Updates from January, 2019 Toggle Comment Threads | Keyboard Shortcuts

  • Earthling 10:08 am on January 26, 2019 Permalink | Reply
    Tags: counterrevolutionary pigdog fascists, , , , , legality of spy gadgets in russia, , prc, uyghur holocaust   

    January Internet Freedom Update 

    “You want to say something? Or you started to think deeply?”


    Bills providing punishment for insulting the authorities and false information are in reading

    Odious bills on punishment for insulting the authorities on the internet and spreading false news have been under discussion by the State Duma. These bills have been subject to debate in society and within the government.

    Vladimir Zhirinovsky said that “the groaning against the authorities” in the past led to the collapse of the USSR and the Russian Empire, so the introduction of responsibility for the relevant insults — is “protection of the country.” The head of the LDPR spoke approvingly about the “law on fake news”, because, in his opinion, it is necessary to suppress panic in society caused by fake news from the Internet and the media.


    Hundreds of millions of rubles to be spent searching for “anti-social phenomena and subcultures” on the web

    Russia’s Ministry of Education and Science plans to allocate 628-million rubles for searching online for information that is dangerous to the health of children. The subsidy will be provided to the non-profit organization ‘Center for the Study and Online Monitoring of the Youth Environment’, whose activity is aimed at monitoring the distribution of information on telecommunication networks. This non-profit organization was created on behalf of Russian President Vladimir Putin on May 31, 2018.


    Putin signs laws that partially decriminalize reposting illegal content

    The penalties for posting illegal content on the internet have been changed from criminal to administrative, if they do not pose a public threat and are committed for the first time

    The laws in question punish people for inciting racial, national, religious and other hostility through the internet or media. Under the new amendments, criminal liability will only be for repeat offenders.

    The fine for first-time offenders will range from 10,000 to 20,000 rubles, or consist of compulsory work for up to 100 hours, or administrative arrest for up to 15 days. For legal entities the fine will be from 250,000 to 500,000 rubles.


    Russian Supreme Court partially legalizes “spy gadgets”

    A new Supreme Court ruling decided that it is only necessary to punish people for the purchase of “spy” devices if they were used to “infringe upon the constitutional rights of citizens”.

    What is meant by “spy” technologies is technological means intended for secretly obtaining information. Smartphones, video recorders and voice recorders can be recognized as such, if they are specially modified. The Supreme Court recommends not to punish people who bought “spy” pens or other devices for personal safety (to monitor their house, apartment, the safety of their relatives, animals) or by accident, according to the new decision.

    According to the Criminal Code of the Russian Federation, illegal circulation of special technological means intended for secretly obtaining information is punishable by imprisonment of up to four years.

    According to the statistics of the Judicial Department of the Armed Forces, from January to June 2018, 86 people were convicted under this law, and only one acquitted. Cases against 50 people were dismissed during the investigation.


    Libraries to limit number of simultaneous users of ebooks

    The SKOLKOVO Foundation has developed amendments to the Civil Code, among which are rules that libraries will not be able to provide access to the same electronic copy of a publication to several users.

    In March, the State Duma is scheduled to make amendments to determine the nature of free use of educational and scientific works electronically stored in libraries. The text of the proposed amendments is:

    “allow libraries to provide remote access to electronic copies of books, provided that the user will not be able to copy the materials, as well as if the purpose is not to make a profit (currently the reader can access the electronic version of the book only in the library or archive);
    allow people to read scientific and educational materials in electronic form, of any year of publication (currently this opportunity applies only to works that have not been reprinted in Russia for more than ten years).

    Maxim Proksh, Chairman of the Intellectual Property Group, said that this would be a right, not an obligation of libraries, and also clarified that they would not be able to provide access to the same copy of an electronic work to several users at once: if a single copy is stored in the library, only one person can view it at a time, if 50 copies — then 50 users.

    “We are talking mostly about literature, because access to knowledge is the goal of the bill,” said Proksch. “However, sometimes fiction can also have an educational character, for example, for students of Humanities faculties or schoolchildren, but this applies mainly to the classics, which already has the status of the public domain. According to him, the bill applies to those books that are protected by copyright: “we have no goal to bring down the publishing market, we focus solely on making educational and scientific literature available to any resident of the country without the need to make an expensive trip to the library, where the desired copy is located.”

    The project is currently undergoing internal coordination, after which it will be submitted to the Commission of Deputy Prime Minister Maxim Akimov. According to the plan, the document can be adopted in May this year.


