The state-backed Russian cyber spies behind the SolarWinds hacking campaign launched a targeted spear-phishing assault on U.S. and foreign government agencies and think tanks this week using an email marketing account of the U.S. Agency for International Development, Microsoft said.
The effort targeted about 3,000 email accounts at more than 150 different organizations, at least a quarter of them involved in international development, humanitarian and human rights work, Microsoft Vice President Tom Burt said in a blog post late Thursday.
It did not say what portion of the attempts may have led to successful intrusions.
The cybersecurity firm Volexity, which also tracked the campaign but has less visibility into email systems than Microsoft , said in a post that relatively low detection rates of the phishing emails suggest the attacker was “likely having some success in breaching targets.”
Burt said the campaign appeared to be a continuation of multiple efforts by the Russian hackers to “target government agencies involved in foreign policy as part of intelligence gathering efforts.” He said the targets spanned at least 24 countries.
The hackers gained access to USAID’s account at Constant Contact, an email marketing service, Microsoft said. The authentic-looking phishing emails dated May 25 purport to contain new information on 2020 election fraud claims and include a link to malware that allows the hackers to “achieve persistent access to compromised machines.”
Microsoft said in a separate blog post that the campaign is ongoing and evolved out of several waves of spear-phishing campaigns it first detected in January that escalated to the mass-mailings of this week.
While the SolarWinds campaign, which infiltrated dozens of private sector companies and think tanks as well as at least nine U.S. government agencies, was supremely stealthy and went on for most of 2020 before being detected in December by the cybersecurity firm FireEye, this campaign is what cybersecurity researchers call noisy. Easy to detect.
Microsoft noted the two mass distribution methods used: the SolarWinds hack exploited the supply chain of a trusted technology provider’s software updates; this campaign piggybacked on a mass email provider.
With both methods, the company said, the hackers undermine trust in the technology ecosystem.
…
Russia and Iran are leading the way when it comes to pushing bad information on one of the world’s most popular social media platforms, and new analysis finds they are getting savvier at evading detection. Facebook issued a report Wednesday looking at so-called coordinated inauthentic behavior over the past four years, warning that despite ongoing efforts to identify and remove disinformation networks, there is no let-up in attempts to exploit or weaponize conflict and crisis. “Threat actors have adapted their behavior and sought cover in the gray spaces between authentic and inauthentic engagement and political activity,” according to the Facebook report, which looked at the more than 150 networks from more than 50 countries that its security teams took down from 2017 to 2020. “We know they will continue to look for new ways to circumvent our defenses,” the report added, noting disinformation efforts were evenly split between foreign and domestic efforts. “Domestic IO also continues to push the boundaries of acceptable online behavior worldwide” per @Facebook “About half of the influence operations we’ve removed since 2017–including in #Moldova, #Honduras, #Romania, #UK, US, #Brazil & #India–were conducted by locals…” pic.twitter.com/e2pLpgLNaJ— Jeff Seldin (@jseldin) May 26, 2021 Russia, Iran influence efforts Overall, Russia was the biggest purveyor of disinformation, according to the analysis, with 27 identified influence operations during the four-year timeframe. Of those, 15 were connected to the St. Petersburg-based Internet Research Agency (IRA) or other entities linked to Yevgeny Prigozhin, a Russian oligarch with close ties to Russian President Vladimir Putin. US Hits Back at Russian Election Disinformation Ring New sanctions target the ‘inner circle’ of Ukrainian politician Andrii Derkach, previously outed by U.S. officials as a long-time Russian agent Another four Russian networks were traced to the Kremlin’s intelligence services and two more originated with Russian media sites. Iran was second on the list, with 23 inauthentic networks, nine of which were connected to the government or Iranian state broadcasters. Myanmar ranked third, with nine disinformation networks, followed by the United States and Ukraine. NEW: #Russia, #Iran#Myanmar top @Facebook’s list of sources for influence ops/ Coordinated Inauthentic Behavior in new report covering 2017-2020US is 4th, #Ukraine is 5th pic.twitter.com/X2Z45AqUO2— Jeff Seldin (@jseldin) May 26, 2021Facebook said the culprits in the United States and Ukraine included public relations firms, fringe political actors, and in the case of Ukraine, two political parties. China’s ‘strategic communication’ China, accused by U.S. intelligence officials for running multiple, intensive influence operations, did not make Facebook’s list of illicit disinformation networks, but not because Beijing was not active. Outgoing US Intel Chief Warns China Seeking Global Domination Director of National Intelligence John Ratcliffe has repeatedly sounded alarms about Beijing’s efforts, but now says China is prepared for an ‘open-ended period of confrontation’ with US “The China-origin activity on our platform manifested very differently than IO [influence operations] from other foreign actors, and the vast majority of it did not constitute CIB [Coordinated Inauthentic Behavior],” the Facebook report said. “Much of it was strategic communication using overt state-affiliated channels [e.g. state-controlled media, official diplomatic accounts] or large-scale spam activity that included primarily lifestyle or celebrity clickbait and also some news and political content.” #Election2020: “In the year leading up to the US 2020 election, we exposed over a dozen CIB operations targeting US audiences, including an equal number of networks originating from #Russia, #Iran, & the #UnitedStates itself” per @Facebookpic.twitter.com/MISQHnJigc— Jeff Seldin (@jseldin) May 26, 2021The Facebook report warned, however, that catching sophisticated disinformation actors like China and Russia is getting more difficult. “They are showing more discipline to avoid careless mistakes,” the report said. “Some are also getting better at avoiding language discrepancies.” Amplifying, outsourcing disinformation Facebook further warned that countries like Russia and China “are getting better at blurring the lines between foreign and domestic activity by co-opting unwitting [but sympathetic] domestic groups to amplify their narratives.” Another concerning trend identified in the Facebook report: outsourcing. “Over the past four years, we have investigated and removed influence operations conducted by commercial actors—media, marketing and public relations companies, including in Myanmar, the U.S., the Philippines, Ukraine, the UAE [United Arab Emirates] & Egypt,” according to the report. The report said despite a growing number of influence operations and their growing sophistication, many of them are being identified and taken down more quickly than in the past. But Nathaniel Gleicher, the head of Facebook security policy, said the social media platform can only do so much by itself. “Countering IO is a whole-of-society challenge. Defenders are most effective when gov’ts, industry, and civil society work together,” Gleicher wrote on Twitter. “We know threat actors are continuing to innovate, so we can’t take our foot off the gas now,” he added. “We have to keep pressing to stay ahead of adversarial innovation in 2021 and beyond.”
