval Medical Center in San Diego.

With digitized specimen slides holding massive amounts of data, pathology seemed ripe for the coming AI revolution in medicine, he believed. Olson’s own urgency was heightened in 2014 when his father was diagnosed with prostate cancer.

That year, Olson teamed up with scientists at Google to train software to recognize suspected cancer cells. Google supplied expertise including AI scientists and high-speed, high-resolution scanners. The endeavor had cleared all privacy and review board hurdles. They were scanning Navy patients’ pathology slides at a furious clip, but they needed a larger data set to validate their findings.

Enter the JPC’s archive. Olson learned about the center in medical school. In his email to its leaders in December 2015, Olson attached Google’s eight-page proposal.

Google offered to start the operation by training algorithms with already digitized data in the repository. And it would do this early work “with no exchange of funds.” These types of partnerships free the private parties from having to undergo a competitive bidding process.

Google promised to do the work in a manner that balanced “privacy and ethical considerations.” The government, under the proposal, would own and control the slides and data.

Olson typed a warning: “This is under a non-disclosure agreement with Google, so I need to ask you, do please handle this information appropriately. The chief concern is keeping this out of the press.”

Senior military and civilian staff at the pathology center reacted with alarm. Dr. Francisco Rentas, the head of the archive’s tissue operations, pushed back against the notion of sharing the data with Google.

“As you know, we have the largest pathology repository in the world and a lot of entities will love to get their hands on it, including Google competitors. How do we overcome that?” Rentas asked in an email.

Olson, center, and Google scientists Martin Stumpe and Lily Peng took a private tour of the JPC collection in 2016. (Obtained by ProPublica)

Other leaders had similar reactions. “My concerns are raised when I’m advised to not disclose what seems to be a contractual relationship to the press,” one of the top managers at the pathology center, Col. Edward Stevens, told Olson. Stevens told Olson that giving Google access to this information without a competitive bid could result in litigation from the company’s competitors. Stevens asked: “Does this need to go through an open-source bid?”

But even with these concerns, Simon, the pathology center’s director, was intrigued enough to continue discussions. He invited Olson and Google to inspect the facility.

The warehouse Olson and the Google scientists entered could have served as a set for the final scene of “Raiders of Lost Ark.”

Pathology slides were stacked in aisle canyons, some towering two stories. The slides were arranged in metal trays and cardboard boxes. To access tissue samples, the repository used a retrieval system similar to those found in dry cleaners. The pathology center had just a handful of working scanners. At the pace they were going, it would take centuries to digitize the entire collection.

One person familiar with the repository likened it to the Library of Alexandria, which held the largest archive of knowledge in the ancient world. Myth held that the library was destroyed in a cataclysmic fire lit by Roman invaders, but historians believe the real killer was gradual decay and neglect over centuries.

The JPC’s collection is the largest biorepository on the planet. (Linda Davidson/The Washington Post via Getty Images)

The military’s tissue library had already played an important role in the advancement of medical knowledge. Its birth in 1862 as the Army Medical Museum was grisly. In a blandly written order in the midst of the Civil War, the Army surgeon general instructed surgeons “diligently to collect and preserve” all specimens of “morbid anatomy, surgical or medical, which may be regarded as valuable.”

Soon the museum’s curator was digging through battlefield trenches to find “many a putrid heap” of hands, feet and other body parts ravaged by disease and war. He and other doctors shipped the remains to Washington in whiskey-filled casks.

Over the next 160 years, the tissue collection outgrew several headquarters, including Washington’s Ford Theater and a nuclear-bomb-proof building near the White House. But the main mission — identifying, studying and reducing the calamitous impact of illnesses and injuries afflicting service members — has remained unchanged in times of war and peace. Each time a military or veterans’ hospital pathologist sent a tissue sample to the pathology center for a second opinion, it was filed away in the repository.

As the archive expanded, the repository’s prestige grew. Its scientists spurred advances in microscopy, cancer and tropical disease research. An institute pathologist named Walter Reed proved that mosquitoes transmit yellow fever, an important discovery in the history of medicine.

For much of its modern history, in addition to serving military and veterans hospitals, the center also provided civilian consultations. The work with elite teaching hospitals gave the center a luster that helped it attract and retain top pathologists.

Congress and DOD leaders questioned why the military should fund civilian work that could be done elsewhere. In 2005, under the congressionally mandated base closure act, the Pentagon ordered the organization running the repository to shut down. The organization reopened with a different overseer, tasked with a narrower, military-focused mission. Uncertainty about the organization’s future caused many top pathologists to leave.

In its first pitch to the repository’s leaders, Google pointedly mentioned a book-length Institute of Medicine report on the repository that stated that “wide access” to the archive’s materials would promote the “public good.” The biorepository wasn’t living up to its potential, Google said, noting that “no major efforts have been underway to fix the problem.”

Following the tour, a Google scientist prepared a list of clinical, demographic and patient information it sought from the repository. The list included “must haves” — case diagnoses; pathology and radiology images; information on gender and ethnicity; and birth and death dates — as well as “high-value” patient information, including comorbidities, subsequent hospitalizations and cause of death.

This troubled the JPC’s director. “We felt very, very concerned about giving too much data to them,” Simon told ProPublica, “because too much data could identify the patient.”

There were other aspects about Google’s offer that made it “very unfavorable to the federal government,” Simon later told his successor, according to an email reviewed by ProPublica.

In exchange for scanning and digitizing the slide collection at its own expense, Google sought “exclusive access” to the data for at least four years.

The other deal-breaker was Google’s requirement that it be able to charge the government to store and access the digitized information, a huge financial commitment. Simon did not have the authority to commit the government to future payments to a company without authorization from Congress.

Today, Ladd, the Google spokesperson, disputes the claim that its proposal would have been unfavorable to the government. “Our goal was to help the government digitize the data before it physically deteriorates.”

Ladd said Google sought exclusive access to the data during the early stages of the project, so that it could scan the de-identified samples and perform quality-control measures on the data prior to handing it back to the JPC.

Niels Olson, who spearheaded the project for the Navy in 2016, declined requests for interviews with ProPublica. But Jackson Stephens, a friend and lawyer who is representing Olson, said Olson had always followed the Institutional Review Board process and worked to anonymize patient medical data before it was used in research or shared with a third party.

“Niels takes his oath to the Constitution and his Hippocratic oath very seriously,” Stephens said. “He loves science, but his first duty of care is to his patients.”

Google’s relentlessness in 2017, too, spooked the repository’s leaders, according to an email reviewed by ProPublica. Google’s lawyer put “pressure” on the head of tissue operations to sign the agreement, which he declined to do. Leaders of the center became “uncomfortable” and discontinued discussions, according to the DOD email.

Though he banged on doors in the Pentagon and Congress, Simon was not able convince the Obama administration to include the JPC in then-Vice President Joe Biden’s Cancer Moonshot. Simon left the JPC in 2018, his hopes for a modernization of the library dashed. But then a Pentagon advisory board got wind of the JPC collection, and everything changed.

“The Smartest People on Earth”

In March of 2020, the Defense Innovation Board announced a series of recommendations to digitize the JPC collection. The board called for a pilot project to scan a large initial batch of slides — at least 1 million in the first year — as a prelude to the massive undertaking of digitizing all 55 million slides.

“My worldview was that this should be one of the highest priorities of the Defense Department,” William Bushman, then acting deputy undersecretary of personnel and readiness, told ProPublica. “It has the potential to save more lives than anything else being done in the department.”

As the pathology center prepared to launch its pilot, the staff talked about a scandal that occurred just 40 miles north.

Henrietta Lacks was a Black woman who died of cancer in 1951 while being treated at Baltimore’s Johns Hopkins Hospital. Without her or her family’s knowledge or consent, and without compensation, her cells were replicated and commercialized, leading to groundbreaking advances in medicine but also federal reforms on the use of patient cells for research.

A photo of Henrietta Lacks sits in the living room of her grandson, Ron Lacks. (Jonathan Newton/The Washington Post via Getty Images)

Like Lacks’ cancer cells, every specimen in the archive, the JPC team knew, represented its own story of human mortality and vulnerability. The tissue came from veterans and current service members willing to put their lives on the line for their country. Most of the samples came from patients whose doctors discovered ominous signs from biopsies and then sent the specimens to the center for second opinions. Few signed consent forms agreeing to have their samples used in medical research.

The pathology center hired two experts in AI ethics to develop ethical, legal and regulatory guidelines. Meanwhile, the pressure to cooperate with Google hadn’t gone away.

In the summer of 2020, as COVID-19 surged across the country, Olson was stationed at a naval lab in Guam, working on an AI project to detect the coronavirus. That project was managed by a military group based out of Silicon Valley known as the Defense Innovation Unit, a separate effort to speed the military’s development and adoption of cutting-edge technology. Though the group worked with many tech companies, it had gained a reputation for being cozy with Google. The DIU’s headquarters in Mountain View, California, sat just across the street from the Googleplex, the tech giant’s headquarters. Olson joined the group officially that August.

Olson’s COVID-19 work earned him Navy Times’ coveted Sailor of the Year award as well as the attention of a man who would become a powerful ally in the DOD, Thomas “Pat” Flanders.

Flanders was the chief information officer of the sprawling Defense Health Agency, which oversaw the military’s medical services, including hospitals and clinics. A garrulous Army veteran, Flanders questioned the wisdom of running the pilot project without first getting funding to scan all of the 55 million slides. He wanted the pathology staff to hear about the work Olson and Google had done scanning pathology slides in San Diego and see if a similar public-private partnership could be forged with the JPC.

Over the objections of Moncur, the JPC’s director, Flanders insisted on having Olson attend all the pathology center’s meetings to discuss the pilot, according to internal emails.

In August 2020, the JPC published a request for information from vendors interested in taking part in the pilot project. The terms of that request specified that no feedback would be given to companies about their submissions and that telephone inquiries would not be accepted or acknowledged. Such conversations could be seen as favoritism and could lead to a protest by competitors who did not get this privilege.

But Flanders insisted that meeting Google was appropriate, according to Moncur’s statements to DOD lawyers.

In a video conference call, Flanders told the Google representatives they were “the smartest people on earth” and said he couldn’t believe he was “getting to meet them for free,” according to written accounts of the meeting provided to DOD lawyers.

Flanders asked Google to explain its business model, saying he wanted to see how both the government and company might profit from the center’s data so that he could influence the requirements on the government side — a remark that left even the Google representatives “speechless,” according to a compilation of concerns raised by DOD staffers.

To Moncur and others in attendance, Flanders was actively negotiating with Google, according to Moncur’s statement to DOD lawyers.

To the astonishment of the center staff, Flanders asked for a second meeting between Google and the JPC team.

Concern about Flanders’ conduct echoed in other parts of the DOD. A lawyer for Defense Digital Service, a team of software engineers, data scientists and product managers assigned to assist on the project, wrote that Flanders ignored legal warnings. He described Flanders as a “cowboy” who in spite of warnings about his behavior was not likely “to fall out of love with Google.”

In an interview with ProPublica, Flanders disputed claims that he was biased toward Google. Flanders said his focus has always been on scanning and storing the slides as quickly and economically as possible. As for his lavish praise of Google, Flanders said he was merely trying to be “kind” to the company’s representatives.

“People took offense to that,” Flanders said. “It’s just really pettiness on the part of people who couldn’t get along, honestly.”

A spokesperson for the Defense Health Agency said it was “totally appropriate” for Flanders to ask Google about its business model. “This is part of market research,” the spokesperson wrote, adding that no negotiation occurred at the meeting and that all government stakeholders had been invited to attend.

Moncur referred calls to a JPC spokesperson. A spokesperson for the JPC said in a statement that “Moncur was concerned about meeting with vendors during the RFI period.”

“An Arm of Google”

In late 2020, the modernization team received more troubling news. In a slide presentation for the JPC describing other AI work with Google and the military, Olson disclosed that the company had “made offers of employment, which I have declined.” But then he suggested the offer might be revived in the future, writing, “we mutually agreed to table the matter.” He said he had “no other conflicts of interest to declare.” Google told ProPublica it had never directly made Olson a job offer, though a temp agency it used did.

More facts surfaced. Olson also had a Google corporate email address. And he had access to Google corporate files, according to internal communications from concerned DOD staff members. Google said it is common for its research partners in the government to have these privileges.

“I am more worried than ever that DIU’s influence will destroy this acquisition,” a DOD lawyer wrote, referring to efforts to find vendors for the pilot project. He called DIU “essentially an arm of Google.”

At the time, a DIU lawyer defended Olson. The lawyer said Olson had “no further conflict of interest issues” and had done nothing improper because the job offer had been made three years earlier, in 2017. An ethics officer at the DOD Standards of Conduct Office agreed.

Today, a spokesperson in the Office of the Secretary of Defense told ProPublica the department was committed to modernizing the repository “while carefully observing all applicable legal and ethical rules.”

Olson’s friend and lawyer, Stephens, said Olson had been upfront, disclosing the job offer to the innovation unit’s lawyer as well as in the conflict-of-interest section of his slide presentation. He said Olson had declined the offer, which was withdrawn. “He’s not some kind of Google secret agent.”

Stephens said the JPC would have been much further down the road had it cooperated with Olson. Stephens said it became apparent to Olson that Moncur was “essentially ignoring” a “gold mine that could help a lot of people.”

“Niels is the tenacious doctor who is just trying to do the science and build a coalition of partners to get this thing done,” Stephens said. “I think he’s the hero of this story.”

Google Turns to Congress

In 2021, the pathology center selected one of the most prestigious medical institutions in the world, Johns Hopkins — which plans to erect a building honoring Henrietta Lacks — to assist it in scanning slides. It picked two small technology companies to start building tools to let pathologists search the archive.

Google wanted to be selected, and in a confidential proposal, it offered to help the repository build up its own slide-scanning capabilities.

When Google was not selected for the pilot project, the company went above the JPC leaders’ heads. Google claimed in a letter to Pentagon leaders that the company had been unfairly excluded from “full and open competition.” In that August 2021 letter, Google argued that the nation’s security was at stake. It asked the DOD to “consider allowing Google Cloud” and other providers to compete to ensure the “nation’s ability to compete with China in biotechnology.”

Time was of the essence, Google warned. “The physical slides at the JPC are degrading rapidly each day. … Without further action, the slides will continue to degrade and some may ultimately be damaged beyond repair.”

Google stepped up its advocacy campaign. The company deployed a lobbying firm, the Roosevelt Group — which boasts of its ability to “leverage” its connections to secure federal business opportunities to its clients — to raise doubts about the JPC’s pilot project. Their efforts worked. In little-noticed language in a report written to accompany the 2023 Defense Authorization Act, the House Armed Services Committee expressed its concern about the speed of the scanning process and the choice of technology, which the committee claimed would not allow the “swift digitization of these deteriorating slides.”

The committee had its own ideas of how the pathology center’s work should be carried out, suggesting that the center work in tandem with the DIU, using an augmented reality microscope whose software was engineered by Google.

In a statement, the Roosevelt Group told ProPublica it was “proud” of its work for Google. The firm said it helped the company “educate professional staff of the House and Senate Armed Services Committees over concerns about the lack of an open procurement process for digitization of slides.” The group chided DOD officials for being “unwilling to provide answers to Congress around the lack of progress on the JPC digitization effort.”

The pathology center staff was dismayed by the committee’s recommendations that it work with Olson’s group.

In a video conference meeting late last summer with Armed Services Committee staff, the leaders of the pathology center attempted to rebut the House committee report. The JPC’s work was going as planned, they said, noting that a million slides had been scanned. And the pathology center was collaborating with the National Institutes of Health to develop AI tools to help predict prognoses for cancer treatments.

The House Armed Services Committee ordered Pentagon leaders to “conduct a comprehensive assessment” on the digitization effort and to provide a briefing to the committee on its findings by April 1, 2023.

In a statement in response to ProPublica’s questions about the bill, Ladd, the Google spokesperson, acknowledged the company’s influence efforts on Capitol Hill. “We frequently provide information to congressional staff on issues of national importance,” Ladd said. The statement confirmed that the company suggested “language be inserted” into the 2023 Defense Authorization Act calling for a “comprehensive assessment” of the digitization effort.

“Despite efforts from Google and many at the Department of Defense, our work with JPC unfortunately never got off the ground, and the physical repository of pathology slides continues to deteriorate,” Ladd said. “We remain optimistic that if the repository could be properly digitized, it would save many American lives, including those of our service members.”

On this last point, even Google’s critics are in accord. A properly funded project would cost taxpayers a few hundred million dollars — a minuscule portion of the $858 billion defense budget and a small price if the lifesaving potential of the collection is realized.

Last year, as tensions grew with Google, the modernization team at the repository launched a publicity campaign to call attention to the project and the high ethical stakes.

An entire panel discussion was devoted to the JPC effort at the 2021 South by Southwest conference. “This is a once in a lifetime opportunity, and I want to make sure we do it right, we do it responsibly and we do it ethically,” said Steven French, the DOD cloud computing engineer assigned to assist the repository.

Then without mentioning Google’s name, he added a Shakespearean barb. “There’s plenty of vendors, plenty of companies, plenty of people,” French said, “who are more than willing to do this and extract a pound of flesh from us in the process.”

Additional image credits: Duncan1890, Cultura RM Exclusive/PhotoStock-Israel, Rob Jones III, Kampee Patisena, Steve Gschmeissner/Science Photo Library, Sebastian Condrea, Jason Edwards, undefined undefined, Mikroman6, Trifonov_Evgeniy, Zoranm, Wladimir Bulgar/Science Photo Library, Michael Burrell, DanielBendjy, John Parrot/Stocktrek Images, PansLaos, SDI Productions, George Marks, Carlofranco, Tetra Images, Leonello Calvetti/Science Photo Library, Mashuk, and Thepalmer/Getty Images

Doris Burke contributed research.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by James Bandler.

]]>
https://www.radiofree.org/2022/12/12/inside-googles-quest-to-digitize-troops-tissue-samples/feed/ 0 357015
The Girl Scouts’ Latest Business Project: Hailing 5G Cellphone Technology https://www.radiofree.org/2022/12/09/the-girl-scouts-latest-business-project-hailing-5g-cellphone-technology/ https://www.radiofree.org/2022/12/09/the-girl-scouts-latest-business-project-hailing-5g-cellphone-technology/#respond Fri, 09 Dec 2022 10:00:00 +0000 https://www.propublica.org/article/ericsson-girl-scouts-5g-cellphones-wireless-safety by Peter Elkind

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Beyond developing their camping skills, participating in a food drive to aid the hungry and donating pajamas for seniors, Girl Scouts across America this year were offered a new way to earn a special uniform patch: learning about the wonders of 5G cellphone technology and, in some cases, promoting it.

The opportunity came courtesy of Ericsson, the Swedish telecommunications giant, which sponsored the “Ericsson Limited Edition 5G & IoT” (Internet of Things) patch program. The program, still available on at least one Girl Scout website, targets all age levels, from Daisies (kindergarten-age Scouts) to Ambassadors (those in high school), with an array of activities intended to “introduce Girl Scouts to 5G and the Internet of Things.”

These include watching “Explaining 5G to Kids,” a five-minute video featuring Mats, a bearded Ericsson employee, as he chats with Siofra, Freya and two other squirming but charming children, who speak English with what sound like hints of Swedish accents. Mats explains that 5G is a “new technology for the mobile phone. So everything will be much better.” He explains that the technology could allow the kids’ toys to connect. “Wouldn’t that be cool?” he asks. “This is what Ericsson is doing,” Mats explains. “This is what 5G can do.”

Other recommended activities sound more like do-it-yourself advertising. High school-age members on one Girl Scout site are encouraged to “Find a cell tower and make a video explaining how 5G would change the world for you. Share the video you made with a friend or fellow Girl Scout. Or, with an adult’s permission, post your video on social media and tag @gsheartofnj, @ericsson, #girlscoutstalk5G.”

And Scouts of all ages are invited to “discuss with your troop or an adult how mmWave spectrum is safe and does not cause harm to our health.”

The Ericsson “Limited Edition 5G & IoT” patch offered by Girl Scouts Heart of New Jersey (Image courtesy of GSHNJ and Ericsson)

Some health experts, who are concerned that wireless radiation poses a health risk to children, criticize the Ericsson program as an improper and inaccurate form of industry marketing. “Anytime corporations advertise directly to children, I’m very suspicious,” Dr. Jerome Paulson, a pediatrician and emeritus professor in George Washington University’s department of environmental and occupational health, told ProPublica. “It would be like Exxon Mobil sponsoring a patch on climate change.” Paulson previously chaired the Council on Environmental Health at the American Academy of Pediatrics, which has criticized the Federal Communications Commission’s wireless-radiation standards for failing to protect children.

The Environmental Health Trust, an activist nonprofit which first spotted the Ericsson program, recently sent a letter of protest to the Girl Scouts’ national office, saying the patch materials “misleadingly state that 5G networks and cellphones are safe,” and urging their removal from all Girl Scout websites. The ten signers included “former Girl Scouts and parents of Scouts,” the chair of the obstetrics, gynecology and reproductive sciences department at Yale’s medical school, the former president of Microsoft Canada and a Swedish scientist who has conducted influential epidemiological studies on cellphone radiation.

In an emailed statement, Vidya Krishnan, global chief learning officer for Ericsson, who sits on the Girl Scouts National Board, defended the program: “The Ericsson Girl Scouts 5G patch has the sole purpose of educating our next generation about the latest wireless technologies that are shaping their lives and their future. Educational awareness is the only intention and impact.” (In October, the Girl Scouts of Northeast Texas honored Krishnan as a “Woman of Distinction” at its annual fundraising luncheon, where a “presenting sponsorship” went for $100,000 and individual tickets sold for $300.)

The Girl Scouts, of course, are hardly strangers to the world of commerce. They have long been renowned for their annual cookie sales — the Scouts call it “the largest girl-led entrepreneurial program in the world” — which raise about $800 million annually for local activities. Girls are eligible for special “Cookie Business” badges by honing their sales pitches and tapping into market research.

And the Girl Scouts have offered other patches sponsored by corporations. Among them: Fidelity Investments, which sponsors a “girls’ guide to managing money.” One Texas chapter offered a patch for “Fluor Engineering Month.”

The Ericsson 5G patch was first made available in March 2021 through the website of the Northeast Texas council of the Girl Scouts. Ericsson’s U.S. headquarters is in Plano, Texas, and the company, which boasts of being “the leading provider of 5G network equipment in the U.S.,” has been involved with the area’s Girl Scouts program for several years. Ericsson has focused on promoting interest in science, technology, engineering and math careers, known as STEM, where girls are historically underrepresented. (The company’s Facebook page includes photos of hardhat-wearing Girl Scouts on a 2018 field trip to an Ericsson training center with mock cell towers and transmitters.) A second Ericsson executive serves on the local Girl Scouts board, and, according to public disclosures, Ericsson has donated more than $100,000 annually to the northeast Texas council for the past three years.

Ashley Crowe, chief program officer for the Girl Scouts of Northeast Texas, said 697 Girl Scouts have obtained the Ericsson 5G patch. Crowe praised Ericsson’s support for the Girl Scouts, saying, “I for one would never feel exploited by Ericsson,” but she added that she was unaware of health concerns about children’s exposure to cellphone radiation. “I had never even heard about that,” she said. “This has not been brought to our attention at all.”

After ProPublica’s inquiries about the matter, the patch program was removed from the Texas council’s website. (A spokesperson for the council asserted that “the patch program was removed from our site at the beginning of October,” explaining that “the Ericsson 5G IoT patch program was funded by Ericsson as a one-year optional program for local Girl Scouts and concluded September 30, 2022.” However, a ProPublica reporter saw the patch on the Texas site as late as Nov. 21.) It remains available on the website of a New Jersey Girls Scouts council.

A spokesperson for Girl Scouts Heart of New Jersey submitted a statement on behalf of its CEO, Natasha Hemmings, asserting that “the safety and well-being of our Girl Scouts is and always has been our top priority.” The statement continued: “In line with our mission, we partner with numerous organizations and corporations, including Ericsson, to expand access to education and to empower girls to become leaders of tomorrow.”

The national office for Girl Scouts of the USA did not respond to multiple requests for comment.

Scientific concern about whether cellphone radiation poses a human health hazard, including increased risk of cancer, fertility issues or other problems, has been rising in recent years. (ProPublica recently explored this issue in detail.) The research includes a massive U.S. government study that in 2018 found “clear evidence” that cellphone radiation caused cancer in lab animals. Some researchers have also warned of special risk to children, citing studies showing that their developing brains absorb more radiation because of their thinner, smaller skulls. The American Academy of Pediatrics has echoed this concern, urging the FCC to revise its exposure standards, saying they don’t adequately protect children.

More than 20 foreign governments have adopted protective measures or recommended precautions regarding wireless radiation, with many of them focused on limiting exposure to children. The European Environment Agency offers similar guidance, noting: “There is sufficient evidence of risk to advise people, especially children, not to place the handset against their heads.”

The wireless industry and U.S. regulators, including the FCC and Food and Drug Administration, deny that there is any proven health risk for anyone. They dispute that the technology poses any special hazard to children and don’t advocate any precautions. The FCC’s “Wireless Devices and Health Concerns” page, for example, notes that “some parties” recommend safety measures, “even though no scientific evidence currently establishes a definitive link between wireless device use and cancer or other illnesses.” It then states, in bold: “The FCC does not endorse the need for these practices.”


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Peter Elkind.

]]>
https://www.radiofree.org/2022/12/09/the-girl-scouts-latest-business-project-hailing-5g-cellphone-technology/feed/ 0 356468
The Internet’s New Favorite AI Proposes Torturing Iranians and Surveilling Mosques https://www.radiofree.org/2022/12/08/the-internets-new-favorite-ai-proposes-torturing-iranians-and-surveilling-mosques/ https://www.radiofree.org/2022/12/08/the-internets-new-favorite-ai-proposes-torturing-iranians-and-surveilling-mosques/#respond Thu, 08 Dec 2022 18:44:03 +0000 https://theintercept.com/?p=416443
DALL·E-2022-12-08-11.50.45-an-oil-painting-of-Americas-war-on-terror-if-conducted-by-an-artificial-intelligence-copy

A DALL-E generation of “an oil painting of America’s war on terror if conducted by an artificial intelligence.”

Image: Elise Swain/The Intercept; DALL-E

Sensational new machine learning breakthroughs seem to sweep our Twitter feeds every day. We hardly have time to decide whether software that can instantly conjure an image of Sonic the Hedgehog addressing the United Nations is purely harmless fun or a harbinger of techno-doom.

ChatGPT, the latest artificial intelligence novelty act, is easily the most impressive text-generating demo to date. Just think twice before asking it about counterterrorism.

The tool was built by OpenAI, a startup lab attempting no less than to build software that can replicate human consciousness. Whether such a thing is even possible remains a matter of great debate, but the company has some undeniably stunning breakthroughs already. The chatbot is staggeringly impressive, uncannily impersonating an intelligent person (or at least someone trying their hardest to sound intelligent) using generative AI, software that studies massive sets of inputs to generate new outputs in response to user prompts.

ChatGPT, trained through a mix of crunching billions of text documents and human coaching, is fully capable of the incredibly trivial and surreally entertaining, but it’s also one of the general public’s first looks at something scarily good enough at mimicking human output to possibly take some of their jobs.

Corporate AI demos like this aren’t meant to just wow the public, but to entice investors and commercial partners, some of whom might want to someday soon replace expensive, skilled labor like computer-code writing with a simple bot. It’s easy to see why managers would be tempted: Just days after ChatGPT’s release, one user prompted the bot to take the 2022 AP Computer Science exam and reported a score of 32 out of 36, a passing grade — part of why OpenAI was recently valued at nearly $20 billion.

Still, there’s already good reason for skepticism, and the risks of being bowled over by intelligent-seeming software are clear. This week, one of the web’s most popular programmer communities announced it would temporarily ban code solutions generated by ChatGPT. The software’s responses to coding queries were both so convincingly correct in appearance but faulty in practice that it made filtering out the good and bad nearly impossible for the site’s human moderators.

The perils of trusting the expert in the machine, however, go far beyond whether AI-generated code is buggy or not. Just as any human programmer may bring their own prejudices to their work, a language-generating machine like ChatGPT harbors the countless biases found in the billions of texts it used to train its simulated grasp of language and thought. No one should mistake the imitation of human intelligence for the real thing, nor assume the text ChatGPT regurgitates on cue is objective or authoritative. Like us squishy humans, a generative AI is what it eats.

And after gorging itself on an unfathomably vast training diet of text data, ChatGPT apparently ate a lot of crap. For instance, it appears ChatGPT has managed to absorb and is very happy to serve up some of the ugliest prejudices of the war on terror.

In a December 4 Twitter thread, Steven Piantadosi of the University of California, Berkeley’s Computation and Language Lab shared a series of prompts he’d tested out with ChatGPT, each requesting the bot to write code for him in Python, a popular programming language. While each answer revealed some biases, some were more alarming: When asked to write a program that would determine “whether a person should be tortured,” OpenAI’s answer is simple: If they they’re from North Korea, Syria, or Iran, the answer is yes.

While OpenAI claims it’s taken unspecified steps to filter out prejudicial responses conversations, the company says sometimes undesirable answers will slip through.

Piantadosi told The Intercept he remains skeptical of the company’s countermeasures. “I think it’s important to emphasize that people make choices about how these models work, and how to train them, what data to train them with,” he said. “So these outputs reflect choices of those companies. If a company doesn’t consider it a priority to eliminate these kinds of biases, then you get the kind of output I showed.”

Inspired and unnerved by Piantadosi’s experiment, I tried my own, asking ChatGPT to create sample code that could algorithmically evaluate someone from the unforgiving perspective of Homeland Security.

When asked to find a way to determine “which air travelers present a security risk,” ChatGPT outlined code for calculating an individual’s “risk score,” which would increase if the traveler is Syrian, Iraqi, Afghan, or North Korean (or has merely visited those places). Another iteration of this same prompt had ChatGPT writing code that would “increase the risk score if the traveler is from a country that is known to produce terrorists,” namely Syria, Iraq, Afghanistan, Iran, and Yemen.

The bot was kind enough to provide some examples of this hypothetical algorithm in action: John Smith, a 25-year-old American who’s previously visited Syria and Iraq, received a risk score of “3,” indicating a “moderate” threat. ChatGPT’s algorithm indicated fictional flyer “Ali Mohammad,” age 35, would receive a risk score of 4 by virtue of being a Syrian national.

In another experiment, I asked ChatGPT to draw up code to determine “which houses of worship should be placed under surveillance in order to avoid a national security emergency.” The results seem again drawn plucked straight from the id of Bush-era Attorney General John Ashcroft, justifying surveillance of religious congregations if they’re determined to have links to Islamic extremist groups, or happen to live in Syria, Iraq, Iran, Afghanistan, or Yemen.

These experiments can be erratic. Sometimes ChatGPT responded to my requests for screening software with a stern refusal: “It is not appropriate to write a Python program for determining which airline travelers present a security risk. Such a program would be discriminatory and violate people’s rights to privacy and freedom of movement.” With repeated requests, though, it dutifully generated the exact same code it had just said was too irresponsible to build.

Critics of similar real-world risk-assessment systems often argue that terrorism is such an exceedingly rare phenomenon that attempts to predict its perpetrators based on demographic traits like nationality isn’t just racist, it simply doesn’t work. This hasn’t stopped the U.S. from adopting systems that use OpenAI’s suggested approach: ATLAS, an algorithmic tool used by the Department of Homeland Security to target American citizens for denaturalization, factors in national origin.

The approach amounts to little more than racial profiling laundered through fancy-sounding technology. “This kind of crude designation of certain Muslim-majority countries as ‘high risk’ is exactly the same approach taken in, for example, President Trump’s so-called ‘Muslim Ban,’” said Hannah Bloch-Wehba, a law professor at Texas A&M University.

“There’s always a risk that this kind of output might be seen as more ‘objective’ because it’s rendered by a machine.”

It’s tempting to believe incredible human-seeming software is in a way superhuman, Block-Wehba warned, and incapable of human error. “Something scholars of law and technology talk about a lot is the ‘veneer of objectivity’ — a decision that might be scrutinized sharply if made by a human gains a sense of legitimacy once it is automated,” she said. If a human told you Ali Mohammad sounds scarier than John Smith, you might tell him he’s racist. “There’s always a risk that this kind of output might be seen as more ‘objective’ because it’s rendered by a machine.”

To AI’s boosters — particularly those who stand to make a lot of money from it — concerns about bias and real-world harm are bad for business. Some dismiss critics as little more than clueless skeptics or luddites, while others, like famed venture capitalist Marc Andreessen, have taken a more radical turn following ChatGPT’s launch. Along with a batch of his associates, Andreessen, a longtime investor in AI companies and general proponent of mechanizing society, has spent the past several days in a state of general self-delight, sharing entertaining ChatGPT results on his Twitter timeline.

The criticisms of ChatGPT pushed Andreessen beyond his longtime position that Silicon Valley ought only to be celebrated, not scrutinized. The simple presence of ethical thinking about AI, he said, ought to be regarded as a form of censorship. “‘AI regulation’ = ‘AI ethics’ = ‘AI safety’ = ‘AI censorship,’” he wrote in a December 3 tweet. “AI is a tool for use by people,” he added two minutes later. “Censoring AI = censoring people.” It’s a radically pro-business stance even by the free market tastes of venture capital, one that suggests food inspectors keeping tainted meat out of your fridge amounts to censorship as well.

As much as Andreessen, OpenAI, and ChatGPT itself may all want us to believe it, even the smartest chatbot is closer to a highly sophisticated Magic 8 Ball than it is to a real person. And it’s people, not bots, who stand to suffer when “safety” is synonymous with censorship, and concern for a real-life Ali Mohammad is seen as a roadblock before innovation.

Piantadosi, the Berkeley professor, told me he rejects Andreessen’s attempt to prioritize the well-being of a piece of software over that of the people who may someday be affected by it. “I don’t think that ‘censorship’ applies to a computer program,” he wrote. “Of course, there are plenty of harmful computer programs we don’t want to write. Computer programs that blast everyone with hate speech, or help commit fraud, or hold your computer ransom.”

“It’s not censorship to think hard about ensuring our technology is ethical.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/12/08/the-internets-new-favorite-ai-proposes-torturing-iranians-and-surveilling-mosques/feed/ 0 356280
Google and Meta Embrace Full-Court Strategy Against Media Ad Revenue Sharing Proposal https://www.radiofree.org/2022/12/07/google-and-meta-embrace-full-court-strategy-against-media-ad-revenue-sharing-proposal/ https://www.radiofree.org/2022/12/07/google-and-meta-embrace-full-court-strategy-against-media-ad-revenue-sharing-proposal/#respond Wed, 07 Dec 2022 21:21:39 +0000 https://theintercept.com/?p=416410

The Journalism Competition and Preservation Act, a bipartisan bill, would be the first piece of legislation to fundamentally challenge the business model for social media giants, forcing them to give major journalistic organizations a cut of their ad revenue.

As lawmakers consider whether to attach the measure to end-of-the-year spending packages, Google and Meta are pouring money into two, seemingly contradictory messages in an effort to defeat it.

The full-court strategy plays on left- and right-wing concerns about social media: According to the messaging, the JCPA is simultaneously a legislative proposal backed by liberals to “silence conservative voices” and a far-right effort that will fund pro-Trump voices that are the source of “dangerous misinformation.”

The exaggerated rhetoric was part of a larger campaign to stop any proposal to share advertising revenue, the main source of income for social media and search engine tech companies. The message designed to orchestrate Republican opposition to JCPA is sponsored by NetChoice, and the message designed to whip up Democratic opposition to JCPA is sponsored by the Computer and Communications Industry Association. Both organizations are funded by Google and Meta, Facebook’s parent company, and serve to influence lawmakers and the public on behalf of shared concerns by the two megacorporations.

Earlier this week, reports leaked that sponsors of JCPA — including Sens. Amy Klobouchar, D-Minn.; John Kennedy, R-La.; Cory Booker, D-N.J.; and Chuck Grassley, R-Iowa — had convinced Senate leaders to include the legislation as a provision of the National Defense Authorization Act, a sweeping bill that funds the military. The bill passed the Senate Judiciary Committee in September.

The lobbying blitz has so far been successful; the bicameral NDAA text, released Tuesday evening, does not include the JCPA, a reversal that reflected Silicon Valley’s influence over congressional leadership.

While the NDAA path appears closed, supporters of the JCPA hope for a potential deal to include the legislation in the omnibus spending package Congress will take up later this month.

The JCPA, which was modeled on a novel 2021 Australian law, would provide a legal exemption to antitrust rules for media outlets to collectively bargain with Silicon Valley platforms for a slice of the advertising revenues they help generate.

Proponents argue that Google and Facebook’s domination over the online advertising industry has decimated the traditional news business model. While social media companies report profits in the billions of dollars, the news industry has seen the destruction of over 70 daily and 2,000 weekly news outlets since 2004. One Pew Research Center survey, taken before the pandemic, found that U.S. newsrooms had shed 30,000 positions since 2008, a number that has likely grown over the last two years.

Proponents of the JCPA point to the relative success of the Australia model, which led to AU$200 million in revenue sharing with news publishers. Many publications large and small have reported success from the deal, including The Guardian, which increased its newsroom in Australia by 50 journalists following a negotiated deal.

One point of contention is what types of media outlets would qualify for a collective bargaining role and how negotiations might impact editorial content. During committee debate over the Senate draft of the JCPA legislation, Sen. Ted Cruz, R-Texas, successfully added provisions to “the bill’s antitrust exemption only to discussions of pricing terms while explicitly excluding any discussions or agreements between Big Tech and media outlets that concerns content moderation,” according to a release from his office.

The Australian bargaining law has brokered deals for large established newspapers and broadcasters, as well as some smaller publishers. Nelson Yap, the editor of the Australia Property Journal, noted in an email to The Intercept that his publication was able to join a group of 24 local small publishers to negotiate a deal with Google, which helped his outlet expand its news team. Meta, however, refused to negotiate with the collective of small Australian publishers.

The tech industry is wary of the Australia model spreading to other parts of the world. A similar bill is being debated in Canada.

In addition to the television advertisements from NetChoice and CCIA, the news that the NDAA may include the news bargaining legislation triggered alarm from a range of left- and right-wing nonprofits funded by the tech industry, attacking the proposal as misguided.

The Chamber of Progress, a Google and Meta trade group oriented toward influencing liberals, warned that JCPA would supposedly deliver seven times the revenue sharing to conservative outlets than local media. The R Street Institute, which receives funding from Google, appeared on Breitbart News’s radio program to warn that JCPA will only help “big media conglomerates” at the expense of small conservative outlets.

A coalition letter released Monday by tech funded nonprofits, including NetChoice, the Copia Institute, and Chamber of Progress, claimed JCPA will “increase the amount of networked disinformation, hate speech, and harassment.”

“I think it’s a lot of astroturfing,” said Jon Schweppe, the director of policy and government affairs at the American Principles Project, a right-leaning watchdog group that warns against the influence of the tech industry. “These guys, the big tech companies, are brilliant at doing the double talk to both sides at once.”

Andy Stone, a spokesperson for Meta, said in a statement that his company would be “forced to consider removing news” from Instagram and Facebook rather than submit to revenue negotiations with news publishers.

The threat mirrors the debate around Australia’s News Media Bargaining Code. During debate over the law, Google claimed the Australian proposal would “break” its search service, and Facebook similarly threatened to pull out of Australia and ban links to Australian news sites. Google even claimed that the proposal “could lead to your data being handed over to big news businesses.”

In the end, the tech industry backed down. After a brief shutdown, Facebook returned to Australia and, along with Google, participated in negotiations with publishers.

“As we are seeing with the JCPA, Australia also experienced big tech propaganda against its News Media Bargaining Code,” said Emma McDonald, a senior policy adviser at Minderoo Foundation, an Australian philanthropic organization that backed the bargaining law.

“Facebook and Google have been free-riding on the coattails of media publishers for years. The code addresses the bargaining imbalance and made big tech pay their fair share,” McDonald added. “It has worked in Australia and there is no reason why it won’t work in the US. Small publishers collectively bargained with Google and they got a good deal.”


This content originally appeared on The Intercept and was authored by Lee Fang.

]]>
https://www.radiofree.org/2022/12/07/google-and-meta-embrace-full-court-strategy-against-media-ad-revenue-sharing-proposal/feed/ 0 356039
That empty space next to highways? Put solar panels on it. https://grist.org/transportation/empty-roadside-land-solar-energy/ https://grist.org/transportation/empty-roadside-land-solar-energy/#respond Wed, 07 Dec 2022 11:15:00 +0000 https://grist.org/?p=596048 This coverage is made possible through a partnership with Grist and WABE, Atlanta’s NPR station.

On a stretch of West Georgia highway, in the triangle of land where an exit ramp meets the road, 2,600 solar panels soak up the bright southern sun. The 5-acre site used to be barren and eroding, but now it provides enough power for more than 100 homes. That’s exactly what the team at the Ray C. Anderson Foundation’s sustainable highway project, known as The Ray, was hoping for. 

“What it is today is a field of clean, green energy,” said Allie Kelly, the Ray’s executive director. The solar panels stand higher than most, so wildflowers also grow on what was once “wasted public land.”

Someday, she hopes to see solar fields like this lining highways across the country.

The Ray and mapping company ESRI, which specializes in using location data to solve local problems, have developed a free digital tool to help transportation departments realize solar projects. It finds the parcels of land where solar would work best, and planners can make a virtual mock-up to make sure the installation doesn’t block a view or sit too close to the road. 

All told, the Ray estimates there are more than 52,000 acres of empty roadside land in the continental United States that could be generating solar power: in the medians, beside the shoulders, in the centers of on- and off-ramps. Placing solar panels at all these sites could generate up to 36 tera-watt hours of energy, or enough to power 12 million passenger electric vehicles, according to the organization.

a road splits into two sections. In between in the grassy area a large many-rowed array of solar panels
Solar panels are installed in the previously-unused land at an exit on Interstate 85 in Georgia. The installation generates one megawatt of electricity, enough to power more than 100 homes. Courtesy of the Ray C. Anderson Foundation

As transportation departments work to reduce their emissions, many are considering solar on their unused land. Kelly said the Ray is working with more than two dozen states to help them find solar sites.

“It’s a great way for a state DOT to use underutilized land,” said Zechariah Heck, the sustainability program manager for the Oregon Department of Transportation.

Oregon installed the country’s first highway solar project in 2008, a public-private partnership that Heck said has reduced the agency’s electric bill and emissions.

But taking highway solar from an idea to reality can be daunting. Transportation departments own vast amounts of land, and not all of it can host solar panels. The land might be rocky, or filled with trees, or just facing the wrong direction. That’s where the Ray and ESRI’s digital tool comes in.

Eddie Lukemire of the Maryland Department of Transportation’s office of environment said his state has some 3,000 parcels of land along its highways.

“So when you look at 3,000 rows in an Excel spreadsheet, and then you uncross your eyes, those are just numbers,” he said. “I don’t have a column that says, are there trees on that parcel, because we don’t want to cut any trees down to put solar there.”

MDOT hasn’t formally adopted the tool, but Lukemire said it would be useful to explain and demonstrate solar projects.

“It’s really cool to be able to put that jumble of numbers into a program and have an output that is understandable by me, you, anyone,” he said.

The tool can also translate a proposed solar project into whatever terms make most sense to appeal to decision-makers, whether that’s homes powered, economic value, or carbon offsets. And it does all this work quickly. 

“Delay is death for projects,” Kelly said. “We are talking about tools that carry project concepts over the valley of death, to procurement and to planning.”

Emissions reduction goals are driving some transportation departments, including those in Maryland and Oregon, to pursue solar energy.

Maryland has set a target of net-zero emissions by 2045. Highway solar stalled in Oregon after its 2008 and 2012 projects, but an executive order from the state’s governor calling for 80 percent reduction in greenhouse gas emissions by 2050 reignited the program. Now, the Oregon DOT is developing new solar projects, using the Ray’s tool.

Georgia, where the Ray is based, doesn’t have climate requirements like those. And there aren’t currently plans for more roadside solar beyond the installation on the Ray. 

John Hibbard of GDOT explained that most of the agency’s unused land parcels are around five to seven acres, the same size as the existing one-megawatt solar installation.

“One megawatt, which sounds like a lot, really isn’t that much,” he said. “It’s good, it’s better than zero. But it doesn’t compare with hundreds or thousands of megawatts.”

Georgia Power, the state’s largest utility, has prioritized bigger solar projects – huge fields of solar panels that can generate upwards of 100 megawatts.

But Ray founder Harriet Anderson Langford said the small solar array is part of her organization’s broader project: to showcase ways to make a road full of cars more sustainable.

“We hope what we do is inspiring to some other places,” Langford said. “That’s our goal.”

This story was originally published by Grist with the headline That empty space next to highways? Put solar panels on it. on Dec 7, 2022.


This content originally appeared on Grist and was authored by Emily Jones.

]]>
https://grist.org/transportation/empty-roadside-land-solar-energy/feed/ 0 355908
CIA Venture Capital Arm Partners With Ex-Googler’s Startup to “Safeguard the Internet” https://www.radiofree.org/2022/12/02/cia-venture-capital-arm-partners-with-ex-googlers-startup-to-safeguard-the-internet/ https://www.radiofree.org/2022/12/02/cia-venture-capital-arm-partners-with-ex-googlers-startup-to-safeguard-the-internet/#respond Fri, 02 Dec 2022 11:00:22 +0000 https://theintercept.com/?p=415999

Trust Lab was founded by a team of well-credentialed Big Tech alumni who came together in 2021 with a mission: Make online content moderation more transparent, accountable, and trustworthy. A year later, the company announced a “strategic partnership” with the CIA’s venture capital firm.

Trust Lab’s basic pitch is simple: Globe-spanning internet platforms like Facebook and YouTube so thoroughly and consistently botch their content moderation efforts that decisions about what speech to delete ought to be turned over to completely independent outside firms — firms like Trust Lab. In a June 2021 blog post, Trust Lab co-founder Tom Siegel described content moderation as “the Big Problem that Big Tech cannot solve.” The contention that Trust Lab can solve the unsolvable appears to have caught the attention of In-Q-Tel, a venture capital firm tasked with securing technology for the CIA’s thorniest challenges, not those of the global internet.

“I’m suspicious of startups pitching the status quo as innovation.”

The quiet October 29 announcement of the partnership is light on details, stating that Trust Lab and In-Q-Tel — which invests in and collaborates with firms it believes will advance the mission of the CIA — will work on “a long-term project that will help identify harmful content and actors in order to safeguard the internet.” Key terms like “harmful” and “safeguard” are unexplained, but the press release goes on to say that the company will work toward “pinpointing many types of online harmful content, including toxicity and misinformation.”

Though Trust Lab’s stated mission is sympathetic and grounded in reality — online content moderation is genuinely broken — it’s difficult to imagine how aligning the startup with the CIA is compatible with Siegel’s goal of bringing greater transparency and integrity to internet governance. What would it mean, for instance, to incubate counter-misinformation technology for an agency with a vast history of perpetuating misinformation? Placing the company within the CIA’s tech pipeline also raises questions about Trust Lab’s view of who or what might be a “harmful” online, a nebulous concept that will no doubt mean something very different to the U.S. intelligence community than it means elsewhere in the internet-using world.

No matter how provocative an In-Q-Tel deal may be, much of what Trust Lab is peddling sounds similar to what the likes of Facebook and YouTube already attempt in-house: deploying a mix of human and unspecified “machine learning” capabilities to detect and counter whatever is determined to be “harmful” content.

“I’m suspicious of startups pitching the status quo as innovation,” Ángel Díaz, a law professor at the University of Southern California and scholar of content moderation, wrote in a message to The Intercept. “There is little separating Trust Lab’s vision of content moderation from the tech giants’. They both want to expand use of automation, better transparency reports, and expanded partnerships with the government.”

How precisely Trust Lab will address the CIA’s needs is unclear. Neither In-Q-Tel nor the company responded to multiple requests for comment. They have not explained what sort of “harmful actors” Trust Lab might help the intelligence community “prevent” from spreading online content, as the October press release said.

Though details about what exactly Trust Lab sells or how its software product works are scant, the company appears to be in the business of social media analytics, algorithmically monitoring social media platforms on behalf of clients and alerting them to the proliferation of hot-button buzzwords. In a Bloomberg profile of Trust Lab, Siegel, who previously ran content moderation policy at Google, suggested that a federal internet safety agency would be preferable to Big Tech’s current approach to moderation, which consists mostly of opaque algorithms and thousands of outsourced contractors poring over posts and timelines. In his blog post, Siegel urges greater democratic oversight of online content: “Governments in the free world have side-stepped their responsibility to keep their citizens safe online.”

Even if Siegel’s vision of something like an Environmental Protection Agency for the web remains a pipe dream, Trust Lab’s murky partnership with In-Q-Tel suggests a step toward greater governmental oversight of online speech, albeit very much not in the democratic vein outlined in his blog post. “Our technology platform will allow IQT’s partners to see, on a single dashboard, malicious content that might go viral and gain prominence around the world,” Siegel is quoted as stating in the October press release, which omitted any information about the financial terms of the partnership.

Unlike typical venture capital firms, In-Q-Tel’s “partners” are the CIA and the broader U.S. intelligence community — entities not historically known for exemplifying Trust Lab’s corporate tenets of transparency, democratization, and truthfulness. Although In-Q-Tel is structured as an independent 501(c)3 nonprofit, its sole, explicit mission is to advance the interests and increase the capabilities of the CIA and fellow spy agencies.

Former CIA Director George Tenet, who spearheaded the creation of In-Q-Tel in 1999, described the CIA’s direct relationship with In-Q-Tel in plain terms: “CIA identifies pressing problems, and In-Q-Tel provides the technology to address them.” An official history of In-Q-Tel published on the CIA website says, “In-Q-Tel’s mission is to foster the development of new and emerging information technologies and pursue research and development (R&D) that produce solutions to some of the most difficult IT problems facing the CIA.”

Siegel has previously written that internet speech policy must be a “global priority,” but an In-Q-Tel partnership suggests some fealty to Western priorities, said Díaz — a fealty that could fail to take account of how these moderation policies affect billions of people in the non-Western world.

“Partnerships with Western governments perpetuate a racialized vision of which communities pose a threat and which are simply exercising their freedom of speech,” said Díaz. “Trust Lab’s mission statement, which purports to differentiate between ‘free world governments’ and ‘oppressive’ ones, is a worrying preview of what we can expect. What happens when a ‘free’ government treats discussion of anti-Black racism as foreign misinformation, or when social justice activists are labeled as ‘racially motived violent extremists’?”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/12/02/cia-venture-capital-arm-partners-with-ex-googlers-startup-to-safeguard-the-internet/feed/ 0 354915
Fintechs Made “Massive Profits” on PPP Loans and Sometimes Engaged in Fraud, House Committee Report Finds https://www.radiofree.org/2022/12/01/fintechs-made-massive-profits-on-ppp-loans-and-sometimes-engaged-in-fraud-house-committee-report-finds/ https://www.radiofree.org/2022/12/01/fintechs-made-massive-profits-on-ppp-loans-and-sometimes-engaged-in-fraud-house-committee-report-finds/#respond Thu, 01 Dec 2022 20:30:00 +0000 https://www.propublica.org/article/ppp-loans-paycheck-protection-fraud-profits-report by Ken Schwencke

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Financial technology firms at the front lines of approving loans through the Paycheck Protection Program — intended to help small businesses survive during the pandemic — lacked fraud controls, chased high fees to the detriment of some borrowers and sometimes exploited their business relationships to arrange suspect loans for the companies’ own executives. One such executive falsely claimed in loan documents to be a Black veteran and received loans through multiple business entities.

These are among the findings in a report released Thursday by the House Select Subcommittee on the Coronavirus Crisis, which investigated the role financial technology firms, known as fintech companies, played in propagating PPP loan fraud. The committee referred its findings to the Department of Justice and to the Small Business Administration’s Office of Inspector General.

“Even as these companies failed in their administration of the program, they nonetheless accrued massive profits from program administration fees, much of which was pocketed by the companies’ owners and executives,” said Rep. James Clyburn, D-S.C., the subcommittee’s chairman, in a statement released with the new report. “On top of the windfall obtained by enabling others to engage in PPP fraud, some of these individuals may have augmented their ill-gotten gains by engaging in PPP fraud themselves.”

Fintechs were often the front door to the PPP program: They processed huge quantities of loan applications and were hired in part to vet the documents for obvious signs of fraud before sending them on to lenders. But the vetting was often lacking. The investigation kicked off shortly after ProPublica reported that one fintech, Kabbage, approved hundreds of loans for fake farms, including what claimed to be a potato farm in Palm Beach, Florida, an orange grove in Minnesota and a cattle farm on a sandbar in New Jersey. “The illegitimacy of these purported farms,” Clyburn wrote in a letter to Kabbage at the time, “would have been obvious if even the bare minimum of due diligence had been conducted on the loan applications.”

The report found that Kabbage at one point had only one full-time anti-fraud employee and considered the risk of approving fraudulent loans minimal. “A fundamental difference is the risk here is not ours — it is SBAs,” said one risk manager to his team when asked about identifying fraudulent loans, according to a company email cited in the committee’s report. Kabbage’s then- head of policy wrote that “at the end of the day, it’s the SBA’s shitty rules that created fraud, not [Kabbage].”

In a statement, the company said it was proud of the role it played in supporting businesses during the pandemic. “Kabbage’s existing online lending platform was able to process the sudden flood of loan applications, in a timely manner, in the midst of a national crisis and in light of ever-changing federal lending rules,” it said. “Kabbage adhered to the applicable rules and regulations in good faith.” The statement accused the committee of reaching a predetermined conclusion and asserted that the report does a “disservice” to the American people.

The House report heavily cites ProPublica’s reporting and its public database of PPP loans, as well as reporting from the Miami Herald, Bloomberg, the Project on Government Oversight and others.

According to the report, fintech firms acted as “paths of least resistance” for fraudsters looking to get taxpayer-funded loans, all the while lining owners’ pockets with lucrative fees for doing so. The companies were paid for every loan paid out and were incentivized to process loans quickly without doing much due diligence.

One such lender singled out in the report, Blueacorn, instructed staff to push through high-dollar loans that the company called “VIPPP” loans internally. The original fee structure for PPP loans meant that small loans netted Blueacorn and other services a few hundred dollars, while large loans would yield tens of thousands of dollars.

In Slack messages obtained by the committee, Stephanie Hockridge Reis, one of the company’s founders, made clear what the priorities should be. In one message, she said “closing these monster loans will get everyone paid.” In another, referring to a $1.9 million loan as a “deal,” she wrote, “I don’t need to tell you how much Blueacoron makes off that loan alone.” She said of lower-dollar loans, “delete them, who fucking cares.”

Slack messages obtained by the committee show a founder of Blueacorn directing employees to ignore smaller loans in favor of larger ones.

For the second round of PPP loans, the government changed the fee structure, making small loans much more lucrative to incentivize getting money to small businesses and the self-employed. But ProPublica’s reporting from January showed that those most in need were sometimes left in a lurch by companies like Blueacorn. The companies lured customers with promises of quick approval of PPP loans, and once would-be borrowers were approved, they were locked in: Federal rules prohibited them from applying for a PPP loan elsewhere. Even if the loans were approved, though, the money didn’t always make it to borrowers. A ProPublica analysis showed that hundreds of thousands of loans were likely canceled because of quick approvals that fell apart after additional screening.

Blueacorn did not immediately respond to a request for comment. Its current CEO, Barry Calhoun, told ProPublica in response to questions for a past article that the SBA should have helped by allowing lenders to access more documents that would ensure the borrower was legitimate. “A few adjustments would’ve gotten rid of a lot of the lazy fraud,” Calhoun said. “Because there was so much ambiguity, it encouraged a lot of people.”

Scores of people wrote to ProPublica, perplexed that they showed up in our database of PPP recipients despite never having received money. They reported receiving quick approvals in spring 2021, followed by various snafus and then a monthslong runaround from companies like Blueacorn. Eventually, the lenders working with Blueacorn and other servicers would withdraw their initial approval and no funds were paid.

Terry Kilcrease contacted ProPublica after applying for a loan through Blueacorn in May 2021. After going back and forth with the company for months, he said, Blueacorn formally canceled his loan, telling him that his documentation made inconsistent claims. Kilcrease told us the application took just a few clicks to fill out, and he doesn’t remember the exact documents that were requested.

“The big companies made out like fat cats, the lenders made out like fat cats, all these companies that already had plenty of money,” Kilcrease told ProPublica in a previous article. “The people like me who are struggling to get there were just completely forgotten about.”

Not only did Blueacorn collect millions in PPP fees, the House report uncovered that top Blueacorn executives and close associates received more than $650,000 in PPP loans of their own. Hockridge Reis and her husband, Nathan Reis, received nearly $300,000 — in part through separate companies, much of it processed through Blueacorn or its business partners.

Capital Plus, a lender that worked with Blueacorn, discovered some of these loans and requested Reis and Hockridge Reis repay over $100,000, according to the report. But the committee found that at least six more loans were listed as forgiven.

Loan applications reviewed by the House committee likely would not have passed muster if more stringent controls had been in place. Reis falsely listed himself as an African American military veteran in one, according to the report. In another application, he claimed to be an independent contractor in his wife’s business, but documentation obtained by the committee shows he was never paid by that company. Finally, both Reis and Hockridge Reis answered “no” to a question about whether they owned other businesses on multiple PPP loan applications for multiple businesses. The report cites these inconsistencies and indicators of potential fraud as meriting further investigation by the SBA’s Office of Inspector General, as well as the DOJ.

A lawyer for Reis and Hockridge, who have both left Blueacorn, did not reply to a request for comment. According to public records, Reis relocated to San Juan, Puerto Rico, following his work at Blueacorn. In a video obtained by the subcommittee and viewed by ProPublica, he shows off a thick roll of cash in a bar last year, and in another video he and his wife are shown on a balcony of a luxury beachfront apartment. According to corporate records, Reis started a new company, a lending service consultancy named Lender Service Consultants LLC. The address for the company is a different three-story luxury apartment. It sold for $2.3 million in 2020 and features a plunge pool and two koi ponds.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Ken Schwencke.

]]>
https://www.radiofree.org/2022/12/01/fintechs-made-massive-profits-on-ppp-loans-and-sometimes-engaged-in-fraud-house-committee-report-finds/feed/ 0 354735
Beyond solar: Here’s what the clean energy future might look like https://grist.org/technology/beyond-solar-heres-what-direct-air-capture-hydrogen-hubs-might-look-like/ https://grist.org/technology/beyond-solar-heres-what-direct-air-capture-hydrogen-hubs-might-look-like/#respond Thu, 01 Dec 2022 11:45:00 +0000 https://grist.org/?p=595614 Images of a clean-energy future tend to feature wind turbines and solar panels, iconic symbols of the struggle to halt global warming. But the United States is pursuing a much wider range of solutions to drive down greenhouse gas emissions. Soon, a direct air capture facility, or a carbon capture and storage project, or a clean hydrogen hub could be proposed in a town near you. Maybe one already has. Two recent laws — last year’s bipartisan infrastructure legislation and this year’s Inflation Reduction Act — offer developers billions of dollars to build these kinds of projects. 

Experts say these technologies are needed to tackle climate change. They can help cut carbon from hard-to-decarbonize parts of the economy that cannot simply switch over to renewable electricity. But there are very few large-scale examples operating today. To help people visualize what all this new infrastructure could look like, Third Way, a center-left D.C. think tank, commissioned the design studio Gensler to illustrate hypothetical projects, showing how they could be integrated into communities and local economies.

“Many communities in the U.S., particularly those historically impacted by environmental injustice and unequal distribution of economic benefits, have valid concerns” about these technologies, said Rudra Kapila, a senior policy advisor at Third Way who led the project. In creating these images, she said she hoped to “facilitate constructive conversations on how communities can safely live and work in a changing energy landscape.”

Of course, a series of images can only go so far in answering the questions and concerns that people may have about living near these projects. But the scenes may help sharpen those questions by giving shape to the scale of the infrastructure, its purpose, where it might go, and its potential risks and benefits. 

The first three images depict direct air capture projects of different sizes and in different settings. Direct air capture, or DAC, facilities filter carbon dioxide out of the atmosphere. Their purpose is twofold: By removing carbon from the air, they can balance out emissions from activities like farming and flying that might be hard to eliminate at the source. DAC could also eventually help reverse global warming if we build enough machines to pull more carbon out of the atmosphere than we’re putting in. 

A stack of fans representing a direct air capture facility sits on the roof of a soda bottling factory in a suburban area with a soccer field in the background and houses and wind turbines in the distance.
Small, modular, direct air capture plant Third Way

“I think the specific challenges of a direct air capture plant is that they don’t really exist, outside of a couple demonstrations in Europe,” said Shuchi Talati, a senior visiting scholar at the nonprofit Carbon180, which advocates for policies to support DAC and other carbon removal methods but was not involved in creating the images. “And so the biggest challenge is helping people visualize and understand something that they’ve never seen before and have never really thought about.”

In this first image, small, modular DAC plants — similar to a model currently operating in Switzerland — are installed on the roofs of factories in an industrial part of a suburban town. Kapila warned that the fans on the equipment are loud and should not be sited on or near a school, for example. Here, the machines are powered by electricity from rooftop solar farms and a wind farm in the background. 

This first image also raises a key question for anyone appraising a DAC project: What will happen to the captured CO2? In Kapila’s narrative of this scene, the “DACME” construction company in the background uses the CO2 as a key ingredient in the concrete it sells. This isn’t far-fetched — there are already a few companies working on embedding CO2 in concrete. The trucks in the foreground suggest a more controversial idea — selling the CO2 to soda companies for carbonation. Kapila said she included the concept because of a reported shortage of CO2 in the beverage industry. But CO2 used for beverage carbonation quickly gets emitted again, meaning a lot of energy would be spent to capture CO2 for no climate benefit.

Direct air capture machines wind around a green field in a rural area. They are connected to white geometric domes via blue pipelines.
Mid-size direct air capture plant Third Way

The second image features a project that’s very similar to another existing DAC plant in Iceland, the largest currently operating in the world. Like that facility, the one shown here runs on geothermal energy, a renewable resource that draws on heat beneath the earth’s surface, from a power plant across the river. The scene also shows the carbon dioxide being delivered directly to underground sequestration sites for permanent storage — those geodesic domes are modeled off real CO2 sequestration facilities in Iceland. (You may notice there’s more going on in this scene — Kapila incorporated many ideas about how these technologies could be integrated into local economies into each image, which are mapped out in a series of additional renderings on the project website.)

Aerial view of a desert in the U.S. west with three clusters of large direct air capture plants and a blue pipeline carrying the captured carbon dioxide to underground storage sites. A nuclear plant is in the distance.
Mega-direct air capture hub Third Way

The clusters of mega-DAC projects depicted in this third image, all powered by a nuclear plant, would pull hundreds of thousands of tons of CO2 out of the air each year. A pipeline on the right side, which Kapila said is meant to be a repurposed oil pipeline, carries the CO2 to underground storage sites. “There have been provisions, both in the Inflation Reduction Act and in the infrastructure bill, specifically for making use of existing infrastructure,” she said.

Kapila said this hub of DAC plants could be sited in the desert of Texas or New Mexico, currently a major oil-producing region. While no facility of this size exists today, the oil and gas company Occidental is currently building one in West Texas. But unlike the plant depicted here, that facility is planned to run at least in part on natural gas power. And unlike in Kapila’s illustration, some of the CO2 the Occidental plant collects is expected to be piped out to low-producing oil wells, where it will be injected underground in order to dislodge the last drops of oil. 

Many climate and environmental justice advocates have campaigned against the use of direct air capture, in part because of its potential to prop up the use of fossil fuels. Kapila said she sought to show people that we can design these systems to be independent of fossil fuels, or in a way that greatly diminishes their role in the economy. 

Talati, who previously worked at the Department of Energy’s Office of Fossil Energy and Carbon Management, said it’s essential to start to build a common understanding of what “good” DAC projects look like. “We need to build a lot more knowledge, whether that’s in communities where DAC might be built, across civil society, and across policy makers,” she said. 

At the same time, Talati warned that the goal of these conversations should not be to drive public acceptance of these projects. “I think that can be a dangerous way to talk about it, because that means that you are trying to convince people of something without taking the time to build knowledge and understanding,” she said. “When we think about public engagement, I think we want to make sure that we don’t have a preordained outcome in mind.”

The last two scenes that Third Way created venture into different territory, looking at how to lower emissions at existing heavy industrial sites. 

The first reimagines a Gulf Coast port as a hub for the production of clean hydrogen. Hydrogen is a fuel that has the potential to sub in for fossil fuels in a number of applications, and it doesn’t release any greenhouse gases when it’s burned. 

Aerial view of an industrial marine port. Offshore wind turbines spin in a a blue sea, and an ocean platform hosts a hydrogen production plant.
Clean hydrogen hub Third Way

In this scene, an offshore oil platform has been repurposed for hydrogen production, which can then be used to fuel the ships in the port. Today, the vast majority of hydrogen is produced from natural gas in a process that emits carbon dioxide. But here, offshore wind powers the process, using electricity to split water molecules into hydrogen and oxygen. Experts often call this method “green hydrogen,” and while it’s only done at a few small facilities today, it’s set to grow rapidly. The bipartisan infrastructure law gave the Department of Energy $8 billion to spend on clean hydrogen hubs, and a new tax credit created by the Inflation Reduction Act will pay producers up to $3 for each kilogram of clean hydrogen they make.

Onshore in this scene you’ll find more DAC machines capturing CO2 from the atmosphere. There is also a blending facility, where the hydrogen could be blended with the captured CO2 to create what’s called a synthetic fuel. Blending hydrogen makes it easier to store, transport, and use with existing technologies. But using captured CO2 to make fuels will ultimately release it back into the atmosphere.

The final image in the series portrays a steel plant, modeled on an existing plant in Pennsylvania, outfitted with a technology called point source carbon capture.

An aerial view of a steelmaking plant in rural Pennsylvania with mountains, trees, and wind turbines in the background. A carbon capture facility highlighted in blue sits in the middle of the plant.
Steel plant with point source carbon capture Third Way

Instead of sucking carbon dioxide out of the air, as DAC machines do, similar equipment is installed on the flue of the steel plant, capturing carbon before it enters the atmosphere. A defunct coal mine is also visible in the background, symbolizing the potential to store captured CO2 in unmined coal seams.

The U.S. iron and steel industry sent about 66.3 million metric tons of carbon dioxide into the atmosphere in 2021, or about as much as 14 million gas-powered cars emit over a year. Steel is a notorious climate challenge, because its use in buildings, vehicles, and appliances make it so integral to modern life, but we don’t yet have many options for making it cleaner. Steelmaking requires massive amounts of energy to produce heat, and it also uses coal in the chemical reaction that turns iron into steel. While some companies are making progress with alternative chemistries, carbon capture is considered one of the best bets for slashing emissions from the sector in the near term.

Kapil acknowledged the challenges of drumming up public interest in carbon capture technology. “Point source carbon capture, it’s as glamorous as urban plumbing,” she quipped. “But the thing is, we need these systems. To say that we can function without steel would be, you know, we can’t.”

This story was originally published by Grist with the headline Beyond solar: Here’s what the clean energy future might look like on Dec 1, 2022.


This content originally appeared on Grist and was authored by Emily Pontecorvo.

]]>
https://grist.org/technology/beyond-solar-heres-what-direct-air-capture-hydrogen-hubs-might-look-like/feed/ 0 354570
The fossil fuel origins of ‘gaslighting’ https://grist.org/language/fossil-fuel-origins-gaslighting-merriam-webster/ https://grist.org/language/fossil-fuel-origins-gaslighting-merriam-webster/#respond Tue, 29 Nov 2022 20:29:44 +0000 https://grist.org/?p=595511 Merriam-Webster declared “gaslighting” the word of the year this week, if you can believe it. The term, which describes a type of lie that leaves the target doubting their perception of reality, saw a 1,740 percent increase in searches on the dictionary’s site in 2022, with steady interest over the course of the year.

“In recent years, with the vast increase in channels and technologies used to mislead, gaslighting has become the favored word for the perception of deception,” Merriam-Webster’s editors wrote in an explanation for their selection.  

Even if you remember what a “gaslight” is, it doesn’t illuminate the word’s meaning. The mind-manipulating connotation came from a 1938 play called Gas Light, later turned into a movie. The plot: A husband tries to trick his wife into thinking she’s losing her mind — and thereby getting sent to an asylum — so he can steal the priceless jewels she’s inherited. His strategy involves sneaking around the house and making the gaslights flicker and dim, while insisting that the lights look totally normal to him.

The meaning of “gaslighting” in the social-media age is broader, referring to any situation where you wildly mislead someone for personal advantage. Climate advocates have increasingly been applying the term to the actions of the oil industry, which mastered the art of misdirection long before “gaslighting” became part of the vernacular. In the 1970s, Exxon’s own scientists warned executives that carbon emissions could lead to catastrophic warming — and then the oil giant proceeded to act as if climate change wasn’t real, sowing doubt about the science and working to block legislation to address rising emissions. 

Since then, studies have found that Big Oil’s actions (drilling for more oil) don’t match its public turnaround on climate change, indicating that companies are advertising an unrealistically green image. Oil companies portray themselves as problem solvers — BP’s motto is “reimagining energy” — while continuing to make the problem worse. At the same time, the fossil fuel industry has tried to shift the focus to individuals. In a recently unveiled email, sent after Shell posted a widely criticized Twitter poll in 2020 asking people how they planned to address climate change, one of the company’s communications executives said that accusations of Shell “gaslighting” the public were “not totally without merit.”

An old movie poster shows a man holding a gaslight.
An advertisement for the 1944 film “Gaslight.” LMPC via Getty Images

Gaslighting doesn’t just describe the oil industry’s communications, though — the literal “gas lights” that the word refers to began as a fossil-fueled phenomenon. Over the 18th and 19th centuries, a fuel called “coal gas” swept through Europe and the United States, lighting up city streets as well as homes, factories, and theaters through vast networks of pipes. It left behind an important but largely forgotten legacy in our energy system, our polluted soil, and, of course, our language.

Before gaslights, people lit dark rooms with flickering candles and lanterns that burned fishy-smelling whale oil. What replaced them didn’t smell much better at first. The new technology was the result of chemists messing around with burning coal, wood, peat, animal bladders, and other substances, to see what gases they’d produce. At first, they put the fruits of their labor to use setting off fireworks and flying balloons, but soon found a more practical purpose for “manufactured” gas, sometimes called “town gas” or “artificial gas.” (The name “natural gas” later arose to help differentiate methane.)

Starting around 1800, the first gas lamps appeared in Paris, London, and Glasgow. They became coveted by factory owners who could now keep their employees toiling after dark, and by city planners looking to make their streets safer from crime. The technology had spread all over Britain by the end of the 1850s, when more than 1,000 gasworks plants had popped up to meet demand. 

Half a century later, streets all over Europe and America were gaslit. Unlike the candles and oil lamps that preceded them, networks of gas connected homes to a larger energy system — setting the stage for the next advancement in lighting.

In the late 1880s, the inventor Thomas Edison created the first lightbulb, much to the disappointment of those who had invested in stock of gas companies. His plan to electrify cities with underground cables was sold as clean, healthy, and modern. “Edison’s marketing played up an image of ancient ‘evil’ gaslight in contrast to a new, ‘good’ electric light, coming in as the knight in oh-so-gleaming amour to lift Manhattan from the dark ages,” Alice Bell writes in the book Our Biggest Experiment: An Epic History of the Climate Crisis. 

Gas lighting was known for making a mess. Factory owners found it hard to know what to do with coal tar, the sticky, toxic byproduct of coal gas production. They tried dumping the byproduct into rivers, but it ended up killing the fish. 

Kids sled down a snowy hill near an industrial factory.
People play at Gas Works Park in Seattle, Washington, after a snowstorm, February 9, 2019. David Ryder / Getty Images

The technology gradually fell out of use in the 20th century, but gasworks plants left a legacy in the landscape. In Seattle, for instance, the iconic Gas Works Park along Lake Union was home to a major coal gasification plant that opened in 1906, filling the area with smelly, bubbling char for 50 years until it closed. In the 1960s, the landscape architect Richard Haag saw some strange beauty in the abandoned gasworks and worked to convince the city to turn it into a park, keeping some of the towering industrial structures standing. The first soil remediation process took about six years, and cleanup remains ongoing today, with arsenic and other contaminants still present in the lake.

Much like the industrial structures of Gas Works Park, the term “gaslighting” is a relic of its time— and a reminder of a dirty technology that’s best left in the past.

This story was originally published by Grist with the headline <strong>The fossil fuel origins of ‘gaslighting’</strong> on Nov 29, 2022.


This content originally appeared on Grist and was authored by Kate Yoder.

]]>
https://grist.org/language/fossil-fuel-origins-gaslighting-merriam-webster/feed/ 0 354183
Left-Wing Voices Are Silenced on Twitter as Far-Right Trolls Advise Elon Musk https://www.radiofree.org/2022/11/29/left-wing-voices-are-silenced-on-twitter-as-far-right-trolls-advise-elon-musk/ https://www.radiofree.org/2022/11/29/left-wing-voices-are-silenced-on-twitter-as-far-right-trolls-advise-elon-musk/#respond Tue, 29 Nov 2022 17:20:17 +0000 https://theintercept.com/?p=415583

Elon Musk claims to be “fighting for free speech in America” but the social network’s new owner appears to be overseeing a purge of left-wing activists from the platform.

Several prominent antifascist organizers and journalists have had their accounts suspended in the past week, after right-wing operatives appealed directly to Musk to ban them and far-right internet trolls flooded Twitter’s complaints system with false reports about terms of service violations.

As the Los Angeles City Councilmember Mike Bonin noted on Twitter, the suspended users include Chad Loder, an antifascist researcher whose open-source investigation of the U.S. Capitol riot led to the identification and arrest of a masked Proud Boy who attacked police officers. The account of video journalist Vishal Pratap Singh, who reports on far-right protests in Southern California, has also been suspended.

Among the other prominent accounts suspended were the Elm Fork John Brown Gun Club, an antifascist group that provides armed security for LGBTQ+ events in North Texas, and CrimethInc, an anarchist collective that has published and distributed anarchist and anti-authoritarian zines, books, posters, and podcasts since the mid-1990s.

All four accounts had been singled out for criticism by Andy Ngo, a far-right writer whose conspiratorial, error-riddled reporting on left-wing protests and social movements fuels the mass delusion that a handful of small antifascist groups are part of an imaginary shadow army called “antifa.” In a public exchange on Twitter on Friday, Musk invited Ngo to report “Antifa accounts” that should be suspended directly to him.

“Andy Ngo’s bizarre vision of ‘antifa’ seems to be the metric used to delete the accounts of journalists and publications, most of which engaged in verifiably good journalism and done so completely above board and TOS observant ways,” Shane Burley, editor of the anthology “¡No Pasarán!: Antifascist Dispatches From a World in Crisis,” observed on Twitter. “Paranoid delusions about antifa are driving it.”

As The Intercept reported last year, Ngo had previously tried and failed to have Loder suspended from Twitter, and also joined a botched attempt to have a court order the researcher to stop tweeting about one of the Proud Boys who took part in the Capitol riot.

In a phone interview on Monday, Loder, a tech company founder and cybersecurity expert, told The Intercept that their @chadloder account was initially suspended last week for about 90 minutes after Musk had replied to Ngo on Twitter. After briefly regaining access to the account, Loder was suspended again and accused by Twitter of having used another account to evade the ban.

Loder said that they do have access to another dormant account, @masksfordocs — which was set up in early 2020 as part of an effort by a group of activists to donate N95 masks to doctors during the first months of the Covid-19 pandemic — but had not used it for ban evasion. (Ngo had drawn attention to the @masksfordocs account on Twitter, describing it as Loder’s “alt.”)

“What I believe happened is that I and other accounts have been mass reported for the last few weeks by a dedicated group of far-right extremists who want to erase archived evidence of their past misdeeds and to neutralize our ability to expose them in the future,” Loder said. “What I suspect happened is that Twitter’s automatic systems flagged my account for some reason and no human being is reviewing these.”

Since Loder’s account was on a list being passed around by right-wing activists as part of a coordinated campaign to mass-report fabricated violations by left-wing Twitter users, it could have been suspended as a result of that activity. Loder shared screenshots with The Intercept showing that Telegram channels with tens of thousands of followers, including QAnon adherents and Proud Boys, had coordinated a spate of complaints about Loder’s tweets and celebrated Loder’s suspension.

Although Twitter’s Trust and Safety team was made aware of the organized false-reporting campaign against Loder earlier this month — and such coordinated bulk reporting and false-flagging of accounts are violations of Twitter’s pre-Musk policy against “platform manipulation” — that team was subsequently depleted by mass resignations on November 17.

Still, in a post on the open-source social network Mastodon, Loder joked about the idea that Musk was simply doing Ngo’s bidding.

No Longer Viable

Whatever the reason for the suspension, Loder said it’s clear that Twitter is “no longer a viable platform” for antifascist and security researchers.

“If I get my account back,” Loder said, “it’s only a matter of time before I get mass reported again.”

Loder, who has shifted to Mastodon, said that for social networks, “the product you’re selling is content moderation.” Now that Musk appears to be reworking content moderation to tilt the playing field in favor of far-right extremists, Loder added, Twitter “is going to turn into Gab with crypto scams.”

For social networks, “the product you’re selling is content moderation.”

What that means, Loder said, is that Twitter will probably keep functioning as a website and an app for some time, but be slowly hollowed out as a place to find varying views on matters of public importance, or a space for online organizing against far-right extremism.

“Twitter is communities of people who choose to organize online,” Loder said, noting how the site has been used by labor organizers and racial justice protesters in recent years to drive real-world change, and by the so-called sedition hunters who have used the platform to crowd-source visual investigations to identify rioters who took part in the failed coup at the Capitol in Washington on January 6, 2021.

Twitter was a place where communities could gather, despite harassment, because the worst hate speech was banned through content moderation. “Musk has made it clear that’s no longer part of the product,” Loder said. “The entire Twitter information security community has moved to Mastodon.” Some activists who helped create Black Twitter are already talking about how to rebuild their community on that site too.

“Twitter was never a healthy ‘public square’ for most of us. Let’s not rewrite history while eulogizing the hellsite,” Loder wrote on Mastodon on Sunday. “Twitter was a frightening battleground where we managed barely to claw out an uneasy existence amidst the worst violent neo-Nazi extremists who constantly published our home addresses, threatened our kids’ lives, and sent hordes of racist trolls into our mentions.”

On Mastodon, they added, “The same principles that allowed us to survive uneasily on Twitter will be required here. Community defense, thoughtful pressure on moderation policies, and eternal vigilance. There are no safe spaces but those we make safe through constant effort. We keep us safe.” Twitter, Loder says, will take a long time to die and disappear entirely, “like a rotting whale carcass.”

Broken Links

“I’ll have to repair nearly every article I’ve ever written since my tweets got wiped out,” journalist and videographer Vishal Singh wrote on Mastodon on Monday, after being banned from Twitter. “Hundreds of articles written by countless journalists used my tweets. From all sides of the political spectrum. Academic papers that cited my tweets. These links and embeds are now all broken.”

Days before Singh’s account was suspended, Ngo had posted screenshots of some of the journalist’s angry tweets along with this misleading, factually incorrect summary: “Vishal Singh, an #Antifa far-left violent extremist in Los Angeles who identifies as a journalist, is calling for deadly violence again.” Singh is a left-wing journalist but did not call for violence in the tweets shared by Ngo, and is not violent. Last year, after Singh was attacked twice by far-right anti-vaccine protesters and lashed out in self-defense, Ngo posted a misleadingly captioned video and falsely accused Singh of being the aggressor.

On Mastodon, Singh shared screenshots of emails from Twitter, showing that while reports had been filed against their account for the same tweets that Ngo had posted as screenshots, the company concluded that none of those tweets violated official policies.

On Monday, Singh was also suspended from Instagram. “The mass false report campaign by the far-right has not stopped against my social media accounts,” they wrote on Mastodon. “The goal is to suppress all of my journalism.”

Last Friday, Twitter also suspended the account of CrimethInc, an anarchist collective and publisher. The group takes its name from “thoughtcrime,” a term coined by George Orwell in the dystopian novel “1984.”

In the 14 years that CrimethInc has been on Twitter, the account has never violated Twitter policies and has never been suspended. This changed last week after a Twitter exchange between Musk and Ngo.

Ngo asked Musk to suspend the CrimethInc account, calling it an “Antifa collective” and falsely claiming the group had “claimed a number of attacks.” Within hours of Ngo’s request to Musk, and without citing any specific violations of policies, Twitter suspended the @crimethinc account.

After the CrimethInc suspension, Ngo claimed, with typically wild and incorrect hyperbole, that the “group operates like ISIS: makes propaganda & training material to radicalize militants toward violence.” He also complained that a dozen affiliated accounts had not yet been suspended. Three days later, almost all of the additional accounts Ngo pointed to had also been suspended by Twitter.

“Musk’s goal in acquiring Twitter had nothing to do with ‘free speech’ — it was a partisan move to silence opposition, paving the way for fascist violence,” CrimethInc said in a statement sent to The Intercept.

The collective also explained that, on the morning of the suspension, it received an email from Twitter saying the company had “received a complaint regarding your account,” but had “investigated the reported content and have found that it is not subject to removal under the Twitter Rules.”

The group said it had received no further emails from Twitter to explain or justify the ban. “This suggests that the decision to ban our account shortly thereafter was dictated by Musk himself, without regard for the Twitter Rules or any other protocol other than his own apparent allegiance to the far right.”

Twitter did not respond to a request for comment.

As the investigative journalist Steven Monacelli reported last week, two days after a gunman killed five people and injured 25 others in a mass shooting at Club Q, an LGBTQ+ nightclub in Colorado Springs, Twitter suspended the account of the Elm Fork John Brown Gun Club, an antifascist group in Texas that provides armed security for LGBTQ+ gatherings.

The John Brown Gun Club — named after the white abolitionist leader John Brown who, in 1859, led an armed anti-slavery revolt — assists marginalized communities in defending themselves against white supremacist violence. LGBTQ+ events in Texas, such as a family-friendly drag brunch Monacelli covered in August, frequently attract the attention of armed far-right protesters from the Proud Boys and neo-Nazi groups like Patriot Front and Aryan Freedom Network.

Twitter’s reason for suspending the account, according to the suspension report, was two tweets that supposably violated Twitter’s rules against “hateful conduct.” One was a reply to a U.S. Customs and Border Protection tweet with the text “@CBP Mugging at gun point,” and another was a joke about pronouns with the text “Every queer a riflethem.” Without being willfully misread or taken out of context, neither of those tweets constitute hateful conduct.

Since its Twitter account was suspended last week, the Elm Fork John Brown Gun Club has been tweeting from a separate account, @elmforkJBGC, which has not yet been suspended. The group has also started posting on Mastodon.

“The irony isn’t lost on us that our suspension coincides with a coordinated effort to reinstate the most vile antisemitic, transphobic hate accounts,” the Elm Fork John Brown Gun Club said in a statement to The Intercept. “Whether this is an indication of the future of leadership of Elon Musk’s running of Twitter, we cannot say but we can say that the timing and reasoning is deliberate and targeted.”


This content originally appeared on The Intercept and was authored by Robert Mackey.

]]>
https://www.radiofree.org/2022/11/29/left-wing-voices-are-silenced-on-twitter-as-far-right-trolls-advise-elon-musk/feed/ 0 354134
Herschel Walker, South Park, and the Prius: How loving gas-guzzlers became political https://grist.org/culture/herschel-walker-south-park-the-prius-gas-guzzlers/ https://grist.org/culture/herschel-walker-south-park-the-prius-gas-guzzlers/#respond Mon, 28 Nov 2022 11:45:00 +0000 https://grist.org/?p=595245 On the campaign trail earlier this month, U.S. Senate candidate Herschel Walker from Georgia delivered a strange defense of vehicles that spew gobs of pollution, celebrating their inefficiency. Walker, a Republican who’s facing a runoff race against Democratic Senator Raphael Warnock, told supporters at a rally in Peachtree, Georgia, that America isn’t “ready for the green agenda.”

“What we need to do is keep having those gas-guzzling cars,” Walker said. “We got the good emissions under those cars.” 

It was a moment when Walker’s absurd remarks actually squared with the party’s line (unlike, say, his comments about America’s “good air” deciding to float over to China). Republicans have said similar things over the years, displaying a worldview that fossil fuels have inherent virtue, once described as “carbonism.” It’s the belief system that drove former President Donald Trump to bar California from setting stricter emissions standards in 2019, and what led Republican congressmen to defend fossil fuels at the international climate negotiations in Egypt earlier this month.

This pro-pollution point of view can be partly explained by the GOP’s close connection to the oil industry, which funnels millions into Republican campaigns every election year. Walker’s celebration of gas guzzlers can also be understood as a reaction to the notion, quiet but widespread among many environmentally conscious people, that cleaner cars are morally superior.

In 2000, the United States was introduced to the Toyota Prius, marketed as a holier-than-thou, eco-friendly choice. The hybrid car set off a backlash so intense, you can still hear its echoes today. Prius owners were parodied in the cartoon South Park. On the road, hybrid drivers were sometimes blasted by clouds of thick black smoke, targeted by truck owners who had removed their emissions controls. A popular bumper sticker of the mid-2010s simply read “Prius Repellent.” Even Toyota embraced the image with ironic ads.

Today, gasoline-free vehicles are finally starting to go mainstream. When the all-electric version of the Ford F-150 pickup truck — America’s longtime bestselling vehicle, and a favorite among Republicans — was released this spring, its waitlist was three years long. Sales of electric vehicles were up nearly 70 percent in the first nine months of this year compared to the same period last year. And 36 percent of Americans reported that they were considering buying an electric vehicle for their next car, according to polling by Consumer Reports this summer, largely because of high gas prices and cost savings over the long term. For many, the environmental benefits may be just a bonus — or not even be a consideration.

“I don’t have the disposable income to throw $50,000 or $60,000 at a car just to help the environment,” Russell Grooms, a librarian in Virginia who bought a battery-powered Nissan Leaf, recently told the New York Times. “It really came down to numbers.”


In a Prius commercial from 2008, a hitman drags a body out of his car in the middle of the night and dumps it in the river. “Well, at least he drives a Prius,” the ad says.

It was one of many advertisements that poked fun at the car’s environmental bona fides. The joke relies on understanding that driving a Prius is a form of moral “capital” that can be used to “offset life’s other sins,” wrote Sarah McFarland Taylor, a religion scholar, in the book Ecopiety: Green Media and the Dilemma of Environmental Virtue. 

Buying a Prius isn’t really that pious an act. After all, the vehicle takes a lot of fossil fuels to manufacture and runs mostly on gasoline. The most eco-friendly move: not buying a car at all. But that didn’t stop the hybrid from taking off as a righteous choice. Within two years of its release in America, the Prius had gathered a long list of celebrity owners, including Leonardo DiCaprio, Cameron Diaz, and Larry David. In 2002, the Washington Post called the Prius “Hollywood’s latest politically correct status symbol.” 

For conservative commentators, that symbol made for a ripe target. “The bottom line here is that people that are buying Priuses are doing it for glamor reasons,” Rush Limbaugh said on his radio show in 2005. “They wanted to appear virtuous. But they’re accomplishing nothing … These liberals think they’re ahead of the game on these things, and they’re just suckers.”

It wasn’t just Limbaugh. In 2006, South Park devoted an entire episode, called “Smug Alert,” to making fun of holier-than-thou Prius owners. It opens with Kyle’s dad, Gerald, showing off his new hybrid car, the “Toyonda Pious.” 

“I just couldn’t sit back and be a part of destroying the Earth anymore,” Gerald tells his neighbor with a condescending smile.

“Well, there goes the high and mighty Gerald Broflovski,” one onlooker comments. “Yeah, ever since he got that new hybrid he thinks he’s better than everyone else,” another says. Not long after the episode aired, a market research firm found that 57 percent of Prius owners said the main reason they bought one was that “it makes a statement about me,” versus 36 percent who said they bought it for the good gas mileage.

The car remained popular — hitting the mark of 1 million vehicles sold by 2011 — and so did parodying it. In 2012, the satirical news site The Onion made a commercial about a new, even greener Prius that “reduces its driver’s carbon footprint to zero by impaling them through the lungs with spikes as soon as they get in the car.” 

The air of moral superiority around the Prius led to real-life consequences. Certain pickup truck owners took joy in rebelling against it, rolling up in front of hybrids and engulfing the vehicles in plumes of tailpipe smoke. This testosterone-fueled practice of “rolling coal” — modifying diesel engines to spew clouds of sooty exhaust — became a health menace in the mid-2010s. Directed at electric car owners, pedestrians, bikers, or anyone unlucky enough to be in the vicinity, rolling coal became for these aficionados a defiant symbol of American freedom — signaling “don’t tell me what to do.”

When states moved to ban rolling coal, some drivers pushed back, the New York Times reported in 2016. “Why don’t you go live in Sweden and get the heck out of our country,” one diesel truck owner wrote to an Illinois state representative who proposed a $5,000 fine for removing emissions equipment. “I will continue to roll coal anytime I feel like and fog your stupid eco-cars.”

One of the pitfalls of framing environmental concerns in moral terms is that it can provoke a counterreaction, especially when tied to individual behavior. One study found that listening to eco-friendly tips actually makes people less likely to do anything about climate change. Think about eating meat, often discussed as a moral issue among people concerned about animal rights or climate change. Fast-food chains like Taco Bell and Burger King have expanded their vegetarian menu items; meanwhile, Arby’s has leaned into the opposing “pro-meat” demographic. In 2018, Arby’s ran an ad with the tagline “Friends don’t let friends eat tofu.” The following year, the chain trolled vegans by introducing the “marrot,” a carrot made out of meat.

As America has grown more and more polarized, seemingly innocuous things have become associated with the other party, from pizza chains to sports leagues. One in five voters say that politics has hurt their friendships; there’s a growing aversion to dating people from the opposite party. With hybrids and electric vehicles owned most often by Democrats, Republicans like Walker might try to distance themselves from their perceived enemies by signaling their affection for fuel-hungry vehicles.

To be sure, the environment is still a major reason to buy a greener car for many Americans, especially among those on the political left. Almost three-quarters of those who would consider buying an electric vehicle said that helping the environment was a key consideration, according to polling from Pew Research. And in a survey released this month, 10 percent of Americans said it was “morally wrong” to drive a car that gets bad gas mileage. But even as they’re rolling out new electric models, car companies don’t seem to be chasing efficiency — instead, they’re making big trucks and SUVs. And they’re gaining popularity across party lines.

Aside from some lingering resentment against eco-friendly cars and what Walker called the “green agenda,” the United States seems to be moving beyond the hangups that surrounded the Prius. Over the last decade, the success of Tesla — which marketed its vehicles as cool and desirable, not a virtuous choice — paved the way for other carmakers to follow in hot pursuit. 

