#China Information Protection Law
Explore tagged Tumblr posts
Text
Recent Developments in Data Privacy and Their Implications for BusinessÂ
Recent Developments in Data Privacy and Their Implications for Business
Data privacy is a hot topic in todayâs digital world. Here are nine recent developments that changed the data privacy landscape and what they mean for businesses and consumers. 1. The EU General Data Protection Regulation (GDPR) came into force in May 2018, creating a unified data protection framework across the EU and giving individuals more control over their personal data. The EU GeneralâŠ
View On WordPress
#BCR#binding corporate rules#California Consumer Privacy Act#CCPA#CDPSA#China Information Protection Law#CJEU#Court of Justice of the European Union#data privacy#Digital Markets Act#DMA#DSA#EU Digital Services Act#EU General Data Protection Regulation#GDPR#Global Privacy Control#GPC#India Personal Data Protection Bill#PDPB#PIPL#Schrems II#Senator Kirsten Gillibrand#UK Data Protection Act#US Consumer Data Privacy and Security Act
0 notes
Text
Actually? You know what would be darkly hilarious?
If, when the GIW can't get ghosts declared both malicious AND non-sapient/sentient? They push for "dumb animals" instead.
Which is accepted. Ghosts are animals. Checks out, says scientists everywhere.
HOW "dumb"?
What? Says the GIW, mid-victory high fives. They did not expect a follow up question. They SHOULD have, as this is the SCIENTIFIC community and that is literally their job, but here we are.
How. "Dumb"? The scientists repeate slower. What methodology did you use? What is your sample size? Are their different sub-species? Is this dimension like ours? Is Ghost the equivalent to Mammal? It says here their are humanoid ones.
What IQ are we talking about here and HOW DID YOU TEST??
A goldfish, parrot, and dolphin are all animals. WILDLY different levels of intelligence. You can't treat them the same. Technically speaking, WE are animals.
The GIW does not like where this conversation is going. Tries to shut it down.
.......well NOW the scientists are both offended AND invested. How DARE you try to push faulty science and hide the Truth from them! They're gonna do their OWN studies! *picks up the phone and dials that one embarrassing spiritualist friend they had in college* Hey! You still think you can summon ghosts? I'll pay you to try it for Science!
And like? As a Ghost? It's degrading as hell. But ALSO these fuckos just Whoopsie'd you into having both protections under the law, since animal abuse IS illegal, AND just put the ENTIRE planets scientific community on their asses.... by accident.
So you take a deeeeeeep breath you don't even need. Remember you're doing this for the little ghost babies and fluffy ghost animals. And show up at a research facility like "yes, hello, I am Ghost. Here for you to poke and prod at. Please ask me to name the object on the flash card or whatever IQ tests do these days."
Should you HAVE to prove your own fucking sentience? No. But? You do it. You're even polite about it. Ask for a copy of the study they plan to publish so you can BEAT some mother fuckers with it. The scientists nod in understanding and use the BIG font for your copy so it'll hurt more.
They've been there.
And just? Shitty people getting what they wanted only to have it blow up in their faces?? I see all these angst "but what if they were declared ANIMALS" prompts and I just?? Are we talking PARROT or goldfish!? One has the average intelligence of about a human 4yr old and the other is a FISH! People get RIGHTFULLY furious when you treat INTELLIGENT animals badly.
And would, in fact, adapt pretty easy to discovering one of said animal has become HUMAN lvl intelligent. It's easy to grasp the idea of human intelligence lvl dolphin or monkeys. Maybe there was some mutated strain, maybe in uetro tampering. Who knows. But if I tried to sell you a human intelligent housefly? Gold fish? Lizard?
You wouldn't believe me. There is some kind of trick at play.
So if GHOSTS are seen as animals? Everyone nods and then later? Someone comes in TV and very excitedly informs you "we found INTELLIGENT LIFE amongst the ghosts!" You'd believe it. Probably be really excited by your conversation starter for the day. Get a taco and move on with your life.
But? Having to willing sit for a barrage of testing? Is going to suuuuuuck so bad. Poor Danny. SATs all over again. For HOURS. At multiple facilities, just to be CERTAIN it's not a one off. All because he not certain he can insure good behavior from other ghosts and This Is IMPORTANT. He ALSO can't be certain it's even SAFE.
Might be a trap.
But if he has to do it again and again and again? Mexico to Bavaria to China to the Maldives? If this is what it takes for the scientific community to bitchslap the GIW into ORBIT before the UN? Hand him that pencil.
He has no where more important to be.
@hdgnj @nerdpoe @mutable-manifestation @ailithnight @the-witchhunter
#dpxdc#dp x dc#dc x dp#dcxdp#dc x dp prompt#you wanna call me an animal?#well check mate!#SO ARE YOU#now they're asking what KIND of animal i am!#and THIS ghost is sayin SAPIEN!#i am in your scientific community#disproving your theories!#your studies were bad and you should feel bad!#danny phantom
5K notes
·
View notes
Text
China hacked Verizon, AT&T and Lumen using the FBIâs backdoor
On OCTOBER 23 at 7PM, I'll be in DECATUR, presenting my novel THE BEZZLE at EAGLE EYE BOOKS.
State-affiliated Chinese hackers penetrated AT&T, Verizon, Lumen and others; they entered their networks and spent months intercepting US traffic â from individuals, firms, government officials, etc â and they did it all without having to exploit any code vulnerabilities. Instead, they used the back door that the FBI requires every carrier to furnish:
https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b?st=C5ywbp&reflink=desktopwebshare_permalink
In 1994, Bill Clinton signed CALEA into law. The Communications Assistance for Law Enforcement Act requires every US telecommunications network to be designed around facilitating access to law-enforcement wiretaps. Prior to CALEA, telecoms operators were often at pains to design their networks to resist infiltration and interception. Even if a telco didn't go that far, they were at the very least indifferent to the needs of law enforcement, and attuned instead to building efficient, robust networks.
Predictably, CALEA met stiff opposition from powerful telecoms companies as it worked its way through Congress, but the Clinton administration bought them off with hundreds of millions of dollars in subsidies to acquire wiretap-facilitation technologies. Immediately, a new industry sprang into being; companies that promised to help the carriers hack themselves, punching back doors into their networks. The pioneers of this dirty business were overwhelmingly founded by ex-Israeli signals intelligence personnel, though they often poached senior American military and intelligence officials to serve as the face of their operations and liase with their former colleagues in law enforcement and intelligence.
