Google/YouTube Declares Nazis Using The Dog Whistles

Really Google? Perhaps try wearing the tyrannical high-tech moniker for a while.

A newly-published leaked document contains what appears to be an email exchange among Google employees participating in a “transparency-and-ethics” discussion that includes a reference to PragerU, Jordan Peterson, and Ben Shapiro as “nazis using the dog whistles.”

The document was published by Project Veritas Tuesday, a day after the conservative group released its report on how political and ideological bias influences the ways in which Google connects users to content. The group obtained the “newly leaked document from Google” via their tipline.

“The email apparently was sent as part of the Google ‘transparency-and-ethics’ group internal communications and suggests that content from PragerU, Jordan Peterson, and Ben Shapiro should be disabled from the ‘suggestion feature,'” Project Veritas reports.

“Today it is often 1 or 2 steps to nazis, if we understand that PragerU, Jordan Peterson, Ben Shapiro et al are nazis using the dog whistles you mention in step 1,” reads the email that appears to have been sent to over a dozen other Google employees. “I can receive these recommendations regardless of the content of what I’m looking at, and I have recorded thousands of internet users sharing the same experience. I don’t think correctly identifying far-right content is beyond our capabilities. But if it is, why not go with Meredith’s suggestion of disabling the suggestion feature?”

Project Veritas published the document a day after its exposé on Google which contains testimony from a whistleblower, additional leaked internal documents, and undercover video footage of an interview with the head of Google’s “Responsible Innovation” team, which monitors the responsible implementation of A.I. technologies.

“They want to act as gatekeeper between the user and the content they want to access, so they’re going to come in and they’re going to filter the content,” the whistleblower told Project Veritas’ James O’Keefe. “They’re going to say, ‘We don’t want to give the user access to that information because it’s going to create an outcome that’s undesireable to us.'”

As The Daily Wire reported, in the video O’Keefe and the insider discuss “leaked internal documents appearing to show how the search engine manipulates what information users see based on its ‘fair and equitable’ priorities, which at times filters out or deemphasizes factual information that its creators deem ‘unfair.'”

YouTube, which is owned by Google, has since pulled the video “due to a privacy claim by a third party.” This is the second Project Veritas video focused on Big Tech bias YouTube has pulled in two weeks.

Hey Social Media, Here Comes Anti-Trust Scrutiny

It has started with Google and this site has warned users of the Internet to stop using Google for years for various reasons. Now there are more. Oh, the Department of Justice may not stop with Google, so watch out Facebook, Yahoo News, Apple, Amazon and Twitter. Why?

Have you noticed how twisted news stories are? Have you noticed selective search engine results? Have you noticed search intrusions? Have you noticed censorship that may affect politics, truths or even voting habits?

How to Become a Social Media Marketing Pro for Less Than ...

Well, it begins with these social media/tech companies stopping competition, free speech and lying by omission. Reliance on these investigative activities begin with the Sherman Anti-Trust Act. This is a law where the Federal government opposes monopolies when it comes to contracts, trade and commerce. Add in the Federal Trade Commission Act and consider the timing as we move towards the 2020 General Election(s).

A short definition of the Antitrust Laws is found here.

In part from C-Net:

The move by the Justice Department comes as Google and other Silicon Valley giants face renewed antitrust scrutiny in the United States. Sen. Elizabeth Warren, a Democratic 2020 presidential candidate, has made it a key part of her platform to break up the big tech companies, including Google, Facebook and Amazon. Earlier this month, Chris Hughes, a Facebook co-founder, also called for the breakup of the company he helped create.

In February 2018, President Donald Trump had signaled via his Federal Trade Commission leadership choice that he was open to investigating big tech companies.

Former US Attorney General Jeff Sessions last September reportedly met with state attorneys general to discuss whether Google and Facebook could be suppressing conservative views, after forming a task force to look into problems in the tech industry. However, once Sessions stepped down in November, the plan to follow up with the Justice Department was shelved.

The Journal report follows reports in March that Google could be facing an investigation over violations of antitrust or consumer protection regulations.

Google has also faced antitrust pressures from regulators in Europe. In March, the search giant was hit with a $1.7 billion fine from the European Commission for “abusive” online ad practices. The Commission said Google exploited its dominance by restricting its rivals from placing their search ads on third-party websites.