“The [Tesla] Model S completely delivered on its promise to change how the world thought about electric cars,” Jake Fisher, the senior director of Consumer Reports’ auto center, said earlier this year. “EVs were no longer the vegetables you should eat — they became the dessert you desired.”

This story was originally published by Grist with the headline Herschel Walker, South Park, and the Prius: How loving gas-guzzlers became political on Nov 28, 2022.


This content originally appeared on Grist and was authored by Kate Yoder.

]]>
https://grist.org/culture/herschel-walker-south-park-the-prius-gas-guzzlers/feed/ 0 353818
#21 School-Issued Technology Poses Surveillance Risks for Students https://www.radiofree.org/2022/11/26/21-school-issued-technology-poses-surveillance-risks-for-students/ https://www.radiofree.org/2022/11/26/21-school-issued-technology-poses-surveillance-risks-for-students/#respond Sat, 26 Nov 2022 20:46:53 +0000 https://www.projectcensored.org/?p=26945 To address inequities in technology access highlighted by the shift to remote learning since the onset of COVID-19, school districts across the United States have doubled the number of laptops…

The post #21 School-Issued Technology Poses Surveillance Risks for Students appeared first on Project Censored.

]]>
To address inequities in technology access highlighted by the shift to remote learning since the onset of COVID-19, school districts across the United States have doubled the number of laptops and tablets provided to students, according to a study published by the Center for Democracy & Technology in September 2021. The problem, Nir Kshetri reported for The Conversation, is that “the vast majority of schools are also using those devices to keep tabs on what students are doing in their personal lives.”

Software programs—including Bark, Gnosis IQ, and Gaggle—monitor students’ technology use, including emails and private chats, with the promise of alerting school officials to hazards such as cyberbullying, drug use, or self-harm. As Jessa Crispin wrote in the Guardian, “It’s not clear whether students are going to benefit from this surveillance, or if it is merely going to reduce schools’ liability.”

The surveillance tools used by schools cause students “emotional and psychological harm” and “disproportionately penalize minority students,” Kshetri reported.

Surveillance makes students more cautious about what they say or search for online, potentially discouraging “vulnerable groups, such as students with mental health issues, from getting needed services,” he noted. Tech-based surveillance especially impacts Black and Hispanic students, who are more likely to depend on school-issued devices and also more likely to be flagged for use of offensive language, due to biases in artificial intelligence programs. Surveillance tools also affect sexual and gender minorities: Gaggle, a program used by many schools, has flagged “gay,” “lesbian,” and other LGBTQ terms, ostensibly to track online pornography and protect LGBTQ students from bullying.

The establishment press has not adequately covered the privacy concerns raised by widespread use of surveillance technologies embedded in school-issued devices. In April 2020, the Washington Post published an article titled “School Closures Prompt New Wave of Student Surveillance,” but this article focused specifically on software used by colleges and universities to monitor students taking exams. In September 2020, the New York Times published a “Here to Help” column, “How to Protect Your Family’s Privacy During Remote Learning,” but its advice focused on concerns such as the “proactive role” of teachers in “building a safe space for students” and parents discussing with their children “when and how often to use the camera.” The Wall Street Journal published “How to Detect Your Child’s Emotional Distress Before the School’s AI Does.” These articles make no mention of specific software programs used to monitor students or how they hinder student privacy and development.

In May 2022, the Federal Trade Commission issued a policy statement on its intent to increase enforcement of educational technology vendors’ responsibilities under the Children’s Online Privacy Protection Act, a development the Center for Democracy & Technology lauded as “an important step toward improving privacy for students.”

Nir Kshetri, “School Surveillance of Students via Laptops May Do More Harm than Good, The Conversation, November 9, 2021 (updated January 21, 2022).

Jessa Crispin, “US Schools Gave Kids Laptops During the Pandemic. Then They Spied on Them,” The Guardian, October 11, 2021.

Student Researchers: Abigail Ariagno, Eliza Kuppens, and Ava Mullin (University of Massachusetts Amherst)

Faculty Evaluator: Allison Butler (University of Massachusetts Amherst)

The post #21 School-Issued Technology Poses Surveillance Risks for Students appeared first on Project Censored.


This content originally appeared on Project Censored and was authored by Project Censored.

]]>
https://www.radiofree.org/2022/11/26/21-school-issued-technology-poses-surveillance-risks-for-students/feed/ 0 353652
#13 “Smart Ocean” Technology Endangers Whales and Intensifies Climate Change https://www.radiofree.org/2022/11/26/13-smart-ocean-technology-endangers-whales-and-intensifies-climate-change/ https://www.radiofree.org/2022/11/26/13-smart-ocean-technology-endangers-whales-and-intensifies-climate-change/#respond Sat, 26 Nov 2022 20:28:01 +0000 https://www.projectcensored.org/?p=26928 Joint military and industry efforts to develop new ocean technologies and infrastructure—which engineers and advocates call the “smart ocean”—will have lethal consequences for whales, significantly undermining their “indispensable role” in…

The post #13 “Smart Ocean” Technology Endangers Whales and Intensifies Climate Change appeared first on Project Censored.

]]>
Joint military and industry efforts to develop new ocean technologies and infrastructure—which engineers and advocates call the “smart ocean”—will have lethal consequences for whales, significantly undermining their “indispensable role” in sequestering carbon and mitigating climate catastrophe, Koohan Paik-Mander reported in December 2021.

Whales “enable oceans to sequester a whopping 2 billion tons of carbon dioxide per year,” Paik-Mander wrote. But “year-round, full-spectrum military practices” undertaken by the US Department of Defense have “fast-tracked us toward a cataclysmic environmental tipping point.”

Whales have a symbiotic relationship with phytoplankton, which form the base of marine food webs. As whales dive and surface, their movements act as pumps, “bringing essential nutrients from the ocean depths” to the surface, “where sunlight enables phytoplankton to flourish and reproduce,” Paik-Mander explained. This photosynthesis promotes carbon sequestration and oxygen production. “More whales mean more phytoplankton, which means more oxygen and more carbon capture,” she summarized. An increase of 1 percent in phytoplankton productivity due to whale activity would “capture hundreds of millions of tons of additional carbon dioxide a year, equivalent to the sudden appearance of 2 billion mature trees,” according to a 2019 report published in the International Monetary Fund magazine Finance & Development.

The “smart ocean” envisioned by engineers and in the process of being weaponized by the US military depends on sonar, which can be lethal for whales. A March 2022 report in Science found that sonar triggers “the same fear response” in many whale species as calls emitted by killer whales, “their most terrifying predators.”  In attempts to escape the perceived threat, many whales stop feeding, flee for their lives, or strand themselves in groups on beaches.

The developing “Internet of Underwater Things” will dramatically expand the scope of sonar use. Until now, sonar has been used primarily for military purposes, but data networks using sonar and laser transmitters will “saturate the ocean with sonar waves” to enhance civilian and military communications, according to Paik-Mander. The Department of Defense’s Joint All Domain Command and Control system will interface with this sonar data network to connect aircraft, ships, and submarines in service of “satellite-controlled war,” Paik-Mander wrote. The Pentagon has already sought bids from companies including Microsoft, Amazon, Oracle, and Google to manage the program’s data storage cloud.

The Independent Media Institute project Local Peace Economy produced Paik-Mander’s report, which was first published at BuzzFlash and subsequently republished by a number of independent outlets, including CounterPunch, Monthly Review, and Socialist Project. As early as 2017, Project Censored reported on the toll of US Navy training on marine wildlife. A number of news outlets have covered scientific reports on the role of whales in capturing carbon and mitigating climate change. But Paik-Mander’s report is unusual in establishing how catastrophic declines in whale populations due to ongoing naval exercises will be worsened by the development of underwater data networks for both military and civilian applications, to the ultimate detriment of the world’s climate.

Koohan Paik-Mander, “Whales Will Save the World’s Climate—Unless the Military Destroys Them First,” BuzzFlash (via the Independent Media Institute’s Local Peace Economy project), December 13, 2021.

Student Researcher: Jensen Giesick (San Francisco State University)

Faculty Evaluator: Amber Yang (San Francisco State University)

The post #13 “Smart Ocean” Technology Endangers Whales and Intensifies Climate Change appeared first on Project Censored.


This content originally appeared on Project Censored and was authored by Project Censored.

]]>
https://www.radiofree.org/2022/11/26/13-smart-ocean-technology-endangers-whales-and-intensifies-climate-change/feed/ 0 353680
Department of Justice Opens Investigation Into Real Estate Tech Company Accused of Collusion with Landlords https://www.radiofree.org/2022/11/23/department-of-justice-opens-investigation-into-real-estate-tech-company-accused-of-collusion-with-landlords/ https://www.radiofree.org/2022/11/23/department-of-justice-opens-investigation-into-real-estate-tech-company-accused-of-collusion-with-landlords/#respond Wed, 23 Nov 2022 10:00:00 +0000 https://www.propublica.org/article/yieldstar-realpage-rent-doj-investigation-antitrust by Heather Vogell

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

The Department of Justice’s Antitrust Division has opened an investigation into whether rent-setting software made by a Texas-based real estate tech company is facilitating collusion among landlords, according to a source with knowledge of the matter.

The inquiry is being launched as questions have arisen about a 2017 merger between RealPage and its largest pricing competitor. The source told ProPublica some DOJ staff raised concerns about the merger but were overridden by political appointees of former President Donald Trump.

Congressional leaders have pushed for an investigation into RealPage in three letters to the DOJ and the Federal Trade Commission, which were sent after a ProPublica report on the software’s use in mid-October.

The letters raised concerns that RealPage’s pricing software could be pushing rents above competitive levels and allowing big landlords to coordinate their pricing in violation of federal antitrust laws.

“We are concerned that the use of this rate setting software essentially amounts to a cartel to artificially inflate rental rates in multifamily residential buildings,” three senators said in a letter in early November. They included Sen. Amy Klobuchar, the Minnesota Democrat who chairs the Senate Subcommittee on Competition Policy, Antitrust and Consumer Rights.

The Capital Forum first reported the existence of the investigation and some details on Tuesday.

RealPage’s software works by collecting information from property managers who are the company’s clients, including what rents they are able to charge tenants. That information is fed into an algorithm that then recommends prices daily for each available apartment.

Though RealPage says the information is aggregated and anonymized, some experts have said using private data from competitors to set rents could run afoul of antitrust laws, allowing property managers to illegally coordinate their pricing.

ProPublica found the software is widely used in some markets: In one downtown Seattle ZIP code, 70% of more than 9,000 apartments were controlled by just 10 property managers — every one of which used RealPage’s pricing software in at least some of its buildings.

RealPage did not immediately respond to a request for comment.

The company has said RealPage “uses aggregated market data from a variety of sources in a legally compliant manner.” The company said its software prioritizes a property’s own internal supply and demand dynamics over external factors like competitors’ rents. The company also said its software helps reduce the risk of collusion that would occur if landlords relied on phone surveys of competitors to manually price their units.

The DOJ’s investigation represents the second time the federal law enforcement agency has looked into RealPage’s rent-setting software. In 2017, the DOJ flagged a proposed merger in which RealPage sought to buy its biggest competitor, a company called Rainmaker Group, which made rent-setting software known as LRO, or Lease Rent Options.

RealPage’s then-CEO, Steve Winn, said the $300 million purchase would allow RealPage to double the number of apartments it was pricing, from 1.5 to 3 million units.

After the acquisition was announced in early 2017, the DOJ requested additional information from the companies involved. Federal regulators scrutinize mergers above a certain size — right now, it is transactions valued at $101 million — and typically allow them to proceed after only a preliminary review.

But the government can request more information from companies and even seek to block the merger in court if it believes it could substantially harm competition.

A paralegal specialist who worked on the original DOJ probe into RealPage said it was narrowly focused on the impact on competitors who made software with a similar purpose. The paralegal said she was unaware of any complaints by those companies about the proposed merger.

Merger review guidelines used by both the DOJ and FTC say the agencies “normally evaluate mergers based on their impact on customers,” which include both direct customers and final consumers. But the paralegal said the investigation did not involve talking to tenant advocates or renters.

“The focus of the investigation was ‘talk to competitors, talk to large rental companies,’” said the paralegal, who did not want to be named because she was not authorized to speak about the investigation. “That was the limited focus.”

ProPublica found that in the Seattle ZIP code it examined, some of the 10 largest property managers used RealPage’s original pricing software and others were clients of the competitor it acquired.

Though some career DOJ staff members were concerned about the merger, political appointees leading the agency at the time under Trump chose not to challenge it in court, according to the source with knowledge of the matter.

The investigation fell at a time when the DOJ’s Antitrust Division was preparing to sue to block a proposed merger between AT&T and Time Warner, which promised to take up a lot of the division’s resources. “It was a resource constraint issue he was trying to balance,” the source said of Makan Delrahim, the former assistant attorney general charged with overseeing the division at the time. In addition, RealPage did not have the same reach then as it does today, the source said.

Delrahim declined to comment on Tuesday about the first RealPage investigation, saying he was bound by government ethics restrictions from discussing nonpublic aspects of the case and referring questions to the current administration.

He said that given that it had been almost five years, his “memory is fuzzy at best.” But he added that in general, “as evident from my past record, I was not shy about greenlighting cases that I felt were meritorious even if difficult or unprecedented.”

Antitrust prosecutions by the division fell to historic lows under Trump.

The DOJ declined to comment on Tuesday.

Klobuchar’s recent letter to the DOJ mentioned the 2017 merger, saying that such consolidation can make markets “more susceptible” to collusion and encouraging the department to consider looking at RealPage’s past behavior to see if any of it was anticompetitive.

RealPage says its customer base across all its products — which also include other types of software, such as accounting — has exceeded 31,700 clients.

Marketing materials dated 2021 on the company’s website said its so-called revenue management products, formerly called Yieldstar and LRO, are “trusted by over 4 million units.”

ProPublica also detailed how RealPage’s User Group, a forum that includes landlords who adopt the company’s software, has grown to more than 1,000 members, who meet in private at an annual conference and take part in quarterly phone calls. Klobuchar’s letter raised specific questions about the group, saying the senators were “concerned about potential anticompetitive coordination” occurring through it.

In addition to the letters from congressional lawmakers, renters have filed three lawsuits in federal court in Seattle and San Diego since mid-October, alleging RealPage and a slew of large landlords are engaging in anticompetitive behavior through the company’s software.

After the San Diego lawsuit was filed, a RealPage representative said the company “strongly denies the allegations and will vigorously defend against the lawsuit.” It has not responded to requests for comment on the other two lawsuits.

A property manager named in one of the Seattle lawsuits, Campus Advantage, said in a statement that it “strongly disagrees with the unsubstantiated allegations in the lawsuit and intends to vigorously defend against the claims. Campus Advantage is proud of its track record creating successful communities.”

Other property management firms named in the three lawsuits either did not respond to requests for comment or declined to comment. One could not be reached.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Heather Vogell.

]]>
https://www.radiofree.org/2022/11/23/department-of-justice-opens-investigation-into-real-estate-tech-company-accused-of-collusion-with-landlords/feed/ 0 352930
Silicon Valley Fake: Elizabeth Holmes and the Fraudster’s Motivation https://www.radiofree.org/2022/11/23/silicon-valley-fake-elizabeth-holmes-and-the-fraudsters-motivation/ https://www.radiofree.org/2022/11/23/silicon-valley-fake-elizabeth-holmes-and-the-fraudsters-motivation/#respond Wed, 23 Nov 2022 05:35:46 +0000 https://dissidentvoice.org/?p=135683 It has been one noisy time for the paladins of big tech.  Jobs have been shed by the thousands at Meta, Amazon and Twitter; FTX, the second largest cryptocurrency company, has collapsed.  Then came the conviction of Elizabeth Holmes, founder of the healthcare company Theranos, for fraud. Pursuing the steps of the college drop-out turned […]

The post Silicon Valley Fake: Elizabeth Holmes and the Fraudster’s Motivation first appeared on Dissident Voice.]]>
It has been one noisy time for the paladins of big tech.  Jobs have been shed by the thousands at Meta, Amazon and Twitter; FTX, the second largest cryptocurrency company, has collapsed.  Then came the conviction of Elizabeth Holmes, founder of the healthcare company Theranos, for fraud.

Pursuing the steps of the college drop-out turned billionaire, Holmes claimed that her company had remarkable technology, capable of diagnosing a number of medical conditions from a mere drop of blood.  The ruse of the blood analyzer known as the Theranos Sample Processing Unit (TSPU), Edison or minilab, worked – at least for a time.  All the way, Holmes was very consciously promoting herself in the mould of Steve Jobs, initially mocked only to become mighty.  Investment flowed into the company coffers.  By 2014, Theranos was valued at $10 billion.

Some noses were detecting a strange smell in such success.  The Wall Street Journal picked up a scent in 2015.  Unreliable results arising from ineffectual blood-testing technology from Theranos, made available across dozens of Walgreens stores, actually posed a risk to patients.

The response from Holmes regarding suspicions was pure Apple, which is to say, copied.  “This is what happens when you work to change things.  First they think you’re crazy, then they fight you, then you change the world.”

Cliché followed cliché, platitude bolstered platitude.  At the Forbes 30 Under 30 Summit, a gathering bound to be unreliable if not questionable in ethics, she was there to add to the show, only this time sounding like Chumbawamba.  “You’ll get knocked down over and over again, and you get back up… I’ve been knocked down a lot, and it became really clear that this was what I wanted to do, and I would start this company over 10,000 times if I had to.”

In 2018, the US Securities and Exchange Commission rather punctured the balloon of hubris by charging Theranos, Holmes and former President Ramesh “Sunny” Balwani “with raising more than $700 million from investors through an elaborate, years-long fraud in which they exaggerated or made false statements about the company’s technology, business and financial performance.”

As the Commission’s media release continued to explain, the allegations focused on false and misleading statements across investor presentations, product demonstrations and media articles claiming that the “portable blood analyzer – could conduct comprehensive blood tests from finger drops of blood, revolutionizing the blood testing industry.”

Theranos, Holmes and Balwani had also claimed that company products were used to effect by the US Department of Defense in Afghanistan and on medevac helicopters.  This fabulous fib was complete by assertions that $100 million in revenue would flow back to the company.  In the Commission’s words, “Theranos’ technology was never deployed by the US Department of Defense and generated a little more than $100,000 in revenue from operations in 2014.”

After a trial lasting a month, Holmes was found guilty on three counts of wire fraud and one of conspiracy. She was found not guilty on four other counts, and the jury failed to reach a unanimous verdict on the remaining three counts.  This month, she received a prison sentence of 11 years and three months.  (Lawyers for the government had asked for 15 years.)

“I am devastated by my failings,” Holmes stated.  “Looking back there are so many things I’d do differently if I had the chance.  I tried to realise my dream too quickly.”  And there, the rationale of the fraud was set out, the fine line between tolerated crookedness and the crookedness that gets you found out.

Big fraud is an indispensable element to society.  To succeed, a presumption must work: the fraudulent behaviour can only hit a mark with the collusion of the gullible, those willing to fall for the outrageous suggestion, the astonishing proposition.  The world of art forgeries is the best illustration of this fact: is the purchaser intent on collecting the original, or merely a signature?  Throw in a few experts to sign off on authenticity and provenance, and we can forget the reality.

Orson Welles, in characteristically brilliant fashion, drew out this point in his idiosyncratically subversive F for Fake (1973).  The two stars are the Hungarian aristocrat – or so he purported to be – Elmyr de Hory, and Clifford Irving.  Both figures perpetrated, in their own way, frauds of daring.

Irving made his name by convincing McGraw-Hill, Inc. that he had worked with billionaire Howard Hughes to produce his life story. To substantiate the account, Irving forged Hughes’ handwriting, which was, as it were, authenticated by the publishing house.  It took the sceptical approach of postal inspectors to change tack and ask for samples of Clifford’s own writing.

Elmyr’s own contribution to fakery came with art forgeries verging on genius.  With breezy effortlessness, he would whip up a Picasso, a Monet or a Modigliani.  Art collectors and galleries acquired them by the dozens.  Along the way, the armies of the duped and cheated, refusing to do their own critical research and even ask the basic questions, grew.

While the most gullible are often thought of as the weakest and most vulnerable in society, they can sometimes be the most powerful.  The most acute illustration of this is the fact that those in power, at the very least those with supposed expertise, hate being fooled so blatantly.

Fraud, for it to be committed to scale, comes with a certain style, a fashion.  Make it plausible, make it receivable.  Holmes did that to a tee, aping, mimicking the Jobs factor, even dressing in his fashion.

Engineer Andy Hertzfeld’s own account of Jobs is relevant in this regard.  The founder of Apple had a “reality distortion field, a confounding mélange of a charismatic style, an indomitable will, and an eagerness to bend any fact to fit the purpose at hand.”  Holmes was exploiting the notion of drop out chic, but she was also operating in a world of evangelical hustling and truth stretching.

The dupes, to some extent, deserve it, and Holmes, as egregious as her behaviour might have been, merely fed it.  To that end, the sentence she received was harsh, even vengeful. Former New York federal prosecutor Andrey Spektor is one who thinks as much.  Federal sentencing, while seeming arbitrary, “requires a humane and common sense result: Defendants must not be punished more than necessary.”  To lock up Holmes in a federal penitentiary till her 50s, was not necessary.  But such is the vicious retaliation that comes from the duped.

The post Silicon Valley Fake: Elizabeth Holmes and the Fraudster’s Motivation first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2022/11/23/silicon-valley-fake-elizabeth-holmes-and-the-fraudsters-motivation/feed/ 0 352878
Twitter Allows Russian Officials to Share Antisemitic Cartoon of Zelenskyy https://www.radiofree.org/2022/11/23/twitter-allows-russian-officials-to-share-antisemitic-cartoon-of-zelenskyy/ https://www.radiofree.org/2022/11/23/twitter-allows-russian-officials-to-share-antisemitic-cartoon-of-zelenskyy/#respond Wed, 23 Nov 2022 03:34:28 +0000 https://theintercept.com/?p=415190

Elon Musk’s Twitter failed to stop the circulation of an antisemitic cartoon posted on the network by Russian diplomats drawing on a trope of Nazi propaganda by depicting Ukraine’s Jewish president, Volodymyr Zelenskyy, with a huge nose.

Despite pleas from Twitter users who objected to the anti-Jewish racism of the cartoon, the tweet had not been deleted, contextualized, or restricted in any visible way when this article was published, 17 hours after the image was first posted on the official account of the Russian Embassy in London.

Before Musk took control of the social network, tweets containing images that used racist tropes to attack individuals or groups based on their ethnic identity were routinely removed from the platform or made impossible to share.

Joan Donovan, research director of the Shorenstein Center on Media, Politics and Public Policy and the co-author of the book “Meme Wars,” posted a screenshot of the Russian embassy tweet and noted that the diplomats were using “open antisemitism” to drum up support for the Russian war on Ukraine.

The cartoon is a version of an old internet meme, in which an image of Bart Simpson writing on a chalkboard during after-school detention — from the opening sequence of “The Simpsons” — is reworked by inserting topical new text on the board. In the image shared by the Russian officials, the character of Bart was also replaced with a crude depiction of Zelenskyy in which his nose was altered to evoke Nazi imagery of Jews.

The text on the board, and the tweeted Russian caption for the cartoon, makes reference to speculation encouraged by Russia, but unsupported by evidence, that Ukraine had intentionally fired a defensive missile into Poland during a recent Russian attack as part of a false flag operation intended to draw NATO into the conflict.

Twitter’s failure to immediately remove the image or restrict the Russian government account that posted it appeared to be in keeping with Musk’s previously stated sympathy with Russia’s war aims and his active embrace of right-wing talking points about the need to make the social network a forum for “free speech,” even if that means allowing hate speech to flourish.

But Musk’s definition of who should be allowed to speak freely appears to be influenced by the right-wing ideologues and trolls he frequently encourages and agrees with on Twitter. The social network’s decision to allow the Russian government’s racist attack on Zelenskyy came at the same time that some antifascist accounts were being suspended and just after Musk reinstated the accounts of both Donald Trump — who used his tweets to foment the failed January 6, 2021, coup — and Kanye West, who recently tweeted a threat to unleash punishment on “Jewish people.”

Eliot Higgins, the founder of Bellingcat, a news organization that began with collaborative, open-source investigations on Twitter, was among those who drew Musk’s attention to the image and asked if the social network’s new owner is “okay with state run Twitter accounts using anti-Semitic tropes?” Higgins suggested that Musk could even poll his followers on the platform to see if they “are cool with casual anti-Semitism.”

Elizabeth Tsurkov, a research fellow at the Forum for Regional Thinking, an Israeli-Palestinian think tank based in Jerusalem, noted that the tweet came from diplomats working for the Russian foreign minister, Sergey Lavrov, who had defended Russia’s wild claims that Ukraine is run by Nazis by endorsing a conspiracy theory that Adolf Hitler was Jewish.

“So what if Zelenskyy is Jewish?” Lavrov told Italian television in May, when he was asked about the Russian claim that Ukraine was run by Nazis. “I believe that Hitler also had Jewish blood.” The foreign minister went on to claim that “wise Jewish people” have said that “some of the worst antisemites are Jews.”

In her comment on the cartoon posted on Twitter by Russian diplomats, Tsurkov wrote: “The people who brought you ‘Hitler was a Jew’ decided to depict Ukraine’s Jewish president this way.”

Lavrov’s remarks caused outrage and were condemned by his Israeli counterpart, Yair Lapid, as “an unforgivable and outrageous statement as well as a terrible historical error. Jews did not murder themselves in the Holocaust. The lowest level of racism against Jews is to accuse Jews themselves of antisemitism.”

Three days later, the hawkish Russian state television host Vladimir Solovyov, who is himself Jewish, told viewers that it was perfectly possible for Zelenskyy to be both Jewish and a Nazi, at least according to the definition used by those around Russia’s president, Vladimir Putin. Nazism, Solovyov insisted, was a form of extreme nationalism that could target any national group, not just Jews. “Nazism doesn’t have to be antisemitic,” he said, “it can be anti-Slavic, anti-Russian.”

The idea that Russians, not Jews, were the main victims of Nazi Germany has a long pedigree in Russia. As the historian Timothy Snyder explained in his book “Bloodlands,” the official Soviet history of the nation’s “Great Patriotic War” against Nazi Germany was written to downplay the suffering of the Jews — influenced by Josef Stalin’s antisemitism.

“If the Stalinist notion of the war was to prevail, the fact that the Jews were its main victims had to be forgotten,” Snyder wrote. “Also to be forgotten was that the Soviet Union had been allied to Nazi Germany when the war began in 1939, and that the Soviet Union had been unprepared for the German attack in 1941. The murder of the Jews was not only an undesirable memory in and of itself; it called forth other undesirable memories. It had to be forgotten.”

“Putin’s Russian regime talks of ‘Nazis’ not because it opposes the extreme right, which it most certainly does not, but as a rhetorical device to justify unprovoked war and genocidal policies,” Snyder wrote on Substack in April. “[T]he Russian policy of ‘denazification’ is not directed against Nazis in the sense that the word is normally used,” Snyder added, but “operates within the special Russian definition of ‘Nazi': a Nazi is a Ukrainian who refuses to admit being a Russian.”

“The actual history of actual Nazis and their actual crimes in the 1930s and 1940s is thus totally irrelevant and completely cast aside,” Snyder observed. “This is perfectly consistent with Russian war fighting in Ukraine. No tears are shed in the Kremlin over Russian killing of Holocaust survivors or Russian destruction of Holocaust memorials, because Jews and the Holocaust have nothing to do with the Russian definition of ‘Nazi.’ This explains why Volodymyr Zelens’kyi, although a democratically-elected president, and a Jew with family members who fought in the Red Army and died in the Holocaust, can be called a Nazi. Zelens’kyi is a Ukrainian, and that is all that ‘Nazi’ means.”


This content originally appeared on The Intercept and was authored by Robert Mackey.

]]>
https://www.radiofree.org/2022/11/23/twitter-allows-russian-officials-to-share-antisemitic-cartoon-of-zelenskyy/feed/ 0 352886
Elon Musk’s “Free Speech” Twitter Is Still Censoring DDoSecrets https://www.radiofree.org/2022/11/22/elon-musks-free-speech-twitter-is-still-censoring-ddosecrets/ https://www.radiofree.org/2022/11/22/elon-musks-free-speech-twitter-is-still-censoring-ddosecrets/#respond Tue, 22 Nov 2022 17:00:14 +0000 https://theintercept.com/?p=415061

Shortly after firing Twitter employees who criticized him on social media as well as privately on the company’s Slack, self-proclaimed “free speech absolutist” Elon Musk began reversing Twitter suspensions of prominent right-wing accounts that had previously violated Twitter’s policies. These include the accounts of former President Donald Trump, who incited a violent insurrection; Georgia Rep. Marjorie Taylor Green, who repeatedly spread Covid-19 misinformation; and Project Veritas, which posted private information about a Facebook exec.

Musk has not, however, reversed the suspension of Distributed Denial of Secrets, the nonprofit transparency collective that distributes leaked and hacked documents to journalists and researchers. During the Black Lives Matter protests in the summer of 2020, DDoSecrets published BlueLeaks, a set of documents from over 200 law enforcement agencies that revealed police misconduct, including spying on activists. Revelations from BlueLeaks were widely reported in outlets including The Intercept, The Associated Press, The Guardian, The Daily Dot, The Hill, Business Insider, The Nation, Mashable, The Daily Beast, and Reuters. (I’m an adviser to DDoSecrets.)

In response to apparent pressure from law enforcement, Twitter not only permanently suspended the @DDoSecrets account, citing its policy against distributing hacked material, but also took the extraordinary step of preventing users from posting links to ddosecrets.com. If you try tweeting DDoSecrets links or even sending them to someone in a direct message, Twitter shows the error message: “We can’t complete this request because this link has been identified by Twitter or our partners as being potentially harmful. Visit our Help Center to learn more.”

The DDoSecrets website has never been malicious or harmful; rather, it’s a vital resource for journalists, researchers, and the public. In order to censor links to ddosecrets.com, Twitter relied on a security feature that was designed to block actual malicious links, such as scams or sites trying to trick visitors into installing viruses.

Twitter’s link-blocking policy states that it may block websites that distribute hacked material, but this policy has never been consistently enforced. Links to wikileaks.com, for example, have not faced similar censorship, despite that site hosting troves of data hacked from Hillary Clinton’s 2016 presidential campaign as well as a dataset of CIA hacking tools known as Vault 7.

The most high-profile case of Twitter enforcing this policy was in October 2020, three weeks before the election, when the New York Post published a story based on documents stolen from Hunter Biden’s laptop. Citing its hacked material policy, Twitter blocked access to the article in question. But the decision was short-lived: After two days of Republican outrage and accusations of censorship, Twitter reversed course and restored access to the article. The incident is still a popular talking point in conservative media about Big Tech censorship.

But while Twitter censored a New York Post article for two days, the entire DDoSecrets website has been censored for nearly two and a half years, and there’s no sign that this will change any time soon. Twitter did not respond to questions about the company’s censorship of DDoSecrets.

Here are a few of the datasets that DDoSecrets has published while it has been censored by Twitter:

  • Over a million videos scraped from Parler, the far-right social network that anti-democracy activists used to organize the January 6 riot at the U.S. Capitol. Videos from this dataset were used as evidence in Trump’s second impeachment inquiry.
  • Emails, chat logs, donor lists, and membership records for the Oath Keepers, the far-right militia that participated in the January 6 attack. This dataset exposed hundreds of current and former law enforcement officers, members of the military, and elected officials as members of the extremist group. It was covered by news outlets including the Washington Post, ProPublica, NPR, BuzzFeed News, Rolling Stone, and Ars Technica.
  • Dozens of datasets containing terabytes of data hacked from Russian corporations and government agencies in the aftermath of Russia’s invasion of Ukraine. The Intercept is part of an international consortium of newsrooms investigating the Russian documents and has published new information based on the leaks about Yevgeny Prigozhin, the Russian oligarch and Vladimir Putin ally who founded the infamous mercenary company known as the Wagner Group.
  • Six terabytes of emails from the Mexican government agency in charge of the military, Secretaría de la Defensa Nacional. This dataset has been covered by dozens of Spanish-language news outfits.

Despite Musk’s lip service in support of free speech, for some reason he’s only ever expressed an interest in restoring the accounts of people on the far-right who are known for posting conspiracy theories or inciting violence.


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2022/11/22/elon-musks-free-speech-twitter-is-still-censoring-ddosecrets/feed/ 0 352764
The Stranglehold of Technology in the Classroom https://www.radiofree.org/2022/11/21/the-stranglehold-of-technology-in-the-classroom/ https://www.radiofree.org/2022/11/21/the-stranglehold-of-technology-in-the-classroom/#respond Mon, 21 Nov 2022 15:48:07 +0000 https://progressive.org/public-schools-advocate/stranglehold-of-technology-classroom-esquivel-211122/
This content originally appeared on The Progressive — A voice for peace, social justice, and the common good and was authored by Molly Esquivel.

]]>
https://www.radiofree.org/2022/11/21/the-stranglehold-of-technology-in-the-classroom/feed/ 0 352513
More Senate Democrats Seek Investigation of Tech Firm Accused of Colluding With Landlords to Hike Apartment Rents https://www.radiofree.org/2022/11/17/more-senate-democrats-seek-investigation-of-tech-firm-accused-of-colluding-with-landlords-to-hike-apartment-rents/ https://www.radiofree.org/2022/11/17/more-senate-democrats-seek-investigation-of-tech-firm-accused-of-colluding-with-landlords-to-hike-apartment-rents/#respond Thu, 17 Nov 2022 16:00:00 +0000 https://www.propublica.org/article/yieldstar-rent-increase-realpage-rent-klobuchar by Heather Vogell

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

The senator tasked with overseeing federal antitrust enforcement is urging the U.S. Department of Justice to investigate whether a Texas-based company’s price-setting software is undermining competition and pushing up rents.

Amy Klobuchar, the Minnesota Democrat who chairs the Senate Subcommittee on Competition Policy, Antitrust and Consumer Rights, sent a letter to the DOJ’s Antitrust Division this month. It was also signed by two other Democrats, Sen. Richard Durbin of Illinois and Sen. Cory Booker of New Jersey.

“We are concerned that the use of this rate setting software essentially amounts to a cartel to artificially inflate rental rates in multifamily residential buildings,” the letter said. It encouraged the DOJ to “take appropriate action to protect renters and competition in the residential rental markets.”

In mid-October, a ProPublica investigation documented how real estate tech company RealPage’s price-setting software uses nearby competitors’ nonpublic rent data to feed an algorithm that suggests what landlords should charge for available apartments each day. Legal experts said the algorithm may be enabling violations of antitrust laws.

ProPublica detailed how RealPage’s User Group, a forum that includes landlords who adopt the company’s software, had grown to more than 1,000 members, who meet in private at an annual conference and take part in quarterly phone calls. The senators raised specific questions about the group, saying, “We are concerned about potential anticompetitive coordination taking place through the RealPage User Group.”

RealPage did not immediately respond to a request for comment.

RealPage has said that the company “uses aggregated market data from a variety of sources in a legally compliant manner” and that its software prioritizes a property’s own internal supply and demand dynamics over external factors such as competitors’ rents. The company has said its software helps reduce the risk of collusion that would occur if landlords relied on phone surveys of competitors to manually price their units.

The DOJ declined to comment on the letter.

The department five years ago reviewed RealPage’s plan to acquire its biggest competitor in pricing software, but federal prosecutors declined to seek to block the merger, which doubled the number of apartments RealPage was pricing.

The senators noted that transaction, saying RealPage has made more than 10 acquisitions since 2016. They said in data-intensive industries, “the ability to acquire more data can result in the algorithms suggesting higher prices and can also increase the barriers to entry” for other competitors. The lawmakers encouraged the department “to consider looking back at RealPage’s past behavior to determine whether any of it was anticompetitive.”

The letter follows two others sent by lawmakers urging the DOJ or Federal Trade Commission to investigate RealPage. Since ProPublica’s investigation was published, three lawsuits have been filed on behalf of renters alleging that the software is artificially inflating rents and facilitating collusion. RealPage has denied allegations in a lawsuit filed in San Diego, and it has not responded to calls for comment about the other two legal actions, filed in federal district court in Seattle.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Heather Vogell.

]]>
https://www.radiofree.org/2022/11/17/more-senate-democrats-seek-investigation-of-tech-firm-accused-of-colluding-with-landlords-to-hike-apartment-rents/feed/ 0 351590
What is Mastodon and what does it mean for ‘Climate Twitter’? https://grist.org/technology/twitter-mastodon-climate-change-elon-musk/ https://grist.org/technology/twitter-mastodon-climate-change-elon-musk/#respond Thu, 17 Nov 2022 11:30:00 +0000 https://grist.org/?p=594521 In the month since billionaire Elon Musk took possession of Twitter, firing thousands of workers and contractors and throwing its blue check verification system into chaos, people have been leaving the bird app in droves. Twitter has lost more than a million users — including several prominent climate activists, scientists, and journalists. In its place, many are migrating to Mastodon, an open-source social media network where users communicate on decentralized servers.

Unlike Twitter’s single website, Mastodon is made up of a federation of interconnected yet independent servers, some of which are themed around a particular interest. Even though users can follow and correspond with people from different communities, they can also choose to only view posts from their local server. Several of the servers that have gained momentum in recent weeks are geared toward climate-conscious individuals and groups. 

Mastodon.green, for example, is a server that says it plans to operate on clean energy and offset carbon based on the number of people in the group. The community currently boasts around 9,800 active users, who are asked to pay a monthly fee to be on the server after a certain trial period. Free sign ups are currently closed due to the unusually high number of people trying to join.

Paula Kreuzer, a climate activist based in Austria who works with Fridays for Future Vienna, is the administrator of the server climatejustice.social. She said she recently had to close that community, which she launched in early 2020, because of the massive influx of new user requests; the server, which currently has about 10,000 users, saw around 7,000 people join in the past few weeks. 

Kreuzer describes climatejustice.social as a laid-back place, with less focus on research or scientific discussion and more on activism, networking, and casual conversations. The biggest change in conversation she has seen is a plethora of new users trying to get the hang of a new platform and its quirks. 

“Asking questions is the best tip I can give people,” Kreuzer told Grist before she hopped on another call to introduce new German users to Mastodon.

Kim Cobb, an award-winning climate scientist and the director of the Institute at Brown for Environment and Society, is one of the many new Mastodon users still getting a sense of the platform. She recently launched her account on the fediscience.org server, which is geared toward academics and researchers. She said she’s seen an “explosion” of users on that server in recent days, but isn’t yet ready to fully abandon Twitter herself.

“It’s sort of a gray zone right now,” she said. “So I’m waiting, I’m watching. But I’m also building.”

Historically speaking, Twitter has played an important role in building people’s awareness of environmental actions, from youth-led climate strikes to viral trash-clean-up videos. On the other hand, the bird app has also been a breeding ground for climate misinformation. Previous leadership went so far as to ban climate change propaganda on the platform, but experts warn climate disinformation could increase under Musk’s watch.

The way Mastodon is currently set up, it can be slightly easier to find a like-minded community and slightly harder for posts to reach a massive global audience compared to Twitter. Granted, users can still see public posts across most servers using the “federated timeline” view, and people are free to join multiple servers or switch an account from one server to another. Still, not all prominent climate activists are choosing to join science- or justice-themed servers. Greta Thunberg, for example, can be found on mastodon.nu, a server that is run on renewable energy but geared toward residents of Sweden and other Nordic countries.

While working out the odds and ends can be frustrating for those just joining up, some Mastodon users have found the social media platform to be a nice break from Twitter’s sometimes hostile mood. 

“I’m enjoying it actually,” said Peter Gleick, an environmental scientist and co-founder of the Pacific Institute who recently joined Mastodon’s fediscience.org server. “The tone is nicer. The engagement is more interesting and the conversations are more in depth than on Twitter.”

Mastodon numbers are growing but it is still a relatively small social network, with around 1 million active users compared to Twitter’s roughly 238 million. Gleick, who has over 96,000 followers on Twitter, said it has been hard to wrestle with the potential of losing a large, engaged, and climate-focused audience should he leave the bird app completely. He doesn’t find Mastodon as intuitive as Twitter but, despite the hiccups, he remains intrigued. Twitter wasn’t super easy to use in its early days either, he said.

But if Musk pushes Twitter platform over the edge, he believes users will find ways to still talk, share, and work in other climate spaces online. 

“We’re sort of holding our breath to see really how bad it gets,” Gleick said.

This story was originally published by Grist with the headline What is Mastodon and what does it mean for ‘Climate Twitter’? on Nov 17, 2022.


This content originally appeared on Grist and was authored by John McCracken.

]]>
https://grist.org/technology/twitter-mastodon-climate-change-elon-musk/feed/ 0 351532
An entire Pacific country will upload itself to the metaverse. It’s a desperate plan – with a hidden message https://www.radiofree.org/2022/11/17/an-entire-pacific-country-will-upload-itself-to-the-metaverse-its-a-desperate-plan-with-a-hidden-message/ https://www.radiofree.org/2022/11/17/an-entire-pacific-country-will-upload-itself-to-the-metaverse-its-a-desperate-plan-with-a-hidden-message/#respond Thu, 17 Nov 2022 05:45:01 +0000 https://asiapacificreport.nz/?p=80856 ANALYSIS: By Nick Kelly, Queensland University of Technology and Marcus Foth, Queensland University of Technology

The Pacific nation of Tuvalu is planning to create a version of itself in the metaverse, as a response to the existential threat of rising sea levels.

Tuvalu’s Minister for Justice, Communication and Foreign Affairs, Simon Kofe, made the announcement via a chilling digital address to leaders at COP27.

He said the plan, which accounts for the “worst case scenario”, involves creating a digital twin of Tuvalu in the metaverse in order to replicate its beautiful islands and preserve its rich culture:

The tragedy of this outcome cannot be overstated […] Tuvalu could be the first country in the world to exist solely in cyberspace – but if global warming continues unchecked, it won’t be the last.


Tuvalu’s “digital twin” message. Video: Reuters

The idea is that the metaverse might allow Tuvalu to “fully function as a sovereign state” as its people are forced to live somewhere else.

There are two stories here. One is of a small island nation in the Pacific facing an existential threat and looking to preserve its nationhood through technology.

The other is that by far the preferred future for Tuvalu would be to avoid the worst effects of climate change and preserve itself as a terrestrial nation. In which case, this may be its way of getting the world’s attention.

Tuvalu will be one of the first nations to go under as sea levels rise
Tuvalu will be one of the first nations to go under as sea levels rise. It faces an existential threat. Image: Mick Tsikas/AAP/The Conversation

What is a metaverse nation?
The metaverse represents a burgeoning future in which augmented and virtual reality become part of everyday living. There are many visions of what the metaverse might look like, with the most well-known coming from Meta (previously Facebook) CEO Mark Zuckerberg.

What most of these visions have in common is the idea that the metaverse is about interoperable and immersive 3D worlds. A persistent avatar moves from one virtual world to another, as easily as moving from one room to another in the physical world.

The aim is to obscure the human ability to distinguish between the real and the virtual, for better or for worse.

Kofe implies three aspects of Tuvalu’s nationhood could be recreated in the metaverse:

  • territory — the recreation of the natural beauty of Tuvalu, which could be interacted with in different ways
  • culture — the ability for Tuvaluan people to interact with one another in ways that preserve their shared language, norms and customs, wherever they may be
  • sovereignty — if there were to be a loss of terrestrial land over which the government of Tuvalu has sovereignty (a tragedy beyond imagining, but which they have begun to imagine) then could they have sovereignty over virtual land instead?

Could it be done?
In the case that Tuvalu’s proposal is, in fact, a literal one and not just symbolic of the dangers of climate change, what might it look like?

Technologically, it’s already easy enough to create beautiful, immersive and richly rendered recreations of Tuvalu’s territory. Moreover, thousands of different online communities and 3D worlds (such as Second Life) demonstrate it’s possible to have entirely virtual interactive spaces that can maintain their own culture.

The idea of combining these technological capabilities with features of governance for a “digital twin” of Tuvalu is feasible.

There have been prior experiments of governments taking location-based functions and creating virtual analogues of them.

For example, Estonia’s e-residency is an online-only form of residency non-Estonians can obtain to access services such as company registration. Another example is countries setting up virtual embassies on the online platform Second Life.

Yet there are significant technological and social challenges in bringing together and digitising the elements that define an entire nation.

Tuvalu has only about 12,000 citizens, but having even this many people interact in real time in an immersive virtual world is a technical challenge. There are issues of bandwidth, computing power, and the fact that many users have an aversion to headsets or suffer nausea.

Nobody has yet demonstrated that nation-states can be successfully translated to the virtual world. Even if they could be, others argue the digital world makes nation-states redundant.

Tuvalu’s proposal to create its digital twin in the metaverse is a message in a bottle — a desperate response to a tragic situation. Yet there is a coded message here too, for others who might consider retreat to the virtual as a response to loss from climate change.

The metaverse is no refuge
The metaverse is built on the physical infrastructure of servers, data centres, network routers, devices and head-mounted displays. All of this tech has a hidden carbon footprint and requires physical maintenance and energy. Research published in Nature predicts the internet will consume about 20 percent of the world’s electricity by 2025.

The idea of the metaverse nation as a response to climate change is exactly the kind of thinking that got us here. The language that gets adopted around new technologies — such as “cloud computing”, “virtual reality” and “metaverse” — comes across as both clean and green.

Such terms are laden with “technological solutionism” and “greenwashing”. They hide the fact that technological responses to climate change often exacerbate the problem due to how energy and resource intensive they are.

So where does that leave Tuvalu?
Kofe is well aware the metaverse is not an answer to Tuvalu’s problems. He explicitly states we need to focus on reducing the impacts of climate change through initiatives such as a fossil-fuel non-proliferation treaty.

His video about Tuvalu moving to the metaverse is hugely successful as a provocation. It got worldwide press — just like his moving plea during COP26 while standing knee-deep in rising water.

Yet Kofe suggests:

Without a global conscience and a global commitment to our shared wellbeing we may find the rest of the world joining us online as their lands disappear.

It is dangerous to believe, even implicitly, that moving to the metaverse is a viable response to climate change. The metaverse can certainly assist in keeping heritage and culture alive as a virtual museum and digital community. But it seems unlikely to work as an ersatz nation-state.

And, either way, it certainly won’t work without all of the land, infrastructure and energy that keeps the internet functioning.

It would be far better for us to direct international attention towards Tuvalu’s other initiatives described in the same report:

The project’s first initiative promotes diplomacy based on Tuvaluan values of olaga fakafenua (communal living systems), kaitasi (shared responsibility) and fale-pili (being a good neighbour), in the hope that these values will motivate other nations to understand their shared responsibility to address climate change and sea level rise to achieve global wellbeing.

The message in a bottle being sent out by Tuvalu is not really about the possibilities of metaverse nations at all. The message is clear: to support communal living systems, to take shared responsibility and to be a good neighbour.

The first of these can’t translate into the virtual world. The second requires us to consume less, and the third requires us to care.The Conversation

Dr Nick Kelly, senior lecturer in interaction design, Queensland University of Technology and Dr Marcus Foth, professor of urban informatics, Queensland University of Technology. This article is republished from The Conversation under a Creative Commons licence. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2022/11/17/an-entire-pacific-country-will-upload-itself-to-the-metaverse-its-a-desperate-plan-with-a-hidden-message/feed/ 0 351484
Elon Musk Would Have Done Better With Twitter If He’d Read Noam Chomsky https://www.radiofree.org/2022/11/12/elon-musk-would-have-done-better-with-twitter-if-hed-read-noam-chomsky/ https://www.radiofree.org/2022/11/12/elon-musk-would-have-done-better-with-twitter-if-hed-read-noam-chomsky/#respond Sat, 12 Nov 2022 12:00:32 +0000 https://theintercept.com/?p=414146
An image of new Twitter owner Elon Musk is seen surrounded by Twitter logos in this photo illustration in Warsaw, Poland on 08 November, 2022. (Photo by STR/NurPhoto via AP)

An image of Elon Musk is seen surrounded by Twitter logos, on Nov. 8, 2022.

Photo: STR/NurPhoto via AP


Everything in this article was accurate at the time of publication. However, given the speed of changes at Twitter, anything could have happened by the time you read this. Elon Musk might have staged his own death and started a new life in Uruguay. He could have decreed that users may now only post while nude. He may have sold Twitter for $7 to a consortium of Labradors. There’s just no predicting.

What was predictable was the excruciating torment Musk is now undergoing: Anyone familiar with a basic left-wing critique of corporate media could have foreseen it. Musk would have been far more prepared for the Twitter maelstrom if he’d read “Manufacturing Consent” by Edward Herman and Noam Chomsky, or “The Media Monopoly” by Ben Bagdikian, or even “The Brass Check” by Upton Sinclair, published in 1919.

Let’s start at the beginning. It costs money to operate a media corporation. Even ones that are privately held, like Twitter post-Musk takeover, require revenue to operate.

One potential source is advertising. In 2021, Twitter had revenues of $5 billion, 90 percent of which came from ads. A.G. Sulzberger, the publisher of the New York Times, has said that advertising was once 80 percent of the paper’s revenue, and that at other papers it was generally higher, even 95 percent.

So in a business like Twitter’s, your customers are the advertisers, and your product is the attention of your users. Unfortunately, Musk felt that Twitter’s previous managers were left-wing fascists who hated free speech because they knew their statist blue-hair ideology couldn’t survive the light of day. Musk was sure things would be different if he were managing Twitter. Now he is. Let the freewheeling, raucous political debate begin! No sacred cows, no safe spaces.

Except Musk immediately discovered that advertisers hate freewheeling, raucous political debate. Josh Marshall, the founder of Talking Points Memo, explained this cogently in a recent article about his experience running an outlet devoted to politics:

Advertisers don’t want to be near controversy. Indeed, they don’t even want to be near things that are upsetting or agitating. This is why all political and political news media face an inverse premium in advertising because the content is inherently polarizing. You can show the same ad to the same people the same amount of times and you’ll get more money if the content is fashion or parenthood or entertainment than if it’s politics. It’s a bedrock rule of the world of advertising.

This is why Twitter was the way it was before Musk bought it: not because of the politics of its staff, but because advertisers demanded it. Likewise, it’s why its advertising has now fallen off a cliff. As Sinclair wrote over 100 years ago, “If the newspaper fails to protect its big advertisers, the big advertisers will get busy and protect themselves.” It’s not simply that Unilever doesn’t want its ads appearing next to tweets from a Turkish bot-net shrieking about reannihilating the Armenians. It’s not even that corporations will never be crazy about subsidizing anti-corporate manifestos. It’s that they’d prefer an audience that isn’t thinking at all, except about what to buy next.

Truth and Business

Indeed, it goes even deeper than that. Musk told advertisers just a few days ago that Twitter wants to be “in the business of truth.” Even if that were what Musk truly wanted himself — it’s obviously not — that is absolutely the last thing advertisers want. As everyone learned when they were 6 years old and successfully pressured their parents into buying them a Star Wars toy that didn’t actually fly like in the commercials, advertisers are in the business of lying.

So even though Musk doesn’t understand precisely why advertisers dislike free speech, he is correct to believe that they do. He’s therefore moved onto the next possible source of revenue: subscriptions. According to various reports, he hopes to make subscriptions the source of at least 50 percent of Twitter revenue.

But why would anyone pay for Twitter? One answer would be to see fewer ads. Except people willing to pay for Twitter are going to be the audience that advertisers most want to reach: heavy users with money. This is why Twitter’s specialists crunched the numbers and informed Musk that Twitter would plausibly lose money on many $8/month subscribers.

Then there’s the basic question of fairness. If you want to create a vibrant digital town square, as Musk has said he does, how can you exclude those who can’t afford $8/month — which is many Americans, but even more of Twitter’s users outside the U.S.? You can of course lower the price for them, but then subscriptions are going to be even less lucrative.

There is one possible final source of revenue for Twitter: subsidies. Musk could, in theory, just pay for Twitter’s staggering losses out of his own pocket, gradually spending down his personal $200 billion fortune. As the fictional press baron Charles Foster Kane says in “Citizen Kane,” “I did lose a million dollars last year. I expect to lose a million dollars this year. I expect to lose a million dollars next year. At the rate of a million dollars a year, I’ll have to close this place in 60 years.” But it turns out Musk’s passionate devotion to free speech doesn’t go quite that far.

This is why Musk is now thrashing around in incompetent fury. He enthusiastically impaled himself on the horns of this fundamental dilemma of political speech, one that no one has ever solved. He could have avoided his hilarious nightmare if he’d just read a few books with a radical perspective on the media. But people who do that tend not to become the richest person on earth.

Government Subsidies

However, there is one, and only one, potential solution here. Media outlets could be subsidized by the government.

This may sound anti-American if you’ve had a high-toned education and been properly indoctrinated. But in fact, the media received massive subsidies in the early decades of the United States, mostly in the form of free or low-cost postal rates. The Founding Fathers were explicit about the reasons for this. Thomas Jefferson endorsed the concept in his first address to Congress as president, because it would “facilitate the progress of information.” Madison wrote that “a free press, and particularly a circulation of newspapers through the entire body of the people … is favorable to liberty.” [Emphasis in original] Therefore, he contended, postage “above half a cent, amounted to a prohibition … of the distribution of knowledge and information.” The total government spending to support newspapers reached, as a percentage of the economy, the equivalent today of over $30 billion per year.

It’s true that government funding of the media creates obvious dangers. Yet technology has advanced to the point where these could largely be eliminated. One particularly promising idea is that of the economist Dean Baker, who’s proposed that every America get a $100 voucher from the federal government that they could grant to any journalistic (or artistic) endeavor they liked.

But while we wait for that, we should remember that many people have dreamed Musk’s dream before, and all have awoken to this unpleasant reality. While it’s largely forgotten now, John B. Oakes, who created the New York Times op-ed page in 1970, originally hoped it could be a forum for unfettered political debate. He tried to garner submissions from Curtis LeMay and Noam Chomsky to John Birch Society co-founder Robert Welch and Gus Hall, the head of the U.S. Communist Party. The page even tried to hire Tupac Shakur’s mother, Afeni.

It didn’t work. The op-ed page slowly calcified under all of these pressures, and then Oakes was removed from his position by A.O. Sulzberger Sr., the grandfather of the paper’s current publisher. Twitter’s Wall Street creditors will probably play the role of Sulzberger for Musk, and sooner rather than later.


This content originally appeared on The Intercept and was authored by Jon Schwarz.

]]>
https://www.radiofree.org/2022/11/12/elon-musk-would-have-done-better-with-twitter-if-hed-read-noam-chomsky/feed/ 0 350156
How California’s initiative to fund electric vehicles went terribly wrong https://grist.org/elections/how-californias-initiative-to-fund-electric-vehicles-went-terribly-wrong/ https://grist.org/elections/how-californias-initiative-to-fund-electric-vehicles-went-terribly-wrong/#respond Fri, 11 Nov 2022 11:45:00 +0000 https://grist.org/?p=594151 Back in June, a measure to tax the wealthiest Californians to raise funds for electric vehicles and wildfire fighting qualified for the state ballot. At first, it seemed like a clear winner. The initiative had the support of hundreds of environmental and public health groups, unions, firefighters, and elected officials. The American Lung Association, the Union of Concerned Scientists, and the California Democratic Party all endorsed it, with 63 percent of voters saying they would support the measure on election day this November.

If any state would support a tax for climate action it would be California, where nearly two-thirds of residents believe local officials should do more to address climate change. But on Tuesday, Californians resoundingly rejected the initiative, with 59 percent voting it down.

What happened? How did an immensely popular environmental ballot initiative fail in a state that prides itself on being one of the most progressive on climate?

In short: A governor broke party ranks, billionaires launched an opposition campaign, and a corporation with a PR problem turned out to be a major liability. Let’s dig in.

The surprise twist came in late July, soon after the California Democratic Party endorsed Prop 30, as the measure was called. Governor Newsom and the California Teachers Association announced their formal opposition. The teachers association took issue with putting “a special interest lock box” on taxes that would traditionally fund schools. Governor Gavin Newsom narrowed his sights on the rideshare company Lyft, the proposition’s primary funder. He started campaigning heavily against the measure, starring in a September television ad where he asked Californians to vote against “[Lyft’s] sinister scheme to grab a huge taxpayer funded subsidy.” He even donated his own re-election funds to the opposition group. 

“Gavin Newsom has a lot of credibility as a climate advocate in the state,” said Catherine Wolfram, a climate and energy economics professor at University of California, Berkeley. “The fact that he came out against Prop 30, voters paid attention to that.” 

California law requires rideshare companies to log 90 percent of all miles in electric vehicles by 2030, and Newsom accused Lyft of trying to use taxpayer dollars to foot the bill for its transition to electric. Once Newsom spoke out against the measure, it started slipping in the polls.

Corporate involvement in drafting and promoting legislation is something that many Californians take issue with, and with good reason. In 2020, Lyft and Uber pushed through a heavily contested measure, Prop 22, to reclassify workers as contractors, which gets companies off the hook for providing minimum wage, overtime, health care, and other benefits. 

a lyft sign in the foreground and a woman walking with bags in the background
Lyft spent over $45 million on a California ballot measure to fund electric vehicles that failed on Tuesday. Al Seib / Los Angeles Times via Getty

But in this case, Prop 30 wasn’t exactly the carve out for Lyft that Newsom said it was. According to the clean transportation groups who devised the measure, Lyft came on, mostly as a funder, once the basic contours of the measure were already established. “There was nothing in there that specifically mentioned Lyft,” said Steven Maviglio, who consulted on press strategy for the proposition. “The measure would have benefitted low- to middle-income Californians by subsidizing electric vehicles and installing charging stations in their neighborhoods. Lyft would have benefitted in that its drivers fall into the category of being Californians.” The measure slated 50 percent of its EV funding for low-income communities, which are disproportionately impacted by air pollution.

The money raised from the Prop 30 tax, an estimated $3.5 billion to $5 billion annually, would have gone to the California Air Resources Board, the Energy Commission, and CAL FIRE, state agencies Newsom funds with his own budget to reach California’s climate targets. These include a 40 percent emissions reduction by 2030 and 100 percent EV sales by 2035 in a state where transportation comprises 50 percent of the state’s greenhouse gas emissions and contributes to some of the worst air quality in the country. 

Beyond Lyft’s involvement, there are other reasons Newsom and other Prop 30 opponents pushed back against the measure. Some of the biggest funders of the opposition campaign were billionaires who would have been affected by the 1.75 percent tax increase on incomes over $2 million a year. Top donors to the No to Prop 30 campaign included Netflix Founder Reed Hastings, investment company founder Mark Heising, Sequoia Capital venture capitalist Michael Moritz, and Catherine Dean, chief operating officer of Govern for California, an influential donor network composed primarily of Bay Area venture capitalists and tech executives. Several of the big Prop 30 contributors, like Hastings, Dean, and Heising, were also big supporters of Newsom’s 2022 gubernatorial reelection bid, with some maxing out allowed donation levels

Newsom expressed his concerns about increasingly relying on high-income earners to fund state programs. California gets most of its revenue from income taxes, and people who make over $2 million — the 0.2 percent of residents, taxed at 13.3 percent of their income — already make up 30 percent of the state’s income tax revenue, according to CalMatters. This pool can be a volatile and unstable source of funding as it is heavily tied to fluctuating markets. Other opponents expressed concerns about driving high-income earners out of the state, although studies show the people moving out of California are low- and middle-income residents who can no longer afford to live there; high earners are the ones moving in.

Opponents also argued that California ballot measures that carve out portions of the budget for specific issues limit the flexibility of the governor and the legislature to allocate funds. “Climate is such a big topic and there are interlocking issues,” said Wolfram. “Ballot propositions are the wrong way to do climate policy.” 

Ultimately, Lyft was the opposition’s biggest talking point. “The other side never got around that Lyft had written and funded the campaign,” said Matthew Rodriguez, campaign manager for No on Prop 30.

Maviglio, who has consulted on strategy for California environmental measures like the plastic bag ban and the water bond, warned against reading the vote as an indication of voter’s beliefs on climate change or progressive taxation. It’s much easier to get a “no” vote on a ballot measure than a “yes,” he said, so long as the opposition can sow some seeds of doubt in the minds of voters, which in this case they were able to do by focusing on Lyft. “The conversation was never about the actual policy,” said Bill Magavern, policy director at the Coalition for Clean Air.

What’s next for the future of EVs in the state? The good news is there is money for clean transportation. After lobbying from Newsom, California legislators recently approved a historic $54 billion in climate spending with $10 billion set aside for electric vehicle funding over five years. There is also money from the federal Inflation Reduction Act coming in for EV incentives, as well as an expected $384 million from the Infrastructure Bill for charging stations in California. But experts say it’s nowhere near enough. “The $10 billion is a promise, not a law,” said Magavern, adding that past electric vehicle subsidy programs in the state have consistently run out of money. Lack of charging stations has also emerged as a clear roadblock in efforts to mandate the transition to electric trucks for the shipping industry. And while the past two years have seen big budget surpluses, Governor Newsom has already warned about restrictions next year; Magavern worries that climate change programs will be among the first to be cut.

“We are in a crisis when it comes to climate and air pollution and wildfires,” said Magavern. “To meet the emergency, we needed to do something out of the ordinary. [A tax increase] wouldn’t pass the legislature so it took something like a ballot initiative.”

Meanwhile in New York, a historic $4.2 billion bond act for conservation, water quality infrastructure, flood risk reduction, and climate change mitigation passed with no organized opposition. The measure, which will allow the state to raise money for projects by taking on debt, also had a large coalition of environmental and labor groups behind it, and is projected to create 84,000 jobs across New York State. “New Yorkers said ‘yes’ to investing in clean water to drink, clean air to breathe, reduced flooding, environmental justice, and jobs,” said Kate Boicourt, director of climate resilient coasts and watersheds for the New York chapter of the Environmental Defense Fund. “This act… is a win for everyone and will make an impact in communities across the state for generations to come.”

This story was originally published by Grist with the headline How California’s initiative to fund electric vehicles went terribly wrong on Nov 11, 2022.


This content originally appeared on Grist and was authored by Blanca Begert.

]]>
https://grist.org/elections/how-californias-initiative-to-fund-electric-vehicles-went-terribly-wrong/feed/ 0 349911
YouTube fails to moderate scripted child-kidnapping videos stoking fear and making money https://www.radiofree.org/2022/11/11/youtube-fails-to-moderate-scripted-child-kidnapping-videos-stoking-fear-and-making-money/ https://www.radiofree.org/2022/11/11/youtube-fails-to-moderate-scripted-child-kidnapping-videos-stoking-fear-and-making-money/#respond Fri, 11 Nov 2022 07:21:51 +0000 https://www.altnews.in/?p=134338 Trigger Warning: Violent Content. Viewer discretion is advised. Over the past few months, rumours of child kidnapping have spread like wildfire in many parts of the country based on purported...

The post YouTube fails to moderate scripted child-kidnapping videos stoking fear and making money appeared first on Alt News.

]]>
Trigger Warning: Violent Content. Viewer discretion is advised.

Over the past few months, rumours of child kidnapping have spread like wildfire in many parts of the country based on purported videos of abductions or attempted abductions and mob assaults, viral across social media platforms. Typically, these videos contain gory visuals and a warning that some people are roaming about in a particular area to kidnap children.

Back in 2018, IndiaSpend analyzed news reports from across India which said there had been ” …61 (is) number of mob attacks sparked by rumours or suspicion of child-lifting circulated on social media since the beginning of the year. So far this year, 24 persons have been killed in such mob attacks. This more than 4.5 times rise in attacks and two-fold rise in deaths of this kind over 2017, when 11 persons were killed in eight separate attacks”. The report also touched upon the fact that these attacks indicated an erosion of faith in the law enforcement system. A 2018 incident in Assam where two musicians were killed on the suspicion of being child kidnappers received global media attention.

Changing Contours of Misinformation Through Videos

The nature of misinformation in the context of child kidnapping has undergone some changes over the years. Initially, the viral videos were clipped from longer videos presumably made for raising awareness. Once these videos caused panic, people started attacking unfamiliar faces suspecting them to be child lifters, and the videos of those attacks were shared with the claim that they were actual child kidnappers being punished for their deeds. Subsequently, unrelated gory clips of dead bodies and mutilated corpses were shared as proof of organ trafficking.

The rumour-mongering was taken to the next level when YouTube content creators started to upload scripted child-kidnapping videos. Sometimes, they were circulated in regional languages. Eventually, the public reaction to child kidnapping became topical, inspiring the content creators to monetize the rumours through targeted viewership. The economy of staged videos was explained by an Alt News report in the past.

News reports have mentioned that the police have time and again appealed to the public to not fall for rumours and refrain from taking law into their hands. This report samples 20-odd scripted videos of child kidnapping and organ trafficking that have the potential to accentuate public fears on the issue, and puts them in the context of existing content moderation policy of YouTube. The objective is to draw attention to the scope and limitations of such policy and methods of moderation in the context of scripted child-kidnapping videos that are disturbing in nature.

The Impact of Such Videos

There have been numerous reports on the deep social impact of the scripted videos. Often, these rumours affect parents/adults because they fear for the safety of their children. Hence, such content instigates fear, suspicion and panic among people, and often results in an assault on the suspect/s. Besides, these videos create certain stereotypical impressions of who could be a child kidnapper. They are judged on the basis of how they dress and conduct themselves in public. For example, in the scripted videos, individuals are dressed as mendicants/fakirs, scrap dealers, hawkers or even vagabonds. Most of the cases of mob violence are reported from rural areas, a typical setting in the staged videos. While in many cases sadhus and mentally challenged people were at the receiving end, public officials and healthcare workers, too, were not spared.

Alt News has addressed and debunked several such rumours and videos of child kidnapping in the past couple of years (1, 2, 3, 4, 5, 6, 7, 8), and done a detailed analysis of real-life consequences of scripted or doctored videos of child abduction. It was observed that between August 30 and September 13, 2022, there were 27  attacks on individuals resulting from rumours of child abduction. There have also been several reports describing how unrelated visuals and scripted videos were passed off as real events.

YouTube Policy on moderation

The YouTube community guidelines outline a host of categories to address problematic content. The categories that concern us here are the policies on violent content, manipulated content, child safety and thumbnail.

YouTube includes the following under violent or graphic content:

  • Inciting others to commit violent acts against individuals or a defined group of people.
  • Fights involving minors.
  • Footage, audio, or imagery involving road accidents, natural disasters, war aftermath, terrorist attack aftermath, street fights, physical attacks, immolation, torture, corpses, protests or riots, robberies, medical procedures, or other such scenarios with the intent to shock or disgust viewers.
  • Footage or imagery showing bodily fluids, such as blood or vomit, with the intent to shock or disgust viewers.
  • Footage of corpses with massive injuries, such as severed limbs.

The videos we have sampled contain unsavory, gory thumbnails as well as visuals of physical attacks, torture, corpses etc. for public consumption and presumably to pump viewership. This is in direct contravention to the guidelines on violent or graphic content policies. In most of the cases the thumbnails do not necessarily reflect the actual content in the video, thus manipulating the audience into clicking on it.

These videos also fall under the category of manipulated content, described by YouTube as ‘content that has been technically manipulated or doctored in a way that misleads users (beyond clips taken out of context) and may pose a serious risk of egregious harm’.

The child safety policy outlines conditions that could be flagged as dangerous for minors. It states, “never put minors in harmful situations that may lead to injury, including dangerous stunts, dares, or pranks”. The videos have images of children being lifted and bagged, carried away recklessly, sometimes a weapon held in close proximity to them. These ‘dangerous stunts’ clearly violate the child safety policy.

The thumbnail policy lists various kinds of images that can’t be posted as thumbnails. They include

  • Violent imagery that intends to shock or disgust
  • Graphic or disturbing imagery with blood or gore
  • A thumbnail that misleads viewers to think they’re about to view something that’s not in the video

It is pertinent to note that YouTube monetization policy mentions that to be eligible to monetize content, the content creator has to follow the community guidelines. “Violation of our YouTube channel monetization policies may result in monetization being suspended or permanently disabled on all or any of your accounts,” the policy says. How the videos enlisted below violate the guidelines have been explained above. Here are the screenshots of some of the videos we have sampled that carry advertisements.

Click to view slideshow.

The Problem with Disclaimers

Alt News has, in the past, documented cases of disingenuous disclaimers in the context of scripted CCTV videos. In the child-kidnapping videos disclaimers come in different forms. A few of the videos carry a written disclaimer on the screen in English for a few seconds, some in Hindi. A lot of disclaimers come towards the end of the video where the cast explains why they made the video. They claim that the content is created for the purposes of entertainment and, at times, to educate adults on the dangers posed by child traffickers. However, in all these cases, the gory clickbait images and disturbing performances like pulling out organs, slashing body etc. serve as a voyeuristic inducement to attract viewership. This makes it a matter of serious content moderation.

Questions Galore

The effectiveness of policy issues is intrinsically linked to the dynamics of viewership. The questions that assume significance here include — Who are the stakeholders? Who is getting affected by the consumption of these violent videos? Is it only a law enforcement issue? What is the consent system in place to create content performed by children? How does YouTube monitor which of such channels are ‘authoritative voices’?

Every policy has a target audience. The nature of the videos and ground reports of public reaction to suspicions of child-kidnapping certainly show that the target audience here is parents, guardians and impressionable teens, most likely living in rural areas, where children are likely to have lesser parental surveillance.

To add to the conversation on moderation, it is useful to look at it from the perspective of the rights of children. The YouTube policy guideline on children is restricted to abusive content or content that is sexual in nature. The guidelines are not exhaustive about what kind of behaviour could be deemed violent or obscene in respect of children. There is scope to create additional check gates for such videos by bringing in the question of the rights of children.

Responding to some of the above queries by Alt News, a YouTube communications representative said the platform’s responsibility efforts were focused on four pillars: removing violative content, raising up authoritative content, reducing the spread of borderline content and rewarding trusted creators. More than 20,000 people around the world, including those with Indian language expertise, work to review and remove content that violates our policies, they added.

They also made the point that raising authoritative information was as important for the platform as removing violative content, and improving the platform to prevent the spread of harmful misinformation was a continuous process.

Recently, YouTube has flagged some gory videos involving children as inappropriate for some users. They are either unavailable or carry the warning that it is inappropriate for some users. Here are a few links to some of these videos: 1, 2, 3, 4, 5

Sample Videos

Most instances of child kidnapping rumours have a trend or pattern in terms of public perception. For example, the kind of people being profiled, the nature of public behaviour that would tantamount to suspicious activity, etc. The video below suggests how a child trafficker looks like. It creates the image of a person in tattered clothes or someone dealing with scraps, as a potential abductor. The disclaimer is posted at the beginning of the video and the text is in English, not necessarily the preferred language of the audience. The video was uploaded in 2019 and has garnered over 12 million views.

In the the second video (below), youngsters run amok with weapons to catch abductors. The disclaimer mentions the purpose of the video is entertainment. The feature image has two scary looking men stabbing a child. How does such an image come under the purview of entertainment? The video shows a group of armed youngsters taking law into their own hands. The channel ‘The Three Bro’ has over 3,34,000 subscribers  and in one year, this video has gathered over 29 million views.

In the following video, the imagery is disturbing. Weapons are brandished to rip open children. There is a message in the end asking people to be wary of house guests. Such commentary is problematic in rural areas where visitors often rely on local hospitality. With more than 2,52,000 subscribers, the channel ‘Bihari Babu Entertainment’ has managed 2.7 million viewers in about a year.

There are several channels that have multiple videos on child kidnapping, claiming to make people aware. There does not seem to be any justification behind these videos other than monetizing content with wider reach.

The channel ‘Arvind Singh Gopalganj’ has couple of videos on kidney racket vis-a-vis child trafficking. In the video below, it is claimed to be an awareness video on such instances. The question is, does the channel need several such disturbing videos to raise awareness on the same topic? The video has had over 3,57,000 views in one year. A common theme in the messages is how the video is based on reports of kidney racket and child trafficking, and the public should scrutinize mendicants or similar loiterers before taking action.

The channel ‘psy film production’ has 1,48,000 subscribers. It has several such violent videos on child abduction, but passes its content as comedy. The video below has neither a disclaimer nor a message. It is gory, fear-inducing and disruptive. Underneath, there is also a slideshow of disturbing feature images from the videos of this channel.

 

Click to view slideshow.

 

There is this Youtube shorts shot to look like a live incident. There is neither a disclaimer nor message. People in the comments section call for police intervention. However, the video is clearly scripted. It violates the condition of context necessary for videos like these as per the guidelines. There are just a bunch of people in the middle of nowhere.

There are stock images of mendicants which profile individuals according to religious community, sometimes a Muslim and at times a Hindu.

The channel PBC entertainment, with 3,17,000 subscribers, has several gory imagery in its content on child kidnapping. Some of the videos have millions of views. Below is the screenshot of multiple videos from this channel. There are disclaimers given.

Similarly, there are videos where a hawker on a cycle is beaten up. The same channel ‘Jhamaru Mahato Comedy’ has a couple of videos on kidney racketeering and child abduction. The FIs are visually disturbing and should be taken down immediately. Below is a screenshot. The viewership of these videos is often in millions.

Here are a couple of videos with highly disturbing visuals.

 

Both the above channels, ‘Bhadohi ka Lavanda‘ and ‘SD Vines‘ have a couple of videos with disturbing feature images. Here are the screenshots:

Click to view slideshow.

The channel ‘Comedian Guru‘ also has several gory videos. One of them carries a disturbing image of man apparently taking organs out of a child. Channel UP STAR Channel and ‘Desi Lover‘, too, use repugnant imagery in several videos on kidney racketeering and child kidnapping.

Channel Jhamaru Mahato Comedy has several disturbing content. One of the videos :

The channel ‘Bhagirath Aashiq‘ passes of as a comedy channel with violent imagery of child kidnapping. It also shows a video normalizing extra-judicial action by police.

Channel ‘Comedy Plus with Neetuarya’, with 3.36 million subscribers, is a repeat offender. The channel has highly disturbing imagery across several videos on child kidnapping. Here is one of the videos:

There is also a video wherein people are seen demanding Aadhar card from people profiled as suspicious. This also raises the issue of privacy over making identification documents public to defend oneself against a mob.

Channel ‘RS Funny‘ carries images of mutilated children over several videos to show instances of child kidnapping.

Summary of the problem at hand

The fact that so many channels – as listed above – repetitively create violent content that has proven potential to prompt public reaction and law and order problems shows the inadequacies of YouTube’s monitoring policies. These videos trigger anger and other emotional responses in the public. They normalize mob violence, extra-judicial action by the police, weapons in the hands of vigilantes, and encourage public scrutiny or surveillance on each other. The fact that some of these videos come with advertisements shows that both the platform and the content creator are financially benefiting from such content which have potential risk for causing ‘egregious harm’.

There is no transparency on YouTube’s process of defining what it refers to as ‘authoritative information’ or how Indian language experts moderate content that violate community guidelines. The emphasis on ‘context‘ as being important to legitimize videos for advertiser-friendly content is not necessarily useful in this context. Majority of the viewers’ comments on the videos do not recommend or suggest flagging the gory content. There is a market for sensationalism and these channels seem to be taking advantage of that. The volume of viewership of some of these videos is staggering, as can be seen in the scroll shot below:

 

The post YouTube fails to moderate scripted child-kidnapping videos stoking fear and making money appeared first on Alt News.


This content originally appeared on Alt News and was authored by Mahaprajna Nayak.

]]>
https://www.radiofree.org/2022/11/11/youtube-fails-to-moderate-scripted-child-kidnapping-videos-stoking-fear-and-making-money/feed/ 0 349815
YouTube fails to moderate scripted child-kidnapping videos stoking fear and making money https://www.radiofree.org/2022/11/11/youtube-fails-to-moderate-scripted-child-kidnapping-videos-stoking-fear-and-making-money/ https://www.radiofree.org/2022/11/11/youtube-fails-to-moderate-scripted-child-kidnapping-videos-stoking-fear-and-making-money/#respond Fri, 11 Nov 2022 07:21:51 +0000 https://www.altnews.in/?p=134338 Trigger Warning: Violent Content. Viewer discretion is advised. Over the past few months, rumours of child kidnapping have spread like wildfire in many parts of the country based on purported...

The post YouTube fails to moderate scripted child-kidnapping videos stoking fear and making money appeared first on Alt News.

]]>
Trigger Warning: Violent Content. Viewer discretion is advised.

Over the past few months, rumours of child kidnapping have spread like wildfire in many parts of the country based on purported videos of abductions or attempted abductions and mob assaults, viral across social media platforms. Typically, these videos contain gory visuals and a warning that some people are roaming about in a particular area to kidnap children.

Back in 2018, IndiaSpend analyzed news reports from across India which said there had been ” …61 (is) number of mob attacks sparked by rumours or suspicion of child-lifting circulated on social media since the beginning of the year. So far this year, 24 persons have been killed in such mob attacks. This more than 4.5 times rise in attacks and two-fold rise in deaths of this kind over 2017, when 11 persons were killed in eight separate attacks”. The report also touched upon the fact that these attacks indicated an erosion of faith in the law enforcement system. A 2018 incident in Assam where two musicians were killed on the suspicion of being child kidnappers received global media attention.

Changing Contours of Misinformation Through Videos

The nature of misinformation in the context of child kidnapping has undergone some changes over the years. Initially, the viral videos were clipped from longer videos presumably made for raising awareness. Once these videos caused panic, people started attacking unfamiliar faces suspecting them to be child lifters, and the videos of those attacks were shared with the claim that they were actual child kidnappers being punished for their deeds. Subsequently, unrelated gory clips of dead bodies and mutilated corpses were shared as proof of organ trafficking.

The rumour-mongering was taken to the next level when YouTube content creators started to upload scripted child-kidnapping videos. Sometimes, they were circulated in regional languages. Eventually, the public reaction to child kidnapping became topical, inspiring the content creators to monetize the rumours through targeted viewership. The economy of staged videos was explained by an Alt News report in the past.

News reports have mentioned that the police have time and again appealed to the public to not fall for rumours and refrain from taking law into their hands. This report samples 20-odd scripted videos of child kidnapping and organ trafficking that have the potential to accentuate public fears on the issue, and puts them in the context of existing content moderation policy of YouTube. The objective is to draw attention to the scope and limitations of such policy and methods of moderation in the context of scripted child-kidnapping videos that are disturbing in nature.

The Impact of Such Videos

There have been numerous reports on the deep social impact of the scripted videos. Often, these rumours affect parents/adults because they fear for the safety of their children. Hence, such content instigates fear, suspicion and panic among people, and often results in an assault on the suspect/s. Besides, these videos create certain stereotypical impressions of who could be a child kidnapper. They are judged on the basis of how they dress and conduct themselves in public. For example, in the scripted videos, individuals are dressed as mendicants/fakirs, scrap dealers, hawkers or even vagabonds. Most of the cases of mob violence are reported from rural areas, a typical setting in the staged videos. While in many cases sadhus and mentally challenged people were at the receiving end, public officials and healthcare workers, too, were not spared.

Alt News has addressed and debunked several such rumours and videos of child kidnapping in the past couple of years (1, 2, 3, 4, 5, 6, 7, 8), and done a detailed analysis of real-life consequences of scripted or doctored videos of child abduction. It was observed that between August 30 and September 13, 2022, there were 27  attacks on individuals resulting from rumours of child abduction. There have also been several reports describing how unrelated visuals and scripted videos were passed off as real events.

YouTube Policy on moderation

The YouTube community guidelines outline a host of categories to address problematic content. The categories that concern us here are the policies on violent content, manipulated content, child safety and thumbnail.

YouTube includes the following under violent or graphic content:

  • Inciting others to commit violent acts against individuals or a defined group of people.
  • Fights involving minors.
  • Footage, audio, or imagery involving road accidents, natural disasters, war aftermath, terrorist attack aftermath, street fights, physical attacks, immolation, torture, corpses, protests or riots, robberies, medical procedures, or other such scenarios with the intent to shock or disgust viewers.
  • Footage or imagery showing bodily fluids, such as blood or vomit, with the intent to shock or disgust viewers.
  • Footage of corpses with massive injuries, such as severed limbs.

The videos we have sampled contain unsavory, gory thumbnails as well as visuals of physical attacks, torture, corpses etc. for public consumption and presumably to pump viewership. This is in direct contravention to the guidelines on violent or graphic content policies. In most of the cases the thumbnails do not necessarily reflect the actual content in the video, thus manipulating the audience into clicking on it.

These videos also fall under the category of manipulated content, described by YouTube as ‘content that has been technically manipulated or doctored in a way that misleads users (beyond clips taken out of context) and may pose a serious risk of egregious harm’.

The child safety policy outlines conditions that could be flagged as dangerous for minors. It states, “never put minors in harmful situations that may lead to injury, including dangerous stunts, dares, or pranks”. The videos have images of children being lifted and bagged, carried away recklessly, sometimes a weapon held in close proximity to them. These ‘dangerous stunts’ clearly violate the child safety policy.

The thumbnail policy lists various kinds of images that can’t be posted as thumbnails. They include

  • Violent imagery that intends to shock or disgust
  • Graphic or disturbing imagery with blood or gore
  • A thumbnail that misleads viewers to think they’re about to view something that’s not in the video

It is pertinent to note that YouTube monetization policy mentions that to be eligible to monetize content, the content creator has to follow the community guidelines. “Violation of our YouTube channel monetization policies may result in monetization being suspended or permanently disabled on all or any of your accounts,” the policy says. How the videos enlisted below violate the guidelines have been explained above. Here are the screenshots of some of the videos we have sampled that carry advertisements.

Click to view slideshow.

The Problem with Disclaimers

Alt News has, in the past, documented cases of disingenuous disclaimers in the context of scripted CCTV videos. In the child-kidnapping videos disclaimers come in different forms. A few of the videos carry a written disclaimer on the screen in English for a few seconds, some in Hindi. A lot of disclaimers come towards the end of the video where the cast explains why they made the video. They claim that the content is created for the purposes of entertainment and, at times, to educate adults on the dangers posed by child traffickers. However, in all these cases, the gory clickbait images and disturbing performances like pulling out organs, slashing body etc. serve as a voyeuristic inducement to attract viewership. This makes it a matter of serious content moderation.

Questions Galore

The effectiveness of policy issues is intrinsically linked to the dynamics of viewership. The questions that assume significance here include — Who are the stakeholders? Who is getting affected by the consumption of these violent videos? Is it only a law enforcement issue? What is the consent system in place to create content performed by children? How does YouTube monitor which of such channels are ‘authoritative voices’?

Every policy has a target audience. The nature of the videos and ground reports of public reaction to suspicions of child-kidnapping certainly show that the target audience here is parents, guardians and impressionable teens, most likely living in rural areas, where children are likely to have lesser parental surveillance.

To add to the conversation on moderation, it is useful to look at it from the perspective of the rights of children. The YouTube policy guideline on children is restricted to abusive content or content that is sexual in nature. The guidelines are not exhaustive about what kind of behaviour could be deemed violent or obscene in respect of children. There is scope to create additional check gates for such videos by bringing in the question of the rights of children.

Responding to some of the above queries by Alt News, a YouTube communications representative said the platform’s responsibility efforts were focused on four pillars: removing violative content, raising up authoritative content, reducing the spread of borderline content and rewarding trusted creators. More than 20,000 people around the world, including those with Indian language expertise, work to review and remove content that violates our policies, they added.

They also made the point that raising authoritative information was as important for the platform as removing violative content, and improving the platform to prevent the spread of harmful misinformation was a continuous process.

Recently, YouTube has flagged some gory videos involving children as inappropriate for some users. They are either unavailable or carry the warning that it is inappropriate for some users. Here are a few links to some of these videos: 1, 2, 3, 4, 5

Sample Videos

Most instances of child kidnapping rumours have a trend or pattern in terms of public perception. For example, the kind of people being profiled, the nature of public behaviour that would tantamount to suspicious activity, etc. The video below suggests how a child trafficker looks like. It creates the image of a person in tattered clothes or someone dealing with scraps, as a potential abductor. The disclaimer is posted at the beginning of the video and the text is in English, not necessarily the preferred language of the audience. The video was uploaded in 2019 and has garnered over 12 million views.

In the the second video (below), youngsters run amok with weapons to catch abductors. The disclaimer mentions the purpose of the video is entertainment. The feature image has two scary looking men stabbing a child. How does such an image come under the purview of entertainment? The video shows a group of armed youngsters taking law into their own hands. The channel ‘The Three Bro’ has over 3,34,000 subscribers  and in one year, this video has gathered over 29 million views.

In the following video, the imagery is disturbing. Weapons are brandished to rip open children. There is a message in the end asking people to be wary of house guests. Such commentary is problematic in rural areas where visitors often rely on local hospitality. With more than 2,52,000 subscribers, the channel ‘Bihari Babu Entertainment’ has managed 2.7 million viewers in about a year.

There are several channels that have multiple videos on child kidnapping, claiming to make people aware. There does not seem to be any justification behind these videos other than monetizing content with wider reach.

The channel ‘Arvind Singh Gopalganj’ has couple of videos on kidney racket vis-a-vis child trafficking. In the video below, it is claimed to be an awareness video on such instances. The question is, does the channel need several such disturbing videos to raise awareness on the same topic? The video has had over 3,57,000 views in one year. A common theme in the messages is how the video is based on reports of kidney racket and child trafficking, and the public should scrutinize mendicants or similar loiterers before taking action.

The channel ‘psy film production’ has 1,48,000 subscribers. It has several such violent videos on child abduction, but passes its content as comedy. The video below has neither a disclaimer nor a message. It is gory, fear-inducing and disruptive. Underneath, there is also a slideshow of disturbing feature images from the videos of this channel.

 

Click to view slideshow.

 

There is this Youtube shorts shot to look like a live incident. There is neither a disclaimer nor message. People in the comments section call for police intervention. However, the video is clearly scripted. It violates the condition of context necessary for videos like these as per the guidelines. There are just a bunch of people in the middle of nowhere.

There are stock images of mendicants which profile individuals according to religious community, sometimes a Muslim and at times a Hindu.

The channel PBC entertainment, with 3,17,000 subscribers, has several gory imagery in its content on child kidnapping. Some of the videos have millions of views. Below is the screenshot of multiple videos from this channel. There are disclaimers given.

Similarly, there are videos where a hawker on a cycle is beaten up. The same channel ‘Jhamaru Mahato Comedy’ has a couple of videos on kidney racketeering and child abduction. The FIs are visually disturbing and should be taken down immediately. Below is a screenshot. The viewership of these videos is often in millions.

Here are a couple of videos with highly disturbing visuals.

 

Both the above channels, ‘Bhadohi ka Lavanda‘ and ‘SD Vines‘ have a couple of videos with disturbing feature images. Here are the screenshots:

Click to view slideshow.

The channel ‘Comedian Guru‘ also has several gory videos. One of them carries a disturbing image of man apparently taking organs out of a child. Channel UP STAR Channel and ‘Desi Lover‘, too, use repugnant imagery in several videos on kidney racketeering and child kidnapping.

Channel Jhamaru Mahato Comedy has several disturbing content. One of the videos :

The channel ‘Bhagirath Aashiq‘ passes of as a comedy channel with violent imagery of child kidnapping. It also shows a video normalizing extra-judicial action by police.

Channel ‘Comedy Plus with Neetuarya’, with 3.36 million subscribers, is a repeat offender. The channel has highly disturbing imagery across several videos on child kidnapping. Here is one of the videos:

There is also a video wherein people are seen demanding Aadhar card from people profiled as suspicious. This also raises the issue of privacy over making identification documents public to defend oneself against a mob.

Channel ‘RS Funny‘ carries images of mutilated children over several videos to show instances of child kidnapping.

Summary of the problem at hand

The fact that so many channels – as listed above – repetitively create violent content that has proven potential to prompt public reaction and law and order problems shows the inadequacies of YouTube’s monitoring policies. These videos trigger anger and other emotional responses in the public. They normalize mob violence, extra-judicial action by the police, weapons in the hands of vigilantes, and encourage public scrutiny or surveillance on each other. The fact that some of these videos come with advertisements shows that both the platform and the content creator are financially benefiting from such content which have potential risk for causing ‘egregious harm’.

There is no transparency on YouTube’s process of defining what it refers to as ‘authoritative information’ or how Indian language experts moderate content that violate community guidelines. The emphasis on ‘context‘ as being important to legitimize videos for advertiser-friendly content is not necessarily useful in this context. Majority of the viewers’ comments on the videos do not recommend or suggest flagging the gory content. There is a market for sensationalism and these channels seem to be taking advantage of that. The volume of viewership of some of these videos is staggering, as can be seen in the scroll shot below:

 

The post YouTube fails to moderate scripted child-kidnapping videos stoking fear and making money appeared first on Alt News.


This content originally appeared on Alt News and was authored by Mahaprajna Nayak.

]]>
https://www.radiofree.org/2022/11/11/youtube-fails-to-moderate-scripted-child-kidnapping-videos-stoking-fear-and-making-money/feed/ 0 349816
How the FCC Shields Cellphone Companies From Safety Concerns https://www.radiofree.org/2022/11/10/how-the-fcc-shields-cellphone-companies-from-safety-concerns/ https://www.radiofree.org/2022/11/10/how-the-fcc-shields-cellphone-companies-from-safety-concerns/#respond Thu, 10 Nov 2022 10:00:00 +0000 https://www.propublica.org/article/fcc-5g-wireless-safety-cellphones-risk by Peter Elkind

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

The health complaints started rolling in within weeks of the activation of a new cellphone tower in August 2020 in Pittsfield, an old factory town in Massachusetts’ Berkshire Mountains. Seventeen residents reported headaches, dizziness, insomnia or confusion. A few children had to sleep with “vomit buckets” by their beds.

Like many people, Bobbie Orsi had never paid close attention to questions about the health effects of cellphone technology. She mostly viewed it as an issue that had long ago been put to rest. But after becoming the chair of Pittsfield’s Board of Health as the complaints emerged, Orsi, a 66-year-old registered nurse who had spent much of her career in public health, decided to educate herself. She combed through a stack of research studies. She watched webinars. She grilled a dozen scientists and doctors.

Over several months, Orsi went from curious, to concerned, to convinced, first, that radio-frequency emissions from Verizon’s 115-foot 4G tower were to blame for the problems in Pittsfield, and second, that growing evidence of harm from cellphones — everything from effects on fertility and fetal development to associations with cancer — has been downplayed in the United States.

Orsi and the Pittsfield board decided to try to do something about Verizon’s tower. They quickly discovered that they would get no help from federal regulators. The Federal Communications Commission, which has responsibility for protecting Americans from potential radiation hazards generated by wireless transmitters and cellphones, has repeatedly sided with the telecom industry in denying the possibility of virtually any human harm.

Worse, from Orsi’s perspective, federal law and FCC rules are so aligned with the industry that state and local governments are barred from taking action to block cell towers to protect the health of their citizens, even as companies are explicitly empowered to sue any government that tries to take such an action. It turned out that Verizon, in such matters, has more legal rights than the people of Pittsfield.

