Snowden Reveals How He Secretly Exposed NSA Criminal Wrongdoing Without Getting Arrested – Democracy Now!

This is a rush transcript. Copy may not be in its final form.

AMY GOODMAN: This is Democracy Now! Im Amy Goodman, as we continue Part 2 of our conversation with NSA whistleblower Edward Snowden, who has just published his memoir. Its called Permanent Record. Democracy Now!'s Juan Gonzlez and I spoke to him from his home in Moscow last week, where he's lived in exile since 2013. Ed Snowden talked about how he worked at the NSAs Office of Information Sharing an office of one: him.

EDWARD SNOWDEN: What does the Office of Information Sharing do? Well, besides me being way better at that job than the NSA ever thought that I would be, much to their dismay, think about the director of an agency, right? Think about the head of a unit. Think about someone whos supposed to know all the secrets to everything. Theyre not technologists, and these are very technical systems. When they say, I need to know whats going on with this, or, Show me this program, somebody has to get that, right? They dont know how to get it themselves. And that means somebody has all the access as these directors have all of these other things. These people are called systems administrators.

And so, I was sitting, for the first time in my career, really, with absolute awareness, not of the little picture, but the big picture, how all the pieces fit together. And I created a system called the HEARTBEAT. This is a new technological platform, that you can think of it like a news aggregator, the landing page, you know, on Google News, that pulls from all of these different newspapers and says, Heres whats interesting for you, based on who you are, whatever. And it would go, This person works in this office; they should see these kind of programs. And I created a kind of crude proof of concept system to do this.

But a byproduct of this meant that I now was sitting on top of a mountain of secrets. And it turned out that a lot of those secrets were criminal. So now I had to find a way to collect the evidence of wrongdoing, get it out of one of the most highly secured buildings on the planet it was a World War II-era airplane factory that was buried under a pineapple field, that was later converted into a spy base in Hawaii and somehow get it to journalists without getting caught.

JUAN GONZLEZ: And, Ed?

EDWARD SNOWDEN: And this is really where we get into the climax of the book.

JUAN GONZLEZ: Ed, at this point, you also discuss that you had first considered going to WikiLeaks but then changed your mind because of some changes in WikiLeaks policy that also you felt you could not in good conscience participate in. If you could talk about that, as well?

EDWARD SNOWDEN: Right. So, a lot of people misread this and think of it as me sort of denouncing WikiLeaks. And its not. I think some of the reporting that WikiLeaks has done is tremendously important, both for the historic record and also for contemporary politics basically every story theyve run in the last many years. And, of course, this when were talking about is in 2013, its long before the 2016 election has been covered by newspapers around the world.

But what had happened in the wake of the 2009 Manning disclosures this is where WikiLeaks published the Collateral Murder video of U.S. helicopter pilots killing not just a journalist, but also the first responders that came to their aid, and the classified histories of the wars in Iraq and Afghanistan and the State Departments diplomatic cables, that in some ways are argued to have sort of helped spark or at least catalyze the Arab Spring movement. What had happened is, in the early parts of WikiLeaks reporting, they worked in concert with newspapers, with sort of The New York Times, The Washington Post, The Guardian, Der Spiegel major newspapers. But at some point, one of the journalists that they had worked with wrote a memoir, or some kind of book, where they published the password that Julian Assange had given them to the entire archive of data, that only journalists were supposed to have, not the public, because the journalists were supposed to go through this process of deciding what in this archive of material does the public need to know and what is a legitimate secret, that maybe theres no benefit for publishing.

Once this journalist published this, WikiLeaks went well, all of the bad guys in the world, basically, have access to this material, because the archive, encrypted archive, was available to anyone. Its just you needed the password to unlock it. Now this bonehead journalist had published it and basically unlocked Pandoras box. WikiLeaks was in a tough place there. And they basically revised their editorial policy to go, You know what? Were going to publish everything pristine and unredacted, so that everyone is on a common footing, whether youre a good guy or bad guy. At least we all have access to the same information.

Its not my place to agree or disagree with that, say its right or wrong. But what I did want to do was try a different model, go, What happens? Is there a difference? Because Chelsea Manning, of course, was accused of all the same things that I was said, you know, This persons a traitor, said, This person endangered the troops which has never borne out, by the way. Were now more than 10 years on from those activities, and the government, even at Chelsea Mannings trial, after theyve convicted her, the government was invited by the judge to show evidence of harm, and they couldnt show anyone was harmed as a result of the disclosures.