    (Above content is translated and paraphrased from RoskovSvoboda.org, which is available under CC4 License)



    China undertakes manual internet censorship by visiting people


    LinkedIn supports China’s censorship regime


    Pyscho bourgeois pigdog dictators of China use information warfare to cover up Uyghur holocaust

    Save the 3 million Uyghur Muslims in Chinese concentration camps!

    China releases app showing locations of nearby people who are in debt




    Gabon, DRC, Zimbabwe shut down internet in response to conflicts





    Conservative legislators try to clean the internet, protect children with internet porn filtering act


  • Earthling 7:07 am on January 6, 2019 Permalink | Reply
    Tags: Big Brother, bourgeois dictators of China, disgusting hypocrisy, scriabin, surveillance and theater, theater, theatre   

    Surveillance, Sincerity and Scriabin 

    People act differently when they know or suspect they are being watched. Surveillance is an affront to liberty even if the data obtained is not looked at or used in any way, because people being watched do not know that the data will not be used against them. How can one behave naturally when one is being spied on and potentially judged by unknown individuals or algorithms?

    Things get really ugly when surveillance is directly used to manipulate and coerce people. In China, surveillance is turning the whole of society into a grotesque theatrical production with the help of the “social credit” system. The human conscience itself is being assaulted in a novel way: people are no longer allowed to base their behavior on their conscience; instead, they must consider what Big Brother and his algorithms want them to do. You might have your organs stolen or be sent to a slave labor camp for your choice of a human conscience over a contrived and automated system designed by and for psychopaths.

    Hence, everyone in such a society becomes a full-time actor. The amount of “private spaces” where technology won’t spy on you is ever decreasing.

    The Russian philosopher Alexander Scriabin once observed that the whole of human civilization was becoming increasingly “theatrical”. He tried to transform this “theatrical production” of a world into something aesthetically perfect like his own music. After all, if we’re all going to act all the time, it may as well be Shakespeare-worthy acting with Beethoven-worthy music, instead of this disgusting hypocrisy that the bourgeois dictators of China are producing (and even exporting to Africa). Let’s hope that if the Big Brothers in the West follow China’s example, they will display more artistic taste.

  • Earthling 9:40 am on December 23, 2018 Permalink | Reply
    Tags: australia bans encryption, chinese spying on autobmobile users, Directive on the Transition of Russian State-Owned Companies to Russian Software, ice violates us constitution, , mass-surveillance in india, ofcom bbc spat, prison corruption exposure in russia, , russia ban on foreign software, russia fines for facebook and twitter, russian central ban block websites, yarovaya package prices   

    December Internet Freedom Update 


    The Central Bank will be empowered to block websites

    The State Duma introduced a bill providing for the possibility of the Central Bank restricting access to internet resources that violate legislation on the financial market

    (Source: https://roskomsvoboda.org/43704/)

    Group Forced to Take Back Prison Corruption Exposure

    The human rights organization “Russia Sitting” (“Русь сидящую”) has been ordered by the governent to refute information published online about prison corruption. This is following a lawsuit by the Sverdlovsk penal colony.

    (Source: https://www.roskomsvoboda.org/43981/)

    The “Yarovaya package” is expected to increase prices on the internet

    Some Internet providers in Moscow are raising prices for their services. In particular, one of the oldest providers in the capital, RiNet, announced that from January 1, 2019, the cost of services will increase by 5%. The company explained this by the fact that in 2018, a number of initiatives requiring “multimillion-dollar costs” came into force: including the law on increasing VAT from 18% to 20%, the “Yarovaya package” (which requires mass storage of data),and amendments to the government resolution on cooperation with bodies engaged in operational investigative activities.

    (Source: https://roskomsvoboda.org/43847/)

    State-owned companies will be forbidden to import software

    First Deputy Prime Minister of Russia Anton Siluanov approved the Directive on the Transition of Russian State-Owned Companies to Russian Software. As reported by Vedomosti with reference to a copy of the document, the enterprises were asked to develop a “clear plan” for such a transition by 2021. These are companies from the No. 91-p list approved by the government back in 2003. It includes Aeroflot, Gazprom, Sheremetyevo, Rosneft, Russian Railways, Channel One, RUSNANO, VTB, etc. Within ten days after receiving the directives, the companies should initiate meetings that include the issue of substituting imported software.

    (Source: https://roskomsvoboda.org/43847/)

    Russia sets fines for Facebook and Twitter

    Roskomnadzor has set a fine for Facebook and Twitter of 5,000 rubles. By January 17, 2019, both companies are required to provide “legally significant” answers about the requirement to localize user databases in Russia, otherwise they will be fined.