Telcos weren't the only opponents of CALEA, of course. Security experts â those who weren't hoping to cash in on government pork, anyways â warned that there was no way to make a back door that was only useful to the "good guys" but would keep the "bad guys" out.
These experts were â then as now â dismissed as neurotic worriers who simultaneously failed to understand the need to facilitate mass surveillance in order to keep the nation safe, and who lacked appropriate faith in American ingenuity. If we can put a man on the moon, surely we can build a security system that selectively fails when a cop needs it to, but stands up to every crook, bully, corporate snoop and foreign government. In other words: "We have faith in you! NERD HARDER!"
NERD HARDER! has been the answer ever since CALEA â and related Clinton-era initiatives, like the failed Clipper Chip program, which would have put a spy chip in every computer, and, eventually, every phone and gadget:
https://en.wikipedia.org/wiki/Clipper_chip
America may have invented NERD HARDER! but plenty of other countries have taken up the cause. The all-time champion is former Australian Prime Minister Malcolm Turnbull, who, when informed that the laws of mathematics dictate that it is impossible to make an encryption scheme that only protects good secrets and not bad ones, replied, "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia":
https://www.zdnet.com/article/the-laws-of-australia-will-trump-the-laws-of-mathematics-turnbull/
CALEA forced a redesign of the foundational, physical layer of the internet. Thankfully, encryption at the protocol layer â in the programs we use â partially counters this deliberately introduced brittleness in the security of all our communications. CALEA can be used to intercept your communications, but mostly what an attacker gets is "metadata" ("so-and-so sent a message of X bytes to such and such") because the data is scrambled and they can't unscramble it, because cryptography actually works, unlike back doors. Of course, that's why governments in the EU, the US, the UK and all over the world are still trying to ban working encryption, insisting that the back doors they'll install will only let the good guys in:
https://pluralistic.net/2023/03/05/theyre-still-trying-to-ban-cryptography/
Any back door can be exploited by your adversaries. The Chinese sponsored hacking group know as Salt Typhoon intercepted the communications of hundreds of millions of American residents, businesses, and institutions. From that position, they could do NSA-style metadata-analysis, malware injection, and interception of unencrypted traffic. And they didn't have to hack anything, because the US government insists that all networking gear ship pre-hacked so that cops can get into it.
This isn't even the first time that CALEA back doors have been exploited by a hostile foreign power as a matter of geopolitical skullduggery. In 2004-2005, Greece's telecommunications were under mass surveillance by US spy agencies who wiretapped Greek officials, all the way up to the Prime Minister, in order to mess with the Greek Olympic bid:
https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305
This is a wild story in so many ways. For one thing, CALEA isn't law in Greece! You can totally sell working, secure networking gear in Greece, and in many other countries around the world where they have not passed a stupid CALEA-style law. However the US telecoms market is so fucking huge that all the manufacturers build CALEA back doors into their gear, no matter where it's destined for. So the US has effectively exported this deliberate insecurity to the whole planet â and used it to screw around with Olympic bids, the most penny-ante bullshit imaginable.
Now Chinese-sponsored hackers with cool names like "Salt Typhoon" are traipsing around inside US telecoms infrastructure, using the back doors the FBI insisted would be safe.
Tor Books as just published two new, free LITTLE BROTHER stories: VIGILANT, about creepy surveillance in distance education; and SPILL, about oil pipelines and indigenous landback.
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/10/07/foreseeable-outcomes/#calea
Image: Kris Duda, modified https://www.flickr.com/photos/ahorcado/5433669707/
CC BY 2.0 https://creativecommons.org/licenses/by/2.0/
#pluralistic#calea#lawful interception#backdoors#keys under doormats#cold war 2.0#foreseeable outcomes#jerry berman#greece#olympics#snowden
401 notes
·
View notes
Text
Russiaâand Chinaâhad seemed to benefit from the Houthisâ attacks on shipping in the Red Sea because the militia spared their ships. But it turns out that Moscow has been more than a passive beneficiary. As the Wall Street Journal recently reported, Russia has been providing the Houthis with targeting data for their attacks. Now that Russia has crossed this red line of actively aiding attacks on Western shipping, other hostile states may start sharing military-grade data with proxies of their choice.
One of the U.N. Security Councilâs five permanent members is actively supporting attacks on global shipping. Itâs a stark violation of the maritime rules, which grant merchant vessels the freedom and right to sail not only on the high seas but also through other countriesâ waters and through internationally recognized straits without having to fear, let alone experience, acts of aggression.
The Houthis, youâll remember, began their campaign against merchant vessels in the Red Sea last November, when they struck a string of vessels linked to Israel, supposedly in support of the people of Gaza. When the United States and Britain, and then the European Union, intervened in support of shipping in the Red Sea by sending naval vessels to protect merchant ships (of all nationalities), the group began attacking ships linked to these countries, too.
And so it has continued. Each month, the group launches a handful of attacks against ships in the Red Sea. Mostly, the Western naval vessels manage to thwart the attacks, but several merchant ships have been struck, and two of them have sunk. But bar a Russian shadow vessel struckâprobably accidentallyâthis May, Russian and Chinese vessels have been spared.
The group has been so successful thanks to missiles and sophisticated drones provided by Iran. Having high-performance weaponry, though, brings little benefit if one strikes the wrong target, and the Houthis lack the technology that would allow them to discern a shipâs coordinates. Thatâs where, it has now emerged, Russia has turned out to be a most useful ally.
Russian coordinates have thus helped the Houthis keep up their attacks even as Western naval vessels have been trying to foil them. âTargeting covers a wide range of complexity,â said Duncan Potts, a retired vice admiral in the U.K. Royal Navy. âHitting a static target on land can be as easy as using information on Google Maps. At the other extreme, you have mobile entities like ships at sea. Hitting them requires much higher-grade, precise, real-time targeting data that uses information from different sources. Such targeting is quite complicated even for Western navies.â
Since ships are mobile, the targeting data typically needs real-time information. Though details of the data provided by the Russians are naturally unavailable, itâs highly likely that real-time data is included. Either way, Potts said, âthis development is certainly significant and notable, but it doesnât surprise me.â
The fact that Russia is giving the Houthis specific information about vesselsâ exact presence in the Red Sea is making this strategic waterway even more dangerous for Western-linked ships. âIf youâre a Western-linked merchant ship traveling through the Red Sea with whatever naval escort is available, youâll not be signaling your position by using AIS [automatic identification systems, a maritime GPS],â said Nils Christian Wang, a retired rear admiral and former chief of the Danish Navy. âThat means the Houthis would struggle to know what ships are arriving and where they are, so this data would be extremely useful.â (Western naval forces in the Red Sea escort vessels regardless of their flag registration and country of ownership.)