…
WhatsApp has filed a lawsuit challenging the Indian government’s new rules that require the Facebook-owned messaging platform to make people’s messages traceable, a move it says would undermine the privacy of users.The lawsuit was filed as India brought sweeping new regulations into force on Wednesday to make social media and technology companies, that have tens of millions of users in the country, more accountable for content on their platform.One of the new rules would require messaging platforms to identify the “first originator of information” when authorities demand it. WhatsApp wants that regulation blocked saying that it undermines citizens’ fundamental right to privacy.In a statement issued after the lawsuit was filed, the government said it respects the right to privacy as a fundamental right but “no Fundamental Right, including the Right to Privacy, is absolute and it is subject to reasonable restrictions.”The statement by the Ministry of Electronics and Information Technology said the requirement to disclose the origin of a particular message will only arise in the case of “prevention, investigation or punishment” of very serious offences.With over 40 million users, India is one of the biggest markets for the messaging platform. It has said that it is committed to protecting the privacy of people’s personal messages.“Technology and privacy experts have determined that traceability breaks end-to-end encryption and would severely undermine the privacy of billions of people who communicate digitally,” WhatsApp says in a blog post on its website. It said that a government “that chooses to mandate traceability is effectively mandating a new form of mass surveillance.”Technology experts in New Delhi called the lawsuit by WhatsApp significant.“This is one of the most significant lawsuits for privacy and it has implications not just for Indian users but globally. What will be debated in court is — can privacy of all users be compromised because there might be a legitimate demand from law enforcement agencies for information on one user or one message,” said Nikhil Pahwa, a digital rights activist and founder of technology publication Medianama. “Basically many governments around the world don’t want these kind of encrypted platforms because these platforms are blind to them and do not allow mass surveillance.”FILE – Rohitash Repswal, a digital marketer, shows a software tool that appears to automate the process of sending messages to WhatsApp users, on a screen inside his office in New Delhi, India, May 8, 2019.The sweeping new rules that were announced in February give the government more power to order social media companies, digital media and streaming platforms to remove content that it considers unlawful and require them to help with police investigations in identifying people who post “misinformation.” The employees of the companies in India can be held criminally liable for failing to comply with the government’s requests.Social media companies in India have been facing a tougher environment as the government seeks to regulate content posted online, which has become one of the most important spaces to express dissenting views.A spokesman for the opposition Congress Party, Abhishek Manu Singhvi, said the new rules were “extremely dangerous” for free speech and creativity, “unless extreme restraint is exercised” in implementing them.Critics accuse the government of trying to stifle online criticism and point to its requests to Twitter last month to remove several tweets including some that were critical of the government’s handling of the pandemic ravaging India. The government had said the messages could incite panic and were misinformation.Police also turned up at the local offices of Twitter in New Delhi on Monday to serve notice to the company concerning an investigation into the tagging of some government official’s tweets as “manipulated media.”
…
A few hours after the latest cease-fire took effect in the Gaza Strip, a number of Palestinian journalists in the coastal enclave found they were blocked from accessing WhatsApp messenger — a crucial tool used to communicate with sources, editors and the world beyond the blockaded strip. The Associated Press reached out to 17 journalists in Gaza who confirmed their Whatsapp accounts had been blocked since Friday. By midday Monday, only four journalists — working for Al Jazeera — confirmed their accounts had been restored.The incident marks the latest puzzling move concerning WhatsApp’s owner Facebook Inc. that’s left Palestinian users or their allies bewildered as to why they’ve been targeted by the company, or if indeed they’d been singled out for censorship at all.Twelve of the 17 journalists contacted by the AP said they had been part of a WhatsApp group that disseminates information related to Hamas military operations. Hamas, which rules over the Gaza Strip, is viewed as a terrorist organization by Israel and the United States, where WhatsApp owner Facebook is headquartered.It’s unclear if the journalists were targeted because they’d been following that group’s announcements on WhatsApp. Hamas runs Gaza’s Health Ministry, which has a WhatsApp group followed by more than 80 people, many of them journalists. That group, for example, has not been blocked. Hassan Slaieh, a freelance journalist in Gaza whose WhatsApp account is blocked, said he thinks his account might have been targeted because he was on a group called Hamas Media.”This has affected my work and my income because I lost conversations with sources and people,” Slaieh said. Al Jazeera’s chief correspondent in Gaza, Wael al-Dahdouh, said his access to WhatsApp was blocked around dawn on Friday before it was reinstated Monday. He said journalists subscribe to Hamas groups only to get information needed to do journalistic work.A WhatsApp spokesperson said the company bans accounts to comply with its policies “to prevent harm as well as applicable law.” The company said it has been in touch with media outlets over the last week about its practices. “We will reinstate journalists if any were impacted,” the company said. Israeli Missiles Destroy Gaza Building Housing Foreign Media OutletsAssociated Press says the ‘world will know less about’ escalating violence in Gaza because of attack on buildingAl Jazeera said that when it sought information regarding its four journalists in Gaza impacted by the blockage, they were told by Facebook that the company had blocked the numbers of groups based out of Gaza and consequently the cell phone numbers of Al Jazeera journalists were part of the groups they had blocked.Among those affected by the WhatsApp blockage are two Agence France-Presse journalists. The Paris-based international news service told the AP it is working with WhatsApp to understand what the problem is and to restore their accounts.The 11-day war caused widespread destruction across Gaza with 248 Palestinians, including 66 children and 39 women, killed in the fighting. Israel says 12 people in Israel, including two children, also died.It’s not the first time journalists have been suddenly barred from WhatsApp. In 2019, a number of journalists in Gaza had their accounts blocked without explanation. The accounts of those working with international media organizations were restored after contacting the company. Facebook and its photo and video-sharing platform Instagram were criticized this month for removing posts and deleting accounts by users posting about protests against efforts to evict Palestinians from their homes in east Jerusalem’s Sheikh Jarrah neighborhood. It prompted an open letter signed by 30 organizations demanding to know why the posts had been removed.Gaza Diary: Shouts, a Hurried Evacuation, and Then the Bombs Came AP journalist details the destruction of the building housing his officesThe New York Times also reported that some 100 WhatsApp groups were used by Jewish extremists in Israel for the purpose of committing violence against Palestinian citizens of Israel. WhatsApp said it does not have access to the contents of people’s personal chats, but that they ban accounts when information is reported they believe indicates a user may be involved in causing imminent harm. The company said it also responds to “valid legal requests from law enforcement for the limited information available to us.”The Arab Center for the Advancement of Social Media, or 7amleh, said in a report published this month that Facebook accepted 81% of requests made by Israel’s Cyber Unit to remove Palestinian content last year. It found that in 2020, Twitter suspended dozens of accounts of Palestinian users based on information from the Israeli Ministry of Strategic Affairs.Al-Dahdouh, the Al Jazeera correspondent, said although his account was restored, his past history of chats and messages was erased. “The groups and conversations were back, but content is erased, as if you are joining a new group or starting a new conversation,” he said. “I have lost information, images, numbers, messages and communications.”Al Jazeera said its journalists in Gaza had their WhatsApp accounts blocked by the host without prior notification.”Al Jazeera would like to strongly emphasize that its journalists will continue to use their WhatsApp accounts and other applications for newsgathering purposes and personal communication,” the news network told the AP. “At no time, have Al Jazeera journalists used their accounts for any means other than for personal or professional use.”The Qatar-based news network’s office in Gaza was destroyed during the war by Israeli airstrikes that took down the high-rise residential and office tower, which also housed The Associated Press offices. Press freedom groups accused the military, which claimed the building housed Hamas military intelligence, of trying to censor coverage of Israel’s offensive. The Israeli military telephoned a warning, giving occupants of the building one hour to evacuate. Sada Social, a West Bank-based center tracking alleged violations against Palestinian content on social media, said it was collecting information on the number of Gaza-based journalists impacted by the latest WhatsApp decision.