    Facebook and Twitter have not yet localized their user databases in Russia and have been notified of the need to comply with the law. Roskomnadzor is waiting for a response by January 17, the Head of the Department Alexander Zharov told reporters. According to him, on December 17 Roskomnadzor sent Facebook and Twitter notifications about the need to comply with the legislation of the Russian Federation in the field of user data.

    (Source: https/roskomsvoboda.org/43902/)

    Russia and UK investigate each other’s media

    (Source: https://www.bbc.co.uk/news/world-europe-46648010)

    Much of above content is translated from RoskomSvoboda



    ICE rises above the Constitution, seizes websites without due process



    India initiates hardcore mass-surveillance



    Australia outlaws encryption, will share the data with US and other former colonies

    Australia’s vague anti-encryption law sets a dangerous new precedent


    Automakers give the Chinese government access to location data of electric cars


  • Earthling 8:17 pm on November 24, 2018 Permalink | Reply
    Tags: austria abolish anonymity online, automated extremism analysis, automated extremism detection, automated extremism searching, carolina altstadter, china exporting big brother tech, china exporting surveillance know-how, china exporting surveillance tech, difficult teens, FOB, heinz-christian strache, , roskomnadzor fines, roskomnadzor fines instead of blocking, surveillance of troubled youths, trouble teens, troubled teenagers   

    November Internet Freedom Update 

    Difficult teenagers in Ural to be entered into a single database for surveillance

    Authorities claim the creation of such a system will reduce the response time to incidents and help to identify at an early stage children who may be affected by terrorist or other radical movements.



    FOB automated extremism-searching system to be launched in Perm

    The main Department of the Ministry of Internal Affairs of the Russian Federation in the Perm Region is seeking to buy hardware and software to automatically search for and analyze extremist materials.



    The head of Roskomnadzor is in favor of fines instead of blocks for banned content

    The head of Russia’s censoring body, Alexander Zharov, has advocated the introduction of fines for online services repeatedly violating Russian censorship laws, instead of the current ineffective system of blocking.



    Moscow to spend 53 million rubles on the analysis of online activity

    This was spotted on the public procurement portal by RosKomSvoboda. The Government of Moscow plans to purchase a new data analysis system, called STATS.

    Notable aims of the system include:
    • ensuring the possibility of identifying a unique internet visitor in the absence of cookies in the browser of the Internet visitor;
    • segmentation and clustering of internet visitors with the ability to identify target groups;
    • search for implicit target groups by building links between internet visitors with similar behavior;
    • providing information about the behavior of internet users to personalize the content blocks of internet resources.



    The Internet in Ingushetia was turned off during protests at the request of security forces

    This follows from the response of Roskomnadzor to complaints from residents of the republic. The supervisory authority does not intend to fine mobile operators for violating the rights of citizens.

    The days when Ingushetia was left without mobile internet coincided with mass protests in the republic in the first half of October. Local residents opposed the unfair, in their view, agreement on the establishment of the border between Ingushetia and Chechnya.

    At the end of October of this year, more than 30 residents of the republic complained to Roskomnadzor about the blocking of mobile internet by telecom operators during rallies in the capital of the republic, Magas. At that time, according to Daurbekov, more than 400 such complaints had already accumulated.

    As local residents tell us, in Ingushetia, 3G and 4G are disconnected every time a rally or public action is scheduled. And this has been happening for at least 10 years.

    “This is about the protection of the constitutional order. Statements were recorded that can be qualified as calls for mass riots,” said a source in the security forces.



    Austrian government wants to abolish online anonymity

    Austrian authorities believe that forcing users to use real names in cyberspace will solve the problem of online verbal abuse.

    The Austrian government held a narrow meeting with Chancellor Sebastian Kurz, Vice-Chancellor Heinz-Christian Strache and heads of several ministries on the protection of public figures and ordinary citizens from anonymous threats and abuse on the web.

    As a result, Kurz and Strache announced the need to ban the “niqab on the net” and to oblige the platform to register users only with real names. They stressed that this is not about monitoring or restriction of freedom, but about the possibility for authorities to identify of violators of order.

    In addition, the Secretary of State Carolina Altstadter is working on the introduction of more stringent penalties for harassment on the internet.

    The authorities understand that this intention is difficult to implement. “I ask for your understanding, we are at the very beginning,” Kurz said.

    This proposal from the authorities has already caused controversy in Austrian society, as many think that anonymity is not the main reason for cheeky behavior on the web.