But could these accusations of government be mitigated by the process of whistleblowing? Could we simply be more discriminating? Could we be overly cautious? Could we accommodate, to the maximum extent, what the government thought would be an appropriate process, while still empowering journalists? And this was the model that I set out to try and prove. Can we have myself, any whistleblower right? gather evidence of wrongdoing and trust that to the press under the condition that the journalists agree they will publish no story simply because its newsworthy, simply because its interesting, but only publish stories they are willing to make an institutional judgment are in the public interest to know, and then, as an extraordinary check beyond that, go to the government in advance of publication, warn the government, We are about to publish this story, and give the government and adversarial opportunity to argue against this, say, This will cause harm. Someone will get hurt. Redact this detail? And in all cases Im aware of, that process was followed.

And this is why, in 2019, I think its so obvious that no harm to national security has resulted from this process of disclosure. And yet, the same criticisms, the same allegations are made to me as have been every other whistleblower. And what we need to understand here is not my model of publication is right and WikiLeaks model is wrong, but rather to see you have two very different levels of caution right? of risk mitigation in these publication models. And yet, despite years and years of investigation by the most powerful government in history, in neither case has the government ever established or even offered evidence of harm as a result of this disclosure.

And so, this is the fundamental point that I just want to summarize for people. Whenever the government faces a whistleblower that is revealing some kind of wrongdoing that makes them uncomfortable, that implicates them in some kind of activity they should not be doing, they are going to try and change the conversation from the concrete harms of their actions, of their policies in government, and instead try to have a discussion about the theoretical risks of journalism in a free and open society. And, of course, there are risks to having a free press, but we embrace those risks, because those are the things that guarantee we are truly free.

JUAN GONZLEZ: Your decisions to eventually provide the information to Glenn Greenwald and Laura Poitras, and how those meetings initially went?

EDWARD SNOWDEN: Yeah, so, I have to work with journalists to get them interested in meeting with someone who they dont even know their name right? because if I give the journalists my name and they mishandle it, because the government is spying on everyone I know how the mass surveillance system works the government will have me in jail before anybody knows anything. So I have to go through this elaborate process of trying to reach out to journalists, convince them to use encrypted communications, while protecting myself from mass surveillance, driving around Hawaii with a specialized system, thats basically a GPS magnet that I can attach to the roof of my car, run through the window by wire to a laptop, which has an enormously powerful antenna connected to it, and then basically create a map, using that antenna, of everywhere there are different wireless access points that are either open and unlocked or vulnerable to being unlocked by me, that I can use for this covert communications in a way that wont lead back to me. And then I have to convince them, you know, I know something serious that you need to know about, the public needs to know about. But I cant tell you what it is yet until you do this, then get them online, then begin showing them evidence, and then, ultimately, get them to meet. And this was a tremendously stressful period, thats covered in some detail in the book.

But I think it is extraordinary, and I think these journalists should be all applauded for the risks that they took, because its very likely they could have been meeting with somebody who was saying, Oh, you know, Ive got the biggest secret in the world: The aliens have landed, and they work in the State Department. But they came, and they looked at the documents. They took them seriously. They authenticated them. And eventually they won the Pulitzer Prize for Public Service journalism because of that.

AMY GOODMAN: And after you met with them and you shared your stories, and they were writing them as you were meeting together in Hong Kong, describe what it meant to go underground there and then to ultimately, how you made your way, ended up at the Moscow airport and couldnt leave once you got there.

EDWARD SNOWDEN: Oh, yeah, this is a great question. So, I had been looking at this entire reporting system as a crazy system of a series of challenges, that were becoming increasingly difficult. But the end of it, the finish line, was youve delivered the secret to journalists, that the government has violated the rights of Americans and the Constitution of the United States. They can then publish that information, and that was the end of the process, because I was always planning on getting arrested.

And so, then, when the story comes out and my biggest fear was this was going to be a two-day story that everybody stopped talking about, it just blew over, the government sort of suppressed it it became the biggest story on the planet that year. Suddenly, everybody was interested in me. The government made me public enemy number one. I was the most wanted man in the world. It was a question of: All right, what now? And I didnt really have an idea.