…
Some might put off a visit to the eye doctor, but one company has come up with a way for patients to administer their own vision exam at home, using a smartphone. Tina Trinh reports.
…
Indian police officials say they visited Twitter’s Delhi and Gurgaon offices to serve notice to the company’s managing director concerning an investigation into the company tagging some government official’s tweets as “manipulated media.”Several leaders of Prime Minister Narendra Modi’s Bharatiya Janata Party (BJP) shared parts of a document they said was created by their main political opposition, Congress, which allegedly showed how it planned to hinder the government’s response to the coronavirus pandemic.Some have been critical of the government’s handling of the pandemic. The BJP has blamed state governments for the slow response and ignoring warnings by Modi of a second wave.Congress said the documents were fake and complained to Twitter, which tagged the posts as manipulated.Twitter tags posts as “manipulated media” “that include media (videos, audio, and images) that have been deceptively altered or fabricated.”Twitter has not commented on this case.Modi’s administration has reportedly ordered Twitter to take down posts critical of its handling of the coronavirus in recent months. It has also complained when those orders were not followed.India has been hit hard by a second wave of the pandemic in recent months. The country has reported nearly 27 million cases and over 300,000 deaths.The latest dispute between the Indian government and U.S. social media giants Twitter and Facebook come as a deadline nears for the platforms to comply with new government takedown requests.Officials have warned both companies that failure to comply with the new rules “could lead to loss of status and protections as intermediaries.”
…
The recent cyberattack on Colonial Pipeline, the operator of the largest petroleum pipeline in the U.S., shows how internet criminals are increasingly targeting companies and organizations for ransom in what officials and experts term a growing national security threat.These hackers penetrate victims’ computer systems with a form of malware that encrypts the files, then they demand payments to release the data. In 2013, a ransomware attack typically targeted a person’s desktop or laptop, with users paying $100 to $150 in ransom to regain access to their files, according to Michael Daniel, president and CEO of Cyber Threat Alliance.“It was a fairly minimal affair,” said Daniel, who served as cybersecurity coordinator on the National Security Council under U.S. President Barack Obama, at the RSA Cybersecurity Conference this week.In recent years, ransomware has become a big criminal enterprise. Last year, victim organizations in North America and Europe paid an average of more than $312,000 in ransom, up from $115,000 in 2019, according to a recent report by the cybersecurity firm Palo Alto Networks. The highest ransom paid doubled to $10 million last year while the highest ransom demand grew to $30 million, according to Palo Alto Networks.“Those are some very significant amounts of money,” Daniel said. “And it’s not just individuals being targeted but things like school systems.”Last year, some of the largest school districts in the U.S., including Clark County Public Schools in Nevada, Fairfax County Public Schools in Virginia and Baltimore County Public Schools in Maryland, FILE – In this Sept. 12, 2019, photo, County Sheriff Janis Mangum stands in a control room at the county jail in Jefferson, Ga. A ransomware attack in March took down the office’s computer system.Colonial’s payment wasn’t the largest ransom paid by a single organization. Last year, Garmin, the maker of the popular fitness tracker, reportedly FILE – In this Aug. 22, 2019, file photo, signs on a bank of computers tell visitors that the machines are not working at the public library in Wilmer, Texas. Twenty-two local governments in Texas were hit by ransomeware in August 2019.Last month, the U.S. Justice Department created a task force to develop strategies to combat ransomware.“This is something we’re acutely focused on,” Monaco said.In a report to the Biden administration last month, an industry-backed task force called for a more aggressive response to ransomware.“It will take nothing less than our total collective effort to mitigate the ransomware scourge,” the task force wrote.In a typical ransomware attack, hackers lock a user’s or company’s data, offering keys to unlock the files in exchange for a ransom.But over the past year, hackers have adopted a new extortion tactic. Instead of simply encrypting a user’s files for extortion, cyber actors “exfiltrate” data, threatening to leak or destroy it unless a ransom is paid.Using dedicated leak sites, the hackers then release the data slowly in an effort “to increase pressure on the victim organization to pay the extortion, rather than posting all of the exfiltrated data at once.”In March, cybercriminals used this method when they encrypted a large Florida public school district’s servers and stole more than 1 terabyte of sensitive data, demanding $40 million in return.“If this data is published you will be subject to huge court and government fines,” the Conti cybercrime gang warned a Broward County Public Schools official.The district refused to pay.Cybersecurity experts have a term for this tactic: double extortion. The method gained popularity during the COVID-19 pandemic as cyber criminals used it to extort hospitals and other critical service providers.“They’re looking to increase the cost to the victim,” Meyers said at the RSA conference.Recent attacks show cyber criminals are upping their game. In October, hackers struck Finnish psychotherapy service Vastaamo, stealing the data of 400 employees and about 40,000 patients. The hackers not only demanded a ransom from Vastaamo but also smaller payments from individual patients.This was the first notable case of a disturbing new trend in ransomware attacks, according to researchers at Check Point.“It seems that even when riding the wave of success, threat groups are in constant quest for more innovative and more fruitful business models,” the researchers wrote.
…
Apple’s online marketplace would become a “toxic” mess if the iPhone maker were forced to allow third-party apps without reviewing them, chief executive Tim Cook said in testimony at a high-stakes trial challenging the company’s tight control of its platform.Cook, the last scheduled witness in the case brought by Fortnite maker Epic Games, delivered a strong defense of Apple’s procedures for reviewing and approving all the apps it offers for iPhone and iPad users.”We could no longer make the promise … of privacy, safety and security,” Cook said under questioning from Apple attorney Veronica Moye in federal court in California.Cook said Apple’s review process helps keep out malicious software and other problematic apps, helping create a safe place for consumers.Without this review, the online marketplace “would become a toxic kind of mess,” he said.”It would also be terrible for the developer, because the developer depends on the store being a safe and trusted place.”Cook’s testimony caps a high-profile trial which opened earlier this month in which Apple is accused of abusing a monopoly on its marketplace by creating a “walled garden” that squeezes app makers.’Not about money’Under cross-examination, Cook sparred with Epic lawyer Gary Bornstein about the profitability of the App Store.Cook disputed Epic’s contention that its profit margin on apps was some 80%, but the exact figure was not disclosed in court due to confidentiality.The Apple executive said the proprietary payments system challenged by Epic was about convenience for consumers, more than about profits.”We always put the user at the center of everything we do,” Cook said. “It has nothing to do with money.”During his testimony, Cook defended Apple’s policy of barring apps directing consumers to other platforms to purchase subscriptions or credits for games and other services.”It would be akin to Best Buy advertising that you can go across the street to the Apple Store to buy an iPhone,” he said.Epic, maker of the popular Fortnite video game, is seeking to force Apple to open up the marketplace to third parties seeking to circumvent Apple’s procedures and commissions of up to 30%.Apple booted Fortnite from its App Store last year after Epic dodged revenue sharing with the iPhone maker.Apple does not allow users of its popular devices to download apps from anywhere but its App Store, and developers have to use Apple’s payment system, which takes its cut.The Epic lawyer also questioned Cook about Apple’s arrangement with Google to be the default search engine for the iPhone maker’s Safari browser, another area scrutinized by antitrust officials.Cook acknowledged that Google pays for this position but added that Apple made the arrangement “in the best interest of the user.”The case before District Court Judge Yvonne Gonzalez Rogers in Oakland comes with Apple feeling pressure from a wide range of app makers over its control of the App Store, which critics say represents monopolistic behavior.The European Union has formally accused Apple of unfairly squeezing out music streaming rivals based on a complaint brought by Sweden-based Spotify and others, which claim the California group sets rules that favor its own Apple Music.A recently formed Coalition for App Fairness, which includes both Spotify and Epic, have called for Apple to open up its marketplace, claiming its commission is a “tax” on rivals.Closing arguments in the bench trial in California were expected early next week, with the judge expected to rule within several weeks.