    (Translated from https://roskomsvoboda.org/43000/)


    China is exporting its surveillance techniques and technology, notably to Africa, Venezuela, and Singapore


    Venezuela: https://www.reuters.com/investigates/special-report/venezuela-zte/

    Singapore: https://www.fastcompany.com/90269129/singapore-wants-to-add-face-recognition-surveillance-to-110000-lamp-posts

    Ongoing Genocide in China Uses the Latest Tech

    “Compulsory government apps have been installed on phones to monitor conversations, group gatherings, religious or anti-Chinese downloads. At ubiquitous checkpoints, anxious police officers scan phones for anomalies. A switched-off phone is suspect, as is a device restored to factory settings. An analogue phone – or no phone at all – is equally suspicious.”; “Mosques across the province are being reduced to rubble. The places of worship have given way to parks, factories, apartments and entertainment centers.”; “Normal now are families too terrified to speak of their loved ones and the horrific realization that vast numbers of Uighurs have indeed disappeared. Tens of thousands of now-empty homes have been sealed and alarmed to prevent reentry. A government official sent to help with the harvest in the south reported villages denuded of workers and orphanages being built to house children left behind.”

    “There is recognition technology, with databases covering the face, voice, fingerprints and DNA of every Chinese citizen. Then positional monitoring, including mobile devices, which even now can report on the location of 1.4 billion citizens (the trick will be to use AI to make that information recoverable in real time), backed up by other public systems, such as linking up more than 170 million cameras (said to rise to 400 million by 2020).

    Next is lifestyle monitoring. Databases concerning the individual, be they health or education records, details of purchases made or internet activity, will be monitored. This is where we find data from the social credit system, which is like a financial credit rating but far broader. Anyone deemed anti-social (or anti-Communist party) will find themselves blocked from buying air or train tickets, getting a mortgage or even graduating.

    Finally, there is the ‘grid system’ information, which divides cities into small parcels overseen by citizens who are paid to report unusual activity to the police. The East Germans had a Stasi: in the 21st century, China enlists far more people. In Chaoyang district in Beijing, for instance, there are around 120,000 paid informants in operation. The information they provide is sifted through using computer power and artificial intelligence.”



    48 Ways to Get Sent to a Chinese Concentration Camp


  • Earthling 7:07 am on November 22, 2018 Permalink | Reply
    Tags: adblocker, facebook, how to avoid haram things on the internet, how to avoid un-christian things on the internet, how to avoid un-kosher things on the internet, how to avoid ungodly things on the internet, internet and purity, javascript, mps-youtube, noscript, puritanical internet usage, puritanism, purity, purity on the internet, scriptsafe, twitter, youtube   

    How to Use the Internet Puritanically 

    The following advice is useful not only for Puritanical Christians, Jews, and Muslims, but also for anyone who does not want random corporate garbage and smut invading their mind.

    1. Use an adblocker. Ads are designed to manipulate you, so whatever they want you to do, don’t do it. Ads want you to view them, so block them. Ads want you to buy something or use a service, so boycott anything you see an ad for.

    2. Browse with Javascript disabled by default. This can be done with the NoScript or ScriptSafe plugins. This prevents various kinds of unsavory content from running in your browser, giving you more freedom to choose what is displayed.

    3. Use an image blocker plugin, which allows you to block all images on a site. This will protect your eyes from ungodly sights on sites where you really only want to read the text. (uBlock Origin includes this feature).

    4. Use a firewall or family internet filter to block nasty sites by category (porn, gambling, etc.).

    5. Use safesearch. Avoid all image searches.

    6. Don’t browse carelessly or randomly; think about what it is that you specifically want to do and do that.

    7. Avoid sites with massive amounts of user-uploaded content such as Youtube, Facebook, Twitter, etc., if you do not want to see random content that may taint your purity.

    8. Use non-graphic interfaces when possible. For example, by using mps-youtube you avoid all the unsavory thumbnails on Youtube.

    9. Consider using a text-only browser such as Lynx.

    By Henry L. MacGregor

  • Earthling 2:55 am on November 16, 2018 Permalink | Reply
    Tags: abuse of environment, cyberbullying, digital justice, digital justice and ecocide, ecocide, environmental hacktivism, FOSS and ecocide, Free and Open-Source Software and Ecocide, , internet freedom and ecocide, , privacy and ecocide, web freedom and ecocide   

    Digital Justice and Ecocide 

    Internet Freedom and Ecocide

    The free exchange of information is essential for the propagation of scientific information about the environment, journalism about ecocidal behavior and policies, and also to organize activities and protests in support of Mother Earth.

    Privacy and Ecocide

    Privacy is essential for freedom of speech. The absence of privacy makes it easy for authorities to punish journalism, activism and the propagation of scientific information about the environment (as can be seen in China).