So I talked with journalists or, sorry, I talked with lawyers that were introduced to me by the journalists human rights lawyers and tried to plan my next stage. I talked to the United Nations. And ultimately, the United Nations came back and went this is sort of you know, they wouldnt say this publicly, and I wouldnt encourage them to go on the record about this, but they went, Look, practically, the U.S. has enormous sway in our organization. They pay an enormous amount of our budget. And the U.S. gets what the U.S. wants. We probably cant help you. We will try, but its likely to work out to your disadvantage. And so, if the U.N. cant protect you, who can?

And my lawyer, Robert Tibbo, had this idea that I would go underground with the refugee families that he had been representing, that were themselves trying to seek asylum in Hong Kong. And so, suddenly, Ive gone from staying in a five-star hotel with journalists to staying in an apartment shared by five people, where the kitchen is the bathroom, and the entire thing is smaller than most suburban bathrooms. And Im trying to communicate with journalists. And these people were so brave, I still cant believe Im in disbelief that they just welcomed me in, when my face was on the front page of every newspaper. But they knew what it was like to be hunted by a government for having done the right thing. They were escaping violence and persecution. And they were just trying to make their way through the world. And this is the thing that always strikes me. They had nothing. These were the most vulnerable people on the planet. But its the people who have nothing that care about others the most, because all they have are connections.

And so, Ive been an aggressive advocate since then for trying to get them resettled. We have resettled two of them, a mother and her daughter, in Canada, after years and years of effort. But, unfortunately, the Trudeau government is still digging in their heels and trying to prevent the rest of the families from entering into asylum. In Hong Kong, the number of people who have their asylum claims approved is less than 1%, which is actually some of the those are some of the worst figures in the world for that. And even if they get their asylum claims granted, they are forced to be resettled in third countries rather than in Hong Kong itself.

AMY GOODMAN: NSA whistleblower Edward Snowden. He tells his story in his new book, Permanent Record. Back in 30 seconds with Snowden.

[break]

AMY GOODMAN: El Triste by one of Latin Americas most beloved singers, Jos Jos. Known as The Prince of Song, he passed away in South Florida Saturday at the age of 71.

View original post here:

Snowden Reveals How He Secretly Exposed NSA Criminal Wrongdoing Without Getting Arrested - Democracy Now!

Posted in NSA

Former NSA Inspector: Whistleblower Does Not Need Firsthand Information – WBUR

WithMeghna Chakrabarti

We talk with former NSA inspector Joel Brenner about the whistleblower complaint.

"I think everybody in the intelligence community is extremely nervous. The president's been attacking the community, explicitly," he toldOn Point's Meghna Chakrabarti.

Joel Brenner, former inspector general for theNational Security Agency, and later senior counsel to the NSA.Former head of U.S. counterintelligence under the Director of National Intelligence. Senior research fellow at MIT's Center for International Studies.

On President Trumps demands to unmask the whistleblower

I think everybody in the intelligence community is extremely nervous. The president's been attacking the community, explicitly. And, the president's now attacking the norms by which the Congress and the intelligence community have agreed that there ought to be a way to report wrongdoing. This is dangerous. The president's M.O. is to create as much chaos and confusion on all fronts as he can. That's what he's doing here.

On concerns about Trumps desire to reveal the whistleblower's identity

It has to do with the basic trust that people used to have in American institutions. And, even as that trust diminished significantly during my lifetime, there were still basic norms that people observed; ways that they behaved. This is going to make whistleblowers more reluctant to come forward. I'm talking about whistleblowers who are not merely cranky and complaining about not getting promoted and stuff. We saw plenty of that, too. But, people who really saw something that they thought really looked wrong. [Especially] since the president's now saying such nasty things about this person who everybody else says, in a position to know, is following the rules. I mean, this is so beyond the pale. And, of course, people are extremely nervous about it.

On reporting that correspondence, such as the Ukranian phone call, and other information is being kept on highly secret servers at the advice of White House lawyers.

Is that outside of standard operating procedure?

Out of the normal operations of the intelligence community, it's just totally I can't say nobody's ever done it, but it is not according to Hoyle. Let me explain, first, what code word means. There are three classifications only, under our law: confidential, secret, top secret. You don't go higher than that. But, then, we have certain horizontal classifications that have to do with things that are put in compartments, or in [the] Defense Department, called Special Access Programs. That's what this is talking about. This server was to hold information that was compartmented or, sapped as they say. This information was clearly not appropriate, to put this information there.