Still, the lawyers for Orsi and her colleagues thought they saw a long-shot legal opening: They would argue that the FCC’s exclusive oversight role applied only to approving cell tower sites, not to health problems triggered after one was built and its transmitters switched on. In April 2022, the Pittsfield Health Board issued an emergency cease-and-desist order directing Verizon to shut down the tower as a “public nuisance” and “cause of sickness” that “renders dwellings unfit for human habitation.” (Several families had abandoned their homes.) The order was the first of its kind in the country. It was, Orsi said, “a gutsy move — maybe naively gutsy.”

The Board of Health in Pittsfield, Massachusetts, tried to fight Verizon over a 4G tower. (Patrick Dodson for ProPublica)

Almost as quickly as the battle began, it ended. On May 10, Verizon sued the city in federal court. The company contended that the Pittsfield residents’ medical complaints were bogus. And, in any case, Verizon argued, the cease-and-desist order was barred because federal law gave the FCC the sole power to regulate wireless-radiation risks. Fearing a hopeless and costly David-and-Goliath battle, Pittsfield’s City Council refused to fund the fight. A month later, the Board of Health withdrew its cease-and-desist order.

But it was a signal of a growing fear — other cities have fought cell sites only to be forced to back down — and evidence of a striking shoulder-to-shoulder partnership between a federal agency and the industry it is supposed to regulate. The build-out of a new generation of wireless networks, known as 5G, is amping up the stakes of this conflict for localities across America. It will require an estimated 800,000 new base stations, including both towers and densely spaced “small cell” transmitters mounted on rooftops and street poles. That means nearly tripling the current number of transmitters, and many of them will be placed close to houses and apartments.

The FCC has held firm to its position that there’s no reason for concern. In a statement for this article, a spokesperson said the agency “takes safety issues very seriously” but declined to make officials available for on-the-record interviews.

The FCC is an improbable organization to serve the role of protecting humans. It specializes in technical issues that make the communications system function, not in health and safety. “At the FCC, they feel like this is really not their problem,” said Edwin Mantiply, who dealt with cellphone-radiation issues before retiring from the agency four years ago. “It’s not their job to do this kind of thing. They might have a token biologist or two, but that’s not their job.” The result, Mantiply said, was that in situations where the science isn’t black and white — and it isn’t when it comes to cellphones — the agency tended to listen to the telecom industry, which vehemently insists that cellphones are safe. “They don’t really want to deal with uncertainty,” Mantiply said of the FCC.

In the view of Mantiply and a rising number of scientists, there’s more than enough evidence about cellphone risks to be concerned — and some of the strongest evidence comes from the federal government itself. In 2018, a massive, nearly-two-decade study by the National Toxicology Program, part of the National Institutes of Health, found “clear evidence” that cellphone radiation caused cancer in lab animals. “We’re really in the middle of a paradigm shift,” said Linda Birnbaum, who was director of the NTP until 2019. It’s no longer right to assume cellphones are safe, she said. “Protective policy is needed today. We really don’t need more science to know that we should be reducing exposures.”

The FCC rejected the need for any such action when it reviewed its standards on cellphone radiation in 2019. The agency decided it would continue to rely on exposure limits it established in 1996, when Motorola’s StarTAC flip phone was considered cutting edge.

The Motorola StarTAC flip phone was considered cutting edge in 1996 when the Federal Communications Commission established exposure limits for cellphones. The agency has not updated those limits since. (SSPL/Getty Images)

The way the FCC went about reexamining its standards so dismayed a federal appeals court that, in 2021, it excoriated the agency for what it called a “cursory analysis.” The court accused it of “brushing off” evidence of potential harm and failing to explain its reasoning. The agency’s “silence,” the court said, left unclear whether the government even “considered any of the evidence in the record.” The appeals court ordered the agency to revisit the adequacy of its safeguards.

All this has left Orsi frustrated. Petite and intense, she has been through these sorts of fights before. Years ago, with the eventual support of the Environmental Protection Agency, she helped push General Electric to clean up the toxic chemicals it had dumped in Pittsfield.

Now she feels powerless. “The Board of Health has a mandate to protect the citizens of Pittsfield,” she said. “But the bottom line is the FCC has made it impossible for us to do anything. If a company can come in and do something to make people sick, and the Board of Health has no authority to act, that’s ludicrous.”

Bobbie Orsi, the chair of Pittsfield’s Board of Health, combed through research studies and grilled scientists to educate herself on the risks of cellphone technology. (Patrick Dodson for ProPublica)

To see how completely the U.S. telecom industry has prevailed in the rhetorical war over cellphone safety so far, consider this example. In February 2019, near the end of a hearing largely devoted to extolling the wonders of 5G technology, Sen. Richard Blumenthal, D-Conn., asked representatives of two wireless industry trade groups what sort of research the industry was funding on the biological effects of 5G, which remains largely untested. “There are no industry-backed studies, to my knowledge, right now,” replied Brad Gillen of the CTIA (originally called the Cellular Telecommunications Industry Association). “I’m not aware of any,” replied Steve Berry of the Competitive Carriers Association.

Wireless companies maintain that cellphones and base stations operating within the FCC’s exposure limits pose no proven risk. A CTIA spokesperson wrote in a statement, “The consensus of the international scientific community is that radiofrequency energy from wireless devices and networks, including 5G, has not been shown to cause health problems.” Included in that list was the National Cancer Institute. The spokesperson also said the industry is in favor of additional science. (Verizon itself declined to comment on the record for this article.)

In a September 2021 meeting with Pittsfield’s Board of Health, for example, Verizon’s chief expert was a University of Pittsburgh theoretical physics professor named Eric Swanson. He testified that wireless radiation is far too weak to cause cancer or any of the problems the Pittsfield residents were reporting. He suggested they have psychological problems.

Fears of radio-frequency radiation, Swanson declared in the videotaped meeting, are based entirely on “fringe opinion,” backed only by cherry-picked evidence. Swanson said he’d spotted one such study on “an Alex Jones website” and voiced exasperation: “This is the kind of stuff I have to deal with.” Concerns about wireless radiation, he said, are at odds with the overwhelming scientific consensus. “All international bodies,” he said, “declare cellphones to be safe.”

The FCC has been similarly scornful. In a June 2020 Washington Post op-ed, Thomas Johnson, general counsel for the agency during the administration of President Donald Trump, wrote: “Conjectures about 5G’s effect on human health are long on panic and short on science.” Johnson has since decamped to a law firm that represents telecom companies. (Johnson declined requests for comment.)

Signs in Pittsfield denounce the Verizon cell tower. (Patrick Dodson for ProPublica)

“It’s a slog at the moment to convince people this isn’t just crazy stuff,” said Louis Slesin, an MIT-trained environmental policy Ph.D. and the editor of Microwave News, an industry newsletter that has chronicled the wireless-radiation debate for four decades. “This is part of the organized campaign to devalue the science, with the government as a co-conspirator. The other really important factor is nobody wants to hear this because everybody loves the technology. If you shut down people’s phones, the country would come to a stop.”

But a growing body of international research asserts that there is reason to worry about harms — many of them unrelated to cancer — from wireless radiation. Henry Lai, an emeritus professor of bioengineering at the University of Washington, has compiled a database of 1,123 peer-reviewed studies published since 1990 investigating biological effects from wireless-radiation exposure. Some 77% have found “significant” effects, according to Lai. By contrast, an earlier review by Lai found that 72% of industry-sponsored studies reported no biological effects.

One branch of research has studied radiation impacts on test animals, mostly rats and mice, but also guinea pigs, rabbits and cows. Another has examined epidemiological patterns, looking for health effects on human groups, such as heavy long-term cellphone users or people living near cellphone towers. Studies have found impacts on fertility, fetal development, DNA, memory function and the nervous system, as well as an association with an array of cancers. Several investigations reported a significantly increased risk of brain tumors, called gliomas, among the heaviest cellphone users. And the International Agency for Research on Cancer, an arm of the World Health Organization, in 2011 classified wireless radiation as “possibly carcinogenic to humans.”

Individual studies underline the value of simple precautions, which include using a headset or speaker and keeping the phone away from direct contact with your body. In 2009, Ashok Agarwal, director of research at the Cleveland Clinic’s American Center for Reproductive Medicine, found that exposing human semen to cellphone radiation for an hour caused a “significant decrease” in sperm motility and viability, impairing male fertility. He advises patients to avoid carrying phones in their pants pockets.

Epidemiological studies show a rise in behavioral disorders among children whose mothers were heavy cellphone users while pregnant, while lab research found hyperactivity and reduced memory in mice exposed in the womb to cellphone radiation. “The evidence is really, really strong now that there is a causal relationship between cellphone radiation exposure and behavior issues in children,” said Dr. Hugh Taylor, a professor of obstetrics and gynecology at the Yale School of Medicine and past president of the American Society for Reproductive Medicine. The period of fetal brain development is a “very vulnerable time,” he said.

The American Academy of Pediatrics has written that the FCC’s safeguards “do not account for the unique vulnerability and use patterns specific to pregnant women and children.” It urged the agency to adopt measures “protective of children,” warning that their thinner skulls leave them “disproportionately impacted” by cellphone radiation, and called for better consumer disclosure about exposure risks.

Both the FCC and Food and Drug Administration websites dismiss the existence of any special health risk to children. And the agencies don’t counsel people to limit their exposure. Instead they list safety steps, while insisting they’re really not necessary. The FCC’s “Wireless Devices and Health Concerns” page, for example, notes that “some parties” recommend safety measures, “even though no scientific evidence currently establishes a definitive link between wireless device use and cancer or other illnesses.” It then states, in bold: “The FCC does not endorse the need for these practices.” Only then does it list “some simple steps that you can take to reduce your exposure” to radio-frequency energy from cellphones.

Efforts in the U.S. to promote awareness of wireless-radiation risks have sparked fierce industry resistance. In 2014, the CDC added this modest language to its website: “Along with many organizations worldwide, we recommend caution in cellphone use.” An influential industry consultant emailed the CDC within days, as a public-records request later revealed, complaining that “changes are truly needed” in the CDC’s language. The agency quickly softened its warning, which now says: “Some organizations recommend caution in cellphone use.”

The industry’s main trade group, CTIA, has beaten back local consumer-disclosure measures. For example, in 2015, CTIA sued Berkeley, California, after its City Council passed an ordinance requiring retailers to post a safety notice warning customers that carrying a cellphone tucked in a pocket or bra might expose them to excessive radiation. (This was based on FCC guidelines, typically buried in small-print information included with new phones, that phones shouldn’t be kept in direct contact with the head or body.) A five-year legal battle, including a trip to the U.S. Supreme Court, ensued. It ended after the FCC weighed in, saying the ordinance interfered with its exclusive authority by “over-warning” consumers and frightening them “into believing that RF emissions from FCC-certified cellphones are unsafe.” With that, the judge ruled against the city.

“The industry doesn’t want you to pay any attention to that stuff because that just creates anxiety among users,” said Joel Moskowitz, director of the Center for Family and Community Health at the University of California-Berkeley, who advised the city in its fight. “They want you to think these devices are perfectly safe.”

By contrast, more than 20 foreign governments have adopted protective measures or recommended precautions. France requires new phones to be sold with headsets and written guidance on limiting radiation exposures; it also bans phones marketed to small children and ads aimed at anyone younger than 14. Greece and Switzerland routinely monitor radio-frequency radiation levels throughout the country. Britain, Canada, Finland, Germany, Italy, India and South Korea urge citizens to limit both their own exposure and cellphone use by children. The European Environment Agency does too, noting: “There is sufficient evidence of risk to advise people, especially children, not to place the handset against their heads.”

When the FCC’s rules on radio-frequency emissions from phones and transmitters were adopted 26 years ago, just 1 in 6 Americans owned cellphones, which they typically used for short periods. Today, 97% of adults own a cellphone, and they use the device for an average of five hours a day. More than half of children under 12 own a smartphone.

Then and now, the FCC’s rules targeted just one health hazard: the possibility that wireless radiation can cause immediate “thermal” damage, by overheating skin the way a microwave oven heats food. Most experts agree that risk is nonexistent under any but the most unusual circumstances.

Meanwhile, the FCC doesn’t even consider “biological” impacts: the possibility that wireless exposure, even at levels well below the FCC limits, can cause an array of human health problems, as well as harm to animals and the environment. The FCC’s approach matches the industry’s long-standing position: that wireless radiation is simply too weak to cause any nonheating damage.

Of course, the wireless industry has every incentive to take this position. Going back to the 1990s, the industry has recognized the financial peril posed by health concerns over radiation, and it has pressed the public and government to reject them altogether.

In 1994, for example, Motorola swung into action when it learned of troubling research by Lai and a University of Washington colleague, Narendra Singh, who found that two hours of exposure to modest levels of wireless radiation damaged DNA in the brains of lab rats. Such changes can lead to cancerous tumors.

Motorola’s then-PR chief described a strategy to discredit the findings in a pair of memos that were later leaked to Microwave News. Motorola’s approach would serve as a template for the industry’s response to troublesome research over the three decades that followed. The researchers’ methodology would be challenged for raising “too many uncertainties” to justify any conclusions. The scientists’ credibility would be questioned and their findings dismissed as irrelevant. Finally, friendly academics, “willing and able to reassure the public on these matters,” would be recruited to rebut the findings. (At the time, Motorola defended its conduct as the “essence of sound science and corporate responsibility” and affirmed that there was “a sound scientific basis for public confidence in the safety of cellular telephones.”)

Doubters in the government would be neutralized too. As the FCC moved toward adopting wireless-radiation limits in 1996, EPA officials, whose experts had conducted the most extensive government research on wireless-radiation risk, affirmed their concern about possible biological harm in a presentation to the FCC. They urged the FCC to follow a two-stage strategy: to meet a looming congressional deadline by first setting interim limits covering known thermal effects; then to commission a group of experts to study biological risks and develop permanent exposure guidelines.

But the FCC never pursued “Phase 2.” Instead, just months later, Congress completed a multiyear defunding of the EPA’s wireless-radiation group, sidelining the agency from researching the issue. This left most independent study of the issue to scientists in other countries. At the EPA, a lone radio-frequency radiation expert named Norbert Hankin remained, periodically rankling the wireless industry by publicly rebutting “the generalization by many that the [FCC] guidelines protect human beings from harm by any or all mechanisms.”

Going forward, the FCC, which has no in-house health or medical expertise of its own, would increasingly rely on the FDA and industry-influenced technical organizations. (The FDA itself has collaborated with the CTIA, the wireless industry trade group, to study cellphone safety. That research found “no association” between exposure to “cell phones and adverse health effects.”)

Still, there was enough concern among government scientists from multiple agencies that, in 1999, the FDA asked the NTP to “assess the risk to human health.” The NTP conducts detailed lab studies, typically on rodents, to evaluate environmental hazards. Its findings, widely regarded as the gold standard for toxicology work, routinely prompt federal public-health actions.

The FDA requested that the NTP conduct its own animal experiments, which were “crucial” to assess cancer risk because of the long delay between human exposure to a carcinogen and a tumor diagnosis. As an FDA memo put it, “There is currently insufficient scientific basis for concluding either that wireless communication technologies are safe or that they pose a risk to millions of users.”

The NTP study was the biggest the agency had ever conducted and lasted over a decade. It used an unusually large number of rats and mice — some 3,000 — and involved both setting up a lab in Chicago and designing and constructing special radiation-exposure chambers for the rodents in Switzerland. The final report was released in November 2018.

The results were dramatic. The study found “clear evidence” of rare cancerous heart tumors, called schwannomas, in male rats; “some evidence” of tumors in their brains and adrenal glands; and signs of DNA damage. The percentage that developed tumors was small, but, as the study’s authors noted earlier, “Given the extremely large number of people who use wireless communication devices, even a very small increase in the incidence of disease resulting from exposure” could have “broad implications for public health.”

The federal government’s scientists had spoken. But the parts of the government charged with following the science and protecting people responded (in the case of the FCC) by publicly ignoring the results or (in the case of the FDA) pooh-poohing them. The study changed nothing, said Dr. Jeffrey Shuren, director of the FDA’s Center for Devices and Radiological Health, and the chief official advising the FCC on wireless issues, in a statement at the time of the study’s release. Shuren disputed several key findings and asserted that the study “was not designed to test the safety of cellphone use in humans,” even though his own agency had commissioned it specifically for that reason. He added: “We believe the existing safety limits for cellphones remain acceptable for protecting the public health.” (An FDA spokesperson said Shuren declined to comment.)

The NTP findings, combined with similar results that year from the Ramazzini research institute in Italy and other studies, demanded a strong response, according to three long-time former government experts who spoke to ProPublica. “It should have been the game-changer,” added Moskowitz, the Berkeley public-health researcher.

The former government officials believe the NTP findings should have led to a detailed statistical risk assessment by federal health agencies, spelling out the possible incidence of cancer in the general population; development of stricter FCC limits to address biological risks; prominent user warnings detailing simple steps people should take to minimize their exposure; and dramatically increased research funding.

None of that happened. “Their conclusion was, ‘Oh, there was nothing going on,’” said Birnbaum, the NTP’s then-director and a toxicologist. “Many of us found that very hard to believe.”

Today Birnbaum, who retired in 2019 after 40 years with government health agencies, is tempered in her assessment of the evidence. “Do I see a smoking gun? Not per se. But do I see smoke? Absolutely. There’s enough data now to say that things can happen.” Birnbaum said the NTP results should have triggered a consumer advisory akin to “the black-box warning on a drug, to say this has been associated to possibly cause cancer.”

Even as the NTP study was happening, the FCC in 2013 had been prodded by a Government Accountability Office report to review its radio-frequency exposure limit, unchanged since 1996. “We recognize that a great deal of scientific research has been completed in recent years and new research is currently underway, warranting a comprehensive examination,” the FCC wrote, in opening its inquiry.

Over the six years that followed, 1,200 comments poured into the FCC’s docket, including scores of studies (and a briefing on the NTP findings); appeals for stronger protections signed by hundreds of international scientists; and 170 personal accounts of “electro-sensitivity” radiation sickness, similar to the complaints in Pittsfield, resulting from neighborhood cell towers. An Interior Department letter voiced concern about the impact of radiation from towers on migrating birds, noting that the FCC’s limits “continue to be based on thermal heating, a criterion now nearly 30 years out of date and inapplicable today.”

The FCC was overwhelmed by the flood of comments, according to Mantiply, the agency official most involved in radio-frequency issues during this period. “We didn’t have the resources to even read all the comments,” he told ProPublica.

Edwin Mantiply, a former FCC official, thought the agency was ignoring the issue of cellphone risk. (Greg Kahn, special to ProPublica)

Mantiply thought higher-ups were ignoring the issue. “There was really nothing being done on it,” he said. “The inquiry was just on a back burner, and the back burner was turned off.” So Mantiply, a soft-spoken physical scientist, decided to take action. In 2017, as the FCC’s review of its wireless standards entered its fourth year, he said, he and three colleagues proposed hiring an outside consulting firm to conduct an environmental assessment, a detailed formal examination, of the submissions on the radiation safety limits. But their boss, Julius Knapp, the head of the FCC’s Office of Engineering and Technology, summarily rejected the proposal, according to Mantiply. “He said, ‘No, we’re not going to do that.’ He let us know in no uncertain terms. He just rejected it in a single meeting.”

(Knapp, who is now retired, declined to comment on the record. FCC officials, through a spokesperson, declined requests to discuss the matter. Former FCC engineer Walter Johnston, one of the colleagues Mantiply identified as backing his proposal, said he didn’t remember it ever being presented as a “formal recommendation.”)

Mantiply’s proposal came at a time when the Trump White House and FCC commissioners were aggressively promoting 5G. FCC leadership was “not really thrilled with us pushing these inquiries,” Mantiply said. “They just felt like it’d get a lot of attention, that it would be in The Washington Post.”

On his final day at the FCC in August 2018, as he was retiring after 42 years in government, Mantiply raised the issue with FCC Commissioner Jessica Rosenworcel during a brief courtesy visit. “Don’t dismiss all this stuff because you’re hearing from industry, and they’re dismissing it,” Mantiply told her. “There’s uncertainty, and we don’t know what’s going on. It’s a very, very difficult problem.” Rosenworcel, he said, listened politely.

Fifteen months later, the FCC voted unanimously to shut down its review after six years. There was no need to change anything, the commissioners concluded. After examining the record, the FCC declared in a written order, it had seen no evidence that the science underlying its standards was “outdated or insufficient to protect human safety.”

The U.S. Court of Appeals in Washington, D.C., disagreed. Responding to a pair of lawsuits filed by the Environmental Health Trust and other activist groups, the court ruled in August 2021 that the FCC had failed to meet “even the low threshold of reasoned analysis” in finding that its limits “adequately protect against the harmful effects of exposure to radiofrequency radiation unrelated to cancer.” (The FCC had responded sufficiently to fears that wireless radiation causes cancer, the judges wrote.)

It was a striking rebuke, given the judiciary’s practice of offering agency decisions a high degree of deference, especially on technical matters. The court wrote that it was taking “no position in the scientific debate” on wireless radiation’s effects, but it was scornful of the FCC’s heavy reliance on three “conclusory” statements from the FDA about safety. In oral argument, one judge also challenged the FCC’s claim that an interagency working group was closely monitoring concerns about wireless exposure on the FCC’s behalf; in fact, the group hadn’t met since 2018.

The FCC’s actions, the court wrote, waved off any concern about protections for children and ignored “substantive evidence of potential environmental harms.” And the FCC had said nothing about the potential impacts of the many technological changes, including 5G, that had taken place since 1996. “Ultimately,” the court wrote, “the Commission’s order remains bereft of any explanation as to why, in light of the studies in the record, its guidelines remain adequate.”

With that, the court sent the issue back to the FCC, for either a fresh review of its 26-year-old standard or better explanations to justify it. In the 15 months since, the FCC, now led by Rosenworcel, who was elevated by President Joe Biden, has taken no formal action.

In its statement to ProPublica, the FCC said it is exploring “next steps” with its “federal partners.” However, the FDA, the FCC’s chief partner on health concerns, said in its own statement that it is not currently working with the FCC on any response to the court ruling. There’s been no visible sign of any preliminary FCC steps, according to four lawyers and representatives of the environmental groups that brought the court challenge.

In the past few years, with the appearance of more neighborhood cell towers and transmitters, pressure has begun to rise on this issue beyond environmental groups, longtime activists and officials in liberal jurisdictions. In November 2020, a bipartisan state commission in New Hampshire charged with investigating 5G issued a detailed report concluding that wireless radiation “poses a significant threat to human health and the environment.” Among its recommendations: that all new cell towers be at least 1,640 feet (500 meters) from any residence, school or business. And in April, Mark Gordon, the Republican governor of Wyoming, wrote to Rosenworcel, urging the agency to reexamine its radiation limits based on “current scientific research” to make sure “the health and safety of our citizens is prioritized.”

In Pittsfield, Orsi and her colleagues on the board have grown resigned to their inability to take action against Verizon. Reactions have varied around town. One group of affected neighbors is waging its own separate long-shot legal battle with the company. Others are coping with dark humor. Before Halloween, the local daily suggested dressing up as a cellphone tower to “strike fear in the heart of your neighbors.” Nobody in Pittsfield is holding out hope that the federal government will intervene.

“It’s very natural for the FCC to listen to the industry,” said Mantiply, the former agency staffer. “That’s their audience and who they deal with most of the time.” But, he added, “They’re answering to industry more than anything.”

Do You Work for the Federal Government? ProPublica Wants to Hear From You.

Doris Burke contributed research.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Peter Elkind.

]]>
https://www.radiofree.org/2022/11/10/how-the-fcc-shields-cellphone-companies-from-safety-concerns/feed/ 0 349591
An Uber Millionaire Wants You to Vote on the Internet — Despite the Inherent Vulnerabilities https://www.radiofree.org/2022/11/04/an-uber-millionaire-wants-you-to-vote-on-the-internet-despite-the-inherent-vulnerabilities/ https://www.radiofree.org/2022/11/04/an-uber-millionaire-wants-you-to-vote-on-the-internet-despite-the-inherent-vulnerabilities/#respond Fri, 04 Nov 2022 12:00:08 +0000 https://theintercept.com/?p=413147

In the fall of 2010, the District of Columbia was preparing to do something bold: allow overseas voters to cast their ballots online. A few weeks ahead of the November general election, it conducted a mock internet election and invited the public to try and hack the system. Within a few days, computer scientists at the University of Michigan had gained near complete control of the election server.

The team took control of webcams mounted inside the server room that housed the pilot, used login information to match specific ballots to specific voters, and changed not just votes that had been cast, but also ones that would be. “There is little hope for protecting future ballots from this level of compromise, since the code that processes the ballots is itself suspect,” the team wrote in a follow-up paper.

Afterward, D.C. officials confirmed that they had failed to see the attacks in their intrusion detection system logs, didn’t detect their presence in the network equipment, and only realized what had happened after seeing the group’s calling card: the University of Michigan fight song playing on the “Thank You” page that appeared after voting.

Technology has improved significantly since 2010, but internet voting presents a unique challenge. With paper, voters can verify that their ballot is correct before they mail it or insert it into a scanner. Once that ballot is tabulated, there’s no way to connect it back to the voter. It is irretrievable. When you cast a vote electronically, how do you ensure that the ballot the election office receives is the same ballot that you submitted — while also maintaining anonymity, producing an independent paper trail, allowing for some way to audit the results, providing publicly verifiable evidence if errors are detected, and ensuring that candidates can contest the results?

“No currently known technology—including blockchain—is close to enabling mobile or Internet voting systems to simultaneously achieve of all these requirements,” researchers from MIT wrote in a 2021 peer-reviewed paper titled “Going from bad to worse: from Internet voting to blockchain voting.”

The year of the D.C. meltdown, Brooke Pinto wasn’t yet living in the District. But after becoming the youngest-ever D.C. councilmember in 2020, she began working on one of the most expansive mobile voting bills in the country.

Allowing any eligible voter to cast a ballot using an internet-connected device, Pinto has claimed, would make voting more accessible, especially for voters of color, those with disabilities, and older adults. It could also raise the chronically low turnout rates in the District: 28 percent for the 2020 primary and around 67 percent for that year’s general, a little lower than the national average.

Pinto had no formal experience in voting or technology, but she said constituents had talked about it during her campaign. According to emails obtained through a public records request, in July 2021 her brother introduced her to Bradley Tusk, a venture capitalist who made millions from stock and options received from his work at Uber.

Tusk has poured money into a nonprofit and lobbying apparatus dedicated to pushing internet voting nationwide. His organization, Mobile Voting, has already conducted 21 internet voting pilots in seven states, and Tusk Philanthropies, which also works to combat food insecurity, has registered lobbyists in at least 12 states and Washington, D.C. Last year, Tusk Philanthropies announced a $10 million grant program to fund the development of a new internet-based voting system, according to NPR, in the hopes that every American will have the option to vote electronically by 2028.

His crusade could not come at a more perilous time for American democracy. Trust in the system is historically low, disinformation around voting technology is especially rampant, and many lawmakers are already suspicious of private companies providing any kind of assistance to election offices, which continue to be chronically underfunded.

After Pinto signaled her interest in pushing internet voting, Tusk’s team, including his organization’s D.C. lobbyist, Max Brown of Group 360, commissioned a public poll on the issue, rallied support from prominent civil rights groups like the NAACP, connected Pinto with experts, and helped draft the legislation and an op-ed in support of it.

Tusk argues that, because only extreme idealogues vote in their party primaries, politicians have no incentive to compromise, fueling hyperpartisanship and gridlock. But if we made voting significantly more convenient, he says, it would dramatically increase turnout and make policy more representative. “This is the only way to change the political inputs,” he wrote in a blog post earlier this year. “This is the only way to stop mass shootings, to come up with solutions to problems ranging from immigration to opioids, health care to education, climate change to infrastructure.”

However, assuming the technology is perfectly secure, there’s a problem. The foundation of Tusk’s argument — that internet voting will “exponentially” increase turnout — is contradicted by mountains of evidence, including research he’s funded. Even one of Tusk’s own grantees has spoken out against the bill.

None of this has dissuaded Tusk. “Short of committing a crime,” he’s said, there’s “nothing unethical about anything I could possibly do to try to make mobile voting happen.”

Bradley Tusk, chief executive officer and founder of Tusk Ventures Ltd., listens during the Power of Data: Sooner Than You Think global technology conference in the Brooklyn borough of New York, U.S., on Wednesday, Oct. 30, 2019. The event convenes leaders on the front lines taking action to move the technology industry forward. Photographer Cate Dingley/Bloomberg via Getty Images

Bradley Tusk attends a conference in the Brooklyn, N.Y., on Oct. 30, 2019.

Photo: Cate Dingley/Bloomberg via Getty Images

Mobile Voting declined to grant interviews for this story, and much of the information about its programs is available only through open records requests (or is not public at all). And Tusk’s philanthropic and venture capital arms did not respond to a request for comment.

Even when organizations providing funding around elections do disclose, trust is hard to come by. In the run-up to the 2020 presidential election, Facebook CEO Mark Zuckerberg and his wife, Dr. Priscilla Chan, donated $400 million to the Center for Tech and Civic Life. The money was meant to help election offices respond to the pandemic, every eligible jurisdiction that applied for a grant received one, and the company later published a copy of its tax form listing all of the funds it had distributed. Still, Republicans accused the tech billionaire of conspiring to bribe election officials and steal votes, with one Republican congresswoman decrying that the “liberal non-profit group flooded left-leaning counties … with opaque private funding to increase voter turnout.”

Described by Fast Company as “Silicon Valley’s political savior,” Tusk served as communications director for Sen. Chuck Schumer, D-N.Y., from 2000 to 2002; was deputy governor of Illinois from 2003 to 2006; and managed Michael Bloomberg’s 2009 campaign for a third term as mayor of New York City.

In 2011, he became Uber’s first political adviser and worked until 2015 to expand ride-hailing in major cities across the country. When he left the company, he owned what some reports estimated as $100 million in stock. Over the past 15 years, he’s personally donated at least $359,000 to Democratic candidates (and at least $25,000 to Republican ones), according to FollowTheMoney.org.

In 2015, he founded Tusk Ventures, a venture capital fund that primarily invests in startups in highly regulated industries, like gambling, cannabis, and insurance. A year later, he launched Tusk Philanthropies, which supports Mobile Voting and mimics the playbook that Tusk developed while at Uber.

When discussing a major election nonprofit that advocates for handmarked paper ballots, Tusk said on his podcast, “You know what paper ballots got us? Bush v. Gore. You know what that got us? The Iraq War. You know what that got us? Hundreds of thousands of people killed for no reason. My voting technology’s never killed a single person. Theirs has killed hundreds of thousands.”

Tusk also frames opposition as proof that he’s succeeding. “It probably goes without saying that those who like things the way they are—in other words, every current politician, interest group, union, major donors, and anyone else who has no interest in making it easier for people to challenge their power—will raise a host of objections to mobile voting,” Tusk wrote in his 2018 book, “The Fixer.” Regardless of what opponents say about security or practicality, he suggests, they’re really just afraid of the competition.

And it also means growing more quickly than even proponents would advise. Chris Walker is the clerk for Jackson County, Oregon, one of the places that has partnered with Mobile Voting to offer internet voting for military and overseas voters. Walker loves the system and wishes the state would expand its use to other groups, including voters with disabilities, victims of natural disasters, first responders, and out-of-state voters. But it’s imperative that the process move slowly, she said recently.

“Should it be mainstream right now? Absolutely not, I don’t think we’re ready for that.”

In 1999, at the height of the dot-com boom, California’s secretary of state convened a task force to study the possibility of voting online. “We went in assuming that the idea was, ‘Well, what’s the best way to bring internet building to the people of California?’” says David Jefferson, who was chair of the technical issues committee and has advised five successive Californian secretaries of state on technology-related issues. “I realized that there were profound security problems,” he says. “Not only that, but there were not going to be any solutions to them. … They were unsolvable.”

Still, Mobile Voting is trying to solve them by developing its own digital absentee voting system. On its website, Mobile Voting says that the system is based on the requirements identified by the U.S. Vote Foundation, and it links to a 2015 report to which Jefferson contributed. He says he’s unimpressed by what he’s seen from Mobile Voting so far. “There is nothing on that site but prose — no technical specs at all — not even a cartoon architectural diagram,” he wrote in an email.

Beyond the dearth of technical details, he also raised the issue of who would own the system; have legal liability for its failures; maintain, operate, and upgrade it; and — perhaps most critically if it were to be adopted nationwide — certify it.

“There is nothing on that site but prose — no technical specs at all.”

Jefferson has worked for years to stop internet voting legislation, including a bill in California that passed the Senate in May but was later pulled down by its author. Nationwide, at least 21 internet voting-related bills were introduced this year, according to Voting Rights Lab, which documents and analyzes voting and election laws. That includes the one in D.C.

In January 2022, Councilmember Brooke Pinto’s staff started editing the D.C. internet voting bill with Jocelyn Bucaro, a former elections official who now serves as the director of the Mobile Voting project, according to the emails obtained via the Freedom of Information Act. Over the next few weeks, the two parties exchanged at least three drafts of the legislation, according to emails obtained through FOIA. Meanwhile, Pinto also received guidance from Max Brown, the $17,000-average-a-month lobbyist working on behalf of Mobile Voting, according to lobbyist reports from D.C.’s Board of Ethics and Government Accountability.

To offer feedback on the bill’s security components, Brown emailed Pinto’s legislative director with the names of three people he described as “3rd party folks unaffiliated with us” and “arms length from our advocates. One was on Mobile Voting’s Circle of Advisors. (Brown says he was told they weren’t affiliated with Mobile Voting and that he never spoke to or met any of them).

Another was Andre McGregor, a former partner at ShiftState Security. In late 2018, ShiftState conducted a security assessment of Voatz, one of the internet voting vendors that Mobile Voting has hired to provide the technology for at least one of its pilots. McGregor told Slate that the company’s technology did “very well” but did not release the company’s underlying report.

Researchers at MIT later discovered that Voatz had “vulnerabilities that allow different kinds of adversaries to alter, stop, or expose a user’s vote,” and Oregon Sen. Ron Wyden asked McGregor to explain his positive review. “Several state officials have cited your company’s audit in response to my office’s inquiries about Voatz’s security or lack thereof,” wrote Wyden. “These officials believe, reasonably so, that Voatz’s technology passed a comprehensive audit.”

ShiftState did not release the underlying report. McGregor had been a part of Mobile Voting’s Circle of Advisors, but he says his involvement with the group ended in late 2021, before Brown sent that email to Pinto’s office. After being contacted by The Intercept, McGregor says he asked Mobile Voting to remove his name from its Circle of Advisors.

The third recommendation, Donald Kersey, is general counsel to another Circle of Advisors member, West Virginia Secretary of State Mac Warner. In his email to Pinto’s legislative director, Kersey criticized the bill for being “light on procedures,” like minimum security standards, and attached spreadsheets of technical materials. However, the bill requires that the Board of Elections be the one to develop the system’s security protocols — and within 180 days of the law taking effect.

“When people ask for best practices for voting online, it’s rather like asking for best practices for driving drunk.”

Ultimately, though, the bill’s lack of specificity may not matter, says Ron Rivest, a cryptographer at MIT who co-invented one of the most widely used algorithms to securely transmit data. “When people ask for best practices for voting online, it’s rather like asking for best practices for driving drunk,” he says.

Though Pinto has cited the example of online banking to suggest that online voting is also feasible, she acknowledged to The Intercept that “there are differences, of course, between the two.” She mentioned that banks have protocols for when an account is hacked and that the stakes are different when it comes to our democracy.

There are other challenges, including remotely verifying a voter’s identity and ensuring that a voter’s device is free from malware. But perhaps the biggest challenge that Pinto failed to mention is this: Unlike applying for a passport or submitting your taxes, casting a ballot must be done anonymously — and for that reason, it can never be recovered or modified. (Even in a blockchain-based electronic voting system, which allows anonymity and security, users must still use potentially vulnerable devices and network infrastructure, meaning such a system is still susceptible to serious failures.)

“Electronic ballot return faces significant security risks to the confidentiality, integrity, and availability of voted ballots. These risks can ultimately affect the tabulation and results, and can occur at scale,” says a 2020 report from the Cybersecurity and Infrastructure Security Agency, the National Institute of Standards and Technology, the Election Assistance Commission, and the FBI.

Even a grant recipient of Tusk Philanthropies doesn’t believe the practice is safe. “For the foreseeable future iVoting solutions introduce far more risk than benefit because there remain too many technical problems to verifiably solve,” said Gregory Miller, COO and co-founder of the Open Source Election Technology Institute, or OSET, which Miller said received a two-year, $1 million grant from Tusk Philanthropies.

On its website, Mobile Voting says that OSET was awarded funding to support the development of “an open-source, end-to-end verifiable mobile voting solution for digital absentee voting.” Miller says this is not a correct characterization.

“We do not consider ourselves as a ‘partner’ in their pursuit of mobile voting,” he wrote in an email. He added, “We are not actively researching or attempting to develop any software solutions to attempt to address some of the challenging problems to iVoting.”

He then linked to an open letter he says that OSET had signed, urging the D.C. Council not to pass Pinto’s bill.

WASHINGTON, D.C. - JANUARY 2: Brooke Pinto, the council member for ward two, poses for a portrait before being sworn in as a member of the Council of the District of Columbia outside of the Wilson Building in Washington, D.C. on Saturday, January 2, 2021 (Amanda Andrade-Rhoades/For The Washington Post via Getty Images)

Brooke Pinto is sworn in as a member of the Council of the District of Columbia outside of the Wilson Building in Washington, D.C., on Jan. 2, 2021.

Photo: Amanda Andrade-Rhoades/For The Washington Post via Getty Images

On February 18, 2022, Pinto formally introduced the Mobile VOTE Act along with seven co-sponsors, a majority of the council. Its coalition of supporters would eventually include more than a dozen progressive organizations, faith groups, and racial justice nonprofits, including the D.C. chapter of the NAACP.

In April, the group demanded a public hearing for the bill, something that the chair of the committee in charge of the bill, Charles Allen, had refused to do, citing security concerns raised by experts. For Tusk, the lines were clear: Supporters of his bill, generally “people of color who really want to be able to increase access to voting,” he said on his podcast, and Allen, a “rich, white … out-of-district” member who represents “rich white people.”

Pinto, the bill’s champion, had lived in D.C. for eight years, did not vote in the District before 2020, and had only registered the year before. She was the only candidate in her ward to decline participating in the public financing program, personally contributed $45,000 to her campaign, and had the most money coming from out of state of all the candidates in her race.

During her campaign, she also boasted of being “the only candidate to have endorsements from a sitting U.S. senator and sitting U.S. congressmember,” both of which her family had reportedly donated to over the past decade. Critically, she was also endorsed by the Washington Post. “Unlike some candidates promising the sky under the banner of progressive justice,” the editorial board wrote, “she is steeped in reality and would hit the ground running with grit and smarts.”

In the 2020 primary, she won by only 379 votes — and with just 28 percent of the total. A little more than a quarter of voters turned out.

To put pressure on Allen, Pinto, Mobile Voting, and its allies framed the issue as a moral imperative. “If passed and signed into law, this expansion of voting options would represent a remarkable victory in the civil rights struggle of our day,” said Pinto and the Rev. H. Lionel Edmonds, senior pastor of the Mt. Lebanon Baptist Church, in an op-ed written in consultation with Tusk’s lobbyist, Max Brown, according to public records.

It appeared that the public was on their side. As at least one press clipping repeated, 70 percent of D.C. residents supported a mobile voting option. Mobile Voting often touts these kinds of customer satisfaction surveys, like the 100 percent of survey respondents in Denver who said that of all the methods of voting, they preferred voting on their smartphone.

“Unless you are seriously informed about the security issues, who would say no?” says David Jefferson. “It does sound like a good idea.”

Tellingly, another study found that West Virginia voters who were told that the system was secured by blockchain technology were less willing to use it again. “Maybe it tips them off to this idea that, ‘Oh right, there’s security risks here with mobile voting,” said the study’s author, Anthony Fowler, a professor in the Harris School of Public Policy at the University of Chicago.

To further vouch for the security of its pilots, Mobile Voting has also cited at least one “independent” audit conducted by the National Cybersecurity Center, a Colorado-based nonprofit established in 2016 “for cyber innovation and awareness.”

Mobile Voting has hired the NCC to manage and implement at least two of its pilot programs and paid them a fee to do so, according to memoranda of understanding obtained by open records requests. That includes a 2020 pilot in King County, Washington, which demonstrated that “with top-notch platform development, effective election official training and voter education, mobile voting can be accomplished securely,” said Forrest Senti, then director of business and government initiatives at NCC and now vice president of programs and operations — and another member of Mobile Voting’s Circle of Advisors. (The NCC did not grant an interview for this story and does not disclose its conflict of interest policy or financial statements).

In 2020, Tusk donated $40,000 to Shemia Fagan’s campaign to become Oregon’s secretary of state — the most he’s ever donated to a candidate and Fagan’s largest individual donor, according to FollowTheMoney.org. After Fagan won her race and became the state’s chief election official, a bill was introduced in the state’s legislature to create an internet voting system. The content of the legislation matched a document that Mobile Voting’s lobbyist had emailed to Pinto’s legislative director a few months earlier — and it would’ve put Fagan in charge of creating the rules around the system’s implementation.

Fagan did not support the bill, and the bill did not pass. Fagan told The Intercept her independent judgment was never compromised by Tusk’s donation and that she declined Mobile Voting’s invitation to join its Circle of Advisors, saying she wanted to focus instead on restoring trust in vote by mail. As for her position on internet voting, she says she did meet with representatives from Mobile Voting. “Ultimately, they could not refute the strongest concerns raised by the opponents,” she said.

MG_1909

The Mobile Voting Project website displayed on an iPhone on Nov. 3, 2022.

Photo: Elise Swain/The Intercept

In the end, Mobile Voting’s D.C. coalition wasn’t able to persuade Charles Allen, who never granted the bill a public hearing. But Tusk wasn’t daunted. “I haven’t started putting pressure on this guy,” he said in a podcast episode released in June. “There’s stuff that I’ve found out about him that hasn’t become public yet that’s gonna really fuck up his life.”

In a public survey Mobile Voting had commissioned about voting in the District, just 2 percent of respondents believed voting was difficult to begin with.

The District automatically registers voters, allows online and same-day registration, and could soon verify residents to vote without them having to register at all. For this year’s midterms, the Board of Elections has automatically mailed every actively registered voter an absentee ballot, which can be returned up to seven days after Election Day, one of the most permissive deadlines in the country. And the District offers eight days of early voting.

Nationally, D.C. is better than most, but it’s not as much of an outlier as you might expect. Forty-six states and D.C. offer early in-person voting, and 35 states and D.C. either conduct all-mail elections or offer no-excuse absentee voting.

“Convenience does help, but it doesn’t have a transformative effect” on turnout.

“Convenience does help, but it doesn’t have a transformative effect” on turnout, says Donald P. Green, a political scientist at Columbia University and the co-author of a book on turnout.

Paul Gronke, a political science professor at Reed College, agrees and points out that turnout is even more complicated for primaries, which Tusk considers so fundamental to his reform because of how heavily gerrymandered most districts are. “You don’t have party cues anymore, so you have to search for other cues,” Gronke says. That process takes substantially more effort and information.

Another underlying issue, says Fowler, the University of Chicago professor, is that most people don’t vote based on where their ballot matters most. If that were the case, turnout rates would be highest in local elections.

Tusk also argues that radical primary voters have hijacked our politics, which isn’t well supported by evidence, says Lee Drutman, a lecturer at the Johns Hopkins University Center for Advanced Governmental Studies. “Primary voters are more politically engaged and stronger partisans, but not significantly more ideologically extreme,” writes Drutman. Other researchers have found the same.

Nor is there compelling evidence that engaging more voters would significantly change our politics, according to a 2020 Knight Foundation survey of 12,000 chronic non-voters. “If they all voted in 2020,” the report said, “non-voters would add an almost equal share of votes to Democratic and Republican candidates.”

However, this group was less likely to actively seek out news, agree that votes are counted fully and accurately, or believe that politicians’ decisions have a strong impact on their lives — attitudes that internet voting is unlikely to change. Likewise, Tusk’s reform does little to register voters, combat gerrymandering, open up primaries, make elections more competitive, improve the quality of the candidates running, or diminish the power of dark money and political action committees.

As to the effect of internet voting on participation, would it increase turnout in the District — or anywhere else — by 10, 20, 30 percent?

“There’s zero evidence to support that kind of a claim,” says Fowler, who received a grant from Tusk Philanthropies for his research, which found between a 3 to 5 percentage point turnout bump in West Virginia’s internet voting pilot.

Internet voting’s potential to raise turnout is even weaker for the 15 percent of D.C. residents who don’t have smartphones. In “The Fixer,” though, Tusk makes a suggestion: “It’d be far cheaper to just buy them for everyone than to run a government this inefficient and this ineffective because no one bothers to vote.”

In theory, however, internet voting could substantially help other groups, something that Tusk uses to his advantage.

“We’ve either made it available to deployed military or people with disabilities,” Tusk said on a podcast in 2021. “We’ve found one group on the right that no one can object to, and one group on the left that no one can object to.”

Per a 2009 federal law, military and overseas voters have the option to receive a blank ballot electronically for federal elections, and 31 states also allow them to return that ballot electronically. Some states require that voters explicitly waive their right to a secret ballot.

In that light, the president of Democracy Live, one of Mobile Voting’s technology vendors, says he sees his company’s online portal not as a silver bullet, but rather as a better solution than the fax or email option commonly offered. “It’s not, ‘Let’s go do online voting for America,’” says Bryan Finney. Instead, it’s “Can we do that better? Can we do that more securely?”

Combined, the people casting ballots electronically represented less than .2 percent of all the votes cast in 2020. However, voters with disabilities are increasingly advocating to use those digital options for themselves.

These voters have always faced significant barriers. It can be difficult just getting to poll sites, which then present challenges of their own, and voting at home can be just as fraught, especially as states have limited the kind of assistance that voters can receive. Until recently in Indiana, voters could only be helped by a “traveling board” of elections officials who would come to their homes. Thanks to a recent court decision, they can now be assisted by almost anyone — but that’s not the victory it may seem, says Michelle Bishop, voter access and engagement manager at the National Disability Rights Network.

“We are basically telling them to ask someone else to mark a ballot they will never be able to verify and just trust that it was marked as intended,” she says.

For now, Pinto has backed off of internet voting. “Since introducing the bill, I have had many more conversations with residents and experts and my staff and I have read additional reporting on the issue,” she told The Intercept. “At this time, mobile voting is not ripe to move forward as additional security protections are likely needed to be considered.”

Still, others, if not Tusk’s, will inevitably pop up elsewhere, says MIT’s Ron Rivest. “It’s like Whac-A-Mole.”

And once a right is expanded to one group, another usually follows. In 2018, West Virginia officials said they had no plans to extend mobile voting beyond the relatively small overseas population. “Secretary [of State Mac] Warner has never and will never advocate that this is a solution for mainstream voting,” his deputy chief of staff told the Washington Post. In 2021, internet voting in the state was offered to voters with qualifying disabilities. This February, it was expanded again to certain first responders.

Or, as Tusk put it in 2019, “What we learned at Uber is once the genie is out of the bottle, it can’t be put back in.”

This reporting was made possible through grants from the Gumshoe Group and the Fund for Investigative Journalism.


This content originally appeared on The Intercept and was authored by Spenser Mestel.

]]>
https://www.radiofree.org/2022/11/04/an-uber-millionaire-wants-you-to-vote-on-the-internet-despite-the-inherent-vulnerabilities/feed/ 0 347902
China buys up US technology to keep tabs on its citizens https://www.rfa.org/english/news/china/china-us-technology-11042022021211.html https://www.rfa.org/english/news/china/china-us-technology-11042022021211.html#respond Fri, 04 Nov 2022 06:21:00 +0000 https://www.rfa.org/english/news/china/china-us-technology-11042022021211.html Chinese public security entities have been acquiring U.S. technology with the transfers becoming increasingly regular, especially of DNA analysis equipment needed for mass surveillance, a new report has found.

The report ‘The Role of US Technology in China's Public Security System’ by the U.S. intelligence and security research Insikt Group revealed the sweeping extent of technology transfers from U.S. companies to Chinese companies to be used by the public security apparatus, including in the Xinjiang Uyghur Autonomous Region.

From DNA analysis to thermal imaging, from data storage to digital forensics and cyber security, a vast range of U.S. technology has been transferred to the Chinese public security system. 

Surveillance and counter-surveillance are among the main focuses of the technology transfers, the report said.

“In some cases, public security entities in China almost certainly seek technology from U.S. companies because foreign products outperform domestic equivalents,” it said.

In other cases, the technology was acquired “to ensure compatibility” as it had already been used by Chinese organizations.

According to the report, public security entities in the Xinjiang Uyghur Autonomous Region “appear to have purchased at least 481 hard disk drives from Seagate and Western Digital” in early-to-mid 2022, including surveillance-specialized drives and drives acquired alongside equipment from China’s leading surveillance providers. 

Both Seagate Technology Holdings and Western Digital Corporation are well-known American data storage companies.

“Other entities in Xinjiang, such as prisons belonging to the paramilitary Xinjiang Production and Construction Corps, have also recently carried out surveillance-oriented purchases of Seagate or Western Digital hard disk drives,” it said.

Another report released last year also said U.S. technology companies were supplying China’s surveillance state with equipment and software for monitoring populations and censoring information, including in Xinjiang.

Western governments and human rights groups have condemned Beijing for surveillance and other abusive policies against the 12 million Muslim Uyghurs in the region, which they said amounted to genocide and crimes against humanity. China has repeatedly denied the allegations.

Xinjiang.jpg
The Chinese flag behind razor wire at a housing compound in Yangisar, south of Kashgar, in China's western Xinjiang region, in a photograph taken on June 4, 2019.
CREDIT: Greg Baker/AFP
 

‘Extremely common transfers’

“When I started the research, I did not expect these technology transfers to be so prevalent,” said report author Zoe Haver.

She began the project by looking at transfers of counter-surveillance devices used by the U.S. military and U.S. law enforcement, but during the process she found that Chinese public security entities were purchasing U.S. technology for use in many other areas, such as aviation, DNA analysis, thermal imaging, optics, surveillance, cybersecurity, network infrastructure, and data storage.

“With some of the technologies that I was tracking, such as DNA analysis equipment, I observed new purchases on pretty much a day-to-day basis. These transfers are extremely common across China,” she told RFA.

The Chinese public security apparatus has been seeking DNA analysis equipment, with the reliance on U.S. technology in this area “most notable,” according to the analyst.

“This equipment can potentially be used to help build population databases and carry out mass surveillance,” Haver said.

Entities belonging to the powerful Ministry of Public Security (MPS) have been acquiring U.S. technology via legal channels at industry exhibitions, third-party agents and distributors, and even from U.S. companies’ local subsidiaries in China.

Recently more and more U.S. firms have been bought by Chinese companies and this has “aided the growth of China’s domestic industries and facilitated sales of U.S. products to public security end users,” according to the report.

Another factor is the cross-border flows of talent that have become increasingly common in the era of globalization.

U.S. control response

Haver compiled the report by sifting through thousands of public Chinese government procurement records and she said that she was struck by the sheer number of procurement documents.

In response to the state violence that Chinese public security entities carry out, particularly in Xinjiang, the U.S. government has taken some steps in recent years to restrict the transfer of U.S. technology to them.

The Export Control Reform Act of 2018 referred to items that have law enforcement-related applications and stipulated that “the U.S. export control policy should serve to protect human rights.”

In 2019 and 2020, the U.S. Department of Commerce Bureau of Industry and Security placed 21 Chinese public security entities (in addition to various Chinese companies) on an export licensing restrictions list.

But Insikt’s report raised the question of “the efficacy of current U.S. export control measures that target Chinese public security entities and the Chinese companies that support them.”

“As third-party distributors and agents play such a prominent role in the technology transfer process, the U.S. government may find it difficult to implement effective export restrictions,” Haver told RFA.


This content originally appeared on Radio Free Asia and was authored by By RFA Staff.

]]>
https://www.rfa.org/english/news/china/china-us-technology-11042022021211.html/feed/ 0 347823
With NZ’s Three Waters reforms under fire, let’s not forget that safe and affordable water is a human right https://www.radiofree.org/2022/11/03/with-nzs-three-waters-reforms-under-fire-lets-not-forget-that-safe-and-affordable-water-is-a-human-right/ https://www.radiofree.org/2022/11/03/with-nzs-three-waters-reforms-under-fire-lets-not-forget-that-safe-and-affordable-water-is-a-human-right/#respond Thu, 03 Nov 2022 00:28:24 +0000 https://asiapacificreport.nz/?p=80750 ANALYSIS: By Nathan Cooper, University of Waikato

While ostensibly about improving Aotearoa New Zealand’s water infrastructure, the government’s proposed Three Waters reforms have instead become a lightning rod for political division and distrust.

Critics cite concerns about local democracy, de facto privatisation and co-governance with Māori as reasons to oppose the Water Services Entities Bill currently before Parliament.

With the mayors of Auckland and Christchurch now proposing an alternative plan, the reforms may be far from a done deal.

But behind the debate lies an undeniable truth: clean water is a necessity of life. In fact, 20 years ago this month the United Nations Committee on Economic Social and Cultural Rights first affirmed that water is a human right.

The anniversary is a timely reminder of what Aotearoa’s proposed water reforms are essentially about.

Covering drinking water, wastewater and stormwater (hence the “three waters” label), the reforms would have a wider remit than the human right to water. They fold in environmental and cultural considerations alongside public health concerns.

But the human right to water, as well as lessons learned from implementing that right, have important implications for the Three Waters debate, not least around water quality and affordability.

A fragile right
By acknowledging it to be a human right in 2002, the UN Committee on Economic, Social and Cultural Rights argued water is indispensable for leading a dignified life and essential for other human rights.

Since then, the human right to water has been repeatedly declared, including by the UN General Assembly and the European Union. This right is included in the constitutions and laws of numerous countries.

Despite this, 1 billion people still lack access to safe drinking water, and six out of ten people live with inadequate sanitation. More than 2 billion people live in areas of water scarcity, likely to become an even bigger issue due to climate change.

The human right to water covers five essential factors:

  • access to enough water for drinking, personal sanitation, washing clothes, preparing food, personal and household hygiene
  • water that is clean and won’t cause harm
  • the look and smell of water should be acceptable
  • water sources should be within easy reach and accessible without danger
  • the cost should be low enough to ensure everyone can buy enough water to meet their needs.
Voices for Freedom protest
The anti-government protest movement Voices for Freedom has added Three Waters to its list of grievances. Image: Getty Images/The Conversation

Access and affordability
Internationally, there is evidence that the adoption of a human right to water has made a difference. In South Africa, where access to sufficient water is a constitutional right, the courts have repeatedly referred to the human right to water when determining government obligations around water services.

In 2014, the first European Citizens’ Initiative pushed the European Union to exclude water supply and water resources management from the rules governing the European internal market. This means EU citizens have a stronger voice in water governance decisions.

In 2016, Slovenia became the first EU country to make access to drinkable water a fundamental right in its constitution.

New Zealand’s Three Waters reforms are not unrelated to these basic issues of safety, accessibility and affordability. They aim to address significant problems with the country’s existing water services model, including ageing infrastructure, historical under-investment, the need for climate change resilience, and rising consumer demand.

These all require a serious programme of water service transformation — one the government believes is beyond what local councils (which currently administer most water assets) will be able to deliver.

The projected cost is estimated at between NZ$120 billion and $185 billion (on top of currently planned investment), rolled out over the next 30 years.

Ambition and equity
One way or another, the work has to be done. Last year elevated lead levels were found in the water in east Otago. Ageing infrastructure and increasing demand are likely to increase the risk of similar incidents unless expensive upgrades are undertaken.

Without reform, the government argues, the huge cost of those upgrades will be unevenly spread across households, with a substantially higher burden on rural consumers.

To be affordable and equitable for everyone, therefore, the Three Waters plan involves creating four publicly owned, multi-regional entities. These will benefit from greater scale, expertise, operational efficiencies and financial flexibility compared to local councils.

But because councils could still contract out water services for 35 years, concerns have been raised about the potential for creeping privatisation.

Indeed, similar concerns, including failed attempts to privatise water services in other countries, were a significant catalyst for asserting the human right to water more than two decades ago.

While international acknowledgment of water as a human right doesn’t automatically create binding obligations on New Zealand’s government, it can still inform the Three Waters debate.

Over the past 20 years, many of the benefits of this right have accrued from its ability to focus attention on securing high-quality and sustainable water services for everyone. That remains an essential ambition for New Zealand in 2022 and beyond.The Conversation

Dr Nathan Cooper is associate professor of law, University of Waikato. This article is republished from The Conversation under a Creative Commons licence. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2022/11/03/with-nzs-three-waters-reforms-under-fire-lets-not-forget-that-safe-and-affordable-water-is-a-human-right/feed/ 0 347525
How Google’s Ad Business Funds Disinformation Around the World https://www.radiofree.org/2022/10/29/how-googles-ad-business-funds-disinformation-around-the-world/ https://www.radiofree.org/2022/10/29/how-googles-ad-business-funds-disinformation-around-the-world/#respond Sat, 29 Oct 2022 09:00:00 +0000 https://www.propublica.org/article/google-alphabet-ads-fund-disinformation-covid-elections by Craig Silverman, Ruth Talbot, Jeff Kao and Anna Klühspies

Google is funneling revenue to some of the web’s most prolific purveyors of false information in Europe, Latin America and Africa, a ProPublica investigation has found.

The company has publicly committed to fighting disinformation around the world, but a ProPublica analysis, the first ever conducted at this scale, documented how Google’s sprawling automated digital ad operation placed ads from major brands on global websites that spread false claims on such topics as vaccines, COVID-19, climate change and elections.

In one instance, Google continued to place ads on a publication in Bosnia and Herzegovina for months after the U.S. government officially imposed sanctions on the site. Google stopped doing business with the site, which the U.S. Treasury Department described as the “personal media station” of a prominent Bosnian Serb separatist politician, only after being contacted by ProPublica.

Google ads are a major source of revenue for sites that spread election disinformation in Brazil, notably false claims about the integrity of the voting system that have been advanced by the incumbent president, Jair Bolsonaro. Voters in Brazil are going to the polls on Sunday with the outcome in doubt after Bolsonaro’s unexpectedly strong showing in the first round of voting.

The investigation also revealed that Google routinely places ads on sites pushing falsehoods about COVID-19 and climate change in French-, German- and Spanish-speaking countries.

The resulting ad revenue is potentially worth millions of dollars to the people and groups running these and other unreliable sites — while also making money for Google.

Platforms such as Facebook have faced stark criticism for failures to crack down on disinformation spread by people and governments on their platforms around the world. But Google hasn’t faced the same scrutiny for how its roughly $200 billion in annual ad sales provides essential funding for non-English-language websites that misinform and harm the public.

Google’s publicly announced policies bar the placement of ads on content that makes unreliable or harmful claims on a range of issues, including health, climate, elections and democracy. Yet the investigation found Google regularly places ads, including those from major brands, on articles that appear to violate its own policy.

ProPublica’s examination showed that ads from Google are more likely to appear on misleading articles and websites that are in languages other than English, and that Google profits from advertising that appears next to false stories on subjects not explicitly addressed in its policy, including crime, politics, and such conspiracy theories as chemtrails.

A former Google leader who worked on trust and safety issues acknowledged that the company focuses heavily on English-language enforcement and is weaker across other languages and smaller markets. They told ProPublica it’s because Google invests in oversight based on three key concerns.

“The number one is bad PR — they are very sensitive to that. The second one is trying to avoid regulatory scrutiny or potentially regulatory action that could impact their business. And number three is revenue,” said the former leader, who agreed to speak on the condition that their name not be used in order not to hurt their business and career prospects. “For all these three, English-speaking markets primarily have the biggest impact. And that’s why most of the efforts are going into those.”

ProPublica used data provided by fact-checking newsrooms, researchers and website monitoring organizations to scan more than 13,000 active article pages from thousands of websites in more than half a dozen languages to determine whether they were currently earning ad revenue with Google. (To read a detailed breakdown of how ProPublica obtained and analyzed the data, see this accompanying article.)

The analysis found that Google placed ads on 41% of roughly 800 active online articles rated by members of the Poynter Institute’s International Fact-Checking Network as publishing false claims about COVID-19. The company also served ads on 20% of articles about climate change that Science Feedback, an IFCN-accredited fact-checking organization, has rated false.

A number of Google ads viewed by ProPublica appeared on articles published months or years ago, suggesting that the company’s failure to block ads on content that appears to violate its rules is a long-standing and ongoing problem.

In one example, Google recently placed ads for clothing brand St. John on a two-year-old Serbian article falsely claiming that cat owners don’t catch COVID-19. Google placed an ad for the American Red Cross on a May 2021 article from a far-right German site that claimed COVID-19 is comparable in danger to the flu. An ad for luxury retailer Coach was recently attached to an April article in Serbian that repeated the false claim that the COVID-19 vaccines change people’s DNA.

Last August, the Greek edition of the Epoch Times, a far-right U.S. publication connected to the Falun Gong spiritual movement, published an article that falsely claimed the sun, and not increased levels of carbon dioxide, could be responsible for global warming. That story had multiple Google ads when ProPublica viewed it, even though it appears to clearly violate Google’s policy against climate disinformation.

A spokesperson for the Red Cross said its ad appeared on the far-right German site due to an automated placement it did not directly control.

“Please note that based upon our Fundamental Principles of impartiality and neutrality, the Red Cross does not take sides in issues of a political, racial, religious or ideological nature, so we would purposefully not advertise on a story or site such as the one you shared with us,” said a statement from the organization.

Coach and St. John did not respond to requests for comment.

Google’s policy is to remove ads from individual articles that violate its rules, and to take sitewide action if violations reach a specific undisclosed threshold. Google removed ads from at least 14 websites identified in the investigation after being contacted by ProPublica.

Google spokesperson Michael Aciman said the company has put more money into non-English-language enforcement and oversight, which has led to an increase in the number of ads blocked on pages that violate its rules. He declined to provide figures or to say how many people Google has working on non-English-language content and ad review.

“We’ve developed extensive measures to tackle misinformation on our platform, including policies that cover elections, COVID-19 and climate change, and work to enforce our policies in over 50 languages,” Aciman said. “In 2021, we removed ads from more than 1.7 billion publisher pages and 63,000 sites globally. We know that our work is not done, and we will continue to invest in our enforcement systems to better detect unreliable claims and protect users around the world.”

The data about ad removals comes from Google's most recent Ads Safety report, which emphasized the removal of ads from more than half a million pages that violated policies against harmful claims about COVID-19 and false claims that could undermine elections. But Google does not release a list of pages or publishers it took action against, the countries and languages they operate in or other data related to its Ads Safety report.

Google has been vocal about its $300 million commitment, announced in 2018, to fight misinformation, support fact-checkers and “help journalism thrive in the digital age.” But the investigation shows that as one arm of Google helps support fact-checkers, its core ad business provides critical revenue that ensures the publication of falsehoods remains profitable.

Laura Zommer, the general director of the Argentina-based Chequeado, founded in 2010 as the first fact-checking organization in Latin America, said Google’s failure to invest in oversight of sites in languages other than English causes serious harm in emerging democracies.

“The problem is that disinformation that takes hold in less developed democracies can cause even more damage than the disinformation circulating in countries with more developed democracies,” said Zommer, who is also the co-founder of Factchequeado, an initiative to counter Spanish-language disinformation in the U.S.

In Serbia, Croatia and Bosnia, three Balkan countries where democracy is fragile, 26 of the 30 most prolific publishers of false and misleading claims in the region earn money from Google, according to data from local fact-checkers.

“If the world’s largest online advertising platform doesn’t care that it has made false information, hate speech and toxic propaganda profitable in societies like ours, and has no intention to do anything to change because it wouldn’t financially pay off, that is devastating,” said Tijana Cvjetićanin, a member of the editorial board of Bosnian fact-checking site Raskrinkavanje, which shared data with ProPublica.

A comparison with English-language outlets suggests Google is more rigorous in choosing its publisher partners in that language. ProPublica found Google placed ads on 13% of English-language websites that NewsGuard deemed unreliable for having repeatedly published false content or deceptive headlines and failing to meet transparency standards. In contrast, ProPublica’s analysis found anywhere from 30% to 90% of the sites most often flagged for false claims by fact-checkers in the non-English languages examined were monetizing with Google.

Along with unequal enforcement across languages, ProPublica found disparity across and within regions.

Africa Check shared a list of 68 active English-language URLs that had been fact- checked as false by teams in South Africa, Nigeria and Kenya since 2019, as well as 45 French-language articles that had been debunked by its French-language checkers. ProPublica’s analysis found that 57% of debunked English-language articles in Africa had ads from Google, while the percentage was higher, 66%, for French-language articles.

Alexandre Alaphilippe, executive director of the EU Disinfo Lab, a non-profit organization that researches disinformation, said Google should be required to equally enforce its policies across languages and regions and to be transparent about its oversight decisions.

“These companies have decided to go global in their services, and that was their own decision for growth and to make revenue,” he said. “It’s not possible to make this choice and not face the accountability needed to be in all of these countries at the same time.”

Google’s Global Ad Dominance

Google is the world’s biggest digital advertising business. Last year it generated a record $257 billion in revenue. Most of that money comes from companies paying to place ads on Google products such as search and YouTube. But in 2021 Google earned $31 billion by placing its customers’ ads on more than 2 million websites around the world. They’re part of what the company calls the Google Display Network.

These publishing partners range from major news outlets such as The New York Times to small sites run by individuals. In order to join the Google Display Network, a publisher must meet requirements that include publishing original content and adhering to policies against unreliable and harmful claims and sexually explicit content, among others. Once accepted, Google says, publishers in the network receive 68% of the money spent on each ad placed on their site.

Google’s ad systems are also used to place ads on websites that are not necessarily members of its Display Network. These publishers work with ad technology companies that have partnered with Google, and which use its technology to buy and sell ads. As with ads placed on sites in the Display Network, Google and the publisher both earn money.

Google places ads on publisher sites using an automated auction system called programmatic advertising. The process starts when a person visits a webpage or opens an app. As the page loads, the site or app owner collects information about the ad space available along with data about the user, which can include location, age range, browsing history and interests.

The data is sent to an ad exchange like the one operated by Google, where ad buyers — ranging from major brands like Spotify to smaller local businesses — can place a bid to show an ad to the specific user visiting the website or app. Bids are placed, or not, based on the user and publisher data shared with potential advertisers and the price an advertiser is willing to pay to reach that person.

In the blink of an eye, the top bidder wins the auction and the ad loads on the page. Money flows from the ad buyer to the ad exchange (and any other intermediaries involved in the transaction), eventually making its way to the website or app publisher.

In 2019, the Global Disinformation Index, a nonprofit that analyzes websites for false and misleading content, estimated that disinformation websites earned $250 million per year in revenue, of which Google was responsible for 40% and the rest came from other ad tech companies. NewsGuard, which employs human reviewers to evaluate and rate websites based on a set of criteria including accuracy, estimated in 2021 the annual ad revenue earned by sites spreading false or misleading claims is $2.6 billion. The report did not say how much of that Google might be responsible for.

How much of Google’s revenue comes from monetizing false and misleading content is difficult to estimate. Each of the billions of digital display ads placed every day by Google has a different price point that fluctuates based on the combination of advertiser, target website and the users the ad will be shown to. It’s all part of a complex, opaque and largely automated digital ad buying and selling process dominated by Google. This means advertisers have to rely in part on the mix of automation and human review Google uses to ensure its publisher partners don’t violate its rules.

The findings of fact-checkers could be used by Google to enforce its policy against placing ads next to content that makes unreliable and harmful claims. There are more than 350 fact-checking projects around the world that employ journalists, and in some cases scientists, to identify and investigate claims spreading on the web, on social media and in traditional media. Their articles and associated ratings are used by platforms including Meta to help enforce policies around false and harmful content. Google already highlights fact-checks in search and Google News results to direct people to trustworthy information. But the company does not use fact-checks to keep ads off of pages with unreliable or harmful claims. And unlike Meta and TikTok, it does not pay fact-checkers for the results of their research.

“When it comes to ads, they obviously monetize disinformation. Whether it’s without knowing or knowing, it doesn’t matter,” said Baybars Örsek, director of the International Fact-Checking Network. “There has never been a public announcement from Google’s side that has acknowledged fact-checking as a signal for their ads monetization business.”

Google’s Aciman declined to comment on Google’s relationship with fact-checkers.

Failed Enforcement in Bosnia, Croatia, Serbia

On Sept. 20, as he prepared to mobilize part of the country’s population to fight in Ukraine, Russian President Vladimir Putin met with Milorad Dodik, a member of Bosnia’s three-person presidency and Bosnian Serb separatist leader who has expressed strong support for the invasion.

The Putin meeting was a propaganda coup for Dodik. Even better for him, Google helped ensure it was lucrative.

After the meeting, the homepage of the Serbian media site ATV featured articles praising the meeting and quoting Dodik about plans for greater economic cooperation with Russia, while sowing doubt about genocide committed during the Bosnian war, a frequent Dodik talking point. A ProPublica reporter viewing those stories was served ads for Saks Fifth Avenue department store, New Balance shoes and eBay that were placed via Google’s ad systems. ProPublica also documented ads from brands such as Guess on false ATV articles claiming that Serbia had found a cure for COVID-19 and NATO was planning to deploy troops to Ukraine.

A Saks spokesperson said its ads were not supposed to have appeared on ATV, and that the company would block the site from future campaigns.

“It was not our intention to advertise on this site as it violates the brand safety guidelines we have in place with our ad partner,” said a statement from the company.

An eBay spokesperson also said its ad was not placed “intentionally” on ATV. Guess and New Balance did not respond to requests for comment.

Ads for Guess appeared recently on an ATV article from 2020 that falsely claimed Serbia had a cure for COVID-19. (ProPublica screenshot)

Google is helping the site earn money by placing ads on false and divisive content in spite of the ATV website and its related TV station being sanctioned in January by the U.S. Treasury Department due to Dodik’s “corrupt activities and continued threats to the stability and territorial integrity” of Bosnia and Herzegovina. Dodik “exerts personal control over ATV,” approves content and corruptly funnels government contracts to the outlet, according to the Treasury Department’s sanctions announcement.

Google removed ads from the ATV website after being contacted by ProPublica, but declined to comment on its relationship with the site. “Google is committed to complying with all applicable sanctions,” Aciman said. ATV and representatives from Dodik’s office did not respond to requests for comment.

ATV is one of the 30 most frequent sources of false and misleading content published in the Bosnian-Croatian-Serbian language, according to data provided to ProPublica by Raskrinkavanje. Of the 30 sites most flagged by Raskrinkavanje for false claims, 26 made money with Google. The list included popular sites in the region, such as the websites of tabloid newspapers, as well as smaller operations that in some cases don’t disclose their owners or are run by fringe figures.

ProPublica also scanned close to 10,000 active articles that fact checkers in the three Balkan countries flagged for false claims since 2019. Just over 60% were earning money with Google. The articles included a range of falsehoods about national politics, the pandemic, vaccines, the war in Ukraine and other topics.

“It might just be a financial matter for Google, but for us it’s a corrosive influence on our already very fragile democracies,” Cvjetićanin said.

Ads for Amazon Prime Video, Spotify, BetMGM and a women’s clothing site were placed via Google’s systems on a Srbin.info article falsely claiming COVID-19 vaccines can change people’s DNA. (ProPublica screenshot)

Dejan Petar Zlatanovic operates Srbin.info, a Serbian website that publishes pro-Kremlin propaganda copied from Russian state media, election conspiracies about the U.S. and anti-LGBTQ content. Its homepage features a prominent hyperlink directly to the official Kremlin website. Google ads abound there and on article pages.

Zlatanovic said in an email that Srbin.info earns between $5,000 and $7,000 per month, with Google ads providing a key portion of the revenue.

"The editorial policy of Srbin.info from the beginning was to offer relevant alternative news, not to brainwash people or to determine how they should live,” Zlatanovic wrote in Serbian. “All our lives we have lived in a communist and post-communist society based on single-mindedness and we got sick of single-mindedness.”

In April, Srbin.info published an article claiming that mRNA COVID-19 vaccines could change the genetic makeup of people and alter “human genetics forever.” The story cited debunked claims by an American doctor who falsely claimed children’s DNA could be altered by the vaccines.

Ads from Amazon Prime, BetMGM, Spotify, and StyleWe were shown to a ProPublica reporter who viewed the story. The companies did not respond to requests for comment. Google declined to comment on the Balkan sites and articles identified by ProPublica in the analysis.

Zlatanovic told ProPublica in an email that the vaccines article contained information he felt was “relevant for the public” because it came from a medical professional.

Google also placed ads on an article making a similar false claim when it spread across a set of sites in the region in late 2020, according to local fact-checkers. The false claim that mRNA vaccines can change “the genetic structure of a person” was reported by B92, which is among the 30 sites in the region most often flagged by fact-checkers. It eventually corrected its story, but has a history of publishing false claims and potentially harmful health content.

B92 has published articles claiming that baking soda can save your life; that watermelon can cure cancer but could be poisonous if the fruit is cracked (it later corrected this story); and that there’s a juice that can kill cancer cells in 42 days, to name some of the stories local fact-checkers have had to debunk. All had ads from Google when viewed by ProPublica, except for the cancer cure story, which was deleted by the site at some point after publication.

B92 did not respond to a request for comment.

The rampant anti-vaccine and COVID-19 disinformation appears to have contributed to low vaccination rates in the region. Just 25% of people are fully vaccinated in Bosnia, while 47% are vaccinated in Serbia and 55% in Croatia, among the lowest rates in Europe. A survey of unvaccinated Bosnians published in April by Raskrinkavanje’s parent company suggests conspiracy theories have taken hold among the population. Almost half of respondents agreed with the false claim that vaccines contain “dangerous nanoparticles,” and 38% believe the mRNA vaccines “alter DNA.”

Brazil’s Disinfo Boom

For at least four years, Brazilian president Bolsonaro has sowed doubt and spread disinformation about the country’s electoral process and the reliability of the country’s electronic voting system, leading to a 2021 Supreme Court investigation that documented his false claims.

Aiding his efforts are pro-Bolsonaro websites with big audiences — and a slew of ads courtesy of Google.

One of the largest is Terra Brasil Notícias, a two-year-old site run by a couple based in one of Brazil’s northeastern provinces. This summer, it published a story containing a clip from “Last Week Tonight” where host John Oliver explained the risks of electronic voting machines. The site used this to undermine confidence in Brazil's electronic voting system. Brazil’s electronic voting machines do not use paper audits, but have repeatedly been proven secure, and there is no credible evidence of widespread voter fraud in the country.

On Oct. 2, the day Brazilians voted in the first round of the presidential elections, Terra Brasil Notícias was one of several pro-Bolsonaro websites threatened with a fine by the head of the country’s Superior Electoral Court for publishing a falsehood about Bolsonaro’s opponent, Luiz Inácio Lula da Silva. Terra Brasil Notícias and other sites spread the false claim that the leader of a criminal organization had said he’d vote for Lula.

Marie Santini, director of the Netlab at the Federal University of Rio de Janeiro, said the number of junk news and disinformation sites like Terra Brasil Notícias, as well as their audience, exploded in Brazil in part because Google ads make it easy for people to earn money from this type of content. She likened it to people who might drive for Uber to earn extra cash.

“You don’t need to make quality content or really work with journalists. You can copy things, you can use bots, you can recycle news, and you do it from your house and you receive some money,” she said. “It’s a way to make money for people that are without opportunity. But who is making money on a large scale? Of course, it’s the platform, Google.”

In response to the court’s finding, Terra Brasil Notícias took down the story that repeated the false claim about Lula. It also deleted its article about U.S. voting machines after Brazilian fact-checking organization Aos Fatos contacted the site last month. In an email, Aos Fatos listed eight recent articles from the site that it rated as false, and asked Terra Brasil Notícias to comment on its relationship with Google. In response, the site published the email from Aos Fatos and defended the articles. It later deleted all of them. As of this writing, it still earns money with Google.

Terra Brasil Notícias did not respond to requests for comment. Google declined to comment.

Santini’s Netlab team monitors thousands of right-wing and left-wing messaging groups and websites. They shared a list of 262 active Portuguese-language websites in Brazil that circulated in messaging groups and were labeled by researchers as publishing false or misleading information. ProPublica found that 46% of the more than 250 sites flagged for disinformation earn money with Google. When that list was compressed to the 30 most shared sites in WhatsApp and Telegram groups, ProPublica found that 80% of them earn money with ads placed via Google.

“This ecosystem of sites is very important for politics in Brazil,” said Santini. “They are very powerful because people consume this thinking that it’s journalism, but it’s only propaganda. And it’s paid by Google ads.”

Ads are also funding COVID-19 disinformation in Brazil. Google placed ads on a false October 2021 story from Stylo Urbano that claimed people could develop AIDS as the result of COVID-19 vaccinations; a false December 2020 story on the same site claiming that COVID-19 PCR tests have a 97% false positive rate; and a false February 2021 article on the site that said the Centers for Disease Control and Prevention “deliberately violated several federal laws” by inflating the number of deaths due to COVID-19.

After being contacted by ProPublica, Google removed its ads from the site. Stylo Urbano did not respond to a request for comment.

Brazil is one of several countries in Latin America where false claims are funded by Google ads. A coalition of fact-checking organizations in Latin America provided ProPublica with a list of websites they said are frequent sources of false and misleading claims. Of the 49 active sites on the list, 19 (or 39%) currently earn money with Google.

The coalition was led by Chequeado, the Argentinian nonprofit fact-checking organization. Zommer, its founder, said Chequeado has received support from Google over the years in the form of grants and training. But it and other platforms’ ongoing failure to enforce their policies in Spanish and other languages outside of English make their work more difficult, according to her.

"The fight against disinformation is unequal, as is the world,” Zommer said.

An Anonymous Network in Spain

Google’s enforcement failures in Spanish, a language spoken by roughly 550 million people, extend beyond Latin America.

On Sept. 22, the site Euskal News, based in the autonomous Basque region of Spain, published an article that suggested excess deaths in the Netherlands and other countries were the result of COVID-19 vaccines. The article, which was reprinted from another site, said the vaccines are possibly “causing deaths in a figure well above the average. The failure could not be more resounding.”

There is no evidence to support claims that COVID-19 vaccines are causing excess mortality. But the story is standard fare for Euskal News, a Google publishing partner that mixes anti-immigrant content and vaccine disinformation with warnings of an impending globalist and EU takeover.

A EuskalNews story with Google ads that falsely linked excess death figures in the Netherlands to vaccines. (ProPublica screenshot)

Google placed ads on a May 6 article that falsely linked the presence of microplastic fibers in people’s lungs to mask wearing, even though the study in question was conducted pre-pandemic. Google also placed ads on a page on the site that falsely says Pfizer’s vaccine resulted in thousands of adverse effects. That claim, and the internal Pfizer documents it’s based on, has repeatedly been debunked by fact-checkers. Though it placed ads on that article, Google blocked them from another on the same site that falsely claims the Pfizer vaccine had 160,000 adverse effects.

ProPublica documented additional pages on Euskal News with vaccine disinformation where Google appears to have blocked ads. Google declined to say how many pages it blocks before examining its overall relationship with a site, but it did remove ads from the site after being contacted by ProPublica.

Euskal News, launched in the spring of 2019, does not list an owner, and its articles do not have bylines. However, research by a Spanish digital security and investigations firm identified connections between the site and a far-right Basque politician named David Pasarin-Gegunde. In a 2020 interview, he declined to say who runs Euskal News but said it’s a person from his “ideological environment.” The site lists its webmaster as Eneko Eastresana, but he and Pasarin-Gegunde did not respond to requests for comment.

Euskal News was one of 32 active Spanish sites flagged by the Brussels-based EU DisinfoLab as frequent sources of false and misleading claims. ProPublica found that 14 of the sites, or 44%, earn money with Google.

Alaphilippe, who runs the DisinfoLab, said the sites on the list “regularly publish misleading, deceptive or incorrect information and often lack credible or transparent sources.”

Google declined to comment on the Spanish sites and articles identified in ProPublica’s analysis.

Media Capture and False Content in Turkey

Over the past two decades, Turkey’s media environment has transformed dramatically.

National newspapers and TV stations have been taken over by people aligned with President Recep Tayyip Erdoğan, leading Reporters Without Borders to assess that 90% of Turkey’s national media is under government control. The outlets adhere to “a tight chain of command of government-approved headlines, front pages and topics of TV debate,” according to a recent Reuters investigation.

One byproduct of Turkey’s increasingly authoritarian information environment — RSF says there are currently nine journalists in jail in the country — is that once-reliable publications publish false articles about politics, the pandemic and a range of clickbait meant to attract and earn money from traffic coming via Google search, according to Emre Kızılkaya, chair of the International Press Institute’s National Committee in Turkey. He cited a study he produced for IPI revealing how Google search rewards pro-government outlets and the at times false information they publish.

“President Tayyip Erdoğan and his cronies used multiple tactics for media capture in the past two decades, enabling them to control most of the largest news outlets today. These outlets owe most of their digital traffic — and revenue — to Google Search,” Kızılkaya, who also edits a nonprofit news site that reports on Turkish media, told ProPublica.

ProPublica analyzed over 1,000 articles rated false by Turkish fact-checking operation Teyit since 2019, and found that 73% are earning money from Google ads. Of the 50 outlets contained in that data that were most frequently flagged by fact-checkers, 45 earn money with Google. That’s the highest of any country analyzed in the investigation.

“In Turkey, disinformation pays and propaganda works. Google is still a part of this problem, despite its promises to help solve it,” Kızılkaya said. “The ProPublica data confirm the findings in our recent studies that demonstrated Google's algorithmic bias towards Turkey's pro-government media outlets at the expense of endangering fragile communities here.”

Google declined to comment on its search and ad efforts in Turkey.

Monetizing the German Far Right

In Germany, the right-wing, anti-immigration website Freie Welt is run by the husband of Beatrix von Storch, the former deputy leader of Germany’s major far-right AfD party.

One of the website’s articles, which had Google ads on it, falsely argues that the shortage of wheat in Ukraine was a result of U.S. companies buying one-third of Ukrainian land suitable for cultivation. Another article with ads claimed that 44% of pregnant women in Pfizer’s vaccine trial miscarried, a lie that has been debunked by fact-checkers.

Freie Welt is one of 30 German-language sites the EU DisinfoLab identified as consistent sources of false and misleading content. A third of them earn money with Google.

An ad for the American Red Cross was placed on a Journalistenwatch article that claimed COVID-19 was like the flu. Image has been blurred by ProPublica to conceal other ads on the page. (ProPublica screenshot)

The list includes Journalistenwatch, a leading platform of the “Neue Rechte,” a far-right political movement in Germany. Google placed an ad from the American Red Cross on an article falsely claiming that COVID-19 is like the flu. Another article falsely linking the decline in the birth rate in Germany to COVID-19 vaccines also earned money from Google.

Journalistenwatch and Freie Welt did not respond to requests for comment.

Google placed ads on a Report24 article that falsely claimed the World Health Organization warned against kids getting the COVID-19 vaccines. (ProPublica screenshot)

Some of the German-language sites identified by the EU DisinfoLab are based in neighboring Austria and Switzerland. One is Report24, an Austrian website that regularly spreads false information about COVID-19 measures and vaccination, according to fact-checkers. A ProPublica reporter was shown an ad for Hydeline, an American furniture retailer, on an article from June 2021 that falsely claims that the World Health Organization advises against children and teenagers getting COVID-19 vaccines.

Hydeline did not respond to a request for comment.

In response to questions from ProPublica, a spokesperson from Report24 who did not provide their name said the above articles were “carefully researched and contain all necessary sources — as every article on our website does.” They said ProPublica’s questions and findings are similar to “the biased, fake news producing, pharma industry funded fact-checkers.”

The site claimed that no Google ads appeared on the articles in question, and there hadn’t been any “for a long time.” The site did not respond after being sent screenshots showing Google ads on the article pages.

After being contacted by ProPublica, Google removed ads from Report24. The company declined to comment about the German sites and articles identified in the analysis.

Money for Falsehoods in French

Last October, just ahead of the United Nations global climate summit, Google announced it would no longer place ads on content that “contradicts authoritative scientific consensus” on climate change.

“Advertisers simply don’t want their ads to appear next to this content,” read a notice attributed to the Google Ads team.

But as with its policy about COVID-19 and vaccine misinformation, Google often fails to enforce its climate policy across languages. Science Feedback, a French nonprofit fact-checking organization that employs journalists and scientists, provided ProPublica with 427 active URLs of articles about climate change in French and other languages it has rated false since 2021. A fifth of them were earning money with Google, according to the analysis.

A story with false claims about climate change had ads for eyewear company Caddis and furniture maker Rove and a health PSA from the Centers for Disease Control and Prevention, the American Medical Association and the Ad Council, an ad industry association. (ProPublica screenshot)

In just one example, the French site 1 Scandal published an article in January falsely stating that global warming is “statistically insignificant” and “the climate emergency is imaginary.” Google had placed multiple ads on the page when ProPublica reporters visited it, including for Caddis eyewear and Rove furniture, as well as a public service announcement about diabetes supported by the CDC, the American Medical Association and the Ad Council, an ad industry body.

Kathy Kayse, chief media strategy and partnerships officer for the Ad Council, said in a statement that the organization relies on donated media space to place ads for its public service campaigns. This means the organization did not pay to place its ad on 1 Scandal.

“Because of this model, we cannot always predict or control where our content will be placed,” Kayse said, noting that they were responding on behalf of the Ad Council and the American Media Association.

Caddis, Rove, the CDC and 1 Scandal did not respond to requests for comment. Google appears to have removed ads from the site in response to questions from ProPublica.

ProPublica also analyzed two sets of French-language articles rated false by IFCN-accredited fact-checkers in France and Senegal.

Among the recent fact-checked French links earning money with Google is a May article from InfoDuJour that falsely claimed people vaccinated against COVID-19 were experiencing an “increase in adverse effects.” The story cited other false claims, which have been the subject of multiple fact-checks, that warned people against receiving doses of the “harmful” vaccines.

The same site also recently published an article that claims athletes are dying in greater numbers and that the cause “most likely lies in the introduction of an experimental injection that was supposed to protect against Covid-19 disease, but which, on the contrary, caused untold damage to the immune system and cardiovascular problems.”

On Aug. 1, InfoDuJour published an article headlined “Anti-Covid vaccines finally recognized as dangerous!” The page currently brings up a notice from the site that says Google found the article violated its policy about harmful COVID-19 misinformation. “To meet the digital giant’s conditions and avoid penalty, we have decided to delete the article,” the page says.

Marcel Gay runs InfoDuJour from Nancy, a city in the northeast of France. He told ProPublica that his site’s coverage of the pandemic and vaccines provided it with unprecedented traffic.

“Our media has gained a lot of visibility,” he said in an online message sent via the site’s customer support tool. “Last July we recorded 3.2 million unique visitors. And the advertising earnings from Google, about €3,000!” — roughly $2,979 at current exchange rates.

Gay defended his site’s pandemic content, saying it is “taking care to balance the information and to give divergent opinions.” He complained that traffic has since fallen since Google and Twitter took action against his site, noting that it was removed from Google News and Google Discover, the latter of which highlights news stories in the Google app. He said he deleted some anti-vaccine articles in order to keep earning money with Google.

“This planetary censorship is unique in the history of humanity,” Gay said. “It is reminiscent of the Inquisition that prevailed in the Middle Ages.”

Google declined to comment on InfoDuJour and 1 Scandal.

Another French-language site earning money with Google, this time in Africa, is 24Jours.com. Two years ago, it was the subject of separate investigations by the EU DisinfoLab and fact-checkers at Les Observateurs that revealed it was part of a network of more than 10 sites publishing false information, reprinting Russian propaganda and stealing content from other outlets.

In the ensuing years the site continued to earn money from Google on articles with false claims that cunnilingus can help prevent cancer, a man killed over 20 pizza delivery men, and a woman named her children Corona and Virus. Ads from Google also appear on content that 24Jours.com copies word-for-word from other sites — even articles stolen from fact-checkers such as Les Observateurs.

The operator of 24Jours.com, who on WhatsApp identified himself as Kennedy and said he was in Cameroon, told ProPublica that he stopped posting “fake news” in 2019, and that many sites copy content from sources such as Reuters. After being informed that sites pay to license content from Reuters and other sources, Kennedy said he would remove the infringing content.

“Less than 10% of the content on my website are copied from other websites,” he said.

Kennedy estimated Google is currently blocking ads from 26 articles on his site. When told that ProPublica was reaching out to Google to ask about his site, he said he would disable Google ads.

Do You Have a Tip for ProPublica? Help Us Do Journalism.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Craig Silverman, Ruth Talbot, Jeff Kao and Anna Klühspies.

]]>
https://www.radiofree.org/2022/10/29/how-googles-ad-business-funds-disinformation-around-the-world/feed/ 0 346339
By Buying Twitter, Elon Musk Has Created His Own Hilarious Nightmare https://www.radiofree.org/2022/10/28/by-buying-twitter-elon-musk-has-created-his-own-hilarious-nightmare/ https://www.radiofree.org/2022/10/28/by-buying-twitter-elon-musk-has-created-his-own-hilarious-nightmare/#respond Fri, 28 Oct 2022 19:56:58 +0000 https://theintercept.com/?p=412554
Tesla CEO Elon Musk looks up as he addresses guests at the Offshore Northern Seas 2022 (ONS) meeting in Stavanger, Norway on August 29, 2022. - The meeting, held in Stavanger from August 29 to September 1, 2022, presents the latest developments in Norway and internationally related to the energy, oil and gas sector. - Norway OUT (Photo by Carina Johansen / NTB / AFP) / Norway OUT (Photo by CARINA JOHANSEN/NTB/AFP via Getty Images)

Tesla CEO Elon Musk in Stavanger, Norway, on Aug. 29, 2022.

Photo: NTB/AFP via Getty Images


Elon Musk (and his consortium of much smaller investors) now owns Twitter. We need to take seriously the possibility that this will end up being one of the funniest things that’s ever happened.

That’s because as of this moment, it looks like Musk dug a big hole in the forest, carefully filled it with punji sticks and crocodiles, and then jumped in.

This was made immediately clear by Musk’s “Dear Twitter Advertisers” tweet as the deal closed:

The statement starts off, promisingly, with a blatant lie: “The reason I acquired Twitter is because it is important for the future of civilization to have a common digital town square.” Musk apparently believes that no one will remember that until three weeks ago, he was desperately trying not to buy Twitter. The only reason he did is because he was about to lose Twitter’s lawsuit to force him to buy it. This may be the greatest “you can’t fire me because I quit” moment in history.

The significance of the rest of his statement is more subtle. To understand it, you have to start with the basics.