Last year, the EU’s executive arm fined Google a record $5 billion for unfair business practices around Android, its mobile operating system. The investigation focused on Google’s deals with phone manufacturers, requiring them to preload specific Google apps and services onto Android phones. After the EU announced the fine, Trump tweeted, “I told you so.”

***

Earlier Monday, the Wall Street Journal reported that the Federal Trade Commission will examine how Facebook’s practices affect digital competition. The Washington Post reported over the weekend that Amazon has come under heightened scrutiny by U.S. regulators. And on Friday, the Journal reported that the Justice Department is preparing a probe of Google, sending shares of parent company Alphabet down more than 7% Monday.

The possible Apple probe is linked to the Google probe, Reuters reported, and stems from meetings between the DOJ and the FTC.

The headlines together paint a daunting picture for Silicon Valley and the stock market’s most valuable companies. Big tech has long faced scrutiny from European regulators, but has so far shrugged off calls for government regulation in the U.S.

Apple has drawn increased criticism in recent months for what some — including streaming giant Spotify — see as anti-competitive behavior in the App Store. Apple owns and operates the online marketplace, collecting subscription fees from developers.

The so-called “Apple tax” accounts for a sizable percentage of Apple’s burgeoning services revenue segment, but draws the ire of developers who, in some cases, compete with Apple’s own apps in the store.

Spotify’s EU complaint against Apple, filed in March, is pending investigation by European authorities. More here.

Is China an Adversary of the United States?

Yes, and frankly, we should completely reconsider an trade agreements in total with China. The whole launch of a harmonious relationship between the United States and China established by President Nixon in 1972 is not today’s condition. China is hostile to not only the United States but to any country frankly for the sake of money, China needs it by any and all means possible.

Exclusive: Secret NSA Map Shows China Cyber Attacks on U.S ...

China is using ‘debt traps’ effectively to financially punk foreign governments to gain power, influence and assets.

  • China is working to influence media outlets beyond its borders in an effort to impose its ideology and deter criticism of its actions, a press freedom group said.

    In a report released Monday, Reporters Without Borders detailed what it said was China’s impact on a global decline in press freedom and analyzed President Xi Jinping’s strategy to control information outside his own country. The group found that Beijing was using advertising buys, paid-trips for journalists and an expanding global propaganda network to impose its “ideologically correct” terminology and to obscure darker chapters of the country’s history.

  • Huawei has been a theft and spy operation for decades. A major concern and consequence is a renewed U.S. campaign to pressure and persuade America’s allies to keep Huawei technology and equipment out of the next generation of wireless networks, known as 5G. The stakes in this campaign are much bigger than U.S. market share or the effectiveness of Iran sanctions. If Huawei’s chips and routers find their way into this new network, everything from digital privacy to intellectual property could be at risk.
  • Chinese employees stole corporate secrets from Dutch semiconductor equipment maker ASML, resulting in hundreds of millions of dollars in losses, Dutch financial newspaper Financieele Dagblad (FD) reported on Thursday.

    The paper said, citing its own investigation, technology had been stolen by high-level Chinese employees in the research and development department of ASML’s U.S. subsidiary and ultimately leaked to a company linked to the Chinese government.

  • That Chinese worker employed by that farm in Iowa is likely a spy, performing agricultural/intellectual property theft.
  • China has and continues to infect the American education system. It is called the Confucius Institute. It ranges from Kindergarten to graduate school. China has already spent $200 million USD on this effort. So, the Senate held a hearing. Legislation? Still waiting.
  • U.S. government contractors hired by China to be a hacker/ perform espionage or to steal technology. Examples are here, here and here.

Just this past December, the Assistant Director of the FBI for the Counterintelligence Division gave an extended statement and testimony before the Senate Judiciary Committee that spoke to the non-traditional espionage methods employed by China against the United States. Simply put, he described it as a Cold War and honestly it is.

In part:

The Chinese government is attempting to acquire or steal, not only the plans and intentions of the United States government, but also the ideas and innovations of the very people that make our economy so incredibly successful. The Chinese government understands a core lesson of the Cold War between the United States and the Soviet Union: economic strength is the foundation of national power. The competition between the United States and China will be greatly influenced, if not ultimately decided, on the strength of our economies.