…
South Korea requested from the United States incentives such as tax deductions and infrastructure construction to ease the U.S. investment of Korean firms, including leading chipmaker Samsung Electronics, its presidential office said Friday.South Korean President Moon Jae-in, in Washington for a summit with U.S. President Joe Biden, told a gathering of U.S. Secretary of Commerce Gina Raimondo, her South Korean counterpart and CEOs of Qualcomm, Samsung and other companies that both countries can benefit by strengthening supply chain cooperation.Biden has advocated for support for the U.S. chip industry amid a global chip shortage that has hit automakers and other industries.He met with executives from major companies including Samsung in April and previously announced plans to invest $50 billion in semiconductor manufacturing and research.Samsung plans to invest $17 billion for a new plant for chip contract manufacturing in the United States, South Korea’s presidential Blue House added in a statement, confirming plans previously reported.In February, documents filed with Texas state officials showed that Samsung is considering Austin, Texas, as one of the sites for a new $17 billion chip plant that the South Korean firm said could create 1,800 jobs.There has been no new public documentation filed on the potential Texas chip plant application since March, the website for the Texas Comptroller of Public Accounts showed Friday.The U.S. Department of Commerce and the Korean industry ministry agreed Friday that for continuous chip industry cooperation, policy measures such as incentive support, joint research and development, cooperation on setting standards, and manpower training and exchange are needed, the Blue House said.Meanwhile, DuPont announced plans to establish an R&D center in South Korea to develop original chip technologies such as photoresist for extreme ultraviolet (EUV) lithography, the Blue House said.
…
The hackers who carried out the massive SolarWinds intrusion were in the software company’s system as early as January 2019, months earlier than previously known, the company’s top official said Wednesday. SolarWinds had previously traced the origins of the hack to the fall of 2019 but now believes that hackers were doing “very early recon activities” as far back as the prior January, according to Sudhakar Ramakrishna, the company’s president and CEO. “The tradecraft that the attackers used was extremely well done and extremely sophisticated, where they did everything possible to hide in plain sight, so to speak,” Ramakrishna said during a discussion hosted by the RSA Conference. The SolarWinds hack, which was first reported last December and which U.S. officials have linked to the Russian government, is one in a series of major breaches that has prompted a major cybersecurity focus from the Biden administration. By seeding the company’s widely used software update with malicious code, hackers were able to penetrate the networks of multiple U.S. government agencies and private sector corporations in an apparent act of cyber-espionage. The U.S. imposed sanctions against Russia last month. Also Wednesday, Ramakrishna apologized for the way the company blamed an intern earlier this year during congressional testimony for poor password security protocols. That public statement, he said, was “not appropriate.” “I have long held a belief system and an attitude that you never flog failure. You want your employees, including interns, to make mistakes and learn from those mistakes and together we become better,” he added. “Obviously you don’t want to make the same mistake over and over again. You want to improve.”
…
From earbuds that measure blood pressure to clothing that monitors your heart rate, the latest in health monitoring technology is being included in everyday items such as clothes, rings and glasses. VOA’s Elizabeth Lee has the details.
Camera: Elizabeth Lee
Producer: Elizabeth Lee
…
Ireland’s data regulator can resume a probe that may trigger a ban on Facebook’s transatlantic data transfers, the High Court ruled Friday, raising the prospect of a stoppage the company warns would have a devastating impact on its business.
The case stems from EU concerns that U.S. government surveillance may not respect the privacy rights of EU citizens when their personal data is sent to the United States for commercial use.
Ireland’s Data Protection Commissioner (DPC), Facebook’s lead regulator in the European Union, launched an inquiry in August and issued a provisional order that the main mechanism Facebook uses to transfer EU user data to the United States “cannot in practice be used.”
Facebook had challenged both the inquiry and the Preliminary Draft Decision (PDD), saying they threatened “devastating” and “irreversible” consequences for its business, which relies on processing user data to serve targeted online ads.
The High Court rejected the challenge Friday. “I refuse all of the reliefs sought by FBI [Facebook Ireland] and dismiss the claims made by it in the proceedings,” Justice David Barniville said in a judgment that ran to nearly 200 pages.
“FBI has not established any basis for impugning the DPC decision or the PDD or the procedures for the inquiry adopted by the DPC,” the judgment said.
While the decision does not trigger an immediate halt to data flows, Austrian privacy activist Max Schrems, who forced the Irish data regulator to act in a series of legal actions over the past eight years, said he believed the decision made it Inevitable.
“After eight years, the DPC is now required to stop Facebook’s EU-U.S. data transfers, likely before summer,” he said.
A Facebook spokesman said the company looked forward to defending its compliance with EU data rules as the Irish regulator’s provisional order “could be damaging not only to Facebook, but also to users and other businesses.”
Privileged access
If the Irish data regulator enforces the provisional order, it would effectively end the privileged access companies in the United States have to personal data from Europe and put them on the same footing as companies in other nations outside the bloc.
The mechanism being questioned by the Irish regulator, the Standard Contractual Clause (SCC), was deemed valid by the European Court of Justice in a July decision.
But the Court of Justice also ruled that, under SCCs, privacy watchdogs must suspend or prohibit transfers outside the EU if data protection in other countries cannot be assured.
A lawyer for Facebook in December told the High Court that the Irish regulator’s draft decision, if implemented, “would have devastating consequences” for Facebook’s business, affecting Facebook’s 410 million active users in Europe, hitting political groups and undermining freedom of speech.
Irish Data Protection Commissioner Helen Dixon in February said companies more broadly may face massive disruption to transatlantic data flows as a result of the European Court of Justice decision.
Dixon’s office welcomed the decision on Friday but declined further comment.
