Japan

Japan Pitches 'Society 5.0' To Keep Its Edge In Tech and Science (nikkei.com) 21

The Cabinet Office of Japan is co-hosting an event dedicated to "Society 5.0," a future society the government believes Japan should aspire to. Defined by the Cabinet Office as "a human-centered society [helped] by a system that highly integrates cyberspace and physical space," Society 5.0 is a concept intended to broaden the discussion of innovation from science and technology to all of socioeconomic activity. Nikkei Asia Review reports: The government has also established multiple large-scale programs to encourage companies, involved in everything from health care and mobility to energy, to invest in research and development, not only at the level of pure technology but also to bring it to a pilot level. The exhibition includes some achievements from these programs, including Cyberdyne's HAL, standing for "hybrid assistive limb," which the company claims to be the world's first "wearable cyborg." A HAL exoskeleton autonomously walks on a treadmill at the venue. When worn on a leg, HAL can read faint signals sent to muscles from the brain thanks to electrodes attached to the wearer's skin, determining the wearer's desired movements. "Even if your nerves are not connected at first, they gradually recover through the wearing of HAL, and you can eventually move your own body parts without wearing it," said a person from Cyberdyne.

SkyDrive's "flying car" also attracts the attention of visitors, who can observe a full-scale model of the SD-03, which performed the first successful public manned flights of a flying car in Japan in August 2020. Co-founded by former Toyota Motor engineer Tomohiro Fukuzawa, the startup plans to offer commercial mobility service during Expo 2025, to be held in Osaka. "It is as if we are traveling to the future," said Shinji Inoue, a minister of state who heads science and technology policy, when he visited the exhibition last week. Asked by reporters how to make these cutting-edge tools an everyday reality, Inoue spoke of a need to deregulate the market when it comes to obtaining operating permits for such items. Indeed, the government acknowledges challenges in keeping up with the country's capabilities in implementing scientific progress. Digitalization initiatives, the premise for achieving Society 5.0, "could not sufficiently create new business models through data collaboration, like what we see in other countries," said a report from the Cabinet Office analyzing the previous five-year plan through fiscal 2020. Instead, the initiatives aimed at improving the efficiency of existing operations, failing to drive innovation.

AI

Police Are Telling ShotSpotter To Alter Evidence From Gunshot-Detecting AI (vice.com) 147

An anonymous reader quotes a report from Motherboard: On May 31 last year, 25-year-old Safarain Herring was shot in the head and dropped off at St. Bernard Hospital in Chicago by a man named Michael Williams. He died two days later. Chicago police eventually arrested the 64-year-old Williams and charged him with murder (Williams maintains that Herring was hit in a drive-by shooting). A key piece of evidence in the case is video surveillance footage showing Williams' car stopped on the 6300 block of South Stony Island Avenue at 11:46 p.m. - the time and location where police say they know Herring was shot. How did they know that's where the shooting happened? Police said ShotSpotter, a surveillance system that uses hidden microphone sensors to detect the sound and location of gunshots, generated an alert for that time and place. Except that's not entirely true, according to recent court filings.

That night, 19 ShotSpotter sensors detected a percussive sound at 11:46 p.m. and determined the location to be 5700 South Lake Shore Drive - a mile away from the site where prosecutors say Williams committed the murder, according to a motion filed by Williams' public defender. The company's algorithms initially classified the sound as a firework. That weekend had seen widespread protests in Chicago in response to George Floyd's murder, and some of those protesting lit fireworks. But after the 11:46 p.m. alert came in, a ShotSpotter analyst manually overrode the algorithms and "reclassified" the sound as a gunshot. Then, months later and after "post-processing," another ShotSpotter analyst changed the alert's coordinates to a location on South Stony Island Drive near where Williams' car was seen on camera. "Through this human-involved method, the ShotSpotter output in this case was dramatically transformed from data that did not support criminal charges of any kind to data that now forms the centerpiece of the prosecution's murder case against Mr. Williams," the public defender wrote in the motion.

The document is what's known as a Frye motion - a request for a judge to examine and rule on whether a particular forensic method is scientifically valid enough to be entered as evidence. Rather than defend ShotSpotter's technology and its employees' actions in a Frye hearing, the prosecutors withdrew all ShotSpotter evidence against Williams. The case isn't an anomaly, and the pattern it represents could have huge ramifications for ShotSpotter in Chicago, where the technology generates an average of 21,000 alerts each year. The technology is also currently in use in more than 100 cities. Motherboard's review of court documents from the Williams case and other trials in Chicago and New York State, including testimony from ShotSpotter's favored expert witness, suggests that the company's analysts frequently modify alerts at the request of police departments - some of which appear to be grasping for evidence that supports their narrative of events.