The Chinese government means to compete with us in every way possible, playing by the rules at times, bending them at others, and breaking them when necessary to ensure their success. They also aim to rewrite the rules to shape the world in their image, and they have already made progress on this front. The rules they write seek to guarantee the dominance of their businesses and root Chinese national power in the very fabric of an international system.

From my vantage point, it appears we are at the early stages of a hyper-competitive world. This is not simply a competition between businesses and industries but also between governments and the ways in which they govern their societies. Make no mistake: the Chinese government is proposing itself as an alternative model for the world, one without a democratic system of government, and it is seeking to undermine the free and open rules-based order we helped establish following World War II. Our businesses and our government must adapt in order to compete and thrive in this world.

Perhaps AOC, Omar, Nadler, Pelosi, Tlaib and Schiff should be concentrating on the real work to protect American….eh? Better still, perhaps CNN should report on the real stuff….uh huh

Wikileaks, Julian Assange to be Extradited to the U.S.

Arrested by Metropolitan Police a the Ecuadorian embassy, Assange was taken to a jail in London. He appeared before a judge for breaching his bail conditions as Ecuador has been working for months to remove him for asylum where Assange has been living since 2012. Lenin Moreno, the President of Ecuador has been working with British officials since July of 2018 to terminate his asylum.

What has transpired since Wikileaks was founded in 2006, there have been several massive troves (10 million) of documents posted for public consumption. Assange began hacking in 1987 under the name of Mendax. It is not known officially how Julian Assange and Bradley Manning became acquainted, however during the court-martial of Manning, a volume of chat logs were presented as evidence between the two and included how Assange gave Manning the ability to reverse engineer passwords.

President Obama gave Manning a pardon while the matter of Assange could be that of a co-conspirator, espionage or aiding and abetting. The indictment does give rise to the evidence beyond the protections of Assange of just being a journalist. Assange is being prosecuted for violating the ‘computer fraud and abuse act’.

Assange-Indictment-0-0

President Lenín Moreno of Ecuador, who became the country’s president in 2017, had looked for a face-saving way to get out of the arrangement. On Thursday in a Twitter post, he said that his country had decided to stop sheltering Mr. Assange after “his repeated violations to international conventions and daily-life protocols,” a decision that cleared the way for the British authorities to detain him.

The relationship between Mr. Assange and Ecuador has been rocky, even as it offered him refuge and even citizenship, and WikiLeaks said last Friday that Ecuador “already has an agreement with the U.K. for his arrest” and predicted that Mr. Assange would be expelled from the embassy “within ‘hours to days.’”

Mr. Moreno, in a video statement, said that Mr. Assange had exhausted the patience of his hosts, outlining of litany of grievances: the installation of electronic interference equipment, the blocking of security cameras, and attacks on guards.

“Finally two days ago, WikiLeaks, the organization of Mr. Assange, threatened the government of Ecuador,” Mr. Moreno said, an apparent reference to allegations from the organization that Mr. Assange had been subject to a spying operation. “My government has nothing to fear and doesn’t act under threat.”

In his video, Mr. Moreno singled out the recent release by WikiLeaks of information about the Vatican as evidence that Mr. Assange had continued to work with WikiLeaks to violate “the rule of nonintervention in the internal affairs of other states.”

Alan Duncan, the minister responsible for Europe and the Americas at Britain’s Foreign Office, said in a statement that the arrest had followed “extensive dialogue” between the two countries.

In December 2017, Ecuador gave Mr. Assange citizenship, and was preparing to appoint him to a diplomatic post in Russia, but the British government made clear that if he left the embassy, he would not have diplomatic immunity.

The Ecuadorean government said in March last year that it had cut off Mr. Assange’s internet access, saying that he had violated an agreement to stop commenting on, or trying to influence, the politics of other countries. The government also imposed other restrictions, limiting his visitors and requiring him to clean his bathroom and look after his cat.

He sued the Ecuadorean government in October, claiming that it was violating his rights. More here from the NYT’s.

5G Coming with Major Risks from China

Primer: Samsung Galaxy S10 Coming with 5G Data Speeds ...

Stuart Madnick, who’s been professor of information technology at the Massachusetts Institute of Technology since 1972, tells Inverse that the FCC and ISPs are casting a double-edged sword in their rush to implement 5G.