    Free and Open-Source Software and Ecocide

    Commercial software is more susceptible to being manipulated and abused by ecocidal governments and corporations. Closed-source software cannot be freely evaluated by users for security and privacy, so consumers can’t know for sure what the software is actually doing. Free and open source software is also more efficient in terms of human and hardware resources. Open source projects can borrow from each other easily, whereas Apple, Google and Microsoft cannot.

    Cyberbullying/Hacking and Ecocide

    Cyberbullying and hacking are illegal in many places. Such behaviors can be harmful to environmental causes when the victims are environmental activists or journalists, or they could hypothetically be productive if used against ecocidal forces like illegally polluting companies. Here is a book covering the subject of environmentalist hacktivism.


    By Henry L. MacGregor

  • Earthling 7:37 am on November 11, 2018 Permalink | Reply
    Tags: abuse, corrupt governments, cybersecurity, firewall, founding fathers, , gafam, , healthy living, , , linux, malware, , private life, qubes, security, spyware, , tor, trojan, tyranny, US constitution, virus, vpn, windows 10   

    How to use the internet securely and privately 

    On the internet, security is a prerequisite for privacy.

    A life with privacy is the normal, natural, healthy way of living. Perhaps this is why the Founding Fathers of America put protection of privacy in the constitution. With the advent of the internet and the large-scale usage of electronics that can spy on us, forces of evil such as governments and corporations want to deprive people of this natural human right in order to more effectively control and exploit us.

    There is a trade-off between security and convenience: the more secure and private your life is, the less convenient it will be and the more time it will take to do things. Nevertheless, those who love Liberty should take the trouble to implement at least some of the following measures:

    • Use a secure operating system if possible (Qubes, Linux, etc.). Especially avoid Windows 10, which is designed to spy on you and send your data to Microsoft even if you tell it not to. In case you can’t avoid using Windows 10, harden it for maximum security, and do what you can to circumvent the telemetry.

    • Encrypt your hard drives.

    • Go through all your phone’s settings and make sure nothing is accessing or transferring data you don’t want it to.

    • For maximum mobile security, do not root your phone; for maximum privacy, do root your phone and install a custom ROM with microG instead of Google apps and services. Google does not respect your privacy.

    • On Android, use Privacy Guard and an isolating app such as Shelter to minimize the amount of data apps can access.

    • Use encrypted communication when possible.

    • Use privacy-respecting services to communicate (Messengers: Telegram, Signal; Email: Protonmail, Tutanota)

    • Use a secure browser with plugins such as NoScript, Scriptsafe, uBlock Origin, AdBlock Plus, etc. that block ads, trackers, and unnecessary scripts. Chrome is secure but does not respect your privacy; use Firefox.

    • Use a VPN for secure browsing (ProtonVPN is free), or Tor for anonymity. Tor is anonymous but not secure, so don’t enter any personal information when using it.

    • Don’t use public wifi connections. If you do, use a VPN.

    • Browse securely, being vigilant. Browse in private mode. Have your browser delete your history when closing. Use secure connections (https). If you get a warning that a site has a bad or out of date certificate, close your browser and don’t visit the site. Javascript can do all kinds of things on your computer, so when you open a webpage with Javascript you should think of it as running a program on your computer: do you trust this program, do you trust its source, do you know what it does?

    • Use a firewall on your computer and phone to control which applications use the internet.

    • Use a firewall on your router to filter out bad content as it’s coming in.

    • Use a family internet filter on your computer to block malicious sites (porn, gambling).

    • Keep everything updated regularly.

    • Don’t click on links in emails. If you must open any, copy and paste the link into the browser and verify that it is a safe site.

    • Don’t download email or messenger attachments unless necessary. Open documents in Google Drive, Yandex Drive or a similar service in your browser.

    • Use virtual machines to browse the internet and open attachments, so when you get a virus it won’t infect your whole system.

    • Use Whonix or Tails OS to browse the internet anonymously. These operating systems use Tor, so don’t enter any personal information.

    • Don’t illegally download things. If you do, find things from reliable sources that have been downloaded many times and have positive feedback.

    • Use an antivirus on Windows or OS X, but don’t rely on it.

    • Beware of any links or documents coming from anyone, because even if you trust someone 100%, their device could be hacked, virus-ridden, or someone could be impersonating them.

    • Don’t let anyone use your devices, because they might be less security-aware than you. Lock the screen when you leave the computer. Use a good password. Set a BIOS password for your computer. Factory reset your devices before traveling or visiting police, if you don’t want them to look at or copy all your data.

    • For true online anonymity, use Tails OS on a disposable device at a cafe somewhere far from where you usually go, then break and throw out the device afterwards.