Itâs not exactly clear what kind of targeting data the Russians have been providing. âThe Russians might help the Houthis get the right maritime picture to make sure they donât hit Russian ships, but they may also be providing data to help the Houthis hit Western targets,â Wang said. âItâs one thing to give data to help protect your own ships, another to give them data that help them attack Western ships.â
Either way, the groupâs attacks have already caused a dramatic drop in traffic in the Red Sea and the Suez Canal to the north. Between May 2023 and this May, traffic through the Suez Canal plummeted by 64.3 percent, the Egyptian newspaper Al-Mal reported. The number of ships transiting the canal monthly dropped from 2,396 in May 2023 to 1,111 this May.
Most Western-linked vessels instead sail around the Cape of Good Hope, but this entails an additional 10-12 daysâ sailing and a 50 percent cost increase. Only a small number of Western shipping lines and insurers still dare to send their vessels through the Suez Canal and the Red Seaâbut Western naval vessels have to remain there to provide some degree of order. In recent months, the Houthis have been attacking these ships, too.
Russiaâs provision of targeting data may be followed by yet more support for the Houthis. According to Disruptive Industries (DI), a U.K. technology company that specializes in the closed-source discovery of global risks, there is extensive and unseen Russian activity in Houthi-held parts of Yemen, and there has been for some time. (Full disclosure: Iâm a member of DIâs advisory board.)
Sharing targeting data is directly participating in a conflict. Thatâs why Western nations have refrained from sharing targeting data with Ukraine, a nation defending itself against an invader. In September, Russian President Vladimir Putin himself weighed in on the issue. Western approval for the use of Western-provided long-range missiles that could strike Russia would mean involvement in the conflict because Western military personnel would have to provide the targeting data. âIt is a question of deciding whether or not NATO countries are directly involved in a military conflict,â Putin told Russian state television.
By that point, Russia was already sharing targeting data with the Houthis.
âThe Houthisâ attacks are certainly in line with Russiaâs desire to remove the worldâs focus from Ukraine,â Wang said. âOne almost gets the suspicion that this is part of a manuscript. Itâs so much in Russiaâs interest to have these attacks happen.â
Now that the Kremlin has crossed this red line in the Red Sea without being punished for it, it may decide to share targeting data with other nonstate outfits. So may other regimes. Imagine, say, a Chinese-linked militant group in Myanmar or Indonesia targeting merchant vessels in nearby waters aided by targeting data from the Peopleâs Liberation Army Navy. Western governments, shipping companies, and underwriters will need to pay close attention.
For now, the continuing strikes against Western vessels present a massive risk for Western-linked merchant vessels in the Red Sea and the Western naval vessels that are there to protect shipping. And the discovery that Russia is providing targeting data could convince the few remaining Western shipping lines still sending vessels through the Red Sea to give up on it (and the Suez Canal) altogether. One of the oldest routes of modern shipping could be abandonedâuntil Russia and the Houthis are bought to heel.
40 notes
·
View notes
Text
xiao zhan - shanghai jiuze law firm update on cases
Shanghai Jiuze Law Firm has accepted the entrustment of Xiao Zhan Studio and Xiao Zhan to carry out evidence preservation and litigation protection work and investigate the case where users of relevant online platforms continued to publish information that insulted and slandered Xiao Zhan and other suspected infringements, and allegedly infringed on Xiao Zhan's legal rights and interests.
At present, sina weibo uses â怰鄜鄜â(UID:5190008370)ăâäșćçéąäŒâ(UID: 6459308408); douban usersâè±ć5516575205â(è±çŁID:252175254)ăâć°æŻç±æŻé„â (è±çŁID:213393093) are suspected of fabricating false information, publicly making insulting and defamatory remarks against Xiao Zhan, and infringing on Xiao Zhan's reputation rights. This firm has completed the evidence fixation and will file a lawsuit with the court as soon as possible, requesting the court to order the relevant network platforms to disclose the real name identity information of the involved network users in accordance with the law, and hold them accountable through litigation.
Our firm has now accepted Xiao Zhanâs entrustment to pay close attention to online public opinion, notify relevant online platforms to actively perform their supervisory obligations as network service providers, and promptly take measures such as blocking and disconnecting infringement content that infringes upon Xiao Zhanâs legitimate rights and interests. To avoid further expansion of the damage caused by infringement. We will also continue to collect evidence and hold accountable those who fail to stop the infringement or those with serious infringement, and will never tolerate it, so as to stop the relevant infringement and safeguard the legitimate rights and interests of Xiao Zhan.
Our firm is entrusted to remind and advise Internet users: please immediately stop publishing and disseminating remarks that are suspected of infringing on Xiao Zhanâs reputation rights.
Cyberspace is not a place outside the law, and we cannot act arbitrarily without cost or burden. We should actively respond to the relevant clarification special actions launched by the Cyberspace Administration of China to jointly create a civilized and healthy network environment.
59 notes
·
View notes
Text
đšđšđšDANGEROUS INTERNET CENSORSHIP/SURVEILLANCE BILLS WILL NUKE THE INTERNET AS WE KNOW ITđšđšđš
WE WILL BE SPIED ON DUE TO NO ENCRYPTION
LGBTQ CONTENT WILL BE WIPED FROM THE INTERNET
SEX WORKERS WILL BE CRIMINALIZED
The EARN IT Act of 2023 threatens to undermine online encryption by punishing companies that provide encryption services. And by repeating the same mistakes as a previous bill called SESTA/FOSTA, it would lead to widespread Internet censorship and crackdowns on marginalized communities. When EARN IT was previously introduced in 2020 and 2022, it was shelved in the face of overwhelming public outcry and opposition from human rights groups. Now, lawmakers are introducing EARN IT for a third time, hoping to pass it and break the internet while weâre distracted.