“It’s like going from fireworks to dynamite sticks,” Madnick says. “5G encourages further evolution and expansion of Internet of Things related networks. All of the good news and bad news that comes along with this technology gets magnified.”

He’s especially concerned about the risk of denial of service attacks — or DDoS for short — becoming more powerful than ever before. One of the advertised benefits of 5G is that it will allow even more IoT devices, like refrigerators or light bulbs, to come online. This would allow users to remotely check the contents of their fridge or dim their bedroom lights using their phones, but these devices can also be harnessed for nefarious purposes.

One of the most notorious DDoS incidents in history — the 2016 Dyn cyberattack — was facilitated by unsecured IoT devices, like security cameras, printers, and baby monitors. Hacker groups Anonymous and New World Hackers allegedly took control of thousand of electronics that still had their default passwords to amass an army of zombie devices, known as a botnet.

This network was used to overwhelm the servers of internet performance management company, Dyn. Websites like Twitter, SoundCloud, Spotify, and Shopify were inaccessible for a day. Madnick believes this could happen again, to a degree that hasn’t even been imagined yet. Perhaps the biggest sites on the web will go down for days, including online blanks, or worse, the internet that controls a public utility like electricity. Perhaps the biggest sites on the web will go down for days, including online blanks, or worse, the internet that controls a public utility like electricity.

*** Related reading: Lessons Learned from WannaCry attack

How 5G will Power the Future Internet of Things - iQ by Intel

Ex-security minister Admiral Lord West calls for urgent government action after Chinese firms are banned in Australia and the US.

Security threats from Chinese companies building 5G networks could end up “putting all of us at risk” if they are not tackled quickly, according to a former security minister.

Speaking to Sky News, Admiral Lord West, a former First Sea Lord who served under Gordon Brown as a security minister, urged the government to set up a unit reporting directly to the prime minister to monitor the risk posed by Chinese equipment in 5G.

5G has been hailed as the next great leap for mobile communications, enabling everything from smart cities to hologram calls.

However, the best 5G technology comes from Chinese companies, raising the fear that China’s government could have ground-level access to – even control of – the UK’s critical data infrastructure.

“We’ve got to see there’s a risk,” Lord West said. “Yes, we want 5G, but for goodness sake we need to do all of these things to make sure it’s not putting all of us at risk.”

In April, the United States banned Chinese multinationals Huawei and ZTE – both specialists in 5G – from selling equipment to the federal government.

In August, the Australian government banned the same two firms from supplying technology for its 5G network, a decision foreign minister Marise Payne described as necessary for “the protection of Australia’s national security”.

In a statement, Huawei called the decision “politically motivated, not the result of a fact-based, transparent, or equitable decision-making process,” adding that “there is no fundamental difference between 5G and 4G network architecture… 5G has stronger guarantees around privacy and security protection than 3G and 4G”.

Robert Hannigan, former director of GCHQ, told Sky News an outright ban in the UK would not make 5G safe.

“The best companies in 5G are probably the Chinese ones and there aren’t many alternatives,” he said, before warning that new measures were needed to test the security of the network.

“We do need to find a way of scrutinising what is being installed in our network, and how it is being overseen and how it is being controlled and how it’s being upgraded in the future. And we have to find a more effective way of doing that at scale.”

In April, GCHQ’s National Cyber Security Centre warned ZTE could pose a national security risk to the UK.

Two months later, the UK’s Huawei Cyber Security Evaluation Centre, a group set up by the government to monitor the Chinese firm, announced that it had “only limited assurance” that Huawei posed no threat to national security

“It was a bit of a warning to Huawei,” said Mr Hannigan. “They needed to get better at cooperating and take this more seriously.”

The difficulty for the Huawei Cyber Security Evaluation Centre is knowing for certain that the code it vets and approves is the same code that is going into networks.

“That’s been a persistent problem,” said Mr Hannigan. “That needs more work.”

The government has put £200m into the development of 5G. Last month, the first 5G pilot centre launched in the West Midlands, testing the technology before a national roll-out.

BT, which uses Huawei to supply parts for its network, told Sky News that it would “apply the same stringent security measures and controls to 5G when we start to roll it out, in line with continued guidance from government”.