Now, the president does have the power to classify things however he wants. Which means, his behavior and an ordinary IC [intelligence community] person's behavior, are not the same thing. But, I would remind people, that if you do a lawful act for an unlawful purpose, in the course of conspiring to cover up illegal behavior which I think is demonstrated in the transcript itself then that becomes illegal. That's an act in furtherance of conspiracy. And I think that's what was going on here."

On being astonished that White House lawyers would, reportedly, advise trying to hide Trumps behavior

Yes, I am. You know, when things go wrong, you always want to say, Where were the lawyers? And, if this whistleblower complaint pans out in all respects, it appears that the lawyers were actually guiding the cover-up of this information. And, I think if that is true if they've got problems under criminal law, and they're licensed to practice law they're going to be challenged, at some point, as well.

On whether a whistleblower has to have first-hand information in a complaint

No. And why would you want that to be the case? An investigator whether it's an investigative journalist, or a prosecutor, or an inspector general wants leads. You start with leads, you don't start with admissible evidence for in a courtroom which is what firsthand information is, so it's not hearsay. You want to get information that's credible, that will then guide an investigation to produce firsthand information. So, this is a complete red herring. It's not only not the case, but you wouldn't want it to be the case.

New York Times: "White House Knew of Whistle-Blowers Allegations Soon After Trumps Call With Ukraine Leader" "The White House learned that a C.I.A. officer had lodged allegations against President Trumps dealings with Ukraine even as the officers whistle-blower complaint was moving through a process meant to protect him against reprisals, people familiar with the matter said on Thursday.

"The officer first shared information about potential abuse of power and a White House cover-up with the C.I.A.s top lawyer through an anonymous process, some of the people said. The lawyer shared the officers concerns with White House and Justice Department officials, following policy. Around the same time, the officer separately filed the whistle-blower complaint.

"The revelations provide new insight about how the officers allegations moved through the bureaucracy of government. The Trump administrations handling of the accusations is certain to be scrutinized, particularly by lawmakers weighing the impeachment of the president.

"Lawyers for the whistle-blower refused to confirm that he worked for the C.I.A. and said that publishing information about him was dangerous."

USA Today: "A GoFundMe has raised over $70k to cover legal fees for anonymous Ukraine whistleblower" "Lawyers for an anonymous whistleblower who filed a complaint alleging Donald Trump pressured a foreign government to interfere in the U.S. election have launched a fundraiser to cover the whistleblower's legal aid.

"The fundraiser, organized through GoFundMe, has received over $70,000 from more than 2,000 donors as of Thursday afternoon, as House Democrats pursue an impeachment inquiry.

"The nonprofit Whistleblower Aid partnered with the whistleblower's legal counsel to launch the fundraiser, which was posted on Wednesday, according to the GoFundMe page.

"Whistleblower Aid founder and CEO John Tye told USA TODAY that the organization hopes to protect the anonymous whistleblower's rights including being free from retaliation, in addition to educating the public about the importance of whistleblowing."

Stefano Kotsonisproduced this segment for broadcast. Alex Schroeder and Sydney Wertheim adapted it for the web.

Visit link:

Former NSA Inspector: Whistleblower Does Not Need Firsthand Information - WBUR

Posted in NSA

How The NSA And US Cyber Command Hacked ISIS’s Media Operation – NPR

Neil stands in a room with military cyber operators from Joint Task Force ARES to launch an operation that would become one of the largest and longest offensive cyber operations in U.S. military history. Josh Kramer for NPR hide caption

Neil stands in a room with military cyber operators from Joint Task Force ARES to launch an operation that would become one of the largest and longest offensive cyber operations in U.S. military history.

The crowded room was awaiting one word: "Fire."

Everyone was in uniform; there were scheduled briefings, last-minute discussions, final rehearsals. "They wanted to look me in the eye and say, 'Are you sure this is going to work?' " an operator named Neil said. "Every time, I had to say yes, no matter what I thought." He was nervous, but confident. U.S. Cyber Command and the National Security Agency had never worked together on something this big before.

Four teams sat at workstations set up like high school carrels. Sergeants sat before keyboards; intelligence analysts on one side, linguists and support staff on another. Each station was armed with four flat-screen computer monitors on adjustable arms and a pile of target lists and IP addresses and online aliases. They were cyberwarriors, and they all sat in the kind of oversize office chairs Internet gamers settle into before a long night.