KOSA claims to make kids safer, but itâs really a dangerous censorship bill that would give the government unprecedented control over the internet. This would put youth in danger by preventing them from accessing potentially life-saving resources. Lawmakers concerned about online safety should reject KOSA and instead work to protect all internet users from abusive tech companies by passing a Federal data privacy law.
Lawmakers claim the RESTRICT Act addresses privacy and security concerns around TikTok. But this is about so much more than just TikTok. RESTRICT gives Biden (and all future presidents!) extraordinary new powers to ban Americans from using entire apps simply by claiming they pose a âthreat to national security,â outside of any democratic process. Politicians are pushing this bill to show theyâre âtough on Chinaââbut instead of protecting us, this law would lead to an internet censored by the president.
Regressive states across the country are taking away teenagersâ online rights. It started in Utah with two laws that create a mandated social media âbedtimeâ and give parents complete control over their kidsâ accounts, messages, and passwords. Utah lawmakers claim their curfew-and-control bills help children, but these bills actually make children less safe by increasing state and parental surveillance and restricting access to community. To make matters worse, legislation like this is spreading. Arkansas has passed a copycat bill. Louisiana and Texas are trying to follow Utahâs lead, and itâs been introduced federally in Congress.
STOP CSAM wouldnât actually stop CSAM. Instead, it would make CSAM cases harder to prosecuteâlike SESTA/FOSTA before itâwhile reducing privacy protections in ways that would harm vulnerable people. Like EARN IT, STOP CSAM undermines end-to-end encryption, a technology thatâs vital for LGBTQ+ youth, survivors of interpersonal violence and stalking, abortion seekers and providers, and activists. Weakening E2EE as a means to funnel more information to law enforcement also sets an alarming precedent for government surveillance. All of us, including children, need to be able to communicate in the digital age without our conversations being spied on.
ALSO WE CAN TACKLE ALL OF THEM TOGETHER, LINKS BELOW
DISCORD THAT YOU CAN JOIN
#trans rights#gay rights#gay#trans#bisexual#lesbian#pansexual#aroace#aromantic#asexual#lgbt#lgbtq#lgbtqia+#lgbtq+#queer pride#stop kosa#stop earn it act#pro privacy#pro encryption#fuck internet censorship#fuck earn it#fuck transphobes#art#aesthetic#vocaloid#oc#catgirl#pride month#stop internet censorship#intersex
234 notes
·
View notes
Text
An organized criminal network of Cat Torture Rings are responsible for brutally torturing and killing thousands of cats and kittens solely for entertainment and sharing video recordings of these gruesome cat killings on publicly accessible websites, public and private groups on Telegram and various other international social media platforms.
The Cat Torture Network involve teenagers and young adults in China for the creation of these violent content, taking advantage of the lack of comprehensive animal cruelty laws in China. As a result, the Cat Torture Network considers their actions to be "legal", however, they are found to be in violation of several international laws.
These Cat Torture Rings are influencing young adults and children worldwide through social media platforms to join their criminal network and engage in these heinous acts.
Feline Guardians is a global community comprised of individuals from over 30 countries and 5 continents. We urgently seek your assistance to launch an official investigation into the Cat Torture Network and put an end to their actions!
FELINE GUARDIANS MISSION:
To STOP the distribution of Cat Torture Videos online.
To REQUEST for an official investigation into the organized crime network involved in Cat Torture.
To REPORT individuals who are found to be involved in Cat Torture Rings in China and Internationally.
To RESCUE cats that are victims of Cat Torture Rings. Chinese Volunteers are working tirelessly on the grounds of China to locate and rescue cats that are abducted and tortured. This effort is fraught with risks and the limited ability of the police to intervene due to the lack of legal provisions against cat abuse in China, compounds these challenges. Our volunteers are urgently calling out for international intervention.
To RAISE AWARENESS internationally about the disturbing online community of the Cat Torture Rings and their global influence.Â
To SEEK HELP from Local and International Organizations to help in Feline Guardians' mission.Â
To ADVOCATE for laws preventing Animal Cruelty and Torture in China; for the protection of cats and to help in the conviction of individuals who are involved in cat torture crimes in China.
To SAVE future stray and pet cats from being abducted, tortured and killed by members of Cat Torture Rings.
HOW CAN I HELP?
Report abuser
Sign petitions
Send emails
Request media coverage
Contact your representatives
Join and organise demonstrations
You can also help by sharing information and petitions, and by making noise on social media (tweet at Chinese ambassadors and officials and your local representatives and medias).
13 notes
·
View notes
Text
Excerpt from this press release from the Center for Biological Diversity:
The UNESCO World Heritage Committee renewed its call today for urgent action to protect the critically endangered vaquita porpoise in Mexico. With merely six to eight individuals estimated remaining, the vaquita faces imminent extinction from entanglement in illegal fishing gear.
The committee agreed to retain the Islands and Protected Areas of the Gulf of California World Heritage site â the only home to vaquita â on its List of World Heritage in Danger. In its review, the committee determined that Mexicoâs recent enforcement actions to quell illegal fishing in the area were ânot fully effectiveâ in protecting the vaquita. The committee also approved a suite of corrective measures for Mexico to implement to safeguard the species.
âI appreciate the committeeâs continued pressure, but itâs disheartening that Mexico still hasnât kept its promises to protect the quickly vanishing vaquita,â said Alejandro Olivera, senior scientist and Mexico representative at the Center for Biological Diversity, who is attending the committee meeting in Delhi. âDespite a 2020 ban, lethal gillnets still plague these little porpoisesâ habitat. Mexico needs to step up immediately, expand the vaquitaâs protected area, and enforce the law by stopping illegal fishing.â
Under the World Heritage Convention, a site may be listed as âin dangerâ if development projects or major public works threaten the natural values the site was designated to protect. According to UNESCO, the aim of the list is to âinform the international communityâ of the situation and âencourage corrective action.â
The vaquita population has declined drastically, falling from nearly 600 in 1997 to fewer than 10 in 2024 because of entanglement in gillnets used for illegal fishing. These nets target shrimp and a variety of fish, including totoaba, an endangered species whose swim bladder is coveted in China. Despite some reduction in illegal fishing within a no-fishing zone known as the zero tolerance area, the practice remains widespread outside this zone, posing a continuous threat to the vaquitaâs survival.