    • Avoid doing terrorism or other illegal activities, or associating with people doing them, because this may give governments a legitimate reason to invade your privacy, and they have extensive resources at their disposal.

    Be diligent about what you share online, and know that whatever you share with one person might be seen by many if they disclose your content or their privacy is invaded. Don’t share personal information with random people or websites. Use a separate email account for signing up for random websites.

    • Don’t use the same password everywhere. Use strong passwords.

    • Check if your personal information has been compromised in any data breaches using Have I Been Pwned.

    • There is deanonymization technology that can identify you solely based on your online behavior and browsing patterns. To avoid this, don’t use consistent patterns: develop several styles of typing and moving your cursor, don’t visit the same sites all the time (and especially not in the same order or from the same IP or VPN), don’t use the same software and hardware all the time to do the same things.


    Google, Facebook, Microsoft, Apple, Amazon, and other big names are notorious for spying on people and sending their information to the US government. Avoid services of these companies if you want privacy. Since many can’t avoid using these services, make sure to go to the settings and configure them to minimize the spying.

    Assume that a company may not value your privacy at all, unless you personally know its CEO and can vouch for their decency. Also assume that your data is not safe with any company, since there are data breaches even in big companies with the financial resources to implement extensive security.


    There are obvious signs of malware infection, such as your device being slow, behaving erratically, showing ads, installing things you never told it to, using lots of bandwidth, and so on. Your antivirus may indicate if you have malware. On the other hand, a well-done hack or subtle kind of malware will not be easy to detect. Many forms of malware require expertise to detect, so in order to be sure your device is clean you need to have an expert examine it, or study cybersecurity yourself. The terms to search are “deep packet inspection” and “intrusion detection”.


    If someone has invaded your privacy, often it will be impossible to identify them, or they will be “legally untouchable” corporations or government agencies. In case there is the possibility of justice, you should sue them and could receive a good compensation.

    If your device has been infected or hacked, disconnect it from the internet. Reinstall the operating system. Don’t download the installation media from a compromised machine. Be aware that any files copied, backed up or uploaded from the compromised device may contain hidden malware. Other devices of yours may also be infected, such as computers, phones, printers or routers (with the IoT the list is growing), as well as other people’s devices that came into contact with yours physically or online.


    Most devices do not have hardware switches to turn the camera and microphone off, so you can’t be sure they aren’t spying on you. When purchasing devices keep things like this in mind. For certain privacy, stay away from all electronics with the capacity to record and transfer data.

    Further information on surveillance: https://ssd.eff.org/en#index

    Article by Anonymous Man

  • Earthling 4:28 am on October 25, 2018 Permalink | Reply
    Tags: 112.rdpress.ru, alexander beglov, anti-piracy laws in russia, censorship of pornography, , copyright law in russia, Council of the Regional Anti-Terrorist Structure of the Shanghai Cooperation Organization, dangerous information, denouncing extremism in russia, extermination of the uighur people, facebook twitter censorship, free phone from russian government, funding non-profits, google censorship in china, great firewall, great firewall of china, kazakh genocide, russian government support for npos, sco surveillance cooperation, surveillance cooperation, uighur genocide, uyghur genocide, war on piracy in russia   

    October Internet Freedom Update 

    Russian ministries ramp up “War on Piracy”

    The Ministry of Culture is developing a package of amendments that will force search engines to remove links to pirated content, without trial, as well as significantly expanding the powers of the censoring body Roskomnadzor. The new legislation will oblige all search engines operating in Russia to remove links to pirate sites out of court at the request of copyright holders. It is possible that search engines may have to show sites with legal content in priority, and they may be fined for refusing to remove links to sites with pirated content.

    The authorities believe that the simplification of website blocking is necessary, since the mechanism of judicial blocking, which has been in force for more than five years, does not adequately protect the interests of right holders.

    It is worth noting that the law prohibiting search engines from issuing links to prohibited sites has already been adopted and even entered into force at the end of September 2018. However, the copyright lobby apparently does not gain enough power from this. Otherwise it is difficult to explain the desire to create such a pile of laws, essentially duplicating each other.

    (Translated from https://roskomsvoboda.org/42433/)


    St. Petersburg to fund non-profits censoring dangerous information

    The Governor of St. Petersburg Alexander Beglov approved a bill giving financial support to non-profit organizations (NPOs) that are struggling with potentially dangerous information on the internet.

    In July this year, the St. Petersburg parliamentarian offered to support NPOs “”protecting children from dangerous information on the Internet.” The Deputy has prepared a bill providing subsidies for such organizations. According to Mr. Teterenko, organizations that oppose online dissemination of information harmful to health and development of children must be maintained.