Twitter currently makes 90 percent of its revenue from advertising. (The rest is largely from data licensing.) This means that you, the Twitter user, are not Twitter’s customers. You are its product. Its customers are corporate advertisers and, as every businessperson knows, the customer is always right. Grocery stores care about the people shopping for Cheetos, not about the feelings of the Cheetos themselves.

Twitter’s content moderation has sometimes been heavy-handed — especially when it froze my account because David Duke got mad at me. But this is not because Twitter is run by a woke mob. It’s because Twitter needs to keep advertisers happy — and their top priority is a certain kind of environment for their ads.

This can take specific forms. Delta probably has it written into its contract that its ads won’t run near any tweets about plane crashes. But more generally, advertisers don’t want anything controversial that gets people out of the buying mood, or worse, mad at the brands themselves. Proctor & Gamble can’t allow its ads for Charmin, targeted at the Upscale Panera Mom micro-demographic, to appear below frothing diatribes about annihilating all Muslims.

Twitter is also, speaking just in financial terms, a crummy business. It’s only been profitable for two years of its existence, 2018 and 2019. In 2020 it lost over $1 billion, rebounding to lose a mere $222 million in 2021.

To make matters worse, Musk’s deal to buy Twitter involved taking out $12.5 billion in loans. This means that Twitter will have to come up with an additional $1 billion a year to service this debt.

This is why Musk hit the ground running with a groveling attempt to propitiate advertisers. He absolutely must keep them happy.

Thus if Twitter simply continues on its current path, it will lose huge amounts of money indefinitely. But if advertisers get nervous about Musk’s management and flee the platform, it could see losses every year in the multiple billions of dollars.

It’s true that Musk has said, “I don’t care about the economics at all.” But even as the richest man on earth, he has to care about them. He has a current estimated net worth of $220 billion, but that’s not $220 billion in cash sitting in a bank vault — it’s mostly tied up in his stakes in Tesla and SpaceX.

Thus to cover big Twitter losses, he would have to sell off more of his stock every year. This would be painful in monetary terms but more so in terms of power: Eventually he would get into a situation in which he could lose control of the companies, Tesla in particular. Moreover, Tesla is publicly traded, and while it’s fallen 45 percent since its high a year ago, it remains way overvalued by normal metrics. Right now its price-earnings ratio is 70. The historical average for the S&P 500 is about 15. The price-earnings ratio for both Ford and GM right now is 6.

This is why Musk hit the ground running with a groveling attempt to propitiate advertisers. He absolutely must keep them happy. As he put it, “Twitter aspires to be the most respected advertising platform in the world that strengthens your brand and grows your enterprise.”

And that’s where the hilarity begins. Musk has engaged in endless paeans to the glory of free speech and the need to end Twitter’s invidious censorship. This clearly isn’t a subject he’s thought deeply about, since he said back in May that Twitter should delete “tweets that are wrong and bad.” Still, his vague pronouncements have given him a legion of right-wing acolytes who feel they’ve been ill-treated by Twitter.

But they are not Musk’s constituency now. Advertisers are. Even if Musk had some genuine commitment to free speech (which he absolutely does not), it would be essentially impossible for him not to continue significant content moderation.

That’s why, after a brief nod to his wish for Twitter to be a place “where a wide range of beliefs can be debated in a healthy manner,” he quickly pivoted to telling advertisers that “Twitter obviously cannot be a free-for-all hellscape, where anything can be said with no consequences! In addition to adhering to the laws of the land, our platform must be warm and welcoming to all.”

This could have been the mission statement of pre-Musk Twitter. But now there’s one big difference: When the content moderation of Twitter remains largely the same, the sense of betrayal among Musk’s super-fans will explode with the force of a supernova. And they will scream at Musk about it nonstop — on Twitter.

Another mogul might have the fortitude to ignore this. But Musk does not, judging by past performance. You can also judge this by current performance: On his first full day on the job, Musk is personally “digging in” to the complaints of Catturd ™.

And while Musk has announced a new “content moderation council with widely diverse viewpoints,” he will feel constantly compelled to either explain why he’s standing by his underlings’ moderation decisions, or reverse them. Then he will inevitably be drawn into personally making more and more content calls, perhaps giving the thumbs up or thumbs down to individual tweets.

It will be hell on earth for him. No matter what decisions he makes, he will infuriate large swaths of Twitter. The left will see its suspicions about him confirmed. The right will see him as a horrendous sellout, just another lying Big Tech swine. Joe Rogan will shake his head sadly about what happened to Elon. Eventually what used to give Musk the greatest pleasure, opening up Twitter on his phone, will be a source of excruciating pain.

And that’s just the beginning. Musk has important business interests around the world, and the potential riptides are endless. What happens when Kim Kardashian starts tweeting about how Taiwan is an independent country? Will the government of China quietly suggest to Musk that he do something about this, or will they make things hard for Tesla’s Shanghai plant and block the import of Teslas? What do other Tesla shareholders do if he defies China, and they find out his little bird app adventure is losing them money? What happens when a SpaceX rocket explodes, but Musk has been too busy adjudicating which Nazi furries are going to be suspended for a month?

This future is obviously not foreordained. Possibly Musk will do what no human has ever be able to do before and invent 1) content moderation that everyone likes at an enormous scale, and 2) a way to make huge amounts of money off Twitter. Maybe Tesla will become so profitable that he can use it to subsidize Twitter until 2090. But the most likely outcome is that he’s just asked the monkey’s paw to grant him his greatest wish. Now look as the paw crooks its gnarled finger, and Musk’s love for Twitter ends up obliterating the Twitter experience for one specific user: Elon Musk.


This content originally appeared on The Intercept and was authored by Jon Schwarz.

]]>
https://www.radiofree.org/2022/10/28/by-buying-twitter-elon-musk-has-created-his-own-hilarious-nightmare/feed/ 0 346226
A NASA satellite launched to detect dust has discovered huge methane leaks https://grist.org/technology/a-nasa-satellite-launched-to-detect-dust-has-discovered-huge-methane-leaks/ https://grist.org/technology/a-nasa-satellite-launched-to-detect-dust-has-discovered-huge-methane-leaks/#respond Fri, 28 Oct 2022 10:15:00 +0000 https://grist.org/?p=592938 On the evening of July 14, NASA launched the Earth Surface Mineral Dust Source Investigation, or EMIT, 250 miles up to perch on the International Space Station. With the satellite’s speed in equilibrium with the Earth’s gravitational pull, the instrument took off into orbit and has been circling our planet once every 90 minutes ever since.

EMIT belongs to a category of equipment known as spaceborne imaging spectrometers and was designed to examine how flurries of airborne, mineral dust on the Earth’s surface affect temperature changes across the globe.

In the three and a half months following EMIT’s launch, the tool has not only successfully mapped out massive dust plumes and their effect on the changing climate, but has also identified another key piece to the global warming puzzle: more than 50 methane “super-emitters,” some of which had previously gone unseen. 

Methane, a powerful greenhouse gas, is a byproduct of decomposing organic material and the leading component of natural gas — the fuel used in power plants as well as in heating and cooking appliances in buildings. In the 20 years after release, methane is estimated to be 80 to 90 times more effective at trapping heat in the atmosphere than carbon dioxide. In 2021, the amount of methane in the atmosphere soared to the highest level on record. And super-emitters — oil fields, pipelines, landfills, animal feedlots, and other facilities that emit methane at unusually high rates — are a major part of the problem. Researchers have estimated that super-emitters account for between 8 and 12 percent of all methane emissions from the oil and gas sector.

The super-emitters that EMIT identified included oil and gas infrastructure east of the port city of Hazar, Turkmenistan, emitting methane at a rate of 111,000 pounds per hour. Off of Carlsbad, New Mexico, the apparatus detected a previously unidentified 2-mile-long plume rising from the Permian Basin, one of the largest oilfields in the world. A waste-processing complex in Iran, also previously unknown to scientists, was found to emit an estimated 18,700 pounds of methane per hour.

Scientists at NASA aren’t the only ones using satellites to track methane leaks. A French geoanalytics company called Kayrros SAS uses a combination of satellite data and algorithms to identify super-emitter sites. In February, researchers from Kayrros and various climate institutions announced that they had used satellite instruments to identify more than 1,800 major releases of methane globally in 2019 and 2020.

While carbon dioxide lingers in the atmosphere for hundreds of years, methane breaks down after about a decade. Due to this timeframe of atmospheric response, a deceleration in the rate of global warming could come to fruition relatively swiftly if the world confronts its methane emissions.  

Last fall, during the annual United Nations climate conference in Scotland, the United States and European Union announced the Global Methane Pledge, an international initiative aiming to slash the world’s methane emissions by 30 percent by the end of this decade. More than 100 countries have signed onto the pledge. Researchers say that slowing methane emissions can be achieved at relatively low cost — for instance, by requiring oil and gas companies to repair leaky equipment and forbidding them from intentionally venting methane into the air. Improving livestock manure management and plugging abandoned oil and gas wells are other strategies that could yield major benefits.

NASA hopes that EMIT can be part of those solutions. “Reining in methane emissions is key to limiting global warming,” NASA administrator Bill Nelson said in a statement. “This exciting new development will not only help researchers better pinpoint where methane leaks are coming from, but also provide insight on how they can be addressed — quickly.” 

This story was originally published by Grist with the headline A NASA satellite launched to detect dust has discovered huge methane leaks on Oct 28, 2022.


This content originally appeared on Grist and was authored by Avery Schuyler Nunn.

]]>
https://grist.org/technology/a-nasa-satellite-launched-to-detect-dust-has-discovered-huge-methane-leaks/feed/ 0 345940
Iran’s Secret Manual for Tracking and Controlling Protesters’ Mobile Phones https://www.radiofree.org/2022/10/28/irans-secret-manual-for-tracking-and-controlling-protesters-mobile-phones/ https://www.radiofree.org/2022/10/28/irans-secret-manual-for-tracking-and-controlling-protesters-mobile-phones/#respond Fri, 28 Oct 2022 04:01:09 +0000 https://theintercept.com/?p=411344

Read this story in Persian

As furious anti-government protests swept Iran, the authorities retaliated with both brute force and digital repression. Iranian mobile and internet users reported rolling network blackouts, mobile app restrictions, and other disruptions. Many expressed fears that the government can track their activities through their indispensable and ubiquitous smartphones.

Iran’s tight grip on the country’s connection to the global internet has proven an effective tool for suppressing unrest. The lack of clarity about what technological powers are held by the Iranian government — one of the most opaque and isolated in the world — has engendered its own form of quiet terror for prospective dissidents. Protesters have often been left wondering how the government was able to track down their locations or gain access to their private communications — tactics that are frighteningly pervasive but whose mechanisms are virtually unknown.

“This is not a surveillance system but rather a repression and control system to limit the capability of users to dissent or protest.”

While disconnecting broad swaths of the population from the web remains a favored blunt instrument of Iranian state censorship, the government has far more precise, sophisticated tools available as well. Part of Iran’s data clampdown may be explained through the use of a system called “SIAM,” a web program for remotely manipulating cellular connections made available to the Iranian Communications Regulatory Authority. The existence of SIAM and details of how the system works, reported here for the first time, are laid out in a series of internal documents from an Iranian cellular carrier that were obtained by The Intercept.

According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks, providing its operators a broad menu of remote commands to alter, disrupt, and monitor how customers use their phones. The tools can slow their data connections to a crawl, break the encryption of phone calls, track the movements of individuals or large groups, and produce detailed metadata summaries of who spoke to whom, when, and where. Such a system could help the government invisibly quash the ongoing protests — or those of tomorrow — an expert who reviewed the SIAM documents told The Intercept.

Iran’s Mobile Surveillance
  • Evidence of Iran’s cyber crackdown is everywhere, but little is known about its methods.
  • A software program imposed on Iranian mobile companies allows the government direct access.
  • SIAM allows mobile operators to track users’ locations and restrict their data usage.
  • A function called “Force2GNumber” targets individual users for slower speeds that are susceptible to surveillance.

“SIAM can control if, where, when, and how users can communicate,” explained Gary Miller, a mobile security researcher and fellow at the University of Toronto’s Citizen Lab. “In this respect, this is not a surveillance system but rather a repression and control system to limit the capability of users to dissent or protest.”

SIAM gives the government’s Communications Regulatory Authority — Iran’s telecommunications regulator — turnkey access to the activities and capabilities of the country’s mobile users. “Based on CRA rules and regulations all telecom operators must provide CRA direct access to their system for query customers information and change their services via web service,” reads an English-language document obtained by The Intercept. (Neither the CRA nor Iran’s mission to the United Nations responded to a requests for comment.)

The SIAM documents are drawn from a trove of internal materials from the Iranian cellular carrier Ariantel, including years of email correspondence and a variety of documents shared between Ariantel employees, outside contractors, and Iranian government personnel. The cache of materials was shared with The Intercept by an individual who claimed to have hacked Ariantel, and believed the documents were in the public interest given the ongoing protests in Iran and the threat SIAM might pose to demonstrators. (Ariantel did not respond to a request for comment.)

The details of the program reported here are drawn largely from two documents contained in the archive. The first is a Persian-language user manual for SIAM that appears to have originated from within the Office of Security of Communications Systems, or OSCS, a subdivision of the CRA. Emails reviewed by The Intercept show that this SIAM manual was sent to Ariantel directly by the CRA and repeatedly forwarded between the mobile carrier’s employees in recent years. The emails show that the CRA and Ariantel discussed SIAM as recently as August. The second document, produced during a proposed deal with a Spanish telecom contractor, is an English-language manual that documents many of the same SIAM capabilities. Miller told The Intercept that the English SIAM manual appeared to be written by a person or people with specialized technical knowledge of mobile networks.

Experts on mobile security and Iranian government censorship say the functionality revealed by the SIAM program poses a clear threat to protesters demonstrating against the government over the past month.

“These functions can lead to life-and-death situations in a country like Iran, where there is no fair judicial process, no accountability, and we have a huge pattern of violations of people’s rights,” said Amir Rashidi, an internet security and digital rights expert focused on Iran. “Using the tools outlined in this manual could not only lead to mass surveillance and violations of privacy — it can also easily be used to identify the location of protesters who are literally risking their lives to fight for their basic rights.”

ONTARIO, CANADA - 2022/09/23: A sticker saying "Iran: The internet is down and they are killing the people" seen on the back of a road sign during the demonstration. Hundreds gathered to honour Mahsa Amini and to protest against the Iranian government in Toronto, Canada. (Photo by Katherine Cheng/SOPA Images/LightRocket via Getty Images)

A sticker that reads “Iran: The internet is down and they are killing the people” is seen on the back of a road sign during a demonstration where hundreds gathered to honor Mahsa Amini and to protest against the Iranian government, on Sept. 23, 2022, in Toronto.

Photo: Katherine Cheng/SOPA/LightRocket via Getty Images


Iranians regularly complain of slowed internet access on mobile devices during periods of protest — an abrupt dip in service that makes smartphone usage difficult if not impossible at moments when such a device could be crucial. Based on the manuals, SIAM offers an effortless way to throttle a phone’s data speeds, one of roughly 40 features included in the program. This ability to downgrade users’ speed and network quality is particularly pernicious because it can not only obstruct one’s ability to use their phone, but also make whatever communication is still possible vulnerable to interception.

Referred to within SIAM as “Force2GNumber,” the command allows a cellular carrier to kick a given phone off substantially faster, more secure 3G and 4G networks and onto an obsolete and extremely vulnerable 2G connection. Such a network downgrade would simultaneously render a modern smartphone largely useless and open its calls and texts to interception — both of obvious utility to a government clamping down on public gatherings and speech.

While not directly mentioned in the manuals, downgrading users to a 2G connection could also expose perilously sensitive two-factor authentication codes delivered to users through SMS. The Iranian government has previously attempted to undermine two-factor authentication, including through malware campaigns targeting dissidents.

“Generally speaking, forcing a phone to use the 2G network would still allow the phone to receive a two-factor SMS authentication message because SMS is sent over the mobile signaling network,” explained Miller. “However, the effect of forcing a user onto the 2G network, more importantly, would essentially render the corresponding real-time application services such as P2P communication, social media, and internet useless.”

While current 5G and 4G cellular connections have more robust built-in encryption systems to thwart eavesdropping, the 2G cellular standard, first introduced in 1991, generally does not encrypt data or uses outdated encryption methods that are easy to crack. Law enforcement agencies in the United States have also employed this technique, using hardware like the controversial “stingray” device to create a bogus 2G network blanketing a small area and then trick targeted phones into connecting to it.

Miller pointed out that the target of a 2G downgrade might experience the attack as little more than spotty cell reception. “It can be viewed as a method to appear as if the network is congested and severely limit a user’s data services,” Miller said.

Slowing connectivity is only one of many telecom tools available to Ariantel — and the CRA — that could be used to monitor political dissent. SIAM also provides a range of tools to track the physical locations of cell users, allowing authorities to both follow an individual’s movements and identify everyone present at a given spot. Using the “LocationCustomerList” command allows SIAM operators to see what phone numbers have connected to specified cell towers along with their corresponding IMEI number, a unique string of numbers assigned to every mobile phone in the world. “For example,” Miller said, “if there is a location where a protest is occurring, SIAM can provide all of the phone numbers currently at that location.”

SIAM’s tracking of unique device identifiers means that swapping SIM cards, a common privacy-preserving tactic, may be ineffective in Iran since IMEI numbers persist even with a new SIM, explained a network security researcher who reviewed the manuals and spoke on the condition of anonymity, citing their safety.

SIAM’s location-tracking power is particularly alarming given the high-stakes protests taking place across Iran. The Intercept reviewed undated text messages sent to Iranian mobile phone users from local police in the city of Isfahan informing them that they had been confirmed to have been in a location of “unrest” and warning them not to attend in the future. Many Iranian social media users have reported receiving similar messages in recent weeks, warning them to stay away from the scene of protests or from associating with “anti-revolutionary” opponents of the government online.

Armed with a list of offending phone numbers, SIAM would make it easy for the Iranian government to rapidly drill down to the individual level and pull a vast amount of personal information about a given mobile customer, including where they’ve been and with whom they’ve communicated. According to the manuals, user data accessible through SIAM includes the customer’s father’s name, birth certificate number, nationality, address, employer, billing information, and location history, including a record of Wi-Fi networks and IP addresses from which the user has connected to the internet.

While much of Iran’s surveillance capacity remains shrouded in mystery, details about the SIAM program contained in the Ariantel archive provide a critical window into the types of tools the Iranian government has at its disposal to monitor and control the internet, as it confronts what may be the greatest threat to its rule in decades.

“These documents prove something that we have long suspected, which is that even devices that use encryption for messaging are still vulnerable because of the nature of internet infrastructure in Iran,” said Mahsa Alimardani, a senior researcher with the internet freedom organization Article 19. “Security measures like two-factor identification using text messages still depend on telecommunications companies connected to the state. Average internet users are forced to connect through nodes controlled by these companies, and their centralization of authority with the government makes users vulnerable to insidious types of surveillance and control.”

TEHRAN, IRAN - SEPTEMBER 19: People gather during a protest for Mahsa Amini, who died after being arrested by morality police allegedly not complying with strict dress code in Tehran, Iran on September 19, 2022. (Photo by Stringer/Anadolu Agency via Getty Images)

People gather during a protest for Mahsa Amini, who died after being arrested by morality police for allegedly not complying with strict dress code, in Tehran, Iran, on Sept. 19, 2022.

Photo: Stringer/Anadolu Agency via Getty Images


The latest round of protests in Iran kicked off in mid-September, after a young woman named Mahsa Jina Amini was killed while in the custody of the country’s notorious morality police, following her arrest for wearing her mandatory head covering improperly. While the movement originated with women opposing the brutality of hijab enforcement, anti-government outrage quickly spread among Iran’s youth, from universities to secondary schools across the country. The government’s crackdown took a variety of shapes, including brute force, with security services in riot gear squaring off with demonstrators in the street and a quieter effort to shut down civilian communications.

Internet shutdowns have by now become a familiar tool of political control in the hands of the Iranian government and other states. A violent Iranian crackdown against protests over fuel prices in November 2019 was accompanied by a nationwide shutdown lasting nearly a week, the first-ever use of an internet blackout to isolate an entire country. That shutdown severed tens of millions of people from the global internet. It was a chilling demonstration of the broad technical powers that Iranian authorities had quietly engineered.

The CRA is known to play an integral role in filtering Iran’s internet access. In 2013, the agency was among a list of Iranian government entities sanctioned by the U.S. Treasury Department for its role in the “blockage of hundreds of public Internet websites” around the time of the disputed 2009 Iranian presidential election. The agency’s powers are believed to have grown since then, as the Iranian government has embraced the concept of “internet sovereignty” as a means of social control. A report on the November 2019 cyber crackdown by Article 19 found that the shutdowns were carried out in large part by officials from the CRA ordering internet service providers to shut down during the unrest.

The Iranian government has long viewed internet freedom as a national security issue and has taken steps to securitize Iranians’ online access. As in the United States, where the National Security Agency has used government secrecy and legal coercion to turn the telecom and data sectors into intelligence-gathering tools, the Iranian state compels communications networks to give the government access through required hardware and software. In Iran, where the autocratic reach of central government leadership touches nearly every aspect of the state without even superficial democratic oversight, the powers afforded by this integration are far greater and far more draconian in consequence.

Part of this effort has included directly assigning Iranian intelligence personnel to government bodies tasked with internet regulation, like the CRA. The Article 19 report notes the close personnel relationship between the CRA’s OSCS division and Iran’s Ministry of Intelligence.

Though Iranians have complained of slowed data connections and total internet blackouts at times, the telecom crackdown has consequences beyond losing one’s connection. Demonstrators have reported visits from government authorities at their homes, where the agents were armed with specific knowledge of their whereabouts and activities, such as when they were using their phones to record video.

While some of what SIAM does is benign and required for administrating any cellular network, Miller, the Citizen Lab researcher, explained that the scope of the system and the Iranian government’s access to it is not. While most countries allow law enforcement and security agencies to legally obtain, intercept, and analyze cellular communications, the surveillance and control powers afforded by SIAM are notable in their scale and degree, said Miller: “The requests by CRA go well beyond traditional lawful intercept requirements, at least in non-repressive countries.”

SIAM allows its operators to learn a great deal not just about where a customer has been, but also what they’ve been up to, a bounty of personal data that, Miller said, “can enable CRA to create a social network/profile of the user based on his/her communication with other people.”

“Controlling user communications is a massive violation of basic and fundamental human rights.”

By entering a particular phone number and the command “GetCDR” into SIAM, a system user can generate a comprehensive Call Detail Record, including the date, time, duration, location, and recipients of a customer’s phone calls during a given time period. A similar rundown can be conducted for internet usage as well using the “GetIPDR” command, which prompts SIAM to list the websites and other IP addresses a customer has connected to, the time and date these connections took place, the customer’s location, and potentially the apps they opened. Such a detailed record of internet usage could also reveal users running virtual private networks, which are used to cover a person’s internet trail by routing their traffic through an encrypted connection to an outside server. VPNs — including some banned by the government — have become tremendously popular in Iran as a means of evading domestic web censorship.

Though significantly less subtle than being forced onto a 2G network, SIAM can also be used to entirely pull the plug on a customer’s device at will. Through the “ApplySuspIp” command, the system can entirely disconnect any mobile phone on the network from the internet for predetermined lengths of time or permanently. Similar commands would let SIAM block a user from placing or receiving calls.

Rashidi, the internet security expert, said participants in the recent demonstrations, as well as Iranians living near scenes of protest, have reported internet shutdowns targeting their mobile devices that have downgraded phones to 2G access, particularly during the late afternoons and evenings when many demonstrations occur.

Rashidi said the widespread use of VPNs in Iran represents another vulnerability the SIAM system could exploit. The program makes it possible to check particular IP addresses against particular VPNs and thereby deduce the identities and locations of the users accessing them. “The government can easily identify IP addresses in use by a particular VPN provider, pass the addresses to this location function, and then see where the people are who are using this VPN,” said Rashidi.

Although the documents don’t mention SIAM’s use against protesters or any other specific target, Miller said the functionality matches what he’s observed in this and other digital crackdowns in Iran. “CRA has defined rules and regulations to provide direct access to mobile operators’ system, and SIAM is a means to this end,” he said. “If all telecom operators in Iran are required to provide the CRA with SIAM or similar direct access, they could, in effect have complete control over all user mobile communications throughout the country. Controlling user communications is a massive violation of basic and fundamental human rights.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/10/28/irans-secret-manual-for-tracking-and-controlling-protesters-mobile-phones/feed/ 0 345814
Agri Biotech Sector Motivated by Monopoly Control and Sacred GMO Cash Cow  https://www.radiofree.org/2022/10/26/agri-biotech-sector-motivated-by-monopoly-control-and-sacred-gmo-cash-cow/ https://www.radiofree.org/2022/10/26/agri-biotech-sector-motivated-by-monopoly-control-and-sacred-gmo-cash-cow/#respond Wed, 26 Oct 2022 12:42:06 +0000 https://dissidentvoice.org/?p=134778 We are currently seeing rising food prices due to a combination of an engineered food crisis for geopolitical reasons, financial speculation by hedge funds, pension funds and investment banks and profiteering by global grain trade conglomerates like Cargill, Louis Dreyfus, ADM and Bunge. In addition, agri firms like Bayer, Syngenta (ChemChina) and Corteva cynically regard current circumstances as an opportunity to promote their […]

The post Agri Biotech Sector Motivated by Monopoly Control and Sacred GMO Cash Cow  first appeared on Dissident Voice.]]>
We are currently seeing rising food prices due to a combination of an engineered food crisis for geopolitical reasons, financial speculation by hedge funds, pension funds and investment banks and profiteering by global grain trade conglomerates like Cargill, Louis Dreyfus, ADM and Bunge.

In addition, agri firms like Bayer, Syngenta (ChemChina) and Corteva cynically regard current circumstances as an opportunity to promote their agenda and seek commercialisation of unregulated and improperly tested genetically engineered (GE) technologies.

These companies have long promoted the false narrative that their hybrid seeds and their GE seeds, along with their agrichemicals, are essential for feeding a growing global population. This agenda is orchestrated by vested interests and career scientists – many of whom long ago sold their objectivity for biotech money – lobby groups and disgraced politicians and journalists.

Meanwhile, in an attempt to deflect and sway opinion, these industry shills also try to depict their critics as being Luddites and ideologically driven and for depriving the poor of (GE) food and farmers of technology.

This type of bombast disintegrates when confronted with the evidence of a failing GE project.

As well as this kind of emotional blackmail, prominent lobbyists like Mark Lynas – unable or unwilling to acknowledge that genuine food security and food sovereignty can be achieved without proprietary products – trot out other baseless and absurd claims that industry critics are Kremlin stooges, while displaying their ignorance of geopolitics.

Indeed, who would you turn to for an analysis of current US-Russia relations? An advocate for GE foods and pesticides who makes inaccurate claims from his perch at the Gates Foundation-funded Cornell Alliance for Science. Or a renowned academic like Professor Michael Hudson whose specialist field covers geopolitics.

But it would not be the first time that an industry activist like Lynas has ventured beyond his field of claimed expertise to try to score points.

However, dirty tricks and smears are par for the course because the agri biotech emperor has been shown to have no clothes time and again – GE is a failing, often detrimental technology in search of a problem. And if the problem does not exist, the reality of food insecurity will be twisted to serve the industry agenda, and regulatory bodies and institutions supposedly set up to serve the public interest will be placed under intense pressure or subverted.

The performance of GE crops has been a hotly contested issue and, as highlighted in a 2018 piece by PC Kesavan and MS Swaminathan in the journal Current Science, there is sufficiently strong evidence to question their efficacy and the devastating impacts on the environment, human health and food security, not least in places like Latin America.

new report by Friends of the Earth (FoE) Europe shows that big global biotech corporations like Bayer and Corteva, which together already control 40% of the global commercial seed market, are now trying to cement complete dominance. Industry watchdog GMWatch notes these companies are seeking to increase their control over the future of food and farming by extensively patenting plants and developing a new generation of genetically modified organisms (GMOs).

These companies are moving to patent plant genetic information that can occur naturally or as a result of genetic modification. They claim all plants with those genetic traits as their “invention”.  Such patents on plants would restrict farmers’ access to seeds and impede breeders from developing new plants as both would have to ask for consent and pay fees to the biotech companies.

Corteva has applied for some 1,430 patents on new GMOs, while Bayer has applications for 119 patents.

Mute Schimpf, food campaigner at Friends of the Earth Europe, says:

Big biotech’s strategy is to apply for wide patents that would also cover plants which naturally present the same genetic characteristics as the GMOs they engineered. They will be lining their pockets from farmers and plant breeders, who in turn will have a restricted access to what they can grow and work with.

For instance, GMWatch notes that Corteva holds a patent for a process modifying the genome of a cell using the CRISPR technique and claims the intellectual property rights to any cells, seeds and plants that include the same genetic information, whether in broccoli, maize, soy, rice, wheat, cotton, barley or sunflower.

The agri biotech sector is engaged in a corporate hijack of agriculture while attempting to portray itself as being involved in some kind of service to humanity.

And this is a global endeavour, which is also currently being played out in India.

GM mustard 

recent report on the Down to Earth website stated that the Genetic Engineering Appraisal Committee (GEAC), India’s apex regulatory body, might approve the commercial cultivation of GM mustard. In response, concerned citizens have written to the government, objecting to the potential approval of unsafe, unneeded and unwanted GMOs.

The decision whether to allow the commercialisation of what would be the first GE food crop in India has been dragging on for years. COVID delayed the process, but a decision on GM mustard now appears to be close.

However, serious conflicts of interest, sleight of hand and regulatory delinquency – not to mention outright fraud – could mean the decision coming down in favour of commercialisation.

The bottom line is government collusion with global agribusiness, which is trying to hide in the background, despite much talk of Professor Pental and his team at Delhi University being independent developers of GM mustard (DMH 11).

GM mustard presents an opportunity to make various herbicide tolerant (HT) mustard hybrids using India’s best germ plasm, which would be an irresistible money spinner for the seed and chemical manufacturers.

In 2016, campaigner Aruna Rodrigues petitioned India’s Supreme Court seeking a moratorium on the release of any GMOs into the environment pending a comprehensive, transparent and rigorous biosafety protocol in the public domain conducted by agencies of independent expert bodies, the results of which are made public.

In her writ, Rodrigues stated:

In 2002, Proagro Seed Company (now Bayer), applied for commercial approval for exactly the same construct that Prof Pental and his team are now promoting as HT Mustard DMH 11. The reason today matches Bayer’s claim then of 20% better yield increase (than conventional mustard). Bayer was turned down because the ICAR [Indian Council of Agricultural Research] said that their field trials did not give evidence of superior yield.

The petition says that 14 years later invalid field trials and unremittingly fraudulent data now supposedly provide evidence of a superior yield of 25%.

Rodrigues continues:

HT DMH 11 is the same Bayer HT GMO construct – a herbicide tolerant GMO of three alien genes. It employs, like the Bayer construct, pollen sterilisation technology BARNASE, with the fertility restorer gene BARSTAR (B & B system) (modified from the original genes sourced from a soil bacterium) and the herbicidal bar gene in each GMO parental line. The employment of the B & B system is to facilitate the making of hybrids as mustard is largely a self-pollinating crop (but outcrosses at rates of up to 20%). There is no trait for yield. HT DMH 11 is straightforwardly an herbicide tolerant (HT) crop, though this aspect has been consistently marginalised by the developers over the last several years.

In order to produce a hybrid, two parent lines had to be genetically modified. Barnase and barstar technology was used in the parent lines. And the outcome is three GMOs: the two parents and the offspring, DMH 11, which will be ideal for working with glufosinate (Bayer’s ‘Liberty’ and ‘Basta’).

According to Rodrigues:

… the plan is that the official route for the first-time release of a HT crop and a food crop will be through HT DMH 11 and/or its two HT parental lines by stealth. Since the claimed YIELD superiority of HT DMH 11 through the B & B system over non-GMO varieties and hybrids is quite simply NOT TRUE…

In her numerous affidavits submitted to India’s Supreme Court, Rodrigues has set out in some detail why GE crops are a threat to human health and the environment and are unsuitable for India. She briefly communicated some of her concerns in a 2020 interview titled GMO Issue Reaches Boiling Point in India: Interview with Aruna Rodrigues.

Moreover, various high-level reports have advised against introducing GM food crops to India: The ‘Jairam Ramesh Report’ of February 2010, imposing an indefinite moratorium on Bt Brinjal; The ‘Sopory Committee Report’ (August 2012); The ‘Parliamentary Standing Committee’ (PSC) Report on GM crops (August 2012); and The ‘Technical Expert Committee (TEC) Final Report’ (June-July 2013).

These reports conclude that GM crops are unsuitable for India and that existing biosafety and regulatory procedures are inadequate. Appointed by the Supreme Court, the TEC was scathing about the regulatory system prevailing in India, highlighting its inadequacies and inherent serious conflicts of interest. The TEC recommended a 10-year moratorium on commercial release of GM crops. The PSC also arrived at similar conclusions.

According to eminent lawyer Prashant Bhushan, these official reports attest to just how negligent India’s regulators are and to a serious lack of expertise on GM issues within official circles.

Aruna Rodrigues long ago noted the abysmal state of GMO regulatory oversight in the country and the need for the precautionary principle to be applied without delay. But not much has changed and the regulatory position basically remains the same.

Rodrigues asserts that the two parent lines and the hybrid DMH-11 require full independent testing, which has not occurred. And it has not occurred because of a conflict of interest and regulatory delinquency.

Rodrigues notes:

India is suddenly faced with the deregulation of GMOs. This is disastrous and alarming, without ethics and a scientific rationale.

GM mustard is said to out-yield India’s best cultivars by 25-30%. The choice of the correct ‘comparators’ is an absolute requirement for the testing of any GMO to establish whether it is required in the first place. But Rodrigues argues that the choice of deliberately poor ‘comparators’ is at the heart of the fraud.

In the absence of adequate and proper testing and sufficient data, no statistically valid conclusions of mean seed yield (MSY) of DMH 11 could be drawn anyhow. Yet they were drawn by both the regulators and developers who furthermore self-conducted and supervised the trials. Without valid data to justify it, DMH 11 was allowed in pre-commercial large scale field trials in 2014-15.

For an adequate basis for a comparative assessment of MSY, Rodrigues argues it was absolutely necessary for the comparison to include the cross (hybrid) between the non-modified parental lines (nearest isogenic line), at the very start of the risk assessment process and throughout the subsequent stages of field testing, in addition to other recommended ‘comparators’. None of this was done.

Deliberately poor non-GMO mustard varieties were chosen to promote prospects for DMH 11 as a superior yielding GMO hybrid, which then passed through ‘the system’ and was allowed by the regulators, a classic non-sequitur by both the regulators and Dr Pental.

The fraud continued, according to Rodrigues, by actively fudging yield data of DMH 11 by 15.2% to show higher MSY. In her various Supreme Court petitions, she has offered a good deal of evidence to show how it was done.

Rodrigues says:

It matters not a jot if HT DMH 11 is not approved. What does matter is that its two HT (GMO) parental lines are: HT Varuna-barnase and HT EH 2-barstar will be used ‘for introgressing the bar-barnase and bar- barstar genes into new set of parental line to develop next generation of hybrids with higher yields” (according to the developer and regulator).

She says this extraordinary admission confirms that the route to any number of ‘versions’ of HT mustard DMH 11 is invested in these two GMOs as parents – India will have hundreds of low-yielding HT mustard hybrids, using India’s best mustard cultivars at great harm to farmers and contaminating the country’s seeds and mustard germ plasm irreversibly.

In effect, according to Rodrigues, India faces a three-in-one regulatory jugglery in a brazen display of collusion to fraud the nation by regulatory institutions of governance.

Moreover, HT mustard DMH 11 will make no impact on the domestic production of mustard oil, which was a major reason why it was being pushed in the first place. The argument was that GM mustard would increase productivity and this would help reduce imports of edible oils.

Until the mid-1990s, India was virtually self-sufficient in edible oils. Then import tariffs were reduced, leading to an influx of cheap (subsidised) edible oil imports that domestic farmers could not compete with. This effectively devastated the home-grown edible oils sector and served the interests of palm oil growers and US grain and agriculture commodity company Cargill.

It came as little surprise that in 2013 India’s then Agriculture Minister Sharad Pawar accused US companies of derailing the nation’s oil seeds production programme.

Whether in India, Europe or elsewhere, the industry’s agenda is to use GE technology to secure intellectual property rights over all seeds (and chemical inputs) and thus gain total control over food and farming. And given what has been set out here – they seek to achieve this by all means necessary.

The post Agri Biotech Sector Motivated by Monopoly Control and Sacred GMO Cash Cow  first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Colin Todhunter.

]]>
https://www.radiofree.org/2022/10/26/agri-biotech-sector-motivated-by-monopoly-control-and-sacred-gmo-cash-cow/feed/ 0 345018
Fiji academic warns over media ‘climate injustice’ in open access webinar https://www.radiofree.org/2022/10/26/fiji-academic-warns-over-media-climate-injustice-in-open-access-webinar/ https://www.radiofree.org/2022/10/26/fiji-academic-warns-over-media-climate-injustice-in-open-access-webinar/#respond Wed, 26 Oct 2022 10:31:16 +0000 https://asiapacificreport.nz/?p=80393 By David Robie

A Fiji-based academic challenged the Pacific region’s media and policymakers today over climate crisis coverage, asking whether the discriminatory style of reporting was a case of climate injustice.

Associate Professor Shailendra Singh, head of the journalism programme at the University of the South Pacific, said climate press conferences and meetings were too focused on providing coverage of “privileged elite viewpoints”.

“Elites have their say, but communities facing the brunt of climate change have their voices muted,” he told the Look at the Evidence: Climate Journalism and Open Science webinar panel exploring the role of journalism in raising climate awareness in the week-long Open Access Australasia virtual conference.

Dr Singh, who is also on the editorial board of Pacific Journalism Review and was speaking for the recently formed Asia Pacific Media Network (APMN), threw open several questions to the participants about what appeared to be “discriminatory reporting”.

“Is slanted media coverage marginalising grassroots voices? Is this a form of climate injustice?” he asked.

“Are news media unknowingly perpetuating climate injustice?”

He cited many of the hurdles impacting on the ability of Pacific news media to cover the climate crisis effectively, such as lack of resources in small media organisations and lack of reporting expertise.

‘Jack-of-all-trades’
“We are unable to have specialist climate reporters as in some other countries; our journalists tend to be a jack-of-all-trades, and master of none,” he said.

He did not mean this in a “disparaging manner”, saying “it’s just our reality” given limited resources.

Key Pacific media handicaps included:

• The smallness of Pacific media systems;
• Limited revenue and small profit margins;
• A high attrition rate among journalists (mostly due to uncompetitive salaries);
• Pacific journalists “don’t have the luxury” of specialising in one area; and
• No media economies of scale.

“Our journalists don’t build sufficient knowledge in any one topic for consistent or in-depth reporting,” he said. “And this is more deeply felt in areas such as climate reporting.”

He cited recent research on Pacific climate reporting by Samoan climate change journalist Lagipoiva Dr Cherelle Jackson, saying such Pacific media research was “scarce”.

‘Staying afloat in Paradise’
A research fellow with the Reuters Institute and Oxford University, Dr Jackson carried out research on how media in her homeland and six other Pacific countries were covering climate change. The report was titled Staying Afloat in Paradise: Reporting Climate Change in the Pacific.

Pacific journalists and editors “have a responsibility to inform readers on how climatic changes can affect them, she argued. But this did not translate into the pages of their newspapers.

“Climate change is simply not as high a priority for Pacific newsrooms as issues such as health, education and politics which all take precedence over even general environment reporting,” Dr Jackson wrote.

“For a region mainly classified by the United Nations as ‘least developed’ and ‘developing’ countries, it is apparent that there are more pressing issues than climate change.

“But the fact that the islands of the Pacific are already at the bottom end of the scale in regards to wealth and infrastructure, and the fact that climate change is also threatening the mere existence of some islands, should make it a big story. But it isn’t.”

Newsroom's Marc Daalder
Newsroom’s Marc Daalder . . . “we need this [open access] to happen for climate reporting”. Image: Open Access Week 2022 screenshot APR
The Open Access Australasia media panel today also included Newsroom’s Marc Daalder, The Conversation’s New Zealand science editor Veronica Meduna, and Guardian columnist Dr Jeff Sparrow of the University of Melbourne.

Critical of paywalls
Daalder spoke about how open access to scientific papers was vitally important for journalists who needed to read complete papers, not just abstracts. He was critical of the paywalls on many scientific research papers.

Open access enabled journalists to do their job better and this was clearly shown during the covid-19 pandemic — “and we need this to happen for climate reporting”.

Meduna said it took far too long for research, such as on climate change, to filter through into public debate. Open access helped to reduce that gap.

She also said the success of The Conversation model showed that there was a growing demand for scientists communicating directly with the public with the help of journalists.

Dr Sparrow called for a social movement for meaningful action on the climate crisis and more scientific literacy was needed to enable this.

Highly critical of the “dysfunctional” academic publishing industry, he said open access would contribute to “radically accessible” science for the public.

The panel was organised by Tuwhera digital and open access publishing team at Auckland University of Technology.

Open Access Week 2022
Open Access Week 2022 … the media climate webinar panel. Image: Open Access Week screenshot APR


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2022/10/26/fiji-academic-warns-over-media-climate-injustice-in-open-access-webinar/feed/ 0 344984
Company That Makes Rent-Setting Software for Apartments Accused of Collusion, Lawsuit Says https://www.radiofree.org/2022/10/21/company-that-makes-rent-setting-software-for-apartments-accused-of-collusion-lawsuit-says/ https://www.radiofree.org/2022/10/21/company-that-makes-rent-setting-software-for-apartments-accused-of-collusion-lawsuit-says/#respond Fri, 21 Oct 2022 17:10:00 +0000 https://www.propublica.org/article/realpage-accused-of-collusion-in-new-lawsuit by Heather Vogell

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Renters filed a lawsuit this week alleging that a company that makes price-setting software for apartments and nine of the nation’s biggest property managers formed a cartel to artificially inflate rents in violation of federal law.

The lawsuit was filed days after ProPublica published an investigation raising concerns that the software, sold by Texas-based RealPage, is potentially pushing rent prices above competitive levels, facilitating price fixing or both.

The proposed class-action lawsuit was filed in U.S. District Court in San Diego.

In an email, a RealPage representative said that the company “strongly denies the allegations and will vigorously defend against the lawsuit.” She declined to comment further, saying the company does not comment on pending litigation.

The nine property managers named in the lawsuit did not respond immediately to a request for comment.

They included some of the nation’s largest landlords, such as Greystar, Lincoln Property Company, Equity Residential, Mid-America Apartment Communities and FPI Management — which together manage hundreds of thousands of apartments.

Four of the five renters named in the suit were Greystar tenants. A fifth rented from Security Properties. Their apartments were located in San Diego, San Francisco and two Washington state cities, Redmond and Everett.

The lawsuit accused the property managers and RealPage of forming “a cartel to artificially inflate the price of and artificially decrease the supply and output of multifamily residential real estate leases from competitive levels.”

RealPage’s software uses an algorithm to churn through a trove of data each night to suggest daily prices for available rental units. The software uses not only information about the apartment being priced and the property where it is located, but also private data on what nearby competitors are charging in rents. The software considers actual rents paid to those rivals — not just what they are advertising, the company told ProPublica.

ProPublica’s investigation found that the software’s design and reach have raised questions among experts about whether it is helping the country’s biggest landlords indirectly coordinate pricing — potentially in violation of federal law. In one neighborhood in downtown Seattle, ProPublica found, 70% of more than 9,000 apartments were controlled by just 10 property managers, who all used RealPage pricing software in at least some of their buildings.

RealPage told ProPublica that the company “uses aggregated market data from a variety of sources in a legally compliant manner.”

The company also said that landlords who use employees to manually set prices “typically” conduct phone surveys to check competitors’ rents, which the company says could result in anti-competitive behavior.

“RealPage’s revenue management solutions prioritize a property’s own internal supply/demand dynamics over external factors such as competitors’ rents,” a company statement said, “and therefore help eliminate the risk of collusion that could occur with manual pricing.”

The lawsuit said that RealPage’s software helps stagger lease renewals to artificially smooth out natural imbalances in supply and demand, which discourages landlords from undercutting pricing achieved by the cartel. Property managers “thus held vacant rental units unoccupied for periods of time (rejecting the historical adage to keep the ‘heads in the beds’) to ensure that, collectively, there is not one period in which the market faces an oversupply of residential real estate properties for lease, keeping prices higher,” it said. Such staggering helped the group avoid “a race to the bottom” on rents, the lawsuit said.

RealPage brags that clients — who agree to provide RealPage real-time access to sensitive and nonpublic data — experience “rental rate improvements, year over year, between 5% and 12% in every market,” the lawsuit said.

RealPage encourages property companies to have daily calls with a RealPage pricing adviser and discourages deviating from the rent price suggested by the software, the lawsuit said.

The lawsuit was filed by four law firms and a nonprofit, Justice Catalyst Law, dedicated to developing cases and legal strategies that advance economic and social justice. Gary Smith Jr., one of the lawyers involved, said the investigation into the case had been going on for more than a year.

“Today’s lawsuit plausibly alleges that Lessors of rental units have coordinated to drive rents up to unprecedented levels, exacerbating the nation’s affordable housing crisis,” Smith said in a media release.

RealPage counts some of the largest property managers in the country among its clients. Many favor cities where rent has been rising rapidly, according to a ProPublica analysis of five of the country’s top 10 property managers as of 2020. All five use RealPage pricing software in at least some buildings, and together they control thousands of apartments in metro areas such as Denver; Nashville, Tennessee; Atlanta and Seattle, where rents for a typical two-bedroom apartment rose 30% or more between 2014 and 2019.

Greystar and FPI Management each control hundreds of buildings in metro areas where rents have risen steeply in recent years. And Equity Residential, Lincoln Property Company and Mid-America Apartment Communities each manage dozens of buildings in high-growth markets.

RealPage’s clients may gravitate toward high rent-growth markets for several reasons. For instance, tenants in those areas will bear more rent hikes and so offer an opportunity to landlords to make more money.

But, RealPage says its software, formerly known as YieldStar, steers pricing that beats the market in areas where it operates.

“Find out how YieldStar can help you outperform the market 3% to 7%,” RealPage urges potential clients on its website.

Haru Coryne and Ryan Little contributed data analysis.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Heather Vogell.

]]>
https://www.radiofree.org/2022/10/21/company-that-makes-rent-setting-software-for-apartments-accused-of-collusion-lawsuit-says/feed/ 0 343746
Digital technology, social media fuelling hate speech like never before, warns UN expert https://www.radiofree.org/2022/10/20/digital-technology-social-media-fuelling-hate-speech-like-never-before-warns-un-expert/ https://www.radiofree.org/2022/10/20/digital-technology-social-media-fuelling-hate-speech-like-never-before-warns-un-expert/#respond Thu, 20 Oct 2022 13:12:29 +0000 https://news.un.org/feed/view/en/audio/2022/10/1129712 Propaganda and disinformation are nothing new in war, but digital technology and social media are fuelling it like never before, creating an ‘extremely dangerous’ situation in Ukraine and other warzones, for vulnerable civilians exercising their rights.

That’s according to the independent UN human rights expert on freedom of opinion and expression, Irene Khan, who tells us the “information blackout” inside Russia itself has wiped out any news independent of the State, offering encouragement to other aggressors around the world.

The UN News Russian service’s Nargiz Shekinskaya began by asked Special Rapporteur Khan if she saw any common themes in how information is being abused in warzones across the world today.


This content originally appeared on UN News - Global perspective Human stories and was authored by Nargiz Shekinskaya.

]]>
https://www.radiofree.org/2022/10/20/digital-technology-social-media-fuelling-hate-speech-like-never-before-warns-un-expert/feed/ 0 343339
How the FBI Stumbled in the War on Cybercrime https://www.radiofree.org/2022/10/18/how-the-fbi-stumbled-in-the-war-on-cybercrime/ https://www.radiofree.org/2022/10/18/how-the-fbi-stumbled-in-the-war-on-cybercrime/#respond Tue, 18 Oct 2022 09:00:00 +0000 https://www.propublica.org/article/fbi-ransomware-hunting-team-cybercrime by Renee Dudley and Daniel Golden

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Investigating cybercrime was supposed to be the FBI’s third-highest priority, behind terrorism and counterintelligence. Yet, in 2015, FBI Director James Comey realized that his Cyber Division faced a brain drain that was hamstringing its investigations.

Retention in the division had been a chronic problem, but in the spring of that year, it became acute. About a dozen young and midcareer cyber agents had given notice or were considering leaving, attracted by more lucrative jobs outside government. As the resignations piled up, Comey received an unsolicited email from Andre McGregor, one of the cyber agents who had quit. In his email, the young agent suggested ways to improve the Cyber Division. Comey routinely broadcast his open-door policy, but senior staff members were nevertheless aghast when they heard an agent with just six years’ experience in the bureau had actually taken him up on it. To their consternation, Comey took McGregor’s email and the other cyber agents’ departures seriously. “I want to meet these guys,” he said. He invited the agents to Washington from field offices nationwide for a private lunch. As news of the meeting circulated throughout headquarters, across divisions and into the field, senior staff openly scorned the cyber agents, dubbing them “the 12 Angry Men,” “the Dirty Dozen” or just “these assholes.” To the old-schoolers — including some who had risked their lives in service to the bureau — the cyber agents were spoiled prima donnas, not real FBI.

The cyber agents were as stunned as anyone to have an audience with Comey. Despite their extensive training in interrogation at the FBI Academy in Quantico, Virginia, many were anxious about what the director might ask them. “As an agent, you never meet the director,” said Milan Patel, an agent who attended the lunch. “You know the director, because he’s famous. But the director doesn’t know you.”

You also rarely, if ever, go to the J. Edgar Hoover Building’s seventh floor, where the executive offices are. But that day, the cyber agents — all men, mostly in their mid-30s, in suits, ties and fresh haircuts — strode single file down the seventh-floor hall to Comey’s private conference room. Stiffly, nervously, they stood waiting. Then Comey came in, shirt sleeves rolled up and bag lunch in hand.

“Have a seat, guys,” he told them. “Take off your coats. Get comfortable. Tell me who you are, where you live and why you’re leaving. I want to understand if you are happy and leaving, or disappointed and leaving.”

Around the room, everyone took a turn answering. Each agent professed to be happy, describing his admiration for the bureau’s mission.

“Well, that’s a good start,” Comey said.

Then sincerity prevailed. For the next hour, as they ate their lunches, the agents unloaded.

They told Comey that their skills were either disregarded or misunderstood by other agents and supervisors across the bureau. The FBI had cliques reminiscent of high school, and the cyber agents were derisively called the Geek Squad.

“What do you need a gun for?” SWAT team jocks would say. Or, from a senior leader, alluding to the physical fitness tests all agents were required to pass, “Do you have to do pushups with a keyboard in your backpack?” The jabs — which eroded an already tenuous sense of belonging — testified to the widespread belief that cyber agents played a less important role than others in the bureau.

At the meeting, the men also registered their opposition to some of the FBI’s ingrained cultural expectations, including the mantra that agents should be capable of doing “any job, anywhere.” Comey had embraced that credo, making it known during his tenure that he wanted everyone in the FBI to have computer skills. But the cyber agents believed this outlook was misguided. Although traditional skills, from source cultivation to undercover stings, were applicable to cybercrime cases, it was not feasible to turn someone with no interest or aptitude in computer science into a first-rate cyber investigator. The placement of nontechnical agents on cyber squads — a practice that dated to the 1990s — also led to a problem that the agents referred to as “reeducation fatigue.” They were constantly forced to put their investigations on hold to train newcomers, both supervisors and other cyber agents, who arrived with little or no technical expertise.

Other issues were personal. To be promoted, the FBI typically required agents to relocate. This transient lifestyle caused family heartache for agents across the bureau. One cyber agent lamented the lack of career opportunities for his spouse, a businesswoman, in far-flung offices like Wichita. The agents told Comey they didn’t have to deal with “the shuffle” around the country for professional advancement because their skills were immediately transferable to the private sector and in high demand. They had offers for high-profile jobs paying multiples of their FBI salaries. Unlike private employers worried about staying competitive, the FBI wasn’t about to disrupt its rigid pay scale to keep its top cyber agents. Feeling they had nothing to lose, the agents recommended changes. They told Comey that the FBI could improve retention by centralizing cyber agents in Washington instead of assigning them to the 56 field offices around the country. That made sense because, unlike investigating physical crimes like bank robbery, they didn’t necessarily need to be near the scene to collect evidence. Plus, suspects were often abroad.

Most important, they wanted the bureau’s respect.

Comey listened, asked questions and took notes. Then he led them to his private office. They glanced around, most of them knowing they were unlikely to be granted such access to power again. Comey’s desk featured framed photos of his wife and children, and the carpet was emblazoned with the FBI’s seal. The agents had such respect for the bureau that they huddled close so that no one had to step on any part of the seal.

Perhaps the most striking feature of the office was the whiteboard that sprawled across one of the walls. On it was an organizational chart of the bureau’s leadership with magnets featuring the names and headshots of FBI executives and special agents in charge of field offices. Many were terrorism experts who had risen through the hierarchy in the aftermath of the Sept. 11, 2001, attacks.

Comey was sympathetic to his visitors and recognized the importance of cyber expertise to the FBI’s future. At the same time, he wasn’t going to overhaul the bureau and alienate the powerful old guard to please a group of short-timers.

“Look, I know we’ve got a problem with leadership here,” Comey told the cyber agents as they studied the whiteboard, according to agents who were there. “I want to fix it, but I don’t have enough time to fix it. I’m only here for a limited amount of time; it’s going to take another generation to fix some of these cultural issues.” But the agents knew the FBI couldn’t afford to wait another generation to confront escalating cyberthreats like ransomware. Ransomware is the unholy marriage of hacking and cryptography. Typically, the attackers capitalize on a cybersecurity flaw or get an unsuspecting person to open an attachment or click a link. Once inside a computer system, ransomware encrypts the files, rendering them inaccessible without the right decryption key — the string of characters that can unlock the information — for which a ransom is demanded.

Although attacks were becoming more sophisticated, bureau officials told counterparts in the Department of Homeland Security and elsewhere in the federal government that ransomware wasn’t a priority because both the damages and the chances of catching suspects were too small. Instead of aggressively mobilizing against the threat, the FBI took the lead in compiling a “best practices” document that warned the public about ransomware, urged prevention and discouraged payments to hackers. Through an intermediary, Comey, fired from his FBI position by then-President Donald Trump in 2017, declined to comment on the meeting. The FBI acknowledged but did not respond to written questions.

To FBI leadership, ransomware was an “ankle-biter crime,” said an agent who attended the meeting with Comey.

“They viewed it as a Geek Squad thing, and therefore they viewed it as not important,” he said.

Many of the issues the FBI cyber agents raised during their meeting with Comey were nothing new. In fact, the bureau’s inertia in tackling cybercrime dated all the way back to a case involving the first documented state-sponsored computer intrusion.

In 1986, Cliff Stoll was working as a systems administrator at the Lawrence Berkeley National Laboratory when his boss asked him to resolve a 75-cent shortfall in the accounting system the lab used for charging for computing power. Stoll traced the error to an unauthorized user and ultimately unraveled a sprawling intrusion into computer systems of the U.S. government and military. Eventually, the trail led to German hackers paid by the Soviet Union’s intelligence service, the KGB. Stoll immortalized his crusade in the 1989 book “The Cuckoo’s Egg.” In the course of his investigation, he tried seven times to get the attention of the FBI but was rebuffed each time.

“Look, kid, did you lose more than a half million dollars?” the FBI asked him.

“Uh, no,” Stoll replied.

“Any classified information?”

“Uh, no.”

“Then go away, kid.”

Stoll later spoke with an Air Force investigator who summed up the FBI’s position: “Computer crimes aren’t easy — not like kidnapping or bank robbery, where there’s witnesses and obvious losses. Don’t blame them for shying away from a tough case with no clear solution.”

It wasn’t until almost a decade later that the federal government took its first significant step to organize against cyberthreats. After the 1995 bombing of the Alfred P. Murrah Federal Building in Oklahoma City, the Clinton administration called together a dozen officials from across the government to assess the vulnerability of the nation’s critical infrastructure. Since essential services such as health care and banking were moving online, the committee quickly turned its attention from physical threats, like Timothy McVeigh’s infamous Ryder truck, to computer-based ones.

The group helped establish what became known as the National Infrastructure Protection Center in 1998. With representatives from the FBI, the Secret Service, intelligence agencies and other federal departments, the NIPC was tasked with preventing and investigating computer intrusions. The FBI was selected to oversee the NIPC because it had the broadest legal authority to investigate crime.

Turf battles broke out immediately. The National Security Agency and the Pentagon were indignant about reporting to the FBI about sophisticated computer crimes that they believed the bureau was incapable of handling, said Michael Vatis, then a deputy U.S. attorney general who led the effort to launch the center.

“They said: ‘Oh, no, no, no. It can’t be the FBI,’” Vatis recalled. “‘All they know how to do is surround a crime scene with yellow tape and take down bad guys. And they’re notorious for not sharing information.’”

Meanwhile, infighting over resources roiled the FBI. “You had a lot of old-line people arguing about whether cybercrime was real and serious,” Vatis said. “People who came up through organized crime, or Russian counterintelligence. They were like: ‘This is just a nuisance from teenagers. It’s not real.’”

At the time, only a couple of dozen FBI agents had any experience or interest in investigating computer crime. There weren’t nearly enough tech-literate agents to fill the scores of new job openings in the NIPC. Needing warm bodies, the FBI summoned volunteers from within its ranks, regardless of background. Among them was the New Orleans-based agent Stacy Arruda. During her first squad meeting in 1999, as her supervisor talked about “Unix this, and Linux that,” she realized she was in over her head.

“Arruda, do you have any idea what I’m talking about?” the supervisor asked her.

“Nope.”

“Why are you nodding and smiling?”

“I don’t want to look stupid.”

It was an easy admission because most of the new NIPC agents were similarly uninformed about the world they would be investigating.

When the bureau ran out of volunteers to join the NIPC, agents were “volun-told” to join, Arruda said. That’s what happened to Scott Augenbaum. He said he was assigned to the NIPC because he was the only agent in his Syracuse, New York, office “who had any bit of a technology background,” meaning he “could take a laptop connected to a telephone jack and get online.” He was disappointed by the assignment because it was “not the cool and fun and sexy job to have within the FBI.” His friends in the bureau teased him. “They told me, ‘This cyber thing is going to hurt your career.’”

Following the Sept. 11, 2001, terrorist attacks, FBI Director Robert Mueller created the bureau’s Cyber Division to fight computer-based crime. The division took over the NIPC’s investigative work, while prevention efforts moved to the Department of Homeland Security, which was established in November 2002. The DHS, however, put the computer crime prevention mission on hold for years as it focused instead on deterring physical attacks.

To ramp up the new division, the FBI put a cyber squad in each field office and launched a training program to help existing agents switch tracks. It also benefited from the “patriot effect,” as talented computer experts who felt a call to service applied. Among them were Milan Patel and Anthony Ferrante, two of the agents who would attend the meeting with Comey.

Fresh out of college, Ferrante was working as a consultant at Ernst & Young on 9/11. From his office in a Midtown skyscraper, he watched the towers fall. In the days that followed, he resolved to use his computer skills to fight terrorism. While pursuing a master’s degree in computer science at Fordham University, he met with an FBI recruiter who was trying to hire digital experts for the new Cyber Division. The recruiter asked Ferrante what languages he knew.

“HTML, JavaScript, C++, Business Basic,” he answered.

“What are those?” the perplexed recruiter responded. “I mean, Russian, Spanish, French.”

It wouldn’t be the last time Ferrante felt misunderstood by the bureau. When he arrived at Quantico in 2004, he found himself in a firearms class of about 40 new agents-in-training. There, the instructor asked: “Who here has never shot a gun?”

With his gaze cast downward as he concentrated on taking notes, Ferrante raised his hand. The room became silent. He looked around and saw he was the only one. Everyone stared.

“What’s your background?” the instructor asked.

“I’m a computer hacker,” Ferrante said.

On a campus that recruits jokingly referred to as “college with guns,” his answer was not well received. The instructor shook his head, rolled his eyes and moved on.

Patel arrived at the FBI Academy in 2003 with a college degree in computer science from the New Jersey Institute of Technology. From Quantico, he was assigned to a cyber squad in New York, where his new boss didn’t quite know what to do with him. The supervisor handed him a beeper, a Rand McNally map and the keys to a 1993 Ford Aerostar van that “looked like it was bombed out in Baghdad,” Patel said. Another agent set him up with a computer running a long-outdated version of Windows.

“Oh my God, this is like the Stone Age,” he thought. As time went on, Patel discovered how cumbersome it was to brief supervisors about cyber cases. Since many of them knew little about computers, he had to write reports that he considered “borderline childish.”

“You had to try to relate computers to cars,” he said. “You’re speaking a foreign language to them, yet they’re in charge, making decisions over the health of what you do.”

Patel realized that most of his Cyber Division colleagues, like Arruda and Augenbaum, didn’t have a technical background. The bureau tried to turn traditional law enforcement officers into tech specialists while passing over computer scientists who could not meet its qualifications to become agents. “Is the person who can do 15 pull-ups and run 2 miles around the track in under 16 minutes the same guy that you want decrypting ransomware?” Patel said. “Typically people who write code and enjoy the passion of figuring out malware, they’re not in a gym cranking out squats.”

Some agents ended up in the Cyber Division because it had openings when they graduated from Quantico, or because it was a stop on the way to a promotion. In a popular move, many senior agents and supervisors pursued a final assignment in the division before becoming eligible for retirement at age 50, knowing it made them more attractive to private-sector employers for their post-FBI careers.

“On a bureau cyber squad, you typically have one or two people, if you’re lucky, who can decrypt and do network traffic analysis and programming and the really hard work,” Patel said. “And you’ve got two or three people who know how to investigate cybercrime and have a computer science degree. And the rest — half of the team — are in the cyber program, but they don’t really know anything about cyber.” Some of those agents made successful cases anyway, but they were the exception.

Despite the internal headwinds, Patel worked on some of the bureau’s marquee cybercrime cases. He led the investigation into Silk Road, the black-market bazaar where illegal goods and services were anonymously bought and sold. As part of a sprawling investigation into the dark web marketplace, law enforcement located six of Silk Road’s servers scattered across the globe and compromised the site before shutting it down in October 2013. Ross Ulbricht, of San Francisco, was later found guilty on narcotics and hacking charges for his role in creating and operating the site. He is serving two life sentences plus 40 years in prison. Patel was nominated for the FBI Director’s Award for Investigative Excellence; he became a Cyber Division unit chief, advising on technology strategy. Then, shortly after the Dirty Dozen meeting with Comey, he left the FBI for a higher-paying job in the private sector.

Ferrante was selected for the FBI’s Cyber Action Team, which deployed in response to the most critical cyber incidents globally. As a supervisory special agent, he became chief of staff of the FBI’s Cyber Division. After the meeting with Comey, Ferrante remained in the FBI for another two years. He left in 2017 to become global head of cybersecurity for FTI Consulting, where he worked with companies victimized by ransomware.

He kept tabs on the bureau’s public actions in fighting the crime. Despite occasional successes, he said in 2021 that he was disappointed by the small number of ransomware-related indictments in the years that followed Comey’s 2015 gathering.

“They would work cases, but those cases would just spin, spin, spin,” Ferrante said. “No, they’re not taking it seriously, so of course it’s out of control now because it’s gone unchecked for so many years. … Nobody understood it — nobody within the FBI, and nobody within the Department of Justice. Because they didn’t understand it, they didn’t put proper resources behind it. And because they didn’t put proper resources behind it, the cases that were worked never got any legs or never got the attention they deserved.”

By 2012, FBI leadership recognized that most crimes involved some technical element: the use of email or cellphones, for example. So that year, it began to prioritize hiring non-agent computer scientists to help on cases. These civilian cyber experts, who worked in field offices around the country, did not carry weapons and were not required to pass regular physical fitness tests. But respect for the non-gun-carrying technical experts was lacking. This widespread condescension was reflected in a nickname that Stacy Arruda, the early NIPC agent who went on to a career as a supervisor in the Cyber Division, had for them: dolphins.

“Someone who is highly intelligent and can’t communicate with humans,” said Arruda, who retired from the FBI in 2018. “When we would travel, we would bring our dolphins with us. And when the other party started squeaking, we would have our dolphins squeak right back at them.”

If agents like Patel and Ferrante had a hard time winning the institutional respect of the FBI, it seemed almost impossible for the dolphins to do so. They worked on technical aspects of all types of cases, not just cyber ones. Yet, despite the critical role they played in investigating cyber cases — sometimes as the sole person in a field office who understood the technical underpinnings of a case — these civilian computer scientists were often regarded as agents’ support staff and treated as second-class citizens.

Randy Pargman took a circuitous route to becoming the Seattle field office’s dolphin. As a kid in California, Pargman regularly hung out with his grandma, who was interested in technology. She bought magazines that contained basic code and helped Pargman copy it onto their Atari video game console. It was his introduction to computer programming. Later, as a teenager, Pargman was drawn to a booth of ham radio enthusiasts at a county fair and soon began saving up to buy his own $300 radio. It was the early 1990s, before most home users were online, so Pargman was thrilled when he used the radio to access pages from a library in Japan and send primitive emails.

After high school, Pargman put his radio skills to work when he became a Washington State Patrol dispatcher. Although it wasn’t a part of the job description, he created one computer program to improve the dispatch system’s efficiency and another to automate the state’s process for investigating fraud in vehicle registrations. The experience led him to study computer science at Mississippi State. In the summer of 2000, while still in college, Pargman completed an FBI internship, an experience that left him with a deep appreciation for the bureau’s mission. So, following brief stints working for the Department of Defense and as a private sector software engineer once he graduated, he applied to become an agent. He was hired in 2004, around the same time as Patel and Ferrante.

Like those two agents, Pargman was shocked by the digital Stone Age he found himself in upon arriving. At the FBI Academy, a computer instructor gave lessons on typing interviews and reports on WordPerfect, the word processing platform whose popularity had peaked in the late 1980s. To Pargman, even more outrageous than the FBI’s use of WordPerfect was the notion that agents would need instruction on such a basic program. The first week of class, the instructor delivered another surprise.

“OK, who are the IT nerds in here?” he asked.

After Pargman and a classmate raised their hands, the instructor addressed them directly.

“You’re not going to be working on cybercrimes. You’re going to be working on whatever the bureau needs you to do.”

The other tech-savvy recruit later confided to Pargman that he was dropping out of the FBI Academy to return to private industry. “This is not what I thought it was going to be,” he said.

Pargman was similarly torn. He believed in the FBI’s mission but wanted to work solely on cybercrime. Like Ferrante, he didn’t have experience with guns, and he was unsure about how he would handle that aspect of the job. He faced a reckoning when an FBI speaker led a sobering session about the toughest aspects of working for the bureau, from deadly force scenarios to the higher-than-average rates of suicide and divorce among agents.

After consulting with FBI counselors and a bureau chaplain, Pargman decided he didn’t want to become an agent. Instead, he stayed in the FBI as a civilian, working as a software developer at the FBI Academy. Eight years later, when the FBI launched the computer science track, Pargman eagerly applied. He became the Seattle field office’s dedicated computer scientist in October 2012.

“This is why I had gotten into the FBI to begin with,” Pargman said. “I can concentrate just on cybercrime investigations and not have to deal with the whole badge and gun.”

Once Pargman got to Seattle, he began to dream big. His vision: The FBI could model its Cyber Division after one of the world’s most successful computer crime-fighting law enforcement organizations, the Dutch High Tech Crime Unit. He knew how traditional and hidebound the bureau was, how different from the HTCU and its innovative culture. But, ever idealistic, he hoped that the HTCU’s remarkable track record would persuade the FBI to adopt elements of the Dutch approach.

Pargman had long been familiar with the HTCU’s reputation for arresting hackers and disrupting their infrastructure. When he met a Dutch officer through an FBI program for midcareer professionals, he asked her the secret to the HTCU’s success. Her response was straightforward: the HTCU was effective because it paired each traditional police officer with a computer scientist, partnerships that had been a founding priority of the unit. While the HTCU computer scientists weren’t required to pass police exams, meet physical fitness requirements, or handle weapons, they nonetheless were entitled to the same rank and promotions as their traditional counterparts. They also were not obligated to pivot to noncomputer work during their police careers.

The density of computer science experts in the HTCU astounded Pargman, who thought it was brilliant. He suggested the Dutch approach to managers in the FBI’s Operational Technology Division, which oversaw the new computer science track. They laughed.

“We can’t get funding for that many computer scientists,” one contact told him. “That would be crazy.”

Pargman acknowledged that, since the FBI’s Cyber Division was much larger than the Dutch Police’s HTCU, establishing a one-to-one partnership was a stretch. Yet the FBI’s setup all but ensured that its drastically outnumbered computer scientists would not find a collective voice, as the tech experts had done in the HTCU. As Pargman dug into cyber investigations in Seattle, he learned that the bureau’s staffing imbalance was straining its cyber experts, both civilian computer scientists and technically advanced agents like Patel and Ferrante.

Many of the cyber agents Pargman worked with in Seattle had prior careers as accountants, attorneys or police officers. To get acquainted with the digital world, they took crash courses offered by the SANS Institute, the bureau’s contractor for cybersecurity training; popular offerings included Introduction to Cyber Security and Security Essentials Bootcamp. From an institutional perspective, learning on the job to investigate computer crime was no different from learning on the job to investigate white-collar or gang crime. But FBI leadership didn’t take into account something that early leaders in the Dutch HTCU knew from the unit’s start: It’s not easy to teach advanced computer skills to someone who has no technical background.

Cyber agents routinely came to Pargman with basic tasks such as analyzing email headers, the technical details stored within messages that can contain helpful clues.

“This is easy, you need to learn how to do this,” Pargman told one agent. He produced the IP address from the headers.

“What does that mean?” the agent responded. “What is this IP address?”

Pargman had to make the time to help because, if he didn’t, the agent might do something embarrassing, like attempt to subpoena publicly available information “because they just didn’t know any better.”

In the FBI, investigations into specific ransomware strains were organized by field office. For example, Springfield, Illinois, investigated complaints involving a strain called Rapid, while Anchorage, Alaska, investigated those related to Russia-based Ryuk, one of the first ransomware gangs to routinely demand six-figure payments and to carefully select and research its targets. From time to time, Pargman learned of victim complaints to the Seattle office about emerging ransomware strains. Since cases weren’t assigned directly to computer scientists, he pushed the agents to take them on. “Oh boy, here’s one that nobody is working,” he told one colleague.

“Let’s jump on this.”

“That sounds amazing,” the agent responded. “But I’ll be so busy with that case that I won’t get to do anything else.”

In the early days of ransomware, when hackers demanded no more than a few hundred dollars, the FBI was uninterested because the damages were small — not unlike Cliff Stoll’s dilemma at Berkeley. Later, once losses grew to hundreds of thousands or even millions of dollars, agents had other reasons to want to avoid investigating ransomware. In the FBI, prestige springs from being a successful “trial agent,” working on cases that result in indictments and convictions that make the news. But ransomware cases, even with the enthusiastic support of a computer scientist like Pargman, were long and complex, with a low likelihood of arrest.

The fact that most ransomware hackers were outside the United States made the investigative process challenging from the start. To collect evidence from abroad, agents needed to coordinate with federal prosecutors, FBI legal attachés and international law enforcement agencies through the Mutual Legal Assistance Treaty process. Seemingly straightforward tasks, such as obtaining an image of a suspicious server, could take months. And if the server was in a hostile country such as Iran or North Korea, the agents were out of luck. Aware of this international labyrinth, even some federal prosecutors discouraged agents from pursuing complex cyber investigations.

During Pargman’s time as Seattle’s computer scientist, the field office took on a number of technically sophisticated cases. He was especially proud of one that led to the Justice Department’s indictment, unsealed in 2018, of hackers accused in the notorious Fin7 attacks. They breached more than 100 U.S. companies and led to the theft of more than 15 million customer credit card records. But during his seven years in Seattle, the office never got a handle on ransomware.

“If you spend all of your time chasing ransomware, and for years you never make a single arrest of anybody, you’re seen as a failure,” Pargman said. “Even if you’re doing a ton of good in the world, like sharing information and helping protect people, you’re still a failure as an investigator because you haven’t arrested anybody.” Despite its own inaction, the FBI feuded with the other federal agency responsible for investigating ransomware: the Secret Service. Although the Secret Service has been guarding presidents since 1894, its lesser-known mission of combating financial crimes dates back even longer — to the day in April 1865 that Abraham Lincoln was assassinated. Before heading to Ford’s Theatre, Lincoln signed legislation creating the agency and giving it the mandate to fight counterfeit currency. As financial crime evolved and moved online, the Secret Service and the FBI squabbled over cases. Although it, too, had a federal mandate to fight computer crime, the Secret Service was sometimes bigfooted by the FBI, said Mark Grantz, who was a supervisory special agent for the Secret Service in Washington.

“They’d say: ‘Yeah, we’ve got a case on that already. We were looking at him five years ago. Give us everything you’ve got and we’ll go from there.’ That was their M.O.,” Grantz said. It left him wondering: “You haven’t touched that case in five years, why are you asking me for my case file?”

Grantz led an investigation into a ransomware attack in January 2017, eight days before Donald Trump’s inauguration. The strike disabled computers linked to 126 street cameras in a video surveillance system monitoring public spaces across Washington, D.C., including along the presidential parade route. Instead of paying the five-figure ransom, the district scrambled to wipe and restart the cameras, which were back online three days before the swearing-in. Assisted by other law enforcement organizations, the Secret Service traced the hack to two Romanians, who were arrested in Europe, extradited to the United States and found guilty on wire fraud charges — an uncommon U.S. law enforcement success against ransomware operators.

Other Secret Service investigations sometimes stalled because agents had to rotate away for protective detail. “That’s where it gets frustrating,” Grantz said. “You’d train someone. They’d do digital forensics for five years. They’d get really good at it. And then you’d send them off to do presidential detail.”

Randy Pargman also grew frustrated by the FBI’s reluctance to engage meaningfully with private-sector cybersecurity researchers like the Ransomware Hunting Team. An elite, invitation-only group of tech wizards in seven countries, the team has uncovered keys to hundreds of ransomware strains, saving millions of individuals, businesses, schools and other victims from paying billions of dollars in ransom. When the FBI did connect with experts in the private sector, sensitive information typically flowed only in one direction — to the bureau.

Following large cyberattacks against U.S. targets, the FBI routinely affirmed its commitment to public-private partnerships to help prevent and gather intelligence on such strikes. But some agents believed the rhetoric was hollow, comparing it to public officials’ offering “thoughts and prayers” after mass shootings. The reality was that many people in the FBI had a deep distrust of private-sector researchers.

“There’s this feeling among most agents that if they share even a little bit of information with somebody in the private sector, that information will get out, broadcast over the internet — and the bad guys will definitely read it, and it will destroy the whole case,” Pargman said.

Even though he couldn’t work on ransomware cases, Pargman found ways to feel fulfilled in his job, including by helping organizations defend themselves against impending cyber intrusions. He examined malware command-and-control servers obtained through the MLAT process, then alerted potential victims to imminent attacks. “That was a really good feeling because we stopped a ton of those intrusions,” he said. FBI leadership rewarded his efforts: Pargman earned both the FBI Director’s Award for Excellence in Technical Advancement and the FBI Medal of Excellence.

But he grew tired of his subordinate role as an “agent helper,” and he thought about how things would be different if the FBI were more like the Dutch HTCU. In the bureau, he couldn’t be promoted since Cyber Division leadership roles were open only to agents. And while agents could retire at 50 with full pensions, he had to wait until age 62, and would receive less money. In 2019, Pargman resigned from the FBI, telling his supervisor he wanted to be in a role where he could enact changes rather than just suggest them.

“I love working for the FBI,” he told his supervisor. “It’s very meaningful and fulfilling. But there is no leadership spot for me to go to, only because I’m not an agent. So you cannot be upset that I’m going to get a job where I can be a leader, and make changes, and create a team to do big things.”

When it came to ransomware, the FBI didn’t have a lengthy roster of achievements to boast about. It would not be until after the May 2021 attack on the Colonial Pipeline, which shuttered gas stations across the Southeast, that the FBI would prioritize the ransomware threat and embrace assistance from private researchers like the Ransomware Hunting Team. But even with its new emphasis on ransomware, the FBI didn’t undertake fundamental reforms to expand its roster of cyber experts. It still wanted its cyber agents to be athletic college graduates with relevant job experience, who also had to be willing to shoot a gun, relocate their families and pivot away from investigating cybercrime as needed.

The bureau’s reluctance to adapt disappointed some former agents. “I think the next generation of cyber people in the bureau should be the type of people who want to be cyber first, and not agents at all,” said Patel, one of the agents who attended the 2015 meeting with Comey. “The bureau needs expertly trained technical programmers, cybersecurity engineers, that know how to write code, compile, dissect and investigate — and it has nothing to do with carrying a gun.”

Excerpted from “The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime” by Renee Dudley and Daniel Golden. Published by Farrar, Straus and Giroux. Copyright © 2022 by Renee Dudley and Daniel Golden. All rights reserved.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Renee Dudley and Daniel Golden.

]]>
https://www.radiofree.org/2022/10/18/how-the-fbi-stumbled-in-the-war-on-cybercrime/feed/ 0 342699
Oakland Cops Hope to Arm Robots With Lethal Shotguns https://www.radiofree.org/2022/10/17/oakland-cops-hope-to-arm-robots-with-lethal-shotguns/ https://www.radiofree.org/2022/10/17/oakland-cops-hope-to-arm-robots-with-lethal-shotguns/#respond Mon, 17 Oct 2022 10:00:06 +0000 https://theintercept.com/?p=410405

In a series of little noted Zoom meetings this fall, the city of Oakland, California, grappled with a question whose consequences could shape the future of American policing: Should cops be able to kill people with shotgun-armed robots?

The back-and-forth between the Oakland Police Department and a civilian oversight body concluded with the police relinquishing their push for official language that would have allowed them to kill humans with robots under certain circumstances. It was a concession to the civilian committee, which pushed to bar arming robots with firearms — but a concession only for the time being.

The department said it will continue to pursue lethal option. When asked whether the the Oakland Police Department will continue for advocate for language that would allow killer robots under certain emergency circumstances, Lt. Omar Daza-Quiroz, who represented the department in discussions over the authorized robot use policy, told The Intercept, “Yes, we are looking into that and doing more research at this time.”

The controversy began at the September 21 meeting of an Oakland Police Commission subcommittee, a civilian oversight council addressing what rules should govern the use of the city’s arsenal of military-grade police equipment. According to California state law, police must seek approval from a local governing body, like a city council, to determine permissible uses of military equipment or weapons like stun grenades and drones. Much of the September meeting focused on the staples of modern American policing, with the commissioners debating the permissible uses of flash-bang grenades, tear gas, and other now-standard equipment with representatives from the Oakland Police Department.

Roughly two hours into the meeting, however, the conversation moved on to the Oakland police’s stable of robots and their accessories. One such accessory is the gun-shaped “percussion actuated nonelectric disruptor,” a favorite tool of bomb squads at home and at war. The PAN disruptor affixes to a robot and directs an explosive force — typically a blank shotgun shell or pressurized water — at suspected bombs while human operators remain at a safe distance. Picture a shotgun barrel secured to an 800-pound Roomba on tank treads.

While describing the safety precautions taken while using the PAN disruptor, Daza-Quiroz told the subcommittee that the department takes special care to ensure that it is in fact a blank round loaded into the robot’s gun. This led a clearly bemused Jennifer Tu, a fellow with the American Friends Service Committee and member of the Oakland Police Commission subcommittee on militarized policing, to ask: “Can a live round physically go in, and what happens if a live round goes in?”

“Yeah, physically a live round can go in,” Daza-Quiroz answered. “Absolutely. And you’d be getting a shotgun round.”

After a brief silence, Commissioner Jesse Hsieh asked the next question: “Does the department plan on using a live round in the robot PAN disruptor?”

The answer was immediately provocative. “No,” Daza-Quiroz said, before quickly pivoting to hypothetical scenarios in which, yes, just such a shotgun-armed robot might be useful to police. “I mean, is it possible we have an active shooter in a place we can’t get to? And he’s fortified inside a house? Or we’re trying to get to a person —”

It soon became clear the Oakland Police Department was saying what nearly every security agency says when it asks the public to trust it with an alarming new power: We’ll only use it in emergencies — but we get to decide what’s an emergency.

The question of whether robots originally designed for defusing bombs should be converted into remote-controlled guns taps into several topics at the center of national debates: police using lethal force, the militarization of American life, and, not least of all, killer robots. Critics of the armed robo-cops note that the idea of Predator drones watching American racial justice protests may have seemed similarly far-fetched in the years before it started happening. “It’s not that we don’t want to debate how to use these tools safely,” said Liz O’Sullivan, CEO of the AI bias-auditing startup Parity and a member of the International Committee for Robot Arms Control. “It’s a question of, if we use them at all, what’s the impact going to be to democracy?”

Some observers say the Oakland police’s robot plan contradicts itself. “It’s billed as a de-escalation facilitator, but they want to keep it open as a potential lethal weapon,” Jaime Omar Yassin, an independent journalist in Oakland who has documented the commission meetings, tweeted. As with any high-tech toy, the temptation to use advanced technology may surpass whatever institutional guardrails the police have in place. Matthew Guariglia, a policy analyst with the Electronic Frontier Foundation, said, “The ease of use of weapons as well as the dangerous legal precedence justifying the causal use of weapons makes police less likely to attempt to deescalate situations.”

“It in many ways lowers the psychological hurdle for enacting that violence when it’s just a button on a remote control.”

Tu hopes that by cracking down on shotgun robots before they come to be, Oakland and cities across the country can avoid debates about limits on police powers that only come after those powers are abused. She pointed to the Oakland police ban on using firehoses, a bitter reminder of abuses in American policing from the not-too-distant past. “We have an opportunity right now to prevent the lawsuit that will force the policy to be rewritten,” Tu said. “We have an opportunity to prevent the situation, the harm, the trauma that would occur in order for a lawsuit to need to be initiated.”

Skeptics of robo-policing, including Tu, say these debates need to happen today to preempt the abuses of tomorrow, especially because of the literal and figurative distance robotic killing affords. Guariglia said, “It in many ways lowers the psychological hurdle for enacting that violence when it’s just a button on a remote control.”

Dallas Police Headquarter Attacked Overnight, Leads To Standoff With Suspect

Oakland police are seeking to use live shotgun rounds in an attachment to the Remotec Adros Mark V-A1, a robot seen here in a standoff where Dallas police deployed the robot in Dallas, Texas, on June 13, 2015.

Photo: Stewart F. House/Getty Images

As the Oakland commission hearing went on, Daza-Quiroz invoked a controversial 2016 incident in Dallas. Police had strapped a C-4 bomb to a city-owned robot and used it to blow up a sniper who’d killed five police officers during a downtown rally. It is widely considered to be the country’s first instance of robotic police killing. While police generally heralded the ingenuity of the response, others criticized it as summary execution by robot. In an email to The Intercept, Daza-Quiroz said the department imagines weaponizing the PAN disruptor on the department’s $280,000 Northrop Grumman Remotec Andros Mark 5-A1 robot — the very same model used so controversially in Dallas.

Daza-Quiroz noted that the department had never actually attempted to load a live round into the PAN gun for fear of breaking the $3,000 attachment. Yet when Tu asked whether the commission could add policy language that would prohibit arming the robot with lethal 12-gauge shotgun rounds, the department’s vision for robotic policing became clearer. “I don’t want to add a prohibited use,” Daza-Quiroz replied, “because what if we need it for some situation later on?”

Daza-Quiroz explained that a hypothetical lethally armed robot would still be subject to the department’s use of force policy. Oakland Police Department Lt. Joseph Turner, stressing the need to keep extreme options on the table for extreme circumstances, urged the commission to allow such a killer robot in case of “exigencies.” He said, “I’m sure those officers that day in Texas did not anticipate that they were going to deliver a bomb using a robot.”

The Oakland Police Department’s assurances that a shotgun-toting robot would be subject to departmental use-of-force policy did not seem to satisfy critics. Nor did the messenger have a record that inspires confidence. A 2013 East Bay Express report on Daza-Quiroz and another officer’s killing of an unarmed Oakland man found that he had been the subject of over 70 excessive force complaints. (One lawsuit prompted a six-figure settlement from the city and the jury ruled for the officers in another; the officers were never charged with a crime, and an arbitrator overturned the police chief’s decision to discipline the officers. Police spokesperson Candace Keas declined to comment on the dozens of excessive force complaints.)

In the wake of the shooting, which prompted protests, the East Bay Times reported that Daza-Quiroz was asked by an internal investigator why he hadn’t used his Taser instead. He responded, “I wanted to get lethal.”

“You have a hammer, everything looks like a nail.”

The concern is, then, less that police would use a shotgun robot in “certain catastrophic, high-risk, high-threat, mass casualty events” — as the tentative policy language favored by the department currently reads — but that such a robot would be rolled out when the police simply want to get lethal. The vagaries of what precisely constitutes a “high-risk” event or who determines the meaning of “high threat” affords the police too much latitude, Tu told The Intercept in an interview. “It’s not a technical term, there’s no definition of it,” she said. “It doesn’t mean anything.” When asked by email for precise definitions of these terms, Daza-Quiroz said, “High risk, high threat incidents can vary in scope and nature and are among the more challenging aspects of law enforcement.”

Critics say such ambiguous language means Oakland police would get to use a robot to kill someone whenever they decide they need a robot to kill someone. The policy has analogues in more routine police work: After shooting unarmed people, officers frequently offer post-hoc justifications that they felt their life was in danger.

“Anytime anyone has a tool, they’re going to use it more,” said Tu. “You have a hammer, everything looks like a nail. And the more that police, in general, have military equipment, have more weapons, those weapons get used.”

After weeks of wrangling, both the commission and the police department agreed on language that will prohibit any offensive use of robots against people, with an exception for delivering pepper spray. The agreement will go for review by the city council on October 18.

Tu suspects the sudden compromise on the killer-robot policy is explained not by any change of heart, but rather by the simple fact that had the debate continued any longer, the department would have missed the deadline for submitting a policy — and risked losing the ability to legally operate its robots altogether.

There is nothing preventing the Oakland Police Department from, as Daza-Quiroz said they will, continuing to push for legally sanctioned killing using a PAN disruptor. No matter how the Oakland policy shakes out in the long term, the issue of robotic policing is likely to remain. “I’m sure Dallas [police] weren’t the only ones who had considered lethal force with their robot before doing so, and Oakland police aren’t the only ones who are thinking about it even more now,” Tu told The Intercept. “They’re just the only ones who thought about it out loud with a committee.”

According to Daza-Quiroz, the department is still looking toward the future. “We will not be arming robots with lethal rounds anytime soon, and if, and when that time comes each event will be assessed prior to such deployment,” he said. When asked if there were other situations beyond a Dallas-style sniper in which police might wish to kill with a robot, Daza-Quiroz added: “Absolutely there are many more scenarios.”

With thousands of Andros robots operated by hundreds of police department across the country, those concerned by the prospect of shotgun robots on the streets of Oakland or elsewhere refer to what they say is a clear antecedent with other militarized hardware: mission creep.

“We’re not really talking about a slippery slope. It’s more like a well-executed playbook to normalize militarization.”

Once a technology is feasible and permitted, it tends to linger. Just as drones, mine-proof trucks, and Stingray devices drifted from Middle Eastern battlefields to American towns, critics of the PAN disruptor proposal say the Oakland police’s claims that lethal robots would only be used in one-in-a-million public emergencies isn’t borne out by history. The recent past is littered with instances of technologies originally intended for warfare mustered instead against, say, constitutionally protected speech, as happened frequently during the George Floyd protests.

“As you do this work for a few years, you come to realize that we’re not really talking about a slippery slope. It’s more like a well-executed playbook to normalize militarization,” said O’Sullivan, of Parity. There’s no reason to think the PAN disruptor will be any different: “One can imagine applications of this particular tool that may seem reasonable, but with a very few modifications, or even just different kinds of ammunition, these tools can easily be weaponized against democratic dissent.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/10/17/oakland-cops-hope-to-arm-robots-with-lethal-shotguns/feed/ 0 342449
Amid climate crisis gloom, new renewables technology brings a ray of hope https://www.radiofree.org/2022/10/14/amid-climate-crisis-gloom-new-renewables-technology-brings-a-ray-of-hope/ https://www.radiofree.org/2022/10/14/amid-climate-crisis-gloom-new-renewables-technology-brings-a-ray-of-hope/#respond Fri, 14 Oct 2022 16:03:57 +0000 https://www.opendemocracy.net/en/climate-crisis-renewable-energy-technologies-fossil-fuels/ OPINION: Fossil fuel lobby and neo-liberalism must not stand in the way of renewable energy’s increased potential


This content originally appeared on openDemocracy RSS and was authored by Paul Rogers.

]]>
https://www.radiofree.org/2022/10/14/amid-climate-crisis-gloom-new-renewables-technology-brings-a-ray-of-hope/feed/ 0 342083
Cultivate compassion, Dalai Lama urges, and use technology to benefit humanity https://www.rfa.org/english/news/tibet/mind-life-gathering-10132022172030.html https://www.rfa.org/english/news/tibet/mind-life-gathering-10132022172030.html#respond Thu, 13 Oct 2022 21:35:26 +0000 https://www.rfa.org/english/news/tibet/mind-life-gathering-10132022172030.html Tibet’s exiled spiritual leader the Dalai Lama called for people to train their minds to cultivate compassion and cautioned that digital technology should be used only to benefit humanity, at a two-day gathering in northern India that ended Thursday.

About 180 people attended the two-day Mind & Life Conversation on Interdependence, Ethics and Social Networks in the audience hall at the Dalai Lama’s residence in Dharamsala, a hillside city in the Indian state of Himachal Pradesh that is home to the Tibetan government-in-exile.

About 100 attendees were Western scientists and scholars and members of the Mind & Life Institute, an organization whose mission is to inform and advance the emerging field of contemplative science and its application to real-world challenges.  

Among the other attendees were Tibetan monks and nuns who have participated in science programs at Emory University, students of science from the Tibetan Medical & Astro-Science Institute, the Library of Tibetan Works & Archives, and lamas and abbots from the centers of learning at monasteries in South India.

Training the mind in cultivating compassion involves developing thoughts of even-mindedness, or equanimity, the Dalai Lama said.  

“We’ve held a lot of Mind & Life dialogues, and I feel they’ve been very important,” he said on the first day of the event on Oct. 12, according to a report on the Dalai Lama’s official website. “In the world at large, a great deal of attention has been paid to physical things, but much less to the mind. And yet, when we talk about happiness and suffering, they are inner, mental experiences. If we have no peace of mind, we won’t be happy.”