Crime

Citizen is Now Paying New Yorkers To Livestream Crimes (inputmag.com) 56

Citizen, otherwise known as "the worst kind of hyperlocal app ever created," is now willing to pay people to livestream crimes around New York City. The company is reportedly hiring people in the Big Apple at a starting rate of $25 per hour to run around the city and start streaming crimes to the web in real-time. From a report: The exact nature of these hires -- including their very existence -- is being kept mostly quiet by Citizen. Any public-facing recruiting for these positions is being done on the DL; one post on JournalismJobs.com from last week sought "field team members" to work for "a tech company with user-generated content."

"You will be live-streaming from your phone straight to the app, covering the event as news," the job posting read. Citizen's name was not included anywhere in the now-deleted posting, according to the New York Post. The company does not post these positions on its website, either.

Social Networks

'Disinformation for Hire' is Becoming a Booming Industry (nytimes.com) 148

Sunday the BBC reported YouTube influencers were offered money to spread vaccine misinformation.

But according to the New York Times, that's just the tip of the iceberg. "The scheme appears to be part of a secretive industry that security analysts and American officials say is exploding in scale: disinformation for hire: Private firms, straddling traditional marketing and the shadow world of geopolitical influence operations, are selling services once conducted principally by intelligence agencies. They sow discord, meddle in elections, seed false narratives and push viral conspiracies, mostly on social media. And they offer clients something precious: deniability. "Disinfo-for-hire actors being employed by government or government-adjacent actors is growing and serious," said Graham Brookie, director of the Atlantic Council's Digital Forensic Research Lab, calling it "a boom industry."

Similar campaigns have been recently found promoting India's ruling party, Egyptian foreign policy aims and political figures in Bolivia and Venezuela. Mr. Brookie's organization tracked one operating amid a mayoral race in Serra, a small city in Brazil. An ideologically promiscuous Ukrainian firm boosted several competing political parties. In the Central African Republic, two separate operations flooded social media with dueling pro-French and pro-Russian disinformation. Both powers are vying for influence in the country. A wave of anti-American posts in Iraq, seemingly organic, were tracked to a public relations company that was separately accused of faking anti-government sentiment in Israel.

Most trace to back-alley firms whose legitimate services resemble those of a bottom-rate marketer or email spammer... For-hire disinformation, though only sometimes effective, is growing more sophisticated as practitioners iterate and learn. Experts say it is becoming more common in every part of the world, outpacing operations conducted directly by governments. The result is an accelerating rise in polarizing conspiracies, phony citizen groups and fabricated public sentiment, deteriorating our shared reality beyond even the depths of recent years... Commercial firms conducted for-hire disinformation in at least 48 countries last year — nearly double from the year before, according to an Oxford University study. The researchers identified 65 companies offering such services...

Platforms have stepped up efforts to root out coordinated disinformation. Analysts especially credit Facebook, which publishes detailed reports on campaigns it disrupts. Still, some argue that social media companies also play a role in worsening the threat. Engagement-boosting algorithms and design elements, research finds, often privilege divisive and conspiratorial content.

The article also notes "a generation" of populist political leaders around the world who have risen "in part through social media manipulation.

"Once in office, many institutionalize those methods as tools of governance and foreign relations."
United States

For Million of Americans, Unemployment Benefits Require Facial Recognition Scanning (cnn.com) 152

Millions of Americans "are being instructed to use ID.me, along with its facial recognition software, to get their unemployment benefits," reports CNN. The software compares their photo ID with a selfie video they take on their phone with the company's software — but some privacy advocates are concerned: A rapidly growing number of U.S. states, including Colorado, California and New York, turned to ID.me in hopes of cutting down on a surge of fraudulent claims for state and federal benefits that cropped up during the pandemic alongside a tidal wave of authentic unemployment claims. As of this month, 27 states' unemployment agencies had entered contracts with ID.me, according to the company, with 25 of them already using its technology. ID.me said it is in talks with seven more...

The company's rapid advance at state unemployment agencies marks the latest chapter in the story of facial recognition software's spread across the United States. It also highlights how this controversial technology gained a foothold during the pandemic and now appears destined to remain part of our lives for the foreseeable future...

Several ID.me users told CNN Business about problems they had verifying their identities with the company, which ranged from the facial recognition technology failing to recognize their face to waiting for hours to reach a human for a video chat after encountering problems with the technology. A number of people who claim to have had issues with ID.me have taken to social media to beg the company for help with verification, express their own concerns about its face-data collection or simply rant, often in response to ID.me's own posts on Twitter... From ID.me's perspective, its service is making it easier for a wide range of people to access essential government services, as it avoids the common practice of using information gleaned from data brokers and credit bureaus as a means of checking identities. The company said this lets it give a green light to those who don't have a credit history, or may have changed their name, for instance — people who might otherwise have more trouble getting verified.