…
Ireland’s health service operator shut down all its IT systems Friday to protect them from a ransomware attack, which crippled diagnostic services and disrupted COVID-19 testing.An international cybercrime gang was behind the attack, said Ossian Smyth, Ireland’s minister responsible for e-government. Smyth described it as possibly the most significant cybercrime attempt against the Irish state.Ireland’s COVID-19 vaccination program was not directly affected, but the attack was affecting IT systems serving all other local and national health provisions, the head of the Health Service Executive (HSE) said.Ransomware attacks typically involve the infection of computers with malicious software, often downloaded by clicking on seemingly innocuous links in emails or other website pop-ups. Users are left locked out of their systems, with the demand that a ransom be paid to restore computer functions.No payment”We are very clear we will not be paying any ransom,” Prime Minister Micheál Martin told reporters.The HSE’s chief described the attack as “very sophisticated.” Officials said the gang exploited a previously unknown vulnerability. Authorities shut down the system as a precaution after discovering the attack early Friday morning and will seek to gradually reopen the network, although that will take “some days,” Martin said.The attack was largely affecting information stored on central servers, and officials said they were not aware that any patient data had been compromised. Hospital equipment was not impacted, with the exception of radiography services.”More services are working than not today,” HSE Chief Operations Officer Anne O’Connor told national broadcaster RTE.”However, if this continues to Monday, we will be in a very serious situation and will be canceling many services. At this moment, we can’t access lists of people scheduled for appointments on Monday so we don’t even know who to cancel.”
…
A fully robotic kitchen with a robot chef that can cook thousands of dishes could be a gamechanger in homes and restaurants around the world. VOA’s Julie Taboh has more.Producers: Julie Taboh, Adam Greenbaum
…
A Russia-linked cyberattack targeting the largest U.S. fuel pipeline system is a “criminal act, obviously,” President Joe Biden said Monday.“The agencies across the government have acted quickly to mitigate any impact on our fuel supply,” the president said at the White House at the start of remarks about his economic agenda.Biden, responding to a reporter’s question after he concluded his prepared statement about whether there is any evidence of involvement of Russia’s government, replied: “I’m going to be meeting with President (Vladimir) Putin. And so far, there is no evidence based on — from our intelligence people that Russia is involved.”Biden added, however, with evidence that the ransomware actors are based in Russia, the government in Moscow has “some responsibility to deal with this.”Rep. Ruben Gallego, D-Ariz., asks a question during a House Natural Resources Committee hearing, July 28, 2020 on Capitol Hill in Washington.A member of the House Armed Services Committee, Arizona Democrat Ruben Gallego, said, “The Russian government cannot give refuge to these cyber terrorists without repercussions.”Colonial Pipeline, headquartered in the state of Georgia, proactively shut down its operations on Friday after ransomware hackers broke into some of its networks, according to U.S. officials.“Colonial is currently working with its private cybersecurity consultants to assess potential damage and to determine when it is safe to bring the pipeline back online,” homeland security adviser and deputy national security adviser Elizabeth Sherwood-Randall told reporters during a briefing prior to the president’s remarks.“While this situation remains fluid and continues to evolve, the Colonial operations team is executing a plan that involves an incremental process that will facilitate a return to service in a phased approach,” the company said in a FILE – The J. Edgar Hoover FBI Building is pictured in Washington, Nov. 30, 2017.“The FBI confirms that the Darkside ransomware is responsible for the compromise of the Colonial Pipeline network,” said the Federal Bureau of Investigation in a statement midday Monday. “We continue to work with the company and our government partners on the investigation.”The FBI has previously advised against paying ransomware. White House officials on Monday said it was up to companies to make that decision and declined to say whether Colonial Pipeline had made a payment to the hackers.”Typically, that is a private sector decision, and the administration has not offered further advice at this time,” deputy national security adviser for cyber and emerging technologies Anne Neuberger told White House reporters. “Given the rise in ransomware, that is one area we are definitely looking at now to say what should be the government’s approach.”Some lawmakers have been calling for stronger protections of critical U.S. energy infrastructure and that has been mentioned as a priority by the Biden administration, which last month launched a new public-private initiative to enhance cybersecurity in the electricity sector.“And we’ll follow that with similar initiatives and natural gas pipelines, water and other sectors,” said Biden on Monday.The emergency declaration, issued by the Transportation Department, effective through at least June 8, calls for increasing alternative transportation routes in the United States for oil and gas and eased driver regulations for overtime hours and minimum sleep for carrying fuel in 17 states across southern and eastern states, as well as the District of Columbia.“We are closely monitoring the ongoing situation involving Colonial Pipeline,” Suzanne Lemieux, operations security and emergency response policy manager for the American Petroleum Institute, told VOA.“Cybersecurity is a top priority for our industry, and our members are engaged on a continuous basis with government agencies, including the Transportation Security Administration, Cyber Security and Infrastructure Security Agency, and the Department of Energy in order to mitigate risk and fully understand the evolving threat landscape,” she added. Concerning speculation that there are links between the hackers and the Russian government, “we can assume anything we want to, which is part of the gamesmanship in cyberwar,” said Justin Pelletier, director of Rochester Institute of Technology’s Global Cybersecurity Institute Cyber Range and Training Center.“I think a better question to ask is who we can cross off the list. There are many beneficiaries of cyber sell-sword (mercenary) activity and probably everyone can think of several organizations that would like to see an America in decline,” Pelletier told VOA.According to Bryson Bort, senior fellow for cybersecurity and emerging threats at the nonprofit R Street public policy research organization, the malicious code used by Darkside “actively checks that the Russian language package isn’t loaded on a host before it ransoms the computer. Clearly, there is a reason the gang is doing that. Is it just to avoid local enforcement?”Bort, an adviser to the Army Cyber Institute, told VOA it is an open question whether Russian intelligence is using the cybercriminals as a proxy.“Considering this was the fourth U.S. company hit in the energy sector in the last six months by this group, it sure looks like a targeted attack to me,” he said.