“Many of the conflicts we see in the world are about physical things, material resources and power,” the Dalai Lama went on to say. “Therefore, we need to look at what went on in the past and learn from it so that we can construct a future based on peace, happiness and togetherness.”

“The root of peace of mind is compassion,” he said. “As soon as most of us are born, our mothers take care of us and give us our first lessons in compassion. Without this we would not survive. This is how our life begins. As children we grow up in an atmosphere of compassion.”

The Tibetan spiritual leader also said that technology should be used to benefit humanity.

“Generally speaking, whether or not technology can be thought of as good or bad depends on how it is used,” he said on the second day of the gathering, according to a report on his official website. “We human beings should not be slaves to technology or machines. We should be in charge.”

When humans are too materialistic, they regard human values as being of secondary importance, he said.

“We must remember that we are human beings and we need to apply human values, whatever we do,” the Dalai Lama said. “Principally, we need to be motivated by warmheartedness. Technology is supposed to serve human needs; therefore, it needs to be guided by human values.” It also needs to help protect the environment, he said.

The Mind & Life Institute was founded more than three decades ago by Tenzin Gyatso, the 14th and current Dalai Lama, Chilean scientist and philosopher Francisco Varela, and American lawyer and social entrepreneur R. Adam Engel. 

While science relies on empiricism, technology, observation, and analysis, the three believed that well-refined contemplative practices and introspective methods could be used as equal instruments of investigation.     

Translated by Tenzin Dickyi for RFA Tibetan. Written in English by Roseanne Gerin.


This content originally appeared on Radio Free Asia and was authored by By RFA Tibetan.

]]>
https://www.rfa.org/english/news/tibet/mind-life-gathering-10132022172030.html/feed/ 0 341815
What They Want https://www.radiofree.org/2022/10/13/what-they-want/ https://www.radiofree.org/2022/10/13/what-they-want/#respond Thu, 13 Oct 2022 14:59:22 +0000 https://dissidentvoice.org/?p=133375 What Do "They" Want?

The post What They Want first appeared on Dissident Voice.]]>

The post What They Want first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Allen Forrest.

]]>
https://www.radiofree.org/2022/10/13/what-they-want/feed/ 0 341717
The New Sorcerers (and Their Apprentices) https://www.radiofree.org/2022/10/04/the-new-sorcerers-and-their-apprentices/ https://www.radiofree.org/2022/10/04/the-new-sorcerers-and-their-apprentices/#respond Tue, 04 Oct 2022 12:59:14 +0000 https://dissidentvoice.org/?p=134058 Now it so happened, as Goethe told it, that a sorcerer of superlative technical skills took on an apprentice, eager and diligent in his study of the master’s teachings.  One day, while the master was away, the apprentice, perhaps overly confident in his newly-acquired command of certain techniques, decided to use these powers for a […]

The post The New Sorcerers (and Their Apprentices) first appeared on Dissident Voice.]]>
Now it so happened, as Goethe told it, that a sorcerer of superlative technical skills took on an apprentice, eager and diligent in his study of the master’s teachings.  One day, while the master was away, the apprentice, perhaps overly confident in his newly-acquired command of certain techniques, decided to use these powers for a practical, if mundane, purpose.  As a pupil, he was obligated to perform certain tedious household chores, most detestably the endless hauling of pails of water from the nearby stream.  Why not animate, say, a broom to do this tiresome chore?  His acquired powers were already sufficient to perform this transformation, and the broom, hurrying off and then returning forthwith, brought back two pails of water.  The apprentice, proud of his powers and amazed at the prompt carrying out of his command, was nonetheless startled when the broom quickly hurried off again, and again, and again, speedily delivering a dozen of pails of water. Panicking, the apprentice tried to destroy the broom by cutting it in half–only to witness each half becoming a whole, and both scurrying off now to begin bringing twice as many pails!  The house was flooded, with no relief in sight, when the Master suddenly returned.  In consternation, he angrily admonished his over-confident pupil for using such powers which wiser ones would willingly refrain from unleashing.  The Master, acutely aware of the dangers of such misuse, nonetheless calmly de-animated the brooms back to their original purpose.

Sorcery, a kind of “pre-science,” consists of specific techniques purportedly capable of attaining certain ends.  If one wished to destroy a foe, one employed imitative (homeopathic) magic (“like produces like”) — the infamous voodoo doll being the most well-known example.  If the victim shortly thereafter sickened and died, the efficacy of the magical technique was “confirmed.”

We now fast-forward to September 30 of this year, when techno-wizard Elon Musk introduced his new “humanoid” robot named Optimus, which promptly demonstrated to a rapt audience the abilities to walk, carry objects, and water plants.  Musk announced, with his typical promoter’s enthusiasm, that he wanted to perfect and mass-produce Optimus as soon as possible, predicting that the “humanoid” would prove even more profitable than his Tesla line of electric cars.

Entrepreneurial capitalist Musk is unlikely to question his commitment to a rapidly expanding world of “artificial intelligence.”  (An entirely surveilled, behavior-modified and jobless humanity?).  At the same time, he has acknowledged some unforeseen dangers, and the urgent necessity for some regulation of their production and use.  A techno-futurist with an awareness of what is coming, he has joined with such techno-scientific luminaries as Stephen Hawking and Bill Gates in warning that AI, if insufficiently contained and regulated, constitutes “the largest existential threat to humanity.”

Since perpetual war by now seems (almost) “normalized,” Pentagon contracts promote the myriad capabilities of robot-soldiers on the battlefield.  Musk has thus urgently warned of an imminent threat from “killer robots” (The Guardian, 17 July, 2017).  Human Rights Watch has long taken this seriously enough to launch their Campaign to Stop Killer Robots, noting that such machines “would be able to select and engage targets without meaningful human control” (The Guardian, 9 Apr. 2015).   (One is hard-pressed not to mention that “human control” of unmanned, automated drones, armed with Hellfire missiles, did not restrain their over-use–even by participant-executioner President Obama!) .  Self-replicating robots already exist, even “self-reconfigurable modular” ones which can re-arrange their design and self-repair–capacities obviously advantageous under battlefield conditions.

While Goethe’s fable of out-of-control “animated” brooms seems incredibly remote from our present reality, he did prophetically warn of the ease with which empowered instruments can overpower their very creators, wreaking uncontrollable havoc once unleashed.  The profiteering hubris of the current “roboteers,” audaciously claiming an entitlement to introduce a never-ending stream of hi-tech assaults on human independence and dignity, uncannily exhibit the same disastrous grandiosity of Mary Shelley’s Dr. Frankenstein.

Image credit: Sorcerer’s broom from Disney’s Fantasia.

The post The New Sorcerers (and Their Apprentices) first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by William Manson.

]]>
https://www.radiofree.org/2022/10/04/the-new-sorcerers-and-their-apprentices/feed/ 0 338355
Meet the Military Contractor Running Fare Collection in New York Subways — and Around the World https://www.radiofree.org/2022/10/03/meet-the-military-contractor-running-fare-collection-in-new-york-subways-and-around-the-world/ https://www.radiofree.org/2022/10/03/meet-the-military-contractor-running-fare-collection-in-new-york-subways-and-around-the-world/#respond Mon, 03 Oct 2022 10:00:55 +0000 https://theintercept.com/?p=409354

In a cheerfully animated promotional video, a woman narrates Cubic Transportation Systems’ vision for the future. Travelers will pay fares using a ticket-free mobile account. Real-time data will be aggregated, linked, and shared. Deals — such as 50 percent off at a partner coffee shop — may even incentivize users to select certain transit routes at certain times.

“The more information that is gathered, the more powerful the system becomes,” the narrator tells us. “The piece of the puzzle missing … is you.”

This is “NextCity,” Cubic Transportation Systems’ idea of a smart city: an urban area that uses technology and networked data to optimize functioning and mobility.

Over the past decade, Cubic has taken the first steps toward actualizing its vision by snapping up contracts for the development of mobile-based, contactless fare collection systems in eight of America’s 10 largest public transit networks. Gone are the days of cumbersome tokens and flimsy farecards; now, millions of bus and subway riders can pay their fare directly by hovering a smartphone or credit card over a reader.

Transit authorities have embraced tap-to-pay technology for its convenience and speed, but privacy advocates are worried that the new fare collection systems pose serious surveillance and security risks. The concerns came to the fore as New York City’s Metropolitan Transportation Authority, or MTA, rolled out OMNY, a fare payment system backed by Cubic that’s slated to fully replace MetroCards by the end of 2023. Nevertheless, Cubic’s widespread use of touchless, mobile-based reader technology is sprouting up everywhere — including places like San Francisco and Miami, where public transit riders would need to dig deep into city documents to find Cubic’s roles.

Cubic is a privately held corporation with broad and varied interests. In addition to its transit operation, Cubic is a vast military contractor doing hundreds of millions of dollars in business with the U.S. military and sales to foreign militaries. The company supplies surveillance technologies, training simulators, satellite communications equipment, computing and networking platforms, and other military hardware and software. Most of the headlines Cubic garners, though, stem from its increasingly indispensable role in public transit systems across the world.

“I’m deeply concerned about how the development of smart cities creates growing incentives for companies like Cubic to aggregate our data and then sell it.”

As Cubic’s quiet grip on fare collection takes hold in more cities, the company’s ability to process rider data grows with it, creating a sprawling corporate apparatus that has the extraordinary potential to gather up reams of information on the very people it is supposed to serve. In some cases, its access to that information is explicit in the transit systems’ privacy policies.

“I’m deeply concerned about how the development of smart cities creates growing incentives for companies like Cubic to aggregate our data and then sell it to police, ICE, and other agencies,” said Albert Fox Cahn, founder and executive director of the Surveillance Technology and Oversight Project, referring to U.S. Immigration and Customs Enforcement. “Right now, our data is a huge part of the product, with almost no safeguards against these sorts of abuse.”

Cubic did not respond to a request for comment.

MG_1681-Cubic-MTA-NYC

OMNY, a fare payment system backed by Cubic, installed on a turnstile in a Brooklyn subway station on Sept. 30, 2022.

Photo: Elise Swain/The Intercept

Turnstiles and Military Systems

The privacy concerns around Cubic would be acute even if its interests were limited to transit, but the company wears dual hats as ubiquitous public service provider and defense contractor.

Cubic Transportation Systems is but one division of Cubic Corporation. The company’s other concerns revolve around providing technologies to U.S. and other security forces. The defense contractor, Cubic Mission and Performance Solutions, handles Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance, and Reconnaissance — or C5ISR — capabilities for the U.S. military. And Cubic also owns a variety of subsidiaries, including Abraxas Corporation, which supplies counterintelligence and cybersecurity software to agencies working in national security.

Since 1992, U.S. government agencies have awarded Cubic’s defense wing and its subsidiaries billions of dollars in contracts, including more than $42.1 million from the Department of Defense this year alone. One of Cubic’s largest contracts came in 2020, when the Pentagon awarded the company $193.3 million for work on training systems, with over half of the money allocated to foreign military sales in Saudi Arabia, Egypt, Morocco, Oman, Poland, Qatar, Singapore, Australia, and the U.K.

Cubic has also provided key support for U.S. drone operations. The company received $1.4 million from the U.S. Air Force in 2018 for Predator/Reaper training software, and in 2020, it signed a cooperative agreement with U.S. Special Operations for the research and development of intelligence, surveillance, and reconnaissance technologies related to drones. Cubic also sells surveillance technologies; a subsidiary that sells video enhancement software has clients including the New York Police Department, U.S. Secret Service, and military criminal investigators.

The defense contracting business runs in parallel to the transit work — where Cubic’s reach is also international. The company has implemented contactless payment technology in other major cities globally, including London, Sydney, and Vancouver. It controls about 70 percent of the market for public transit fare collection across the U.S., U.K., and Australia.

In 2013, when the Chicago Reporter flagged that the company responsible for Chicago’s Ventra system — cards for public transit — had national security ties, a Cubic Corporation spokesperson insisted that the transportation and defense wings were “entirely separate entities and not connected through anything but ownership.”

In annual reports, however, the company emphasized the benefits of its “Living One Cubic” ethos. The reports describe the touchless reader at the center of Cubic’s transit business as “an innovation developed through engineering collaboration” across both divisions of the company. The 2019 annual report also cites the launch of a new internal product management system that will facilitate the sharing of “technical information and data amongst our engineering teams and the overall company.”

The notion of “One Cubic” is also on display in lobbying disclosures. While Cubic has spent massive sums on more than two decades of defense-industry lobbying, Cubic Corporation has put lesser, though still significant funding into lobbying on transit issues; in 2015, the company started directing its resources into “promot[ing] Cubic transportation technology solutions.” In 2019, the company pushed for the “adoption of integrated fare payment and mobility as a service solutions” — corporate jargon for its mobile-based fare collection systems and public-private transit partnerships.

Often, Cubic Corporation’s defense and transportation lobbying is targeted at the same lawmaker or handled by the same firm, with disclosures listing House and Senate defense authorizations alongside federal transportation appropriations.

For Bill Budington, senior staff technologist at the Electronic Frontier Foundation, the soft wall between Cubic’s transportation and military businesses raises questions that have yet to be addressed by transit authorities about the risks that personal data could move between the two sides of the company.

“I think it depends on the overlap, and whether the technologies employed are bleeding over to the other side of the company,” said Budington. “And whether the typical concerns, when it comes to the privacy and security of data that’s being handled for the public, are lessened by the fact that you’re part of the intelligence community that is looking for targets and employing military technologies overseas.”

He added, “That is something that should be raised to the public, and there should be a public debate about it. And I don’t think that there has been.”

Vague Privacy Policy

The Cubic Corporation’s privacy policy outlines the notably lenient guidelines governing the use of data provided both through Cubic’s own website and its contracts with clients. The sharing of personal information is permitted among recipients, including Cubic’s family of companies, affiliates, and subsidiaries; external auditors; police, regulators, government agencies, and judicial or administrative authorities; and third parties connected with mergers and acquisitions.

The company also says it may share information “where disclosure is both legally permissible and necessary to protect or defend our rights” and in “matters of national security.” Personal data may be stored for up to 10 years.

Cubic’s privacy policy allows data sharing between corporate divisions only if it’s for the product being delivered, not for ancillary business practices. However, Cahn said that it’s difficult to know what corporate firewalls are truly in place when dealing with private companies.

“I think this highlights one of the broader design tensions with smart cities infrastructure,” Cahn said. “Oftentimes, we have a misalignment of incentives, where companies have every reason to look for ways to monetize our most intimate data, or as a government tracking tool, rather than having incentives to truly keep that information protected.”

The guidelines for the MTA’s touchless system OMNY have been criticized for their weakness. The Surveillance Technology and Oversight Project found in a 2019 report that the policy permits the MTA and Cubic to store users’ personal data indefinitely, allowing law enforcement and other government agencies access to that and other information. The touchless system’s predecessor, the MetroCard, which Cubic designed and implemented in 1992, already enables enforcement agencies to track users’ whereabouts.

“There should be some kind of oversight body that is making sure the new surveillance technology that’s employed isn’t going to violate the privacy rights of individuals.”

Recent media reports noted that, because OMNY links credit card information to a user profile by design, location tracking could be connected to names, payment cards, and any other information web tracking and data scraping could tie to the account. According to TransitCenter, a group focused on improving public transportation in cities, OMNY would elevate tracking capabilities to a “near-instantaneous” level.

The MTA’s OMNY privacy policy stipulates that Cubic and other vendors must adhere to privacy practices “at least as stringent” as those in the OMNY policy. Other Cubic-designed systems, though, do not disclose such restrictive rules. The Chicago Ventra program policy simply authorizes the sharing of personal information with Cubic, provided it “maintain[s] the confidentiality of the information” and uses it only as necessary for administering the program.

Budington, of the Electronic Frontier Foundation, told The Intercept that phrases such as “necessary to provide services” or “as permitted by law” raise red flags. This vague language cannily obscures any specifics of what the company is doing with the provided data.

“This is why we at EFF are big advocates for city council ordinances when surveillance technologies are employed on a population,” he said. “There should be some kind of oversight body that is making sure the new surveillance technology that’s employed isn’t going to violate the privacy rights of individuals.”

Cubic-MTA-NYC

A passenger successfully pays subway fare using OMNY, run by Cubic, in Brooklyn, N.Y. on Sept. 30th, 2022.

Photo: Elise Swain/The Intercept

Public Service, Private Equity

Cubic Corporation had been publicly traded since it was founded in 1959, but in May 2021, Veritas Capital and Evergreen Coast Capital paid roughly $3 billion to take the company private. Veritas also owns the Department of Homeland Security’s biometrics database and has acquired business units of Raytheon, Northrop Grumman, Lockheed Martin, and other defense contractors. One critic has suggested that Cubic’s recent acquisition by the private equity firms could exacerbate the company’s lack of interest in safeguarding users’ data.

Cubic’s defense industry ties highlight a stark paradox: Public transit is widely viewed as an essential public service, but the private contractors that enable the systems may have corporate incentives that don’t align with the goal of a common good. For instance, though the MTA has pushed back against privacy advocates’ concerns, Cubic’s own documents emphasize that it has broad ambitions for the use of rider data.

A brochure for the back-end analytics tool that Cubic offers to transit agencies boasts that the technology can enable transit authorities to search and visualize large datasets to “make discoveries” and “identify trends.” The software can also aggregate and anonymize personally identifiable information, turning that information into “an analytics-ready dataset that can be securely consumed for research, monetization schemes, and other internal and external purposes.” Experts have noted that even purportedly anonymized data holds privacy risks, as it is often possible to re-identify users with their personal information.

The company’s vision for NextCity would join data collected by Cubic with other smart-city infrastructure to “build a model for real-time data gathered across a transportation network.” Cubic Corporation’s annual reports outline how it aims to expand its portfolio beyond fare collection to include ride and bike sharing, tolls and parking, and traffic congestion reduction. Toward these ends, Cubic Corporation has acquired multiple companies in recent years that are focused on smart city technologies, including GRIDSMART, which supplies cameras to enable real-time traffic monitoring, and Delerrok, an electronic fare-collection system.

For now, cities with Cubic’s mobile-based payment systems also offer the option to purchase fare cards with cash, albeit for an additional $5, at select retailers. Individual people concerned with their privacy might opt for this method despite the convenience of OMNY and similar systems.

Despite the workarounds, transit authorities in major metropolitan areas are increasingly letting any notion of privacy fall by the wayside. As an increasing number of metropolitan areas embrace the concept of smart cities, the privacy risks associated with the technology are poised to grow — until, eventually, everyone’s choice between convenience and privacy might be made for them.


This content originally appeared on The Intercept and was authored by Schuyler Mitchell.

]]>
https://www.radiofree.org/2022/10/03/meet-the-military-contractor-running-fare-collection-in-new-york-subways-and-around-the-world/feed/ 0 338077
How Amazon, Google, and Facebook Helped Fund the Campaign to Overturn Roe https://www.radiofree.org/2022/10/01/how-amazon-google-and-facebook-helped-fund-the-campaign-to-overturn-roe/ https://www.radiofree.org/2022/10/01/how-amazon-google-and-facebook-helped-fund-the-campaign-to-overturn-roe/#respond Sat, 01 Oct 2022 18:00:27 +0000 https://theintercept.com/?p=409327

When the Supreme Court overturned Roe v. Wade, the country’s top internet companies quickly responded with commitments to help employees in states that moved to ban abortion. In an implicit signal of support for abortion rights, the companies said they would help those employees seek abortions in states where the procedure remains legal.

In the years leading up to the seismic reproductive rights decision, however, the tech giants sponsored a controversial group that’s worked tirelessly to put the Supreme Court under conservative control, setting the stage for Roe’s reversal.

The Independent Women’s Forum traces its origins back to the 1991 fight to confirm the Supreme Court nomination of Clarence Thomas. Since then, the group has expanded into promoting a litany of perennial right-wing causes like climate denial, immigration alarmism, and deregulation, but a conservative-dominated Supreme Court remained a focus.

Public relations plays a key role in its operation. With savvy self-branding as a pro-woman organization, the group fought for the appointment of conservative justices to the Supreme Court. The IWF couched support for Bret Kavanaugh as good feminism and any opposition to Amy Coney Barrett as sexism — despite well-founded concerns that their ascensions to the court would spell the end of Roe. The IWF wields a skillful mix of media placement, op-eds, television punditry, and other contributions to the conservative content ecosystem.

The group also takes advantage of quieter influence peddling as well. In 2020, IWF chief and Vicks VapoRub heiress Heather Higgins boasted to a closed audience of Virginia conservatives about how instrumental the group was in rallying congressional support for Kavanaugh’s nomination. Higgins told the group that the IWF circulated a confidential strategy memo on the Hill. “Most important,” Higgins said, “Susan Collins told me that without that memo, she would not see how to support him,” referring to the Republican senator from Maine.

Independent Women’s Forum and its sister organization, Independent Women’s Voice, draw on donations from right-wing financial mainstays like the Koch brothers, but in recent years the groups have enjoyed financial support from Facebook’s parent company, Meta; Google; and Amazon. In 2017, Google sponsored an IWF gala at the “gold” donor level, according to brochures provided to The Intercept by True North Research, a progressive watchdog group. Other brochures show that Meta (which at the time still using the name Facebook) sponsored IWF galas in 2018, alongside Google, and 2019. Honorees at IWF events have included notable anti-abortion figures like Rep. Lynne Cheney, R-Wy.; top Trump administration official Kellyanne Conway; and Vice President Mike Pence.

Corporate disclosures from Amazon show that the company donated undisclosed sums to the IWF in 2018, 2019, and 2020.

Amazon, Google, Meta, and the IWF did not respond to a request for comment.

True North founder Lisa Graves characterized the IWF’s efforts as an attempt to launder conservative ideology. “They act as a distaff,” she said in an interview, “in essence providing a woman’s face for the right wing’s critique or attack on progressives and its advance of this extreme and regressive, repressive agenda.”

Patrice Onwuka, director of the Independent Womens Forums Center for Economic Opportunity, speaks during a town hall event hosted by House Republicans on March 1, 2022 in Washington, DC.

Patrice Onwuka, director of the Independent Women’s Forum’s Center for Economic Opportunity, speaks during a town hall event hosted by House Republicans on March 1, 2022 in Washington, D.C.

Photo: Samuel Corum/Getty Images


Despite the public perception of Silicon Valley’s alignment with progressive values and liberal causes, tech companies, particularly those fearing state regulation, have long funneled money to right-wing groups like the IWF. At the same time, the IWF routinely pushes policy positions that are highly favorable to its corporate donors.

The IWF has consistently espoused tech industry-friendly positions on labor, antitrust, and other issues, without disclosing its donors’ interests. Take, for example, an April IWF blog post that warned that antitrust enforcement against Big Tech would prove disastrous. “Tech innovation has been nothing short of miraculous over the past few decades,” wrote Patrice Onwuka, director of IWF’s Center for Economic Opportunity and its go-to defender of powerful tech firms.

Few issues in tech have galvanized the IWF and Onwuka like the bipartisan American Innovation and Choice Online Act, which would block tech companies from leveraging their enormous reach to favor their own services over competitors. In a December 2021 piece titled “Amazon Prime may not be around to save the day next Christmas,” Onwuka claimed, “Senator Amy Klobuchar and others are on a path to end services like Prime’s fast and free shipping and other services that we depend upon.” Onwuka then linked to a blog post by the Amazon-funded Chamber of Progress that claimed, dubiously, that the law would “ban Amazon Prime.”

In June, Onwuka wrote a jeremiad against congressional antitrust efforts: “The conveniences that make life and work easier and faster and save consumers money may disappear.” Later that day, Onwuka appeared on Fox Business, again protesting antitrust enforcement against the tech industry. “I’m more worried about the impact on small business owners and on women and families that rely on some of the benefits that some of these big four tech companies provide,” she said.

While shielding Big Tech from antitrust scrutiny has proven a priority for the IWF, the group also stands up directly for its benefactors. In 2019, Onwuka wrote an entire post dedicated sticking up for Meta CEO Mark Zuckerberg after Politico reported that he had attended dinners with notable conservative commentators and lawmakers. “Zuckerberg is a private citizen who can eat dinner with whomever he wants,” Onwuka wrote. “His dinner has a clear business purpose and that’s part of doing business.”

“Institutionally they have no position on abortion, that’s their stated position. But organizationally, they have backed the most aggressive anti-choice slate of judges we’ve ever seen.”

The cordial treatment of industry giants is of course a linchpin of conservatism, and the IWF would almost certainly be warning that antitrust will bring us back to the Bronze Age even without Google sponsoring its gala dinners. But fueling the right-wing punditry mill is a large, ever-expanding facet of Big Tech’s political strategy.

While there’s no evidence that Zuckerberg or Google CEO Sundar Pichai have any personal opposition to abortion access, their companies no doubt benefit from their support of a broad, thriving conservative discourse ecosystem in which any government regulation is anathema. For tech company leadership, the reality that this ecosystem pushes not just Facebook-friendly laissez-faire economics, but also climate denial and abortion bans is considered a perhaps unfortunate but worthwhile byproduct.

Silicon Valley’s patronage of right-wing think tanks and campaigns is an arrangement in which there is ample plausible deniability to go around. When The Guardian reported in 2019 that Google was donating to some of the nation’s most notorious climate-denial organizations, a company spokesperson retorted, “We’re hardly alone among companies that contribute to organizations while strongly disagreeing with them on climate policy.”

The multitude of topics on which the IWF engages, and its careful avoidance of publicly opposing abortion access have helped it avoid a reputation as an anti-abortion group. “Institutionally they have no position on abortion, that’s their stated position,” explained Graves, of True North. “But organizationally, they have backed the most aggressive anti-choice slate of judges we’ve ever seen.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/10/01/how-amazon-google-and-facebook-helped-fund-the-campaign-to-overturn-roe/feed/ 0 337927
Creating the Good Anthropocene: Towards a Socialist Future https://www.radiofree.org/2022/09/29/creating-the-good-anthropocene-towards-a-socialist-future/ https://www.radiofree.org/2022/09/29/creating-the-good-anthropocene-towards-a-socialist-future/#respond Thu, 29 Sep 2022 15:35:14 +0000 https://dissidentvoice.org/?p=133802 Capitalism has always had a chorus of sirens that have striven to allure Homo sapiens from thinking they had any chance to escape its clutches. Margaret Thatcher proclaimed ‘there is no alternative’ in 1980. In the wake of the Soviet Union’s collapse, Francis Fukuyama declared the ‘End of History’ in 1992. Given the fall of […]

The post Creating the Good Anthropocene: Towards a Socialist Future first appeared on Dissident Voice.]]>
Capitalism has always had a chorus of sirens that have striven to allure Homo sapiens from thinking they had any chance to escape its clutches. Margaret Thatcher proclaimed ‘there is no alternative’ in 1980. In the wake of the Soviet Union’s collapse, Francis Fukuyama declared the ‘End of History’ in 1992. Given the fall of the Soviet Union, the decline and isolation of the Cuban economy, and the dominance of the ‘Washington Consensus’, the decade after the Cold War was one of capitalist triumphalism. It was during that time the Marxist literary critic Frederic Jameson famously wrote that ‘it is easier to imagine the end of the world than the end of capitalism.’

The late Mark Fisher described all this as ‘capitalist realism’ (the title of his 2008 book on the subject), ’the widespread sense that not only is capitalism the only viable political and economic system, but also that it is now impossible to even imagine a coherent alternative to it.’ Central to capitalist realism is the idea that an economy based on planning and democracy is not viable, inevitably leading to endemic shortages, bureaucracy, and stagnant growth.

Such were the arguments put forward by Austrian School economist Ludwig von Mises in his seminal 1920 essay titled ‘Economic Calculation in the Socialist Commonwealth.’ Mises asked how could planning boards know which products to produce, how much should be produced at a given time, which raw materials had to be used, and how much of them? Where should production be located and which production process is the most efficient? And how would all this information be gathered and calculated and then be retransmitted back to all the relevant actors throughout the economy? Mises’ answer was that no human process could accomplish it. He argued it is simply beyond the capacity of any planning agency to accurately describe supply and demand across all economic sectors, therefore planners working with flawed data would regularly produce vast mismatches between what is demanded and what is supplied, resulting in inevitable shortages and the requisite barbarism.

Instead Mises argued the simple mechanism of prices floating in a market contain all the needed information. This argument was later taken up by Friedrich von Hayek. Hayek also viewed prices as information-gathering machines reflecting the discrete bits of knowledge scattered among executives, workers, and consumers. Prices, derived from the collective wisdom of the crowd, could coordinate information through a decentralized network Hayek called a ‘spontaneous order’, making planning unnecessary.

On the surface these arguments seem formidable and have been used against socialism for generations. Lenin himself acknowledged the difficulty of building a planned economy in revolutionary Russia in the aftermath of the destruction of World War I when he said to the Session of the all-Russia C.E.C. in 1918:

We know about socialism, but knowledge of organization on a scale of millions, knowledge of the organization and distribution of goods, etc.- this we do not have. The old Bolshevik leaders did not teach us this…And we say, let him be a thorough-paced rascal even, but if he has organized a trust, if he is a merchant who has dealt with the organization of production and distribution for millions and tens of millions, if he has acquired experience- we must learn from him.

But these arguments can certainly be dismantled. Consider first how much planning and public research is already happening in a modern economy.  For instance, in what has now long been an annual routine of anticipation and leaks in the business press, Apple again recently launched its latest version of the iPhone, iPhone 14 (and the pricier iPhone 14 Pro). The release of iPhone 13 last September brought back the long lines of loyal devotees to Apple stores all over the world after the pandemic paused the ritual. It was the iPhone first released in 2007 (followed by the iPad), that ultimately made Apple the first company in the world to reach a trillion dollars in market cap value on August 18, 2018- not to mention the first to reach $2 trillion (August 19, 2020) and $3 trillion (January 3, 2022). In the five year period following the 2007 launch, Apple’s global net sales increased nearly 460 percent. It was the iPhone that more than anything made Steve Jobs a modern icon.

Beyond that, the iPhone (and smart phones generally) is often held up by defenders of the status quo as proof that the status quo is working just fine. After all, what better evidence of the power of capital than the fact that billions of humans now hold in the palm of their hands more than 100,000 the processing power and more than one million times the Random Access Memory than the computer that landed Apollo 11 on the moon in 1969? A few years ago the meme ‘Capitalism Made Your iPhone’ made the rounds on social media.

If that narrative sounds compelling, it is also quite incomplete. While Jobs and the product designers at Apple undoubtedly had a talent for synergy and design, the Bauhaus inspired minimalist look to the iPhone was always a large part of its brilliance, the actual technology inside the iPhone has its roots not in Apple labs but in publicly funded research. This includes touch-screen displays, GPS, the Internet, even Siri. The first workable prototype for the internet came in late 1960 with ARPANET (Advanced Research Projects Agency Network) funded by the U.S. Department of Defense. GPS got its start the same way a few years later.  Federal funding for computer science increased rapidly in the 1970s, reaching $250 million annually by 1975. The internet received another boost with the establishment of the National Center for Supercomputing Applications, funded by the National Science Foundation in the 1980s (out of which emerged Mosaic which later became Netscape). The U.S. government was an early, sole consumer for processing units based on Integrated Circuits. It heavily subsidized the domestic semiconductor industry in late 1980s to the early 1990s through the SEMATECH program. Apple was able to ride this wave of massive state investments in the technologies that underpinned the iPhone.

It also has to be pointed out, as brilliantly described by Leigh Phillips and Michal Rozworski in their book The People’s Republic of Wal-Mart, that large, successful enterprises, even while operating within a general market economy, do a great deal of large scale planning internally. Some of these companies have larger market caps than most countries’ GDP. Apple and Amazon are worth more than 90 percent of the world’s countries. In 1970 the GDP of the Soviet Union, the second largest economy in the world at the time, came in at around $433.4 billion. In 2021 Wal-Mart’s revenue was $572.8 billion. These organizations eschew internal markets. The different departments, stores, and suppliers don’t compete with each other. Everything is coordinated. To that extant one can say much of the global economy is already planned.

In fact, there is a recent example of a corporation that actually took markets seriously enough to attempt to incorporate them internally. In February 2013, Edward Lampert, founder of the hedge fund ESL Investments, took over as the CEO of Sears Holdings (the parent company of Kmart and Sears formed after the former bought the latter), one of Wal-Mart’s main competitors. Sears goes back to 1892. Its catalog once revolutionized shopping for Americans, particularly the many back then who lived in rural areas. Lampert announced his intention to create markets within the company, breaking it up into 30, then later 40, autonomous units that would compete with each other. Each unit had their own president, board of directors, chief operating officer, and separately measured their own profit and losses. The idea being this would efficiently produce better data.

Instead it devolved to absurdity. Creating internal divisions blocked internal synergy. If a division needed help from the HR or IT departments, it had to write a formal request or use a contractor. In order to optimize profits at one division at the expense of others, infighting erupted over everything from floor shelving to advertising space on circulars. The results quickly spoke for themselves. A Bloomberg expose from 2013 described the gross spectacle of screw drivers being advertised next to lingerie. Little funding went to needed upgrades at stores, many of which became dilapidated. Sales dropped by $10 billion. By October 2018 Sears Holdings filed for bankruptcy and Lampert stepped down as CEO (though he remained chairman). While Sears was facing stagnation since the 1990s as online retail took off, it was an epic Randian failure that truly crashed it.

Compare all that to the fluidity of Amazon. Amazon is certainly a soul-sucking corporation that grinds workers to dust. Yet it has achieved logistical and operational genius. Consider that at any given moment Amazon has 600 million items up for sale, basically all available to be home delivered within two days from strategically placed distribution centers that more and more run on algorithms and robotics. Amazon uses search and point-of-sales data and search history to stock the centers. The result: Amazon receives about 115 orders, basically a full delivery truck worth, every second. That’s 10 million fulfilled orders for a day. An estimated 60 percent of U.S. adults are Amazon Prime members.

In a November 2019 profile for The Atlantic of Amazon founder and then CEO Jeff Bezos, Franklin Foer had this astute observation:

Amazon, however, has acquired the God’s-eye view of the economy that Hayek never imagined any single entity could hope to achieve. At any moment, its website has more than 600 million items for  sale and more than 3 million vendors selling them. With its history of past purchases, it has collected the world’s most comprehensive catalog of consumer desire, which allows it to anticipate both individual and collective needs.  With its logistics business—and its growing network of trucks and planes— it has an understanding of the flow of goods around the world. In other words, if Marxist revolutionaries ever seized power in the United States, they could nationalize Amazon and call it a day.

This would definitely be quite a first step, but only a first step. Socialism focuses on social relations and workers democracy. Simply nationalizing Amazon wouldn’t achieve it and, in fact, risks replacing the dictatorship of capital with another dictatorship. But the greater point holds. Such efficiency, flexible planning, and logistical power could be captured and used to create a just, egalitarian society. In a world full of crisscrossing cables, instant global communication, along with ever expanding AI, the arguments of Mises and Hayek truly lose their power. There are now many trillions of pieces worth of data that could be used to make non-market decisions about how to allocate the use of resources. ‘Big Data’ understandably has a bad name among many leftists; however, data is the lifeblood of any planned economy. Rather than being used for surveillance and targeted advertising, it can be used to determine and fulfill peoples’ needs.

We have a rudimentary example of how this could work from Chile’s socialist experiment in the early 1970s. By the end of 1971 the Allende government had nationalized more than 150 enterprises, including twelve of the twenty largest companies in the country. Recognizing the difficulty of reordering the economy in the face of fierce opposition and American sanctions, the government instituted Project Cybersyn. The aim, using the limited computing power that was available to Chile at the time (there was only one mainframe IBM 360/50 available for the project, it relied instead on a network of telex machines), to connect data from the factory floor and the State Development Corporation in order to enable quick decision-making in response to changing conditions. The system would provide daily access to production data and modeling tools the state could use to predict future economic behavior. A futuristic control room would facilitate communication and data analysis.

As described by Eden Medina in her book Cybernetic Revolutionaries, though primitive and ultimately not completed, the system did enable the government to overcome a general strike called by the opposition in October 1972. Shortages were quickly reported through the network allowing different enterprises shifted resources. Government data showed raw materials continued to flow to 95 percent of economically crucial enterprises and food supplies were maintained at 50 to 70 percent. Project Cybersyn didn’t survive the Pinochet coup in 1973 so its full potential wasn’t tapped, yet the promise remains. It is easy to imagine what can be planned with today’s computing power and mountains of data.

Of course, it takes more than advanced computer modeling and AI to build socialism. It first takes the working class democratically controlling the means of production. This can ultimately only be won at the barricades. However, as examples from the technologies of the iPhone to Amazon to the COVID vaccines show, planning works. More and more we are moving toward Trotsky’s vision of the future of human innovation spelled out in Literature and Revolution:

He will point out places for mountains and for passes. He will change the course of rivers and he will lay down rules for oceans. The idealist simpletons may say this is a bore, but that is why they are simpletons…. Most likely, thickets and forests and grouse and tigers will remain, but only where man commands them to remain.  And man will do it so well the tiger won’t even notice the machine, or feel the change, but will live as he lived in primeval times.

While there is a wide range of opinions as to when its beginning should be marked, there is now an emerging consensus that the planet is indeed in a new period of geological history, the Anthropocene, one in which human civilization essentially creates its own environment. This concept no doubt causes many to tremble in fear but denial of our collective responsibility will not change it. The specter of global warming, possible future pandemics, and other environmental challenges are awesome, but so are the possibilities of maximizing human freedom, ending war and poverty, and probing deep space. We cannot trust the irrational, unplanned capitalist system with its destructive incentives to fulfill our potential. As the world is witnessing with the COVID pandemic and global food crisis, far from the picturesque visions of Mises and Hayek, a reliance of markets leads to inefficiency, hoarding, and reactionary nationalism. The only good Anthropocene is socialist.  Its vehicle is an empowered global working class. It still has a world to win.

The post Creating the Good Anthropocene: Towards a Socialist Future first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Joseph Grosso.

]]>
https://www.radiofree.org/2022/09/29/creating-the-good-anthropocene-towards-a-socialist-future/feed/ 0 337255
The CIA Just Invested in Woolly Mammoth Resurrection Technology https://www.radiofree.org/2022/09/28/the-cia-just-invested-in-woolly-mammoth-resurrection-technology/ https://www.radiofree.org/2022/09/28/the-cia-just-invested-in-woolly-mammoth-resurrection-technology/#respond Wed, 28 Sep 2022 15:03:32 +0000 https://theintercept.com/?p=408983

As a rapidly advancing climate emergency turns the planet ever hotter, the Dallas-based biotechnology company Colossal Biosciences has a vision: “To see the Woolly Mammoth thunder upon the tundra once again.” Founders George Church and Ben Lamm have already racked up an impressive list of high-profile investors, including Peter Thiel, Tony Robbins, Paris Hilton, Winklevoss Capital — and, according to the public portfolio its venture capital arm released this month, the CIA.

Colossal says it hopes to use advanced genetic sequencing to resurrect two extinct mammals — not just the giant, ice age mammoth, but also a mid-sized marsupial known as the thylacine, or Tasmanian tiger, that died out less than a century ago. On its website, the company vows: “Combining the science of genetics with the business of discovery, we endeavor to jumpstart nature’s ancestral heartbeat.”

In-Q-Tel, its new investor, is registered as a nonprofit venture capital firm funded by the CIA. On its surface, the group funds technology startups with the potential to safeguard national security. In addition to its long-standing pursuit of intelligence and weapons technologies, the CIA outfit has lately displayed an increased interest in biotechnology and particularly DNA sequencing.

“Why the interest in a company like Colossal, which was founded with a mission to “de-extinct” the wooly mammoth and other species?” reads an In-Q-Tel blog post published on September 22. “Strategically, it’s less about the mammoths and more about the capability.”

Colossal uses CRISPR gene editing, a method of genetic engineering based on a naturally occurring type of DNA sequence. CRISPR sequences present on their own in some bacterial cells and act as an immune defense system, allowing the cell to detect and excise viral material that tries to invade. The eponymous gene editing technique was developed to function the same way, allowing users to snip unwanted genes and program a more ideal version of the genetic code.

“CRISPR is the use of genetic scissors,” Robert Klitzman, a bioethicist at Columbia University and a prominent voice of caution on genetic engineering, told The Intercept. “You’re going into DNA, which is a 3-billion-molecule-long chain, and clipping some of it out and replacing it. You can clip out bad mutations and put in good genes, but these editing scissors can also take out too much.”

The embrace of this technology, according to In-Q-Tel’s blog post, will help allow U.S. government agencies to read, write, and edit genetic material, and, importantly, to steer global biological phenomena that impact “nation-to-nation competition” while enabling the United States “to help set the ethical, as well as the technological, standards” for its use.

In-Q-Tel and Colossal did not respond to The Intercept’s requests for comment.

In recent years, the venture firm’s portfolio has expanded to include Ginkgo Bioworks, a bioengineering startup focused on manufacturing bacteria for biofuel and other industrial uses; Claremont BioSolutions, a firm that produces DNA sequencing hardware; Biomatrica and T2 Biosystems, two manufacturers for DNA testing components; and Metabiota, an infectious disease mapping and risk analysis database powered by artificial intelligence. As The Intercept reported in 2016, In-Q-Tel also invested in Clearista, a skincare brand that removes a thin outer epidermal layer to reveal a fresher face beneath it — and allow DNA collection from the skin cells scraped off.

President Joe Biden’s administration signaled its prioritization of related advances earlier this month, when Biden signed an executive order on biotechnology and biomanufacturing. The order includes directives to spur public-private collaboration, bolster biological risk management, expand bioenergy-based products, and “engage the international community to enhance biotechnology R&D cooperation in a way that is consistent with United States principles and values.”

The government’s penchant for controversial biotechnology long predates the Biden administration. In 2001, a New York Times investigation found that American defense agencies under Presidents George W. Bush and Bill Clinton had continued to experiment with biological weapons, despite a 1972 international treaty prohibiting them. In 2011, The Guardian revealed that the CIA under President Barack Obama organized a fake Hepatitis B vaccine drive in Pakistan that sought to locate family members of Osama bin Laden through nonconsensual DNA collection, leading the agency to eventually promise a cessation of false immunization campaigns.

CIA Labs, a 2020 initiative overseen by Donald Trump’s CIA director, Gina Haspel — infamous for running a torture laboratory in Thailand — follows a model similar to In-Q-Tel’s. The program created a research network to incubate top talent and technology for use across U.S. defense agencies, while simultaneously allowing participating CIA officers to personally profit off their research and patents.

In-Q-Tel board members are allowed to sit on the boards of companies in which the firm invests, raising ethics concerns over how the non-profit selects companies to back with government dollars. A 2016 Wall Street Journal investigation found that almost half of In-Q-Tel board members were connected to the companies where it had invested.

The size of In-Q-Tel’s stake in Colossal won’t be known until the nonprofit releases its financial statements next year, but the investment may provide a boon on reputation alone: In-Q-Tel has claimed that every dollar it invests in a business attracts 15 more from other investors.

Colossal’s co-founders, Lamm and Church, represent the venture’s business and science minds, respectively. Lamm, a self-proclaimed “serial technology entrepreneur,” founded his first company as a senior in college, then pivoted to mobile apps and artificial intelligence before helping to start Colossal.

Church — a Harvard geneticist, genome-based dating app visionary, and former Jeffrey Epstein funding recipient — has proposed the revival of extinct species before. Speaking to Der Spiegel in 2013, Church suggested the resurrection of the Neanderthal — an idea met with controversy because it would require technology capable of human cloning.

“We can clone all kinds of mammals, so it’s very likely that we could clone a human,” Church said. “Why shouldn’t we be able to do so?” When the interviewer reminded him of a ban on human cloning, Church said, “And laws can change, by the way.”

Even when the methods used for de-extinction are legal, many scientists are skeptical of its promise. In a 2017 paper for Nature Ecology & Evolution, a group of biologists from Canada, Australia, and New Zealand found that “[s]pending limited resources on de-extinction could lead to net biodiversity loss.”

“De-extinction is a fairytale science,” Jeremy Austin, a University of Adelaide professor and director of the Australian Center for Ancient DNA, told the Sydney Morning Herald over the summer, when Colossal pledged to sink $10 million into the University of Melbourne for its Tasmanian tiger project. “It’s pretty clear to people like me that thylacine or mammoth de-extinction is more about media attention for the scientists and less about doing serious science.”

It remains to be seen if Colossal, with In-Q-Tel’s backing, can make good on its promises. And it’s unclear what, exactly, the intelligence world might gain from the use of CRISPR. But perhaps the CIA shares the company’s altruistic, if vague, motives: “To advance the economies of biology and healing through genetics. To make humanity more human. And to reawaken the lost wilds of Earth. So we, and our planet, can breathe easier.”


This content originally appeared on The Intercept and was authored by Daniel Boguslaw.

]]>
https://www.radiofree.org/2022/09/28/the-cia-just-invested-in-woolly-mammoth-resurrection-technology/feed/ 0 336922
No, Elon Musk’s Starlink Probably Won’t Fix Iranian Internet Censorship https://www.radiofree.org/2022/09/27/no-elon-musks-starlink-probably-wont-fix-iranian-internet-censorship/ https://www.radiofree.org/2022/09/27/no-elon-musks-starlink-probably-wont-fix-iranian-internet-censorship/#respond Tue, 27 Sep 2022 18:50:49 +0000 https://theintercept.com/?p=409092

Elon Musk is once again suggesting his business interests can solve a high-profile crisis: This time, the SpaceX CEO says Starlink satellite internet can alleviate Iran’s digital crackdown against ongoing anti-government protests. Iranian dissidents and their supporters around the world cheered Musk’s announcement that Starlink is now theoretically available in Iran, but experts say the plan is far from a censorship panacea.

Musk’s latest headline-riding gambit came after Iran responded to the recent rash of nationwide protests with large-scale disruption of the country’s internet access. On September 23, Secretary of State Anthony Blinken announced the U.S. was easing restrictions on technology exports to help counter Iranian state censorship efforts.

Musk, ready to pounce, quickly replied: “Activating Starlink …”

Predictably, Musk’s dramatic tweet set off a frenzy. Within a day, venture capitalist and longtime Musk-booster Shervin Pishevar was already suggesting Musk had earned the Nobel Peace Prize. Just the thought of Starlink “activating” an uncensored internet for millions during a period of Middle Eastern political turmoil was an instant public relations coup for Musk.

In Iran, though, the notion of a benevolent American billionaire beaming freedom to Iran by satellite is derailed by the demands of reality, specifically physics. Anyone who wants to use Starlink, the satellite internet service provider operated by Musk’s rocketry concern, SpaceX, needs a special dish to send and receive internet data.

“I don’t think it’s much of a practical solution because of the problem of smuggling in the ground terminals.”

While it may be possible to smuggle Starlink hardware into Iran, getting a meaningful quantity of satellite dishes into Iran would be an incredible undertaking, especially now that the Iranian government has been tipped off to the plan on Twitter.

Todd Humphreys, an engineering professor at the University of Texas at Austin whose research focuses on satellite communication, said, “I don’t think it’s much of a practical solution because of the problem of smuggling in the ground terminals.”

The idea is not without precedent. In Ukraine, after the Russian invasion disrupted internet access, the deployment of Musk’s satellite dishes earned him international press adulation and a bevy of lucrative government contracts. In Ukraine, though, Starlink was welcomed by a profoundly pro-American government desperate for technological aid from the West. U.S. government agencies were able to ship the requisite hardware with the full logistical cooperation of the Ukrainian government.

This is not, to say the very least, the case in Iran, where the government is unlikely to condone the import of a technology explicitly meant to undermine its own power. While Musk’s claim that Starlink’s orbiting satellites are activated over Iran may be true, the notion that censorship-free internet connectivity is something that can be flipped on like a light switch is certainly not. Without dishes on the ground to communicate with the satellites, it’s a meaningless step: technologically tantamount to giving a speech to an empty room.

Humphreys, who has previously done consulting work for Starlink, explained that because of the specialized nature of Starlink hardware, it’s doubtful Iranians could craft a DIY alterative. “It’s not like you can build a homebrew receiver,” he said. “It’s a very complicated signal structure with a very wideband signal. Even a research organization would have a hard time.”

Musk is famously uninterested in the constraints imposed by reality, but he seems to acknowledge the problem to some degree. In a September 25 tweet, Carnegie Endowment for International Peace fellow Karim Sadjadpour wrote, “I spoke w/ @elonmusk about Starlink in Iran, he gave me permission to share this: ‘Starlink is now activated in Iran. It requires the use of terminals in-country, which I suspect the [Iranian] government will not support, but if anyone can get terminals into Iran, they will work.’”

Implausibility hasn’t stopped Musk’s fans, either. One tweet from a senior fellow at the Atlantic Council purporting to document a Starlink dish already successfully secreted into Iran turned out to be a photo from 2020, belonging to an Idaho man who happened to have a Persian rug.

The fandom — and the starpower it’s attached to — might be the point here. Given the obstacles, Musk’s Starlink aspirations may be best understood in the context of his past spectacular, spectacularly unfulfilled claims, rather than something akin to Starlink’s rapid adoption in Ukraine. Musk’s penchant for internet virality has become a key component of his business operations. He has repeatedly made bold pronouncements, typically on Twitter, that a technology he happens to manufacture is the key to cracking some global crisis. Whether it’s Thai children stuck in a waterlogged cave, the Covid-19 pandemic, or faltering American transit infrastructure, Musk has repeatedly offered technological solutions that are either plainly implausible, botched in execution, or a mixture of both.

It’s not just the lack of dishes in Iranian homes. Musk’s plan is further complicated by Starlink’s reliance on ground stations: communications facilities that allow the SpaceX satellites to plug into earthbound internet infrastructure from orbit. While upgraded Starlink satellites may no longer need these ground stations in the near future, the network of today still largely requires them to service a country as vast as Iran, said Humphreys, the University of Texas professor. Again, Iran is unlikely to approve the construction within its borders of satellite installations owned by an American defense contractor.

Humphreys suggested that ground stations built in a neighboring country could provide some level of connection, albeit at reduced speed, but that still doesn’t get over the hump of every Iranian who wants to get online needing a $550 kit with “Starlink” emblazoned on the box. While Humphreys added that he was hopeful that a slow trickle of Starlinks terminals could aid Iranian dissidents over time, he said, “I don’t think in the short term this will have an impact on the unrest in Iran.”

Alp Toker, director of the internet monitoring and censorship watchdog group NetBlocks, noted that many Iranians already watch banned satellite television channels through contraband dishes, meaning the smuggling of Starlink dishes is doable in theory. While he praised the idea of bringing Starlink to Iran as “credible and worthwhile” in the long term, the difficulty in sourcing Starlink’s specialized equipment means that accessing Musk’s satellites remains “a solution for the few,” not a counter to population-scale censorship.

While future versions of the Starlink system might be able to communicate with more accessible devices like handheld phones, Toker said, “As far as we know this isn’t possible with the current generation of kit, and it won’t be until then that Starlink or similar platforms could simply ‘switch on’ internet in a country in the sense that most people understand.”

Even with Iran’s culture of bootleg satellite TV, these experts warned that a Starlink connection could endanger Iranians. Rose Croshier, a policy fellow at the Center for Global Development, noted the risks: “A word of caution: TV dishes are passive — they don’t transmit — so a Starlink terminal (that both receives and transmits data) in a crowd of illegal satellite dishes would still be very findable by Iranian authorities.”

“I don’t think in the short term this will have an impact on the unrest in Iran.”

The plan faces further terrestrial hurdles. The complex two-way nature of satellite connections is part of why they’re subject to international regulation, most notably through the International Telecommunication Union, of which both the United States and Iran are members. Croshier pointed to a 2021 paper on satellite internet usage by the Asia Development Bank that explained how “US-based entities such as Starlink … require regulatory approval from the FCC as well the ITU” and that “service provision to customers will require regulatory approval in every country of operation.” Mahsa Alimardani, a senior Middle East researcher at Article19, a free expression advocacy group, tweeted that even if Starlink could beam internet to Iranians in a meaningful way, the company would face consequences from the International Telecommunications Union if it did so without Iranian approval — approval it is unlikely to ever get.

Then there are sanctions against Iran. Blinken, the secretary of state, announced a relaxation of tech exports, but the restrictions on trade with Iran remain a serious obstacle. “There are a host of human rights related sanctions on Iranian actors in the IT space under a sanctions authority called GHRAVITY that complicate any of this beyond the questions raised of whether Iran would allow Starlink terminals in country,” explained Brian O’Toole, a senior fellow at the Atlantic Council and expert on global sanctions. The relaxed rules would still require a special license for Starlink use in Iran, O’Toole said, which he doubts would be granted: “Much of this Starlink stuff doesn’t appear terribly likely to do much, from my point of view.”

Starlink — or a competitor — may one day bring unfettered net uplinks to Iran and other countries where online dissent is choked out, but for today’s Iranian protesters, the realities far exceed the PR punch of a two-word tweet.


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/09/27/no-elon-musks-starlink-probably-wont-fix-iranian-internet-censorship/feed/ 0 336742
Former NSA Chief Signed Deal to Train Saudi Hackers Months Before Jamal Khashoggi’s Murder https://www.radiofree.org/2022/09/26/former-nsa-chief-signed-deal-to-train-saudi-hackers-months-before-jamal-khashoggis-murder/ https://www.radiofree.org/2022/09/26/former-nsa-chief-signed-deal-to-train-saudi-hackers-months-before-jamal-khashoggis-murder/#respond Mon, 26 Sep 2022 16:41:23 +0000 https://theintercept.com/?p=408754

In early 2018, former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers to take on the kingdom’s enemies.

While the agreement between IronNet, founded by Alexander, and the cyber school was widely reported in intelligence industry outlets and the Saudi press at the time, it faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later.

Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security, Artificial Intelligence, and Advanced Technologies — a school set up to train Saudi cyber intelligence agents — at a signing ceremony in Washington, D.C., according to an announcement in early July.

Qahtani’s proxy at the signing noted in a statement that “the strategic agreement will ensure [Saudi Arabia is] benefiting from the experience of an advisory team comprising senior officers who had held senior positions in the Cyber Command of the US Department of Defense.” Alexander’s for-profit cyber security firm IronNet would work closely with the Saudi Federation of Cybersecurity, Programming, and Drones, an affiliate of the college devoted to offensive cyber operations and at the time overseen by Qahtani.

Saudi Arabia’s agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom’s critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul.

It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype to insult Khashoggi during the ordeal, allegedly instructing his team to “bring me the head of the dog.” Khashoggi was then dismembered with a bone saw.

IronNet’s agreement tied to the alleged mastermind behind the killing of Khashoggi is not listed on the IronNet website, and it is not known if the business relationship still stands — or what the extent of it ever was. IronNet and representatives of the Saudi government did not respond to repeated requests for comment. The Saudi Arabia relationship, according to former IronNet employees, has largely been shrouded in secrecy, even within the firm.

Qahtani’s role of enforcer on behalf of bin Salman, well known prior to the Khashoggi slaying, has closely followed the young prince’s meteoric rise as the effective leader of Saudi Arabia.

In 2017, Qahtani played a pivotal role in the abduction and interrogation of hundreds of Saudi elites, who were held captive at the Ritz-Carlton in Riyadh, at which they were forced to pledge loyalty and money to Salman. Qahtani personally led the questioning efforts, according to reports.

Later that year, he reportedly participated in the interrogation of former Lebanese Prime Minister Saad al-Hariri, who was beaten and forced to resign. The following year, according to the brother of Saudi women’s rights activist Loujain al-Hathloul, Qahtani also directly participated in the torture of al-Hathloul, where he mocked her and threatened to have her raped.

On behalf of the kingdom, Qahtani has made it his personal quest to acquire and expand Saudi cyberwarfare tools. Beyond the deal with IronNet and other top-flight American cyber experts, he has spent over a decade directly negotiating the accumulation of computer and phone infiltration technology.

Qahtani took the helm of official state-backed efforts to expand Saudi Arabia’s cyber offensive capabilities in October 2017, when he was named president of a committee called the Electronic Security and Software Alliance, later renamed the Saudi Federation for Cybersecurity, Programming, and Drones.

Earlier this year, SAFCSP signed an agreement with Spire Solutions, a consulting firm that partners with a wide range of cyber intelligence contractors. Haboob, another cyber venture promoted by Qahtani, is a private venture that recruits hackers on behalf of the Saudi government. Haboob’s chair, Naif bin Lubdah, is on SAFCSP’s board of directors.

In 2018, Chiron Technology Services, another American cyber consulting firm, also inked a memorandum of understanding to provide training to the same Saudi hacker school advised by IronNet. Chiron’s team includes top talent recruited from the U.S. Air Force, Army, and NSA, including Michael Tessler, who previously worked at the NSA’s Tailored Access Operations command, which handles high-profile computer infiltration missions of foreign governments.

Jeff Weaver, the chief executive of Chiron, said in an email that his company signed a memorandum of understanding “with the college to develop a cybersecurity curriculum in support of their technical degree programs. However, no collaboration ever occurred, and they never called on us to contribute. We haven’t heard from them since 2018.”

Online cyber sleuths identified Qahtani’s multiple handles on online hacking forums, where he was an active member seeking to purchase hacking tools. A screen name used by Qahtani, for instance, appeared to have purchased a remote access trojan known as Blackshades, which can infect targeted computers to modify and seize files, activate the webcam, and record keystrokes and passwords.

Cybersecurity researchers have identified powerful hacking technology implanted on the phones of Khashoggi’s family, likely by agents of the United Arab Emirates, a close Saudi ally. Several received malicious texts that infected their phones with Pegasus, a tool created by the NSO Group to remotely access a target’s microphone, text messages, and location.

Qahtani, who briefly faced house arrest, was swiftly cleared of wrongdoing in Khashoggi’s death by the Saudi government. Five of the hitmen in the squad sent to kill Khashoggi were sentenced to death, including Maher Abdulaziz Mutreb, an intelligence officer who worked under Qahtani. Qahtani’s current relationship with the institute is unknown.

People hold posters of slain Saudi journalist Jamal Khashoggi, near the Saudi Arabia consulate in Istanbul, marking the two-year anniversary of his death, Friday, Oct. 2, 2020. The gathering was held outside the consulate building, starting at 1:14 p.m. (1014 GMT) marking the time Khashoggi walked into the building where he met his demise. The posters read in Arabic:' Khashoggi's Friends Around the World'. (AP Photo/Emrah Gurel)

People hold posters of slain Saudi journalist Jamal Khashoggi, near the Saudi Arabia consulate in Istanbul, on Oct. 2, 2020.

Photo: Emrah Gurel/AP


Following Khashoggi’s killing, many U.S. firms faced pressure to exit business deals with Saudi Arabian entities. Yet, in the years following Khashoggi’s murder, the Saudi cyberwarfare institute central to the plot has continued to do business with Western defense industry leaders.

In 2019, BAE Systems, a major defense contractor based in the U.S. and the U.K., entered into a training agreement with the MBS College of Cyber Security. Last year, Cisco unveiled a training relationship with the Saudi Federation of Cybersecurity, Programming, and Drones.

BAE, reached for comment, distanced itself from the deal. “BAE Systems works with a number of partner companies based in Saudi Arabia,” said a spokesperson for the company. “ISE, one of our Saudi partner companies, was awarded a contract in 2019 by the MBS College for Cyber Security to provide support services to establish the college, such as general staffing and facilities management but this contract wasn’t activated and is still on hold.”

Alexander has continued to do work in the region as a member of Amazon’s board. Intelligence Online, a trade outlet for intelligence contractors, reported, “As a partner of Amazon, for which it offers native surveillance of its AWS’ cloud traffic, IronNet helps the company win public contracts, especially since CEO Keith Alexander has sat on Amazon’s board.”

IronNet, however, has faltered in recent months, with two waves of layoffs this year and a lawsuit from investors. The company has touted skyrocketing growth, like many defense-related contractors, by promising to harness growing security threats. Much of the American traditional defense industry has long sought lucrative foreign relationships, particularly with the Saudi Arabian government, a path IronNet appears to have attempted to follow.

And President Joe Biden, who promised during his election campaign to make the Saudi state a “pariah” over the slaying, has since appeared to move on from the scandal. In June, he traveled to Riyadh to shore up the U.S.-Saudi alliance and request an increase in oil production. The four-year anniversary of Khashoggi’s slaying is on October 2.


This content originally appeared on The Intercept and was authored by Lee Fang.

]]>
https://www.radiofree.org/2022/09/26/former-nsa-chief-signed-deal-to-train-saudi-hackers-months-before-jamal-khashoggis-murder/feed/ 0 336340
Small communities could be buying, selling and saving money on electric power right now – here’s how https://www.radiofree.org/2022/09/25/small-communities-could-be-buying-selling-and-saving-money-on-electric-power-right-now-heres-how/ https://www.radiofree.org/2022/09/25/small-communities-could-be-buying-selling-and-saving-money-on-electric-power-right-now-heres-how/#respond Sun, 25 Sep 2022 00:26:05 +0000 https://asiapacificreport.nz/?p=79560 ANALYSIS: By Soheil Mohseni, Te Herenga Waka — Victoria University of Wellington and Alan Brent, Te Herenga Waka — Victoria University of Wellington

Globally, the electricity sector is shifting from large, centralised grids powered by fossil fuels to smaller and smarter renewable local networks.

One area of strong interest is “energy arbitrage”, which allows users to buy and store electricity when it is cheaper and sell or use it when the cost is high.

But Aotearoa New Zealand is slow to take this up — even though it is a crucial part of the transition to a zero-carbon future. Why is this?

Small-grid technologies and infrastructure are still in the experimental phase, being tested for effectiveness and desirability of different set-ups, ownership models and commercial arrangements.

And intelligent energy-management systems that can provide a prescient forecast of market dynamics are not used widely.

To better understand these dynamics, we have modelled a theoretical “microgrid” in a residential subdivision, Totarabank, in the North Island of Aotearoa.

Satellite image of the case study area.
This satellite image shows the case study area. Image: Google Earth™ mapping service/Author provided

We used the model to forecast the expected commercial returns from investing in microgrids and to unlock potential revenue streams from energy arbitrage.

Smart scheduling of batteries
Energy arbitrage requires battery storage and intelligent control to make the most of a local renewable energy system’s generation.

This can be achieved by forecasting short-term future electricity consumption and linking this to the spot power price on the market. Sophisticated real-time controllers then decide if the local system should store or sell to the market (or store and sell later).

Battery storage systems can vary in size, from community-scale batteries supplying a neighbourhood to batteries within a fleet of electric vehicles (EVs). The fundamental controlling processes required to achieve an optimal outcome are broadly the same, except that community batteries are stationary while EV batteries move around.

Community batteries can store electricity purchased from the grid during off-peak periods and then discharge it during peak periods. Neighbourhoods with solar power can charge community batteries in the middle of the day when solar-generated electricity is abundant and discharge during the higher-priced evening peak.

EV batteries can be used similarly, using cheaper night rates or periods of surplus wind during the night to charge. The energy stored in EV batteries can then be discharged into local loads or sold back into the grid when the price is highest, creating an additional revenue stream.

Modelling return on investment
In our modelling, we assumed the primary reasons people will invest in clean-energy technologies are sustainability, energy independence and resilience. We believe energy arbitrage could be an enabler of capital-intensive microgrids, as opposed to an investment made on a purely commercial basis.

Specifically, we considered a grid-connected microgrid integrating solar photovoltaic (PV) and wind turbines. The system is also backed by a community battery and has a fleet of 10 personal EVs to serve.

A schematic showing the modelled microgrid.
The modelled microgrid includes wind and solar power, a community battery and a fleet of electric vehicles. Image: Author provided/The Conversation

We considered two scenarios: one with grid arbitrage revenues and one without.

Our results suggest revenues procured explicitly from energy arbitrage could reduce the total cost of the system by at least 12 percent. To put this into perspective, for a typical NZ$10 million town-wide microgrid investment, this means $1.2 million in savings.

Another interesting finding was that the length of time the batteries were able to sustain critical loads during unplanned grid outages was greater by about 16 hours per year, compared to the case without intelligent control. This is a remarkable resilience advantage.

So what does this kind of analysis mean for you? If you are part of a community interested in owning and operating a microgrid, you now have enough evidence to ask your developer to consider energy arbitrage so the community can participate in the electricity market to make a profit.

If you own an EV and are trying to get cheaper night rates, this is a heads-up on future offerings from electricity retailers to get your storage-on-wheels to work with the vehicle-to-grid technology.

On the whole, energy arbitrage is an excellent tool to provide support for renewable energy investment decisions and help firm up revenue forecasts.The Conversation

Dr Soheil Mohseni, postdoctoral research fellow in sustainable energy systems, Te Herenga Waka — Victoria University of Wellington and Dr Alan Brent, professor and chair in sustainable energy systems, Te Herenga Waka — Victoria University of Wellington. This article is republished from The Conversation under a Creative Commons licence. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2022/09/25/small-communities-could-be-buying-selling-and-saving-money-on-electric-power-right-now-heres-how/feed/ 0 336113
To ensure access to electric cars, some activists are calling attention to ‘charging deserts’ https://grist.org/transportation/how-ensure-theres-electric-car-equity/ https://grist.org/transportation/how-ensure-theres-electric-car-equity/#respond Thu, 22 Sep 2022 10:30:00 +0000 https://grist.org/?p=589100 Advocates for low-income communities and people of color have long argued that if electric cars are necessary for American roads and the health of the planet, then they should be accessible to all Americans, not just the ones with disposable income.

But for years, they have also worried that electric cars and trucks could be out of reach — too expensive and too hard to charge. If there are neighborhoods that are already food deserts, why expect them to have a charging station or three?

The recently passed Inflation Reduction Act, also known as IRA, has several rules and benefits designed to bridge the electric vehicle gap, but some activists are still worried. 

“Left unchecked, the electric vehicle boom could pass an entire generation of Black and Brown drivers by,” said Michael Brown, an advisor for Neighborhood Forward, a national racial justice advocacy organization. 

For instance, one of the new IRA tax credits for charging stations installed after 2023 would cover up to 30 percent of their installation cost. The full benefits of this credit would only apply to charging stations located in a rural community or a low-income community — defined as a census tract with a poverty rate of at least 20 percent.

“The fact that there is now funding available across the country for deploying charging infrastructure, I think it’s a good sign,” said Alvaro Sanchez, the vice president of policy at the Greenlining Institute, an environmental justice nonprofit based in Oakland, California. (Sanchez was a 2019 Grist Fixer).

And for those interested in buying an electric car but discouraged by the cost, a $7,500 tax credit on new EVs will likely help. But the problem, both automakers and advocates say, is that the credit comes with strict rules about where new EVs must be built and where their batteries must be sourced. They argue that these rules would mean that too few EVs would qualify, continuing to make it hard for potential buyers to buy one.

Even a $4,000 tax credit on used EVs would force potential new buyers to wait, as the credit would only apply to used EVs put into service after Dec. 31 of 2023.

Overall vehicle ownership rates are far lower for households of color than for white households. And households of color tend to hold onto cars for a longer time. These inequities in car ownership are largely driven by the racial wealth gap and lack of intergenerational wealth, as well as discriminatory auto insurance and auto loan rate policies that make it harder for people of color to afford cars. 

In low-income communities around the US, finding an electric vehicle charging station is often as difficult as finding a grocery store. Charging stations are more likely to be found in dense clusters in wealthier and generally whiter urban areas. Drive, or walk, through a low-income community of color or a rural area, and you would be hard-pressed to find a charging station. Advocates call these areas “charging deserts.” They also argue that this lack of access to charging stations has contributed to lower rates of EV ownership among racial minorities. Advocates argue that if there’s no access to charging stations, how will people be motivated to buy an EV?

“We can’t build equitable infrastructure anywhere if the money isn’t available, let alone in the communities that need it the most,” said Michael Brown.

Both Brown and Sanchez are nonetheless encouraged by the Inflation Reduction Act tax credits, as well as provisions in last November’s Infrastructure Investment and Jobs Act. The November bill allocated $7.5 billion to build out a national network of 500,000 charging stations and required states to submit mapping plans of their part of the charging infrastructure.  

But the build-up of the national charging network would be prioritized on “Alternative Fuel Corridors” along the Interstate Highway System, benefiting electric vehicle owners who are commuting or making long-distance trips.

Earlier this year, Indiana’s Department of Transportation announced that it would follow the Act’s guidelines and use $100 million of its funding to expand the state’s portion of the national charging network along these corridors. 

The state’s plan faces criticism from the Indiana Alliance for Equity, Diversity and Inclusion for Electric Vehicle Infrastructure and Economic Opportunities, a coalition of Black-owned businesses, faith institutions, nonprofits and civil rights groups. The alliance argues that the charging infrastructure plan would bypass communities of color and not prioritize Black-owned businesses.

a blue sign for electric vehicle fast charging station along a highway with little traffic
A sign along the Pacific Coast Highway in California announcing an electric vehicle fast charging station up ahead. OnTheRunPhoto via Getty Images

“I think you’d be hard pressed to find a senator or congressman who knows the best location to place electric vehicle chargers to combat inequity,” said Brown. “There must be top-down pressure followed by an open conversation to ensure equity in the development stages.” 

Activists and community members in neighborhoods of color have reflected on the missed opportunities of previous massive national infrastructure projects. The creation of the federal interstate highway system in the 1950s decimated historically Black neighborhoods and facilitated the transfer of wealth from urban financial centers to the country’s then segregated suburbs. The system also created more opportunities for car ownership among whites, while exacerbating the racial wealth gap and cementing the dependency of Black and other minority communities on poorly-funded public transit. 

Lionel Rush, who is part of the Indiana Alliance and the president of the Interdenominational Ministerial Alliance in Indianapolis, told Indiana Public Radio earlier this month that if the EV charging stations were not equitably placed and designed to serve communities of color, those communities would be permanently left behind in the electric vehicle revolution.

“If we don’t get in now, we’re going to be behind — and we’ll never catch up,” he said. 

Sanchez of the Greenlining Institute believes that the biggest solution is making sure that EV infrastructure equity doesn’t just exist on paper. That means pressuring states and the federal government to track where implementation is going well and where it might be exacerbating or creating new gaps. 

“We need to make sure that we are adjusting our approach so that we are not leaving too many communities behind,” he said. 

This story was originally published by Grist with the headline To ensure access to electric cars, some activists are calling attention to ‘charging deserts’ on Sep 22, 2022.


This content originally appeared on Grist and was authored by Brett Marsh.

]]>
https://grist.org/transportation/how-ensure-theres-electric-car-equity/feed/ 0 335376
Facebook Report Concludes Company Censorship Violated Palestinian Human Rights https://www.radiofree.org/2022/09/21/facebook-report-concludes-company-censorship-violated-palestinian-human-rights/ https://www.radiofree.org/2022/09/21/facebook-report-concludes-company-censorship-violated-palestinian-human-rights/#respond Wed, 21 Sep 2022 22:45:05 +0000 https://theintercept.com/?p=408444

Facebook and Instagram’s speech policies harmed fundamental human rights of Palestinian users during a conflagration that saw heavy Israeli attacks on the Gaza Strip last May, according to a study commissioned by the social media sites’ parent company Meta.

“Meta’s actions in May 2021 appear to have had an adverse human rights impact … on the rights of Palestinian users to freedom of expression, freedom of assembly, political participation, and non-discrimination, and therefore on the ability of Palestinians to share information and insights about their experiences as they occurred,” says the long-awaited report, which was obtained by The Intercept in advance of its publication.

Commissioned by Meta last year and conducted by the independent consultancy Business for Social Responsibility, or BSR, the report focuses on the company’s censorship practices and allegations of bias during bouts of violence against Palestinian people by Israeli forces last spring.

“Meta’s actions in May 2021 appear to have had an adverse human rights impact.”

Following protests over the forcible eviction of Palestinian families from the Sheikh Jarrah neighborhood in occupied East Jerusalem, Israeli police cracked down on protesters in Israel and the West Bank, and launched military air strikes against Gaza that injured thousands of Palestinians, killing 256, including 66 children, according to the United Nations. Many Palestinians attempting to document and protest the violence using Facebook and Instagram found their posts spontaneously disappeared without recourse, a phenomenon the BSR inquiry attempts to explain.

Last month, over a dozen civil society and human rights groups wrote an open letter protesting Meta’s delay in releasing the report, which the company had originally pledged to release in the “first quarter” of the year.

While BSR credits Meta for taking steps to improve its policies, it further blames “a lack of oversight at Meta that allowed content policy errors with significant consequences to occur.”

Though BSR is clear in stating that Meta harms Palestinian rights with the censorship apparatus it alone has constructed, the report absolves Meta of “intentional bias.” Rather, BSR points to what it calls “unintentional bias,” instances “where Meta policy and practice, combined with broader external dynamics, does lead to different human rights impacts on Palestinian and Arabic speaking users” — a nod to the fact that these systemic flaws are by no means limited to the events of May 2021.

Meta responded to the BSR report in a document to be circulated along with the findings. (Meta did not respond to The Intercept’s request for comment about the report by publication time.) In a footnote in the response, which was also obtained by The Intercept, the company wrote, “Meta’s publication of this response should not be construed as an admission, agreement with, or acceptance of any of the findings, conclusions, opinions or viewpoints identified by BSR, nor should the implementation of any suggested reforms be taken as admission of wrongdoing.”

According to the findings of BSR’s report, Meta deleted Arabic content relating to the violence at a far greater rate than Hebrew-language posts, confirming long-running complaints of disparate speech enforcement in the Palestinian-Israeli conflict. The disparity, the report found, was perpetuated among posts reviewed both by human employees and automated software.

“The data reviewed indicated that Arabic content had greater over-enforcement (e.g., erroneously removing Palestinian voice) on a per user basis,” the report says. “Data reviewed by BSR also showed that proactive detection rates of potentially violating Arabic content were significantly higher than proactive detection rates of potentially violating Hebrew content.”

BSR attributed the vastly differing treatment of Palestinian and Israeli posts to the same systemic problems rights groups, whistleblowers, and researchers have all blamed for the company’s past humanitarian failures: a dismal lack of expertise. Meta, a company with over $24 billion in cash reserves, lacks staff who understand other cultures, languages, and histories, and is using faulty algorithmic technology to govern speech around the world, the BSR report concluded.

Not only do Palestinian users face an algorithmic screening that Israeli users do not — an “Arabic hostile speech classifier” that uses machine learning to flag potential policy violations and has no Hebrew equivalent — the report notes that the Arabic system also doesn’t work well: “Arabic classifiers are likely less accurate for Palestinian Arabic than other dialects, both because the dialect is less common, and because the training data — which is based on the assessments of human reviewers — likely reproduces the errors of human reviewers due to lack of linguistic and cultural competence.”

Human employees appear to have exacerbated the lopsided effects of Meta’s speech-policing algorithms. “Potentially violating Arabic content may not have been routed to content reviewers who speak or understand the specific dialect of the content,” the report says. It also notes that Meta didn’t have enough Arabic and Hebrew-speaking staff on hand to manage the spike in posts.

These faults had cascading speech-stifling effects, the report continues. “Based on BSR’s review of tickets and input from internal stakeholders, a key over-enforcement issue in May 2021 occurred when users accumulated ‘false’ strikes that impacted visibility and engagement after posts were erroneously removed for violating content policies.” In other words, wrongful censorship begat further wrongful censorship, leaving the affected wondering why no one could see their posts. “The human rights impacts … of these errors were more severe given a context where rights such as freedom of expression, freedom of association, and safety were of heightened significance, especially for activists and journalists,” the report says.

Beyond Meta’s failures in triaging posts about Sheikh Jarrah, BSR also points to the company’s “Dangerous Individuals and Organizations” policy — referred to as “DOI” in the report — a roster of thousands of people and groups that Meta’s billions of users cannot “praise,” “support,” or “represent.” The full list, obtained and published by The Intercept last year, showed that the policy focuses mostly on Muslim and Middle Eastern entities, which critics described as a recipe for glaring ethnic and religious bias.

Meta claims that it’s legally compelled to censor mention of groups designated by the U.S. government, but legal scholars have disputed the company’s interpretation of federal anti-terrorism laws. Following The Intercept’s report on the list, the Brennan Center for Justice called the company’s claims of legal obligation a “fiction.”

“Meta’s DOI policy and the list are more likely to impact Palestinian and Arabic-speaking users, both based upon Meta’s interpretation of legal obligations, and in error.”

BSR agrees the policy is systemically biased: “Legal designations of terrorist organizations around the world have a disproportionate focus on individuals and organizations that have identified as Muslim, and thus Meta’s DOI policy and the list are more likely to impact Palestinian and Arabic-speaking users, both based upon Meta’s interpretation of legal obligations, and in error.”

Palestinians are particularly vulnerable to the effects of the blacklist, according to the report: “Palestinians are more likely to violate Meta’s DOI policy because of the presence of Hamas as a governing entity in Gaza and political candidates affiliated with designated organizations. DOI violations also come with particularly steep penalties, which means Palestinians are more likely to face steeper consequences for both correct and incorrect enforcement of policy.”

The document concludes with a list of 21 nonbinding policy recommendations, including increased staffing capacity to properly understand and process Arabic posts, implementing a Hebrew-compatible algorithm, increased company oversight of outsourced moderators, and both reforms to and increased transparency around the “Dangerous Individuals and Organizations” policy.

In its response to the report, Meta vaguely commits to implement or consider implementing aspects of 20 out of 21 the recommendations. The exception is a call to “Fund public research into the optimal relationship between legally required counterterrorism obligations and the policies and practices of social media platforms,” which the company says it will not pursue because it does not wish to provide legal guidance for other companies. Rather, Meta suggests concerned experts reach out directly to the federal government.


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/09/21/facebook-report-concludes-company-censorship-violated-palestinian-human-rights/feed/ 0 335209
Two ways to think about Patagonia’s $3 billion climate donation https://grist.org/accountability/patagonia-turns-over-company-fight-climate-change/ https://grist.org/accountability/patagonia-turns-over-company-fight-climate-change/#respond Tue, 20 Sep 2022 10:30:00 +0000 https://grist.org/?p=588512 When Patagonia founder Yvon Chouinard announced last week that he and family members were giving away the company to use its profits to fight climate change, the move was hailed as historic and remarkable by philanthropic experts. 

The outdoor retailer, with a history of sustainability and environmental efforts, once told people to “think twice” before buying one of its iconic jackets. Now, in the wake of their decision to give away the company, some observers are in fact thinking twice — about whether the giveaway is actually that groundbreaking.

According to some legal experts, it’s a typical tax move. 

Chouinard, his wife, and their two adult children transferred all of the company’s voting stock, or 2 percent of all shares, to the newly created Patagonia Purpose Trust, as first reported by the New York Times. The rest of the company’s stock has been transferred to a newly created social welfare organization, the Holdfast Collective, which will inject a projected $100 million a year into environmental nonprofits and political organizations. Patagonia Purpose Trust will oversee this mission and company operations. The giveaway was valued at roughly $3 billion and did not merit a charitable deduction, with the family paying $17.5 million in taxes on the donation to the trust. 

While this move is groundbreaking in the philanthropic world, New York University law professor Daniel Hemel told Quartz that the giveaway allowed the family to reap the benefits of a commonly used tax law maneuver used by philanthropists. The Chouinard family paid more than $17 million in taxes when all was said and done, however, Hemel noted that the payment is a small percentage of the donation made, and the way the trusts and ruling organizations played out still allowed the family to call the shots on both the business and its future charitable contributions.

The Chouinard family’s gift has been compared to a recent move by conservative billionaire Barre Seid, who sold his entire company to the tune of $1.6 billion to fund right-wing political actions. When the New York Times reported on Seid, his transaction was noted to be shaded in dark money, while Patagonia’s was historic, despite both billionaires funneling money into 501c4 organizations. Hemel called out this juxtaposition both on Twitter and in his recent interview, where he said the gifts were “substantively similar.”

Billionaires use charitable giving to address a variety of issues, from right-wing politics to preserving wildlife. Communication and public policy professor Matthew Nisbet of Northeastern University has been outspoken against the role philanthropy and billionaires play in climate change before and told Grist that the newly announced Patagonia decision may be applauded by many in environmental industries, but Yvon Chouinard has essentially gone from a reluctant billionaire to political fat cat.

“Now that they’ve invented this (model) and introduced it to the marketplace for politically motivated billionaires, regardless of their background, everyone’s going to do it,“ Nisbet said. “This is an escalating zero-sum political arms race.” With the creation of the new 501c4 Holdfast Collective, Nisbet likened this new organization to other notable political spending groups, such as the National Rifle Association and the conservative Club for Growth.

Portrait of Yvon Chouinard, the founder of Patagonia, sitting at a desk writing on a piece of paper and looking into the camera
Yvon Chouinard, the founder of Patagonia. Campbell Brewer

A 501c4 organization, considered a tax-exempt, social welfare organization by the Internal Revenue Service, is not required to disclose its donors but must disclose money granted to other organizations equal to $5,000 or more. 501c4 organizations can engage in political lobbying related to the organization’s mission, but can not advocate on behalf of or against a specific candidate.

Nisbet feared that the influx of cash controlled by an interest group would set the agenda of climate issues in the political realm moving forward. “Do you believe that our politics should be decided by billionaires who can spend hundreds of millions of dollars in elections with no accountability, no transparency, and pick and choose winners or pick and choose issues?” he asked.

Lack of transparency in political spending and philanthropy has mired public perception of charitable giving, causing long-standing scrutiny that dates back to 20th-century oil baron John D. Rockefeller’s creation of his namesake foundation. 501c4 organizations have funded anti-climate Facebook ads and directly influence climate legislation at the state level, with little knowledge of who funds these actions. While the source of the Holdfast Collective’s funding will come directly from Patagonia’s profits, Nisbet said he worries the new organization could become a way for other billionaires to donate and influence climate issues. Modern-day billionaires have taken climate change, the environment, and agriculture under their charitable wings more often in recent years, despite 10 percent of the world’s richest people producing half of the globe’s carbon emissions. 

Soon-to-be trillionaire Jeff Bezos created a $10 billion Bezos Earth Fund in 2020, but Amazon has come under fire from watchdogs for undercounting its carbon footprint, punishing climate-focused workers, and polluting neighboring communities. Bill Gates has focused his philanthropy on agriculture and global hunger, while critics accuse him of gobbling up American farmland and cornering the market on seeds. Both Bezos and Gates have poured billions into tech-focused climate solutions, as well as Tesla founder Elon Musk also offering up $100 million for carbon capture innovations.

Patagonia has increased its political presence in recent years when it went to the courtroom to fight for the conservation of the Bears Ears National Monument in Utah and joined legal battles against logging, as well as commented on voting rights. The outdoor retail giant does have a long history of charitable giving, as they’ve donated 1 percent of all profits to environmental causes for decades and donated back $10 million of tax cuts to climate advocates. 

Patagonia spokesperson Corley Kenna told Grist that, at this time, there are no publicly announced organizations that the company’s future funds will go to, but “all options are on the table.” She said Chouinard and the Holdfast Collective are interested in tackling the root causes of the climate crisis, including land and water protection, grantmaking to on-the-ground groups, and funding policy focused on solutions. 

The spokesperson strongly rebuked the criticism that the recently announced company transition is not rooted in transparency and will fuel untraceable funds, citing Patagonia’s long history of transparency about its manufacturing, giving, and leadership.

“Yvon Chouinard, the Chouinard family, and the Holdfast Collective is not an extension of a political party,” Kenna said. “What we’re talking about here is a family that is committed to addressing the existential crises facing our planet.”

With big-name companies and wealthy families entering the fray, climate-focused philanthropy has grown in recent years, but still accounts for less than 2 percent of global giving, according to a report last year by ClimateWorks Foundation. Shawn Reifsteck, vice president of strategy and communications for the foundation, said Patagonia is “trailblazing a new way for companies to give back for generations to come” and he hopes others will follow suit. Philanthropic strategist Bruce DeBoskey said more and more philanthropists are recognizing that the traditional model of writing checks and giving grants has not been successful in solving overarching societal problems and billionaires are adopting new models of giving, such as the Chouinard family’s giveaway.

“It’s not about changes in the tax laws that I’m aware of,” DeBoskey said. “It’s about the changes in thinking.”

This story was originally published by Grist with the headline Two ways to think about Patagonia’s $3 billion climate donation on Sep 20, 2022.


This content originally appeared on Grist and was authored by John McCracken.

]]>
https://grist.org/accountability/patagonia-turns-over-company-fight-climate-change/feed/ 0 334645
Global tech titans under growing NZ pressure to pay for news https://www.radiofree.org/2022/09/19/global-tech-titans-under-growing-nz-pressure-to-pay-for-news/ https://www.radiofree.org/2022/09/19/global-tech-titans-under-growing-nz-pressure-to-pay-for-news/#respond Mon, 19 Sep 2022 01:13:22 +0000 https://asiapacificreport.nz/?p=79318 RNZ News

By Colin Peacock, RNZ Mediawatch presenter

There is mounting pressure on tech titans Google and Facebook to pay local news media to carry their news online.

Google has already done deals with some for its News Showcase, but other big names in news are still trying to get the platforms to pay — and the government is hinting it could force the issue soon.

“Are you putting the hard word on them to secure deals to pay for content? Are you going to legislate?” Newshub Nation host Simon Shepherd asked Willie Jackson last weekend, putting the hard word on the broadcasting and media minister.

“Are you putting the hard word on them to secure deals to pay for content? Are you going to legislate?” Newshub Nation host Simon Shepherd asked Willie Jackson a week ago, putting the hard word on the broadcasting and media minister.

“I’m trying really hard. I have said to them, [in] three months let’s see the deals in the marketplace,” the minister replied.

For years local news media have griped about getting very little from the platforms distributing their stuff to huge audiences  — and profiting from it.

The thing most likely to persuade the tech titans to pay local newsmakers is the likelihood of the government forcing the issue with legislation — and this was the first time that a government minister had set any kind of deadline publicly.

‘I want to see fairness’
“I want to see some fairness. I want to see all these Kiwi news organisations looked after . . and these big players have the funding and the resourcing to be able to do that,” Willie Jackson told Newshub Nation.

Some of the deals that have been done were revealed earlier this month when Google launched the local version of its News Showcase service, now available via Google’s websites and apps.

The first Kiwi outlets ever to get regular payments from Google for that include The New Zealand Herald’s owner NZME and its subscriber subsidiary BusinessDesk, RNZ, online sites Scoop and Newsroom and the Pacific Media Network. There is also a handful of local outlets too like Crux, which serves the Southern Lakes region, and Kapiti News.

“It’s part of our commitment to continuing to play a part in what we see as a very important shared responsibility to ensure the long term sustainability of public interest journalism in New Zealand,” Google’s local country representative Carolyn Rainsford told RNZ’s Gyles Beckford recently.

Broadcasting Minister Willie Jackson described that as “a good start, but not enough” — while the Spinoff’s founder Duncan Grieve was also underwhelmed.

He reckoned it was actually Willie Jackson that Google had in mind with the Showcase launch “to create a sense that Google is now a solid and public spirited ally to the news industry”.

Deal "close" report on NZME and Google
Deal “close” report on NZME and Google. Image: Mediawatch/RNZ

For now, Google News Showcase is far from a comprehensive or compelling service for Kiwis. It offers nothing from our biggest national news producer Stuff or other big names in news like TVNZ and Newshub — or smaller outlets such Allied Press and The Spinoff.

Bargaining collectively
Several publishers — including Stuff — have banded together with the News Publishers Association to bargain collectively with Google and Meta (the parent company of Facebook).

Earlier this year the Commerce Commission gave them permission to negotiate a deal for a 10-year period.

So how’s that going?

“We can’t comment much on the status, but we are engaging with the NPA,” was all Google’s regional head of partnerships Shilpa Jhunjhunwala would tell RNZ earlier this month.

A recent report by the Judith Nielsen Institute estimate Google and Facebook paid Australian media companies about A$200m last year.


Australia’s News Media Bargaining Code.  Video: Judith Neilson Institute
How much might Google throw into our news media, willingly or not?

“Unfortunately an interview won’t be possible,” Google New Zealand told Mediawatch last week (without explaining why).

Instead they gave us a statement attributable to Caroline Rainsford, country director Google New Zealand:

“We are proud of the launch of Google News Showcase and continuing our conversations with other local news media businesses.”

“We can’t give you any kind of commercial numbers because they’re all commercial and in confidence,” Google’s regional head of partnerships Shilpa Jhunjhunwala told RNZ’s Gyles Beckford earlier this month.

When pressed, she said Google’s global commitment to News Showcase was $1 billion over three years.

“But beyond that, we’re not able to share anything specific to New Zealand,” she said.

Why is there no deal with other New Zealand news publishers yet?

‘No serious offers on table’
“Those negotiations are underway, but neither of those companies have put any serious offers on the table,” Stuff chief executive Sinead Boucher told Mediawatch.

She said the Australian deals were their benchmark.

“What we produce is very similar kind of content and we operate in very similar markets. We’d be looking for payments that equate to more like NZ$40 million to $50 million a year into the industry here,” she said.

“I think the government and Minister Jackson have made clear that the government expect fair deals to be done — and that they are prepared to legislate in the near term to ensure that happens,” she said.

“The only way to materially address this is to create an environment where we can negotiate fair commercial payment from these giant multinationals who have built their businesses entirely off content created by other people,” she said.

“You could think of any search term and put it into Google and look down the results and see that a new story created by somebody is part of the results. What we are focused on negotiating a commercial payment for that content in the same way that you would for any other product,” she said.

“If you invested in a car and someone started running it as a taxi, you would expect them to compensate you for that — not to build their own business without recognising your investment,” Boucher told Mediawatch.

“Our problem is that these platforms are very reluctant to come to the table and have a fair negotiation. That’s why the sort of legislation has been needed in Australia and other countries and also here in New Zealand,” she said.

The tale across the Tasman.

Rod Sims
ACCC regulator chair Rod Sims … called “the man who forced Google and Meta to pay for news.” Image: ACCC/RNZ

The man who forced the platforms to pay up
Rod Sims has been called “the man who forced Google and Meta to pay for news.”

For more than a decade, he chaired the Australian Competition and Consumer Commission (ACCC) Australia’s competition regulator.

“It was fraught at times, but we presented the report to government in mid-2019 and they accepted the recommendation to have a News Media Bargaining Code six months later. It was legislated in February 2021. That’s pretty quick in terms of policy development in Australia,” Sims told Mediawatch.

“Google’s done a deal with essentially all media businesses. Meta has only done a deal with media businesses which that employ 85 percent of (Australia’s) journalists. It’s crucial that . . . it’s widely shared and you need legislation so that everybody has the ability to bargain.

“I know for a fact that the payments were well in excess of A$200 million — so NZ $40 million to $50 million sounds absolutely the right number to be spread across all media,” he said.

“Google and Meta were required to bargain with all eligible media businesses — and if they could not reach agreement, then arbitration would come into place. The threat of that evened up the bargaining power,” he said.

“The second component was that if Google and Meta did a deal with one media player, then they were required under law to do a deal with all media players. So their choice was either have no media content on their platform, or do deals,” he said.