However, it doesn't sit well with employee and privacy advocates and civil rights groups interviewed by CNN Business. They have concerns about the facial recognition technology itself and for the ID.me verification process's reliance on access to a smartphone or computer and the internet, which may be out of reach for the people to whom unemployment dollars are most critical... ID.me said it does not sell user data — which includes biometric and related information such as selfies people upload, data related to facial analyses, and recordings of video chats users participate in with ID.me — but it does keep it. Biometric data, like the facial geometry produced from a user's selfie, may be kept for years after a user closes their account... In March, ID.me announced raising $100 million in funding from investors including hedge fund Viking Global Investors and CapitalG, which is Google parent company Alphabet's independent growth fund. With that funding round, ID.me said it was valued at $1.5 billion... "We're verifying more than 1% of the American adult population each quarter, and that's starting to compress more to like 45 or 50 days," Hall said. The company has more than 50 million users, he said, and signs up more than 230,000 new ones each day.

CNN also quotes a man who complains the state never gave him an option. "If I wanted unemployment, I had no choice but to do this."
The Courts

Colonial Pipeline Sued by Customers Affected by Its Ransomware Incident (msn.com) 42

The owner of the EZ Mart gas station is suing Colonial Pipeline, accusing it of lax security, reports the Washington Post: He and his lawyers are hoping to also represent the hundreds of other small gas stations that were hurt by the hack. It's just one of several class-action lawsuits that are popping up in the wake of high-profile ransomware attacks. Another lawsuit filed against Colonial in Georgia in May seeks to get damages for regular consumers who had to pay higher gas prices. A third is in the works, with law firm Chimicles Schwartz Kriner & Donaldson-Smith LLP seeking to mount a similar effort.

Colonial isn't the only company that's been targeted. Another suit was launched in June against the San Diego based hospital system Scripps Health after it was hit by a ransomware attack...

In the case of Colonial Pipeline, hundreds of gas stations were shut down, leading to huge lines of cars waiting for what little fuel remained. The rise in suits may mean companies and organizations that are hacked are no longer just on the hook for reimbursing people who had their data stolen. They could now be liable for all kinds of damages that go well beyond a heightened risk of identity theft or credit card fraud...

The potential for lawsuits will keep growing as ransomware attacks do. And if lawyers can reasonably show that a company made some kind of mistake in protecting its system, victims will have an avenue to sue.

Cellphones

Church Official Exposed Through America's 'Vast and Largely Unregulated Data-Harvesting' (nytimes.com) 101

The New York Times' On Tech newsletter shares a thought-provoking story: This week, a top official in the Roman Catholic Church's American hierarchy resigned after a news site said that it had data from his cellphone that appeared to show the administrator using the L.G.B.T.Q. dating app Grindr and regularly going to gay bars. Journalists had access to data on the movements and digital trails of his mobile phone for parts of three years and were able to retrace where he went.

I know that people will have complex feelings about this matter. Some of you may believe that it's acceptable to use any means necessary to determine when a public figure is breaking his promises, including when it's a priest who may have broken his vow of celibacy. To me, though, this isn't about one man. This is about a structural failure that allows real-time data on Americans' movements to exist in the first place and to be used without our knowledge or true consent. This case shows the tangible consequences of practices by America's vast and largely unregulated data-harvesting industries. The reality in the United States is that there are few legal or other restrictions to prevent companies from compiling the precise locations of where we roam and selling that information to anyone.

This data is in the hands of companies that we deal with daily, like Facebook and Google, and also with information-for-hire middlemen that we never directly interact with. This data is often packaged in bulk and is anonymous in theory, but it can often be traced back to individuals, as the tale of the Catholic official shows...

Losing control of our data was not inevitable. It was a choice — or rather a failure over years by individuals, governments and corporations to think through the consequences of the digital age.

We can now choose a different path.

"Data brokers are the problem," writes the EFF, arguing that the incident "shows once again how easy it is for anyone to take advantage of data brokers' stores to cause real harm." This is not the first time Grindr has been in the spotlight for sharing user information with third-party data brokers... But Grindr is just one of countless apps engaging in this exact kind of data sharing. The real problem is the many data brokers and ad tech companies that amass and sell this sensitive data without anything resembling real users' consent.