…
A Russia-linked cyberattack targeting the largest U.S. fuel pipeline system is a “criminal act, obviously,” President Joe Biden said Monday.“The agencies across the government have acted quickly to mitigate any impact on our fuel supply,” the president said at the White House at the start of remarks about his economic agenda.Biden, responding to a reporter’s question after he concluded his prepared statement about whether there is any evidence of involvement of Russia’s government, replied: “I’m going to be meeting with President (Vladimir) Putin. And so far, there is no evidence based on — from our intelligence people that Russia is involved.”Biden added, however, with evidence that the ransomware actors are based in Russia, the government in Moscow has “some responsibility to deal with this.”Rep. Ruben Gallego, D-Ariz., asks a question during a House Natural Resources Committee hearing, July 28, 2020 on Capitol Hill in Washington.A member of the House Armed Services Committee, Arizona Democrat Ruben Gallego, said, “The Russian government cannot give refuge to these cyber terrorists without repercussions.”Colonial Pipeline, headquartered in the state of Georgia, proactively shut down its operations on Friday after ransomware hackers broke into some of its networks, according to U.S. officials.“Colonial is currently working with its private cybersecurity consultants to assess potential damage and to determine when it is safe to bring the pipeline back online,” homeland security adviser and deputy national security adviser Elizabeth Sherwood-Randall told reporters during a briefing prior to the president’s remarks.“While this situation remains fluid and continues to evolve, the Colonial operations team is executing a plan that involves an incremental process that will facilitate a return to service in a phased approach,” the company said in a FILE – The J. Edgar Hoover FBI Building is pictured in Washington, Nov. 30, 2017.“The FBI confirms that the Darkside ransomware is responsible for the compromise of the Colonial Pipeline network,” said the Federal Bureau of Investigation in a statement midday Monday. “We continue to work with the company and our government partners on the investigation.”The FBI has previously advised against paying ransomware. White House officials on Monday said it was up to companies to make that decision and declined to say whether Colonial Pipeline had made a payment to the hackers.”Typically, that is a private sector decision, and the administration has not offered further advice at this time,” deputy national security adviser for cyber and emerging technologies Anne Neuberger told White House reporters. “Given the rise in ransomware, that is one area we are definitely looking at now to say what should be the government’s approach.”Some lawmakers have been calling for stronger protections of critical U.S. energy infrastructure and that has been mentioned as a priority by the Biden administration, which last month launched a new public-private initiative to enhance cybersecurity in the electricity sector.“And we’ll follow that with similar initiatives and natural gas pipelines, water and other sectors,” said Biden on Monday.The emergency declaration, issued by the Transportation Department, effective through at least June 8, calls for increasing alternative transportation routes in the United States for oil and gas and eased driver regulations for overtime hours and minimum sleep for carrying fuel in 17 states across southern and eastern states, as well as the District of Columbia.“We are closely monitoring the ongoing situation involving Colonial Pipeline,” Suzanne Lemieux, operations security and emergency response policy manager for the American Petroleum Institute, told VOA.“Cybersecurity is a top priority for our industry, and our members are engaged on a continuous basis with government agencies, including the Transportation Security Administration, Cyber Security and Infrastructure Security Agency, and the Department of Energy in order to mitigate risk and fully understand the evolving threat landscape,” she added. Concerning speculation that there are links between the hackers and the Russian government, “we can assume anything we want to, which is part of the gamesmanship in cyberwar,” said Justin Pelletier, director of Rochester Institute of Technology’s Global Cybersecurity Institute Cyber Range and Training Center.“I think a better question to ask is who we can cross off the list. There are many beneficiaries of cyber sell-sword (mercenary) activity and probably everyone can think of several organizations that would like to see an America in decline,” Pelletier told VOA.According to Bryson Bort, senior fellow for cybersecurity and emerging threats at the nonprofit R Street public policy research organization, the malicious code used by Darkside “actively checks that the Russian language package isn’t loaded on a host before it ransoms the computer. Clearly, there is a reason the gang is doing that. Is it just to avoid local enforcement?”Bort, an adviser to the Army Cyber Institute, told VOA it is an open question whether Russian intelligence is using the cybercriminals as a proxy.“Considering this was the fourth U.S. company hit in the energy sector in the last six months by this group, it sure looks like a targeted attack to me,” he said.
…
The global shortage of semiconductors, or microchips — the “brains” in all electronic devices, has heightened the geopolitical significance of Taiwan and its chip-making sector. The island is home to the world’s largest contract chipmaker: Taiwan Semiconductor Manufacturing Co (TSMC).Many describe Taiwan’s strength in microchips as its “silicon shield,” which can protect it against Chinese aggression.But others suspect the sector, coveted by China, may also trigger China to accelerate its efforts to take advantage of Taiwan’s tech prowess.‘Not let war happen’When asked to explain the shield, TSMC chairman Mark Liu told CBS News’ “60 Minutes” program last week that it means “the world all needs Taiwan’s high-tech industry support. So, they will not let the war happen in this region because it goes against interest of every country in the world.”While refusing to comment on whether the industry will keep Taiwan safe, Liu added that he hoped no war would occur in Taiwan. It is widely believed that any war fought in Taiwan could disrupt the global supply chains of microchips.More than 1 trillion chips are currently being produced annually. Industry watchers, including the National Bank of Canada estimated earlier that TSMC alone accounts for one-fifth of the world’s chip production and up to 90% of the supply of the most advanced chips.In an “extremely hypothetical scenario,” such a disruption in Taiwan’s chip production could cause $490 billion in annual losses for electronic device makers worldwide, according to estimates by the U.S.-based Semiconductor Industry Association last month.All shut downAmerican tech giants including Apple, major European auto makers and even Chinese companies would have to halt production in the event of a TSMC collapse, said Frank Huang, chairman of Taiwan’s third-largest chipmaker Powerchip Semiconductor Manufacturing Corp.That, he said, will make China think twice about using force against Taiwan, the self-ruled island Beijing views as a renegade province.“China likes [to]… threat [threaten] Taiwan. But realistically without Taiwan, they cannot move either. Their semiconductors also shut down. So, the problem is: can you take over Taiwan without [triggering] impact [on] semiconductors? That is not [going to] happen,” Huang told VOA.The term “silicon shield” was first coined by Craig Addison in late 2000, who argued in his book “Silicon Shield: Taiwan’s Protection Against Chinese Attack” that the island’s rise as the key supplier for the world’s digital economy would serve as “a deterrent against possible Chinese aggression.”FILE – A leaflet that asks employees to protect the company’s confidentiality is seen at a reception in Taiwan Semiconductor Manufacturing Co (TSMC), in Hsinchu, Taiwan, Aug. 31, 2018.The debate over such a deterrent has heated up now that the pandemic has seriously disrupted most supply chains. The U.S. has also placed restrictions on exports of chips and chip-making equipment using U.S. design and technology to China — a development that some observers also fear may end up provoking China to increase aggression toward Taiwan.But Darson Chiu, a research fellow at the Taiwan Institute of Economic Research (TIER) in Taipei, disagreed, saying that he believes the world will stand behind Taiwan.“The world’s superpowers will view TSMC as a key driver behind the future global economic revival, which belongs to no one but the world. Hence the world will not tolerate China’s use of force to control TSMC,” Chiu told VOA over the phone.Double layer of protectionThe island’s dominance in chip-making has fueled the debate over its silicon shield, but the U.S. is more concerned that the shield may “have holes in it” and the technology is being used by China’s military, according to Alexander Neill, a former Shangri-La Dialogue senior fellow for Asia Pacific security at the International Institute for Strategic Studies.An earlier Washington Post report alleged that a Chinese firm had used TSMC chips in the Chinese military’s development of hypersonic missiles. But the company denied the charges.The U.S. is also concerned about vulnerabilities caused by TSMC production being concentrated in Taiwan. The island’s water and electric supply shortages could disrupt production.“What the United States wants to do is to help TSMC diversify its production base so that there’s a double layer of protection. So, if the first shield is being penetrated, the second [reinforcement] shield is to nurture the chip production base in friends and ally countries including the United States,” Neill told VOA over the phone.Surging demandTSMC has planned to invest $100 billion in the next three years on new production facilities including a state-of-the-art wafer fabrication plant in the U.S. state of Arizona and expansions of its Nanjing, China-based fab to produce 28 nanometer chips for auto makers.The move aims to increase TSMC’s capacity, which is currently working at full capacity, to meet surging demand and support future growth in the global economy, TIER’s Chiu said.In a stock exchange filing last month, TSMC said it “is entering a period of higher growth as the multiyear megatrends of 5G and HPC (high performance computer) are expected to fuel strong demand for our semiconductor technologies in the next several years. In addition, the Covid-19 pandemic also accelerates digitalization in every aspect.”But Powerchip’s Huang questions if overseas wafer fabs will be as cost effective as those based in Taiwan. He said that many fabs in the U.S. and Germany have proved to be too expensive to sustain.Expansion in ChinaFor years, China’s attempts to manufacture chips have failed since China lacks access to the intellectual property required for the process.Hence, TSMC’s expansion plan in its Nanjing plant is welcomed by many in China despite worries that the survival of homegrown chipmakers may be threatened by the Taiwanese chipmaker, according to Song Hong, assistant general director at the Institute of World Economics and Politics under the Chinese Academy of Social Sciences.“28nm chips aren’t high-end. But mid- to low-end chips are in higher demand. So, I think this shows TSMC’s optimism in China’s future demand. It is in our hope to bolster homegrown chipmakers, but we also welcome competition,” Song told VOA.Song, however, shrugged off the geopolitical implications of Taiwan’s silicon shield, saying that China views Taiwanese issues as domestic affairs and will not be deterred from its goals by U.S. action. (This article originated in VOA’s Mandarin service.)