"I felt like there were over 80 people in the room, between the teams and then everybody lining the back wall that wanted to watch," Neil recalled. He asked us to use only his first name to protect his identity. "I'm not sure how many people there were on the phones listening in or in chat rooms."

From his vantage point in a small elevated bay at the back of the Operations Floor, Neil had a clear line of sight to all the operators' screens. And what they contained weren't glowing lines of code: Instead, Neil could see login screens the actual login screens of ISIS members half a world away. Each one carefully preselected and put on a target list that, by Operation Day, had become so long it was on a 3-foot-by-7-foot piece of paper hung on the wall.

It looked like a giant bingo card. Each number represented a different member of the ISIS media operation. One number represented an editor, for instance, and all the accounts and IP addresses associated with him. Another might have been the group's graphic designer. As members of the terrorist group slept, a room full of military cyber operators at Fort Meade, Md., near Baltimore were ready to take over the accounts and crash them.

All they were waiting for was Neil, to say that one word: "Fire."

In August 2015, the NSA and U.S. Cyber Command, the military's main cyber arm, were at a crossroads about how to respond to a new terrorist group that had burst on the scene with unrivaled ferocity and violence. The one thing on which everyone seemed to agree is that ISIS had found a way to do something other terrorist organizations had not: It had turned the Web into a weapon. ISIS routinely used encrypted apps, social media and splashy online magazines and videos to spread its message, find recruits and launch attacks.

A response to ISIS required a new kind of warfare, and so the NSA and U.S. Cyber Command created a secret task force, a special mission, and an operation that would become one of the largest and longest offensive cyber operations in U.S. military history. Few details about Joint Task Force ARES and Operation Glowing Symphony have been made public.

"It was a house of cards"

Steve Donald, a captain in the Naval Reserve, specializes in something called cryptologic and cyber operations, and when he is not in uniform, he is launching cybersecurity startups outside Washington, D.C. He's pale, bespectacled and has the slightly shy demeanor of a computer geek. In the spring of 2016 he received a phone call from the leader of his reserve unit. He needed Donald to come in.

"I said, well, I'm not in uniform [and he said] it doesn't matter if you have a badge come on in," Donald said. "I can't believe I can actually say this but they were building a task force to conduct offensive cyber operations against ISIS."

Donald had to find a team of specialists to do something that had never been done before hack into a terrorist organization's media operation and bring it down. Most of the forces flowed in from Joint Forces Headquarters, an Army cyber operation in Georgia. Donald also brought in experts in counterterrorism who understood ISIS and had watched it evolve from a ragtag team of Iraqi Islamists to something bigger. There were operators the people who would be at the keyboards finding key servers in ISIS's network and disabling them and digital forensics specialists who had a deep understanding of computer operating systems.

"They can say this is good, this is bad, this is where the files are located that we're interested in," he said. He found analysts, malware experts, behaviorialists and people who had spent years studying the smallest habits of key ISIS players. The mission, he explained to them, was to support the defeat of ISIS to deny, degrade and disrupt them in cyberspace.

This was more complicated than it sounded.

The battle against the group had been episodic to that point. U.S. Cyber Command had been mounting computer network attacks against the group, but almost as soon as a server would go down, communications hubs would reappear. The ISIS target was always moving and the group had good operational security. Just physically taking down the ISIS servers wasn't going to be enough. There needed to be a psychological component to any operation against the group as well.

"This cyber environment involves people," Neil said. "It involves their habits. The way that they operate; the way that they name their accounts. When they come in during the day, when they leave, what types of apps they have on their phone. Do they click everything that comes into their inbox? Or are they very tight and restrictive in what they use? All those pieces are what we look at, not just the code."

Neil is a Marine reservist in his 30s, and it wouldn't be an exaggeration to say that Operation Glowing Symphony was his idea. "We were down in the basement at the NSA, and we had an epiphany," he said. He had been tracking ISIS's propaganda arm for months painstakingly tracing uploaded videos and magazines back to their source, looking for patterns to reveal how they were distributed or who was uploading them. Then he noticed something that he hadn't seen before: ISIS was using just 10 core accounts and servers to manage the distribution of its content across the world.

The mission led by a special unit working with U.S. Cyber Command and the NSA was to get inside the ISIS network and disrupt the terrorist organization's media operation. Josh Kramer for NPR hide caption

The mission led by a special unit working with U.S. Cyber Command and the NSA was to get inside the ISIS network and disrupt the terrorist organization's media operation.