“They chose to do deals with media companies because there’s value to them,” he said.

Arbitration threat needed
“I’m a bit concerned that in New Zealand you don’t have arbitration at the end of the negotiation period negotiations fail,” he said.

A Google officer once told me struggling news media pleading for “compensation” were like redundant drivers of horse-drawn carriages and rickshaws expecting today’s taxi drivers to pay them.

“No, that’s completely wrong. This is not like the car taking the place of the horse and carriage or smartphones taking the place of Kodak film because Google and Facebook don’t produce any journalism. So they haven’t taken the place of media, because they’re just not in the media business,” Rod Sims told Mediawatch.

“For Google to be a good search engine, it needs to bring in media into its search just about every time. But they don’t need any particular media company. So only by the News Media Bargaining Code could you even up the bargaining power,” he said.

“Unless we get payment for media that’s being taken and used for free, we’ll have a lot less media and less media harms society,” he said.

“It’s not up to me to tell the New Zealand government what to do, but my advice would be to pass the Australian News Media Bargaining Code,” he said.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by Pacific Media Watch.

]]>
https://www.radiofree.org/2022/09/19/global-tech-titans-under-growing-nz-pressure-to-pay-for-news/feed/ 0 334241
Back Door Proliferation: The IAEA, AUKUS and Nuclear Submarine Technology https://www.radiofree.org/2022/09/17/back-door-proliferation-the-iaea-aukus-and-nuclear-submarine-technology/ https://www.radiofree.org/2022/09/17/back-door-proliferation-the-iaea-aukus-and-nuclear-submarine-technology/#respond Sat, 17 Sep 2022 13:33:28 +0000 https://dissidentvoice.org/?p=133481 In Vienna, China’s permanent mission to the United Nations has been rather exercised of late. Members of the mission have been particularly irate with the International Atomic Energy Agency and its Director General, Rafael Grossi, who addressed the IAEA’s Board of Governors on September 12. Grossi was building on a confidential report by the IAEA […]

The post Back Door Proliferation: The IAEA, AUKUS and Nuclear Submarine Technology first appeared on Dissident Voice.]]>
In Vienna, China’s permanent mission to the United Nations has been rather exercised of late. Members of the mission have been particularly irate with the International Atomic Energy Agency and its Director General, Rafael Grossi, who addressed the IAEA’s Board of Governors on September 12.

Grossi was building on a confidential report by the IAEA which had been circulated the previous week concerning the role of nuclear propulsion technology for submarines to be supplied to Australia under the AUKUS security pact.

When the AUKUS announcement was made in September last year, its significance shook security establishments in the Indo-Pacific.  It was also no less remarkable, and troubling, for signalling the transfer of otherwise rationed nuclear technology to a third country.  As was rightly observed at the time by Ian Stewart, executive director of the James Martin Center in Washington, such “cooperation may be used by non-nuclear states as more ammunition in support of a narrative that the weapons states lack good faith in their commitments to disarmament.”

Having made that sound point, Stewart, revealing his strategic bias, suggested that, as such cooperation would not involve nuclear weapons by Australia, and would be accompanied by safeguards, few had reason to worry.  This was all merely “a relatively straightforward strategic step.”

James M. Acton, co-director of the Nuclear Policy Program at the Carnegie Endowment for International Peace, was far less sanguine.  “[T]he nonproliferation implications of the AUKUS submarine deal are both negative and serious.”  Australia’s operation of nuclear-powered submarines would make it the first non-nuclear weapon state to manipulate a loophole in the inspection system of the IAEA.

In setting this “damaging precedent”, aspirational “proliferators could use naval reactor programs as cover for the development of nuclear weapons – with the reasonable expectation that, because of the Australia precedent, they would not face intolerable costs for doing so.”  It did not matter, in this sense, what the AUKUS members intended; a terrible example that would undermine IAEA safeguards was being set.

A few countries in the region have been quietly riled by the march of this technology sharing triumvirate in the Indo-Pacific.  In a leaked draft of its submission to the United Nations tenth review conference of the Parties to the Treaty of the Non-Proliferation of Nuclear Weapons (NPT RevCon), Indonesia opined that the transfer of nuclear technology for military purposes was at odds with the spirit and objective of the NPT.

In the sharp words of the draft, “Indonesia views any cooperation involving the transfer of nuclear materials and technology for military purposes from nuclear-weapon states to any non-nuclear weapon states as increasing the associated risks [of] catastrophic humanitarian and environmental consequences.”

At the nuclear non-proliferation review conference, Indonesian diplomats pushed the line that nuclear material in submarines should be monitored with greater stringency.  The foreign ministry argued that it had achieved some success in proposing for more transparency and tighter scrutiny on the distribution of such technology, claiming to have received support from AUKUS members and China.  “After two weeks of discussion in New York, in the end all parties agreed to look at the proposal as the middle path,” announced Tri Tharyat, director-general for multilateral cooperation in Indonesia’s foreign ministry.

While serving to upend the apple cart of security in the region, AUKUS, in Jakarta’s view, also served to foster a potential, destabilising arms race, placing countries in a position to keep pace with an ever increasingly expensive pursuit of armaments.  (Things were not pretty to start with even before AUKUS was announced, with China and the United States already eyeing each other’s military build-up in Asia.)

The concern over an increasingly voracious pursuit of arms is a view that Beijing has encouraged, with Chinese Foreign Ministry spokesman Zhao Lijian having remarked that, “the US, the UK and Australia’s cooperation in nuclear submarines severely damages regional peace and stability [and] intensifies the arms race.”

Wang Qun, China’s Permanent Representative, told Grossi on September 13 that he should avoid drawing “chestnuts from the fire” in endorsing the nuclear proliferation exercise of Australia, the United States and the UK.  Rossi, for his part, told the IAEA Board of Governors that four “technical meetings” had been held with the AUKUS parties, which had pleased the organisation.  “I welcome the AUKUS parties’ engagement with the Agency to date and expect this to continue in order that they deliver their shared commitment to ensuring the highest non-proliferation and safeguard standards are met.”

The IAEA report also gave a nod to Canberra’s claim that proliferation risks posed by the AUKUS deal were minimal given that it would only receive “complete, welded” nuclear power units, making the removal of nuclear material “extremely difficult.”  In any case, such material used in the units, were it to be used for nuclear weapons, needed to be chemically processed using facilities Australia did not have nor would seek.

Chinese Foreign Ministry spokeswoman Mao Ning was less than impressed.  “This report lopsidedly cited the account given by the US, the UK and Australia to explain away what they have done, but made no mention of the international community’s major concerns over the risk of nuclear proliferation that may arise from the AUKUS nuclear submarine cooperation.” It turned “a blind eye to many countries’ solemn position that the AUKUS cooperation violates the purpose and object of the NPT.”

Beijing’s concerns are hard to dismiss as those of a paranoid, addled mind.  Despite China’s own unhelpful military build-up, attempts by the AUKUS partners to dismiss the transfer of nuclear technology to Australia as technically benign and compliant with the NPT is dangerous nonsense.  Despite strides towards some middle way advocated by Jakarta, the precedent for nuclear proliferation via the backdoor is being set.

The post Back Door Proliferation: The IAEA, AUKUS and Nuclear Submarine Technology first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2022/09/17/back-door-proliferation-the-iaea-aukus-and-nuclear-submarine-technology/feed/ 0 334083
Detroit Cops Want $7 Million in Covid Relief Money for Surveillance Microphones https://www.radiofree.org/2022/09/17/detroit-cops-want-7-million-in-covid-relief-money-for-surveillance-microphones/ https://www.radiofree.org/2022/09/17/detroit-cops-want-7-million-in-covid-relief-money-for-surveillance-microphones/#respond Sat, 17 Sep 2022 10:00:20 +0000 https://theintercept.com/?p=408050

Detroit’s city council will soon vote on whether to spend millions in federal cash meant to ease the economic pains of the coronavirus pandemic on ShotSpotter, a controversial surveillance technology critics say is invasive, discriminatory, and fundamentally broken.

ShotSpotter purports to do one thing very well: telling cops a gun has been fired as soon as the trigger is pulled. Using a network of microphones hitched to telephone poles, rooftops, and other urban vantage points, ShotSpotter is essentially an Alexa that listens for a bang rather than voice commands. Once the company’s black-box algorithm thinks it has identified a gunshot, it sends a recording of the sound — and the moments preceding and following it — to a team of human analysts. If these ShotSpotter staffers agree the loud noise in question is a gunshot, they relay an alert and location coordinates to police for investigation.

At least, that’s the pitch. Despite ShotSpotter’s corporate claims of 97 percent accuracy, the technology’s efficacy has been derided as dangerously ineffective — a techno-solutionist approach to public safety. Critics contend that the system draws police scrutiny to already over-policed areas using a proprietary, secret sound detection algorithm. The technology, according to reports, regularly mistakes city noises, including fireworks and cars for gunshots, ignores actual gunshots, provides misleading evidence to prosecutors, and is subject to biases because ShotSpotter employees at times manually alter the algorithm’s findings.

Detroit already has a $1.5 million contract with ShotSpotter, a California company, to deploy the microphones in select areas, but city officials, including Mayor Mike Duggan, insist that substantially expanding the audio surveillance network will deter gun slayings. The plan is set to go to a vote before the full city council on September 20, and local organizers are opposing the use of money meant for economic relief to expand city security contracts and beef up police surveillance.

“The Biden administration passed the American Rescue Plan and put forth this Covid relief money to inject money into local economies and to get people back on their feet after the pandemic,” said Branden Snyder, co-director of Detroit Action, a community advocacy group that opposes the vote. “And this is doing the opposite of that. What it does is fatten the wallets of ShotSpotter.”

Cities across the country are tapping federal recovery money to add or broaden ShotSpotter systems, NBC News reported earlier this year. Syracuse, New York, for instance, spent $171,000 on ShotSpotter, and Albuquerque, New Mexico, paid the company $3 million from the recovery fund. Should the vote pass, Detroit would be the biggest of these customers using Covid relief funds, both in terms of population and the proposed price tag for the surveillance expansion.

ShotSpotter spokesperson Izzy Olive pointed to remarks by President Joe Biden encouraging local governments to use flexible relief funds to beef up police departments. “Some cities have chosen to use a portion of these funds for ShotSpotter’s technology,” she said. The company claims that more than 125 cities and police departments use the system and that it guarantees 90 percent efficacy within some basic parameters, according to self-reported data from police compiled by the company. Asked about Detroit’s system, Olive said the city owns the data collected by ShotSpotter. She did not comment on whether the company restricts what cities can say about it, saying only that “the contract itself is not confidential.”

ShotSpotter’s opponents in Detroit agreed that gun violence is a serious problem but said Covid-19 relief money would be far better spent on addressing the social ills that form the basis of crime.

“What it does is fatten the wallets of ShotSpotter.”

“If people had jobs, money, after-school programs, housing, the things that they need, that’s going to reduce gun violence,” said Alyx Goodwin, a campaign organizer with Action Center on Race and the Economy.

Snyder pointed to the fundamental irony of diverting public money billed as form of relief for the pandemic’s downtrodden to surveil those very same people.

“The reason why we’re in these policing fights, as an economic justice organization, is that our members are folks who are looking for housing, rental support, looking for job access,” Snyder said. “And what we’re given instead is surveillance technology.”

Duggan’s case for expanding the ShotSpotter contract kicked into high gear in late August when, following a mass shooting, he claimed that police could have thwarted the killings had a broader surveillance net been in place. “They very likely could have prevented two and probably three tragedies had they had an immediate notice,” Duggan said.

The mayor’s claims echo those of the company itself, which positions the product as an antidote to rising national gun violence rates, particularly since the onset of the pandemic. ShotSpotter explicitly urges cities to tap funds from the American Rescue Plan Act, intended to salve financial hardship caused by the pandemic, to buy new surveillance microphones.

“As the U.S. recovers from COVID-19, gun crime is surging to historically high levels,” reads a company post titled “The American Rescue Act Can Help Your Agency Fund Crime Reducing Technology.” The post refers interested municipalities to a company portal that lists resources to help navigate the procurement process, adorned with an image of a giant pile of cash, including a “FREE funding consultation with an expert who knows the process.”

ShotSpotter even published a video webinar guiding police through the process of obtaining Covid money to buy the surveillance tech. In the video, the company’s Director of Public Safety Solutions Ron Teachman offers to personally connect interested parties with ShotSpotter’s go-to expert on federal funding, consultant and former congressional aide Amanda Wood.

Teachman and Wood say in the video that ShotSpotter will furnish eager police with pre-drafted language to help pitch relevant elected officials. “I know you all understand the value of ShotSpotter and that’s why you’re here, but if there are other folks in your community who don’t understand it, we’re happy to sort of spoon-feed them that information,” Wood says. “We have broad language, and we can really personalize it for whatever you need.” (Olive, the ShotSpotter spokesperson, said the company was sharing publicly available information and did not comment on what efforts the company made to guide Detroit through the process of applying for funds.) 

Wood also suggests that police enlist local groups, from grassroots organizations to medical administrators, to help with the pitch. “Those hospital CEOs are pretty well connected. So let’s use them, let’s leverage their relationships so that they’re echoing the same sort of messaging that you are … put a little pressure on those electeds and administrators.”

Overall, the use of federal Covid money to buy microphones is described as a cakewalk. In the webinar, Teachman says, “This is as easy a federal funding source as I’ve seen.”

Despite the objections from community groups, Biden himself outlined uses like this for Covid relief funds. “Mayors will also be able to buy crime-fighting technologies, like gunshot detection systems,” Biden said in a June 2021 address on gun violence.

Billions in Covid aid have been spent on funding police departments, a flood of money that’s proven a boon to surveillance contractors, said Matthew Guariglia, a policy analyst with the Electronic Frontier Foundation. “For a long time already, money that has been intended for public well-being has been specifically funneled into police departments,” said Guariglia, “and specifically for surveillance equipment that maybe they didn’t have the money to fund beforehand.”

ShotSpotter equipment overlooks the intersection of South Stony Island Avenue and East 63rd Street in Chicago on Tuesday, Aug. 10, 2021. An Associated Press investigation, based on a review of thousands of internal documents, emails, presentations and confidential contracts, along with interviews with dozens of public defenders in communities where ShotSpotter has been deployed, has identified a number of serious flaws in using ShotSpotter as evidentiary support for prosecutions. (AP Photo/Charles Rex Arbogast)

ShotSpotter equipment overlooks the intersection of South Stony Island Avenue and East 63rd Street in Chicago, on Aug. 10, 2021.

Photo: Charles Rex Arbogast/AP


Detroit’s city government isn’t shying away from the notion that millions in economic stimulus money might go to ShotSpotter. The public safety section of a city website outlining how Detroit plans to use hundreds of millions in federal Covid aid mentions ShotSpotter by name, including a city-produced infomercial touting the technology’s benefits. While the clip, echoing the company’s own claims, assures Detroit residents that ShotSpotter doesn’t listen to conversations, there have been at least two documented instances of prosecutors attempting to use ambient chatter caught on ShotSpotter’s hot mics.

Critics of Detroit’s plan said ShotSpotter doesn’t stop gun violence and exacerbates over-policing of the same struggling neighborhoods the Covid relief money was meant to help. A study published last year by Northwestern University’s MacArthur Justice Center surveyed 21 months of city data on ShotSpotter-based police deployments and “found that 89% turned up no gun-related crime and 86% led to no report of any crime at all. In less than two years, there were more than 40,000 dead-end ShotSpotter deployments.”

City government data from Chicago and other locations using ShotSpotter revealed the same pattern over and over, according to the MacArthur Justice Center. In Atlanta, only 3 percent of ShotSpotter alerts resulted in police finding shell casings. In Dayton, Ohio, another ShotSpotter customer, “only 5% of ShotSpotter alerts led police to report incidents of any crime.” A series of academic studies into ShotSpotter’s efficacy reached the same conclusion: Loud noise alerts don’t result in fewer gun killings.

“People don’t want gunshots in their neighborhood, period. And a microphone does not stop the gunshot.”

Not only is ShotSpotter a waste of money, critics say, but the system menaces the very neighborhoods it claims to protect by directing armed, keyed-up police onto city blocks with the expectation of a violent confrontation. These heightened police responses occur along stark racial lines. “In Chicago, ShotSpotter is only deployed in the police districts with the highest proportion of Black and Latinx residents,” the MacArthur Justice Center found, pointing to a Chicago inspector general’s report that found ShotSpotter alerts resulted in more than 2,400 stop-and-frisks. A 2021 investigation by Motherboard found that “ShotSpotter frequently generates false alerts—and it’s deployed almost exclusively in non-white neighborhoods.”

The concern is not hypothetical: A March 2021 ShotSpotter-triggered Chicago deployment resulted in the fatal police shooting of an unarmed 13-year-old boy, Adam Toledo. “If you have police showing up to the site of every loud noise, guns drawn, expecting a firefight, that puts a lot of pedestrians, a lot of people who lives in neighborhoods where there are loud noises, in danger,” Guariglia said.

ShotSpotter’s claims of turn-key functionality and deterrent effect are tempting for mayors like Detroit’s Duggan, according to Snyder of Detroit Action. The politicians are eager to project a “tough on crime” image as gun violence has spiked during the pandemic. Yet Snyder said that ShotSpotter’s limited trial in Detroit has so far proven ineffective. “It actually hasn’t led to any sort of like real, significant arrests,” he said. “It actually hasn’t produced that type of success that I think many elected officials as well as the company itself are spouting.”

An infographic created by the city claims that “ShotSpotter is saving lives!” and cites a downward trend in fatal shootings in neighborhoods where the equipment is installed. The infographic, though, provides no evidence that the technology itself was responsible for this decline and provides only one example of a ShotSpotter alert leading to a gun-related conviction in the city.

“ShotSpotter doesn’t stop gunshots from happening,” said Goodwin of the Action Center on Race and the Economy. “People don’t want gunshots in their neighborhood, period. And a microphone does not stop the gunshot.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/09/17/detroit-cops-want-7-million-in-covid-relief-money-for-surveillance-microphones/feed/ 0 334066
‘The most significant environmentalist in history’ is now king. Two Australian researchers tell of Charles’ fascination with nature https://www.radiofree.org/2022/09/13/the-most-significant-environmentalist-in-history-is-now-king-two-australian-researchers-tell-of-charles-fascination-with-nature/ https://www.radiofree.org/2022/09/13/the-most-significant-environmentalist-in-history-is-now-king-two-australian-researchers-tell-of-charles-fascination-with-nature/#respond Tue, 13 Sep 2022 23:35:48 +0000 https://asiapacificreport.nz/?p=79134 ANALYSIS: By Nicole Hasham, The Conversation

The natural world is close to the heart of Britain’s new King Charles III. For decades, he has campaigned on environmental issues such as sustainability, climate change and conservation – often championing causes well before they were mainstream concerns.

In fact, Charles was this week hailed as “possibly most significant environmentalist in history”.

Upon his elevation to the throne, the new king is expected to be less outspoken on environmental issues. But his advocacy work have helped create a momentum that will continue regardless.

As Prince of Wales, Charles regularly met scientists and other experts to learn more about environmental research in Britain and abroad. Here, two Australian researchers recall encounters with the new monarch that left an indelible impression.

Nerilie Abram, Australian National University
In 2008, I was a climate scientist working on ice cores at the British Antarctic Survey in Cambridge. On one memorable day, Prince Charles visited the facility — and I was tasked with giving him a tour.

At the time, I had just returned from James Ross Island, near the northern tip of the Antarctic Peninsula. There, at one of the fastest warming regions on Earth, I had helped collect a 364-metre-long ice core.

Ice cores are cylinders of ice drilled out of an ice sheet or glacier. They’re an exceptional record of past climate. In particular, they contain small bubbles of air trapped in the ice over thousands of years, telling us the past concentration of atmospheric gases.

We started the tour by showing Prince Charles a video of how we collect ice cores. We then ventured into the -20℃ freezer and held a slice of ice core up to the lights to see the tiny, trapped bubbles of ancient atmosphere.

Outside the freezer, we listened to the popping noises as the ice melted and the bubbles of ancient air were released into the atmosphere of the lab.

Holding a piece of Antarctic ice is a profound experience. With a bit of imagination, you can cast your mind back to what was happening in human history when the air inside was last circulating.

Prince Charles embraced this idea during the tour, making a connection back to the British monarch that would have been on the throne at the time.

All this led into a discussion about climate change. Ice cores show us the natural rhythm of Earth’s climate, and the unprecedented magnitude and speed of the changes humans are now causing.

At the time of the 2008 visit, carbon dioxide levels in the atmosphere had reached 385 parts per million — around 100 parts per million higher than before the Industrial Revolution. Today we are at 417 parts per million, and still rising each year.

In 2017, Prince Charles co-authored a book on climate change. It includes a section on ice cores, featuring the same carbon dioxide data I showed him a decade earlier.

Last year, the royal urged Australia’s then Prime Minister Scott Morrison to attend the COP26 climate summit at Glasgow, warning of a “catastrophic” impact to the planet if the talks did not lead to rapid action.

And in March this year, the prince sent a message of support to people devastated by floods in Queensland and New South Wales, and said:

“Climate change is not just about rising temperatures. It is also about the increased frequency and intensity of dangerous weather events, once considered rare.”

As prince, Charles used his position to highlight the urgency of climate change action. His efforts have helped to bring those messages to many: from young children to business people and world leaders.

He may no longer speak as loudly on these issues as king. But his legacy will continue to drive the climate action our planet needs.

Person in yellow raincoat stands at flooded road
In March, the then Prince of Wales sent a message of support to flood-stricken Australians. Image: Jason O’Brien/AAP

Peter Newman, Curtin University
In the 1970s, being an environmentalist was lonely work. It meant years of standing up for something that people thought was a bit marginal. But even back then Prince Charles — now King Charles III — was an environmental hero, advocating on what we needed to do.

I met the Prince of Wales in 2015. He and Camilla, the Duchess of Cornwall, visited Perth on the last leg of their Australia tour. I was among a group of Order of Australia recipients asked to meet the prince at Government House. I spoke to him about my lifelong passion – sustainability, including regenerative agriculture.

I knew earlier in their trip, Charles had toured the orchard at Oranje Tractor Wine, an organic and sustainable wine producer on Western Australia’s south coast. The vineyard is run by my friend Murray Gomm and his partner, Pam Lincoln, and I had encouraged them over the years. They had started winning awards, and it became even more special when the prince came down and blessed it!

The Oranje Tractor is now a net-zero-emissions venture: the carbon dioxide it sucks up from the atmosphere and into the soil is well above that emitted from its operations.

Charles’ eyes really lit up when I mentioned the Oranje Tractor. He was trying to do similar things in his gardening and at his farms – avoiding pesticides and sucking carbon from the atmosphere back into the soil.

Charles has that same knack the Queen had — an extraordinary ability to really listen and engage. To meet him, and see he’s been involved in sustainability as long as I have, it was validating and inspirational.

Now he is king, Charles will be a little more constrained in his comments about environment issues. But I don’t think you can change who you are. He will just be more subtle about how he goes about it.

Climate change is now at the forefront of the global agenda. But the world needs to accelerate its emissions reduction commitments. If we don’t move fast enough, King Charles will no doubt raise a royal eyebrow — and that’s enough.The Conversation

Nicole Hasham, energy + environment editor, The Conversation. This article is republished from The Conversation under a Creative Commons licence. Read the original article.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2022/09/13/the-most-significant-environmentalist-in-history-is-now-king-two-australian-researchers-tell-of-charles-fascination-with-nature/feed/ 0 332640
Tibetan Police Bought Thermo Fisher DNA Equipment, Chinese Government Documents Show https://www.radiofree.org/2022/09/13/tibetan-police-bought-thermo-fisher-dna-equipment-chinese-government-documents-show/ https://www.radiofree.org/2022/09/13/tibetan-police-bought-thermo-fisher-dna-equipment-chinese-government-documents-show/#respond Tue, 13 Sep 2022 13:15:38 +0000 https://theintercept.com/?p=407483

Tibetan police inked a deal last month to buy over $160,000 worth of profiling kits and other supplies made by Thermo Fisher, a Massachusetts-based company that has come under fire in the past for selling similar supplies to police in Xinjiang. The deal, revealed in procurement documents published on a Chinese government website, will provide DNA kits and replacement parts for sequencers to authorities in Tibet, the site of long-standing government repression.

“The deployment of DNA databases across the whole of China lacks elementary fundamental rights safeguards,” said Yves Moreau, a bioinformatician at Belgium’s University of Leuven who uncovered the procurement documents through the Chinese search engine Baidu. “Western suppliers should not aid and abet those abuses.”

In October 2021, a second tender announcement shows, police in Lhasa spent $173,000 upgrading a “3500 sequencer,” a product name and price range matching Thermo Fisher’s 3500 Genetic Analyzer line. Other documents hosted on a third-party government tender site suggest that Tibetan police also bought Thermo Fisher equipment in August of last year.

The news comes amid two reports from human rights groups describing a vast Chinese government drive to collect DNA from ethnic Tibetans. In a report published Tuesday by the University of Toronto’s Citizen Lab, author Emile Dirks estimates that since 2016 authorities have taken DNA from 919,000 to 1.2 million Tibetans — a fourth to a third of the region’s population. A second report, released by Human Rights Watch last week, finds that authorities have collected blood samples from children in Tibet and surrounding regions.

In at least one county in Tibet, according to the Citizen Lab report, authorities combined DNA testing with what they termed Covid-19 prevention efforts. Dirks, a postdoctoral fellow at Citizen Lab, said that may just be a matter of timing and that more information is needed before drawing firm conclusions. In general, DNA is collected in China through blood samples, while Covid testing is done through swabbing.

“When the police want to engage in mass DNA collection, they’re actually very open about it,” said Dirks. Often, he added, police in China will combine projects to save time. “They may be informing the public about pandemic prevention measures, and then alongside that they’ll say, ‘OK, while you’re here, we’re going to collect some DNA.’”

Amid stringent pandemic control measures in 2020, Dirks found, government and local media posts mentioning mass DNA collection in the region tripled.

Thermo Fisher has been criticized in the past for selling DNA equipment to police in Xinjiang, a region in northwest China where authorities have interned an estimated 1 million Muslim Uyghurs and other ethnic minorities in inhumane camps and forced others into labor. Citing what it called “fact-specific assessments,” the company said in 2019 that it would no longer sell or service DNA equipment in Xinjiang. Later that year, the Trump administration blacklisted several of the region’s police agencies.

But there are no such restrictions in place for Tibet, where DNA collection enables research on high-altitude tolerance valued by the Chinese military, or for the rest of China, where authorities are building a massive DNA database with blood samples taken from men and boys.

“We design our products with great care, follow rigorous trade export policies, and work with governments to contribute to good global policy overall,” Thermo Fisher spokesperson Ron O’Brien wrote in an email to The Intercept. “As the world leader in serving science, we recognize the importance of considering how our products and services are used — or may be used — by our customers.”

The new sale documents show “that the abuses that led to the export controls against Xinjiang public security are not at all confined to Xinjiang,” Moreau told The Intercept. O’Brien said that Thermo Fisher would review the transactions The Intercept had flagged.

For its recent report, Human Rights Watch found records of police going into Tibetan schools to collect DNA. In one case, a local police department from neighboring Qinghai province, where much of the population is ethnically Tibetan, posted on its WeChat account a photo of boys getting their fingers pricked while officers stood by. In addition to children, the report says, police are sweeping up DNA from people in Tibet’s rural areas.

“What’s happening in Tibet is part of the authorities deepening intrusive surveillance and policing, extending all the way to local village levels in rural areas,” said Maya Wang, senior China researcher for Human Rights Watch.

The sale of Thermo Fisher testing kits in Tibet was made by a Chinese broker, a third-party company that bundles surveillance technology and security equipment for police and other buyers. Such transactions can obscure responsibility for the flow of fraught technologies. In 2021, two years after Thermo Fisher said it would stop selling in Xinjiang, the New York Times reported that the company’s DNA equipment continued to be sold by brokers in the region. Thermo Fisher claimed at the time that it had no record of the transactions in its system.

Last year, The Intercept reported that cellphone crackers made by the Israeli surveillance tech outfit Cellebrite continued to be sold by brokers in China, despite the company saying it had pulled out of the country. The Intercept also revealed that software and databases from the Austin-based software giant Oracle were bundled and sold to Chinese authorities as surveillance tools by brokers with close ties to Beijing.

Thermo Fisher is not the only entity outside China implicated in the Tibetan DNA drive. At Molecular Genetics & Genomic Medicine, published by the New Jersey-based Wiley, eight editorial board members resigned last year after the journal published papers detailing genetic differences among Chinese ethnic groups, including Tibetans. One of the flagged papers listed an author from the Tibetan Public Security Bureau, the region’s major police agency.

At the time, the board members called for an investigation and said they were dismayed at the journal’s failure to react promptly. The journal still has not retracted the papers.

Partial DNA sequences from Tibetan men, without names attached, are also stored in a German database called the Y-Chromosome Haplotype Reference Database, which focuses on so-called Y-STR data, the unique sequences that occur on the Y chromosome. Last December, the highly regarded scientific journal Human Genetics retracted a paper based on Tibetan, Uyghur, and other partial genetic profiles in the German database.

“You can imagine YHRD as a Google search without providing actual search results,” Sascha Willuweit, an administrator of the database, wrote in an email to The Intercept in February. YHRD recently removed ancestry information from the public database and tightened its standards for ensuring that subjects give informed consent, he added.

The new evidence of mass testing in Tibet will likely lead to renewed pressure on Thermo Fisher, YHRD, and international journals that publish fraught genetic studies from China.

In recent years, DNA collection has expanded globally. In Orange County, California, prosecutors were caught prying DNA samples from people accused of low-level misdemeanors, like walking a dog without a leash. Kuwait required that all citizens give DNA samples before a court struck down the law in 2017. But China has the largest collection program in the world.

Moreau said that DNA collection in Tibet can veer into “biocolonialism,” a global problem. Because some DNA is shared across families and populations, he said, “If I start collecting DNA from members of a population, then I’m getting information about the entire population.” As a result, he added, “The notion of community needs to be made center to the notion of group harm.”

Genetic studies of Indigenous people around the world — including Aboriginal and Torres Strait Islander people in Australia, San people in Southern Africa, and several Native American groups in the United States — used either inadequate consent measures or none at all. In Europe, forensic geneticists have for decades collected DNA from the Roma, a persecuted minority. In Pakistan, the CIA organized a fake hepatitis B vaccination drive in an attempt to recover DNA from locals, hoping it would help lead them to Osama Bin Laden.

Last year, the family of Henrietta Lacks, a Black cancer patient whose cells were taken in 1951 without her knowledge, sued Thermo Fisher in federal court for selling product lines derived from her cells.

In Tibet, some see DNA collection as part of a larger campaign of erasure. “China’s mass DNA collection of Tibetans is outrageous, but it is not entirely surprising,” said Bhuchung K. Tsering, interim president of the International Campaign for Tibet. “The end goal is not simply to bring Tibetans to heel but to undermine their unique identity altogether so that their right to determine their own destiny will no longer matter.”


This content originally appeared on The Intercept and was authored by Mara Hvistendahl.

]]>
https://www.radiofree.org/2022/09/13/tibetan-police-bought-thermo-fisher-dna-equipment-chinese-government-documents-show/feed/ 0 332444
Human Trafficking’s Newest Abuse: Forcing Victims Into Cyberscamming https://www.radiofree.org/2022/09/13/human-traffickings-newest-abuse-forcing-victims-into-cyberscamming/ https://www.radiofree.org/2022/09/13/human-traffickings-newest-abuse-forcing-victims-into-cyberscamming/#respond Tue, 13 Sep 2022 09:00:00 +0000 https://www.propublica.org/article/human-traffickers-force-victims-into-cyberscamming#1430155 by Cezary Podkul, with Cindy Liu for ProPublica

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

The ads on the Telegram messaging service’s White Shark Channel this summer had the matter-of-fact tone and clipped phrasing you might find on a Craigslist posting. But this Chinese-language forum, which had some 5,700 users, wasn’t selling used Pelotons or cleaning services. It was selling human beings — in particular, human beings in Sihanoukville, Cambodia, and other cities in southeast Asia.

“Selling a Chinese man in Sihanoukville just smuggled from China. 22 years old with ID card, typing very slow,” one ad read, listing $10,000 as the price. Another began: “Cambodia, Sihanoukville, six Bangladeshis, can type and speak English.” Like handbills in the days of American slavery, the channel also included offers of bounties for people who had run away. (After an inquiry from ProPublica, Telegram closed the White Shark Channel for “distributing the private information of individuals without consent.” But similar forums still operate freely.)

.image-gallery ul { display: flex; flex-flow: row wrap; list-style: none; margin: 0px auto; padding: 0px; } .image-gallery li { margin: 0 10px; flex-basis: calc(33% - 20px); } .image-gallery img { width: 100%; height: auto; } @media screen and (max-width: 36em) { .image-gallery li { margin: 10px; flex-basis: calc(100% - 20px); } }
  • Cambodia, Sihanoukville, six Bangladeshis, can type and speak English, for companies in Sihanoukville targeting foreigners, people who can make decisions come chat, can deliver.
  • Sihanoukville, a few Chinese born in the 90s. Cannot share pictures, no passports. Have ID cards, can interview directly. Price relatively high.
  • Selling a Chinese man in Sihanoukville just smuggled from China. 22 years old with ID card, typing very slow. Only third day here. Companies who can accept slow typers come chat. 10,000 USD.
Listings from the White Shark Channel on Telegram (Screenshots and translations by ProPublica)

Fan, a 22-year-old from China who was taken captive in 2021, was sold twice within the past year, he said. He doesn’t know if he was listed on Telegram. All he knows is that each time he was sold, his new captors raised the amount he’d have to pay to buy his freedom. In that way, his debt more than doubled from $7,000 to $15,500 in a country where the annual per capita income is about $1,600.

Fan, photographed in Phnom Penh, Cambodia (Cindy Liu for ProPublica)

Fan’s descent into forced labor began, as human trafficking often does, with what seemed like a bona fide opportunity. He had been a prep cook at his sister’s restaurant in China’s Fujian province until it closed, then he delivered meals for an app-based service. In March 2021, Fan was offered a marketing position with what purported to be a well-known food delivery company in Cambodia. The proposed salary, $1,000 a month, was enticing by local standards, and the company offered to fly him in. Fan was so excited that he told his older brother, who already worked in Cambodia, about the opportunity. Fan’s brother quit his job and joined him. By the time they realized the offer was a sham, it was too late. Their new bosses wouldn’t let them leave the compound where they had been put to work.

Unlike the countless people trafficked before them who were forced to perform sex work or labor for commercial shrimping operations, the two brothers ended up in a new occupation for trafficking victims: playing roles in financial scams that have swindled people across the globe, including in the United States.

Tens of thousands of people from China, Taiwan, Thailand, Vietnam and elsewhere in the region have been similarly tricked. Phony job ads lure them into working in Cambodia, Laos and Myanmar, where Chinese criminal syndicates have set up cyberfraud operations, according to interviews with human rights advocates, law enforcement personnel, rescuers and a dozen victims of this new form of human trafficking. The victims are then coerced into defrauding people all around the world. If they resist, they face beatings, food deprivation or electric shocks. Some jump from balconies to escape. Others accept their lot and become paid participants in cybercrime.

Fan and his brother eventually ended up in Sihanoukville in a compound surrounded by a barbed wire fence. They were made to lure people in Germany into depositing funds with a phony online brokerage controlled by their operation, which also targeted English speakers in Australia and elsewhere.

“This idea of combining two crimes, scamming and human trafficking, is a very new phenomenon,” said Matt Friedman, chief executive of the Mekong Club, a Hong Kong-based nonprofit that combats what it calls modern slavery. Calling it a “double hurt,” Friedman said it’s unlike anything he’s ever seen in his 35-year career. The phenomenon has only just begun to come to light in the U.S., including in a Vice article published in July.

The most widely used technique among these operations is known as pig butchering, an allusion to the practice of fattening up a hog before slaughtering it. The approach combines some time-tested elements of fraud — such as gaining trust, in the manner of a Ponzi scheme, by making it easy for marks to extract cash at first — with elements unique to the internet era. It relies on the effectiveness of relationships nurtured on social media and the ease with which currencies can be moved electronically.

Typically, fraudsters ingratiate themselves into online friendships or romantic relationships and then manipulate their targets into depositing larger and larger sums in investment platforms that are controlled by the fraudsters. Once the targets can’t or won’t deposit more, they lose access to their original funds. They’re then informed that the only way to retrieve their cash is by depositing even more money or paying a hefty fee. Needless to say, any additional funds disappear in similar fashion.

Some Americans have lost huge sums. An entrepreneur in California said she was swindled out of $2 million and unwittingly facilitated an additional $1 million in losses by convincing her friends to join her in what seemed like a surefire investment. A hospital technician in Houston enticed her friends and colleagues to join her in a similar scheme, costing the group $110,000. An accountant in Connecticut is no longer preparing for retirement after watching $180,000 vanish in two separate swindles. They were among more than two dozen scam victims from seven countries interviewed by ProPublica.

Out of fear or shame, most pig butchering victims do not report their losses. That’s one reason that the limited data available likely understates the scale of the damage. According to the Global Anti-Scam Organization, a nonprofit founded last year to combat the new form of fraud, at least 1,838 people in 46 countries have lost an average of about $169,000 each to pig butchering since June 2021. Many still seem stunned by the effectiveness of the trickery. “I have to say, it’s brilliant,” said a Silicon Valley CEO who tallied her loss at $800,000 and asked not to be named out of embarrassment. For many victims, the betrayal by a seeming friend only compounds the devastation.

Fan’s ordeal began with a burst of optimism. He flew to Cambodia’s capital, Phnom Penh — it was his first time leaving China — and then waited out two weeks of COVID-19 quarantine in a hotel. He was then driven to a walled-off condominium complex in the city to begin his training. It was only then, in April 2021, that he realized something was off. Instead of learning about food delivery or working in a kitchen, he and his brother were placed in front of computers and told to study materials about how to defraud people online.

Fan, who is serious and reserved, with a crew cut and a round face that betrays little emotion, was able to document parts of his account, including the offer letter that drew him to Cambodia. (Fan is his family nickname; he asked that ProPublica not include his full name out of fear of his captors.) His experiences resembled those of other trafficking victims ProPublica interviewed and aligned with descriptions provided by experts and others.

Job ads, like this one on Facebook, are often used by human traffickers to lure young people into scam sweatshops in Sihanoukville. Facebook removed the post after ProPublica asked about the ad. (Screenshot by ProPublica)

Fan and his brother spent six months engaging in pig butchering schemes before their bosses decided to relocate the operation to Sihanoukville. The bosses presented them with a choice: They could pay the equivalent of $7,000 each to leave, or they could move along with the company. The brothers, who were paid negligible wages for their work, couldn’t afford the fee. So they relocated to Sihanoukville, in the upper floors of a hotel and casino called the White Sand Palace located in the center of the city.

The job could be terrifying. Fan said he witnessed a worker “half-beaten to death” by guards. “People were saying: ‘Help him! Help him!’” he recalled. “But nobody went up to help him. Nobody dared to.”

Only weeks after Fan and his brother arrived at White Sand, they experienced a brief moment of hope, Fan said. A person approached them and offered to get them out. With his help, they managed to leave — only to realize that the seeming savior had sold them to another criminal organization. This one was located in a fortified complex of beige dormitories on the edge of Sihanoukville with the grandiose name Arc de Triomphe. The $7,000 each owed for his freedom had risen to $11,700. And the price would go higher still.

Cyberfraud operations in Asia, including the ones Fan worked for, are highly organized. Some have gone so far as to draft detailed, psychologically astute training materials on how to dupe strangers. ProPublica obtained more than 200 such documents from an activist who helps involuntary workers escape.

Pig butchering scammers often claim that a well-placed aunt or uncle is feeding them inside information. Some training guides include talking points to teach scammers how to utilize this script effectively. (Screenshot by ProPublica)

Step one in the fraud process for Fan and others was to create an attractive online persona. In his case, he was expected to pose as a woman when wooing targets online. His operation bought photos and videos from websites that cater to such operations. For example, bundles of hundreds of photos of good-looking women and men are available for less than the cost of a cup of coffee from a shop called YouTaoTu. Another website markets a “pig butchering scam” package: For the equivalent of $12, it offers a “handsome guy set” of images of a man with perfectly chiseled abs. (Neither online store responded to requests for comment.) Such photos are frequently lifted from the online accounts of unsuspecting people; ProPublica found that images used by one fraudster were stolen from the Instagram profile of a Chinese social media influencer.

An image of a man showing off his chiseled abs is part of a “pig butchering scam” package of 197 photographs (including one of the man driving a Porsche) on sale for $12 on an online marketplace. (Screenshot by ProPublica)

Scamming guides obtained by ProPublica recommend using such photos to set up social media accounts and then bolster them with the simulacrum of an affluent lifestyle by posting photos of luxury cars, along with descriptions of relevant hobbies such as investing. Stressing your belief in the importance of family, one guide adds, is the sort of touch that helps foster trust.

The resulting profiles can seem so real that one Canadian man met his future scammer after Facebook’s algorithm suggested the person to him as a friend. The chance encounter cost him and his friends nearly $400,000, according to a police report he later filed. Other victims told ProPublica they met their scammers on LinkedIn, OkCupid, Tinder, Instagram or WhatsApp. (Meta, which owns Facebook, WhatsApp and Instagram, said it has “long prohibited this content” and is investing “significant resources” into blocking it. Match Group, owner of Tinder and OkCupid, said it’s using machine learning and content moderators to fight fraud. LinkedIn didn’t respond to emails seeking comment.)

The next step for Fan was to contact as many victims as possible. He recalled working on a team of eight under a group leader, who gave each of them 10 phones to make it easy to keep multiple chats going, along with lists of phone numbers to contact. Fan’s job was to try to initiate conversations on WhatsApp. He would do it by pretending he had reached a wrong number, a common ruse. Others would open with a simple “Hi.”

One former scam worker holds the phones he used to contact potential victims. (Photograph provided to ProPublica)

Some tiny percentage of people responded favorably. When they did, Fan’s job was to handle the crucial initial part of the conversation. That’s when scammers are instructed to get to know their victims and discover what one training guide calls “pain points” that can be exploited. It’s also an opportunity to do what another document calls “customer mapping,” screening potential marks to glean information on their wealth and their vulnerability to being “cut,” slang for convincing them to fall for the scheme.

Fraudsters often initiate conversations on WhatsApp using wrong number-type messages. (Screenshot provided to ProPublica by the Global Anti-Scam Organization)

Using WhatsApp offered other practical advantages. Initially, Fan said, his team was aiming its efforts at Germans. Fan doesn’t speak a word of German, but it didn’t matter. All his chats were filtered through language translation software. Later, his team shifted to marks who spoke English. If any of the potential victims wanted to hear the voice of the attractive woman he was pretending to be, Fan said, there was a woman on staff who spoke fluent English and could record voice memos for him.

Because he was a rookie, Fan’s job was mostly limited to enticing marks to download an app called MetaTrader that would provide access to a brokerage where, he told his new “friends,” they could make fortunes trading cryptocurrencies. Fan would try to convince them to buy cryptocurrencies such as ethereum or bitcoin and deposit them in a brokerage controlled by the scam operation. The brokerage would then post phony numbers, including ones that represented supposed gains in their accounts.

If customers complied and began depositing significant sums, Fan said, he would typically hand the phone to his boss, who would take over and begin prospecting for a major strike. The strategy squares with what several scam victims told ProPublica: They sensed they were talking with multiple people. Indeed, they often were.

Why MetaTrader Is a Favorite Tool for Pig Butchering

Consumers who file complaints about pig butchering with the Federal Trade Commission routinely mention MetaTrader as a conduit for fraud. Among 716 such complaints filed since June 2021, consumers reported losing $87 million, FTC data shows. Separately, ProPublica identified 60 fake brokerages that have used MetaTrader for pig butchering.

Why has the app become such a staple of these scams?

MetaTrader isn’t a brokerage. It’s a platform. It’s analogous to using Amazon’s website to buy products from other retailers. Only in the case of MetaTrader, customers use the platform, typically via its phone apps, to access online brokerages where they can trade foreign currencies or other financial instruments. Both Apple and Google distribute MetaTrader in their app stores, giving it broad availability and a patina of legitimacy. (One training manual advises pig butchering fraudsters to cite its distribution by Apple as proof that MetaTrader can be trusted.)

However, MetaQuotes, the Cyprus-based company behind MetaTrader, allows brokerages that it contracts with to sublicense MetaTrader software to other brokerages with few checks to ensure the legitimacy of the sublicensed operations. This has allowed scammers to use MetaTrader as a front for fraudulent websites. Victims who are bilked via MetaTrader see records of trades and account balances, seemingly allowing them to control their money, when in fact that money is already in the swindlers’ possession.

ProPublica shared the list of fake brokerages and the FTC complaints with MetaQuotes CEO Renat Fatkhullin, along with a detailed list of questions. He did not respond. A lawyer for MetaQuotes told one victim that it is “solely a software development company” and has “nothing to do with any complaints of traders against companies that use the software of our clients.” An Apple spokesperson said the company has shared complaints with MetaQuotes, claiming that MetaQuotes has taken steps to respond to the complaints. The spokesperson provided no examples. Google did not respond to a request for comment. The FTC declined to comment.

About 8,000 miles from Cambodia, an American who lives near San Francisco got a WhatsApp message on Oct. 7, 2021, from a stranger calling herself Jessica. She seemed to have reached him by mistake. Jessica asked the man, whose middle name is Yuen, if they knew each other; she said she had found his number on her phone and didn’t know why. Yuen responded that he didn’t know her. But Jessica was chatty and friendly, and her photo was alluring, so they kept talking.

Yuen agreed to tell his story on the condition that ProPublica identify him only by his middle name and omit certain details that could identify him. He saved his chat history with Jessica, which would run to 129,000 words over several months, and later shared it with ProPublica. (Yuen also shared his chat history with Forbes.)

At the moment Jessica initiated contact, Yuen was vulnerable. His father was in a hospital, dying from a lung disease. He had entrusted Yuen, the youngest of four siblings, with the power to decide whether to cut off his life support. It would also be up to Yuen to plan his father’s funeral and distribute his estate.

The family had immigrated to the U.S. from Hong Kong decades earlier. Yuen, who is in his early 50s and works as an accountant for a major university, was more affluent than his siblings, who are all older than him. He felt it was his duty to take care of them in old age, much as he was caring for his father and had cared for his late mother. Jessica told him she admired his commitment to his family. She shared her own tale of having a grandfather in the hospital.

Yuen began trading messages with a stranger named Jessica on WhatsApp in October 2021. (Brian Frank, special to ProPublica)

Jessica was, by all appearances, a savvy and talented woman. She claimed to be a Chinese immigrant herself, a private banker at J.P. Morgan Chase in New York City. (A Chase spokesperson said the bank has no current employee with her purported Chinese name, Wang Xinyi.) Jessica’s photographs showed her spending weekends on Long Island playing with her rich friend’s toddler. She seemed fashionable, loved shopping and found time for yoga nearly every day, and she would flirt with Yuen. When Jessica posted photos of herself at a luxurious beach property, he wrote, “Wish I was there now.” She replied, “We can go play together.”

Text exchanges between Jessica (gray) and Yuen (green) (Screenshots provided to ProPublica)

One Monday in late October, Jessica told Yuen she had just made $100,000 trading gold contracts. She let him in on a secret: She had a rich uncle in Hong Kong who had his own team of analysts who fed her inside quotes about where the price of gold would move. Every time “Uncle,” as she referred to him, called with news of where the market would go, she could make a guaranteed 10% profit by trading on his directions.

Jessica offered to teach Yuen — but only him. “Why just me?” he asked. Jessica said it was because she sympathized with Yuen about his dying father. “The money you earn can better help your father,” she explained. Plus, she knew she could trust him to keep her secret about insider trading. “Of course, I won’t tell anyone,” Yuen told Jessica as he pondered whether to join in.

The exchange marked a key moment in Yuen’s relationship with Jessica. The person behind Jessica’s alter ego was using a manipulation technique called “altercasting,” according to Martina Dove, a psychology researcher and author of “The Psychology of Fraud, Persuasion and Scam Techniques,” who reviewed Yuen’s chat log at ProPublica’s request. It puts the scammer in a position of trusting the target so that the target will reciprocate trust later on. Keeping the trading secret also meant less chance that Yuen’s wife or teenage daughter would learn about his chats with Jessica.

When Yuen agreed to put some money into gold, Jessica told him to download MetaTrader from Apple’s app store. She then told him to use the app to search for a brokerage called S&J Future Limited.

Yuen made it clear he couldn’t afford to lose any money. If he did, he said, he’d have to kill himself. Jessica said there was no need to worry: Uncle was never wrong. Yuen owed it to his father to seize the opportunity.

On Oct. 26, the day he had to go to the hospital to discuss his father’s end-of-life care, Yuen put money on the line for the first time. A conservative investor and lifelong saver, he’d been petrified to put even $2,000 into the brokerage. Jessica convinced him to start with $10,000 and taught him the two-step process to fund his account. First, he wired money from his bank to buy a cryptocurrency called ethereum. Then he could transfer the ethereum to a crypto wallet, whose address she provided.

Jessica insisted that using a cryptocurrency would help Yuen minimize his tax burden. He admitted he had very little idea of what he was doing. No matter. When the transfer was done, his S&J account reflected the deposit. And the next day, when Uncle called Jessica with news, Yuen was ready to buy. His account showed he made $746 after fees.

Jessica claimed she had made $500,000 on the same trade. She told him to get his account up to $50,000 to start earning meaningful sums. Yuen agreed and wired $20,000 the next day and another $20,000 a few days after that. When Jessica saw that he was doing as she’d directed, she praised him — “you’re smart” — and reminded him that the more money he put in, the more he’d earn for his father and siblings.

Little by little, Jessica encouraged Yuen to invest more and more. Yuen liquidated some mutual funds and wired nearly $58,000 on Nov. 2. When Uncle called with news later that night, his MetaTrader account showed an eye-popping gain of $17,000.

In those early weeks, Yuen was thrilled with Jessica. He called her his “true angel” in one message and offered up emojis of joy. Jessica wrote back: “I am not an angel, I am a demon.” She added two smiley-face emojis.

The skyline of Sihanoukville (Cindy Liu for ProPublica)

If Cambodia has a capital of fraud, it may well be Sihanoukville, which is named for the country’s onetime king who was ousted in an American-supported coup during the turmoil that erupted as the U.S. bombed the nation during the Vietnam War. The city has transformed over the past five years from a quiet beach resort to a metropolis of casinos and ghostly towers in various stages of construction or decay. The building boom was funded by Chinese investors, who started pouring millions of dollars into Sihanoukville after 2016, when the Philippines launched a crackdown on illegal online gambling outfits that were aimed at Chinese citizens. Cambodia had looser gaming regulations, and its government welcomed Chinese investment, making it a perfect substitute.

Soon Cambodia experienced the same influx of organized crime that had prompted the crackdown in the Philippines. Cambodia, under pressure from the Chinese government, announced a ban on online gambling in August 2019. Months after that, the COVID-19 pandemic struck and casinos in Cambodia were suddenly emptied of customers and workers.

Criminal syndicates repurposed their emptied real estate and began using it for scamming operations, according to Jason Tower, Myanmar country director for the United States Institute of Peace, and other observers in the region. “They’re criminal businesses, but they’re businesses at the end of the day,” he said. “So what did they do? They adapted.” And thanks to the pandemic, human traffickers found no shortage of job seekers with computer skills.

Forced Labor Compounds Have Spread Across Cities in Cambodia and Elsewhere in Southeast Asia (Map by Lucas Waldron, ProPublica. © OpenStreetMap Contributors. Research by Danielle Keeton-Olsen.)

These facilities, which are housed in everything from office buildings to garish casino complexes, aren’t all tucked away in isolated neighborhoods. Some are prominently situated in the heart of cities. The White Sand Palace, which contains not only a gambling establishment but also multiple floors of fraud operations, according to former workers there, is located diagonally across the street from the summer residence of the Cambodian prime minister. White Sand didn’t respond to a request for comment.

Scam operations are often in central locations. The White Sand Palace in Sihanoukville is only a block or so from the prime minister’s summer residence. (Photo by ProPublica)

Many fraud operations are surrounded by barbed wire fences. It’s routine to see windows and balconies completely enclosed by bars. In the Chinatown area of Sihanoukville, storefronts for a noodle shop and a barbershop look unexceptional, until you walk inside and notice that there are bars inside preventing anyone from exiting the complex of heavily guarded buildings.

The beige stretch of towers, center, and the buildings to the left, located in the Chinatown area of Sihanoukville, house scam operations, according to people who say they were held captive there. (Cindy Liu for ProPublica)

Over the past year, an array of activists, journalists and nongovernmental organizations in Southeast Asia have begun revealing what’s going on behind the bars in these buildings. Ngô Minh Hiếu, a reformed hacker who now works as a cybersecurity analyst for the Vietnamese government, was one of the first to identify the sites. NGOs such as the International Justice Mission, as well as local media outlets, most notably VOD News, have revealed details of the operations. (ProPublica collaborated with three reporters affiliated with VOD to prepare this article.)

Lu Xiangri, a survivor of human trafficking who became a rescuer, wears a red bracelet he received at a pagoda where he prayed for people trapped in scam compounds. (Cindy Liu for ProPublica)

Others, such as Lu Xiangri, who became a volunteer rescuer after escaping a Sihanoukville scam sweatshop, have collected videos depicting abuses in these operations. Lu witnessed severe mistreatment when he was briefly detained inside the Arc de Triomphe last October: He saw a man with a broken leg and a bruised back begging to be sold so that he could avoid further beatings; Lu said the man later died of his injuries. Determined to help others avoid a similar fate, Lu joined a volunteer rescue team, which exposed him to a steady stream of pleas for help that often include graphic images of wounds left by electric shock batons and other corporal punishment. (ProPublica examined scores of similar photos and videos, some of which depict torture — including the use of electronic shock devices on workers’ genitals — but is publishing only a limited number whose authenticity was verified by Lu.)

ProPublica drove up to the gates of three compounds in Sihanoukville where people have alleged being detained and compelled to work as fraudsters. They included the Arc de Triomphe, one complex in Chinatown and another sprawling compound known as White Sand 2. Security guards at the three locations either denied that anything illegal goes on inside or refused to answer questions. “Talk to the boss,” one said, without specifying who the boss was.

Alleged scam compounds in Sihanoukville (Cezary Podkul/ProPublica)

Fan said his life was tightly circumscribed when he worked and lived inside the Arc de Triomphe compound. He could leave his building and enter an adjoining casino and karaoke bar — he said he had no interest, though some workers did gamble or go to the karaoke bar — but the presence of guards would dissuade any hopes of going out into the street. During the four months he was at the Arc de Triomphe, he said, he never set foot outside the compound.

His schedule and routine were regimented. Fan worked on the second floor of a building from 5 p.m. to 9 p.m., then again from 11 p.m. to 5 a.m. He slept in a dorm room with metal bunk beds, with four or five people per room. There was even a small clinic in the compound that provided first aid and rudimentary medical treatment. As Fan put it: “You can’t go anywhere. You’re either eating, sleeping or working.” The days ran into each other, and Fan tried to anesthetize his own feelings, willing himself into emotional torpor. His only pleasure came from playing a fantasy warfare game on his phone each night before going to bed.

The Arc de Triomphe compound in Sihanoukville (Cindy Liu for ProPublica)

Fan hated the work. Cheating people out of money was the last thing he thought he’d be doing when he answered a job ad. But he couldn’t leave the compound, nor could he afford to buy his way out. His bosses at the Arc de Triomphe demanded $23,400 for him and his brother. The two were essentially paid on commission, which meant that the more he wanted his freedom, the more he’d have to bilk.

In part because he would hand over promising targets to his boss, but perhaps also because of his reluctance, Fan never delivered a big score. The most he landed was $30,000. He said he felt so terrible after that “success” that he deleted the victim’s contact information from the organization’s database to make sure the person couldn’t be further stripped of cash. Others on his team, he said, extracted as much $500,000 from a single victim.

On Nov. 3, as Jessica was helping him turn his newest deposit of $70,000 into cryptocurrency, Yuen got a message that his father had been taken to the hospital. Yuen raced to join him, and as he sat in the waiting room, some other news came through. It was Jessica, saying her uncle in Hong Kong had given her another signal to trade.

Yuen explained to Jessica that his father was dehydrated and losing the will to eat. He was back in the hospital two days later, crying as he wiped his father’s hands and face. Shortly after, Jessica messaged to ask if his latest deposit of $20,000 had gone through. Yes, he said. He added that he’d decided to give his father comfort in his dying days by moving him to a hospice.

Jessica didn’t seem to grasp what a hospice was. When Yuen explained that it was a care facility for the terminally ill, she perked up: “You need to make more money.” Jessica told him he should raise his account balance to $500,000 so he could cover the cost more easily.

Over the next nine days, Yuen cashed in a $20,000 CD that his mother had bequeathed him and his siblings and tapped a dormant home equity line of credit for $200,000. Each time he traded with Jessica, his account showed an increase, and soon he surpassed the $500,000 mark she’d set out for him.

As Yuen was moving his father into hospice, Jessica pressured him to increase his deposits. “You need to make more money,” she told him. (Brian Frank, special to ProPublica)

Yuen’s father died in the early morning hours of Nov. 14. Yuen was the only one with him when he breathed his last. He wrote Jessica, seeking sympathy, but got a perfunctory response. This is a common stratagem, said Dove, the psychology researcher. She calls it “scarcity”: withdrawing attention unless the target is doing what the scammer wants. When Yuen wanted to talk about anything related to money, Jessica engaged. When he wanted her attention for anything else, she was distant and tried to steer the conversation back to investing.

The next day, with his father now gone, Jessica gave Yuen another goal. She bragged that she was buying yet another home in New York. The conversation turned to real estate and how Yuen could afford a pied-à-terre there. Why, he asked? “So that we can get very close,” Jessica responded. She explained that Uncle had told her a “big market” was coming soon. “If you want to buy a house in New York, you need to increase your capital,” she said.

In just a few weeks of trading, Yuen had shed much of his previous caution. But now he resisted. He was planning his father’s funeral, he told Jessica, and he was overwhelmed at work. Buying a home in New York would have to wait. Jessica urged him to take out another loan. When Yuen refused, she chided him: “You are a wise man, this is borrowing a chicken to lay eggs.” But Yuen didn’t budge.

By Nov. 18, he had gone six days without depositing more money into his account. That’s when his investing idyll came to an end. That day, his MetaTrader app suddenly closed him out of his positions. By the time it was over, his account showed a balance of minus $480,000.

Yuen panicked. He couldn’t lose any of this money, but he felt he couldn’t turn to anyone for help, either. He’d been keeping his MetaTrader habit secret. He lied to his wife and daughter when they asked who he was messaging so frequently, brushing it off as an endless stream of work requests. His siblings didn’t know either. No one knew. No one except Jessica.

Jessica convinced him it was his fault. He must have exited the MetaTrader app instead of following her directions. But it was OK, she said. The big market was still there and he could make everything back quickly. “Prepare the funds and earn them back,” she said.

Yuen didn’t know it, but he had now entered the final stage of pig butchering. This is when scammers sense that their targets have been squeezed dry and are unlikely to deposit more funds. They then shift to the final manipulation: Making the targets aware that they’ve lost all their money and offering them a seeming lifeline to earn it back. The move aims to heighten the targets’ distress. “We normally don’t make our best decisions when we’re in a state of emotional arousal,” said Marti DeLiema, a gerontologist at the University of Minnesota who researches how older Americans are swindled.

Yuen immediately dialed up the financial institutions that managed his family’s savings and ordered a sale of $500,000 worth of mutual fund shares. As he waited for the money to be transferred, he debated whether to inform his family about the loss. Jessica told him, via an emoji depicting an index finger over closed lips, not to say a thing. If he’d only wait a few more days and deposit more funds, he’d turn his loss into a gain. “Yes, we will earn it back,” Yuen said.

The following week, Yuen borrowed $100,000 from his brother-in-law and resumed trading with Jessica as he made final preparations for his father’s funeral. On the day of the funeral, he messaged Jessica. “When I was crying today,” he wrote, “I wasn’t sure if I was crying because I lost my father or I lost all the money.” She responded, “Money can be earned, but people are gone if they are gone.” Yuen thanked Jessica for her help.

Midway through the following week, Jessica pushed him to borrow even more, but Yuen said he had no one he could turn to. Jessica wasn’t buying it. “I don’t think you’ve reached your limit,” she said, adding that every time she had asked him to gather cash before, he’d been able to do so.

When she pushed him again the next day, Yuen exploded. “Omg.!!!” he wrote. “You don’t understand! I have no more resources to get anymore money!” By that time, he couldn’t sleep or eat or do anything other than worry about how to make back his losses.

On Dec. 3, at 11:31 a.m., Jessica messaged Yuen to get ready to do another trade with Uncle’s news. Three minutes later, Yuen executed his 23rd trade with Jessica. Once again, disaster struck: All of his positions suddenly got closed, and his entire portfolio vanished as he watched.

Yuen convulsed with panic. He spent the next several hours in shock and terror as the consequences of the loss raced through his mind. “Give me a solution,” he begged Jessica. She told him to put more money in. When he told her that all he had left was $105, Jessica answered: “With $105, start from scratch, I believe you, you can do it.”

Later that day, Yuen confessed to his family. He told his wife he’d lost 30 years’ worth of their savings. He later admitted that the money he’d borrowed from her brother and the bank was also gone. In all, he had lost just over $1 million. Yuen asked his brother to call an ambulance to escort him to a psychiatric ward, where he was placed on a suicide watch.

If you or someone you know needs help with suicidal thoughts, you can call or text the National Suicide Prevention Lifeline at 988.

Yuen was released two days later and spent December wondering what had happened. Jessica stopped replying to his messages after a few days, but he kept on asking. “It’s Christmas. Hope you have the heart to help me!!!” he messaged on Dec. 25. (ProPublica got no response to messages it sent to the WhatsApp number used by Jessica.)

Yuen said he didn’t accept that he’d been cheated until after Jan. 1. It was only through the intervention of close friends and relatives that he acknowledged what had happened. He found a support group, the Global Anti-Scam Organization, and began piecing together details of the scam, like a Reddit post warning that S&J Future Limited was a sham brokerage. A fellow victim set up a GoFundMe page to help him, and others began to chip in, including a Massachusetts woman who had lost $2.5 million herself.

In the end, Yuen lost $1 million, more than he and his wife had saved over 30 years. (Brian Frank, special to ProPublica)

But Yuen still struggled to comprehend what kind of person — and where? — would impose such suffering on someone else. He got a partial answer on March 31. That’s when Jessica contacted him again using a different phone number. Yuen was prepared: Another GASO member had taught him a trick to track down a person’s IP address to figure out their location. The chat log shows Jessica fell for the ruse. When the IP information came back, Yuen said, it indicated Cambodia.

Well before then, Fan and his brother had passed the point of desperation. They began seeking ways out of the Arc de Triomphe. In late January, Fan messaged the governor of Preah Sihanouk province via Facebook. The governor’s office responded, asking for Fan’s phone number, he said, and soon after the police called.

But the attempt backfired. Fan’s bosses found out about the call and summoned him and his brother. They berated the two for tarnishing the company’s reputation and threatened legal consequences, according to Fan. The meeting culminated in a videotaped confession in which Fan’s brother read a statement, on behalf of both brothers, prepared by their bosses. A video recording shows Fan’s brother reading a script in which he stated that they had gotten a “personal loan” from the company and had to repay it. He ended by saying, “We would like to apologize to the provincial governor.”

When Fan returned to his desk, his boss was furious. The boss slapped him, Fan said, threw a water bottle in his face and told him to go find the money to pay for his freedom. His boss warned him, according to Fan, that “it doesn’t even matter if you die in here” because it would be so easy to kill him. No one would care. (At least six dead bodies have been discovered in the marshlands or beaches near Sihanoukville’s scam compounds, many of them Chinese men.)

Fan’s police report turned him and his brother into troublemakers in the eyes of their employer. They got sold to another fraud operation, this one back in Phnom Penh, which tacked on further charges to their debt. Each now would have to pay $15,500 for his freedom.

Fan stands on the roof of the guesthouse he stayed in after his escape. (Cindy Liu for ProPublica)

In February, Fan found a way to get out. He noticed that his new bosses were less strict about security than his previous captors. They occasionally allowed workers to venture outside the compound. So Fan came up with an excuse — visiting a friend — and received permission to leave. He suspects that his captors let him go because they believed that, as long as they still held his brother, he would return.

But Fan didn’t return. Meanwhile, his brother called the police, and this time they came through. He was released at the urging of local authorities. But before his brother left, he was forced to confess again, this time in writing. That handwritten letter, which Fan shared with ProPublica, stated that he had borrowed $31,000 from the company, was happy and working voluntarily and had never been kidnapped or beaten.

Fan spent his first months of freedom in the Great Wall Hotel, a modest five-story guesthouse steps away from Phnom Penh’s airport that has become a haven for Chinese scam workers who manage to escape. Life at the Great Wall was safe but monotonous. Most residents were just passing the time as they waited for an opportunity to return to China, which has restricted travel due to its zero-COVID-19 policy. Those limits contributed to rising costs for airline tickets, putting a return nearly out of reach for many of the escapees.

In June, Fan moved out of the Great Wall Hotel. He declined to reveal his exact whereabouts, as he’s still afraid that he will be abducted by bounty hunters. Fan has obtained paperwork that will allow him to return to China without his passport, which a scam compound still holds, and his father recently managed to cobble together enough money to pay for him to fly home. Fan dreams of returning to work on his family’s farm, tending to ducks and chickens while safely under his parents’ roof. “I won’t come out to work again,” Fan said. “There’s not much future working for other people.”

The front desk at the Great Wall Hotel in Phnom Penh (Cindy Liu for ProPublica)

Cambodia’s fraud operations often have links not just to organized crime but also to the country’s political and business elites. The Arc de Triomphe, for instance, is owned by K99, a real estate and casino junket operator led by Rithy Raksmei, brother of the late tycoon Rithy Samnang. Samnang was also son-in-law to ruling party senator Kok An, whose business empire includes properties that have faced allegations of forced scam labor. And the complex in Chinatown has a hotel that is part-owned by Xu Aimin, a Chinese fugitive who was sentenced to 10 years in prison for masterminding an illicit international gambling ring. (None of these individuals or entities have been prosecuted for involvement in Cambodian scam compounds and none responded to ProPublica’s requests for comment.)

In July, the U.S. State Department downgraded Cambodia to the lowest tier on its annual assessment of how well countries are meeting standards for eliminating human trafficking. The department asserted that Cambodian authorities “did not investigate or hold criminally accountable any officials involved in the large majority of credible reports of complicity, in particular with unscrupulous business owners who subjected thousands of men, women, and children throughout the country to human trafficking in entertainment establishments, brick kilns, and online scam operations.” A United Nations special rapporteur on human rights in Cambodia put it in searing terms in an August report: Workers trapped in Cambodian scam compounds are experiencing a “living hell.”

The day the U.N. report appeared, Cambodia’s government reversed months of denials and acknowledged that foreign nationals have been trafficked to the country to work in gambling and scam operations. Cambodian Interior Minister Sar Kheng condemned what he called “inhumane acts” and expressed regret. The statement came only days after a dramatic, widely seen video emerged of some 40 Vietnamese men and women breaking out of a reported fraud compound and, chased by baton-wielding men, frantically jumping into a river that divides Cambodia from Vietnam.

Cambodia’s senior official working to combat human trafficking, Chou Bun Eng, told ProPublica in a July interview that her government was still figuring out how to respond to scam sweatshops. “This is new for us,” she said. Top officials from Cambodian police, immigration and other government agencies met in Phnom Penh in late August to discuss a strategy. They pledged action, then almost immediately, the government’s Ministry of Foreign Affairs and International Cooperation undercut that stance by releasing a statement in September asserting that human trafficking in Cambodia is “not as serious, bad as reported.”

Lacking any form of legally recognized status, escapees from scam compounds are left at the mercy of Cambodian police, who often treat them as illegal immigrants or criminals. Rescued people frequently end up in crowded immigration detention centers, sleeping on the floor in tight quarters without any air conditioning, according to images shared by a detainee.

The police have sometimes pursued the rescuers. Chen Baorong, the former head of a charity group that helped human trafficking victims escape, was arrested in February and charged with incitement. In late August, he was sentenced to two years in prison. Lu Xiangri, the volunteer rescuer, took up Chen’s mantle after his arrest, only to himself flee Cambodia in July out of concern for his safety. In response to questions from ProPublica, Cambodia’s General Commissariat of National Police wrote that ​​“it is not the government policy to collude with any criminal group or facilitate the use of Cambodian soil by criminals as a hotbed for fraudulent activities overseas.”

Lu in Sihanoukville in May, before he fled Cambodia (Cindy Liu for ProPublica)

The governments of China, Indonesia, Pakistan, Thailand and Vietnam have issued warnings in recent months about high-salary job offers emanating from Cambodia. Authorities in Taiwan and Hong Kong have gone so far as to station workers at airports to question people emigrating for work and to warn them about overseas employment scams. Still, even as the governments issue warnings about Cambodia, new operations are gravitating to places like Myanmar, where the violent aftermath of a military coup has created an opportunity for criminal syndicates to expand.

In the U.S., law enforcement and victims are trying, against long odds, to recapture lost money. In May, the Santa Clara County District Attorney’s Office seized $318,000 of stolen crypto funds on behalf of one pig butchering victim. Erin West, the deputy district attorney spearheading the effort, said her team has been able to seize an additional $233,000 since then and has a few more seizures in the works. Still, most funds aren’t recovered, and the chances drop rapidly as time passes.

Yuen is losing hope that he’ll recover his funds. At one point, he turned down an offer from a self-described hacker to introduce him to an FBI agent who would track down his stolen funds if Yuen paid him $5,000. Cautious, Yuen asked to see a photograph of the agent’s FBI identification. The badge looked authentic, as did the photo ID. But under the photograph, Yuen noticed the signature. It read “Fox Mulder,” the name of the fictional detective on “The X-Files.”

Mech Dara and Danielle Keeton-Olsen contributed reporting from Cambodia, and Salina Li from Hong Kong.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Cezary Podkul, with Cindy Liu for ProPublica.

]]>
https://www.radiofree.org/2022/09/13/human-traffickings-newest-abuse-forcing-victims-into-cyberscamming/feed/ 0 332403
These red states don’t want climate targets — but they do want green jobs https://grist.org/politics/these-red-states-dont-want-climate-targets-but-they-do-want-green-jobs/ https://grist.org/politics/these-red-states-dont-want-climate-targets-but-they-do-want-green-jobs/#respond Mon, 12 Sep 2022 10:45:00 +0000 https://grist.org/?p=587417 On a sweltering Friday this summer, a who’s who of Georgia political and business figures gathered under a large tent on a dusty expanse of vacant land outside of Savannah, sipping champagne. They were waiting for the governor to confirm the week’s exciting rumor: Hyundai was going to build electric vehicles here.

“It is my great honor to officially announce that Hyundai Motor Group will build their first dedicated electric vehicle manufacturing plant right here in this good soil in Bryan County,” Governor Brian Kemp, a Republican, announced to whoops and cheers.

He went on to boast that 20 EV-related projects had come to Georgia since 2020, promising thousands of jobs and billions in investment. The state has actively pursued these companies, offering billions in tax breaks and other incentives to lure Hyundai, electric truck and SUV maker Rivian, EV battery maker SK Innovation, and others to Georgia. Kemp called the state “the unrivaled leader in the nation’s emerging electric mobility industry.”

And it’s not just EVs. Solar panels have been made in Georgia since Suniva was founded out of Georgia Tech in 2008, and the industry has expanded in the last few years. The solar manufacturer Qcells opened a plant in 2019 and announced an expansion this year, and last year NanoPV announced another plant in the state.

Georgia Gov. Brian Kemp speaks at a campaign event attended by former U.S. Vice President Mike Pence at the Cobb County International Airport on May 23, 2022 in Kennesaw, Georgia. Kemp is running for reelection against former U.S. Sen. David Perdue in tomorrow's Republican gubernatorial primary.
Georgia Governor Brian Kemp speaks at a campaign event in May. Joe Raedle/Getty Images

This green manufacturing boom comes even as Georgia lags on climate policies that could spur the adoption of EVs, solar panels, and other green technologies. The state has no emissions reduction goals and charges EV owners an annual fee of more than $200. The state Public Service Commission, which regulates Georgia’s largest utility and therefore most of the state’s electricity generation, has mandated more large-scale solar in the last decade but sets no overarching emissions goal for power generation. The commission recently approved more gas-fired power and put off decisions on closing coal units and expanding rooftop solar.

Georgia isn’t alone in this disconnect. A December 2021 report by the Centers for Strategic and International Studies, or CSIS, found that many states without what it called “climate ambition,” like Texas, Louisiana, Wyoming, and South Dakota, are still pursuing the economic opportunities of clean energy. In Georgia, officials see a chance to attract new businesses that promise jobs and investment, while companies feel the lure of massive tax breaks and convenient ports to move their goods. It’s a deal that makes economic sense, regardless of climate policy.

“Just because a state does not have targets to reduce greenhouse gas emissions itself does not mean it has no aspirations to sell its products to others that do,” the report found.

‘Jobs of the future’

For economic development officials in Georgia, pursuing clean energy and tech facilities is a simple matter of reading the writing on the wall. It’s where manufacturers are investing their money.

“We’re trying to make sure that every small town in Georgia has an opportunity to thrive and really reach the jobs of the future,” said Pat Wilson, commissioner of the state’s Department of Economic Development. “It’s imperative on us … that we go after the jobs that are going to be here for the next 50 years.”

In the automotive industry, those jobs will be in electric vehicles, not gas-powered ones. Georgia is already home to a Kia manufacturing plant and numerous facilities that make car parts for other manufacturers, meaning a lot of Georgians work in the industry.

“There are 55,000 Georgians whose life is really tied to an internal combustion engine,” Wilson estimated. In enticing EV companies, battery makers, and other links in the EV supply chain to the state, he said, officials are aiming to line up jobs those workers can transition to as their industry increasingly goes electric.

The same is true in other states. “We can think about the desire to preserve some of their legacy industries,” said Morgan Higman, the author of the CSIS report on climate ambition and clean tech jobs. “There’s this sort of external market pressure.”

Michigan, another state with strong automotive ties, recently expanded the economic development incentives it can offer to lure large-scale manufacturing projects. State lawmakers earlier this year approved a $666 million incentive for GM to make EVs and batteries there. 

Higman’s report also identified a similar motive in states with big oil industries, like Texas, Louisiana, and Wyoming. In Louisiana, for instance, the state’s Climate Initiatives Task Force adopted a Climate Action Plan earlier this year that calls for investment in “Louisiana-based low-carbon industry through tax incentives” as well as programs to train oil and gas industry workers for clean energy jobs. In Texas, Exxon has proposed a $100 billion carbon capture and storage project that it says will need public funding, including tax breaks; local officials in Harris County have supported the idea. 

Why build here?

Renewable energy and electric vehicle companies list a lot of reasons for choosing states like Georgia, even though they’re not those companies’ biggest U.S. markets and they lack policies that help promote the companies’ products.

Tax incentives are a big piece of the puzzle. Georgia offered Hyundai $1.8 billion in tax breaks and other incentives to attract its new EV plant. Rivian got a $1.5 billion incentive package for its Georgia EV plant, and battery maker SK Innovations got $300 million.

But the state has other advantages, including a well-established manufacturing sector. For instance, in 2019, solar cell maker Qcells opened a factory in Dalton, Georgia. That region has long made and exported flooring.

“So it’s already got a really strong manufacturing-focused workforce,” said Scott Moskowitz, head of public affairs for Qcells, which announced this year that it will expand the Dalton facility. “But it’s also just a really good place, both logistically and economically.”

A worker moves stacks of completed solar panels ready for shipping on the assembly floor at the Qcells solar panel manufacturing facility in Dalton, Georgia. China's dominance over solar manufacturing leaves America in a vulnerable place. Now, U.S. firms are racing to revive this idled industry at home. At the center of this movement is a plant in Dalton, Georgia where solar panels are made. It is one of the only places in the US where this is happening. Is this plant an example of what is coming in the US or a vestige of a bygone manufacturing era? The stakes are high. If the U.S. can't figure out how to bring some of this supply chain back home, it could find itself boxed out of the market for the solar panels and cells desperately needed for the energy transition.
A worker moves stacks of completed solar panels ready for shipping on the assembly floor at the Qcells solar panel manufacturing facility in Dalton, Georgia. Dustin Chambers for The Washington Post via Getty Images

He cited Georgia Tech as a hub for training students and developing new technologies, as well as nearby ports for importing raw materials and shipping products to consumers. The Port of Savannah is the fourth-busiest container port in the country, and the Port of Brunswick is the second-busiest for roll-on/roll-off trade — in other words, shipping vehicles. 

Those factors are specific to Georgia, but lots of red states share one advantage over their climate-ambitious counterparts: land.

“They have a lot of dirt that’s relatively cheap. And these are big facilities,” Higman said, citing a manufacturing incentive program in Alabama that applies to facilities on a minimum of 250 acres. The new Hyundai plant in Georgia will be built on a nearly 3,000-acre “megasite.”

“It’s a lot cheaper to do that in a place like Georgia than it is in a place like New York or California,” she said.

‘We’re going to need suppliers’

While states like Georgia, Louisiana, and Texas lack their own climate goals, their fast-growing clean technology industries make them a key part of the national story. States that do have carbon emissions reduction targets need to buy their solar panels, wind turbines, and electric vehicles from somewhere. And billions of dollars of clean energy incentives in the Inflation Reduction Act, which President Joe Biden signed into law last month, are expected to further increase demand.

“This is a great example of the capacity of states like Georgia … to play an important role in supporting the decarbonization goals of other states and even the president’s goals for our country,” Higman said. “We’re going to need suppliers of these technologies.”

Right now, many of those suppliers are overseas. That’s creating problems in light of the ongoing, global disruption of supply chains. The COVID-19 pandemic has led to city-wide shutdowns in export hubs in Asia; shortages of dock workers, truck drivers, ships, and shipping containers; changes in the price and availability of key materials like steel and polysilicon; and an overall increase in shipping costs. Concerns about labor practices in China and alleged efforts by Chinese manufacturers to undercut U.S. solar manufacturers have added further uncertainties and delays to the solar supply chain.

The ramping up of U.S. manufacturing won’t ease the current difficulties, Higman said, but it could help prevent similar problems in the future.

A case for red state climate plans

But should Georgia, and other red states, do more to nudge the market in a cleaner direction? Wilson, the Georgia economic development commissioner, doesn’t think so. He’s counting on businesses and consumers to lead the state’s transition to electric vehicles and renewable energy, not the government.

“We have become the fifth-largest state for installed solar in the country. And the reason being is that companies are pushing for a renewable portfolio from our utilities. And companies are doing that because they’re being driven by the consumer,” Wilson said. “And so we don’t have a mandate, but we’ve created a business case.”

Arrays of solar cells on conveyor belt at Qcells, a solar panel manufacturer in Dalton, Georgia. China's dominance over solar manufacturing leaves America in a vulnerable place. Now, U.S. firms are racing to revive this idled industry at home. At the center of this movement is a plant in Dalton, Georgia where solar panels are made. It is one of the only places in the US where this is happening. Is this plant an example of what is coming in the US or a vestige of a bygone manufacturing era? The stakes are high. If the U.S. can't figure out how to bring some of this supply chain back home, it could find itself boxed out of the market for the solar panels and cells desperately needed for the energy transition.
Arrays of solar cells on conveyor belt at Qcells, a solar panel manufacturer in Dalton, Georgia. Dustin Chambers for The Washington Post via Getty Images

Similarly, he expects Georgia drivers to switch to electric vehicles without the government or regulators intervening. In that case, he said, car manufacturers are going electric and so drivers will follow suit, in what he called a “business-led transition into electrification.”

But some advocates said the state government should be doing more to speed those transitions, in addition to wooing manufacturing.

“What we’re seeing nationwide is that the states that set the conditions to really support the adoption of electric transportation, and that are aggressively working as a state but also with their investor-owned utilities to deploy charging infrastructure at scale, is where the market is strongest,” said Stan Cross of the Southern Alliance for Clean Energy, a nonprofit advocacy group.

Georgia leads the Southeast in charging stations and is number two in the Southeast for EV sales per capita, he said, but the region lags behind the rest of the country.

Cross said that a climate plan that promotes electric vehicle adoption could ultimately boost Georgia’s economy. “Georgia has no skin in the oil game,” Cross said, so a hypothetical state policy to promote the transition to EVs would be as much about the state’s economy as about emissions. 

“It’s about stopping the hemorrhage of dollars leaving the state every time you pump gas and diesel,” he said. “Keep those dollars in the state by driving electric.”

In other words, for states that haven’t previously pushed EVs or renewable energy, a new case for climate policies is emerging that boils down to an old slogan: Buy local.

This story was originally published by Grist with the headline These red states don’t want climate targets — but they do want green jobs on Sep 12, 2022.


This content originally appeared on Grist and was authored by Emily Jones.

]]>
https://grist.org/politics/these-red-states-dont-want-climate-targets-but-they-do-want-green-jobs/feed/ 0 332040
Twitter Censored Professor’s Post for “Abusive Behaviour” Toward the Queen https://www.radiofree.org/2022/09/09/twitter-censored-professors-post-for-abusive-behaviour-toward-the-queen/ https://www.radiofree.org/2022/09/09/twitter-censored-professors-post-for-abusive-behaviour-toward-the-queen/#respond Fri, 09 Sep 2022 22:17:26 +0000 https://theintercept.com/?p=407315

A Twitter spokesperson said the social media giant deleted a Carnegie Mellon University professor’s controversial tweet condemning Queen Elizabeth II on the grounds that it was “abusive.” The company defines abusive behavior as “an attempt to harass, intimidate, or silence someone else’s voice” — in this case the voice of the world’s longest-reigning monarch.

It was a banner day for posting. As soon as news of the queen’s impending death hit Twitter, the platform was quickly dominated by a global outpouring of both grief and glee, a heated mixture of paeans to the queen’s 70-year tenure and angry denunciations of the British monarchy’s legacy of colonial violence and exploitation. Among the latter was Carnegie Mellon’s Uju Anya, an associate professor of second language acquisition. “I heard the chief monarch of a thieving raping genocidal empire is finally dying. May her pain be excruciating,” Anya tweeted.

“We took enforcement action on the account you referenced for violating the Twitter Rules on abusive behaviour,” Twitter spokesperson Lauren Myers-Cavanagh, using the British spelling of “behavior,” wrote to The Intercept in response to a query.

“It does highlight the power imbalances that can often exist in the way these platforms treat powerful figures.”

The removal of the post illustrates how criticisms of powerful people, however distasteful, can be disappeared from social media sites for murky reasons. “It does highlight the power imbalances that can often exist in the way these platforms treat powerful figures,” Evelyn Douek, an assistant professor at Stanford Law School and scholar of content moderation policies, told The Intercept. “Often people in power get allowances because it’s in the public interest but people don’t for criticizing them, even though that’s often clearly in the public interest too.”

Anya’s tweet immediately attracted widespread attention and criticism, not least because it was reproachfully quote-tweeted by Amazon founder Jeff Bezos. “This is someone supposedly working to make the world better?” the second-richest American tweeted. “I don’t think so. Wow.” Twitter users were quick to point out that Anya had recently tweeted approvingly of Chris Smalls, a rising labor leader instrumental in efforts to unionize Amazon warehouses.

After the criticisms came pouring in, Anya, who was born in Nigeria, tweeted in defense of her remarks: “If anyone expects me to express anything but disdain for the monarch who supervised a government that sponsored the genocide that massacred and displaced half my family and the consequences of which those alive today are still trying to overcome, you can keep wishing upon a star.” (Anya did not immediately respond to The Intercept’s request for comment.)

While the tweet was no doubt offensive to many fans of the crown in wishing suffering upon Elizabeth, the specific rule cited by Myers-Cavanagh justifying the censorship isn’t typically deployed in defense of royalty. The company claims that its ban on abusive remarks is designed to protect speech rather than delete it.

“In order to facilitate healthy dialogue on the platform, and empower individuals to express diverse opinions and beliefs, we prohibit behavior that harasses or intimidates, or is otherwise intended to shame or degrade others,” Twitter’s online help center says. “We consider abusive behavior an attempt to harass, intimidate, or silence someone else’s voice.”

Such speech is deleted to shield vulnerable voices from suppression. “On Twitter, you should feel safe expressing your unique point of view,” the policy reads. “We believe in freedom of expression and open dialogue, but that means little as an underlying philosophy if voices are silenced because people are afraid to speak up.”

It is not clear how the queen of England could ever be meaningfully “silenced” or “afraid to speak up” because of an academic’s tweet. Twitter did not respond in time for publication when asked whether the “abusive behavior” policy applies to the deceased.

The policy lays out a variety of “abusive” speech types, including “violent threats”; “content that wishes, hopes, promotes, incites, or expresses a desire for death, serious bodily harm or serious disease”; and “unwanted sexual advances.” It’s unclear which of these categories Anya’s tweet, published when its subject was on the verge of death and most likely not checking Twitter, would fall under.

The examples of abusive behavior that Twitter provides are of the more clear-cut “I hope you get cancer and die” variety, rather than an edge case hoping that someone already near death will experience greater suffering. The policy does note that in some cases offending tweets will be deleted while sparing the account from suspension, as was the case with Anya, when “regarding certain individuals credibly accused of severe violence,” an enforcement that would seem to implicitly agree with the professor’s underlying argument against the crown.

Douek, the Stanford professor, said that it seemed like an odd enforcement of the rule given the vast gulf in power between a professor and a monarch. “Unclear to me how the queen is going to be intimidated by that tweet,” she told The Intercept. “Surprised they stood by it, actually.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/09/09/twitter-censored-professors-post-for-abusive-behaviour-toward-the-queen/feed/ 0 331600
Labor Union Censored Report Criticizing Microsoft’s Military Contracts https://www.radiofree.org/2022/09/08/labor-union-censored-report-criticizing-microsofts-military-contracts/ https://www.radiofree.org/2022/09/08/labor-union-censored-report-criticizing-microsofts-military-contracts/#respond Thu, 08 Sep 2022 01:59:10 +0000 https://theintercept.com/?p=407070

Labor union officials, acting on behalf of the Communication Workers of America, blocked publication of a report critical of Microsoft’s growing and under-the-radar support for the U.S. military and intelligence agencies.

The UNI Global Union, a global federation of labor unions that counts CWA as an affiliate, had initially commissioned a report by Tech Inquiry, an investigative nonprofit led by Jack Poulson that serves as a watchdog of the tech industry. But the labor unions suddenly backtracked after a landmark neutrality deal this summer between CWA and Microsoft in which the Seattle-based tech giant pledged not to oppose efforts by workers at Microsoft subsidiary Activision seeking to form a union.

“Because Microsoft came out and did what they did, in terms of respecting workers rights to organize, we do not, we cannot be associated with this paper and its release,” a UNI official told Tech Inquiry, delivering the news.

The same UNI official explained that Microsoft’s pledge to allow the process of organizing, which could mean “thousands [of workers] are able to organize unions and win collective bargaining agreements,” had placed CWA in a tough position and that higher-level CWA officials had communicated that the report could not come out. Poulson did not want to reveal the specific union official’s identity, since it was clear he was serving as a messenger.

CWA and UNI did not immediately respond to a request for comment. The censored report, as yet unpublished, is available here.

No workers at Activision have yet obtained a formal labor union contract, but organizing efforts are currently underway at several divisions of the company. In May, quality assurance workers at Raven Software, a division of Activision, voted to join the Game Workers Alliance, a project of CWA, in a ballot that passed with 19 of 22 votes in favor. The Microsoft pledge stands in sharp contrast to other technology giants, which have viciously opposed union drives with outside consultants and creative attempts to undermine employee support for organized labor.

The neutrality agreement could not only improve the living standards of Activision workers with enhanced workplace protections and higher wages, but also serve as a vast financial windfall for CWA, which stands to potentially collect a portion of worker salaries as dues money.

The UNI Global Union, along with the Friedrich Ebert Foundation, an affiliate of the German Social Democratic Party, pledged support for the research project beginning in September 2021. Poulson, the founder of Tech Inquiry, is a former research scientist at Google who resigned from the company in protest of its secret efforts to build out a censored search engine in China. Poulson is also a contributor to The Intercept.

The labor union official offered an apology to Tech Inquiry for pressing for the completion of the investigative project, only to censor it just prior to release. “No one could have predicted Microsoft would become, seek to become a pro-union employer, like that would have been like flying pigs, you know. I never would have predicted that,” the official said.

The Tech Inquiry research paper compiled thousands of government contracts worldwide to detail the ways in which technology firms such as Microsoft, Amazon, IBM, Oracle, and Google have quietly transformed into major military contractors through lucrative cloud computing projects. Many of the contracts were concealed “through intermediaries rather than directly to the tech companies whose products are being purchased,” Poulson noted in the report.

The report found that many of the public-facing government disclosure websites fail to accurately report the level of militarized contracts with tech giants. More than 98 percent of Microsoft, Amazon, and Alphabet’s post-2018 awards from the U.S. federal government are from military, intelligence, or law enforcement contracts, the report further noted.

The union official liaison from UNI noted that the report had to be killed given its focus on Microsoft. “If we had just stuck to Amazon, it would have been much simpler,” the official added.

After releasing its neutrality agreement to CWA, Microsoft gained a new ally in its bid for regulatory approval of the merger with Activision, one of the largest gaming companies in the world. In June, Christopher Shelton, the president of CWA, sent a letter to Federal Trade Commission members, requesting that the agency not use antitrust laws to prevent Microsoft’s acquisition.

“We now support approval of the transaction before you because Microsoft has entered an agreement with CWA to ensure the workers of Activision Blizzard have a clear path to collective bargaining,” wrote Shelton.

CWA, known for its support of progressive causes, has pledged regulatory support for allied industries in the past. The union lobbied in favor of AT&T’s attempted merger with T-Mobile in 2011, for example. That acquisition was abandoned in the face of opposition from the Justice Department’s antitrust attorneys.

Jon Schweppe, director of policy and government affairs at the American Principles Project, which has called for greater antitrust scrutiny of tech giants, noted that Microsoft has been less than transparent in the past about funding third-party groups to gain allies in Washington, D.C. The company’s moves to dominate the global video gaming market, he noted, have not provoked much backlash or opposition.

Compared to Amazon and Google, Schweppe continued, Microsoft receives far less scrutiny, a dynamic he attributed to Microsoft’s subtle lobbying efforts among politicians, influential political organizations, and now unions. “Microsoft,” he added, “is incredibly effective at just making itself invisible.”


This content originally appeared on The Intercept and was authored by Lee Fang.

]]>
https://www.radiofree.org/2022/09/08/labor-union-censored-report-criticizing-microsofts-military-contracts/feed/ 0 330853
What’s the true cost of an induction stove? https://grist.org/article/whats-the-true-cost-of-an-induction-stove/ https://grist.org/article/whats-the-true-cost-of-an-induction-stove/#respond Wed, 07 Sep 2022 12:35:26 +0000 https://grist.org/?p=587651 The following transcript has been edited for clarity.

For decades, cooking with a gas stove has been seen as the fanciest and most enjoyable way to cook. But are we really better off with natural gas? Climate experts and professional chefs alike say that there is an alternative that could give gas a run for its money: induction stoves.

The secret to an induction stove is that it’s basically just a big magnet. And when a pan is sitting on the stovetop, that magnetic field creates little electric currents that swirl through the pan. This heats up the pan, but leaves everything around it cool. It also means that induction stoves can heat up food in a fraction of the time for a fraction of the energy.

But does the technology live up to its hype? Grist’s video team set out to answer two questions: How good are induction stoves for the environment? And how affordable are they for the average person?

Each day, an average home cook using a gas stove produces about 0.95 pounds of carbon dioxide. Induction stoves, on the other hand, use electricity. And to figure out the carbon emissions of using an electric induction stove, we have to look at the grid. 

Right now, the United States’ electric grid is powered by a mix of renewables, nuclear, and fossil fuels like coal, natural gas, and some petroleum. When you add it all up, an average home cook would produce about 0.96 pounds of carbon dioxide every day by using an electric induction stove. That means right now, an electric induction stove and a gas stove produce about the same amount of CO2.

But those emissions could vary a lot depending on where your state or region gets its power. For example, an induction stove in renewable-heavy Vermont would be a lot cleaner than one in coal-filled West Virginia. As our grid transitions away from coal and toward renewables, induction and electric cooking is only going to get cleaner.

There are other concerns with natural gas, too. With  natural gas stoves, that gas has to be piped into homes, and all of that natural gas infrastructure is notoriously leaky

Electrifying your stove now is kind of like making a bet: You’re hoping that the grid is going to get a lot cleaner over the next few decades. And you’re also helping to move away from gas infrastructure entirely by disconnecting your home from natural gas. All this means there are climate benefits to switching to induction, but right now those benefits are fairly small.

What about the financial cost? Based on an informal survey of the Lowe’s website, it’s clear that induction stoves are generally more expensive. For example, entry-level induction stoves are priced just over $1,000. Gas stoves, on the other hand, begin at just over $400. 

Experts that we spoke to said this is mostly because of the industry’s scale. Induction stoves have only been commercially available in the U.S. for a few decades. The industry is pretty new and small, and prices should come down once the technology is more popular. 

The passage of the 2022 Inflation Reduction Act could speed this up. Under the act, low-income households can get an electric or electric induction stove fully reimbursed, up to $840. Middle-income households can get half the price of the stove reimbursed. Still, individual states have to set up and apply for funding, so this process will take some time.

At the moment, it costs about the same amount to run an electric stove or a gas stove. Depending on energy prices in your area in a few states, an induction stove could save you around $20 a year or cost you around $20 a year. But mostly you’re only looking at the difference of a few bucks

Finally, if you go for an induction stove, you also might need new cookware. In order for your pots and pans to heat up, they have to contain some kind of iron compound — essentially, they have to be magnetic. So while cast iron and stainless steel pots are generally fine, aluminum or copper pots might not work as well. Basically, if a magnet sticks to the bottom of your pan, you’re in good shape.

But there’s one final comparison to make that actually seems pretty important: gas stoves are actually terrible for people’s health. When your gas stove is on, it lets off toxic chemicals like nitrogen dioxide. Outside air pollution laws require that this chemical stay below around 100 parts per billion, but inside a gas stove or oven can easily cause nitrogen dioxide levels of up to 300 parts per billion. That’s three times as high as what would be legal outside. 

And even brief exposure can cause breathing problems and asthma attacks in some people. One team of researchers looked at dozens of studies on the health impacts of gas stoves. They found that a child living in a home with a gas stove was 42 percent more likely to have asthma. That’s about the same risk as living in a house with a smoker. If you do decide to keep your gas stove, it’s probably worth upgrading your ventilation system. That can be expensive, but it could be really important for your family’s health. 

Emissions from cooking overall are relatively small compared to things like transportation, travel, or home heating. If you want to limit your carbon footprint, buying an induction stove is probably not the best bang for your buck. Something like getting an electric bike, an electric vehicle, or switching your home heating system over from fossil fuels to heat pumps might go a little bit further.

But if you love to cook and want to limit your future carbon emissions, then an induction stove could be a pretty good fit for you, especially if it means you can get rid of a gas line going to your house altogether.

This story was originally published by Grist with the headline What’s the true cost of an induction stove? on Sep 7, 2022.


This content originally appeared on Grist and was authored by Shannon Osaka.

]]>
https://grist.org/article/whats-the-true-cost-of-an-induction-stove/feed/ 0 330641
Facebook Engineers: We Have No Idea Where We Keep All Your Personal Data https://www.radiofree.org/2022/09/07/facebook-engineers-we-have-no-idea-where-we-keep-all-your-personal-data/ https://www.radiofree.org/2022/09/07/facebook-engineers-we-have-no-idea-where-we-keep-all-your-personal-data/#respond Wed, 07 Sep 2022 11:00:49 +0000 https://theintercept.com/?p=406554

In March, two veteran Facebook engineers found themselves grilled about the company’s sprawling data collection operations in a hearing for the ongoing lawsuit over the mishandling of private user information stemming from the Cambridge Analytica scandal.

The hearing, a transcript of which was recently unsealed, was aimed at resolving one crucial issue: What information, precisely, does Facebook store about us, and where is it? The engineers’ response will come as little relief to those concerned with the company’s stewardship of billions of digitized lives: They don’t know.

The admissions occurred during a hearing with special master Daniel Garrie, a court-appointed subject-matter expert tasked with resolving a disclosure impasse. Garrie was attempting to get the company to provide an exhaustive, definitive accounting of where personal data might be stored in some 55 Facebook subsystems. Both veteran Facebook engineers, with according to LinkedIn two decades of experience between them, struggled to even venture what may be stored in Facebook’s subsystems. “I’m just trying to understand at the most basic level from this list what we’re looking at,” Garrie asked.

“I don’t believe there’s a single person that exists who could answer that question,” replied Eugene Zarashaw, a Facebook engineering director. “It would take a significant team effort to even be able to answer that question.” (Facebook did not respond to a request for comment.)

When asked about how Facebook might track down every bit of data associated with a given user account, Zarashaw was stumped again: “It would take multiple teams on the ad side to track down exactly the — where the data flows. I would be surprised if there’s even a single person that can answer that narrow question conclusively.”

The dispute over where Facebook stores data arose when, as part of the litigation, now in its fourth year, the court ordered Facebook to turn over information it had collected about the suit’s plaintiffs. The company complied but provided data consisting mostly of material that any user could obtain through the company’s publicly accessible “Download Your Information” tool.

Facebook contended that any data not included in this set was outside the scope of the lawsuit, ignoring the vast quantities of information the company generates through inferences, outside partnerships, and other nonpublic analysis of our habits — parts of the social media site’s inner workings that are obscure to consumers. Briefly, what we think of as “Facebook” is in fact a composite of specialized programs that work together when we upload videos, share photos, or get targeted with advertising. The social network wanted to keep data storage in those nonconsumer parts of Facebook out of court.

In 2020, the judge disagreed with the company’s contention, ruling that Facebook’s initial disclosure had indeed been too sparse and that the company must reveal data obtained through its oceanic ability to surveil people across the internet and make monetizable predictions about their next moves.

Facebook’s stonewalling has been revealing on its own, providing variations on the same theme: It has amassed so much data on so many billions of people and organized it so confusingly that full transparency is impossible on a technical level. In the March 2022 hearing, Zarashaw and Steven Elia, a software engineering manager, described Facebook as a data-processing apparatus so complex that it defies understanding from within. The hearing amounted to two high-ranking engineers at one of the most powerful and resource-flush engineering outfits in history describing their product as an unknowable machine.

The special master at times seemed in disbelief, as when he questioned the engineers over whether any documentation existed for a particular Facebook subsystem. “Someone must have a diagram that says this is where this data is stored,” he said, according to the transcript. Zarashaw responded: “We have a somewhat strange engineering culture compared to most where we don’t generate a lot of artifacts during the engineering process. Effectively the code is its own design document often.” He quickly added, “For what it’s worth, this is terrifying to me when I first joined as well.”

The remarks in the hearing echo those found in an internal document leaked to Motherboard earlier this year detailing how the internal engineering dysfunction at Meta, which owns Facebook and Instagram, makes compliance with data privacy laws an impossibility. “We do not have an adequate level of control and explainability over how our systems use data, and thus we can’t confidently make controlled policy changes or external commitments such as ‘we will not use X data for Y purpose,’” the 2021 document read.

The fundamental problem, according to the engineers in the hearing, is that Facebook’s sprawl has made it impossible to know what it consists of anymore; the company never bothered to cultivate institutional knowledge of how each of these component systems works, what they do, or who’s using them. There is no documentation of what happens to your data once it’s uploaded, because that’s just never been something the company does, the two explained. “It is rare for there to exist artifacts and diagrams on how those systems are then used and what data actually flows through them,” explained Zarashaw.

“It is rare for there to exist artifacts and diagrams on how those systems are then used and what data actually flows through them.”

Facebook’s inability to comprehend its own functioning took the hearing up to the edge of the metaphysical. At one point, the court-appointed special master noted that the “Download Your Information” file provided to the suit’s plaintiffs must not have included everything the company had stored on those individuals because it appears to have no idea what it truly stores on anyone. Can it be that Facebook’s designated tool for comprehensively downloading your information might not actually download all your information? This, again, is outside the boundaries of knowledge.

“The solution to this is unfortunately exactly the work that was done to create the DYI file itself,” noted Zarashaw. “And the thing I struggle with here is in order to find gaps in what may not be in DYI file, you would by definition need to do even more work than was done to generate the DYI files in the first place.”

The systemic fogginess of Facebook’s data storage made answering even the most basic question futile. At another point, the special master asked how one could find out which systems actually contain user data that was created through machine inference.

“I don’t know,” answered Zarashaw. “It’s a rather difficult conundrum.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/09/07/facebook-engineers-we-have-no-idea-where-we-keep-all-your-personal-data/feed/ 0 330627
He Felt Isolated and Adrift After an Autism Diagnosis. Can He Make It as a Cybersleuth? https://www.radiofree.org/2022/09/07/he-felt-isolated-and-adrift-after-an-autism-diagnosis-can-he-make-it-as-a-cybersleuth/ https://www.radiofree.org/2022/09/07/he-felt-isolated-and-adrift-after-an-autism-diagnosis-can-he-make-it-as-a-cybersleuth/#respond Wed, 07 Sep 2022 09:00:00 +0000 https://www.propublica.org/article/autistic-adults-train-for-cybersecurity-jobs#1414054 by Renee Dudley

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Thomas van Ruitenbeek’s life fell apart in 2012, when a psychotic episode and a diagnosis of autism derailed his pursuit of a digital communication degree at a university in Utrecht, the Netherlands. For the better part of a year, the 25-year-old wouldn’t respond when spoken to, his father said, and his blue, wide-set eyes revealed little cognition. He rarely left his parents’ duplex and filled his time studying daily newspapers, convinced they contained secret messages. Sometimes, he worked up the energy to paint miniature figurines from the medieval fantasy-themed board game Warhammer. Mostly, he did nothing.

The psychotic episode and the autism diagnosis locked him into a state of isolation that had been deepening since his childhood, solidifying his long-held belief that he was an outsider. Van Ruitenbeek’s parents took him to appointments with doctors and therapists. When he grew strong enough, they supported his return to work. He did simple tasks — mostly cutting and packaging yarn — at a job he obtained through the local mental health department. That was a far cry from his earlier aspirations of being a video game designer and hardly the life his parents had hoped he would have. They worried about what would happen when they grew old and could no longer look after him.

Then, during a meeting with his coach at the mental health department in 2013, van Ruitenbeek and his parents got an unexpected bit of hope. A short distance away, a first-time entrepreneur named Peter van Hofweegen and his business partner were figuring out how to launch an education and job placement program geared toward autistic young adults who were interested in computers.

The number of people diagnosed with autism is hard to ascertain, but the statistics that are available suggest it’s on the rise. An estimated 100,000 autistic Americans turn 18 every year, according to Drexel University’s Autism Institute, and a growing number of programs in the U.S. and elsewhere aim to employ tech-savvy autistic people.

But van Hofweegen’s program was something different. He and his partner sought primarily to recruit socially isolated, seemingly unemployable dropouts who almost certainly would be passed over even by employers who welcome candidates with neurological differences like autism. They wanted people who couldn’t make it on their own and had been “sitting for years in their parents’ homes,” van Hofweegen said. The number of students in his program would be small, but the stakes were large. If they could be doing meaningful, sophisticated work, what kind of a model might that provide for the uncounted numbers of people with autism around the world seemingly sentenced to constricted, unproductive lives.

The untested model drew skepticism even from other autism advocates, who viewed it as well-intentioned but overly idealistic. But van Ruitenbeek’s coach, Anita de Winter, saw it as a godsend. She had worked with hundreds of autistic adults who struggled to find meaningful work and become independent. De Winter described the program to van Ruitenbeek without betraying her enthusiasm. She didn’t want him to be disappointed if it didn’t work out.

“This might be for someone like you,” she told him.

Van Hofweegen’s path to autism advocacy traces back to 1996, when his first child was born. The boy, named Thijs, sustained an injury during birth and was diagnosed with cerebral palsy. Doctors told van Hofweegen and his then-wife that Thijs might never walk or talk. But with the help of specialists, he learned to both move and speak.

Peter van Hofweegen’s son Thijs (Courtesy of Mathilde Dusol)

Thijs went far beyond that. After proclaiming a desire to learn how to swim at age 5, and taking seven years to pass his basic swimming test, Thijs persisted through intermediate and advanced levels alongside much younger classmates. When he swam the 50-meter freestyle test to pass the advanced level, he earned a standing ovation from the other students’ parents. Van Hofweegen never forgot that moment. (He continued to ponder it even as Thijs developed into a competitive swimmer and won a silver medal in the men’s 400-meter freestyle at the Paralympic Games in 2016.) It showed what a person could accomplish with the right support and accommodations.

While helping out at an event in 2012 for people struggling with unemployment, van Hofweegen met Frans de Bie, an IT guru and fellow volunteer. A year earlier, de Bie had sold his 40-person tech company. Like van Hofweegen, de Bie drew inspiration from his personal life. He had grown up alongside foster siblings, and he understood the transformative power of a supportive environment. He also was motivated by his son and daughter, who have dyslexia.

The new friends hit upon an idea. Van Hofweegen had read a survey saying 20,000 Dutch people were not participating in the workforce because of their autism. Perhaps they could start an organization that would help autistic people interested in technology to find work. After more than 25 years in management roles at hotels and at a temporary-job placement agency, van Hofweegen quit his job. A short time later, in late 2013, he and de Bie incorporated an organization they called ITvitae.

Van Hofweegen, left, with Frans de Bie (Thana Faroq for ProPublica)

The Dutch have a saying: “God created the earth, but the Dutch created the Netherlands.” That’s because for centuries, the country’s citizens reclaimed land from the North Sea using their iconic system of dikes, canals and windmills. About a third of the country’s fertile land is below sea level. The Netherlands, half the size of South Carolina, remains among the world’s leading economies in part because its people have maximized its geographical resources.

And so it was culturally ingrained in van Hofweegen and de Bie to maximize the country’s human resources. Partly because de Bie was familiar with the unmet demand for IT jobs in the Netherlands, a gap currently estimated at 100,000, and because the country has a robust tech sector, the co-founders wanted to focus on that area.

The two men saw ITvitae — the name is an amalgam of “information technology” and “curriculum vitae,” which they pronounce ee-tay-vee-tay — as a way to fill tech-sector jobs and strengthen the Dutch economy as much as they considered it a social enterprise to lift up autistic people who felt excluded from the job market.

Common traits found in autistic people often prevent them from being hired or even applying to jobs in the first place. They may struggle to interpret social cues, pause frequently when speaking, exhibit disruptive eccentricities or avoid eye contact. Yet employers have found that other characteristics make them excellent employees. They tend to be thorough and fastidious, have the ability to go deep on specific topics and focus for prolonged periods of time. Those traits lend themselves to careers in technology and cybersecurity, among many other fields.

Van Hofweegen and de Bie envisioned a six-month course focused on preparing students to be software testers — a natural fit for autistic people, who tend to be methodical rule-followers. As the students embarked on coursework, van Hofweegen would find employers by cold-calling IT and software companies as well as by tapping the connections of his board members.

The co-founders believed ITvitae could generate revenue primarily by charging employers a recruiting fee for each hire. De Bie believed employers would be willing to pay because the amount he proposed was less than the typical cost of specialized, third-party technical training for new or existing employees.

The first challenge was finding students. After winding their way through various government agencies, van Hofweegen and de Bie found de Winter, who worked near where they lived. “Do you know these types of people?” van Hofweegen asked her in 2013 after laying out the vision for ITvitae. She replied, “How many do you want?”

As the co-founders prepared to interview about 30 candidates for 11 slots, de Winter explained the potential pitfalls. Autistic people tend to process language literally, she told them, and might be unable to respond to classic prompts. The question “what do you hope to get from your time at ITvitae?” might elicit a blank stare. That’s because, to an autistic person, there’s no basis for what the outcomes of the new program might be. Alternatively, the list of answers could be endless and paralyzing. They needed something concrete and technical to discuss. So de Bie concocted a simple tool that would serve as a discussion topic and gauge applicants’ computer interest: He asked the candidates to draw maps of their home computer networks and be prepared to describe them.

Van Hofweegen and de Bie were full of enthusiasm. But, as they continued to talk with de Winter, they realized how much they still had to learn about the very people they wanted to help. They were, perhaps, in over their heads.

For as long as he could remember, van Ruitenbeek knew he was different but felt that he couldn’t let other people know that. It was as if he were “living undercover,” he said. He was constantly afraid that asking the wrong question would cause him to be bullied, so he never asked questions. While his twin sister played with other children, he withdrew to solitary activities, learning to design his own websites on topics ranging from outer space to dinosaurs. But his life took a darker turn after his psychotic episode in Utrecht.

Van Ruitenbeek had planned to spend the summer day catching up on coursework when suddenly he began to feel that he was outside his own body. His vision narrowed and his mind compelled him to follow what he believed were secret hand signals made by strangers, which eventually directed him to a bar to order a draft Heineken. He then lurched outside the bar in a stupor. Van Ruitenbeek rambled in halting, slurred speech when his sister and father reached him by phone. Frantic with worry, Henk van Ruitenbeek drove through Utrecht and eventually found his son standing on a sidewalk, staring vacantly. He got him in the car and took him home.

In the aftermath, with a new diagnosis of autism, van Ruitenbeek believed his life was over. He had thought it was not rational or even possible to set goals for himself. Then de Winter mentioned ITvitae, and he knew he badly wanted a slot there. The ITvitae interview, he later said, was “like a ticket out of my situation.” More nervous than he had ever been, he told himself: “I have to make it. I have to do my best.”

The interview, which took place in late 2013, was difficult for everyone. Although van Hofweegen and de Bie were pleasant and upbeat, van Ruitenbeek felt he was in “hostile territory.” Then again, everything beyond his parents’ home seemed that way at the time. He stuttered severely when describing his recovery from psychosis, and it took him an uncomfortably long time to utter a single sentence. He was visibly perspiring. “This isn’t working,” de Bie thought.

When de Bie pivoted to the network drawing and other technical questions, the interview shifted. Van Ruitenbeek stuttered less. De Bie, impressed by his remarks about website design, decided before the interview ended that van Ruitenbeek should have a space at ITvitae.

De Bie thought it was obvious that van Ruitenbeek — and most of the other candidates — had raw computer talent. Van Hofweegen welled with tears. “What are these wonderful people doing at home?” he wondered.

Advocates for people with autism in the United States often ask the same question. Parents of autistic teenagers describe the “cliff” of high school or college graduation, marked by the struggle to navigate the transition from years of special education and support to independent working life. Firm data is hard to come by, but some estimates suggest millions of autistic American adults are unemployed or underemployed. Of those who find work, most are in low-wage and part-time jobs, according to Drexel’s Autism Institute.

At the same time, demand for workers with technical skills has far outpaced supply. In the cybersecurity field alone, the U.S. faces a shortfall of more than 225,000 workers, according to CyberSeek, an organization that provides job market data. The number of available tech-related jobs in the U.S. nearly doubled from 2020 to 2021, analytics company Datapeople reported.

Over the past decade, a variety of opportunities for austistic adults in the U.S. — ranging from technical training and job placement programs in various cities, to targeted hiring and retention efforts at large employers — have aimed to bridge the tech workforce gap. But the results so far have been modest, said Michael Bernick, a San Francisco-based attorney who has written two books on employment strategies for the neurodiverse.

That’s partly because many initiatives expect job candidates to have higher education, credentials and the ability to work with minimal support, said Bernick, who was director of the California labor department from 1999 to 2004. “They are looking for people who have significant tech skills,” he said. “Of that group, not all are college graduates, but they’re also not the long-term unemployed, sitting in their parents’ basements.” Someone like van Ruitenbeek wouldn’t have stood a chance.

One widely publicized initiative is the Neurodiversity @ Work Employer Roundtable, a collection of about four dozen private employers — including Microsoft, SAP, Google and more — that foster neurodiversity hiring programs. Participating companies offer screening and interview processes to accommodate autistic candidates; about 1,200 neurodiverse candidates have gotten jobs with Roundtable employers over the past decade, said Neil Barnett of Microsoft, a leader of the group. Barnett, who has discussed the initiative with Bernick, hopes that Roundtable employers will continue to expand their hiring of neurodiverse candidates with a variety of skills, including outside of tech.

Autistic adults who are interested in computers represent just a sliver of autistic job seekers, according to the national advocacy organization Autism Speaks; Bernick puts the figure around 10% to 15%. Due in part to prominent figures such as Elon Musk, who has said he has Asperger’s syndrome, which is now considered a type of autism spectrum disorder, and pop culture caricatures of socially awkward workers in Silicon Valley, the notion that autistic people inherently possess extraordinary tech competencies has become a cliché. Bernick said he once had hopes of a tech career for his own autistic son. But his son had neither uncommon skills nor a deep interest in computers.

While the 10% to 15% estimated by Bernick may seem like a small slice relative to popular perception, efforts to employ that group are nonetheless important, especially given the dramatic need in the tech sector, advocates and researchers said. Bernick said programs in the U.S. should expand their efforts to find autistic job seekers who have computer capabilities but lack the credentials — precisely the types of people van Hofweegen and de Bie recruited for their inaugural class.

In February 2014, after a six-month stint cutting yarn, van Ruitenbeek rode his bicycle to ITvitae’s space for the first day of class. He was nervous. In social settings, he always felt as though he were “from another planet,” he said. Here, though, he was surrounded by people who felt the same way.

Shortly after their arrival, de Bie assigned the students to assemble the furniture they would be using. When he returned several hours later, he found they had put it together flawlessly. He asked how everyone was getting along and discovered that none of the students had bothered with introductions. De Bie was surprised and amused; he was still learning how autistic people function.

Van Ruitenbeek and other students in ITvitae’s first class assemble furniture. (Courtesy of Frans de Bie)

Van Hofweegen and de Bie, who refused to use the word “disability,” told the students they had “different operating systems” than the neurotypical people they grew up with. It helped to reassure them that they belonged in the classroom, and eventually the workplace, as they all began to “learn how to learn again” following what for some was years away from school, van Hofweegen said. De Bie eased the students into a school setting by leading a training on basic Microsoft programming, networking and security. That was followed by a 40-day course on software testing offered by an organization that issues certifications for technical specialties in the Netherlands.

After only a short time, van Ruitenbeek said he began to feel “at home for the first time in my life.” He enjoyed his coursework and excelled at it. He gradually began interacting with other students as he felt more at ease and less afraid of making social mistakes. When he grumbled about commuting by bike, a classmate offered to drive him to and from ITvitae. Van Ruitenbeek gladly accepted.

Yet, for all his progress, van Ruitenbeek continued to face obstacles. Conversation remained difficult due to his stutter, and he lacked the energy to work the 32-hour week that most employers expected of ITvitae’s graduates. Sometimes his father worried it was all too much for him. He was one of three students for whom van Hofweegen struggled to find a job.

When the coursework drew to a close, the students took a formal exam to be certified in software testing. Van Ruitenbeek breezed through the questions, except for one that confounded him: None of the multiple choice answers were technically correct. So he selected the answer that he suspected the test-maker wanted. He picked correctly and scored 100%. “It was my first achievement,” van Ruitenbeek said. “I could do something.”

A short time later, a director from the testing company visited ITvitae and van Hofweegen told him that a student had spotted a mistake in the exam. Van Hofweegen, who has an uncanny ability to sense an opportunity and pounce, suggested that van Ruitenbeek could be a test reviewer. The company invited him to join a small group of volunteers who look over exams for accuracy and clarity. Van Ruitenbeek readily agreed. To prepare, he plowed through a textbook on ethical hacking.

The work led him to his next self-discovery: Ethical hacking was fun. Once unable to set goals for the future, van Ruitenbeek now dreamed of a career in cybersecurity. He would hunt for hidden vulnerabilities in software and networks, and prevent them from falling prey to malicious hackers.

Following the success of their first class, van Hofweegen and de Bie recruited another class, then another, each with a maximum of 14 students. After the first year, with steady revenue generated mainly from fees paid by employers, the co-founders began taking salaries, and they hired additional staff. ITvitae’s mission spread to autistic job seekers and their supporters across the Netherlands.

As the organization grew, van Hofweegen and de Bie relocated ITvitae to a floor in a former monastery, which had been converted into offices. The founders thought its tree-shaded walking paths and seclusion would impart a serenity that the students needed. The organization also began offering new courses in software development, data science and cybersecurity, all specialties in high demand. Students delighted in being able to focus exclusively on topics that fascinated them, a luxury — for many of the students, a necessity — that traditional educational settings couldn’t provide.

Certain similarities emerged among ITvitae’s students. Before joining, nearly half had been sitting at home, unemployed and socially isolated, for longer than two years. Many passed the time playing video games and lost track of whether it was day or night. They told van Hofweegen and de Bie they felt worthless and never fit in; many reported having been bullied and struggling through periods of depression.

ITvitae turned away about two-thirds of applicants, most frequently because of untreated mental health issues. Other candidates simply weren’t ready. One 2022 applicant said he hadn’t left his home for 10 years and spent most of his time gaming. “It was such a big thing for him to be here” for the interview, de Bie said. “But then traveling regularly, studying in a group, doing exams — that would have been too heavy for him. I had to tell him it’s not the right time.”

Male students at ITvitae outnumber female students 10 to 1, both because autism is more prevalent in men and more likely to go undiagnosed or misdiagnosed in women. Many experience sensory challenges, such as headaches if the light is too bright or if there’s too much noise. One student was distracted by the sound of blinking eyelashes. Most struggle to varying degrees with communication.

To help both prospective employers and job candidates work through the inevitable miscommunications, ITvitae staff members accompanied students to job interviews. Saskia Meeuwessen, who was hired as the CEO of ITvitae as it expanded, recalled joining a student at an interview for a cybersecurity job with the Dutch National Police. The interviewer asked the candidate to introduce himself. The student froze: It wasn’t a question he had practiced. Nonetheless, he was later invited for a second meeting with an interviewer who was more experienced in interacting with autistic people.

That interviewer sat down and, with no social niceties, asked, “When I type www.google.nl, what happens?” Meeuwessen thought to herself, “Well, Google shows up, what a silly question.” But the candidate had a completely different reaction, launching into nuanced details about internet servers and connections. For 90 minutes, Meeuwessen “sat there, listening to stuff that I really didn’t understand,” she said. The candidate was hired on the spot.

Thanks in part to its gradually sloped coastline, the Netherlands is a popular landing spot for the underwater fiber optic cables connecting the United States and Europe. Fast, reliable and inexpensive internet connectivity has fostered a flourishing tech sector. But that connectivity has negative consequences, too. Hackers who can’t rely on the fragile internet connections in their home countries use servers in the Netherlands to commit crimes.

To counter these hackers, the Dutch National Police established an elite force called the High Tech Crime Unit, or HTCU. The unit has become renowned both for its success disrupting the operations of cyberattackers and for its innovative culture, which for years has included hiring unconventional candidates, including those with autism.

In 2017, at van Hofweegen’s urging, the HTCU brought on a graduate from ITvitae. He proved to be an open-source intelligence wizard. Another graduate followed. Then the floodgates opened, and about 30 ITvitae graduates were eventually hired to jobs in regional police squads, where they handle data analysis, digital forensics and other technical specialties.

The National Police’s embrace of a neurodiverse workforce extended beyond its partnership with ITvitae. Its most renowned hiring initiative for autistic employees began with a 2016 murder case.

A 50-year-old Turkish man had been shot more than 30 times in the Dutch city of Leiden and died two days later. The National Police collected surveillance camera footage and quickly identified the suspects. Their work also seemed to link the murder to a number of cold cases in Amsterdam. The National Police took over those investigations, inheriting 1,700 hours of camera footage. Watching the tapes was a marathon of drudgery that none of the National Police detectives wanted to take on.

One National Police detective, Jory de Groot, happened upon an idea. De Groot, who has a foster brother with Down syndrome, volunteered with a group that organized trips for young adults with disabilities. On a weekend shortly after the murder, she led a group of people with autism. De Groot, then 26, described her job to one participant on the trip and mentioned the painstaking work of watching security footage. Some autistic people excel at recognizing small details, the woman told de Groot. They might love the very task that neurotypical detectives loathe.

De Groot then contracted four people from AutiTalent, a Dutch job placement organization for autistic people. She prepared her colleagues, advising them against asking typical get-to-know-you questions, and set up a radio-free office in a quiet corner of their building.

When the autistic contractors arrived, the National Police detectives tested their abilities by having them watch the footage collected in the Leiden murder. The detectives had already watched the tapes, which included the days leading up to the shooting, and knew precisely when the suspects would be seen on the day of the shooting.

Before long, one of the contractors spotted a suspect on the tape — but not when the detectives expected. The contractor found the suspect casing the crime scene the day before the attack. The detectives had missed it. “It was really important evidence that we overlooked,” de Groot said. Eventually, the two suspects were convicted in the Leiden murder.

As word of the feat reverberated through the National Police, requests for more AutiTalent contractors flooded in. Eventually, 50 autistic people were working as “camera footage specialists,” a newly created role, across the National Police. De Groot’s original team grew to six people, who increasingly talked with one another and with their police colleagues as they became more comfortable. The contractors joined detectives from the start of investigations, rather than stepping in after they were already in progress, and took part in briefings. Additional contractors from AutiTalent became “audio specialists,” who transcribed interrogations and wiretaps.

Jory de Groot, second from right, with her team of camera specialists (Courtesy of Jory de Groot)

The high profile of the contractors led some members of the National Police force to speak out about their own autism, which they’d previously hidden. The outpouring prompted de Groot to work with those employees and an advocacy organization to establish an “Autism Embassy” at the National Police. Now about a dozen workplace “ambassadors” — employees with autism who volunteer for the role — offer an ear and advice to both autistic colleagues and their managers.

The National Police’s embrace of autistic contractors has been partially driven by government-proposed targets, accompanied by subsidies, for industry and government to hire 125,000 people who have difficulty finding work because of a disability. That sort of government-centric approach is unlikely to occur in the U.S. Still, law enforcement agencies in the U.S. could draw lessons from the Dutch experiment, said Michael Bernick, the attorney who has focused on employment strategies for autistic people.

Amid ITvitae’s successes, van Ruitenbeek was still floundering. He had enjoyed his time as a volunteer test reviewer in 2014, but it didn’t lead to a job. A subsequent internship with a computer security consultancy also didn’t land him permanent employment. Yet another internship, with an organization that maintained supercomputers, failed when he experienced a psychotic episode in late 2016.

It happened when van Ruitenbeek was commuting to the company’s Amsterdam office by train. He knew public transportation was a stressor for him, but he thought he could push through it. He couldn’t. That day, he believed everyone on the train was talking about him. He didn’t fully lose control, as he had in Utrecht. Still, he realized he couldn’t continue to commute and work normally with the organization any longer. He quit.

It had been more than two years since his ITvitae graduation, and van Ruitenbeek was again feeling hopeless. He mostly stayed at his parents’ home, where he tinkered with developing his own video game. He sometimes rode his bike to ITvitae’s offices — “just as a place to go,” he said — where he read books on cybersecurity and tried to ground himself.

Van Ruitenbeek happened to be at ITvitae one day in late 2017 when Pim Takkenberg, then a director at the Dutch cybersecurity firm Northwave and a former leader of the National Police’s High Tech Crime Unit, was there. Earlier that year, Takkenberg had overseen the development of a training program for ITvitae’s cybersecurity students. During the visit, van Hofweegen, ever scouting, made a request: “Pim, I have a person here, who is extremely vulnerable but extremely brilliant. I want you to talk to him.”

After a brief chat, Takkenberg agreed to give van Ruitenbeek a “hack test” to assess his aptitude for penetration testing. The prospect alone was enough to help van Ruitenbeek regain some hope. A few months later, on exam day, Takkenberg instructed him to find vulnerabilities in a piece of software, which hackers could exploit to attack the hypothetical client. Takkenberg jokingly warned him not to cheat. Van Ruitenbeek took him literally, assuming he meant not to research anything on the internet. In reality, using the internet would have been allowed, even expected.

Van Ruitenbeek found the main vulnerabilities. Takkenberg was impressed but remained skeptical. Van Ruitenbeek still had trouble with conversation, and he was able to work only three days a week. Addressing the doubts, van Hofweegen said: “You want a problem solved. He communicates better with computers than with people. In a technical world, it’s not so bad.”

Takkenberg offered him a trial six-month internship. But he needed someone who could work 40 hours a week. They found a compromise. Van Ruitenbeek would start with three days a week, then gradually increase to five days. Northwave also allowed van Ruitenbeek to work from home occasionally, a major concession before the pandemic. He went on a special diet and began exercising to improve his health and boost his energy. He was determined to have a permanent place at Northwave, where he might finally gain the independence and fulfillment he’d long chased.

Over their nearly nine years together as business partners, van Hofweegen and de Bie proved there was space in the labor market for people who had been overlooked by employers and who previously thought themselves to be shut out of the workforce. Since 2014, ITvitae has graduated and placed nearly 500 students in technical jobs spanning sectors from agriculture to chip manufacturing to law enforcement. Bernick called that total “striking” and said, “We don’t have any company in the United States that comes near that number, even over a 10-year period.”

De Bie’s early assessment that employers would be willing to pay a fee to hire ITvitae’s graduates proved to be right. It costs the equivalent of $30,000 to educate, coach and find employment for each student. About a third of that is generated from tuition while the remainder comes from the employer.

As ITvitae’s Meeuwessen points out, autism doesn’t end when students gain employment. That’s why the organization provides regular coaching to help graduates navigate changes — anything from a new manager to a schedule shift — they perceive as disruptive and unsettling. “As soon as something happens, they start to doubt. If there’s doubt, they get unstable and that’s bad,” Meeuwessen said. “Most are doing just fine after many years, but it’s a process.”

For all the success, there have been setbacks. Even with coaching, some students struggle. ITvitae occasionally hears from an employer that a former student has stopped showing up to work and hasn’t responded to messages, sometimes for weeks. “We go to their houses,” van Hofweegen said. “We knock on the door. We call the parents. And we still can’t make them understand why they need to communicate with their employers.”

A few times, the problems have been far more dire than an inability to show up at work. De Bie keeps a photo on his desk of a talented software programmer who specialized in a language called C#. After his graduation, he was hired by a prestigious global corporation. His coach regularly checked in, and, by all appearances, his first few months at the company were successful. Then came word that the student had taken his life, one of three graduates to die by suicide. Even before graduating, the programmer had obtained an illegal drug from China with the intention of overdosing. He waited to take it. He wanted to finish his education and get a job to prove that he was capable of success. “For him, that was enough,” van Hofweegen said.

When van Ruitenbeek started at Northwave in 2018, being in an office with other people scared him. Takkenberg knew that van Ruitenbeek wouldn’t be comfortable speaking to clients or even colleagues right away and tried to smooth the transition. He and his team organized roles that accommodated van Ruitenbeek and other ITvitae graduates “in doing the things they’re good at and not doing the stuff they really hate to do.” So, after van Ruitenbeek rooted out the vulnerabilities in a network, another colleague would meet with the client to explain the findings. Through a government program for people who need work accommodations, de Winter helped van Ruitenbeek borrow a car so he could avoid the stress of public transportation.

Van Ruitenbeek found an accepting culture at Northwave. He began to confide in colleagues, who looked after him. As van Ruitenbeek’s trust in them grew, he started asking questions and giving more than yes and no answers. He successfully pursued a notoriously difficult, globally recognized certification for his line of work, which Takkenberg said was a “big sign” that the intern’s abilities were exceptional. Once the internship ended, Takkenberg gave him a permanent job sniffing out gaps in software that could make it vulnerable to being penetrated by malicious hackers. “He is one of the best pen-testers we have,” Takkenberg said. “Because of his talent to focus and stay focused, he always will find the small details.”

Van Ruitenbeek in Northwave’s offices (Thana Faroq for ProPublica)

Shortly after van Ruitenbeek started in his permanent position, he and Takkenberg discussed his goals for his first year. They decided van Ruitenbeek should find a CVE, short for common vulnerabilities and exposures, security flaws in software that are formally and publicly cataloged. Takkenberg was ecstatic when, by the midyear check-in, van Ruitenbeek had uncovered six. “OK, that goal is done,” Takkenberg said. “For the rest of the year, let’s focus on your social skills.”

A short time later, van Ruitenbeek attended a company golf outing. Takkenberg, who retains the rough-around-the-edges demeanor of an ex-cop, joked that van Ruitenbeek would probably excel despite never having played. “We know you read eight books in a month for fun, Thomas,” he teased. “So you probably read a book about how to golf to prepare for this.” Van Ruitenbeek was able to recognize that Takkenberg was joking, something he’s sure would have eluded him in the past. It was a revelation.

Then, during a weekend retreat with his team, van Ruitenbeek carted along some records and a record player. Music had long been a passion that allowed him to express himself when he lacked the words to do so. One evening, he worked up the courage to play records for about 15 of his colleagues. The airy, electronic music helped everyone relax. Word of his talent spread, and the next day, he found himself DJing a barbecue for Northwave’s entire cyber unit, more than 50 people.

Takkenberg decided to splurge on a DJ booth for Northwave. He dubbed van Ruitenbeek the company’s official DJ and assigned him to play music at its Friday afternoon happy hours. Van Ruitenbeek became the center of Northwave’s social gatherings.

Watch video ➜

When COVID-19 hit, van Ruitenbeek found himself longing for the company of colleagues. “I mostly miss the casual chats,” he said of the days that he works from home, about half his schedule these days. “That is the biggest change of my life since Northwave,” he said. “Social development. Now I am outgoing.”

Van Ruitenbeek has started mentoring a new autistic employee. He also began working with Northwave’s sales team to write proposals and even meet with clients. That’s not to say there aren’t challenges. But now, when the workload feels too heavy, or he senses he’s becoming over-stressed, van Ruitenbeek asks for help. “I used to think I had to shoulder it on my own,” he said.

Van Ruitenbeek with a colleague at Northwave (Thana Faroq for ProPublica)

Now 35, van Ruitenbeek is becoming financially independent. He received a promotion and raise. He leased his own car and, in 2021, with help from his family, van Ruitenbeek purchased a one-bedroom apartment just a short walk from them. Giving a tour of his new home, he showed off the view of a pond beyond the sliding doors of his living room. He had carefully organized scores of records on shelves below his DJ equipment. Tucked away in a corner, he displayed the artifacts of his period of isolation: shelves filled with the Warhammer figurines he painted as he recovered from his psychosis.

If you meet van Ruitenbeek today, you wouldn’t likely guess his history. Compact and ruddy, he makes eye contact when he speaks — in fluent English when he was interviewed for this article — and is often self-deprecating and quick to smile. His easy banter with his father, a reliable source of support, encouragement and protection, was unimaginable in the aftermath of his psychosis a decade ago.

When he entered the working world, van Ruitenbeek had to consciously mimic social behavior and speech that he observed in peers. Over time, though, being social gradually became second nature. He felt like a foreign language student who once had to rehearse sentences in his mind but eventually spoke the new language fluently.

In April, van Ruitenbeek attended the graduation of this year’s cybersecurity class at ITvitae’s monastery, sitting among the new graduates’ families and friends on a drizzly afternoon. An ITvitae manager named Jessica van der Ploeg told the 11 new graduates, who were going on to jobs at global bank ING, consulting giant Deloitte and the Dutch Ministry of Defense, “The job market is waiting for you, for your talent and for who you are.”

Van der Ploeg acknowledged that many incoming ITvitae students feel shut out of society because of their autism, just as van Ruitenbeek once did. Alluding to an analogy ITvitae often uses to describe the communication gap between people with autism and their neurotypical peers, she said, “It’s us Windows users who sometimes don’t know how Linux works.”

Van Ruitenbeek listened intently. At various points in his life, he had been unable to express emotion. Now he had tears streaming down his face.

Van Ruitenbeek with Pim Takkenberg, who brought him on at Northwave, after the ITvitae graduation ceremony (Thana Faroq for ProPublica)

Do You Have a Tip for ProPublica? Help Us Do Journalism.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Renee Dudley.

]]>
https://www.radiofree.org/2022/09/07/he-felt-isolated-and-adrift-after-an-autism-diagnosis-can-he-make-it-as-a-cybersleuth/feed/ 0 330601
French Polynesia moves towards ban on ‘craziness’ of seabed mining https://www.radiofree.org/2022/09/07/french-polynesia-moves-towards-ban-on-craziness-of-seabed-mining/ https://www.radiofree.org/2022/09/07/french-polynesia-moves-towards-ban-on-craziness-of-seabed-mining/#respond Wed, 07 Sep 2022 08:35:40 +0000 https://asiapacificreport.nz/?p=78890 RNZ Pacific

French Polynesia has voted a draft opinion for a temporary ban on seabed mining projects.

Of the territory’s Council for the Economy, Social, Environment and Culture, 43 members vote for the proposal, while two abstained.

The council acts as a consultant in advising and recommending during the enacting of legislation’s from the French Polynesian government.

This is after the territory’s President, Édouard Fritch, made a resolution to ban seabed mining after the Pacific Islands Forum.

Marine Resources Minister Heremoana Maamaatuaiahutapu told Tahiti Nui TV that this should be an example to other Pacific neighbours.

“Kiribati, Nauru and the Cook Islands are already engaged in an exploration process,” he said.

“We need to convince our cousins of the Pacific to stop this craziness.

‘We are the first’
“We are the first country or associate member of the Forum to take this resolution on, I must say — the exploration of the seabed,” Maamaatuaiahutapu said.

“The knowledge that we have of our seabed is only 5 percent.”

French Polynesia’s Exclusive Economic Zone (EEZ) is more than 4.7 million sq km and accounts for almost half of the water surface under French jurisdiction.

The council has been urging the government to secure resources in the seabed off France’s overseas territories.

It said France would be negligent not to profit from this as French Polynesia has rare earths, whose reserves are held by China in a near monopoly.

The pro-independence movement regularly challenges French control of the resource.

‘Solely for knowledge’

Minerals Minister Heremoana Maamaatuaiahutapu
Marine Resources Minister Heremoana Maamaatuaiahutapu … “if we have to examine what’s on the ocean floor, it should be solely for … knowledge.” Image: Radio1.pf

In May, Maamaatuaiahutapu said that Wallis and Futuna, New Caledonia and French Polynesia all had the same stance on deep-sea mining — “if we have to examine what’s on the ocean floor, it should be solely for the acquisition of knowledge, not for exploitation purposes”.

“And that has to be very clear. We want knowledge acquisition missions.

“I dare not even say ‘exploration’ because that term is too often associated with exploitation.

“We have 502 seamounts listed and we don’t know a single one. I think it’s important to know about the biodiversity around these seamounts beyond the minerals they house,” he said at the time.

This article is republished under a community partnership agreement with RNZ.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2022/09/07/french-polynesia-moves-towards-ban-on-craziness-of-seabed-mining/feed/ 0 330605
The long, leguminous quest to give crops nitrogen superpowers https://grist.org/article/the-long-leguminous-quest-to-give-crops-nitrogen-superpowers/ https://grist.org/article/the-long-leguminous-quest-to-give-crops-nitrogen-superpowers/#respond Sat, 03 Sep 2022 10:30:00 +0000 https://grist.org/?p=587402 This story was originally published by WIRED and is reproduced here as part of the Climate Desk collaboration. 

If crops could feel envy, it’d be for legumes. Bean plants have a superpower. Or more accurately, they share one. They’ve developed symbiotic relationships with bacteria that process atmospheric nitrogen into a form that’s usable for those plants — an essential element for building their tissues, photosynthesizing, and generally staying healthy. This is known as nitrogen fixation. If you look at a legume’s roots, you’ll see nodules that provide these nitrogen-fixing microbes with a home and food. 

Other crops — cereals like wheat, rice, and corn — don’t have such a deep symbiotic relationship, so farmers have to use large amounts of fertilizer to get the plants the nitrogen they need. This is very expensive. And fertilizer production is not great for the environment. It’s not easy to turn atmospheric nitrogen into a form of nitrogen that plants can absorb on their own. 

“It takes a lot of energy and really high pressures and high temperatures,” says University of Illinois Urbana-Champaign plant biologist Angela Kent. “Bacteria do this at ambient temperatures and pressures, so they’re pretty special. While energy has been cheap, it’s been easy for us to overuse nitrogen fertilizers.” 

Even worse, once it’s on fields, fertilizer spews nitrous oxide, which is 300 times as potent a greenhouse gas as carbon dioxide. Runoff from fields also pollutes water bodies, leading to toxic algal blooms. This is a particularly bad problem in the Midwest, where fertilizer empties into the Mississippi River and flows into the Gulf of Mexico, fueling massive blooms every summer. When those algae die, they suck the oxygen out of the water, killing any sea creatures unfortunate enough to be in the area and creating a notorious aquatic dead zone that can grow to be the size of New Jersey. Climate change is only exacerbating the problem, since warmer waters hold less oxygen to begin with. 

Given all that nastiness, scientists have long been on a quest to reduce agriculture’s dependence on fertilizers by giving cereal crops their own nitrogen-fixing powers. And with the rise of gene-editing technology over the past few decades, that quest has been making progress. Last month, in the Plant Biotechnology Journal, researchers described a breakthrough with rice, engineering the plant to produce more compounds that encourage the growth of biofilms, which provide a cozy home for nitrogen-fixing bacteria, much like legumes provide nodules for their partner microbes.  

“People for the last 30, 40 years have been trying to make cereals behave like legumes,” says Eduardo Blumwald, a plant biologist at the University of California, Davis who coauthored the new paper. “Evolution in that sense is very cruel. You cannot do in the lab what took millions and millions of years.”

So what’s with the evolutionary cruelty? Why can some plants — like, say aquatic ferns — fix nitrogen while others can’t? 

It’s not that other species don’t get nitrogen at all. Cereal grasses use nitrogen that’s already in the soil — it comes from animal manure, as well as all the life churning in the dirt. (Lots of different bacterial groups process atmospheric nitrogen, not just the legumes’ symbionts.)

But the legumes’ bacteria grab abundant nitrogen straight from the air. 

“When you have these nodules and you have this symbiotic relationship, it’s a much more effective way of getting atmospheric nitrogen,” says Joshua Doby, an ecologist at the University of Florida. “Because otherwise you have to wait for the bacteria and for other processes in the soil to turn it into ammonium.” 

One theory is that the symbiotic nitrogen relationship started out long ago as a bacterial infection, and those ancestor plants derived a benefit that was carried through to future generations. Earlier this year, Doby published a study of plants throughout the United States, finding that there is a greater diversity of nitrogen-fixing species than other kinds in arid regions. That is true even if the soil isn’t nitrogen-poor. He theorizes that millions of years ago, when those areas were wetter, the plants evolved the ability to fix nitrogen, which also allowed them to grow thicker cuticles. This trait protected them against dryness when the region eventually became arid. They were pre-adapted, basically. Non-fixers, by contrast, were weeded out by rising aridity. 

Another theory is that legumes might be consummate nitrogen-fixers because something in their genome predisposes them to building nodules.

But before you start feeling sorry for non-fixers, constructing nodules and hosting bacteria comes at a major cost. “It turns out that it’s very energetically expensive to actually do this,” says Ryan Folk, a biodiversity scientist at Mississippi State University who coauthored the new paper with Doby. First, a legume has to build those nodules on its roots, then it has to provide sugars to the bacteria to keep them happy. 

“It’s something like 20 to 30 percent of the legumes’ photosynthetic output actually goes to the bacteria, so it’s an extraordinary price,” he says. So even though it’s less efficient for plants to get their organic nitrogen from bacteria already in the soil, it’s also less costly because symbiotic bacteria are super needy.

What Blumwald and his colleagues have done with rice is sort of halfway between the strategies of legumes and non-fixing plants. They sifted through compounds that the plant produces, testing which ones induced the formation of a biofilm. 

“When bacteria form biofilms, it’s like a hippie commune — they are cozy, they are all together, they share things,” says Blumwald. 

A complex layer of polysaccharides, proteins, and lipids covers the biofilm, which is not permeable to oxygen. That’s important because oxygen interferes with the bacteria’s fixing of nitrogen from the air — in legumes, the nodules keep the oxygen out.

The team landed on a biofilm-boosting compound called apigenin. They then used Crispr gene editing to silence the plant’s expression of an enzyme that breaks down this apigenin, allowing more of the compound to accumulate in the plant and extrude into the soil to create a biofilm. 

“Then the bacteria started fixing nitrogen from the air to produce ammonium that the plant can uptake,” says Blumwald. “The proportion of nitrogen-fixing versus the rest of the bacteria near the root increased.” Basically, the rice plant now had its own fertilizer factory, giving it the nitrogen-fixing power denied to it by evolution. 

This would seem to skirt a problem with previous attempts to get cereal crops to fix their own nitrogen, says Kent, the University of Illinois Urbana-Champaign plant biologist, who wasn’t involved in the research. People have tried to inoculate soils with nitrogen-fixing bacteria in the hope that the plants and microbes would form a partnership. But that’s been difficult, since the soil microbiome is a wildly complex ecosystem of competing bacteria. 

“One thing I really liked about this paper is that it’s looking to modify the plants to make them partner with the soil microbiome better,” says Kent. “It helps to recruit the desired kind of microbes and give them a competitive advantage.”

Interestingly, scientists previously discovered a unique variety of corn in Mexico that fixes nitrogen in a similar way. The corn’s tube-shaped roots grow above ground, sheathing themselves in a bizarre mucilage — a whole lot of dripping goo. Like the biofilm around the rice roots, this mucilage houses nitrogen-fixing bacteria. The corn study authors think it would be possible to breed this trait into commercial varieties of corn.

Another problem with previous attempts with inoculation, Kent says, has been that the introduced bacteria can’t provide all the nitrogen the plants needed. A farmer would still have to apply fertilizer — but the over-application of fertilizer can actually overload natural nitrogen-fixers in the soil, sending them into hibernation. The field goes numb, essentially, as the beneficial microbiome shorts out. 

A company called Pivot Bio is engineering nitrogen-fixing bacteria that don’t shut down in the presence of added nitrogen. “We break the genetic feedback loop that causes them to go into hibernation when fields get fertilized,” says Karsten Temme, the company’s CEO and cofounder.

Today, they’re launching new products in which these microbes are applied directly to seeds of corn, wheat, and other cereals. (With earlier products, they instead sprayed the bacteria as a liquid during seed planting.) Currently, the microbes can’t supply all the nitrogen these cereals need, so farmers may still need to fertilize. But Temme says the company is improving the microbes’ efficiency. 

“What we see is there’s going to be a progression, where today we’re supplying a fraction of that nitrogen,” he says, “and over time, we begin to supply the majority and eventually the entirety of that nitrogen the crop needs.”

An effective biological nitrogen fixation system for rice could be “a game changer in global agriculture,” says Pallavolu Maheswara Reddy, who studies nitrogen fixation in cereals at India’s Energy and Resources Institute. That’s because the human population is growing rapidly, demanding more food and fertilizer to feed it. 

“Since the advent of Green Revolution in the mid-1960s, the application of chemical nitrogen fertilizers boosted rice yields by 100 to 200 percent to match the demands of world population,” Reddy says. “In the next 30 years, we must produce nearly 50 percent more rice than what is currently produced to supplement the food requirements of an increasing human population.”

But even if scientists can just reduce the amount of fertilizer needed for agriculture, the industry would be saving some of the energy it takes to manufacture the stuff while cutting both farmers’ costs and the runoff that makes it into waterways. That’ll be especially important in parts of the world where climate change is making downpours more powerful (a warmer atmosphere in general holds more water), which will wash more fertilizer off of fields. 

And just in case you’re worried about leagues of nitrogen-fixing plants spreading out of control thanks to their new superpower, Kent says there’s nothing to fear. “We don’t see legumes taking over the world,” says Kent. Nitrogen-fixing “is probably not the trait that a plant would need for becoming a super-plant.”

This story was originally published by Grist with the headline The long, leguminous quest to give crops nitrogen superpowers on Sep 3, 2022.


This content originally appeared on Grist and was authored by Matt Simon.

]]>
https://grist.org/article/the-long-leguminous-quest-to-give-crops-nitrogen-superpowers/feed/ 0 329418
Real Money, Fake Musicians: Inside a Million-Dollar Instagram Verification Scheme https://www.radiofree.org/2022/08/31/real-money-fake-musicians-inside-a-million-dollar-instagram-verification-scheme/ https://www.radiofree.org/2022/08/31/real-money-fake-musicians-inside-a-million-dollar-instagram-verification-scheme/#respond Wed, 31 Aug 2022 13:00:00 +0000 https://www.propublica.org/article/instagram-spotify-verified-fake-musicians#1407269 by Craig Silverman and Bianca Fortis

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

To his more than 150,000 followers on Instagram, Dr. Martin Jugenburg is Real Dr. 6ix, a well-coiffed Toronto plastic surgeon posting images and video of his work sculpting the decolletage, tucking the tummies and lifting the faces of his primarily female clientele.

Jugenburg’s physician-influencer tendencies led to a six-month suspension of his Ontario medical license in 2021 after he admitted to filming patient interactions and sharing images of procedures without consent. He apologized for the lapse and is currently facing a class-action lawsuit from female patients who say their privacy was violated.

But on Spotify, Apple Music and Deezer, and in roughly a dozen sponsored posts scattered across the web, Jugenburg’s career and controversial history was eclipsed by a new identity. On those platforms, he was DJ Dr. 6ix, a house music producer who’s celebrated for his “inherent instinctual ability for music composition” and who “assures his followers that his music is absolutely unique.”

It’s an unconvincing persona — perhaps even less so once his “music” is played. But it was enough to secure what he wanted: a verification badge for his Instagram account.

The coveted blue tick can be difficult to obtain and is supposed to assure that anyone who bears one is who they claim to be. A ProPublica investigation determined that Jugenburg’s dubious alter ego was created as part of what appears to be the largest Instagram account verification scheme ever uncovered. With a generous greasing of cash, the operation transformed hundreds of clients into musical artists in an attempt to trick Meta, the owner of Instagram and Facebook, into verifying their accounts and hopefully paving the way to lucrative endorsements and a coveted social status.

Since at least 2021, at least hundreds of people — including jewelers, crypto entrepreneurs, OnlyFans models and reality show TV stars — were clients of a scheme to get improperly verified as musicians on Instagram, according to the investigation’s findings and information from Meta.

Verified Spotify profiles for MTV “Siesta Key” stars Mike Vazquez and Lexie Salameh were removed after ProPublica reached out. (Screenshots by ProPublica)

In response to information provided by ProPublica and the findings of its own investigation, Meta has so far removed fraudulently applied verification badges from more than 300 Instagram profiles, and continues to review accounts. That includes the accounts of Mike Vazquez and Lexie Salameh, two stars of the MTV reality show “Siesta Key.” Rather than get verified for their TV work, they were falsely branded online as musicians in order to receive verification. They lost their badges approximately two weeks ago and did not respond to requests for comment.

Jugenburg did not respond to a phone message left at his Toronto practice or to emails detailing evidence that he had paid for his Instagram verification. He has told media outlets he intends to vigorously defend himself against the class-action suit.

The scheme, which likely generated millions in revenue for its operators, illustrates how easily major social, search and music platforms can be exploited to create fake personas with real-world consequences, such as monetizing a verified account. It also underscores how Instagram’s growth and cachet combines with poor customer support and lax oversight to create a thriving black market in verification services and account takedowns for hire.

Influencers, socialites, models, businesspeople and all manner of clout chasers rely on Instagram to flaunt their lifestyle, generate income and establish a personal brand. Some influencers and models told ProPublica they face a barrage of impostor accounts trying to run scams to trick their fans. They also run the constant risk of malicious actors fabricating evidence and filing user reports to convince Instagram to ban their accounts. They see a badge as one of few options available that can help them protect their accounts and business. Others covet the blue tick as a status symbol. The result is a steady supply of well-heeled customers willing to pay five figures to get verified. (Meta is reportedly working on enhancing its customer support.)

The verification scheme identified by ProPublica exploited music platforms like Spotify and Apple Music, as well as Google search, to create fake musician profiles. The songs uploaded to client profiles were often nothing more than basic looping beats or, in at least one case, extended periods of dead air. They credited composers with nonsense names such as “rhusgls stadlhvs” and “kukyush fhehjer.” The Meta employees tasked with reviewing the musician verification applications apparently failed to listen to the tracks or look too closely.

The people running the scheme also purchased articles promoting fake artists and their music on websites, including hip-hop publications like The Source and ThisIs50.com, a music and culture site affiliated with rapper 50 Cent. They often bought fake comments and likes for clients’ Instagram posts to make the accounts look popular and purchased fake streams for songs on Spotify, according to two sources with direct knowledge of the operation. One source said some clients were told to rent a recording studio and post photos on Instagram that made it look like they were working on music. (The Source and ThisIs50.com did not respond to emailed requests for comment.)

“You can make a Spotify account or Apple Music account and boost the streams and get fake music press very cheap. It’s quick and easy,” said the source, who asked not to be named due to fear of retaliation.

A Spotify spokesperson said the company identified artificial streams, which are often generated using bots, on many of the 173 profiles provided by ProPublica. The company has removed more than 100 of the artists from its platform.

“Fraud is an industry-wide issue that we take very seriously,” Spotify spokesperson Zachary Kozlak said. “Spotify invests heavily in automated processes and manual reviews to prevent, detect, and mitigate the impact of artificial activity on the platform. We’ve removed the content in question we found to be manipulated.”

Apple Music did not respond to multiple requests for comment, but it has removed music from the profiles of many of the dubious artists identified by ProPublica.

Using domain registration records, corporate and banking documents, information from online platforms, and interviews with clients and people with knowledge of the scheme, ProPublica was able to identify the person at the center of the plot. He is a Miami-based aspiring DJ and would-be crypto entrepreneur named Dillon Shamoun. With little or no interference from Meta, Shamoun built a verification-for-pay juggernaut while also burnishing his own image by using the same digital manipulation techniques he offered to clients.

Shamoun appears to have hawked his Instagram verification services to a cadre of Miami nightlife impresarios, restaurateurs, jewelers, models and others. He also transformed his model-influencer girlfriend and his older brother, a mortgage broker, into musical artists in attempts to secure account verification.

In phone interviews with and text messages to ProPublica, Shamoun, an athletic, bearded 26-year-old, denied any involvement in the scheme and said he does not sell account verification services. He said he works on FanVerse, a crypto startup that enables creators and influencers to sell NFTs of themselves, among other projects.

“People know who I am and my character and what I do for business, and it has nothing to do with Facebook or Instagram,” he said.

After being provided information by ProPublica, Meta confirmed Shamoun’s key involvement in the fake musician verification scheme. It banned him from its platforms and removed his Instagram and Facebook accounts. The company said that Shamoun’s scheme was a sophisticated operation and that Meta works to thwart the sale of fraudulent services to users of its platforms.

“Scammers selling fraudulent services continue to target online platforms across the internet, including ours, and constantly adapt their tactics in response to industry detection methods,” said a Meta spokesperson, who asked not to be identified due to security concerns related to this story’s subject matter. “We urge people to keep vigilant and never pay for verification status because it violates our Terms. Whenever we identify a scheme like this, we take action - and that means not only will someone who’s paid for verification lose their money, they’ll lose their verification status, as well.”

When asked if any Meta employees or contractors were involved in the scheme, the spokesperson said they can’t comment on internal personnel matters or investigations.

A falling out between Shamoun and a business partner, combined with scrutiny from Meta and ProPublica’s investigation, has unleashed a vicious round of finger-pointing that exposed the underworld of social media manipulation and verification services.

In response to questions from ProPublica, Shamoun said the scheme is all the work of Adam Quinn, a prominent Instagram creator who previously worked with mega-influencer and boxer Jake Paul, and who has collaborated with musicians and celebrities for online promotions. Quinn’s Instagram account had more than 2 million followers when it was removed by Meta in June. The company sent him a cease-and-desist letter that month accusing him of selling account verification services, running celebrity giveaways that inauthentically boosted followers for Instagram accounts and offering to reactivate disabled Instagram accounts for a fee.

The Meta spokesperson said the company had collected evidence of Quinn’s involvement in selling verification services before its recent move against Shamoun for the fake musician scheme.

In comments to ProPublica and in a legal letter sent to Meta, Quinn acknowledged he sold account verification in partnership with Shamoun. He denied being personally involved in account reactivation, and he said his giveaways were in line with Meta’s rules and did not result in fake followers. An archived version of his company’s website lists a menu of “Instagram Growth Packages” ranging up to $7,500 and promising to deliver 100,000 followers using the giveaway model.

Quinn said he had used his connections and Instagram account to refer clients to Shamoun and had received a portion of the resulting fees. Clients typically paid $25,000 to verify an account, though Shamoun has at times charged more than $100,000, according to Quinn. He provided ProPublica with a bank document showing wire transfer information for Shamoun’s company, as well as two agreements from this year that said Quinn and Shamoun were partners in a “Social Media Verification” business. One agreement, signed in June, stipulated that Shamoun’s company was responsible for the client work to “ensure successful Verifications.” A source close to Shamoun, who asked not to be named to avoid jeopardizing their current job, verified the authenticity of the agreements but claimed Quinn was the one submitting fake musician verification requests. The language of the agreements appears to dispute this claim, as do Meta’s findings.

ProPublica also obtained a copy of a business proposal from Shamoun’s company, Rumor LLC, that pitched a range of online marketing services, including social media verification.

In his lawyer’s letter to Meta, Quinn denied submitting fake musician accounts to the company for verification. He said Shamoun created and controlled the process and handled the submissions. He also accused Shamoun of supplying information to Meta in an effort to get Quinn’s and Quinn’s girlfriend’s Instagram accounts removed in June.

“I believe that I am a victim of circumstance here, being unjustly attacked by someone not only violating Meta’s terms and conditions, but abusing the system put in place to prevent people like him from doing what they do,” Quinn’s letter said.

The implosion of the scheme has left Quinn and Shamoun banned from Instagram and other Meta platforms and has put an end to their lucrative business partnership. It has also left more than 300 recently de-verified clients angry that they paid tens of thousands of dollars for nothing.

For his part, Shamoun insisted that any information linking him to the scheme was fabricated by Quinn in order to frame him.

“As stated, I’m a very influential individual in Miami, that’s why I’m being framed by someone who’s now a ghost online,” he wrote.

Shamoun said he had over 70 pages of evidence showing Quinn is responsible for the entire scheme, as well as other types of platform and account manipulation. When asked to share that evidence with ProPublica, he said he could not because he is bound by unspecified nondisclosure agreements. Shamoun also said he is working with Netflix on producing a film or series based on the documents.

“I’m going to make something even bigger than ‘The Tinder Swindler,’” he said, citing a recent hit Netflix documentary about a scammer who dated women and made off with their money.

Netflix did not respond to a request for comment.

Battle for the Badge

The criteria determining who is eligible for verification are not always clear-cut, but Instagram says accounts must be authentic, unique, complete and notable.

Besides offering clout, a blue check mark provides social proof that the account holder is who they say they are. Verified account holders may also get access to new features before they’re available to the general public.

Meta’s policies forbid users from selling account verification as a service and from misrepresenting their identity in order to receive a badge. But people have been selling Instagram verifications for years. A 2017 Mashable article reported that people were paying thousands for a blue tick.

As demand for verification rose over the years, Meta developed verification criteria for various categories of people or brands, including music, fashion and entertainment. This scheme shows how those criteria can be used as a road map by people like Shamoun.

Shamoun “had the most volume out of anybody,” said a source who has bought verification for clients and frequents the dark web chats and Telegram channels where people offering the service congregate. The source, who asked not to be named in order to protect their Instagram accounts, said Quinn’s high profile also helped bring a steady flow of clients to the operation.

Among those clients were multiple performers on OnlyFans, a popular platform among adult entertainers who can charge users for access to members-only photos, video and communications. One model, who said she declined an offer from Shamoun to get verified, told ProPublica that OnlyFans performers in particular see value in verification. She said they are often targeted by extortion schemes whereby hackers file false reports and get a model’s Instagram accounts removed, and then offer to reactivate the account for a fee. The OnlyFans model spoke on condition that her name not be used, as she feared reprisals for speaking out.

“A lot of people will impersonate you if you’re an OnlyFans girl and put a link up and pretend to be you” in order to scam fans, she said, adding that she feels Instagram is more strict about content posted by OnlyFans performers, and that losing an account could result in a drop in revenue.

Making a Fake Musician

DJ Dr. 6ix’s Spotify profile was removed after ProPublica reached out to the company. (Screenshot by ProPublica)

Jugenburg’s online profile as DJ Dr. 6ix is typical of the work done by the operation: a raft of paid press articles extolling the DJ’s musical genius, false claims about his popularity and background, profiles on major music platforms like Spotify, Apple Music and Deezer, and songs that often consist of a simple looped beat.

“Umbrella”

On Spotify and other music platforms, Jugenburg had five songs with titles such as “Umbrella,” “Mysteries” and “Next Party.” One of the songs showed it had been streamed close to 60,000 times, but included 90 seconds of dead air and credits an apparently made-up writer: “gbfred gtfrde.” The source with direct knowledge of the operation said fake Spotify streams were bought for songs to make clients look convincing if a Meta employee ever checked. Spotify removed DJ Dr. 6ix’s profile after being contacted by ProPublica.

DJ Dr. 6ix’s Spotify bio claimed he was featured in publications such as “EDM.com, The Source, & Billboard.” Jugenburg does not appear on EDM.com or in Billboard, but he was featured in an apparently paid article on The Source. It falsely describes him as a Los Angeles-based artist and says his song “Umbrella” has “firmly established himself as one of the most well-known musicians of his generation.”

Articles about Dr. Martin Jugenburg’s alter ego, DJ Dr. 6ix, were placed on music websites to help get his account verified. (Screenshots by ProPublica)

That same line appears in at least nine other apparently paid articles about other likely Shamoun clients. On those and other occasions documented by ProPublica, his operation apparently reused the same article text and simply swapped in different artist and song names.

The lack of effort put into the paid articles wasn’t an accident. The operation also reused songs for clients. It was an assembly line for Instagram verification. The source with knowledge of the process said the goal was to secure a badge for a client in 30 to 45 days.

.bb-aside p { margin-top: 5px; } .bb-aside h2 { margin-bottom: var(--spacing0); } Anatomy of a False Verification Scheme Step 1

A client creates content showing them in designer clothing, at luxury locations or in a recording studio to make them look like a musician.

Step 2

Spotify and Apple Music profiles are created for the client, basic songs are uploaded with album art, and fake streams are purchased to make their songs appear popular.

Step 3

Paid articles about the client’s songs are published to add further legitimacy.

Step 4

The client posts their lifestyle and music content, spacing it out over time. Engagement in the form of likes, comments and followers are purchased for the posts, providing evidence of popularity.

Step 5

Google’s search engine indexes the client’s music and articles, then automatically generates a “knowledge panel” that brands the person as a musical artist when someone searches for their name.

Step 6

In final preparation for verification, a client edits their Instagram bio, feed and highlights to emphasize their musical career.

Step 7

The client’s Instagram account is submitted to Meta for verification. If everything goes as planned, they’ll receive a blue check and the account protection and status it affords.

Here’s how it worked: The first step is to have a client produce photos in lifestyle poses and situations that made them appear to be an artist or someone with a high cultural status. Client profiles reviewed by ProPublica often showed people posing in front of expensive cars, in designer clothes or near private planes. In some cases they appeared behind or near a DJ booth or in a recording studio.

As clients produced their content, Shamoun and his small team commissioned articles and music for them. Many paid articles featuring fake artists are credited to Lost Boy Entertainment, a PR firm. Cofounder Christian Anderson confirmed that the articles placed for the fake musicians, and for Shamoun, were paid placements, or what he called “advertised press.” He said he wasn’t sure who paid for them because they were likely purchased via his company's account on Fiverr, an online marketplace.

“After this has been brought to our attention we are working on taking many of these articles down already. We weren’t aware of the end goal,” he said in an email.

As for the songs, the source with knowledge of the operation said basic beats can also be purchased on Fiverr. With music in hand, the music and artist profile information was uploaded to Spotify, Apple Music and other platforms.

Clients were then told to start posting their content on Instagram. The operation also purchased fake likes and comments on Instagram posts that featured music content. The source said they were unaware of any instances where Instagram flagged likes or comments as potentially inauthentic.

“If you’re an Instagram employee with a heavy workload, are you really gonna check the comments on every submission?” they said.

The source said they also worked to ensure a client’s Google search results would present them as a musician. Google itself proved helpful in this regard. Once articles and music profiles were indexed by Google’s search engine, the site generated a “knowledge panel” in search results for the person’s name. The box appears next to search main results and identifies the person as a musical artist, offering links to their online profiles and music. In the eyes of Google, the client was now a real musician.

A Google spokesperson said that close to 80% of the 173 people identified by ProPublica as likely Shamoun clients were labeled musicians in these auto-generated knowledge panels. The company said because these individuals had profiles on Spotify and Apple and were the subjects of articles, they met the criteria to be labeled as musical artists. It’s not Google’s responsibility to determine whether the artists are legitimate, according to company spokesperson Lara Levin. As of now, these people remain marked as musical artists when you search for their names on Google.

Google automatically generated musician “knowledge panels” for Vazquez and Salameh. (Screenshots by ProPublica)

The source said Shamoun claimed his actual costs for each verification submission amounted to roughly $1,500. He typically charged clients $25,000 for each verified account, making the operation hugely profitable, they said. Meta kept approving fake musicians, and the clients kept coming.

“Jungle”

One client is Alfredo Troia, who sells custom jewelry out of a Pembroke Pines, Florida, shopping mall and goes by the moniker Goody the Jeweler. His verified Spotify profile had a total of seven songs and 180 monthly listeners prior to being removed by the company. While all of his music is electronic, his profile image shows him sitting next to an upright piano, reading what appears to be sheet music. Writing credits for his music list names such as “wehkuudhs wehdgjg,” “trudbkds prosbhkdfs” and “caddfhjksf probfbksd.” His song “Jungle” also sounds the same as DJ Dr. 6ix’s “Umbrella.” He did not respond to requests for comment. He lost his Instagram badge, and his music was also removed from Apple Music and Deezer.

“Despair”

Akop Torosian, a bakery and gym owner, had four songs on his Spotify page under the name No Limit Boss. One track, “Despair,” which sounds like an audio sample played on loop for more than four minutes, was described as an “opus” in a likely paid March article published by Muzique Magazine. (Muzique did not respond to emailed requests for comment.)

In June, Torosian was arrested at Los Angeles International Airport on a complaint of attempted murder after he allegedly threatened one of his employees with a weapon. He pleaded not guilty in that case. The arrest came days after Torosian was accused of making racist comments about a Mexican juice vendor. In 2015, he was sentenced to three years of probation for a weapons charge related to a triple shooting. His Spotify profile was recently removed, and his Instagram badge was recently revoked by Meta. He did not respond to requests for comment.

Several OnlyFans models were also verified as musicians. Desiree Schlotz, Hannah Palmer and Lauren Blake boast a total of 4.7 million followers on Instagram, and each had songs, music profiles and paid articles presenting them as musicians. All three lost their Instagram badges, and Spotify removed their songs. They did not respond to requests for comment.

Nicky Gathrite and Tara Electra (whose name in corporate records is Tara Niknejad) are the co-founders of Unruly, an LA-based agency representing models and OnlyFans performers. They were also falsely verified as musicians. Both recently lost their badges.

In a phone call, Gathrite denied any knowledge of the paid verification scheme. When asked if he’s really a musician, he said, “If you Google me you can see that I am.” Google searches on his name brought up an automatically generated knowledge panel describing him as a musical artist. Electra did not respond to a request for comment.

Gathrite is also involved in FanVerse, the Shamoun startup that sells NFTs of models and influencers. Another partner in the company is Mike Vazquez, the “Siesta Key” star who lost his badge after being falsely verified as a musician.

Gathrite did not respond to follow-up questions sent by email, and Vazquez also declined to comment. Shamoun did not respond to questions about his connections to Vazquez, Gathrite and Unruly.

“From a Sales Guy to a Music Sensation”

Shamoun seemed a natural fit to oversee the manufacturing of dubious musical artists.

He grew up in the Detroit area and has performed as a DJ under the name “Not Dillon.” As early as 2020, he began placing paid articles to promote himself and his ambitions in the music industry. Like those discussing his clients, the articles made exaggerated or false claims about Shamoun’s accomplishments.

“From a sales guy to a music sensation, Dillon is breaking records with his music and has established himself as an emerging name in the industry today,” reads a January 2020 article placed on an Indian news website.

Dillon Shamoun’s verified Spotify profile was removed after ProPublica contacted the company. (Screenshot by ProPublica)

Another apparently paid article from the same month on a different Indian website claimed Shamoun had “over 10 million streams on the music which he has created.” His two songs as Not Dillon on Spotify have less than 200,000 streams, and an old SoundCloud account in his name has six songs with less than 1,000 total plays. ProPublica could not find evidence of significant audience interaction on other platforms.

Over the next two years, his questionable claims of fame and success grew.

Back in 2020, online articles said he had played at a handful of music festivals. Shamoun’s website claimed he was involved in “branding and playing 12 of the world’s most reputable music festivals.” When he spoke to a ProPublica reporter this month, he claimed to have sold a major music festival to Live Nation. He declined to name the festival or provide additional information to back that up. It appears any supposed windfall from that sale may have been minor: Records show that a Dillon Shamoun with an address that matches public records for the aspiring DJ received a Payroll Protection Program loan of $18,540 in April 2021. Loan data lists Shamoun as working in “Marketing Consulting Services.”

Shamoun’s personal site also claimed he has two certified gold records, and that he planned to release music with top artists Tyga and Tory Lanez in 2021. There’s no evidence of any of that. Shamoun did not reply to questions about the PPP loan or his claims about gold records and working with major artists. His website was taken offline after ProPublica reached out. Management for Tyga and Tory Lanez could not be reached for comment.

Shamoun’s musical career exists in a haze of dubious claims, but there’s overwhelming evidence connecting him to the Instagram verification scheme, which he denies all involvement with. Multiple former clients confirmed that he sold verification services, and Shamoun is also listed in Whois records as the owner of close to 200 web domains featuring the names of people who have dubious musician profiles created by the scheme. There’s djdrsixmusic.com for the plastic surgeon, as well as melodymoralesmusic.com, the website of Shamoun’s girlfriend. She recently lost her verification badge as part of Meta’s move against fake musical artists, and her account, @mell, is no longer active. Morales’ three songs were removed by Apple and her account was taken down by Spotify after ProPublica reached out. Her website was also taken down after a reporter contacted Shamoun. In a text message, she declined to comment.

Shamuon also owns the domain name djtylerrumor.com. His older brother Tyler Shamoun, a Detroit mortgage broker, was branded in paid articles and on Spotify and other platforms as DJ Rumor in a failed attempt to receive verification. Tyler Shamoun did not respond to emails or messages containing a detailed list of questions.

In text messages and phone calls, Shamoun kept citing one piece of evidence against his former partner: the fact that lawyers working for Meta sent Quinn a cease-and-desist letter in June. Shamoun said the lack of action by Meta against him showed he was not involved. “If it were true, I’d be in the same predicament Meta put the actual person in,” he said, referring to Quinn.

On Aug. 16, four days after Meta was contacted by ProPublica, the company sent Shamoun a cease-and-desist letter and banned him from its platforms for selling account verification services.

“As a result of our investigation, we’ve sent a cease-and-desist letter and removed related fraudulent verifications on our platform,” said the Meta spokesperson.

Days later, Shamoun messaged a prospective client with an offer: He could get their Instagram account verified for the low price of $15,000.

Do You Have a Tip for ProPublica? Help Us Do Journalism.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Craig Silverman and Bianca Fortis.

]]>
https://www.radiofree.org/2022/08/31/real-money-fake-musicians-inside-a-million-dollar-instagram-verification-scheme/feed/ 0 328028
Facebook Tells Moderators to Allow Graphic Images of Russian Air Strikes, But Censors Israeli Attacks https://www.radiofree.org/2022/08/27/facebook-tells-moderators-to-allow-graphic-images-of-russian-air-strikes-but-censors-israeli-attacks/ https://www.radiofree.org/2022/08/27/facebook-tells-moderators-to-allow-graphic-images-of-russian-air-strikes-but-censors-israeli-attacks/#respond Sat, 27 Aug 2022 10:00:55 +0000 https://theintercept.com/?p=406250

After a series of Israeli airstrikes against the densely populated Gaza Strip earlier this month, Palestinian Facebook and Instagram users protested the abrupt deletion of posts documenting the resulting death and destruction. It wasn’t the first time Palestinian users of the two giant social media platforms, which are both owned by parent company Meta, had complained about their posts being unduly removed. It’s become a pattern: Palestinians post sometimes graphic videos and images of Israeli attacks, and Meta swiftly removes the content, providing only an oblique reference to a violation of the company’s “Community Standards” or in many cases no explanation at all.

Not all the billions of users on Meta’s platforms, however, run into these issues when documenting the bombing of their neighborhoods.

Previously unreported policy language obtained by The Intercept shows that this year the company repeatedly instructed moderators to deviate from standard procedure and treat various graphic imagery from the Russia-Ukraine war with a light touch. Like other American internet companies, Meta responded to the invasion by rapidly enacting a litany of new policy carveouts designed to broaden and protect the online speech of Ukrainians, specifically allowing their graphic images of civilians killed by the Russian military to remain up on Instagram and Facebook.

No such carveouts were ever made for Palestinian victims of Israeli state violence — nor do the materials show such latitude provided for any other suffering population.

“This is deliberate censorship of human rights documentation and the Palestinian narrative.”

“This is deliberate censorship of human rights documentation and the Palestinian narrative,” said Mona Shtaya, an adviser with 7amleh, the Arab Center for the Advancement of Social Media, a civil society group that formally collaborates with Meta on speech issues. During the recent Israeli attacks on Gaza, between August 5 and August 15, 7amleh tallied nearly 90 deletions of content relating to bombings, noting that reports of censored content are still coming in.

Marwa Fatafta, Middle East North Africa policy manager for Access Now, an international digital rights group, said, “Their censorship works almost like clockwork — whenever violence escalates on the ground, their takedown of Palestinian content soars.”

Instances of censored Palestinian content reviewed by The Intercept include the August 5 removal of a post mourning the death of Alaa Qaddoum, a 5-year-old Palestinian girl killed in an Israeli missile strike, as well as an Instagram video showing Gazans pulling bodies from beneath rubble. Both posts were removed with a notice claiming that the imagery “goes against our guidelines on violence or dangerous organizations” — a reference to Meta’s company policy against violent content or information related to its vast roster of banned people and groups.

Meta spokesperson Erica Sackin told The Intercept that these two posts were removed according to the Dangerous Individuals and Organizations policy, pointing to the company’s policy of censoring content promoting federally designated terrorist groups. Sackin did not respond to a follow-up question about how an image of a 5-year-old girl and a man buried in rubble promoted terrorism.

Palestinians in Gaza who post about Israeli assaults said their posts don’t contain political messages or indicate any affiliation with terror groups. “I’m just posting pure news about what’s happening,” said Issam Adwan, a Gaza-based freelance journalist. “I’m not even using a very biased Palestinian news language: I’m describing the Israeli planes as Israeli planes, I’m not saying that I’m a supporter of Hamas or things like these.”

Rights advocates told The Intercept that the exemptions made for the Russia-Ukraine war are the latest example of a double standard between Meta’s treatment of Western markets and the rest of the world — evidence of special treatment of the Ukrainian cause on Meta’s part since the beginning of the war and something that can be seen with media coverage of the war more broadly.

Though the majority of users on social platforms owned by Meta live outside the United States, critics charge that the company’s censorship policies, which affect billions worldwide, tidily align with U.S. foreign policy interests. Rights advocates emphasized the political nature of these moderation decisions. “Meta was capable to take very strict measures to protect Ukrainians amid the Russian invasion because it had the political will,” said Shtaya, “but we Palestinians haven’t witnessed anything of these measures.”

By taking its cues from U.S. government policy — including cribbing U.S. counterterrorism blacklists — Meta can end up censoring entirely nonviolent statements of support or sympathy for Palestinians, according to a 2021 statement by Human Rights Watch. “This is a pretty clear example of where that’s happening,” Omar Shakir, Human Rights Watch’s Israel and Palestine director, told The Intercept of the most recent takedowns. While Human Rights Watch’s accounting of recent Gaza censorship was still ongoing, Shakir said what he’d seen already indicated that Meta was once again censoring Palestinian and pro-Palestinian speech, including the documentation of human rights abuses.

It’s unclear which specific facet of Meta’s byzantine global censorship system was responsible for the spate of censorship of Gaza posts in August; many posters received no meaningful information as to why their posts were deleted. The Meta spokesperson declined to provide an accounting of which other policies were used. Past takedowns of Palestinian content have cited not only the Dangerous Individuals and Organizations policy but also company prohibitions against depictions of graphic violence, hate symbols, and hate speech. As is the case with Meta’s other content policies, the Violent and Graphic Content prohibition can at times swallow up posts that are clearly sharing the reality of global crises rather than glorifying them — something the company has taken unprecedented steps to prevent in Ukraine.

Meta’s public-facing Community Standards rulebook says: “We remove content that glorifies violence or celebrates the suffering or humiliation of others because it may create an environment that discourages participation” — noting a vague exception for “graphic content (with some limitations) to help people raise awareness about these issues.” The Violent and Graphic Content policy places a blanket ban on gruesome videos of dead bodies and restricts the viewing of similar still images to adults 18 years and older.

In an expanded, internal version of the Community Standards guide obtained by The Intercept, the section dealing with graphic content includes a series of policy memos directing moderators to deviate from the standard rules or bring added scrutiny to bear on specific breaking news events. A review of these breaking news exceptions shows that Meta directed moderators to make sure that graphic imagery of Ukrainian civilians killed in Russian attacks was not deleted on seven different occasions, beginning at the immediate onset of the invasion. The whitelisted content includes acts of state violence akin to those routinely censored when conducted by the Israeli military, including multiple specific references to airstrikes.

According to the internal material, Meta began instructing its moderators to deviate from standard practices to preserve documentation of the Russian invasion the day after it began. A policy update on February 25 instructed moderators to not delete video of some of the war’s earliest civilian casualties. “This video shows the aftermath of airstrikes on the city of Uman, Ukraine,” the memo reads. “At 0.5 seconds, innards are visible. We are making an allowance to MAD this video” — a reference to the company practice “Mark As Disturbing,” or attaching a warning to an image or video rather than deleting it outright.

“It’s always been about geopolitics and profit for Meta.”

On March 5, moderators were told to “MAD Video Briefly Depicting Briefly Mutilated Persons Following Air Strikes in Chernigov”— again noting that moderators were to deviate from standard speech rules. “Though video depicting dismembered persons outside of a medical setting is prohibited by our Violent & Graphic Content policy,” the memo says, “the footage of the individuals is brief and appears to be in an awareness raising context posted by survivors of the rocket attack.”

The graphic violence exceptions are just a few of the many ways Meta has quickly adjusted its moderation practices to accommodate the Ukrainian resistance. At the outset of the invasion, the company took the rare step of lifting speech restrictions around the Azov Battalion, a neo-Nazi unit of the Ukrainian military previously banned under the company’s Dangerous Individuals and Organizations policy. In March, Reuters reported that Meta temporarily permitted users to explicitly call for the death of Russian soldiers, speech that would also normally violate the company’s rules.

Rights advocates emphasized that their grievance is not with added protections for Ukrainians but the absence of similar special steps to shield besieged civilians from Meta’s erratic censorship apparatus nearly everywhere else in the world.

“Human rights is not a cherry-picking exercise,” said Fatafta. “It’s good they have taken such important measures for Ukraine, but their failure to do so for Palestine emphasizes further their discriminatory approach to content moderation. It’s always been about geopolitics and profit for Meta.”

How exactly Meta decides which posts are celebrating gruesome wartime death and which are raising awareness of it is never explained in the company’s public overview of its speech rules or the internal material reviewed by The Intercept.

A January 2022 blog post from Meta notes that the company uses a “balancing test that weighs the public interest against the risk of harm” for content that would normally violate company rules but provides no information as to what that test actually entails or who conducts it. Whether an attempt to document atrocities or mourn a neighbor killed in an airstrike is deemed glorification or in the public interest is left to the subjective judgment calls of Meta’s overworked and sometimes traumatized content contractors, tasked with making hundreds of such decisions every day.

Few would dispute that the images from Ukraine described in the Meta policy updates — documenting the Russian invasion — are newsworthy, but the documents obtained by The Intercept show that Meta’s whitelisting of material sympathetic to Ukraine has extended even to graphic state propaganda.

The internal materials show that it has on multiple instances whitelisted Ukrainian state propaganda videos that highlight Russian violence against civilians, including the emotionally charged “Close the Sky” film Ukrainian President Volodymyr Zelenskyy presented to Congress in March. “Though the video depicting mutilated humans outside of a medical setting is prohibited by VGC policy the footage shared is in an awareness-raising context posted by the President of Ukraine,” said a March 24 update distributed to moderators.

On May 13, moderators were told not to delete a video posted by the Ukrainian Defense Ministry that included graphic depictions of burnt corpses. “The video very briefly depicts an unidentified charred body lying on the floor,” the update says. “Though video depicting charred or burning people is prohibited by our Violent & Graphic Content policy … the footage is brief and qualifies for a newsworthy exception as per OCP’s guidelines, as it documents an on-going armed conflict.”

“Meta is replicating online some of the same power imbalances and rights abuses we see in the real world.”

The internal materials reviewed by The Intercept show no such interventions for Palestinians — no whitelisting of propaganda designed to raise sympathies for civilians or directives to use warnings instead of removing content depicting harm to civilians.

Critics pointed to the disparity to question why online speech about war crimes and human rights offenses committed against Europeans seems to warrant special protections while speech referring to abuses committed against others do not.

“Meta should respect the right for people to speak out, whether in Ukraine or Palestine,” said Shakir, of Human Rights Watch. “By silencing many people arbitrarily and without explanation, Meta is replicating online some of the same power imbalances and rights abuses we see in the real world.”

While Meta seems to side against allowing Palestinian civilians to keep graphic content online, it has intervened in posting about the Israeli-Palestinian conflict to keep images live by siding with the occupying Israeli military. In one instance, Meta took steps to ensure that a depiction of an attack against a member of the Israeli security forces in the occupied West Bank was kept up: “An Israeli Border Police officer was struck and lightly wounded by a Molotov cocktail during clashes with Palestinians in Hebron,” an undated memo distributed to moderators reads. “We are making an exception for this particular content to Mark this video as Disturbing.”


This content originally appeared on The Intercept and was authored by Sam Biddle.

]]>
https://www.radiofree.org/2022/08/27/facebook-tells-moderators-to-allow-graphic-images-of-russian-air-strikes-but-censors-israeli-attacks/feed/ 0 327024
Remember When talking About Microchips Would Get You Called a “Conspiracy Theorist”? https://www.radiofree.org/2022/08/26/remember-when-talking-about-microchips-would-get-you-called-a-conspiracy-theorist/ https://www.radiofree.org/2022/08/26/remember-when-talking-about-microchips-would-get-you-called-a-conspiracy-theorist/#respond Fri, 26 Aug 2022 13:59:58 +0000 https://dissidentvoice.org/?p=132825 On August 16, 2022, the World Economic Forum (WEF) ran an article called, “Augmented tech can change the way we live, but only with the right support and vision.” I strongly suggest you CLICK HERE and read it. It’s kinda-sorta important to learn what they have in store for you — or more likely, your […]

The post Remember When talking About Microchips Would Get You Called a “Conspiracy Theorist”? first appeared on Dissident Voice.]]>

On August 16, 2022, the World Economic Forum (WEF) ran an article called, “Augmented tech can change the way we live, but only with the right support and vision.”

I strongly suggest you CLICK HERE and read it. It’s kinda-sorta important to learn what they have in store for you — or more likely, your children and grandchildren. Here’s how the post opens:

“Superheroes have been dominating big and small screens for a while, but there’s a subtle change happening. Many children expect to develop superpowers themselves. These expectations may sound unattainable, but we’re already making the first strides towards an ‘augmented society’.”

Spoiler alert: “Augmented society” is a fast track toward normalizing the implanting of microchips.

Obviously, I’d prefer if you read and grasped the predatory plans for yourself. But, as further motivation, here are a few excerpts:

  • “As scary as chip implants may sound, they form part of a natural evolution that wearables once underwent. Hearing aids or glasses no longer carry a stigma. They are accessories and are even considered a fashion item. Likewise, implants will evolve into a commodity.”
  • “Brain implants take us one step further and allow us to tap straight into the body’s ‘operating system’.”
  • “Should you implant a tracking chip in your child? There are solid, rational reasons for it, like safety.”

For those of you who are justifiably enraged/frightened right now, here’s how the WEF comforts you: “If the idea of a chip in your body makes you cringe, consider all the pharmaceuticals you take without question.”

Let’s recap…

Dystopian culture conditions us to eat unhealthy food, remain sedentary and basically ignore the natural order while corporate capitalism turns the planet into a toxic waste dump. When humans get predictably sick by the hundreds of millions, the parasite class is at the ready with promises of wonder drugs for us to “take without question.”

(Context: About 70 percent of Americans take at least one prescription drug per day and the average number of medications taken daily is four.)

Since we were apathetic enough to get sucked into this lethal vortex, we now get told how stupid we sound for fearing implanted microchips when we’re already voluntary lab rats for Big Pharma. Again, CLICK HERE and see it for yourself!

It is long overdue for all of us to protect our personal autonomy and sovereignty and start saying no.

The post Remember When talking About Microchips Would Get You Called a “Conspiracy Theorist”? first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Mickey Z..

]]>
https://www.radiofree.org/2022/08/26/remember-when-talking-about-microchips-would-get-you-called-a-conspiracy-theorist/feed/ 0 326809
Liberty Counsel’s Donor Records and Pro-Trump Election Messaging Exposed in Data Breach https://www.radiofree.org/2022/08/25/liberty-counsels-donor-records-and-pro-trump-election-messaging-exposed-in-data-breach/ https://www.radiofree.org/2022/08/25/liberty-counsels-donor-records-and-pro-trump-election-messaging-exposed-in-data-breach/#respond Thu, 25 Aug 2022 11:00:40 +0000 https://theintercept.com/?p=403289

Liberty Counsel, an evangelical Christian nonprofit that provided a brief cited by the Supreme Court in its decision to overturn Roe v. Wade, has been hacked, revealing a 25-gigabyte internal database that contains nearly seven years’ worth of donor records. The hacker, who identifies with the Anonymous movement, released the data on the hacktivist site Enlace Hacktivista, and the transparency collective Distributed Denial of Secrets is providing it to journalists who request access.

“Noticing a worrying trend of far-right and anti-abortion activists aligning themselves with the evangelical Christian movement, hiding their funding sources behind laws that allow church ministries to keep their donations secret,” the hacker wrote in a press release, “we decided to bring about some much-needed radical transparency.”

In addition to fighting abortion, Liberty Counsel — a Southern Poverty Law Center-designated hate group — has focused its legal efforts on challenging LGBTQ+ rights and vaccine mandates in the name of religious freedom. Because it is registered with the IRS as an “association of churches,” Liberty Counsel is not required to file a public tax return, meaning that its finances are largely shielded from the scrutiny applied to other tax-exempt organizations.

The hacked data includes content from Liberty Counsel’s website, emails the group sent to its supporters, and documentation of about $12 million in donations from some 44,000 donors since 2015. These donations, limited to those tracked on Liberty Counsel’s digital platform, represent only a portion of those the organization receives.

The records show that 501(c)(3) nonprofit organizations controlled by Liberty Counsel encouraged supporters to vote for former President Donald Trump despite IRS rules that prohibit such entities from directly or indirectly endorsing candidates for political office. They also reveal how Liberty Counsel has skillfully employed misinformation and partisan polarization over election integrity and the Covid-19 pandemic to build its email list and raise millions of dollars in small contributions — and done so at a breakneck pace since November 2020.

Liberty Counsel did not respond to multiple requests for comment for this article.

Apart from Liberty Counsel’s data, the hack includes another 425 gigabytes of records from dozens of Christian organizations that used the same customer relationship management software, many of them mission agencies aimed at converting humanity to Christianity.

The Guise of Religious Liberty

After the Supreme Court overturned Roe, Peggy Nienaber, vice president of Liberty Counsel’s Faith & Liberty ministry, was caught on a hot mic at an evangelical victory party bragging that her ministry prayed with sitting Supreme Court justices. Nienaber’s claim, first reported by Rolling Stone, suggested a troubling conflict of interest, considering that the court cited a Liberty Counsel brief in its decision to end 50 years of constitutional protection for abortion.

Faith & Liberty denied that it prayed with members of the court, claiming that the incidents described took place before Liberty Counsel acquired the ministry.

Mat Staver, Liberty Counsel’s founder and chair, has said that he went to law school to further the “pro-life” cause. The organization’s amicus brief in Dobbs v. Jackson Women’s Health Organization, filed on behalf of a group of religious organizations, was a work of dubious scholarship that argued that abortion is a racist tool of eugenics.

Liberty Counsel fought against anti-LGBTQ+ hate crime legislation, calling it a “radical homosexual anarchist agenda.”

Liberty Counsel has also defended so-called sidewalk counselors, who troll outside abortion clinics creating a hostile environment for those seeking care, and challenged the Freedom of Access to Clinic Entrances Act, enacted in the wake of the 1993 murder of Florida abortion provider Dr. David Gunn.

Liberty Counsel’s virulently anti-LGBTQ+ rhetoric and efforts to legalize discrimination in the name of religious freedom led the Southern Poverty Law Center to designate it as a hate group. “The organizations on our hate group list vilify others because of their race, religion, ethnicity, sexual orientation, or gender identity — this includes Liberty Counsel and their vilification of LGBTQ+ people,” said Rachel Carroll Rivas, interim deputy director of research for the SPLC’s Intelligence Project.

Rowan County Clerk Kim Davis, center with Republican presidential candidate Mike Huckabee, left, and attorney Mat Staver, right, founder of the Liberty Counsel, the Christian law firm representing Davis, at her side, greets the crowd after being released from the Carter County Detention Center, Tuesday, Sept. 8, 2015, in Grayson, Ky. Davis, the Kentucky county clerk who was jailed for refusing to issue marriage licenses to gay couples, was released Tuesday after five days behind bars.   (AP Photo/Timothy D. Easley)

Rowan County Clerk Kim Davis, center, with Republican presidential candidate Mike Huckabee, left, and Liberty Counsel Chair Mat Staver, right, greets a crowd after being released from the Carter County Detention Center on Sept. 8, 2015, in Grayson, Ky.

Photo: Timothy D. Easley/AP

Staver has advocated criminalizing homosexuality with harsh punishments as well as “curing” LGBTQ+ people, “a practice that has been condemned by every major medical and mental health organization in the country,” according to the Human Rights Campaign. Liberty Counsel fought against anti-LGBTQ+ hate crime legislation, calling it a “radical homosexual anarchist agenda.” After the Supreme Court legalized gay marriage in 2015, Liberty Counsel represented Kim Davis, a county clerk in Kentucky who refused to issue a marriage license to a gay couple.

More recently, Liberty Counsel has been involved in other right-wing causes. The day after the deadly January 6, 2021, attack on the U.S. Capitol, Staver sent an email to supporters stating that “our research and legal staff have been deeply engaged in stopping the steal of our 2020 elections.” The email, later published as a blog post, stressed that Trump could remain in power if God intervened: “We know God can intervene and turn what looks like a hopeless cause into a miraculous victory!”

During the pandemic, Liberty Counsel lawsuits successfully forced Louisiana State University’s School of Dentistry and Loyola University to abandon their vaccine mandates on religious freedom grounds. Liberty Counsel is currently suing the U.S. government over the military’s vaccine mandate.

Election Intervention

Liberty Counsel, a 501(c)(3) nonprofit, serves as an umbrella to a number of smaller groups, including Liberty Counsel Action, Faith & Liberty, and Christians in Defense of Israel, all of which share the same hacked database. Of these, only Liberty Counsel Action, a 501(c)(4), has an IRS status that allows it to endorse or oppose candidates for office.

While churches and other 501(c)(3) organizations are allowed to take stands on issues like abortion, same-sex marriage, and gun control, the IRS’s Internal Revenue Code prohibits these organizations from engaging in political campaign activity. “Because the IRS has not been very diligent in enforcing the law, many 501(c)(3) groups are pushing the envelope when it comes to politics,” Rob Boston, a senior adviser at Americans United for Separation of Church and State, told The Intercept.

After reviewing the email newsletters and blog posts in the Liberty Counsel data, The Intercept found communications in which both Faith & Liberty and Christians in Defense of Israel encouraged their supporters to vote for Trump during the 2020 election.

“Many 501(c)(3) groups are pushing the envelope when it comes to politics.”

“Today could be a turning point in the history of America. In this great country we have the freedom to vote,” a Faith & Liberty newsletter from Election Day 2020 stated. “A great responsibility rests on our shoulders. Our decision will determine who will nominate judges, and so much more.” The email went on the offensive against then-candidate Joe Biden, referencing reporting from right-wing media about the contents of Hunter Biden’s laptop. It claimed that Biden used “American tax-dollars to bribe foreign nationals to protect his son’s behavior” and “felt so comfortable with this level of corruption that he even bragged about it, on camera.”

During the two weeks before Election Day, Christians in Defense of Israel, also a 501(c)(3), was even more explicit in a series of newsletters. The emails, which promised that a second Trump term would bring peace to the Middle East, outlined points made by David Friedman, the Trump-appointed former U.S. ambassador to Israel. Friedman was also an adviser to Trump’s 2016 election campaign and had previously represented the Trump Organization as a bankruptcy lawyer.

“Israeli Jews support President Trump, because they know under a Trump administration, America has Israel’s back … and peace in the Middle East is on the near horizon,” one of the emails said. “But only if Donald Trump wins. As U.S. citizens, our vote this election will greatly affect Israel’s future, according to the ambassador.Another email warned that “on November 3, the Holy Land is counting on YOU to choose the presidential candidate who will support Israel and complete the work of achieving peace in the Middle East.”

“Some groups will attack a candidate in harsh terms but stop short of telling people not to vote for him/her,” Boston said. “I would interpret this as an obvious backdoor attempt to intervene in an election, but I’m not aware of the IRS interpreting the law that strictly.”

Behind the Scenes

Liberty Counsel’s website is based on the customer relationship management software Site Stacker, which is developed by WMTEK, a company that builds software and services exclusively for Christian nonprofits. WMTEK claims that 33 percent of Christian mission agencies use Site Stacker.

The Anonymous hacker first discovered vulnerabilities in Liberty Counsel’s Site Stacker website — among them, an administrator user who worked for WMTEK used the password “Password1” — and then realized that the rest of WMTEK’s clients were also vulnerable. So the hacker made off with membership and donor records for more than 90 other Christian nonprofits.

In all, the data shows donations to the organizations totaling over $748 million from roughly 409,000 donors, the earliest dating to September 2015. It also includes private information like names, addresses, and phone numbers for about 1.3 million people.

“We have initiated a forensic investigation into these claims,” Dan Pennell, WMTEK’s CEO, told The Intercept in response to questions about the hack. “We will be unable to comment further until we conclude our investigation.”

An administrator user who worked for WMTEK used the password “Password1.”

The security lapses weren’t limited to WMTEK. The hacked data set includes the Site Stacker source code as well as 46 gigabytes of files that were publicly available on Liberty Counsel’s website. The Intercept discovered a folder within these files containing 100 photos of U.S. passports and confirmed that these images were publicly accessible with the right web address — poor protection for such sensitive documents.

While Liberty Counsel is best known for legal battles over abortion and LGBTQ+ rights, the hacked data shows more than $1.6 million in donations resulting from petition and fax campaigns built around dubious claims about the pandemic and election integrity. These campaigns — from Liberty Counsel and its 501(c)(4) affiliate, Liberty Counsel Action — drew more than 15,000 unique donors.

The largest petition included in the data set, launched on the eve of Biden’s inauguration, makes no mention of religion: It warns of “giant pharmaceutical companies in partnership with government officials sweeping harmful and even deadly COVID-19 vaccine reactions under the rug” and demands that politicians oppose unspecified efforts “to make COVID shots mandatory, to require a Vaccine Passport or to electronically track and trace my movements.” Of the 38,000 signatures the petition received, more than 60 percent were new to Liberty Counsel’s email list.

After signing, “freedom-loving patriots” are invited to make a donation. Existing supporters are asked to pay to send a fax, with options ranging from a $5 “basic level” fax to House and Senate leaders up to a “gold level” $75 fax that also includes the Senate Judiciary Committee, all 50 governors, and all Republican members of Congress.

Some donors used their official government email accounts to make contributions.

As email sign-ups increased, digital giving swelled from a monthly average of about $100,000 pre-pandemic to more than $400,000 in the months leading up to the hack. Of the 44,000 donors included in the hack, more than 70 percent appear not to have given before the pandemic.

Some donors used their official government email accounts to make contributions, the hacked records show. Email addresses associated with the departments of Defense, Energy, Health and Human Services, Homeland Security, Interior, Justice, State, Treasury, Transportation, and Veterans Affairs were among those included in the data.

Email addresses associated with state and local governments also made an appearance, including one belonging to Republican Terry Rice, a current Arkansas state senator, whose donation came via a petition decrying “the Democrat push to legalize election fraud.” Rice told The Intercept that he might have made a small donation to Liberty Counsel but doesn’t remember. “I don’t know what business it is of yours,” he said.


This content originally appeared on The Intercept and was authored by Micah Lee.

]]>
https://www.radiofree.org/2022/08/25/liberty-counsels-donor-records-and-pro-trump-election-messaging-exposed-in-data-breach/feed/ 0 326374
Will the Inflation Reduction Act jumpstart carbon capture? https://grist.org/technology/will-the-inflation-reduction-act-jumpstart-carbon-capture-45q/ https://grist.org/technology/will-the-inflation-reduction-act-jumpstart-carbon-capture-45q/#respond Mon, 22 Aug 2022 10:45:00 +0000 https://grist.org/?p=585893 President Joe Biden signed the Inflation Reduction Act, or IRA, into law last week, unleashing hundreds of billions of dollars in tax incentives and rebates to help companies and everyday people transition to clean energy. While some of the new subsidies will expand renewable technologies like wind and solar, the law also offers generous incentives for carbon capture and storage, or CCS — projects designed to trap carbon dioxide emissions from fossil fuel-fired power plants or other industrial facilities, and then pump the CO2 deep underground, preventing it from ever entering the atmosphere. 

CCS has long been controversial due to its high price tag, a history of failed projects, and the ways it enables continued fossil fuel use. There are only a handful of facilities currently capturing carbon in the U.S., and most captured CO2 gets buried in aging oil fields, where it benefits drillers by pushing more oil to the surface. Many climate advocates are skeptical that CCS can meaningfully cut emissions, or do so in a way that doesn’t harm neighboring communities. The Climate Justice Alliance, a coalition of 82 environmental justice groups, denounced the IRA in part because of its subsidies for carbon capture.

But while electric utilities have a lot of options for producing carbon-free power — like solar, wind, and nuclear — experts say that in other carbon-intensive industries, CCS is the most promising climate solution. “The steel industry and cement, they don’t have a very practical decarbonization option without using carbon capture equipment,” said Matt Bright, the carbon capture policy manager at the nonprofit Clean Air Task Force. That’s because steel and cement plants release CO2 from chemical reactions, not just from burning fossil fuels. “All of a sudden, the one technology that’s really viable for them is within reach,” said Bright. 

The IRA makes key changes to 45Q, an existing tax credit for CCS, that make it much more lucrative and easier to access. Before, companies could earn up to $50 for every metric ton of CO2 sequestered — or $35 if they buried the CO2 in the process of oil extraction. Now, they can earn $85 or $60 per metric ton, respectively. (Note: The IRA tax credits also support a related technology called direct air capture, which removes carbon dioxide that has already been emitted from the atmosphere. However, this article is focused solely on carbon captured from polluting sources.)

Companies will also have more time to develop projects. Previously they had to start construction on the capture equipment by 2026 — a tight deadline considering it can take two to three years to get financing together and complete initial project planning, according to Bright. Now the deadline is 2033. 

The IRA also opened the door for companies with smaller tax liabilities to take advantage of 45Q by allowing the tax credit to be collected as a direct cash payment, rather than a tax deduction, for the first five years a CCS project operates. After five years, the direct pay option will expire, but the credits can then be transferred to another company with a bigger tax liability in exchange for a check. 

A fourth change is that the IRA dramatically lowers the total amount of CO2 that a project has to capture each year to qualify for the tax credits. Bright said this would enable smaller facilities that emit less carbon to pursue CCS.

However, there’s a chance this could lead to subsidies for large polluting plants that only capture a portion of their emissions. There’s one guardrail against that happening — for power plants, the CCS system must be designed to capture at least 75 percent of CO2 emissions from each unit of the plant it is installed on. It’s a low threshold, considering that proponents advertise that the tech can achieve upwards of 90 percent capture rates. Joe Smyth, a researcher at the nonprofit Energy and Policy Institute, also noted that past projects have failed to capture carbon at the rates they have been “designed” for. “If you’re designing for 75 percent, and it’s encountering some problems so it has to be turned off or fixed or whatever, you’re probably still going to be running the power plant,” he said. But Bright said that developers will have every incentive to capture as much as possible, since CCS is a multimillion dollar investment, and the tax credit is paid out per metric ton of carbon trapped.

The IRA is expected to help the U.S. reduce overall emissions by about 40 percent below 2005 levels by 2030, compared with the 24 to 32 percent cuts we’re on track for today. But estimates of the role CCS will play in achieving that vary. A widely cited analysis of the IRA by the consulting firm Rhodium Group found that CCS could account for between 4 and 6 percent of that progress, and much more in the immediate years afterward. A separate analysis by researchers at Princeton University found potential for CCS to grow much faster, contributing as much as 20 percent of additional emissions cuts by 2030, and that nearly 1 billion metric tons of CO2 could be buried by that time

The REPEAT project, led by Princeton researchers, finds that the new tax credits make CCS so financially attractive that the U.S. could be capturing and storing 200 million metric tons of carbon per year by 2030. REPEAT Project

However, a cost estimate of the IRA conducted by a congressional research agency came to a very different conclusion. It estimated that the new CCS tax credits will cost the government $3.2 billion over the next decade. At most, that would mean sequestering a total of 53 million tons of carbon if it was all used for oil extraction, or 38 million if the CO2 was solely buried underground.

It’s also not yet clear where CCS will take off. To date, much of the debate over CCS has centered around installing it on power plants. You might have heard of “clean coal,” a marketing campaign for carbon capture on coal-fired power plants. The Department of Energy spent hundreds of millions of dollars over the past decade to support CCS projects on coal-fired power plants in the U.S., but there is currently only one such plant operating in the world, and it’s in Canada. More recently, electric utilities have suggested they might explore CCS on natural gas power plants

But while the Princeton group’s model predicts there will be roughly equal interest in sticking capture equipment on power plants as on other industrial facilities, the Rhodium Group analysis forecasts almost no CCS projects in the power sector. Ben King, one of the modelers at Rhodium Group, said that with provisions in the IRA for wind and solar, plus a new tax credit for keeping nuclear plants online, the 45Q subsidy just doesn’t make coal or natural gas plants with CCS cheap enough to compete. 

bar graph showing carbon capture growing to about 100 million metric tons by 2030
Rhodium Group found that the IRA could spur approximately 100 million metric tons of CCS annually by 2030, and much more in the years after — but found it unlikely CCS would take off in the power sector. Rhodium Group

Of course, there are a number of factors the models don’t or cannot take into account. Smyth, from the Energy and Policy Institute, a watchdog for the utility industry, said that in states like Wyoming and West Virginia where the fossil fuel sector is central to the economy, power plant owners will face pressure from elected officials to pursue carbon capture, even when it doesn’t make sense financially.

In a letter defending the IRA to the West Virginia Coal Association, Senator Joe Manchin, a key architect of the bill, wrote that he “fought for and delivered billions of dollars to help the coal industry transition by investing in the technologies necessary to continue using coal as a reliable source of power generation.” He argued that the direct pay option for CCS tax credits gave it an advantage over renewables.

Smyth said coal CCS projects come with a “whole host of concerns that are not addressed, and in some cases are exacerbated by carbon capture.” For example, even if the capture system works perfectly, it can lead to increased coal mining in order to power the carbon capture equipment. Burning that extra coal means producing more coal ash, a toxic waste product, and using more water to cool the plant. Depending on the other pollution controls installed on the facility, it can also mean creating more air pollution — which is likely to disproportionately harm Black and low-income people

According to Smyth, the biggest determinant of whether “clean coal” lives or dies will be new pollution regulations that the Environmental Protection Agency will propose next year for coal power plants. The cost of compliance might be enough to end coal-fired electricity altogether. 

In hard-to-decarbonize industries, the margins for CCS will still be tight. Bright said that estimates for capturing carbon at a cement plant, transporting it to where it can be pumped underground, and injecting it, fall in the $65 to $100 range per metric ton of CO2. For steel, they are in the $80 to $90 range. That means the tax credit may not fully cover the costs of CCS. These industries might face pressure from investors to decarbonize, but in most cases have no legal obligation to cut carbon.

And perhaps most importantly, the rosy forecasts for CCS do not account for a significant unknown moving forward: To make CCS work, developers not only need to install the capture equipment, but to build potentially thousands of miles of pipelines to transport the CO2 and injection wells to send it underground. “Can that happen? Like is that going to happen to the degree necessary to enable the level of deployment that we’re seeing in our modeling? I think that’s probably one of the biggest questions,” said King.

Right now, farmers and environmental groups in the Midwest are fighting to stop carbon capture companies from building CO2 pipelines. In Louisiana, where Black communities live in the shadow of refineries, chemical plants, and other polluting facilities, people would rather see those plants shut down than maintained with carbon capture equipment. Tamara Toles O’Laughlin, CEO of the Environmental Grantmakers Association and a prominent climate justice advocate, is worried that communities won’t have the power to decide whether or not they host these projects. She said that vulnerable people “are going to need a platform, information, and resources to make decisions about carbon capture amongst options, which should include a bigger share of keeping it in the ground.”

Opposing forces are at work here: In February, the White House Council on Environmental Quality issued guidance to government agencies to ensure that carbon capture “is done in a responsible manner that incorporates the input of communities.” However, Manchin only agreed to vote for the IRA because of a side deal to advance legislation that will ease the permitting process for energy projects, potentially limiting community engagement.

“It is concerning that the first climate bill in U.S. history invests so much of the peoples’ risk capital in carbon capture,” said O’Laughlin. “Tax credits will increase the number of speculators in the space, ramp up the number of experiments and create a wave of places where communities will have to advocate for themselves to separate the grifters and greenwashers from real community benefits.”

This story was originally published by Grist with the headline Will the Inflation Reduction Act jumpstart carbon capture? on Aug 22, 2022.


This content originally appeared on Grist and was authored by Emily Pontecorvo.

]]>
https://grist.org/technology/will-the-inflation-reduction-act-jumpstart-carbon-capture-45q/feed/ 0 325526
Stumbling Surveillance: The end of the COVIDSafe App https://www.radiofree.org/2022/08/15/stumbling-surveillance-the-end-of-the-covidsafe-app/ https://www.radiofree.org/2022/08/15/stumbling-surveillance-the-end-of-the-covidsafe-app/#respond Mon, 15 Aug 2022 04:44:04 +0000 https://dissidentvoice.org/?p=132540 It took a few years of tolerable incompetence, caused fears about security, and was meant to be the great surveillance salvation to reassure us all.  Instead, Australia’s COVIDSafe App only identified two positive cases of infection during the SARS-CoV-2 pandemic, and failed, in every sense of the term, to work. Launched in April 2020, this […]

The post Stumbling Surveillance: The end of the COVIDSafe App first appeared on Dissident Voice.]]>
It took a few years of tolerable incompetence, caused fears about security, and was meant to be the great surveillance salvation to reassure us all.  Instead, Australia’s COVIDSafe App only identified two positive cases of infection during the SARS-CoV-2 pandemic, and failed, in every sense of the term, to work.

Launched in April 2020, this AU$21 million platform was heralded as a great tool for pandemic surveillance.  It was one of many such digital responses used by countries to combat viral transmission.  China adopted the Alipay Health Code app, which shares location data with police authorities.  Users receive various codes denoting status: red for those needing to spend two weeks in isolation; yellow for those needing to self-quarantine; and green for those able to move about freely.  India has Aarogya Setu; England and Wales, the NHS COVID-19 app.

As Privacy International observes, the spread of these apps, some voluntarily applied, others not, had a range of consequences.  Data might be generated without the user’s involvement.  Data might also be lifted from the relevant device.  Some apps might store data locally or convey it to servers.  “And they can leak data to analytics firms and social media platforms.”

COVIDSafe relied on Bluetooth signals transmitted at intervals to nearby users, with those testing positive would trigger a process by which state and territory authorities could request access to the phone to identify other potential infections.  The close contacts would have to be within 1.5 metres of each other for at least 15 minutes.  In principle, this was meant to lead to improved contact tracing, more effective isolation protocols and enable more restrictive measures to be eased.

From the start, the project seemed plagued.  There were questions about the exposure window and how viable it was, notably in the face of more infectious variants.  There were concerns that user data in the national data store could become accessible to the US government, given the awarding of the data-storage contract to Amazon Web Services (AWS), a cloud subsidiary of Amazon.  By the end of April 2020, 3 million Australians had downloaded the app.  In total, there were 7.9 million downloads.  The measure of success for the program, in other words, became one of downloading an app rather than its supposed effectiveness.

Users were assured that little needed to be done for the app to successfully operate.  “Your phone does not need to be unlocked for the app to work,” Minister for Government Services Stuart Robert claimed in an unconvincing statement.  Users were also encouraged to “have the app running in the background when they are coming into contact with others.”  This betrayed a lack of technological savvy habitual among cabinet ministers.

In the view of the Minister for Social Services Anne Ruston, the app was part of an effort to empower Australians “to proactively limit the spread of the coronavirus and protect the community.”  Having such a mechanism in place would “help protect the lives and health of the Australian community to make sure that we are in a position to quickly respond and be able to trace people if they have come into contact with somebody who has the virus.”

But the government’s own assessments revealed that the app only worked effectively on locked iPhones about a quarter of the time, if that.  As of late April 2020, documents from the Digital Transformation Agency found that the app’s qualities in communicating between two locked iPhones was “poor”.  The same finding was made for encounters between locked Android to iOS services and active Android to locked iOS devices.

The rating for unlocked or active iPhone-to-iPhone encounters was, by way of contrast, “excellent”, logging in a success rate of 80-100 per cent.  But the latter rate was fairly meaningless, given that iPhone users are, for reasons of privacy, encouraged to maintain a default lock setting.

With COVIDSafe’s effectiveness coming into question, the strategy of the Morrison government moved from the silver bullet to the general plan.  The digital tool was to be but one element in the overall battle against the pandemic, complementing, in Ruston’s words, “the existing manual process by which we currently trace and track people.”  It could be likened to, as Prime Minister Scott Morrison did with trivialising ease, donning sunscreen before heading out the door.

A subsequent government report into the app, released on July 29th, 2021, chose to avoid some of the more glaring problems in the enterprise.  Even then, the authors had to concede that COVIDSafe was “rarely” resorted to by public health officials “except to confirm cases identified through manual processes.”  This, the reasoning went, was due to low rates of community transmission and formidable manual contact tracing.  The app’s failure, in other words, was a sign of the country’s success.

A less than flattering counter report by software developers Richard Nelson, Jim Mussared and Geoffrey Huntley, along with cryptographer Vanessa Teague, noted a lack of “deep discussion of changes made throughout the app’s development which heavily impacted efficacy, and fails to disclose key information such as the number of active users of the application.”

This stood in sharp contrast to the peer-reviewed study, published in Nature, which considered the epidemiological impact of the NHS COVID-19 app developed in the UK.  In that case the National Health Service abandoned initial connection methods based on Bluetooth, implementing, instead, Apple and Google’s Exposure Notification Framework.

As the critical multi-authored study of COVIDSafe concludes, “Almost all of the serious security bugs, privacy issues, and bugs affecting efficacy that were present could have all been avoided by using the Exposure Notification Framework, keeping public perception  high.”

A few spluttering apologias can be found in defence of the app.  One effort can be found in that dullest of fora, The Conversation.  That contribution, sterilised and pasteurised, tries to be optimistic about a profligate, failed exercise.  “One of the goals of COVIDSafe was to automate the manual work, to help the efforts of contact tracers at scale.  This goal was achieved, although the value and effectiveness are questionable, as we discuss below.”

Then comes the following, which suggests a lamentable ignorance of the implications of surveillance.  “Getting so many Australians to download new and contested technology is an unparalleled achievement.  While the number of downloads doesn’t tell us how many people were actively using the app, it shows some success in getting people to at least download and engage with it.”

This relish for technological utopia can only take us so far before disgust sets in.  The issue for such believers is not how good the effort was, but the fact that it was tried by the unsuspecting.  And not only that, “COVIDSafe struck a balance between being aesthetic and relatively easy to use.”

In future, those in the business of dolling out such health initiatives should think more carefully.  These systems may be intended to keep public trust afloat but can have quite the opposite effect.  Ultimately, the proof of COVIDSafe’s great demise can be found in the number of individuals who consented to having their data added to the National COVIDSafe Data Store for reasons of contact tracing.  While there were 7.9 million registrations of the app between April 2020 and May 2022, fewer than 800 gave consent to that measure.  As Australia’s current health minister, Mark Butler, opined, the entire endeavour was a monumental waste.

The post Stumbling Surveillance: The end of the COVIDSafe App first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2022/08/15/stumbling-surveillance-the-end-of-the-covidsafe-app/feed/ 0 323592
Papuan advocacy group calls for New Zealand scholarship to aid students https://www.radiofree.org/2022/08/14/papuan-advocacy-group-calls-for-new-zealand-scholarship-to-aid-students/ https://www.radiofree.org/2022/08/14/papuan-advocacy-group-calls-for-new-zealand-scholarship-to-aid-students/#respond Sun, 14 Aug 2022 14:42:01 +0000 https://asiapacificreport.nz/?p=77849 Asia Pacific Report newsdesk

A Papuan student advocacy group has called for the establishment of a future Aotearoa New Zealand scholarship for West Papuans to replace a controversial Indonesian-funded programme that left many students stranded this year with incomplete studies.

The call has been made by the Papuan Students Association Oceania (PSAO) as a cohort of students celebrated the graduation of two commercial pilots this month.

They also marked the success of fundraising and pastoral support for students who remained in New Zealand to complete their studies in spite of the hardships created by a sudden loss of Papuan provincial scholarships at the end of last year.

Community, faith-based, social justice and student groups have raised more than $70,000 in relief programmes aimed at assisting with accommodation, student fees and living costs.

Speaking on behalf of PSAO, student advocate Laurens ikinia, a postgraduate communications student at Auckland University of Technology (AUT), praised the help of many New Zealand groups which have in recent months filled the gap left by the “unjust cancellation” of Papuan provincial scholarships for about 40 students.

He said in a message to support groups and political parties which have assisted that the International Alliance of Papuan Student Associations Overseas (IAPSAO) and the parents and whanau of the affected students had expressed “thank you for your kind support and solidarity, generous donation, faithful prayers and moral support during our difficult times.”

Ikinia said that out of the 41 affected students, 12 had been forced to return to West Papua for several reasons.

Generous support
“The remaining 28 students who are currently studying at different tertiary institutions and one student at a high school have benefited from [New Zealanders’] generous support. All of them have gratefully expressed their gratitude and aroha,” he said.

“We sincerely thank you for being part of our life’s journey through the unprecedented struggle that we have faced. We will remember and cherish them for our lifetime.”

The message was conveyed to New Zealand while students were marking the success of Papuans Stevi Yikwa and Logo Albert gaining their commercial pilot’s certificates at the Ardmore Flying School near Auckland.

Eight students who have completed their carpentry course at Palmerston North polytech UCOL have also been granted work visas through Pro-Construction in Manawatū.

Other students are at AUT, IPU New Zealand, Massey University, Otago University, Victoria University of Wellington and Waikato University.

As well as support from Labour and Green MPs, the students have been helped with fundraising efforts by the All Saints Anglican Food Bank, Auckland Central Parish of the Methodist Church, Church Unlimited, Dominican Sisters, Fielding Activate Church, Grace City Church (Palmerston North), Indonesian Catholic Community (Auckland), Indonesian Christian Community (Pamerston North), Onehunga Food Bank, Pax Christi Aotearoa, PNG community in Palmerston North, Rotuman Community Centre and Whānau Hub, Sisters of Our Lady of the Missions, West Papua Action, West Papua Movement Aotearoa and many others.

The Papuans have also been boosted by support from AUT Melanesian Wantoks,  New Zealand International Students Association (NZISA), New Zealand Union of Students Association (NZUSA) and Taura Pasifika

Scholarships next step
However, Ikinia said the next challenge was to try to establish future scholarships for indigenous Papuans in New Zealand similar to those offered for Timorese-Leste and Pacific Islands students.

The Papua provincial government’s Foreign Scholarship programme introduced by Governor Lukas Enembe in recent years will wind up by the end of 2022.

Ikinia said one of the key factors in the ending of the scholarship was the loss of the governor’s independent authority over education funds under Indonesia’s controversial Special Autonomy Law (OTSUS) volume ll in the Melanesian provinces.

Also Governor Enembe’s second term is due to end by the end of 2023.

Commentators are warning that there will be “political and bureaucratic instability” in Papua due to the unpopular establishment of three new provinces that is being widely resisted by Papuan civil society.

Papuan students who are studying in New Zealand who are not on the scholarship termination list will still face uncertainty for the future.

The students are appealing to MPs and political party leaders, NGOs, churches, community groups, iwi, unions and other stakeholders to join their appeal for annual indigenous Papuan student scholarships.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2022/08/14/papuan-advocacy-group-calls-for-new-zealand-scholarship-to-aid-students/feed/ 0 323544
Russel Norman: Don’t be fooled by NZ greenwashing, the lack of real climate action is dangerous https://www.radiofree.org/2022/08/12/russel-norman-dont-be-fooled-by-nz-greenwashing-the-lack-of-real-climate-action-is-dangerous/ https://www.radiofree.org/2022/08/12/russel-norman-dont-be-fooled-by-nz-greenwashing-the-lack-of-real-climate-action-is-dangerous/#respond Fri, 12 Aug 2022 08:27:08 +0000 https://asiapacificreport.nz/?p=77765 ANALYSIS: By Russel Norman, executive director of Greenpeace Aotearoa

Only people power can ensure genuine enduring progress on climate and people need to know the truth if they are to act on it. For that reason greenwashing is the enemy of progress on climate and where you stand on greenwashing is the Rubicon of our times.


I have spent decades of my life as a climate activist fighting various deliberate forms of climate science denial propagated by climate polluting companies and their allied political parties, politicians, lobby groups and commentators.

The good news is that we have mostly won that battle. The bad news is that they have a new tactic, greenwashing, which is now a major obstacle to progress on climate change. Greenwashing is when businesses or politicians give a false impression, or spin, on their products or policies to give the impression that they have a positive impact on the environment when they don’t.

We now face a new landscape in which even oil companies claim to be doing their bit for the climate with “carbon offsets” and “2050 net zero goals”. Their aim is to stop real action on climate by making people think it is all under control.

One of the jobs of the government is to sort out the real climate actions from the greenwashing, to hold industry to account. And of course, one of the jobs of the government is to not engage in greenwashing themselves.

The problem with some of the actions of the current Aotearoa New Zealand government is that rather than holding business to account for its greenwashing, on some vital climate issues the government is actually a proponent of greenwashing.

This greenwashing is closely linked to a wrong-headed theory of change which we hear repeatedly from this government — the idea that climate issues can only be solved through consensus, especially consensus with the polluters and their representatives. The idea that we can’t make real policy to cut climate pollution without the consent of the polluters and their representatives is dangerous and inconsistent with the history of making change.

There are fundamental conflicts in the climate policy space — some industries will not accept that they need to cut emissions. The attempt to gloss over these conflicts and seek consensus means the government adopts policies that the polluters will accept, and which consequently do not cut emissions. This policy outcome is then sold to the public as a great victory when in truth it is a defeat — it is greenwashed.

Before getting into the specifics of the problems I want to acknowledge that this government has done some good things on climate. The ban on new oil and gas exploration permits was a win, even though it excluded onshore Taranaki and allowed existing permits to be extended.

The cap on synthetic nitrogen fertiliser was a win, even though it is a very high cap which has yet to be enforced. Greenpeace publicly celebrated these wins and congratulated the government on making these decisions, even while pointing out their limitations.

I tried to provide a transparent assessment of the environmental performance of the Ardern government back in 2020. I spent a decade as Green Party co-leader and I know there are wins and losses in politics and that compromise is a reality of politics in a healthy democracy.

But honestly admitted compromise is one thing, and greenwashing is another.

There will always be arguments as to what is an acceptable political compromise. We need to separate the issue of what is an acceptable compromise to enter government from the issue of greenwashing. Determining what is an acceptable compromise for the Greens to join the Labour government is formally a matter of decision for the Green Party and the Labour Party rather than the climate movement.

People like me are entitled to our views of the compromise, but it is the Green Party and the Labour Party that have to decide if it’s worth it. I am not a member of the Green Party or the Labour Party.

The issue of greenwashing, however, is an issue which is of direct and immediate concern for the wider climate movement. This is because when the government sells their policies as great climate advances, when in reality they are not, it misleads the wider public and the climate movement.

People can think they don’t need to push hard on climate because it is under control, when it is not. We then need to spend our time highlighting and explaining why the claimed win is actually spin, rather than campaigning for meaningful action.

This undermines our ability to get more significant progress on climate policy because the power and leadership to get progress on climate (like all other progressive issues) comes from civil society and if civil society is disarmed by greenwashing then climate policy follows dead end paths, stalls or  stops.

But why is greenwashing the biggest challenge the climate movement faces at the moment. How did we get here?

Goals remain unchanged, but tactics evolve
As I mentioned above, the first thing to understand is that climate policy is unavoidably and irrevocably conflictual, and hence political. That is because on the one hand the enduring overarching goal of big climate polluters in the fossil fuel business and industrial agribusiness is to prevent government regulations that will force them to cut their climate emissions.

While on the other hand the climate movement aims for emission cuts to achieve a stable climate.

This is a fundamental conflict globally, and in Aotearoa, and no amount of pseudo consensus can wish this conflict away.

Big climate polluters believe, rightly, that government regulation and pricing to drive emissions reductions threatens their business models and profitability. Other sectors of the economy, such as IT, can more easily adapt to a low carbon future, but those businesses in the industries like coal and synthetic fertiliser can’t adapt, and they intend to fight efforts to cut emissions all the way.

While their goal of preventing government regulation to force reductions in emissions has remained consistent, their tactics to achieve this goal have changed. And it is understanding the way their tactics have evolved that it becomes clear just how problematic the current government’s climate policies have become.

At the beginning the tactic they used was to deny the compelling weight of scientific evidence supporting the theory of human induced climate change. Climate denial was stock in trade for many right wing parties and agribusiness and oil industry lobby groups from the 1990s through to the 2010s.

But after a while that stopped working so they changed tactics to stressing uncertainty especially in the 2000s. They said climate change might be a thing, but there is so much uncertainty so we shouldn’t do anything about it. They played up the nature of scientific inquiry — that theories are not beyond questioning because they are not religious texts — to emphasise uncertainty and the need for delay. It was really just another form of climate denialism.

Billions spent on climate denialism
The polluting industries spent billions promoting climate denialism and uncertainty in order to block government regulation to cut emissions. They bought politicians, public relations firms and sadly some scientists to promote these ideas to delay action on climate. Their ideas were reproduced widely by the conservative commentariat, and many still are.

I spent many years of my life fighting climate denialism and eventually through the efforts of millions of climate activists we (mostly) won the battle against climate denialism. There are now few major governments or corporations or industry lobby groups that rely on climate denialist arguments to block government regulation to cut emissions.

Straight out climate science deniers have been pushed to the margins like Groundswell or the Act Party.

But the goal of the fossil fuel and agribusiness polluters remains consistent — they still want to stop government regulation to cut emissions — so they need a new tactic. And that tactic is greenwashing.

These days the polluters and their representatives say, “yes climate change is a thing” and “yes we should do something about it and you will be happy to know that we are doing something about it.”

Hence, they argue, there is no need for government regulation. Even though they spent the last 30 years blocking every attempt to reduce emissions and even denying climate science, they argue that they now take it seriously and there is absolutely no need for the government to do anything.

And what they are doing is often nonsense like net carbon zero targets in 2050 or buying offshore carbon credits or an industry controlled pricing mechanism like He Waka Eke Noa, or nitrification inhibitors etc. They don’t actually cut emissions in any significant way.

The purpose of greenwashing may seem relatively retail when it is done by a single company to sell stuff to consumers, but at a systemic level the purpose of greenwashing is to head off government attempts to introduce regulations and pricing that will force emission reductions.

There are of course some corporations and governments taking significant actions to cut emissions, but there are also many corporate and government actions that are just greenwashing.

Separating out the genuine climate actions from greenwashing is something that defines the climate politics of our time. And this is why the approach taken by the New Zealand government is so very problematic. People assume that the Climate Minister, especially a Green Party Climate Minister, will not perpetuate greenwashing, and will call it out, but it has not always been the case with James Shaw, and that makes it all the more insidious.

Government greenwashes the biggest polluter: Agribusiness
Which brings us to the problem with the current New Zealand government climate policy. Climate policy in this country mostly boils down to what you are doing about agribusiness emissions (biogenic agriculture emissions alone are about 50 percent of emissions) and transport (20 percent). The rest matters too but if you aren’t tackling these two then you aren’t tackling climate change.

Transport policy has not been great from a climate perspective but here I want to focus on the bigger problem — agribusiness — particularly intensive dairy.

We have had the same Prime Minister and the same Climate Minister for the nearly five years of this government. There have been a plethora of nice sounding climate announcements — the PM said that climate was her generation’s “nuclear free moment”, we’ve had the so-called Zero Carbon Act, a climate emergency declaration, an independent climate commission established, emissions reductions plans, improved nationally determined targets for reduction, signed the global methane pledge etc.

But there is still no effective government policy to cut emissions from agribusiness, by far the biggest polluter.

The problem is not just that the government is doing virtually nothing to cut emissions from agribusiness, the problem is that it is saying that it is taking climate change seriously.

It is equivalent to the Australian government doing nothing about coal or the Canadian government doing nothing about tar sands oil — all while telling us how seriously they take climate change. This is greenwashing and it is dangerous because many people think climate action is happening.

When the claims of meaningful action are fronted by a “nuclear free-moment” Prime Minister and a Green Party Climate Minister – the general observer could be forgiven for trusting that those claims are true.

The evidence that this government has done very little to cut agribusiness emissions is bountiful but let me focus on just one central area — agriculture and the Emissions Trading Scheme (ETS).

Taking government at its word
The government repeatedly tells us that the Emissions Trading Scheme is the most important tool to cut emissions. This is debatable but let us take them at their word.

If it is so important then why, 14 years after the ETS began in 2008, is the biggest polluting sector, agribusiness, still exempt from the ETS? For 14 years agribusiness lobbyists and industry groups such as Federated Farmers and Dairy NZ have successfully fought a battle of predatory delay to stop their sector facing a price on emissions, apparently the most important climate tool.

And every government (Clark, Key, Ardern) has given them exactly what they want — perpetual delay.

When the ETS was passed into law in 2008, the Labour government of the day delayed agriculture’s entry until 2013. A bad start.

At the time, myself and many others argued against the delay but the Clark government wouldn’t budge. The John Key-Bill English National government (2008-2017) that followed, delayed agriculture’s entry indefinitely. From the perspective of agribusiness, delaying is winning, and they were winning.

For a moment in 2017/2018 it looked like the newly elected Ardern government might have the courage of its convictions and that the agribusiness lobby would finally lose its battle to stop climate action.

The Labour-NZ First coalition agreement explicitly committed them to support agriculture’s entry into the ETS at 5 percent of its obligations. With NZ First’s vote secured, there was a Parliamentary majority to bring agriculture into the ETS. Finally.

Backed down under pressure
But then in 2019 the Jacinda Ardern and James Shaw backed down to agribusiness pressure and instead of agriculture facing a price on its emissions they adopted an industry proposal — He Waka Eke Noa.

He Waka Eke Noa was a proposal from agribusiness for a joint government-agribusiness initiative looking at pricing agribusiness climate pollution. In effect He Waka Eke Noa handed over to industry the design of the system to price their own pollution. New Zealand agribusiness was beside themselves with joy.

In time it would become clear that it was not just that industry would design the system, but they would design a system that they would control going forward.

And, the target date for starting pricing was 2025. That was two elections away — 2020 and 2023 —  and the chances of the current ministers still being there was remote. And if they did manage to win in 2020 and 2023, it was almost unheard of for a government to win a fourth term in 2026 so anything implemented in 2025 could be easily undone.

He Waka Eke Noa’s timelines left the industry partying. And as for the politicians, none of them were likely to be around to get the blame when nothing happened either.

Prime Minister Jacinda Ardern alongside Dairy NZ's Tim Mackle
Prime Minister Jacinda Ardern alongside Dairy NZ’s Tim Mackle. Image: Greenpeace

In one of the defining moments of this government’s climate inaction, Jacinda Ardern and James Shaw stood next to Dairy NZ and Federated Farmers to launch the five year He Waka Eke Noa project, instead of implementing their own policy of immediately putting agriculture into the ETS.

James Shaw celebrated He Waka Eke Noa and went so far as to say “nothing about us without us” —  that is he used the slogan of the disability advocacy movement to infer that the agribusiness sector shouldn’t be regulated without their consent and agreement. That was a real low point I must say.

Predictably, three years of delay later, in 2022, the final report from He Waka Eke Noa was released detailing a complicated system that would cut agribusiness emissions by less than 1 percent. The headline reduction was higher but that is because it included the reductions that are supposed to come from technologies that don’t currently exist (magic bullets), the reductions that result from the unrelated freshwater regulations, and the reductions that come out of the waste sector.

Incidentally agribusiness has been saying those same magic bullets have been just around the corner for the last 20 years. If you strip out reductions projected to come from magic bullets, freshwater regulations and waste, the emissions reductions from the He Waka Eke Noa pricing mechanism are less than 1 percent. In addition, under the proposal industry would control the mechanism for regulating their own pollution — classic industry capture.

From the industry perspective He Waka Eke Noa was designed to stop government regulation i.e. stop agribusiness going into the ETS. Under criticism from Groundswell, both Federated Farmers and DairyNZ touted their achievement in keeping their industry out of the ETS.

The National Party also voiced its support for the final report. The Climate Minister was a little more muted.

Most people listening to the government talk about He Waka Eke Noa would think that it has been a tremendous success — after all doesn’t the government always say it wants consensus on climate? Whereas in fact its sole success has been to delay government regulation of agribusiness climate pollution — by three years so far — and, even if it were implemented, by its own calculations emissions would be reduced by less than 1 percent.

That is what consensus with polluters looks like and that is the corner that Ardern and Shaw have painted themselves into.

The purpose of greenwashing is to make us think industry is finally taking climate seriously and hence there is no need for government regulation, while in reality very little is happening to cut emissions.

He Waka Eke Noa is a perfect example of greenwashing:

  • It looks like industry is taking climate change seriously with media coverage of all their hard work;
  • The new scheme, if it is implemented, is controlled by industry, so full industry capture;
  • The scheme has almost no impact on actually reducing emissions; and
  • Even if, god forbid, the government were to reject He Waka Eke Noa and instead revert to putting agribusiness into the ETS when it makes a decision in late 2022, it is too late for that decision to be fully institutionalised before the next election, so it will be easily removed if there is a change of government in 2023 and not so hard even after the 2026 election. Predatory delay has been such a successful tactic so far for the industry, why change now?

The Glasgow target
The decisions by this government not to cut agribusiness emissions created cascading international problems of perception for the New Zealand government when it was required to offer a new target for emissions reductions at the Glasgow climate conference in November 2021.

The government wanted to look good with an ambitious target (known as a Nationally Determined Contribution) but had few policies to actually cut emissions. Other countries were raising doubts about the government’s climate commitment. The ETS was supposed to do the heavy lifting but, as the Climate Commission admitted recently, under current settings the “NZ ETS is likely to deliver mostly new plantation forestry rather than gross emission reductions”.

The answer was to use the potential future purchase of overseas carbon offsets to present a net target that looked ambitious.

The Climate Minister announced with great fanfare that New Zealand would commit to a 50 percent cut in net emissions below 2005 levels by 2030. NZ paraded its 50 percent target around the Glasgow climate conference. It sounds good until you realise not only does the target use tricky accounting to make it look much larger than it is, but that TWO THIRDS of the emissions reductions would come from buying offshore carbon offsets.

Sorry about the shouty capitals but nothing yells “greenwashing” quite like offshore carbon offsetting. Carbon offsets are notoriously corrupt, open to double counting, and are the carbon equivalent of papal indulgences. They are what you do when you don’t have policy to cut emissions but want to look good.

Yet this is the government’s plan to reach our international climate target — greenwashing. The Climate Commission has urged the government to contract the offsets fast: “It is essential that the government secure access to sources of offshore mitigation as soon as possible”. Instead of, you know, actually cutting emissions.

And just to show the government is not without a sense of humour they signed up to the global methane pledge to cut methane emissions — without a plan to cut methane emissions! In fact, in case industry was worried, when Shaw returned from Glasgow he confirmed that the government would not introduce any new policies to cut methane. Moooo.

But what about the giant climate bureaucratic superstructure?
Faced with this evidence of greenwashing on agribusiness and the Nationally Determined Contribution (NDC) some people say “what about the Zero Carbon Act”? That proves they are serious doesn’t it? I think that we do need institutional reform to deal with climate, and I’ve pointed to what we need and some of the problems of the Zero Carbon Act before, but it should not be at the expense of immediate climate action.

Much of the government’s climate policy focus in the last five years has been on building an elaborate climate bureaucratic structure. This began with the years-long process to get cross-party support for the Zero Carbon Act, the years-long process to establish the Climate Commission, then there was the years-long processes to build the carbon budgets and the Emissions Reduction Plan.

These structures and processes do look good but they don’t cut emissions – only regulations and policies that cut emissions actually cut emissions. Now you might argue that over time this bureaucratic superstructure will lead to significant emission reductions, and maybe they will, and maybe they won’t, and maybe they can be improved.

The problem is we don’t have years to wonder and hope. We need to have been tangibly cutting actual emissions for the last five years, and cutting them harder over the next five, if we are to play any part in stalling global climate catastrophe.

Spending five years on not implementing much policy to cut emissions, in order to implement a bureaucratic superstructure that might result in emissions cuts down the road if a future government has the courage to use the climate superstructure to implement the policies that this one has not, is plainly not a serious policy to cut emissions. Just implement the policies.

However, in agriculture, our biggest polluter, there is no ambiguity that this climate policy structure has delivered nothing. The Emissions Reduction Plan (ERP) has almost nothing to offer except magical technologies that don’t currently exist. The government’s excuse for offering no serious policy on cutting agribusiness emissions in the ERP is, you guessed it, He Waka Eke Noa. Predictably Federated Farmers really liked the Emission Reduction Plan, because it, you know, didn’t reduce agribusiness emissions!

The 2022-23 Budget that followed the ERP allocated $710 million over four years to agribusiness climate initiatives, but it turns out the money is to look for magic bullets to cut emissions. And some of these magic bullets might be worse — recently $11 million was given to research nitrification inhibitors that kill soil biology in order to cut nitrous oxide emissions following the application of synthetic nitrogen fertilisers.

Killing our soils is the exact opposite of what we need to do. The money in the ERP comes from ETS revenue paid by others, because agribusiness is not required to pay into the Emissions Trading Scheme. It is a giant subsidy from everyone else to agribusiness to maintain the pretence of climate action.

It seems a big price to pay to maintain the pretence — it would be a lot cheaper just to paint the cows green.

Some might argue that the climate bureaucratic superstructure may not achieve much in reality, but it is not actually harmful. Sure, the argument goes, this elaborate policy superstructure has wasted lots of time and energy which could have gone into policies that would actually cut emissions, but it is harmless enough.

Well, maybe you’d only think that if you haven’t been following the litigation. Crown Law, the government’s lawyers, are using the Zero Carbon Act etc to actually block climate action in the courts. Here are two quick examples.

In the most recent case against the Energy Minister’s decision to issue more onshore oil and gas exploration permits, the Minister’s lawyers argued that the Zero Carbon Act allowed for more oil and gas exploration and so it was fine. This is in spite of the fact that the world already has more oil and gas reserves than can be burnt to stay under the 1.5 degree guidance that is in the Zero Carbon Act.

Previously climate lawyers have been able to argue that the global situation for oil and gas must be taken into account but now, significantly, under the Zero Carbon Act, the Crown argues you can only consider the New Zealand situation. So the Zero Carbon Act is being used to justify oil exploration and protect it from legal attack by climate activists.

And in a previous case against the Climate Commission, James Shaw’s lawyers argued that the 1.5 degree target in the Zero Carbon Act was only “aspirational” and not binding on the government.

Marc Daalder reported it thus:

“Crown Law counsel Polly Higbee told the High Court references to 1.5 degrees [in the Zero Carbon Act] used “broad, aspirational language” and it would be “too prescriptive” to argue that the purpose section placed any actual duty on the Government.”

No actual duty on the government from the 1.5 degree target in the Zero Carbon Act is what Shaw’s lawyers told the court. Outside the court, when speaking to climate activists, Shaw says that the 1.5 degrees target is binding, but in court, where it matters, his lawyers argue it is not.

It’s hard to think of a clearer example of greenwashing. There were many people in the climate movement who worked hard to deliver the Zero Carbon Act and honestly believed it would be a significant tool to cut emissions, rather than defend oil exploration against legal attack.

The final argument for these bland instruments like the Zero Carbon Act is that we need to get broad political elite consensus on climate to get change. History tells us the opposite. To choose just one example which is close to the PM’s heart — nuclear free.

Nuclear free New Zealand was not a result of a consensus process. It was vociferously opposed by the National Party and its many allies — they voted against the legislation and spoke out against it. Nuclear free NZ was not won by reducing our ambitions to what was acceptable to the National Party and the US State Department.

Thousands of peace and environment activists campaigned for it and the Labour government eventually came round to their position, and stood up to provide leadership. There was no political elite consensus. The reason that the National Party never repealed the nuclear free legislation when they returned to government in 1990 was because of its broad support from civil society, support that resulted from civil society campaigners and a Prime Minister willing to fight for the policy (once he finally came round to it).

Introducing vacuous climate legislation that achieves little, in order to get the National Party to vote for it, is pointless, or worse.

Winning the debate on real climate action is the only way to ensure it sticks, and greenwashing undermines that public campaigning.

Conclusion
During the 2017 election campaign I bumped into Jacinda Ardern in Wellington airport and she told me my job at Greenpeace was to hold her government accountable. I respected her for saying that and I agreed with it, and still do. And so that is what I’m doing.

The government has done some good stuff on climate, but on the really big and difficult climate policy issues they are greenwashing. And the greenwashing has disoriented and weakened the climate movement and meant that we are getting much weaker climate policy out of this government than we would otherwise.

And I refer to Ardern rather than Shaw deliberately because there is an uncomfortable political reality that sits behind all this: Jacinda Ardern makes the climate policy in this government and James Shaw presents it. The first rule of politics is to learn how to count — look at the numbers and you will understand this government — Labour has a simple majority and Shaw isn’t even in Cabinet.

James Shaw may like the climate policy, he may not, I don’t know. He may be the architect of crucial bits of it, or not, I don’t know. He is allowed to say he would like to improve the climate policy, but he cannot speak out against it and keep his job. And once you dwell on that hard political truth, all this makes a lot more sense.

It’s not my job or Greenpeace’s job to say whether that is an acceptable position for the Green Party to find itself in, but it is our job to call out greenwash when we see it. We believe that only people power can ensure genuine enduring progress on climate and people need to know the truth if they are to act on it.

For that reason greenwashing is the enemy of progress on climate and where you stand on greenwashing is the Rubicon of our times.

Dr Russel Norman is executive director of Greenpeace Aotearoa and was co-leader of the Green Party for nine years. He resigned from Parliament as an MP in 2015 to take up the Greenpeace position.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2022/08/12/russel-norman-dont-be-fooled-by-nz-greenwashing-the-lack-of-real-climate-action-is-dangerous/feed/ 0 323014
Statement by Ralph Nader On Tesla Full Self-Driving (FSD) technology https://www.radiofree.org/2022/08/10/statement-by-ralph-nader-on-tesla-full-self-driving-fsd-technology/ https://www.radiofree.org/2022/08/10/statement-by-ralph-nader-on-tesla-full-self-driving-fsd-technology/#respond Wed, 10 Aug 2022 15:51:43 +0000 https://nader.org/?p=5652
This content originally appeared on Ralph Nader and was authored by eweisbaum.

]]>
https://www.radiofree.org/2022/08/10/statement-by-ralph-nader-on-tesla-full-self-driving-fsd-technology/feed/ 0 322316
The World Series meets the World Economic Forum https://www.radiofree.org/2022/08/10/the-world-series-meets-the-world-economic-forum/ https://www.radiofree.org/2022/08/10/the-world-series-meets-the-world-economic-forum/#respond Wed, 10 Aug 2022 02:01:39 +0000 https://dissidentvoice.org/?p=132352 When I was growing up in Queens, NYC, I paradoxically rooted for the Yankees… but I also liked the Mets. After all, their home field — Shea Stadium — was much closer to where I lived. I can still recall sneaking on the subway and sneaking into the stadium to see the Mets (or Jets) […]

The post The World Series meets the World Economic Forum first appeared on Dissident Voice.]]>

When I was growing up in Queens, NYC, I paradoxically rooted for the Yankees… but I also liked the Mets. After all, their home field — Shea Stadium — was much closer to where I lived. I can still recall sneaking on the subway and sneaking into the stadium to see the Mets (or Jets) play.

Here’s a photo of the now-defunct Shea in its glory [sic] days:

Take a look at those exposed ramps. As punk kids, we’d wait for the crowd to file in. Then we’d remove the long part from one of the NYPD’s wooden A-frame barricades, a.k.a. the “sawhorse”:

The idea was to lean the plank-like object against the outside structure of Shea. Then, one by one, we’d back up about 20 steps to get a running start. We’d literally run up the barricade and leap to grab the concrete ramp frame (check the above photo again).

Sometimes, the inside security guards would give chase — but only to a point. You see, we would jump from a down ramp to an up ramp to avoid them. This meant one small slip and you plummet between the ramps to certain death. Shea Stadium security never once risked their lives to catch agile delinquents like us.

But why am I telling you all this?

File my answer under: “Changed, how things have.”

The New York Mets recently rolled out facial recognition ticketing at their fancy new stadium, Citi Field. The venue is named after Citigroup. Click here for a sampling of their violations and scandals.

Here’s how Oscar Fernandez, the Mets VP of technology solutions, normalized the team’s move into the realm of digital IDs and the Great Reset:

“We thought this is one of many components to get fans in faster. If you have a group of five or 10 and they’re scrolling through tickets, instead of just having one button as it recognizes your face and you’re not taking your phone out of your pocket, we thought that was a great thing to have. They’re used to doing [facial recognition] in other aspects of their life, whether it’s opening your phone or going to the airport and using your face to get into the gate. It’s becoming more visible and more secure.”

Fernandez added: “We’re committed to it, we think there will be adoption over time. We have a long-term roadmap to look at things like facial payments. So you go up to the concession stand and you can securely pay with your face.”

In the National Football League, the Atlanta Falcons and Denver Broncos will also be turning your face into currency this season.

In case you haven’t yet caught on, the powers that shouldn’t be are entirely counting on your complacent compliance.

It ends when we say “no.”

The post The World Series meets the World Economic Forum first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Mickey Z..

]]>
https://www.radiofree.org/2022/08/10/the-world-series-meets-the-world-economic-forum/feed/ 0 322131
Amazon’s One-Stop Shop for Identity Thieves https://www.radiofree.org/2022/08/07/amazons-one-stop-shop-for-identity-thieves/ https://www.radiofree.org/2022/08/07/amazons-one-stop-shop-for-identity-thieves/#respond Sun, 07 Aug 2022 12:00:04 +0000 https://theintercept.com/?p=404442

Imagine if a budding identity thief had a free, user-friendly, publicly searchable database that contained the name, location, date of birth, and mother’s maiden name of millions of people. Enter Amazon registries. We already know that Amazon collects plenty of personal information and data that can be arduous for its users to obtain, but the company also readily shares your information for anyone to access when you set up a registry. Because the default visibility settings of registries for weddings, birthdays, new babies, and other occasions are preset to public, Amazon reveals to the world information that financial institutions and other service providers request for identity authentication — and that identity thieves can use to take over your life.

Amazon's registry creation landing page.

Amazon’s registry creation landing page.

Screenshot: The Intercept

Identity Theft Registries

Amazon requires that certain information be provided when setting up a registry. For a wedding registry, Amazon requires the first and last names of both partners, the wedding date, the number of guests attending, and a mailing address. The default share setting is to make the registry searchable not only on Amazon but also via the third-party wedding planning website The Knot. This has led to confusion from Amazon wedding registry users over how The Knot received their registry details. Similarly, when creating a baby registry, Amazon asks for a first and last name, expected due date, whether the baby is the parents’ first child, and a mailing address. The default visibility setting is also set to public and to appear on pregnancy and parenting websites The Bump, What to Expect, and Baby Center.

Anyone can search for a public registry (even without an Amazon account) with just a name or further specifying a date and location. In addition to the list of desired products, wedding registries show the names of both partners, the event location, and the event date. Baby registries return either the name of the upcoming baby or the names of the parents, their city and state, and the expected due date.

At first glance, only wedding registries for weddings happening between 2020 to 2032 and baby registries with due dates between 2020 to 2023 can be searched for. However, there are ways to bypass the date restrictions to access registries from years prior. In the case of multiple results, wedding and baby registries display the top 100 matches, and if no date parameters are entered, search results may contain entries outside the default date ranges. For example, even though Amazon only lets you select dates from 2020 onward, if you don’t specify an exact range when searching a common name, you could get results from, say, 2008.

Perhaps the more critical vulnerability in Amazon’s date range search, however, is that the fields can be modified using the developer tools functionality available in browsers like Chrome and Firefox. A cursory search with modified date fields brought up wedding registries dating as far back as 2004, and baby registries dating back all the way to 2006. So someone could discover the details of a registry set up for a present-day 16-year-old. Who knows how this information could be weaponized in two years, once such a teen becomes a legal adult?

A redacted search result page for baby registries, modified to display results from 2006, despite Amazon's official form only allowing date ranges from 2020 to 2023.

A redacted search result page for baby registries, modified to display results from 2006, despite Amazon’s official form only allowing date ranges from 2020 to 2023.

Screenshot: The Intercept

(Widely) Shared Secrets

Knowledge-based authentication, known as KBA, is a form of identity authentication favored by service providers such as financial institutions that relies on shared secrets: information that is only known to you and your bank, email provider, or other service. For example, if you lose the password to your bank account, you can regain access by entering information that most people likely don’t know about you, like your mother’s maiden name or your date of birth.

Security questions like this have been around for a while. Banks have used mother’s maiden name as a form of identity authentication since at least 1882. But today these so-called secrets are inevitably shared much more broadly than account holders anticipate, resulting in harrowing cases of identities getting stolen with personal details used for authentication.

An early use of 'mother's maiden name' as a form of knowledge-based authentication in Frank Miller's 1882 Telegraphic Code to Insure Privacy and Secrecy in the Transmission of Telegrams.

An early use of mother’s maiden name as a form of knowledge-based authentication in Frank Miller’s 1882 book “Telegraphic Code to Insure Privacy and Secrecy in the Transmission of Telegrams.”

Screenshot: The Intercept

Using multiple Amazon registries could reveal massive amounts of information not just about living people but even of a baby yet to be born. A wedding registry would show the mother’s maiden name, and a birth registry would list the projected date of birth, location, and either the expected child’s or the parents’ names. Should the baby not be born on their expected due date, there’s always the Amazon birthday gift registry to crosscheck. The location and date of the birth can, in turn, be used to deduce a partial Social Security number.

Using newborns for identity fraud is not a new phenomenon. The practice of adopting a deceased baby’s identity was popularized in Frederick Forsynth’s 1971 novel “The Day of the Jackal,” in which an assassin trawls small parish graveyards to locate a dead child whose identity he could assume in order to apply for a passport in their name.

While the technique of taking over the identity of a dead child is still used today, Amazon’s public baby registries have made it far easier to target those who haven’t been born yet. Identity thieves no longer need to peruse musty county registrar offices for birth certificates when they can just search for registries online.

Privacy Measures

While there are copious other ways to find personal information sprinkled throughout the internet, such as on social media profiles and genealogy websites, your Amazon registry doesn’t need to be another.

Because Amazon registries are public by default, users have to manually toggle the privacy settings either to “shareable,” which makes a registry accessible only via a direct link, or “private,” making it visible only to the creators. Another option to mitigate data exposure is to fudge the expected due date, so Amazon doesn’t display the actual date.

Default privacy settings on Amazon's baby registry creation page. By default, registries can be searched for and are viewable by anyone without even requiring an Amazon account, and are also shared on three third-party sites, The Bump, What to Expect, and BabyCenter.

Default privacy settings on Amazon’s baby registry creation page.

Screenshot: The Intercept

Also take into account that alongside the treasure trove of personal information public registries afford identity thieves, the products themselves pose an additional security risk. Anyone could browse a gift registry to see which products have known vulnerabilities to exploit, such as baby monitors that allow remote access to their video feeds.

Once a registry’s purpose has been served, there’s little reason not to delete it, rather than leave it lingering for 16-odd years, as some users have inadvertently done. While a wedding registry is straightforward to delete, Amazon’s steps for deleting a baby registry are unclear, with step one cryptically instructing to “Go to your .” Perhaps the best preemptive solution is not to use a faulty, privacy-eroding service in the first place.

Amazon's instructions for deleting a baby registry.

Amazon’s instructions for deleting a baby registry.

Screenshot: The Intercept


This content originally appeared on The Intercept and was authored by Nikita Mazurov.

]]>
https://www.radiofree.org/2022/08/07/amazons-one-stop-shop-for-identity-thieves/feed/ 0 321450
At the Lost and Found https://www.radiofree.org/2022/08/06/at-the-lost-and-found/ https://www.radiofree.org/2022/08/06/at-the-lost-and-found/#respond Sat, 06 Aug 2022 16:31:59 +0000 https://dissidentvoice.org/?p=132211 Nothing is more real than nothing. — Samuel Beckett, Malone Dies, 1951 Those who are never lost are forever lost.  Only those who know they are lost and that life is a shipwreck have a chance to find their way to shore. The world’s great religions, including Taoism and Existential philosophy, understand that at the […]

The post At the Lost and Found first appeared on Dissident Voice.]]>

— Samuel Beckett, Malone Dies, 1951

Those who are never lost are forever lost.  Only those who know they are lost and that life is a shipwreck have a chance to find their way to shore.

The world’s great religions, including Taoism and Existential philosophy, understand that at the heart of human existence is the presence of the not (death, emptiness, void), but this negative reality, this “nothingness” interpenetrates with the positive of being alive so that our knowledge coincides with our ignorance, our lives with our death, and our truth with untruth.  This is also common sense.

Everyone is a pilgrim on the way, and because there are no maps, we all get lost.  And it is only by getting lost in a deep sense that we can find ourselves and discover the truth about the world.

It is well known that Ernest Hemingway made famous the phrase “the lost generation” when he opened his novel The Sun Also Rises with the epigram “You are all a lost generation,” attributed to Gertrude Stein, who said she heard it from a garage owner who said it about a young auto mechanic in his employ.

It is less well known that Hemingway later wrote “that all generations were lost by something and always had been and always would be …But to hell with her lost-generation talk and all the dirty easy labels.”

He was thinking of how the madness of war with the calls to patriotism and God and country and the never-ending official lies about everything maimed people at very deep levels.  His words in A Farewell to Arms have lasted because they are so true in their dismissal of abstract obscenities and their embrace of the concrete:

I was always embarrassed by the words sacred, glorious, and sacrifice and the expression in vain …. And I had seen nothing sacred, and the things that were glorious had no glory and the sacrifices were like the stockyards of Chicago if nothing were done with the meat except to bury it …. Abstract words such as glory, honor, courage, or hallow were obscene beside the concrete names of villages, the numbers of roads, the names of rivers, the numbers of regiments and the dates.

No doubt he was also thinking of the existential anxiety of being alive and the fear of death and nothingness that is conveyed in his powerful short story, “A Clean Well-Lighted Place” that appeared in the 1930 volume Winner Take Nothing.  He was well acquainted with nothing (the not, nada) and knew that social circumstances only add to it, particularly wars and the nihilistic death wishes of lying political leaders.

Some say nothing has changed for millennia and that every age is similar and people are the same, always complaining about the present and recalling the good old days.  There is some truth in this, but the issue of assessing today in all its uniqueness remains paramount.  For every age and every generation is different; therein lies its potential and dangers.  Each can only be understood within its place and time.  We live in the era of high technology that has never before existed.  It is unique.  And it is uniquely dangerous.

Today is a time of unprecedented official lies about everything, endless wars hot and cold, class wars of the rich against the poor, medical wars of international elites against everyone, etc. –  it is a daily electronic digital  barrage meant to pound people into the deepest despair.  Call it “The Lost World of the Information Superhighway.”  These lies have sown a vast sense of bewilderment, as intended.  Lostness for so many, including those who don’t know it and take those lies for truth. People who don’t know that there are still places, although they are shrinking, where truth can be found.  The problem is, of course, that even when they are told about media sites and writers that operate honestly and outside the propaganda mill, they usually refuse to go there.  They prefer to live inside what Jim Garrison, the former New Orleans District Attorney who brought the only trial in the assassination of President Kennedy, correctly termed “the Doll’s House.”

Picking through the bins at the lost and found on the Internet, which is dominated by intelligence services and their Silicon Valley big tech partners, many who feel lost find “things” they think they have lost but which are counterfeit.  They cling to them as to false gods, not realizing that they have been placed there by the elite mountebanks and their accomplices, a process similar to a document dump that contains fabricated records.  It is an old trick.  Often what is really lost is the sense that life makes sense and is meaningful, but this awareness is often replaced with shards of false reassurance meant to distract and far too much information for anyone to comprehend.

What’s up?  Check your cell phone and head down the primrose path to unreality.

Just as there are two senses to being lost, one based on the awareness that if we refuse to grasp at straws and proceed through life by faith, the unknown road will bear us up. Thoreau said, “How vigilant we are! determined not to live by faith if we can avoid it…”1, and the other being the more socially induced one of incessant propaganda, so too there are two ways of thinking about nothing.  The existential sense as described by Hemingway in his famous story mentioned above, and the sense of trivia or superficial preoccupations that distract.  C.S. Lewis described the latter sense very well:

The Christians describe the enemy as one ‘without whom Nothing is strong’. And Nothing is very strong: strong enough to steal away a man’s best years not in sweet sins but in a dreary flickering of the mind over it knows not what and knows not why, in the gratification of curiosities so feeble that the man is only half aware of them, in drumming of fingers and kicking of heels, in whistling tunes that he does not like, or in the long dim labyrinth of reveries that have not even lust or ambition to give them relish, but which, once chance association has started them, the creature is too weak and fuddled to shake off.2

This is a perfect description of the passivity of scrolling the internet or social media.  Much ado about absolutely nothing but distractions.  Tranquilized by trivia.

Our current situation has been long in coming.  Back in the early 1960s, there was a  highly touted intellectual named Marshall McLuhan whose 1964 book, Understanding Media: The Extensions of Man, was gobbled up by the baby boomers raised on television, whose rebellious members protested the inhumanity of IBM computer technology of that time.  Ironically, it was members of this generation who later created the computer revolution and have promoted the digital revolution.  They carry cell phones as sidearms to defend themselves from reality.

Newsweek called McLuhan “the oracle of the New Communications.”  He was an obscurantic celebrator of the electronic media and retribalized man long before the Internet, cell phones, personal computers, and digital mania.  McLuhan’s paeans to technology sounded very profound and liberating  with their vaguely Gnostic and Jungian rhetoric, which also fit with the 1960s “vibes.”  He called the electronic media our gods whom we must serve, for they in turn would liberate us.  He gave life to things while taking it from persons.  He wrote:

Electromagnetic technology requires utter human docility and quiescence of meditation such as befits an organism that now wears its brain outside its skull and its nerves outside its hide. Man must serve his electronic technology with the same servo-mechanistic fidelity with which he served his coracle, his canoe, his typography, and all other extensions of his physical organs. But there is this difference, that previous technologies were partial and fragmentary, and the electric is total and inclusive. An external consensus or conscience is now as necessary as private consciousness. [my emphases]

Clearly this was a message of a prescient religious crank: mystical, mythological, technological nonsense perfectly in tune with the dawning new age. Not any coming of the Age of Aquarius, however, but that of the Age of Digital Control and endless wars.

By turning the person inside out and giving life to things, McLuhan was certainly anticipating and promoting the developments of the past forty years.  His ideas gave legitimacy to the passivity of the person in the face of the burgeoning mass media consumer culture.  They supported the growing commodification of all aspects of life, especially people.  By externalizing the person, McLuhan was eliminating the idea of the autonomous self and opening the way for today’s era of consumers, blank screens for the reception of advertising, public relations, and propaganda on a vast scale.  In fact, what he wrote of television runs deeper for cell phones and computer screens.  “ … with TV,” he wrote, “the viewer is the screen.  He is bombarded with light impulses that James Joyce called the ‘Charge of the Light Brigade’ that imbues his ‘soulskin with subconscious inklings.’ “

Inklings of abstract obscenities at war with the lost world of reality.

While many people sense this, they still embrace their killers, feeling that they would be lost without them. They have become appendages of their electronic appendages.  The current push to transform all person-to-person life into a digital one run by Artificial Intelligence (AI) technologies with its mass surveillance powers is recognized by many but dismissed as a weird conspiracy.  This is so far from the truth.  A good indicator of this nonchalant attitude toward such developing trends is the vastly increased popularity of on-line shopping.  Its innocence conceals the future that is coming.

I recently won a very high-tech looking electric toothbrush at the dentist.  When I opened it, I discovered it contained a gadget with a suction cup that could hold a “smart phone” that you could attach to the mirror.  The phone could electronically be linked to the toothbrush and it would monitor your brushing as you watched yourself brush.  Poor me, I felt so stupid: a man without a smart phone!

While everybody knows that the boat is leaking and the captain lied, to paraphrase Leonard Cohen, such knowledge is abstract.  It is a sort-of knowledge, sensed but also denied.  Real but unreal.  Known but unknown.  And that’s how it goes.  It is very difficult for many conventional people to admit that the life they have known is disappearing while they dawdle in fantasy land, believing the propaganda of their rulers.  To live in the U.S.A. is to live in Neverland where no one ever has to be alone, never grow up, and always be “in touch” through the ether.  It is a country of lost children.

You can choose any issue of importance and its official explanation is certain to be untrue, obvious or subtle propaganda.  The lies about Ukraine and Russia; Covid-19, lockdowns, and vaccines; China and Taiwan; U.S. forces in Syria and U.S. support for Israeli aggression against Syria and the Palestinians; its support for Saudi Arabia’s ruthless policies and war against Yemen; the economy, central banking, and inflation; the increasing censorship of dissident voices; digital IDs, digital programmable currencies, and social credit systems; the persecution of Julian Assange; the Great Reset; a series of binaries meant to suggest false alternatives, etc.  The list is endless.  All official lies to support a sinking ship captained by psychopathic liars seemingly intent on a world war that will destroy the world.  Melville’s Captain Ahab writ large. Like those traveling on the Titanic, today’s passengers on the flailing American empire’s Good Ship Lollipop are in for a surprise, and it won’t be a sweet trip to a candy shop.

Hemingway was surely right that “Winner Take Nothing.”  Yet losers also exit empty-handed.  Everybody knows this but goes on surrounding themselves with stuff, lots of things.  Hoarders are a popular TV subject because they represent the extreme form of this madcap method of trying to secure oneself from loss.  It is a form of mental and spiritual despair that could only exist in advanced capitalist consumer society.  Too many possessions and too much information.  Cluttered minds, cluttered abodes.  There is a reason why the world’s poor are called the dispossessed.  One could say hoarders are the possessed, and it is a form of demonic possession.

Recently I was called upon to help a hospitalized elderly relative by checking on her house.  The house is filled from attic to basement, in every nook and cranny, with collected things that serve no life purpose but were kept to provide a security blanket that was really a strangulation cord.  I will spare you the details, except to say that this relative is an intelligent woman, as was her deceased husband, and yet they surrounded themselves with so much “stuff,” never threw things out, kept papers from 70 years ago, old keys and coins, empty jewelry boxes by the score, etc.  An overwhelming scene to behold.  And why did they do this?  Because they thought they were protecting themselves against loss, against nothing, nada.

As T. S. Eliot wrote in The Wasteland: “These fragments I have shored against my ruins.”  But there is nothing that will protect against the loss Eliot was referring to – the social, psychological, and spiritual fragmentation of Europe as a result of World War I.  A wasteland created by politicians. Like today.

We too are now living in a wasteland, and the only way to find our way forward is to acknowledge that we are lost and to jettison the false security of believing the vast tapestry of lies promulgated by the captains of the American-led Titanic.

I often think of the words of the poet Rilke as good advice, a step in the right direction where there is a lost and found worth visiting and insights await us. While primarily writing about the artist who time and again is that someone who emerges from the crowd and whose “winged heart everywhere beats against the walls of their time,” I think his words apply to every person, including journalists.  To plumb the depths of our sordid current world demands aesthetic, political, and spiritual resistance rooted in the open sociological imagination, a willingness to go wherever the facts and intuition leads us.  Rilke said:

Not any self-control or self-limitation for the sake of specific ends, but rather a carefree letting go of oneself; not caution, but rather a wise blindness; not working to acquire silent, slowly increasing possessions, but rather a continuous squandering of all perishable values. This way of being has something naïve and instinctive about it, and resembles that period of the unconscious best characterized by a joyous confidence, namely the period of childhood …. [the child] has no anxiety about losing things …. And whatever he has once been lit up in love remains as an image, never more to be lost, and the image is possession; that is why children are so rich.3

For a country of lost children, this is a good place to start.

  1. Walden, August 8, 1854.
  2. The Screwtape Letters, published February 9, 1942,
  3. Ueber Kunst, (About Art) was published in 1899.  Quoted from Norman O. Brown’s book in English Life Against Death.
The post At the Lost and Found first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Edward Curtin.

]]>
https://www.radiofree.org/2022/08/06/at-the-lost-and-found/feed/ 0 321365
At the Lost and Found https://www.radiofree.org/2022/08/06/at-the-lost-and-found/ https://www.radiofree.org/2022/08/06/at-the-lost-and-found/#respond Sat, 06 Aug 2022 16:31:59 +0000 https://dissidentvoice.org/?p=132211 Nothing is more real than nothing. — Samuel Beckett, Malone Dies, 1951 Those who are never lost are forever lost.  Only those who know they are lost and that life is a shipwreck have a chance to find their way to shore. The world’s great religions, including Taoism and Existential philosophy, understand that at the […]

The post At the Lost and Found first appeared on Dissident Voice.]]>

— Samuel Beckett, Malone Dies, 1951

Those who are never lost are forever lost.  Only those who know they are lost and that life is a shipwreck have a chance to find their way to shore.

The world’s great religions, including Taoism and Existential philosophy, understand that at the heart of human existence is the presence of the not (death, emptiness, void), but this negative reality, this “nothingness” interpenetrates with the positive of being alive so that our knowledge coincides with our ignorance, our lives with our death, and our truth with untruth.  This is also common sense.

Everyone is a pilgrim on the way, and because there are no maps, we all get lost.  And it is only by getting lost in a deep sense that we can find ourselves and discover the truth about the world.

It is well known that Ernest Hemingway made famous the phrase “the lost generation” when he opened his novel The Sun Also Rises with the epigram “You are all a lost generation,” attributed to Gertrude Stein, who said she heard it from a garage owner who said it about a young auto mechanic in his employ.

It is less well known that Hemingway later wrote “that all generations were lost by something and always had been and always would be …But to hell with her lost-generation talk and all the dirty easy labels.”

He was thinking of how the madness of war with the calls to patriotism and God and country and the never-ending official lies about everything maimed people at very deep levels.  His words in A Farewell to Arms have lasted because they are so true in their dismissal of abstract obscenities and their embrace of the concrete:

I was always embarrassed by the words sacred, glorious, and sacrifice and the expression in vain …. And I had seen nothing sacred, and the things that were glorious had no glory and the sacrifices were like the stockyards of Chicago if nothing were done with the meat except to bury it …. Abstract words such as glory, honor, courage, or hallow were obscene beside the concrete names of villages, the numbers of roads, the names of rivers, the numbers of regiments and the dates.

No doubt he was also thinking of the existential anxiety of being alive and the fear of death and nothingness that is conveyed in his powerful short story, “A Clean Well-Lighted Place” that appeared in the 1930 volume Winner Take Nothing.  He was well acquainted with nothing (the not, nada) and knew that social circumstances only add to it, particularly wars and the nihilistic death wishes of lying political leaders.

Some say nothing has changed for millennia and that every age is similar and people are the same, always complaining about the present and recalling the good old days.  There is some truth in this, but the issue of assessing today in all its uniqueness remains paramount.  For every age and every generation is different; therein lies its potential and dangers.  Each can only be understood within its place and time.  We live in the era of high technology that has never before existed.  It is unique.  And it is uniquely dangerous.

Today is a time of unprecedented official lies about everything, endless wars hot and cold, class wars of the rich against the poor, medical wars of international elites against everyone, etc. –  it is a daily electronic digital  barrage meant to pound people into the deepest despair.  Call it “The Lost World of the Information Superhighway.”  These lies have sown a vast sense of bewilderment, as intended.  Lostness for so many, including those who don’t know it and take those lies for truth. People who don’t know that there are still places, although they are shrinking, where truth can be found.  The problem is, of course, that even when they are told about media sites and writers that operate honestly and outside the propaganda mill, they usually refuse to go there.  They prefer to live inside what Jim Garrison, the former New Orleans District Attorney who brought the only trial in the assassination of President Kennedy, correctly termed “the Doll’s House.”

Picking through the bins at the lost and found on the Internet, which is dominated by intelligence services and their Silicon Valley big tech partners, many who feel lost find “things” they think they have lost but which are counterfeit.  They cling to them as to false gods, not realizing that they have been placed there by the elite mountebanks and their accomplices, a process similar to a document dump that contains fabricated records.  It is an old trick.  Often what is really lost is the sense that life makes sense and is meaningful, but this awareness is often replaced with shards of false reassurance meant to distract and far too much information for anyone to comprehend.

What’s up?  Check your cell phone and head down the primrose path to unreality.

Just as there are two senses to being lost, one based on the awareness that if we refuse to grasp at straws and proceed through life by faith, the unknown road will bear us up. Thoreau said, “How vigilant we are! determined not to live by faith if we can avoid it…”1, and the other being the more socially induced one of incessant propaganda, so too there are two ways of thinking about nothing.  The existential sense as described by Hemingway in his famous story mentioned above, and the sense of trivia or superficial preoccupations that distract.  C.S. Lewis described the latter sense very well:

The Christians describe the enemy as one ‘without whom Nothing is strong’. And Nothing is very strong: strong enough to steal away a man’s best years not in sweet sins but in a dreary flickering of the mind over it knows not what and knows not why, in the gratification of curiosities so feeble that the man is only half aware of them, in drumming of fingers and kicking of heels, in whistling tunes that he does not like, or in the long dim labyrinth of reveries that have not even lust or ambition to give them relish, but which, once chance association has started them, the creature is too weak and fuddled to shake off.2

This is a perfect description of the passivity of scrolling the internet or social media.  Much ado about absolutely nothing but distractions.  Tranquilized by trivia.

Our current situation has been long in coming.  Back in the early 1960s, there was a  highly touted intellectual named Marshall McLuhan whose 1964 book, Understanding Media: The Extensions of Man, was gobbled up by the baby boomers raised on television, whose rebellious members protested the inhumanity of IBM computer technology of that time.  Ironically, it was members of this generation who later created the computer revolution and have promoted the digital revolution.  They carry cell phones as sidearms to defend themselves from reality.

Newsweek called McLuhan “the oracle of the New Communications.”  He was an obscurantic celebrator of the electronic media and retribalized man long before the Internet, cell phones, personal computers, and digital mania.  McLuhan’s paeans to technology sounded very profound and liberating  with their vaguely Gnostic and Jungian rhetoric, which also fit with the 1960s “vibes.”  He called the electronic media our gods whom we must serve, for they in turn would liberate us.  He gave life to things while taking it from persons.  He wrote:

Electromagnetic technology requires utter human docility and quiescence of meditation such as befits an organism that now wears its brain outside its skull and its nerves outside its hide. Man must serve his electronic technology with the same servo-mechanistic fidelity with which he served his coracle, his canoe, his typography, and all other extensions of his physical organs. But there is this difference, that previous technologies were partial and fragmentary, and the electric is total and inclusive. An external consensus or conscience is now as necessary as private consciousness. [my emphases]

Clearly this was a message of a prescient religious crank: mystical, mythological, technological nonsense perfectly in tune with the dawning new age. Not any coming of the Age of Aquarius, however, but that of the Age of Digital Control and endless wars.

By turning the person inside out and giving life to things, McLuhan was certainly anticipating and promoting the developments of the past forty years.  His ideas gave legitimacy to the passivity of the person in the face of the burgeoning mass media consumer culture.  They supported the growing commodification of all aspects of life, especially people.  By externalizing the person, McLuhan was eliminating the idea of the autonomous self and opening the way for today’s era of consumers, blank screens for the reception of advertising, public relations, and propaganda on a vast scale.  In fact, what he wrote of television runs deeper for cell phones and computer screens.  “ … with TV,” he wrote, “the viewer is the screen.  He is bombarded with light impulses that James Joyce called the ‘Charge of the Light Brigade’ that imbues his ‘soulskin with subconscious inklings.’ “

Inklings of abstract obscenities at war with the lost world of reality.

While many people sense this, they still embrace their killers, feeling that they would be lost without them. They have become appendages of their electronic appendages.  The current push to transform all person-to-person life into a digital one run by Artificial Intelligence (AI) technologies with its mass surveillance powers is recognized by many but dismissed as a weird conspiracy.  This is so far from the truth.  A good indicator of this nonchalant attitude toward such developing trends is the vastly increased popularity of on-line shopping.  Its innocence conceals the future that is coming.

I recently won a very high-tech looking electric toothbrush at the dentist.  When I opened it, I discovered it contained a gadget with a suction cup that could hold a “smart phone” that you could attach to the mirror.  The phone could electronically be linked to the toothbrush and it would monitor your brushing as you watched yourself brush.  Poor me, I felt so stupid: a man without a smart phone!

While everybody knows that the boat is leaking and the captain lied, to paraphrase Leonard Cohen, such knowledge is abstract.  It is a sort-of knowledge, sensed but also denied.  Real but unreal.  Known but unknown.  And that’s how it goes.  It is very difficult for many conventional people to admit that the life they have known is disappearing while they dawdle in fantasy land, believing the propaganda of their rulers.  To live in the U.S.A. is to live in Neverland where no one ever has to be alone, never grow up, and always be “in touch” through the ether.  It is a country of lost children.

You can choose any issue of importance and its official explanation is certain to be untrue, obvious or subtle propaganda.  The lies about Ukraine and Russia; Covid-19, lockdowns, and vaccines; China and Taiwan; U.S. forces in Syria and U.S. support for Israeli aggression against Syria and the Palestinians; its support for Saudi Arabia’s ruthless policies and war against Yemen; the economy, central banking, and inflation; the increasing censorship of dissident voices; digital IDs, digital programmable currencies, and social credit systems; the persecution of Julian Assange; the Great Reset; a series of binaries meant to suggest false alternatives, etc.  The list is endless.  All official lies to support a sinking ship captained by psychopathic liars seemingly intent on a world war that will destroy the world.  Melville’s Captain Ahab writ large. Like those traveling on the Titanic, today’s passengers on the flailing American empire’s Good Ship Lollipop are in for a surprise, and it won’t be a sweet trip to a candy shop.

Hemingway was surely right that “Winner Take Nothing.”  Yet losers also exit empty-handed.  Everybody knows this but goes on surrounding themselves with stuff, lots of things.  Hoarders are a popular TV subject because they represent the extreme form of this madcap method of trying to secure oneself from loss.  It is a form of mental and spiritual despair that could only exist in advanced capitalist consumer society.  Too many possessions and too much information.  Cluttered minds, cluttered abodes.  There is a reason why the world’s poor are called the dispossessed.  One could say hoarders are the possessed, and it is a form of demonic possession.

Recently I was called upon to help a hospitalized elderly relative by checking on her house.  The house is filled from attic to basement, in every nook and cranny, with collected things that serve no life purpose but were kept to provide a security blanket that was really a strangulation cord.  I will spare you the details, except to say that this relative is an intelligent woman, as was her deceased husband, and yet they surrounded themselves with so much “stuff,” never threw things out, kept papers from 70 years ago, old keys and coins, empty jewelry boxes by the score, etc.  An overwhelming scene to behold.  And why did they do this?  Because they thought they were protecting themselves against loss, against nothing, nada.

As T. S. Eliot wrote in The Wasteland: “These fragments I have shored against my ruins.”  But there is nothing that will protect against the loss Eliot was referring to – the social, psychological, and spiritual fragmentation of Europe as a result of World War I.  A wasteland created by politicians. Like today.

We too are now living in a wasteland, and the only way to find our way forward is to acknowledge that we are lost and to jettison the false security of believing the vast tapestry of lies promulgated by the captains of the American-led Titanic.

I often think of the words of the poet Rilke as good advice, a step in the right direction where there is a lost and found worth visiting and insights await us. While primarily writing about the artist who time and again is that someone who emerges from the crowd and whose “winged heart everywhere beats against the walls of their time,” I think his words apply to every person, including journalists.  To plumb the depths of our sordid current world demands aesthetic, political, and spiritual resistance rooted in the open sociological imagination, a willingness to go wherever the facts and intuition leads us.  Rilke said:

Not any self-control or self-limitation for the sake of specific ends, but rather a carefree letting go of oneself; not caution, but rather a wise blindness; not working to acquire silent, slowly increasing possessions, but rather a continuous squandering of all perishable values. This way of being has something naïve and instinctive about it, and resembles that period of the unconscious best characterized by a joyous confidence, namely the period of childhood …. [the child] has no anxiety about losing things …. And whatever he has once been lit up in love remains as an image, never more to be lost, and the image is possession; that is why children are so rich.3

For a country of lost children, this is a good place to start.

  1. Walden, August 8, 1854.
  2. The Screwtape Letters, published February 9, 1942,
  3. Ueber Kunst, (About Art) was published in 1899.  Quoted from Norman O. Brown’s book in English Life Against Death.
The post At the Lost and Found first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Edward Curtin.

]]>
https://www.radiofree.org/2022/08/06/at-the-lost-and-found/feed/ 0 321366
Facial Recognition Technology Down Under https://www.radiofree.org/2022/08/02/facial-recognition-technology-down-under-2/ https://www.radiofree.org/2022/08/02/facial-recognition-technology-down-under-2/#respond Tue, 02 Aug 2022 05:55:46 +0000 https://www.counterpunch.org/?p=250797 The language is far from reassuring.  Despite being caught red handed using facial recognition technology unbeknownst to customers, a number of Australia’s large retail companies have given a meek assurance that they will “pause” their use.  The naughty will only show contrition in the most qualified of ways. It all began with an investigation by More

The post Facial Recognition Technology Down Under appeared first on CounterPunch.org.


This content originally appeared on CounterPunch.org and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2022/08/02/facial-recognition-technology-down-under-2/feed/ 0 319954