…
Facebook has taken down a network of hundreds of fake accounts and pages targeting people in Ukraine and linked to individuals previously sanctioned by the United States for efforts to interfere in U.S. elections, the company said Thursday.Facebook said the network managed a long-running deceptive campaign across multiple social media platforms and other websites, posing as independent news outlets and promoting favorable content about Ukrainian politicians, including activity that was likely for hire. The company said it started its probe after a tip from the FBI.Facebook attributed the activity to individuals and entities sanctioned by the U.S. Treasury Department, including politician Andriy Derkach, a pro-Russian lawmaker who was blacklisted by the U.S. government in September over accusations he tried to interfere in the 2020 U.S. election won by President Joe Biden. Facebook said it removed Derkach’s accounts in October 2020.Derkach told Reuters he would comment on Facebook’s investigation on Friday. Facebook also attributed the network to political consultants associated with Ukrainian politicians Oleh Kulinich and Volodymyr Groysman, Ukraine’s former prime minister. Kulinich did not immediately respond to a request for comment. Groysman could not immediately be reached for comment.Facebook said that as well as promoting these politicians, the network also pushed positive material about actors across the political spectrum, likely as a paid service. It said the activity it investigated began around 2015, was solely focused on Ukraine, and posted anti-Russia content.”You can really think of these operators as would-be influence mercenaries, renting out inauthentic online support in Ukrainian political circles,” Ben Nimmo, Facebook’s global influence operations threat intelligence lead, said on a call with reporters.Facebook’s investigation team said Ukraine, which has been among the top sources of “coordinated inauthentic behavior” that it removes from the site, is home to an increasing number of influence operations selling services.Facebook said it removed 363 pages, which were followed by about 2.37 million accounts, and 477 accounts from this network for violating its rules. The network also spent about $496,000 in Facebook and Instagram ads, Facebook said.
…
Twitter wants to curb what the company calls “potentially harmful or offensive” tweets. The social media company announced Wednesday it has released a feature that can detect a mean tweet and prompt a user to be sure they really want to send it. “People come to Twitter to talk about what’s happening, and sometimes conversations about things we care about can get intense, and people say things in the moment they might regret later,” the company said in a blog post. “That’s why in 2020, we tested prompts that encouraged people to pause and reconsider a potentially harmful or offensive reply before they hit send.” The prompt says: “Want to review this before tweeting?” Users can then decide whether to send, edit or delete the tweet. Twitter did not specify what would be considered “potentially harmful or offensive.” The company currently has a similar feature that asks users if they went to read an article before retweeting a link to the article. Twitter’s new mean tweet detector has been tested for the past year and will be rolled out soon to English-language Twitter. The company said that while testing, 34% of users, when prompted, either edited the offensive tweet or did not send it at all. Last week, Twitter stock plunged 10% on lower-than-expected user growth.
…
The recent decision about Facebook and former President Donald Trump sends a signal to world leaders everywhere that to use social media, they have to play by a set of rules that are still forming. Tina Trinh has more.Produced by: Matt Dibble
…
Facebook’s oversight board on Wednesday upheld the social media company’s decision to ban former U.S. President Donald Trump from posting comments to his Facebook and Instagram accounts, a measure imposed after he posted incendiary remarks as hundreds of his supporters stormed the U.S. Capitol on January 6.The quasi-independent panel, however, left open the possibility that Trump could eventually return to the popular website, saying it “was not appropriate for Facebook to impose the indeterminate and standardless penalty of indefinite suspension.” The oversight group gave Facebook executives six months to re-examine the “arbitrary penalty” it imposed the day after the insurrection, when Trump urged followers to confront lawmakers as they certified Joe Biden’s election victory. The review said Facebook executives should decide on another penalty that reflects the “gravity of the violation and the prospect of future harm.” Facebook management responded by saying it “will now consider the board’s decision and determine an action that is clear and proportionate. In the meantime, Mr. Trump’s accounts remain suspended.” Trump reacted angrily to the oversight panel’s decision. “Free Speech has been taken away from the President of the United States because the Radical Left Lunatics are afraid of the truth, but the truth will come out anyway, bigger and stronger than ever before,” he said.“The People of our Country will not stand for it! These corrupt social media companies must pay a political price and must never again be allowed to destroy and decimate our Electoral Process,” he said. He also said, “What Facebook, Twitter and Google have done is a total disgrace and embarrassment to our Country.”The White House offered no response to the board’s decision. “This is an independent board decision, and we’re not going to have any comment on the future of the former president’s social media platform,” press secretary Jen Psaki said.Trump, now three-plus months out of office but contemplating another run for the presidency in 2024, unveiled Tuesday morning a new website, “From the Desk of Donald J. Trump,” to communicate with his supporters. It looked much like a Twitter feed, with posts written by Trump that could be shared on Facebook, Twitter and YouTube.During his four years in the White House, Trump broke new ground with thousands of tweets on issues of the day, endorsements of Republican candidates he favored over those who had attacked him, and acerbic comments about opposition Democrats. A letter submitted to the oversight panel on Trump’s behalf asked the board to reconsider the Facebook suspension, contending it was “inconceivable” that either of his January 6 posts “can be viewed as a threat to public safety, or an incitement to violence.” The letter also claimed all “genuine” Trump supporters at the Capitol on January 6 were law-abiding, and that “outside forces” were involved. However, more than 400 people inside the Capitol that day, including many wearing Trump-emblazoned hats and shirts and carrying pro-Trump flags and signs, have been arrested and charged with an array of criminal offenses. The oversight board found that Trump’s two posts in the midst of the chaos at the Capitol that left five people dead severely violated Facebook’s Community Standards and Instagram’s Community Guidelines. “We love you. You’re very special” in the first post, and “great patriots” and “remember this day forever,” in the second post violated Facebook’s rules prohibiting praise or support of people engaged in violence, the review panel said. The oversight group went on to say that “in maintaining an unfounded narrative of electoral fraud and persistent calls to action, Mr. Trump created an environment where a serious risk of violence was possible. At the time of Mr. Trump’s posts, there was a clear, immediate risk of harm, and his words of support for those involved in the riots legitimized their violent actions.” “As president, Mr. Trump had a high level of influence,” the panel concluded. “The reach of his posts was large, with 35 million followers on Facebook and 24 million on Instagram. “Given the seriousness of the violations and the ongoing risk of violence, Facebook