"Every account, every IP, every domain, every financial account, every email account ... everything," Neil said. The group's network administrators weren't as careful as they should have been. They took a shortcut and kept going back to the same accounts to manage the whole ISIS media network. They bought things online through those nodes; they uploaded ISIS media; they made financial transactions. They even had file sharing through them. "If we could take those over," Neil said, grinning, "we were going to win everything."

The young Marine ran into his leadership's office at the NSA, grabbed a marker and started drawing crazy circles and lines on a whiteboard. "I was pointing everywhere and saying, 'It's all connected; these are the key points. Let's go," he recalled. "I felt like I was in It's Always Sunny in Philadelphia, when he's doing the mystery investigation for Pepe Silvia. Pictures on the wall and red yarn everywhere and nobody was understanding me."

But as Neil kept explaining and drawing he could see the leaders begin to nod. "I drew this bicycle tire with spokes and all the things that were tied to this one node and then there was another one," he said. "It was a house of cards."

We confirmed this account with three people who were there at the time. And from those scrawls, the mission known as Operation Glowing Symphony began to take shape. The goal was to build a team and an operation that would deny, degrade and disrupt ISIS's media operation.

The cyber equivalent of a surgical strike

The spring and summer of 2016 were spent preparing for attack. And while members of Task Force ARES didn't reveal everything they did to crack into ISIS's network, one thing they used early on was a hacking standby: a phishing email. ISIS members "clicked on something or they did something that then allowed us to gain control and then start to move," said Gen. Edward Cardon, the first commander of Task Force ARES.

Almost every hack starts with hacking a human, cracking a password or finding some low-level unpatched vulnerability in software. "The first thing you do when you get in there is you've got to get some persistence and spread out," Cardon said, adding that the ideal thing is to get an administrator's account. "You can operate freely inside the network because you look like a normal IT person." (ISIS didn't just have IT people; it had an entire IT department.)

Once ARES operators were inside the ISIS network, they began opening back doors and dropping malware on servers while looking for folders that contained things that might be helpful later, like encryption keys or folders with passwords. The deeper ARES got inside ISIS's network, the more it looked like the theory about the 10 nodes was correct.

But there was a problem. Those nodes weren't in Syria and Iraq. They were everywhere on servers around the world, sitting right next to civilian content. And that complicated things. "On every server there might be things from other commercial entities," said Air Force Gen. Tim Haugh, the first deputy commander of JTF ARES working under Cardon. "We were only going to touch that little sliver of the adversary space and not perturb anyone else."

If ISIS had stored something in the cloud or on a server sitting in, say, France, ARES had to show Defense Department officials and members of Congress that U.S. cyber operators had the skill to do the cyber equivalent of a surgical strike: attack the ISIS material on a server without taking down the civilian material sitting right next to it.

They spent months launching small missions that showed they could attack ISIS content on a server that also contained something vital like hospital records. Being able to do that meant they could target ISIS material outside Syria and Iraq. "And I looked at this young Marine and said, 'How big can we go?' and he said, 'Sir, we can do global.' I said, 'That's it write it down, we're going to take it to Gen. Cardon.' "

That Marine was Neil. He began peppering the leadership with ideas. He talked to them about not just hacking one person ... or ISIS in Syria and Iraq, but how to take down the media operation's entire global network. "That's how these attacks work," Neil said. "They start very simple and they become more complex."

There was something else about Task Force ARES that was different: Young operators like Neil were briefing generals directly. "A lot of [ideas] come up that way, like somebody says, 'Well, we could gain access and do this to the files.' Really? You can do that? 'Oh yeah.' Would anyone notice? 'Well, maybe, but the chances are low.' It's like, hmmm, that's interesting, put that on the list."

Cardon said young operators on Joint Task Force ARES understood hacking in a visceral way and, in many respects, understood what was possible in cyberspace better than commanding officers did, so having a direct line to the people making the decisions was key.

"An incredible rush"

By the fall of 2016 there was a team, Joint Task Force ARES; there was a plan called Operation Glowing Symphony, and there were briefings that had gone right up to the president. It was only then that there was finally a go. This account of the first night of Operation Glowing Symphony is based on interviews with half a dozen people directly involved.

