SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: Brumar89 who wrote (1181544)11/30/2019 3:35:22 PM
From: Brumar892 Recommendations

Recommended By
pocotrader
rdkflorida2

  Read Replies (1) | Respond to of 1576002
 
2 Men Stockpiled Guns and Far-Right Propaganda in New Jersey. Are They Alone?



Ali Watkins and Nick Corasaniti

,
The New York TimesNovember 29, 2019


Rep. Josh Gottheimer (D-N.J.) speaks to a server as she takes a break at Tom Sawyer Diner in Paramus, N.J., on Friday, Sept. 27, 2019. (Bryan Anselm/The New York Times)NEWTON, N.J. — New Jersey investigators were looking into a routine complaint from a woman who said her ex-boyfriend was harassing her when they uncovered something far more dire: The 25-year-old man had stockpiled weapons and far-right propaganda and had talked about shooting up a hospital.

Two months later, New Jersey State Police responding to a crash in the same county discovered illegal assault weapons in the back seat of a van. Later, they found 17 more firearms, a grenade launcher and neo-Nazi paraphernalia in the driver’s home.

The arrests of the two men rocked law enforcement officials in Sussex County, raising fears that far-right extremism had crept into this sleepy, rural area in New Jersey.

It is impossible to know if the two arrests so close together are a fluke or signal of a growing white supremacist movement in the county, law enforcement officials said. The two men appear to have no connection to each other.

Sussex has lately been seeing ugly signs of increasing racism and anti-Semitism. Vandals have scrawled swastikas in schools, and in a highly publicized incident last fall, supporters of a Jewish congressman found their Sussex County home vandalized with anti-Semitic graffiti.

Bias-related crimes rose from four in 2016, when President Donald Trump was elected, to seven in 2018, prosecutors said. Although the numbers are small, officials say the general upward trend is troubling in a county of only 141,000 people and reflects similar increases across the state.

“One hundred percent certainty, the numbers of reports have increased,” said New Jersey Attorney General Gurbir Grewal. “I can’t say that belief system is isolated to Sussex. We’ve seen it in all parts of the state.”

At the same time, there has been a rise in right-wing extremism across the country. White supremacists and other far-right extremists have killed more people than any other category of domestic extremist in the past 18 years. In August, for example, a white supremacist targeting Mexicans killed 22 in a Walmart in El Paso, Texas.

Only recently have federal law enforcement officials come to grips with that threat, and local prosecutors like those in Sussex County have often found themselves doing investigations they are ill-equipped to undertake.




To: Brumar89 who wrote (1181544)12/1/2019 11:19:41 AM
From: RetiredNow  Read Replies (1) | Respond to of 1576002
 
China Adopts Malicious "Cybersecurity" Rules

Authored by Gordon Chang via The Gatestone Institute,

On January 1, China's Cryptography Law becomes effective. The legislation follows the December 1 implementation of the Multi-Level Protection Scheme 2.0, issued under the authority of the 2016 Cybersecurity Law.

Together, these measures show Beijing's absolute determination to seize from foreign companies all their communications, data, and other information stored in electronic form in China.

Beijing's complete visibility into the networks of foreign companies will have extremely disadvantageous consequences. (Photo: Wikimedia Commons.)

President Trump should use his emergency powers to prohibit American companies from complying with the new rules or from storing data in China.

After all these "cybersecurity" rules are in place, no foreign company may encrypt data so that it cannot be read by the Chinese central government and the Communist Party of China. In other words, businesses will be required to turn over encryption keys.

Companies will also be prohibited from employing virtual private networks to keep data secret, and some believe they will no longer be allowed to use private servers.

Beijing's system, once implemented, will be so invasive that Chinese authorities will no longer need to ask foreign businesses to turn over data. Chinese officials will simply be able to take that data on their own.

  • "Once data crosses the Chinese border on a network," writes Steve Dickinson in the China Law Blog, "100 percent of that data will be 100 percent available to the Chinese government and the CCP."


Beijing's complete visibility into the networks of foreign companies will have extremely disadvantageous consequences, Dickinson notes.

  • First, Chinese officials will be permitted, under Chinese law, to share seized information with state enterprises. This means the enterprises will be able to use that information against their foreign competitors.
  • Second, China's new rules will almost certainly result in foreign companies losing trade secret protection around the world. A trade secret loses its status as such when it is widely disclosed. Once a company allows such a secret to be carried on its Chinese network, the company has to assume Beijing will know it. "Since no company can reasonably assume its trade secrets will remain secret once transmitted into China over a Chinese controlled network, they are at great risk of having their trade secret protections outside China evaporating as well," writes Dickinson.
  • Third, China's cybersecurity program exposes companies to penalties for violating U.S. tech-export legislation. Businesses have assumed that technology covered by U.S. export prohibitions is not "exported" if it is kept on a Chinese network protected by end-to-end encryption, in other words, not available to Chinese authorities. Because companies will no longer be permitted to encrypt data end-to-end, they will almost certainly be considered as violating U.S. rules for tech stored on a network in China.


Not every analyst is alarmed by China's December 1 measures. James Andrew Lewis, for instance, maintains that Beijing's new rules are a "legitimate effort" to secure networks in China. Moreover, he argues the Chinese do not need the new MLPS 2.0 rules to grab information because they can just steal all they want with their advanced "APT" hacker groups. "Their intent is not to use it for malicious purposes," Lewis argues, referring to Chinese officials.

It is not clear how Lewis, a tech expert at the Washington, D.C.-based Center for Strategic and International Studies, can know the intent of China's officials. Furthermore, portraying that intent as benign seems naive—laughable even—while their country is stealing hundreds of billions of dollars of American intellectual property each year and while Chinese ruler Xi Jinping continues his determined attacks on foreign business. In these circumstances, we have to assume Chinese officials are acting with malign intent.

Lewis also downplays the basic point that China's cyber spies, once they have the encryption keys and access to the China network of a foreign firm, will be in a better position to penetrate the networks of that firm outside China. Therefore, it will only be a matter of time before Beijing steals data and puts companies out of business or ruins them to the point where Chinese entities can swoop in and buy them up cheap. Many allege that China stole data from Canada's Nortel Networks and thereby bankrupted it almost a decade ago. The company was, according to the Financial Post, "hacked to pieces."

Finally, CSIS's Lewis fails to recognize that Beijing's December 1 rules generally legitimize China's regulation and information-custody role--in other words, China's theft.

Senator Josh Hawley is rightly more suspicious of Beijing's intentions. In November, the Missouri Republican introduced a bill, the National Security and Data Protection Act of 2019, prohibiting American companies from storing user data or encryption keys in China. Of course, this bill faces opposition from tech companies doing business in that country.

Yet, there is someone who can, with the stroke of a pen, effectively implement Hawley's bill. President Donald John Trump can use his broad powers under the International Emergency Economic Powers Act of 1977 to prohibit companies from complying with the pernicious new rules or from storing data in China.

The rationale for such a sweeping presidential order is that the American people have an interest in China not taking control of American companies with operations in China--a probable consequence of the application of the December 1 and January 1 measures.

Such an emergency order would effectively force American companies out of China, so this step would be drastic. Yet it is China, with its incredibly ambitious grab of data, that is forcing the issue.

The American people have a vital interest in the protection of American data. Trump should issue such an order immediately.

* * *

Gordon G. Chang is the author of The Coming Collapse of China and a Gatestone Institute Distinguished Senior Fellow. Follow him on Twitter @GordonGChang.