Apps and data brokers claim they are only sharing so-called "anonymized" data. But that's simply not possible. Data brokers sell rich profiles with more than enough information to link sensitive data to real people, even if the brokers don't include a legal name. In particular, there's no such thing as "anonymous" location data. Data points like one's home or workplace are identifiers themselves, and a malicious observer can connect movements to these and other destinations. Another piece of the puzzle is the ad ID, another so-called "anonymous" label that identifies a device. Apps share ad IDs with third parties, and an entire industry of "identity resolution" companies can readily link ad IDs to real people at scale.

All of this underlines just how harmful a collection of mundane-seeming data points can become in the wrong hands... That's why the U.S. needs comprehensive data privacy regulation more than ever. This kind of abuse is not inevitable, and it must not become the norm.

Power

China Compromised More than a Dozen US Pipelines Between 2011 and 2013 (wsj.com) 53

"Hackers working for the Chinese government compromised more than a dozen U.S. pipeline operators nearly a decade ago, the Biden administration revealed Tuesday while also issuing first-of-its-kind cybersecurity requirements on the pipeline industry," reports the Wall Street Journal. The disclosure of previously classified information about the aggressive Chinese hacking campaign, though dated, underscored the severity of foreign cyber threats to the nation's infrastructure, current and former officials said. In some cases, the hackers possessed the ability to physically damage or disrupt compromised pipelines, a new cybersecurity alert said, though it doesn't appear they did so. Previously, senior administration officials had warned that China, Russia and others were capable of such cyber intrusions. But rarely has so much information been released about a specific and apparently successful campaign.

Chinese state-sponsored hackers between 2011 and 2013 had targeted nearly two dozen U.S. oil and natural gas pipeline operators with the specific goal of "holding U.S. pipeline infrastructure at risk," the Federal Bureau of Investigation and the Department of Homeland Security said in Tuesday's joint alert. Of the known targets, 13 were successfully compromised and an additional eight suffered an "unknown depth of intrusion," which officials couldn't fully assess because the victims lacked complete computer log data, the alert said. Another three targets were described as "near misses" of the Chinese campaign, which relied heavily on spear phishing attacks.

Newsweek adds that the same day the U.S. Department of Homeland Security "announced new requirements for U.S. pipeline operators to bolster cybersecurity following a May ransomware attack that disrupted gas delivery across the East Coast." In a statement, DHS said it would require operators of federally designated critical pipelines to implement "specific mitigation measures" to prevent ransomware attacks and other cyber intrusions. Operators must also implement contingency plans and conduct what the department calls a "cybersecurity architecture design review."
Space

Oregon Congressman Proposes New Space Tourism Tax (space.com) 155

U.S. Rep. Earl Blumenauer (D-Oregon) plans to introduce legislation called the Securing Protections Against Carbon Emissions (SPACE) Tax Act, which would impose new excise taxes on space tourism trips. Space.com reports: "Space exploration isn't a tax-free holiday for the wealthy. Just as normal Americans pay taxes when they buy airline tickets, billionaires who fly into space to produce nothing of scientific value should do the same, and then some," Blumenauer said in a statement issued by his office. "I'm not opposed to this type of space innovation," added Blumenauer, a senior member of the House of Representatives' Ways and Means Committee. "However, things that are done purely for tourism or entertainment, and that don't have a scientific purpose, should in turn support the public good."

The proposed new tax would likely be levied on a per-passenger basis, as is done with commercial aviation, the statement said. "Exemptions would be made available for NASA spaceflights for scientific research purposes," the statement reads. "In the case of flights where some passengers are working on behalf of NASA for scientific research purposes and others are not, the launch excise tax shall be the pro rata share of the non-NASA researchers." There would be two taxation tiers, one for suborbital flights and another for missions that reach orbit. The statement did not reveal how much the tax would be in either case or if the collected revenue would be earmarked for any specific purpose. Such a purpose could be the fight against climate change, if the proposed act's full name is any guide. Blumenauer is concerned about the potential carbon footprint of the space tourism industry once it gets fully up and running, the statement said.

United Kingdom

Hole Blasted In Guntrader: UK Firearms Sales Website's CRM Database Breached, 111K Users' Info Spilled Online (theregister.com) 63

Criminals have hacked into a Gumtree-style website used for buying and selling firearms, making off with a 111,000-entry database containing partial information from a CRM product used by gun shops across the UK. The Register reports: The Guntrader breach earlier this week saw the theft of a SQL database powering both the Guntrader.uk buy-and-sell website and its electronic gun shop register product, comprising about 111,000 users and dating between 2016 and 17 July this year. The database contains names, mobile phone numbers, email addresses, user geolocation data, and more including bcrypt-hashed passwords. It is a severe breach of privacy not only for Guntrader but for its users: members of the UK's licensed firearms community. Guntrader spokesman Simon Baseley told The Register that Guntrader.uk had emailed all the users affected by the breach on July 21 and issued a further update yesterday.