    He said that today the world-wide web is full of dangers for teens: groups for the search term “biker”, the promotion of marginal subcultures, “death cults”, and gambling. In addition, young people due to their inexperience can be too frank in online communication, which is why they risk running into blackmailers, the Deputy notes.

    He cites data from the Kaspersky Security Network, according to which, even the inclusion of the “parental control” function often does not prevent teenagers from visiting undesirable resources related to alcohol, tobacco and drugs, using obscene vocabulary and even publishing pornographic content.

    At the same time, according to the Deputy, there are organizations in the city that are engaged in educational work, and directly confront communities and users that disseminate unwanted information.

    (Translated from https://roskomsvoboda.org/42416/)


    Dagestan authorities are handing out smartphones for online denunciations

    In Dagestan, local authorities decided to encourage denunciations of online “extremists” by announcing an action, according to which the residents of Dagestan who report the highest number of extremist posts on social networks will receive a smartphone. The first place will get an Apple iPhone SE 32 Gb; the second place, a Xiaomi Redmi 5 32 Gb; and the third place, a Xiaomi Redmi 4A. This was announced in a statement on the Dagestan government counter-extremism website “Hotline”, 112.rdpress.ru. It is on this website that the government receives reports of online extremism from residents.

    Informants can share links to posts that violate the legislation of the Russian Federation, which incite hatred on religious or national grounds, and experts will process the requests and transfer them to the law enforcement agencies.

    (Translated from https://roskomsvoboda.org/42271/)


    Coordinated surveillance in the East

    The Council of the Regional Anti-Terrorist Structure of the Shanghai Cooperation Organization (SCO) agreed on joint online monitoring of terrorist threats.

    The SCO agreed on Thursday in the capital of Kyrgyzstan on monitoring threats of a terrorist nature on the internet, said the Kyrgyzstan anti-terrorism leader Asylbek Kozhabekov. “Special attention is paid to the challenges and threats posed by persons traveling to regions with increased terrorist activity, as well as those returning to the territory of the SCO member states,” he said.

    The meeting was attended by delegations of the special services of India, Kazakhstan, China, Kyrgyzstan, Pakistan, Russia, Tajikistan and Uzbekistan.

    (Translated from https://roskomsvoboda.org/42475/)


    Facebook and Twitter continue to take sides

    Facebook’s Purge Of Political Pages Fuels Delusion Of Insurgent Threats To Democracy

    Twitter Announcement: RT and Sputnik Advertising


    Google surrenders to the Communists

    Google Is Handing the Future of the Internet to China


    The good side of China’s Great Firewall

    AI system recognizes porn through voice recognition

    China detains 1,834 suspects in online porn crackdown


    China weaponizes the internet for genocidal purposes

    “The authorities employ high-tech mass surveillance systems that make use of QR codes, biometrics, artificial intelligence, phone spyware, and big data.”



  • Earthling 1:40 am on September 11, 2018 Permalink | Reply
    Tags: absurdism in russian politics, buccal epithelium, crimea, critical information infrastructure attacks in russia, dangerous reposts on vk, database of internet extremists, demons, elina mamedova, , how to bypass internet censorship in uzbekistan, , internet censorship in uzbekistan, , internet freedom in uzbekistan, National Coordination Center for Computer Incidents, reposts on vkontakte, risk of reposting, , , terrorists using telegram in uzbekistan, theater of absurdity, uzbekistan censorship, uzbekistan vpn, vkontakte repost, vpn in uzbekistan, yalta   

    September Internet Freedom Update 

    Russian government establishes center for combating cyberattacks

    By the order of the head of the FSB, the National Coordination Center for Computer Incidents (NCCCI) as been established. This center will coordinate defenses from cyberattacks of critical information infrastructure.

    (Translated from https://roskomsvoboda.org/41584/)

    Woman accused of internet extremism is asked for DNA and voice samples

    The defense of the 27-year-old Crimean woman Elina Mamedova assumes that these requests are used by the authorities to form a certain database of “extremists”.

    The Investigative Committee demanded from a resident of Yalta, 27-year-old Elina Mamedova, accused of extremism for her posts on the internet, that she provide samples of saliva, voice and buccal epithelium (DNA collected via a cotton swab in the cheek). This was reported by her lawyer, Alexei Ladin of the human rights group Agora, who suggested that these samples are needed to form a “database of extremists”.

    Ladin also said:

    Obviously, the evidentiary value of samples of voice, saliva and DNA borders on absurdity. …The defense is convinced that the criminal prosecution of Elina Mamedova is unconstitutional, in connection with which she has refused to provide samples, in order to minimize her participation in the theater of absurdity.”