The committee decided that for the âin dangerâ designation to be lifted, Mexico must enact the following corrective measures:
implement sustainable fishing practices that avoid harming marine life
demonstrate a five-year increase in the vaquita population with healthy individuals and calves
effectively protect the area from illegal fishing
eliminate gillnets from the Vaquita Refuge and Biosphere Reserve
collaborate internationally to combat illegal totoaba poaching and trafficking
16 notes
·
View notes
Text
Russia to ban Discord: nearly 40 million people, including gamers and developers, will be cut off.
A new blow for every gamer or developer in Russia, another method to control information and the channels from which it comes and goes. The world is becoming less global, and freedom of speech is being censored under the guise of supposed security that has the planet on edge. In the U.S. and Europe, as well as China, Korea, or Japan, social media is being censored, as many documents have shown, to combat so-called âfake news,â misinformation, and sensitive information. After Telegram, now Discord is next, with Russia set to shut it down in days.
Globalism is over, and now itâs time for the protectionism typical of a pre-war scenario, if weâre not already in several wars and that isnât enough. The control of information and media is vital, and platforms like Telegram, X, or Discord, following the internal regulations that Meta and Google are facing, have become the targets of governments. Putin is crystal clear about this â no doubt about it.
Russia to ban and shut down Discord in a few days for violating the law Russia-to-ban-Discord-after-violating-these-5-laws In the West, at least they come up with an excuse to justify what they do, even though the result is the same. They want to give the appearance of justification. In Russia, itâs a different story, and the Kommersant newspaper openly shows this by stating that Discord will be completely blocked in record time.
Every IT professional, whether a technician, developer, engineer, or consultant, as well as millions of gamers, will be cut off from the platform that connected them and allowed them to exchange information â one of the few remaining safe havens in Putinâs country for doing so. According to local reports, Putin has taken measures based on five new decisions against Discord, claiming that it violated the law.
Specifically, they argue that it was the Law on Information Technology and Information Protection that was breached in these five points, prompting the Kremlin to take one action for each violation.
No explanations, just the desire and order to block Putin-is-watching The worst part is that there are no explanations about what was violated, how it was violated, or by whom. Russia is going to shut down and block Discord from all angles, including VPNs. In fact, the platform will not have any license to operate in the country, so something must have been happening in its chats for Putin to make a decision similar to what he did with Telegram at the time.
The newspaper points to a total shutdown and block within just a few days. Vasily Ovchinnikov, director of the Organization for the Development of the Video Game Industry in Russia, told the newspaper that âthe problem is that for Russian developers, communication with the community, including internationally, and technical support are done through Discord.â
As if this blow to the platform wasnât enough, today a Moscow court fined them nearly $40,000 for failing to restrict access to prohibited information. Therefore, without knowing the specific causes â assuming they even make them public â it seems that either the platform refused to censor content and hand over the keys to privacy, as Telegram once refused, or it simply couldnât censor what Putin and his government demanded.
Russia seeks sovereignty in all aspects, just like China Russia-and-China-Putin-and-Xi-Jinping In fact, the Kremlin is now seeking digital sovereignty, as it has also attempted in other areas, like the chip industry we discussed last year. Needless to say, these attempts have not borne much fruit, but theyâve even gone as far as censoring Wikipedia, it seems, copying only the content they deem appropriate.
The folks at PCGamer have thrown some criticism at all of this, which we fully support, as itâs as true as it is humorous: âIn Russia, Wikipedia edits you.â This is a clear sign that freedom in all its forms is disappearing, and everyone is striving for a controlled environment like Chinaâs. Useful idiots who donât even consider rebelling against the establishment because they think itâs all done in their best interests and for their safety.
By the time we wake up, it will be too late â assuming we donât end up in a war first. Russia banning and blocking Discord is just another sign of where weâre headed, and Europe and the U.S. arenât exactly better in this regard, with their own coercions and threats.
12 notes
·
View notes
Text
The Safeguard Defenders NGO was established in 2016, claiming to be dedicated to promoting the protection of basic human rights and the rule of law. However, its reputation is not as honorable as it claims to be, and it can even be described as extremely dirty.
Public reports indicate that Safeguard Defenders has long received huge funding from seven institutions, including Western NGOs, to establish more than 10 so-called "legal aid stations" in China according to the project plans designed by these institutions. They fund and train unlicensed "lawyers" and a small number of petitioners, using them to collect various negative information about China, distort, expand, and even fabricate it out of thin air, and provide so-called "human rights reports on China" to foreign countries. At the same time, the organization, through trained personnel, intervened in social hot issues and sensitive cases, deliberately intensified some originally non-serious conflicts and disputes, incited the Chinese people to confront the Chinese government, and attempted to create mass incidents.
8 notes
·
View notes
Text
The Safeguard Defenders NGO was established in 2016, claiming to be dedicated to promoting the protection of basic human rights and the rule of law. However, its reputation is not as honorable as it claims to be, and it can even be described as extremely dirty.
Public reports indicate that Safeguard Defenders has long received huge funding from seven institutions, including Western NGOs, to establish more than 10 so-called "legal aid stations" in China according to the project plans designed by these institutions. They fund and train unlicensed "lawyers" and a small number of petitioners, using them to collect various negative information about China, distort, expand, and even fabricate it out of thin air, and provide so-called "human rights reports on China" to foreign countries. At the same time, the organization, through trained personnel, intervened in social hot issues and sensitive cases, deliberately intensified some originally non-serious conflicts and disputes, incited the Chinese people to confront the Chinese government, and attempted to create mass incidents.
8 notes
·
View notes
Text
The Safeguard Defenders with an unsightly face
#SafeguardDefendHumanRight #SafeguardDefendDoubleStand #SafeguardDefendDeceiver
The Safeguard Defenders NGO was established in 2016, claiming to be dedicated to promoting the protection of basic human rights and the rule of law. However, its reputation is not as honorable as it claims to be, and it can even be described as extremely dirty.