was justified in suspending Mr. Trump’s accounts on January 6 and extending that suspension on January 7,” the panel said. “However, it was not appropriate for Facebook to impose an ‘indefinite’ suspension.” In one of his posts during the insurrection, Trump said, “These are the things and events that happen when a sacred landslide election victory is so unceremoniously viciously stripped away from great patriots who have been badly unfairly treated for so long. Go home with love in peace. Remember this day forever!” Facebook removed the post and decided the next day to extend Trump’s ban indefinitely, at least past Biden’s January 20 inauguration. “His decision to use his platform to condone rather than condemn the actions of his supporters at the Capitol building has rightly disturbed people in the U.S. and around the world,” Facebook chief executive Mark Zuckerberg said in a January 7 statement. “We removed these statements yesterday because we judged that their effect — and likely their intent — would be to provoke further violence.” The 20-member review panel was composed of legal scholars, human rights experts and journalists. A five-member panel prepared a decision, which had to be approved by a majority of the full board, and which Facebook was then required to implement unless the action could violate the law. The board says its mission is to “answer some of the most difficult questions around freedom of expression online: what to take down, what to leave up, and why.” The Facebook Oversight Board was created last October after the company faced criticism it was not quickly and effectively dealing with what some feel has been problematic content. The board announced its first decisions in January, supporting Facebook’s decision to remove content in one case, but overruling the company and ordering it to restore posts in four other cases.
…
Facebook’s quasi-independent oversight board on Wednesday upheld the social media company’s decision to ban former U.S. President Donald Trump from posting comments to his Facebook and Instagram accounts.The panel, however, left open the possibility that Trump could eventually return to the popular website with millions of viewers, saying it “was not appropriate for Facebook to impose the indeterminate and standardless penalty of indefinite suspension.” The oversight group gave Facebook executives six months to reexamine the “arbitrary penalty” it imposed the day after the Jan. 6 attack on the U.S. Capitol when Trump urged followers to confront lawmakers as they were certifying that he had lost his November reelection contest to Democrat Joe Biden. The board is made up of 20 members, including legal scholars, human rights experts and journalists. A panel of five members prepares a decision, which has to be approved by a majority of the full board, and which Facebook is then required to implement unless the action could violate the law.The board says its mission is to “answer some of the most difficult questions around freedom of expression online: what to take down, what to leave up, and why.”In this Jan. 6, 2021, file photo, Trump supporters participate in a rally in Washington.Trump made several posts during the attack on the January attack on the U.S. capital, continuing his false claims that the election was “stolen.” Facebook removed two of Trump’s posts and initially banned him from posting for 24 hours.“These are the things and events that happen when a sacred landslide election victory is so unceremoniously viciously stripped away from great patriots who have been badly unfairly treated for so long,” Trump posted about two hours before police and National Guard troops secured the Capitol. “Go home with love in peace. Remember this day forever!”Facebook decided the next day to extend Trump’s ban indefinitely, at least past the inauguration of President Joe Biden.“His decision to use his platform to condone rather than condemn the actions of his supporters at the Capitol building has rightly disturbed people in the US and around the world. We removed these statements yesterday because we judged that their effect — and likely their intent — would be to provoke further violence,” Facebook CEO Mark Zuckerberg said in a January 7 statement.Twitter instituted a permanent ban against Trump, saying several of his posts “are likely to inspire others to replicate the violent acts that took place on January 6, 2021, and that there are multiple indicators that they are being received and understood as encouragement to do so.”The Facebook Oversight Board was created last October after the company faced criticism it was not quickly and effectively dealing with what some feel is problematic content.The board announced its first decisions in January, supporting Facebook’s decision to remove content in one case, but overruling the company and ordering it to restore posts in four other cases.
…
Facebook’s quasi-independent Oversight Board is set to announce Wednesday whether the social media company was correct to indefinitely prohibit former U.S. President Donald Trump from posting to his Facebook and Instagram accounts.The board is made up of 20 members, including legal scholars, human rights experts and journalists. A panel of five members prepares a decision, which must be approved by a majority of the full board, and which Facebook is then required to implement unless the action could violate the law.The board says its mission is to “answer some of the most difficult questions around freedom of expression online: what to take down, what to leave up, and why.”Trump’s ban dates to the January 6 attack on the U.S. Capitol by his supporters that came as members of Congress were meeting to certify the results of the November presidential election.In this Jan. 6, 2021, file photo, Trump supporters participate in a rally in Washington.He made several posts during the attack continuing his false claims that the election was “stolen.” Facebook removed two of Trump’s posts and initially banned him from posting for 24 hours.“These are the things and events that happen when a sacred landslide election victory is so unceremoniously viciously stripped away from great patriots who have been badly unfairly treated for so long,” Trump posted about two hours before police and National Guard troops secured the Capitol. “Go home with love in peace. Remember this day forever!”Facebook decided the next day to extend Trump’s ban indefinitely, at least past the inauguration of President Joe Biden.“His decision to use his platform to condone rather than condemn the actions of his supporters at the Capitol building has rightly disturbed people in the US and around the world. We removed these statements yesterday because we judged that their effect — and likely their intent — would be to provoke further violence,” Facebook CEO Mark Zuckerberg said in a January 7 statement.Twitter instituted a permanent ban against Trump, saying several of his posts “are likely to inspire others to replicate the violent acts that took place on January 6, 2021, and that there are multiple indicators that they are being received and understood as encouragement to do so.”The Facebook Oversight Board was created last October after the company faced criticism it was not quickly and effectively dealing with what some feel is problematic content.The board announced its first decisions in January, supporting Facebook’s decision to remove content in one case, but overruling the company and ordering it to restore posts in four other cases.
…
Billionaire Bill Gates and Melinda Gates said in a joint statement on Monday that they have made the decision to end their marriage. “After a great deal of thought and a lot of work on our relationship, we have made the decision to end our marriage,” the two said in a statement posted by Bill Gates’ Twitter account. “We no longer believe we can grow together as a couple in the next phase of our lives. We ask for space and privacy for our family as we begin to navigate this new life,” their statement said.
…