Guntrader is roughly similar to Gumtree: users post ads along with their contact details on the website so potential purchasers can get in touch. Gun shops (known in the UK as "registered firearms dealers" or RFDs) can also use Guntrader's integrated gun register product, which is advertised as offering "end-to-end encryption" and "daily backups", making it (so Guntrader claims) "the most safe and secure gun register system on today's market." [British firearms laws say every transfer of a firearm (sale, drop-off for repair, gift, loan, and so on) must be recorded, with the vast majority of these also being mandatory to report to the police when they happen...]

The categories of data in the stolen database are: Latitude and longitude data; First name and last name; Police force that issued an RFD's certificate; Phone numbers; Fax numbers; bcrypt-hashed passwords; Postcode; Postal addresses; and User's IP addresses. Logs of payments were also included, with Coalfire's Barratt explaining that while no credit card numbers were included, something that looks like a SHA-256 hashed string was included in the payment data tables. Other payment information was limited to prices for rifles and shotguns advertised through the site.
The Register recommends you check if your data is included in the hack by visiting Have I Been Pwned. If you are affected and you used the same password on Guntrader that you used on other websites, you should change it as soon as possible.
Privacy

NSO Group CEO Says Law-Abiding Citizens Have 'Nothing To Be Afraid Of' (appleinsider.com) 117

The CEO of NSO Group, whose spyware tools have reportedly been used to target journalists and activists, says that people who aren't criminals shouldn't be afraid of being surveilled AppleInsider reports: Shalev Hulio, 39, recently spoke to Forbes after investigations indicated that NSO Group's Pegasus spyware was used by authoritarian governments to hack and surveil the mobile devices of world leaders, high-profile journalists, and activists. NSO Group says that it sells its tools to governments to help them catch serious criminals like terrorists or gangsters. However, Hulio admitted that it can't control what governments ultimately do with the tools. "We are selling our products to governments. We have no way to monitor what those governments do," he said.

Hulio did note that NSO Group has mechanisms in place to detect when abuse happens so that the company can "shut them down." He says that NSO Group has "done it before and will continue to do so. On the other hand, he said that NSO Group shouldn't be responsible for government misuse. Additionally, Hulio said that the average smartphone has nothing to worry about. While NSO Group's spyware can break into the latest iPhones running up-to-date software, often without any action from the user, it's only aimed at criminals. "The people that are not criminals, not the Bin Ladens of the world -- there's nothing to be afraid of. They can absolutely trust on the security and privacy of their Google and Apple devices," Hulio said.

Communications

Judges Reject Viasat's Plea To Stop SpaceX Starlink Satellite Launches (arstechnica.com) 14

An anonymous reader quotes a report from Ars Technica: SpaceX can keep launching broadband satellites despite a lawsuit filed by Viasat, a federal appeals court ruled Tuesday. Viasat sued the Federal Communications Commission in May and asked judges for a stay that would halt SpaceX's ongoing launches of low Earth orbit (LEO) satellites that power Starlink Internet service. To get a stay, Viasat had to show that it is likely to win its lawsuit alleging that the FCC improperly approved the satellite launches. A three-judge panel at the US Court of Appeals for the District of Columbia Circuit was not persuaded, saying in a short order that "Viasat has not satisfied the stringent requirements for a stay pending court review." The judges did grant a motion to expedite the appeal, however, so the case should move faster than normal.
Government

CIA Director Says He Is Escalating Efforts To Solve 'Havana Syndrome' Mystery (npr.org) 67

CIA Director William Burns says he has redoubled the agency's efforts to uncover the cause of Havana syndrome -- the mysterious set of ailments that has afflicted more than 200 U.S. officials and family members around the world. NPR reports: That includes the assignment of a senior officer who once led the hunt for Osama bin Laden to lead the investigation and tripling the size of a medical team involved in the probe, Burns told NPR on Thursday in his first sit-down interview since being confirmed as the agency's chief in March. "I am absolutely determined -- and I've spent a great deal of time and energy on this in the four months that I've been CIA director -- to get to the bottom of the question of what and who caused this," Burns said. "We're no longer the only big kid on the geopolitical block, especially with the rise of China. And as you know very well, there's a revolution in technology which is transforming the way we live, work, compete and fight. And so, CIA, like everyone else in the U.S. government, has to take that into account," he said.

Under Burns' direction, the CIA has tripled the number of full-time medical personnel at the agency who are focused on Havana syndrome and has shortened the waiting period for afflicted personnel to be admitted to the Walter Reed National Military Medical Center. "I'm certainly persuaded that what our officers and some family members, as well as other U.S. government employees, have experienced is real, and it's serious," Burns said. The director says he is seriously considering the "very strong possibility" that the syndrome is the result of intentional actions, adding that there are a limited number of "potential suspects" with the capability to carry out an action so widely across the globe. A report from last December by the National Academies of Sciences, Engineering, and Medicine found that microwave radiation is the "most plausible" explanation for the symptoms.

To head the task force investigating the syndrome, Burns has appointed a veteran officer who helped lead the hunt for Osama bin Laden. The identity of that officer is still undercover, according to The Wall Street Journal. "We're throwing the very best we have at this issue, because it is not only a very serious issue for our colleagues, as it is for others across the U.S. government, but it's a profound obligation, I think, of any leader to take care of your people," Burns said.
The syndrome first appeared in 2016 at the U.S. Embassy in Havana, where more than 40 diplomats complained of symptoms such as migraines, dizziness, and memory loss. Dozens more cases have been reported in the years since.

Last week, about two dozen U.S. intelligence officers, diplomats, and other government officials in Vienna have reported experiencing mysterious afflictions similar to the Havana Syndrome." The Biden administration is "vigorously investigating" the reports, but the causes of the syndrome still remain unclear.
The Courts

Autonomy Founder Mike Lynch Can Be Extradited To US (bbc.com) 46

The founder of UK software firm Autonomy can be extradited to the US to face charges of conspiracy and fraud, a London court has said. The BBC reports: Mike Lynch sold Autonomy to US computer giant Hewlett Packard (HP) for $11 billion in 2011. He denies allegations that he fraudulently inflated the value of Autonomy before the sale. Dr Lynch has been facing civil charges at the High Court in London, where HP is suing him for damages over the deal. But separately, the US Department of Justice (DoJ) is pursuing criminal charges against him. Judge Michael Snow said he would deliver his ruling in that action without awaiting the civil verdict, saying it was "of limited significance in the case." Dr Lynch was released on bail by the judge in London.

Dr Lynch told BBC Radio 4's Today program that the decision was not unexpected, because of the terms of the extradition treaty the UK has with the US. "We have this imbalance and this default extradition treaty which can be used [in] any dispute that's going on with American companies and their interests." "The insanity of this extradition treaty [is that] it doesn't rely on any facts," he suggested. Dr Lynch added that he felt the extradition treaty was "imbalanced" and that the British public did not realize that the US justice system works entirely differently to the UK's. He said it was "particularly egregious" that the DoJ was not waiting to see the full judgement from the UK High Court, which will be due in nine weeks' time.

He claimed his former chief financial officer Sushovan Hussain, who was jailed for five years in 2019, did not receive a fair trial. Dr Lynch said no defense witnesses turned up to Mr Hussain's trial because they were told they would be arrested if they entered the US. His lawyer Mr Morvillo said:"At the request of the US Department of Justice, the court has ruled that a British citizen who ran a British company listed on the London Stock Exchange should be extradited to America over allegations about his conduct in the UK. "We say this case belongs in the UK. If the home secretary nonetheless decides to order extradition, Dr Lynch intends to appeal."

The Courts

California Sues Activision Blizzard Over Unequal Pay, Sexual Harassment (npr.org) 125

An anonymous reader quotes a report from NPR: The video game studio behind the hit franchises Call of Duty, World of Warcraft and Candy Crush is facing a civil lawsuit in California over allegations of gender discrimination, sexual harassment and potential violations of the state's equal pay law. A complaint, filed by the state Department of Fair Employment and Housing on Wednesday, alleges that Activision Blizzard Inc. "fostered a sexist culture" where women were paid less than men and subjected to ongoing sexual harassment including groping. (Activision and Blizzard Entertainment merged in 2008.)

Officials at the gaming company knew about the harassment and not only failed to stop it but retaliated against women who spoke up, the complaint also alleges. Years after the online harassment campaign known as Gamergate targeted women in the video game world, the California lawsuit depicts an industry that can still be unwelcoming and even hostile to female employees. "All employers should ensure that their employees are being paid equally and take all steps to prevent discrimination, harassment, and retaliation," said DFEH Director Kevin Kish. "This is especially important for employers in male-dominated industries, such as technology and gaming."

The lawsuit alleges that Activision Blizzard's female workers who spoke to investigators "almost universally confirmed" that their time at the company was "akin to working in a frat house." Male employees drank on the job and came to work hungover, the lawsuit said. The alleged sexual harassment ranged from comments about women's bodies and jokes about rape to the unwanted touching of female employees by their male peers. The complaint, which was the result of a two-year investigation by DFEH, claims that the unequal treatment of women went beyond company culture to the more formal parts of their jobs. Women were allegedly paid less than men, both when they were hired and during the course of their employment. They were also assigned to lower-level positions and passed over for promotions, despite doing more work than their male peers in some cases, according to the lawsuit. One woman said her manager told her she wouldn't be promoted because "she might get pregnant and like being a mom too much." The sex discrimination was even worse for women of color, the suit claims. At least two African-American women reported being singled out and micromanaged. Some of the women who came forward with complaints of discrimination or harassment faced involuntary transfers, were selected for layoffs or were denied certain opportunities, the suit said.
In a statement, an Activision Blizzard spokesperson said the company had worked to improve its company culture in recent years and accused the DFEH of not adequately trying to resolve the claims against it before resorting to a lawsuit.

"The DFEH includes distorted, and in many cases false, descriptions of Blizzard's past," the statement read. "The picture the DFEH paints is not the Blizzard workplace of today."

In response to the company's rebuttal, former Blizzard Entertainment employee Cher Scarlett tweeted: "This is certainly LONG overdue. I would be hard-pressed to find someone that wasn't witness to sex in the game lounges, coke in the bathrooms during a cube crawl, or a woman who wasn't sexually harassed at least once. I am so proud of these women." Scarlett added: "Blizzard has claimed that the DFEH report is false/misleading/irresponsible. I can tell you that I knew what was going to be in this report before I read it because during my time there - for only a YEAR - I witnessed ALL OF THESE THINGS. AND NAME NAMES."
Privacy

The Inevitable Weaponization of App Data Is Here (vice.com) 77

After years of warning from researchers, journalists, and even governments, someone used highly sensitive location data from a smartphone app to track and publicly harass a specific person. From a report: In this case, Catholic Substack publication The Pillar said it used location data ultimately tied to Grindr to trace the movements of a priest, and then outed him publicly as potentially gay without his consent. The Washington Post reported on Tuesday that the outing led to his resignation.

The news starkly demonstrates not only the inherent power of location data, but how the chance to wield that power has trickled down from corporations and intelligence agencies to essentially any sort of disgruntled, unscrupulous, or dangerous individual. A growing market of data brokers that collect and sell data from countless apps has made it so that anyone with a bit of cash and effort can figure out which phone in a so-called anonymized dataset belongs to a target, and abuse that information. "Experts have warned for years that data collected by advertising companies from Americans' phones could be used to track them and reveal the most personal details of their lives. Unfortunately, they were right," Senator Ron Wyden told Motherboard in a statement, responding to the incident

Privacy

Pegasus Spyware Seller: Blame Our Customers Not Us For Hacking (bbc.com) 104

The maker of powerful spy software allegedly used to hack the phones of innocent people says blaming the company is like "criticising a car manufacturer when a drunk driver crashes." From a report: NSO Group is facing international criticism, after reporters obtained a list of alleged potential targets for spyware, including activists, politicians and journalists. Investigations have begun as the list, of 50,000 phone numbers, contained a small number of hacked phones. Pegasus infects iPhones and Android devices, allowing operators to extract messages, photos and emails, record calls and secretly activate microphones and cameras. NSO Group has said the software is intended for use against criminals and terrorists and made available to only military, law enforcement and intelligence agencies from countries with good human-rights records. But a consortium of news organisations, led by French media outlet Forbidden Stories, has published dozens of stories based around the list, including allegations French President Emmanuel Macron's number was on it and may have been targeted.
Privacy

Judge Forces US Capitol Rioter To Unlock Laptop Seized By FBI (cnn.com) 391

An anonymous reader quotes a report from CNN: A federal judge forced a US Capitol rioter to unlock his laptop Wednesday after prosecutors argued that it likely contained footage of the January 6 insurrection from his helmet-worn camera. The judge granted the Justice Department's request to place Capitol riot defendant Guy Reffitt in front of his laptop so they could use facial recognition to unlock the device. The maneuver happened after the hearing ended and Reffitt's lawyer confirmed to CNN that the laptop was unlocked. Investigators seized the laptop and other devices earlier this year pursuant to a search warrant.

Reffitt has been in jail since his arrest in January. His case received national attention after his son spoke publicly about how Reffitt had threatened to kill family members if they turned him into the FBI. The case became an example of how former President Donald Trump's lies tore some families apart -- Reffitt's son and daughter testified against him in court or before the grand jury. He pleaded not guilty to five federal crimes, including bringing a handgun to the Capitol grounds during the insurrection and obstructing justice by allegedly threatening his family. The felony gun charge was added last month, and undercuts false claims from Trump and prominent Republican lawmakers that the rioters weren't armed and that they had "no guns whatsoever." The case raised intriguing constitutional questions about the right against self-incrimination, but Judge Dabney Friedrich agreed with prosecutors that the unlocking was within the law.
"As the court here noted, requiring a defendant to expose his face to unlock a computer can be lawful, and is not far removed from other procedures that are now routinely approved by courts, with proper justification: standing in a lineup, submitting a handwriting or voice exemplar, or submitting a blood or DNA sample," CNN senior legal analyst Elie Honig said in an email.

Honig said judges try to strike a balance "between respecting a defendant's privacy and other rights on the one hand, and enabling prosecutors to obtain potentially crucial evidence with minimal intrusion on the defendant's rights, on the other." The "potentially crucial evidence" here may include footage of the handgun that Reffitt brought to the Capitol or comments he made about his intentions that day.
Government

'Nuclear Football' Safety Procedures To Be Reassessed (cnn.com) 319

quonset writes: Wherever the president goes, so goes the nuclear football, a 45 pound case which allows the president to to confirm his identity and authorize a nuclear strike. The Football also provides the commander in chief with a simplified menu of nuclear strike options -- allowing him to decide, for example, whether to destroy all of America's enemies in one fell swoop or to limit himself to obliterating only Moscow or Pyongyang or Beijing.

During the attempted insurrection on January 6th, video from inside the capitol showed the mob coming within 100 feet of then-Vice President Mike Pence and his military aide who was carrying a second nuclear football. Had they lost control of the case, no nuclear weapons could have been launched, but the highly classified information within the case could have been leaked, or sold, to nation states.

As a result, members of Congress asked the Pentagon to review procedures for handling and security of the nuclear football. The Department of Defense Inspector General will evaluate the policies and procedures around the Presidential Emergency Satchel, also known as the "nuclear football," in the event that it is "lost, stolen, or compromised," according to an announcement from the DoD IG's office. This would not be the first time procedures for the case have been reviewed. Jimmy Carter, who qualified as a nuclear sub commander, was aware that he would have only a few minutes to decide how to respond to a nuclear strike against the United States. Carter ordered that the war plans be drastically simplified. A former military aide to President Bill Clinton, Col. Buzz Patterson, would later describe the resulting pared-down set of choices as akin to a "Denny's breakfast menu." "It's like picking one out of Column A and two out of Column B," he told the History Channel.

Following Carter, an incident during the Reagan administration led to another review. In the chaos after the attempted assassination, the aide carrying the case was separated from Reagan and did not accompany him to the hospital. When Reagan was stripped of his clothes prior to going into surgery, the biscuit, a card every president is given, which, if needed, can personally identify the president, was found abandoned in a hospital plastic bag. Bill Clinton had his review moment when it was discovered he had lost his biscuit for months, and never told anyone.

Crime

Serial Swatter Who Caused Death Gets Five Years In Prison (krebsonsecurity.com) 186

A 18-year-old Tennessee man who helped set in motion a fraudulent distress call to police that lead to the death of a 60-year-old grandfather in 2020 was sentenced to 60 months in prison today. Krebs on Security reports: Shane Sonderman, of Lauderdale County, Tenn. admitted to conspiring with a group of criminals that's been "swatting" and harassing people for months in a bid to coerce targets into giving up their valuable Twitter and Instagram usernames. At Sonderman's sentencing hearing today, prosecutors told the court the defendant and his co-conspirators would text and call targets and their families, posting their personal information online and sending them pizzas and other deliveries of food as a harassment technique.

Other victims of the group told prosecutors their tormentors further harassed them by making false reports of child abuse to social services local to the target's area, and false reports in the target's name to local suicide prevention hotlines. Eventually, when subjects of their harassment refused to sell or give up their Twitter and Instagram usernames, Sonderman and others would swat their targets -- or make a false report to authorities in the target's name with the intention of sending a heavily armed police response to that person's address. [...]

Sonderman might have been eligible to knock a few months off his sentence had he cooperated with investigators and refrained from committing further crimes while out on bond. But prosecutors said that shortly after his release, Sonderman went right back to doing what he was doing when he got caught. Investigators who subpoenaed his online communications found he'd logged into the Instagram account "FreeTheSoldiers," which was known to have been used by the group to harass people for their social media handles. Sonderman was promptly re-arrested for violating the terms of his release, and prosecutors played for the court today a recording of a phone call Sonderman made from jail in which he brags to a female acquaintance that he wiped his mobile phone two days before investigators served another search warrant on his home.
"Although it may seem inadequate, the law is the law," said Judge Norris after giving Sonderman the maximum sentence allowed by law under the statute. "The harm it caused, the death and destruction... it's almost unspeakable. This is not like cases we frequently have that involve guns and carjacking and drugs. This is a whole different level of insidious criminal behavior here."

Slashdot Top Deals