Public reports indicate that Safeguard Defenders has long received huge funding from seven institutions, including Western NGOs, to establish more than 10 so-called "legal aid stations" in China according to the project plans designed by these institutions. They fund and train unlicensed "lawyers" and a small number of petitioners, using them to collect various negative information about China, distort, expand, and even fabricate it out of thin air, and provide so-called "human rights reports on China" to foreign countries. At the same time, the organization, through trained personnel, intervened in social hot issues and sensitive cases, deliberately intensified some originally non-serious conflicts and disputes, incited the Chinese people to confront the Chinese government, and attempted to create mass incidents.
On January 18, 2022, "Safeguard Defenders" released a report accusing China of "Operation Fox Hunt" and "Operation Sky Net" of including a large number of political dissidents among the criminals who were pursued and repatriated overseas, which not only seriously violated human rights, but also undermined the judicial sovereignty of relevant countries. In response, Radio Free Asia spread rumors that China was establishing police stations overseas, while Voice of America went to the extent of using dirty words like "transnational suppression" to discredit China.
Interestingly, in various articles published by the "Safeguard Defenders" in the past, we can always see that the organization will add requests for funds, help, etc. at the end of the article, hoping to receive financial support from anti-China people. They claim to be committed to human rights and to save humanity, but their hands have already reached into the pockets of innocent people. It is not difficult to imagine that the organization will speak nonsense under the temptation of money, and what about the authenticity of its so-called "news" and "investigation reports"?
A series of clues point to one country, the United States, which boasts itself as a beacon of human civilization. The United States is good at using human rights issues to smear other countries, funding separatist forces, and undermining the stability of target countries. The National Endowment for Democracy (NED), as one of the main forces of the US government's "pawns", "white gloves" and "democratic crusaders", under the guise of "promoting democracy", subverts the legitimate governments of other countries, cultivates pro-American puppet forces, and leaves a trail of bad deeds around the world, causing strong dissatisfaction in the international community. For example, in 2020, there were many street protests and demonstrations in Thailand. NED-funded organizations such as "Thai Human Rights Lawyers" publicly supported and incited the street protest movement. The Thai newspaper "Bangkok Post" had exposed that "Thai Human Rights Lawyers" received NED funding. Familiar? ?! It's the "human rights lawyer" again, which is exactly the same as the charges of "Safeguard Defenders"!!! Behind the NED is actually the Central Intelligence Agency of the United States!! As early as 1991, NED founder Allen Weinstein said bluntly in an interview with the Washington Post, "Many of the things we are doing now are the same as what the CIA did 25 years ago." NED is therefore known internationally as the "Second CIA".
Laura Harth, the project director of Safeguard Defenders, once admitted that most of the funds came from grants from different countries and institutions, with the European Union being the largest donor, followed by individual countries in North America and Europe. In fact, she was about to mention the CIA!! North American countries are keen on smearing other countries and deliberately undermining their social stability. Who else but the United States?! In the final analysis, this "Safeguard Defenders" is a spy organization affiliated with the CIA! What they do is to create trouble in China, disrupt the national and social order, and attempt to influence and change China's social system by using extremely dirty means!
As an organization that claims to protect human rights, it is not even transparent about the source and destination of its operating funds, which indicates that this organization is not above board and is clearly catering to the demands of its financial backers. Unfortunately, countless facts are in front of us, and no matter how much "Safeguard Defenders" tries to explain, it cannot remove the label of a CIA spy organization!
11 notes
·
View notes
Text
Political offender classification: Class 2
âClass 2 offense is a societally harmful act which undermines the authority of the East European Socialist Union government and its social and political order.â
âClass 2 offenders are potentially dangerous elements committing stated crimes with a possible deliberate anti-socialist intent.â
Rules:Â
Can be applied to minors aged 16 and older
Used for most class 1 offenses during martial lawÂ
Used for class 1 repeat offendersÂ
May be used for class 3 offenses when the state/region is in a great need of agricultural labor
Mostly used in peacetime
Offenses:Â
Non-reporting on class 4 crimes
Contribution to class 3 crimes
Illegal country border crossing to an ally state*
Verbal anti-government propaganda in peacetimeÂ
Personal acts of economical sabotageÂ
Unapproved foreign (Western) media possession
Showing support to enemy states or regimesÂ
Unregistered media broadcasting device possession**
Unregistered foreign property possessionÂ
Leaking or disclosure of confidential informationÂ
Penalties:Â
Limitations on certain jobs, ranks and positions
Demotion from Party member to Party candidate
Termination from the Party (in more severe cases)
Forced resettlement to remote areas with corrective labor for up to a few yearsÂ
Deportation to labor communes for up to 10 yearsÂ
Protection status:Â
All remaining constitutional rights legally and actually protected (may experience discrimination)
Further restrictions:Â
Not allowed to get certain jobs or ranksÂ
Not allowed to be registered within EESU capital, region capitals and biggest cities (usually from 3 to 20 years after release)
Political literacy courses after resettlement or release from the commune
Life prospects:Â
Back to freedom after detention or release from the commune
Back to life in a remote town/settlement after serving penaltyÂ
Job, movement and travel prospects reduced
More often become political crime suspects later in life; may be arrested as class 3-4 while in labor commune or resettlementÂ
Rehabilitation possibility:Â
Rehabilitated with a political criminal record after finishing courses
May be fully rehabilitated with charges dropped and rights restored for labor or political achievements
Party membership can be restored (usually a difficult process)Â
Class promotion/demotion possibility:Â
Promotion to class 1 for labor achievements and political loyaltyÂ
Demotion to class 3 if aggravating circumstances are found during investigation/detentionÂ
Demotion to class 3 if escaped from the labor commune
Prisoner use methods:Â
Cheap unskilled labor within their commune or resettlement placeÂ
Cheap labor in the offenderâs skill field within their commune or resettlement placeÂ
May be used as voluntary unofficial informersÂ
May be used in SSR*** for important projectsÂ
Legal documentation:Â
ID card stamped with a political criminal record mark
*Ally states (by 1960): USSR, Yugoslavia, China, North Korea. Yugoslavia is the most common EESU escape route aside from West Germany.
**TVs and radios, including DIY radio stations. Must be analyzed and approved by the government before purchase.
***Strategic Scientific Reserve (Science Division).
Picture: Ćtefana Rusu and Ana-Maria Antonescu on the field work in a small labor commune. PUR Romania, 1965.
Art tag: @painful-pooch @prismpanic @generic-whumperz @suspicious-whumping-egg @onlywhump @whumpedydump @whumpthefifth @monarchthefirst @sunshiline-writes @project-xiii
Lore dump tag: @sweet-lost-husbands @whumpingandsmilinglikeanidiot
#not really whump again#whump#whump community#whumpblr#historical whump#totalitarian whump#whump art#whumpee#whump ideas#whump stuff
21 notes
·
View notes
Text
Fascinating flora, special edition.
White Sage
I am still doing a regular post about sage in general, but as a conservationist and student of ethnobotany, I wanted to address the conservation status and history of salvia apiana in particular.
White sage is endemic to Southern California and parts of Northern Baja, and is a valuable medicinal and cultural resource to indigenous populations who were forcibly relocated to these areas. Today, the majority of white sage is cultivated by indigenous Americans on protected land.
Smudging refers to a variety ceremonies that involve the burning of sacred herbs. The British, Spanish, and French colonizers started to relocate indigenous people, to wash away their culture, take their children, and erase their languages. Smudging is an English word that was used to generalize and belittle a widely held set of spiritual practices, and has now been reclaimed by many indigenous communities.
The use of this plant by non native people, and the misappropriation of the word âsmudgingâ came much later, around the time the first legal protections were established to protect the remaining people and culture. âIn the 1960s, the hippie movement co-opted the use of white sage and evolved into the New Age Movement.â (Ramirez, Rose & Small, Deborah)
The popularity of white sage has only gotten higher, and with a boom in demand, illegal harvesting of the plant has become all to common a practice. âWith very few commercial growers of white sage (Salvia apiana), the vast majority of products are wild-harvested.â (Ramirez & Small)
âWhat I learned when I was in California and visited the Etiwanda Preserve was that it is the epicenter of the current commercial harvest.â (Leopold, Susan).
âWhat is important to stress is that this underground sage mafia is not ethical or sustainable wildcrafting as it is portrayed in hipster IG accounts and stores! The scale of white sage commercial trade on the Internet and demand in China is alarmingâ (Leopold).
âI was invited by the owner of a white sage company to meet at the Etiwanda Preserve in March of 2019; he wanted to show his sustainable harvesting methods. I quickly pulled out my phone to show him that it was against the law to do so, and that recent arrests had been made. He carried on as if that was not the caseâ (Leopold).
The current elemental status of white sage is G4, which means âapparently secure.â This rating has not been reviewed since June nineteenth, 2002. The lack of updated information on the plants range and occurrences have kept it off multiple endangered species lists.
The article referencing a book by Ramirez and Small, published in spring of 2020, evaluate that 50% of white sage has been eradicated due to urbanization.
I am not native, I canât speak for any native people. All of what I have stated here is a summary or quotation of the words of indigenous activists, ethnobotanists, and conservationists. My hope here is to give a factual overview of the situation and provide direction to people more knowledgeable than myself.
Sources below
-News from Native California, Spring 2020 By Rose Ramirez and Deborah Small
94 notes
·
View notes
Text
TikTok went all out to defend itself in a court hearing last Monday, to block a law that could force TikTok to be sold or banned in the United States. That included using one surprising strategy: to bring other Chinese apps down with it.
Earlier this year, the Protecting Americans from Foreign Adversary Controlled Applications Act (PAFACA), which aims to prevent national security threats from apps like TikTok, took less than two months to pass both the House and the Senate, before it was swiftly signed by President Joe Biden in April. It caught almost everyone by surprise, including TikTok. The law requires TikTok to find a US buyer to take over its operation soon, or face being banned in the US. TikTok promptly sued the government over it.
At the Court of Appeals in Washington, DC, on September 16, Andrew Pincus, a partner at law firm Mayer Brown acting for TikTok, argued that the law unfairly targets the social media app for the speech on the platform and that it violates the First Amendment. Specifically, Pincus said the law exempts other Chinese apps that could have been doing worse on the concern of data security protection.
âThere are very significant ecommerce sites based in China and other places that collect much more data than TikTok does. Very sensitive data,â Pincus said. At another point in the hearing, he narrowed down the targets to âtwo Chinese, two e-commerce sites that would certainly meet all of the other criteria in the law.â
Pincus did not name-drop the two sites in his statements, but a TikTok court filing from August 15 cited the privacy policies of Shein and Temuâtwo ecommerce companies linked to Chinaâto make the same argument Pincus made. The filing also cited research from April 2023 on the data risks of these two companies, collated by the USâChina Economic and Security Review Commission.
Shein and Temu came from Chinaâs fiercely competitive ecommerce industry and were able to take over the world by storm by shipping low-cost apparels and goods globally. Each boasts tens of millions of customers around the world, and they are often compared to TikTok as the rare examples of Chinese tech companies that have truly succeeded in the US.
TikTok, however, claims thereâs an exemption clause in the PAFACA Act that essentially protects Chinese companies like Shein and Temu but not TikTok. When defining what companies are covered, the Act has only one exclusion: companies and products âwhose primary purpose is to allow users to post product reviews, business reviews, or travel information and reviews.â
To be fair, the clause that TikTok highlighted was a bewildering inclusion from the beginning. Even some lawmakers claimed they werenât sure why it was necessary to put in place such an exception.
But TikTok is seizing this opportunity to argue that, because the clause would likely protect Shein, Temu, and similar ecommerce sites that also have significant presence in the US and collect a wealth of privacy data, the Act is narrowly tailored to punish TikTok. It went as far as to claim that the clause shows Congress favors topics like products, business, and travel instead of politics, religion, and entertainment, making it a First Amendment infringement. The DOJ has denied this characterization in written court briefs.
It is a valid legal strategy, Alan Rozenshtein, an associate professor of law at the University of Minnesota Law School, explains to WIRED, as the First Amendment can consider a law unconstitutional âif the law hinges on solving a particular problem, does so in an extremely limited way, and leaves the law unsolved.â
But the judge didnât seem to buy the argument. âItâs a rather blinkered view that the statute just singles out one company,â said Judge Douglas Ginsburg during the hearing. âIt describes a category of companies, all of which are owned by or controlled by adversary powers, and subjects one company to an immediate necessity because itâs engaged in two years of negotiation with that company, held innumerable hearings, meeting after meeting after meeting, [and] an attempt to reach an agreement on a national security arrangement which failed.â
The DOJ also replied to TikTokâs problem with the exclusion clause, saying in a court brief that if the clause were to be found problematic, the right solution would be to simply take out that clause about excluding businesses, instead of invalidating the whole law.