    Mamedov is accused of inciting hatred or enmity on the basis of nationality (Part 1, Article 282 of the Criminal Code). The criminal case was opened on the basis of reposts on VKontakte, which she shared back in 2014 and 2015.

    (Translated from https://roskomsvoboda.org/41549)

    In Uzbekistan, officialized internet censorship is responded to with instructions to circumvent it

    The Uzbek authorities have officially approved the rules for blocking websites, although this country has long restricted access to internet resources that provide alternative information about events in the country.

    Against the backdrop of the adoption of these rules, and also in reaction to some Facebook malfunctions which were mistaken for blocks, popular web publications began to publish instructions on circumvention of blocks, and the usage of VPNs in particular. Examples have been given for VPN installation and relevant browser extensions and phone applications.

    The difficulties in accessing Facebook were encountered by users of several countries in early September. The failure partially touched the US, as well as Europe and Asia. These problems were explained as technical problems. Later it was reported that access to the service in Uzbekistan was still absent, although Facebook could be accessed via VPN.

    Meanwhile, in Uzbekistan, resources that provide alternative information about events in the country have long been blocked. Access to the Fergana website was blocked after the 2005 Andijon events . However, the authorities officially denied blocking the website. Popular instant messengers as Skype, Telegram, Viber and WhatsApp have also been blocked. Online communications, according to some Central Asian governments, are the main tool of terrorists.

    (Translated from https://roskomsvoboda.org)

  • Earthling 1:48 pm on August 4, 2018 Permalink | Reply
    Tags: Acer in Russia, Dmitry Kravchenko, Federal Antimonopoly Service, FSA, GAFAM in Russia, Google in Russia, Google vs Russia, monopolies in Russia, preinstalled apps, preinstalled software, removing preinstalled apps in Russia, , Russian smartphone manufacturers, , Russian software competition, Russoft, Trojans from FSB, Valentina Makarova, Yandex vs Google   

    Russia: Smartphones & computers await mandatory Russian software 

    predustan_rf-softaThis initiative was made by the FAS (Federal Antimonopoly Service), which by April 2019 plans to legally require mobile phone and computer manufacturers to preinstall domestic equivalents of foreign applications and software.
    The new legislation obliging manufacturers of smartphones and computers to preinstall domestic analogues of foreign software should be prepared by April 2019, as revealed by the final version of the roadmap to develop competition for 2018-2020, created by the Federal Antimonopoly Service (FAS) of Russia.

    Manufacturers will also have to provide users with the ability to completely remove preinstalled programs and applications, except for service ones. This will empower consumers to select their own software, according to the FAS. The main executor of the preparation of the federal law should be the Ministry of Finance, and the co-executors — FAS and Rospotrebnadzor.

    The antimonopoly service specified that the document has already been sent to the government. The project was previously presented in early April. The agency noted that it receives “complaints from citizens about service applications on smartphones and tablets that are installed automatically and cannot be removed.” Among these apps are, according to FAS, the browser, mail app, audio player, and others.

    According to the president of the association Russoft, Valentina Makarova, it is obvious that FAS is trying to help Russian developers through non-tariff regulation measures.
    “It is clear that Google has a stable set of application vendors, the ranks of which are difficult to penetrate, regardless of the quality of the product, and the market is of little help, yet the state can help. But on a global scale, such measures do not lead to the development of competition,” she said.

    At the same time, new requirements for equipment will lead to new costs for companies, an expert warns. Preinstalling paid products that duplicate functionalities is likely to increase the final cost of computers and smartphones, warns the CEO of Acer in Russia, Dmitry Kravchenko.

    The web reacted to this initiative quite predictably:

    “According to FAS, Russian software can be implemented only by force, and not because it is good and competitive.” (Turban Bazarov on Twitter)

    “Yeah, the Amigo browser, Yandex bar, Satellite search engine, etc. After buying a phone you can safely reflash.” (Artem on Twitter)

    “Trojans from the FSB. Let’s call things what they are.” (Meduza on Twitter)

    The most notable case in this realm was the conflict between FAS and Google, in which the Service in October 2015 asked Google to stop violations of the law on competition in terms of abuse of the dominant position of the Android operating system. In particular, the corporation was required to exclude from agreements with vendors the conditions limiting the installation of applications and services from other developers. Google also had to inform device users about deactivating preinstalled applications, changing the search engine in the Chrome browser, the ability to install a different search widget, and applications similar to those included in the Google Mobile Services package. The case against Google was initiated at the request of Yandex.
    Translated from https://roskomsvoboda.org/40674/

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc