The UK plans to make online “pile-ons” a crime, in chillingly broad attempt to suppress speech

The UK is preparing to criminalize what is perceived as internet trolling that causes “likely psychological harm,” thanks to the country’s upcoming Online Safety Bill that is introducing a new set of criminal offenses.

And while the punishment internet users in the UK could face under the new legislation is clear – up to two years in prison – the definitions of their “crimes” are a good deal murkier.

In addition to their posts “likely” causing psychological harm, users can also be accused of committing a crime if they post messages containing “threatening communication” – but not necessarily, as defined in the previous law dealing with online hate speech and abuse, because they are found to intend to follow through on the threat.

Instead, it would be enough to “prove” that the recipient of such posts and messages “feared” the threat was real.

Another offense has to do with spreading information that internet users “know” is false, again, in order to cause emotional or physical harm to their “likely audience.” The proposed bill is littered with equally vague and subjective definitions of future crimes that could be hard to prove in a court of law.

The Department for Culture, Media & Sport incorporated the “likely psychological harm” as a basis for the new legislation, as recommended by the Law Commission, and will include them in the bill once it is forwarded to the UK government, which should approve it before it hits parliament in November.

Another recommendation that has been accepted is to make online “pile-ons” a crime – i.e., several users sending trolling messages perceived by the recipient as harassing, while one example a government source gave to the media of what it means to “knowingly” spread false information would be if a vaccine skeptic or a vaccine hesitant person speaks about their conviction – that is apparently automatically considered untrue, while the author is held responsible for “knowing” it.

Keep reading

Behind NATO’s ‘cognitive warfare’: ‘Battle for your brain’ waged by Western militaries

NATO is developing new forms of warfare to wage a “battle for the brain,” as the military alliance put it.

The US-led NATO military cartel has tested novel modes of hybrid warfare against its self-declared adversaries, including economic warfare, cyber warfare, information warfare, and psychological warfare.

Now, NATO is spinning out an entirely new kind of combat it has branded cognitive warfare. Described as the “weaponization of brain sciences,” the new method involves “hacking the individual” by exploiting “the vulnerabilities of the human brain” in order to implement more sophisticated “social engineering.”

Until recently, NATO had divided war into five different operational domains: air, land, sea, space, and cyber. But with its development of cognitive warfare strategies, the military alliance is discussing a new, sixth level: the “human domain.”

2020 NATO-sponsored study of this new form of warfare clearly explained, “While actions taken in the five domains are executed in order to have an effect on the human domain, cognitive warfare’s objective is to make everyone a weapon.”

“The brain will be the battlefield of the 21st century,” the report stressed. “Humans are the contested domain,” and “future conflicts will likely occur amongst the people digitally first and physically thereafter in proximity to hubs of political and economic power.”

Keep reading

The VPN Empire Built By Intelligence Agents

For many people, a VPN is accepted as being their best bet for protecting their data and online privacy. While cyber security is certainly a concern for them, most VPN users aren’t exactly adept when it comes to information technology. Like any consumer, they typically err on the side of using a trusted name within the industry. In many ways, ExpressVPN is that standard-bearer. Since it began in 2009, ExpressVPN has signed up millions of users for its service under the promise that it does everything from encrypting data on their internet browser to masking their IP address in order to protect users against hackers and government surveillance.

What most of the 3 million users who currently use ExpressVPN probably weren’t aware of when they signed up is that the service proves the point that hackers and government surveillance aren’t mutually exclusive. On September 13th, ExpressVPN was sold to the Israeli-based company Kape Technologies in a $936 million cash and stock purchase. This acquisition added ExpressVPN to a catalog including several other VPN providers acquired by Kape Technologies since 2017. The acquiring company touted its purchase as being integral to defining the next generation in its fight for online privacy. However, the centralization the VPN services Kape Technologies owns and an examination of its history reveals the company’s efforts to undermine that very cause as a distributor of malware with ties to US and Israeli intelligence operations.

Kape Technologies was founded in 2011 by partners Koby Menachemi and Shmueli Ahdut under the name CrossRider. Early in its origins, CrossRider did not bill itself as a cyber security company. Instead, the focus of the company was on web browsing and advertising technologies. Just 20 months after its founding, the tech start-up with $2 million in working capital was purchased by Israeli tech billionaire Teddy Sagi for $37 million. Menachemi and Ahdut would stay on at the company as its CEO and CTO following the purchase. With the injection of capital that Sagi’s purchase put into the company, CrossRider pivoted its operations to change the scope of its outlook toward cyber security. In 2017, CrossRider cemented that change of direction when it purchased CyberGhost VPN for $10.4 million. Upon its acquisition of the Romanian-based VPN, CrossRider rebranded itself as Kape Technologies.

While CrossRider’s rebrand appeared to be a common tactic by a company marking a shift in its outlook as it made its first foray into cyber security, the basis of the change was rooted in a much different motive. By the time CrossRider had acquired CyberGhost VPN, the adware programs the company designed had been exposed as hacking tools. By attaching its adware to third party downloads, CrossRider was able to install potentially unwanted programs which attached to web browsers as spyware. Microsoft, Symantec MalwareBytes, and other cyber security websites categorized CrossRider’s malware program Crossid as a browser hijacker which collected user information such as browser information to IP addresses in order to monetize data for its value in targeted ad campaigns. With the CrossRider name being attached to this malicious spyware, the company was putting its newest VPN asset in jeopardy. In order to avoid losing users of CyberGhostVPN, rebranding to Kape Technologies was a measure designed to obfuscate the companies history as an entity producing malware programs which were antithetical to the interest of data security. The rebrand proved to effectuate the new image the company sought as it would go on to acquire additional VPN services years before its 2021 purchase of ExpressVPN. In 2018, Kape Technologies acquired Zenmate for $5.5 million and then Private Internet Access for $95 million in 2019.

With its growing portfolio, Kape Technologies had become increasingly more visible. Its umbrella of ownership centralizing multiple VPNs was a red flag for many who placed value in cyber security. Under growing scrutiny, the concerning origins of the company’s founders came to light. It was revealed that Koby Menachemi, Kape Technologies co-founder and former CEO, began his career in information technologies while serving in the Israeli Defense Forces. Menachemi worked as a developer in the Israeli Intelligence Corps under Unit 8200. That division of the IDF was responsible for collecting signal intelligence and data decryption. Its alumni are estimated to have founded over 1,000 tech startups. Companies founded by former operatives of Unit 8200 include Waze, Elbit Systems, and slews of other startups who have since been acquired by the likes of Kodak, PayPal, Facebook, and Microsoft.

Keep reading

FB “whistleblower” saga has propelled push for social media “permits”

Apparently emboldened by a recent “Facebook whistleblower’s” congressional testimony and media tour, an op-end has surfaced on project-sindicate.org exploring how information could be further and more efficiently contained and obscured from users, beyond “old-fashioned” ways like censorship and downranking.

And Steven Hill, formerly of the Center for Humane Technology (CHT) – an outfit dedicated to “radically reimagining our digital infrastructure” – has an appropriately radical idea: introduce digital operating permits and “protect people” by not allowing more than 1,000 to see a particular post.

To make the idea somewhat palatable, it was introduced under the guise of a novel way of dealing with what everybody seems to agree needs to be dealt with: tech monopolies. But the tech monopoly horse has left the barn a long time ago, and it seems that a degree of regulation will now be needed to rein it in and then allow natural ways of dealing with monopolies – fair competition and innovation to take care of the problem.

But Hill thinks the way to make them less dominant is by making major social media sites’ audiences artificially smaller. And since an average person hardly communicates with 1,000 people “in real life” (notwithstanding that people’s digital lives have very much become a part of their “real” one), Hill doesn’t think that users would be “deprived” by this limitation.

But right away, the true nature of this extraordinarily dystopian idea reveals itself to be not to truly limit the power of tech monopolies, but to make sure that the message that does get out to a lot of people (so, more than 1,000 at a time) is very controlled.

Keep reading

These Countries Have an INTERNET KILL SWITCH (and They Admit It)

What do you suppose would happen if the President of the United States deemed it necessary, for “national security,” to flip the Internet Kill Switch? In these digital times, there should be great concern over something like this. However, normalcy bias seems to have a firm hold on a majority of the citizens of the US, and many are clinging to the “it can’t happen here” theory.  

The United States has yet to employ this particular tool. However, according to data gathered to examine the financial impact of internet shutdowns, since 2019, there have been 237 major internet shutdowns in 45 countries. 

What is an internet kill switch?

An internet kill switch is a device/software/configuration that allows one to shut down all internet access within a region or country indefinitely. If activated, the kill switch would prevent everyone from checking social media, shopping online, using online messenger services, sending emails, or anything else involving an internet connection.

In many cases, this may also include any form of phone contact (it varies). 

Which countries have already used the internet kill switch?

Hackers have the ability to down the entire internet system, as we have seen with op article and op article. However, governments around the globe have also resorted to shutdowns, claiming it to be necessary for public safety. For example, India (a democratic nation) was the global leader in shutdowns in 2019, with over 150 in 3 years. 

Keep reading

Internet ‘freedom’ at its lowest in 11 years: study

The internet is an increasingly unwelcome place for many. A new study suggests that online “freedom” is in decline — for two very different reasons, depending on who you ask.

The annual report by Freedom House, a Washington, D.C.-based research and advocacy group, said this year is the 11th consecutive to see a global internet freedom decline.

The “Freedom on the Net” report rates countries on a 100-point scale, with the bottom considered least free. This year, scores internationally range from as low as 10 points in China to 96 points in Iceland. Scores 71 and above are designated “free,” while scores below 40 are “not free”; everything in the middle is considered “partly free.”

Considerations made in scoring include the extent to which free speech is legally protected, the proliferation of misinformation and hate speech and whether government authorities were known to target individual users, such as in India or Hungary where journalists and activists have been hit with state-supported spyware.

Keep reading

IMF report suggests credit scores could soon be based on web browsing history

The International Monetary Fund (IMF) has published the results of research conducted into how lenders are likely to be doing their business in the future, and what new information and personal data these companies plan to start asking from borrowers in order to determine their credit score.

The biggest takeaway is the seemingly inevitable shift from merely accessing credit information to also incorporating people’s online behavior into the process of deciding whether to lend them money necessary, for example, to buy a house.

Compared to the way the system now works in most countries – these changes, which are expected to be coming soon, look fairly invasive privacy-wise, and with no “vision” of proper safeguards. Banks and others will go as far as to access personal browsing and shopping history. This would be done by allowing automated systems, powered by algorithms, to harvest the data and turn it into credit reports.

Keep reading

Hackers claim to have stolen trove of data from Epik, web host for multiple right-wing platforms

A hacktivist group claims to have stolen a decade’s worth of data from web company Epik. The firm is known for hosting conservative platforms such as Parler and sites belonging to organizations like the Proud Boys.

On Monday, independent journalist Steven Monacelli shared a press release from hacking group Anonymous in which it claimed to have successfully infiltrated web domain registrar Epik. 

The group says it has stolen “a decade’s worth of data,” including information on Epik’s clients and users. The data, Anonymous claims, is “all that’s needed to trace actual ownership and management of the fascist side of the Internet that has eluded researchers, activists, and, well, just about everybody.” 

Anonymous said that the 180 gigabytes of data recovered by the hackers would be released for free public download. It has since been made available.

The group also claims that Epik did not encrypt any data, noting that everything including logins was there in plain text. They state that Russian developers allegedly used by Epik were bad at their jobs: “they probably enjoyed snooping through all your s**t just as much as we did.” The statement notes that credit card data wasn’t taken, adding, “FBI, we’re not in that game.”

Epik is no stranger to controversy. The firm hosts sites like free-speech focused Twitter competitor Gab, imageboard website 8chan, and Alex Jones’ InfoWars. It also hosts websites linked to the Proud Boys and Oath Keepers, a right-wing group that includes current and former military, law enforcement, and first-responder personnel who have sworn oaths to defend the US Constitution “from all enemies, foreign and domestic.” 

Keep reading

A slice of the Pentagon’s internet space that was taken over by a Florida company minutes before Trump left office has been returned, but the mystery remains

Minutes before the official end of President Donald Trump’s term, a young company based in Florida reportedly took control over a large chunk of internet space owned by the Pentagon.

Eight months later, it has been returned to the Department of Defense, The Washington Post reported Friday, but questions remain about the program.

The company at one point held 175 million IP addresses, controlling more of the internet than some of the world’s largest internet companies, including Comcast and AT&T.

The company was identified as Global Resource Systems LLC, headquartered in Plantation, Florida, Insider’s Kevin Shalvey reported in April. The company appeared to have been founded in the fall of last year, filing paperwork in Florida in October, and was incorporated in Delaware.

When news of the transfer of the internet space broke in April, the Department of Defense told the Associated Press it was being done to “assess, evaluate and prevent unauthorized use of DoD IP address space.”

But AP said officials could not answer why Global Resource Systems, a company that seemed to only be in existence for less than six months, was chosen to take over the space.

Keep reading