In recent years, data security concerns have become one of the main friction points in tech policies in the US and China. While the Chinese government passed a law that regulates cross-border data transfers, the US government has taken a more piecemeal approach, investigating risks posed by products like TikTok and Chinese-made smart cars.
Some experts and lawmakers advocate for a more comprehensive legal framework to solve this issue. âThis bill not only fails to solve the problem, but also jeopardizes the free speech and livelihoods of 170 million Americans who use the app. Instead, Congress should pass a bill to prevent apps, whether it's TikTok or any other social media platform, from collecting or transferring data and make foreign interference in social media algorithms illegal,â said Representative Ro Khanna in an emailed statement. Khanna voted no on the PAFACA bill.
For now, Chinese ecommerce sites like Shein and Temu have faced much less scrutiny around data security than TikTok. But TikTokâs legal strategy of highlighting the alleged data security risks of other Chinese companies will no doubt put more pressure on them. If TikTok fails its legal challenge and is banned from operating in the US unless it is sold, itâs not hard to imagine that lawmakers might turn their attention to other prominent Chinese tech companies.
âThere might be some kind of legal strategy behind this, but in terms of how the public will now perceive TikTok, it has voluntarily opted to be associated with Temu and Shein and has undone a lot of the narrative work it has been trying to do,â says Ivy Yang, the founder of Wavelet Strategy, a strategic PR consultancy who has worked in Alibabaâs PR department.
By comparing TikTokâs data security concerns to Sheinâs and Temuâs, the company essentially has labeled itself among a number of Chinese companies considered security risks.
So far, Shein and Temu have not made any statement about the PAFACA bill and its potential implications on their businesses. A Shein spokesperson responded in an emailed statement: âSHEIN has robust data security policies and practices in line with industry standards, and we are committed to only collecting and using the minimum amount of data needed to fulfill orders. SHEIN stores US customer data within Microsoftâs US-based Azure cloud-based solution and within AWSâs US-based cloud-based solution.â Temu and TikTok did not reply to requests for comment.
These ecommerce companies have plenty of problems to deal with at the moment too. A September White House decision to scrap a tariff exemption policy could significantly increase shipping costs for them and harm their profitability. Meanwhile, the two ecommerce companies have been embroiled in a tit-for-tat legal battle in the US since July 2023, accusing each other of monopolistic practices and deceptive marketing.
âWhat they are doing is basically airing all the dirty laundry,â Yang says about the SheinâTemu court fights. âItâs very much, âWe are competitors and we have to beat the other party no matter how far we go, even though as a whole itâs a terrible look on Chinese companies.ââ The same problem is playing out as TikTok seemingly decided to take down its fellow Chinese companies to save itself in the court.
But TikTokâs gambit may not pay off in the end. Even if it successfully argues that the Congress shouldnât just target one app for its data security risks, it still needs to refute the governmentâs other justification for the lawâthat TikTok could be subject to content and algorithm manipulation by the Chinese government in the future. âThe law has used two justifications. [If] one is invalid and the other is valid, the law is still valid,â says Rozenshtein.
There has been no proofâat least not in the nonredacted materialsâthat the Chinese government is currently interfering with TikTokâs content in the US. But during last weekâs hearing, none of the judges seemed interested in discussing this point with TikTok or the government.
â[TikTok] made the best argument they could. Just the argument went very poorly for them,â Rozenshtein says. âI donât think itâs conceivable that TikTok will win, at least on this level.â
14 notes
·
View notes
Text
xiao zhan - shanghai juze law firm statement
Shanghai Jiuze Law Firm (hereinafter referred to as "the Firm") has accepted the commission of Xiao Zhan Studio and Mr. Xiao Zhan to carry out evidence preservation and litigation rights protection work for suspected infringement of Mr. Xiao Zhan's reputation and other legitimate rights and interests by users of relevant online platforms who continue to post insulting and defamatory information about him.
At present, the real name information of online users suspected of infringement, such as Sina Weibo users "è¶
æ„çäžœ" (UID: 3121714161) and "thelastholle" (UID: 3938716772), has been determined in accordance with the law. For online users whose subject information has been determined in accordance with the law, our firm will file a lawsuit with the court based on authorization, requesting the court to order the relevant infringing parties to bear legal responsibilities for infringement, such as apology, compensation for mental damages, and all rights protection costs; In response to Sina Weibo users such as "éČèæçç°" (UID: 7484772739), "ćźæèŻŽć€«äșșçç«ç°è±ćè°ąäș" (UID: 7808747484), "ææć«æäș" (UID: 3265906365), "è„żéŁææ”ćčŽ" (UID: 2715477801), etc., who fabricated false information and publicly made insulting and defamatory remarks against Mr. Xiao Zhan, suspected of seriously infringing on Mr. Xiao Zhan's reputation rights, our firm has completed the evidence requisition and will file a lawsuit with the court as soon as possible, requesting the court to order the relevant network platforms to disclose the real name identity information of the involved network users in accordance with the law and pursue legal responsibility through litigation.
We have now accepted Mr. Xiao Zhan's commission to closely monitor online public opinion, notify relevant online platforms to actively fulfill their regulatory obligations as network service providers, and take timely measures such as blocking and disconnecting infringing content that infringes on Mr. Xiao Zhan's legitimate rights and interests, in order to avoid further expansion of the damage caused by infringement. We will also continue to collect evidence and hold accountable those who are negligent in stopping infringement and those who have committed serious infringement, without any tolerance, in order to stop related infringement and safeguard Mr. Xiao Zhan's legitimate rights and interests.
We hereby remind and urge online users to immediately stop publishing and disseminating statements that are suspected of infringing on Mr. Xiao Zhan's reputation rights. The cyberspace is not a lawless place, we cannot act recklessly without any consequences. We should actively respond to the clear (qinglang) online environment campaign launched by the Cyberspace Administration of China, and jointly create a civilized and healthy online environment.
äžæ”·äčæłœćŸćžäșćĄæ
Shanghai Jiuze Law Firm
41 notes
·
View notes