After months of looking at static webpages and picking their way through ISIS's networks, the task force starting logging in as the enemy. They deleted files. Changed passwords. "Click there," a digital forensic expert would say. "We're in," the operator would respond.

There were some unintentionally comical moments. Six minutes in there was very little happening, Neil recalls. "The Internet was a little slow," he said without irony. "And then you know minute seven, eight, nine, 10, it started to flow in, and my heart started beating again."

They began moving through the ISIS networks they had mapped for months. Participants describe it like watching a raid team clearing a house, except it was all online. Logging into accounts they had followed. Using passwords they discovered. Then, just as their move through targets started to accelerate, a roadblock: a security question. A standard, "what was your high school mascot"-type security question.

The question: "What is the name of your pet?"

The room quieted down.

"And we're stuck dead in our tracks," Neil said. "We all look to each other and we're like, what can we do? There's no way we're going to get in. This is going to stop the 20 or 30 targets after this."

Then an analyst stood up in the back of the room.

"Sir, 1-2-5-7," he said.

"We're like, what?" Neil says.

"Sir, 1-2-5-7."

"How do you know that? [And he said] 'I've been looking at this guy for a year. He does it for everything.' And we're like, all right ... your favorite pet. 1-2-5-7.

"And boom, we're in."

After that, the momentum started to build. One team would take screenshots to gather intelligence for later; another would lock ISIS videographers out of their own accounts.

"Reset Successful" one screen would say.

"Folder directory deleted," said another.

The screens they were seeing on the Ops floor on the NSA campus were the same ones someone in Syria might have been looking at in real time, until someone in Syria hit refresh. Once he did that, he would see: 404 error: Destination unreadable.

"Target 5 is done," someone would yell.

Someone else would walk across the room and cross the number off the big target sheet on the wall. "We're crossing names off the list. We're crossing accounts off the list. We're crossing IPs off the list," said Neil. And every time a number went down they would yell one word: "Jackpot!"

"We'd draw the line out and I had stacks of paper coming up on the corner of my desk," Neil said. "I knew in about the first 15 minutes that we were on pace to accomplish exactly what we need to accomplish."

Once they had taken control of the 10 nodes, and had locked key people out of their accounts, ARES operators just kept chewing their way through the target list. "We spent the next five or six hours just shooting fish in a barrel," Neil said. "We'd been waiting a long time to do that and we had seen a lot of bad things happen and we were happy to see them go away."

And there was something else that Neil said was hard to describe. "When you reach through the computer and on the other side is a terrorist organization, and you're that close, and you're touching something that's theirs, that they possess, that they put a lot of time and effort in to to hurt you, that is an incredible rush," he said. "You have the control to take that away."

Enough to drive you nuts

Brig. Gen. Jennifer Buckner was one of the people who took the reins of Task Force ARES after Glowing Symphony had started. And after that first night, the mission shifted into a second phase, one aimed at keeping pressure on ISIS with essentially five lines of effort: Keep the media operation under pressure, make it difficult for ISIS to operate on the Web more generally, use cyber to help forces on the ground fighting ISIS, hobble its ability to raise money, and work with other agencies in the U.S. and allies abroad.

The second phase of Operation Glowing Symphony focused on sowing confusion within ISIS. Joint Task Force ARES operators worked to make the attack look like frustrating, daily-life IT problems: dead batteries, slow downloads, forgotten passwords. Josh Kramer for NPR hide caption

The second phase of Operation Glowing Symphony focused on sowing confusion within ISIS. Joint Task Force ARES operators worked to make the attack look like frustrating, daily-life IT problems: dead batteries, slow downloads, forgotten passwords.

Once the distribution hubs were hamstrung, the second phase of the mission was more creative. Joint Task Force ARES operators started making all those things that drive you crazy about today's technology slow downloads, dropped connections, access denied, program glitches and made it start happening to ISIS fighters. "Some of these are not sophisticated effects, but they don't need to be," Buckner said. "The idea that yesterday I could get into my Instagram account and today I can't is confusing."

And potentially enraging. When you can't get into an email account, what do you do? You think: Maybe I mistyped the login or password. So you put it in again and it still doesn't work. Then you type it in more deliberately. And every time you type it, press enter, and are denied, you get a little more frustrated. If you're at work, you call the IT department, you explain the issue and then they ask you if you're sure you typed your login and password in correctly. It is enough to drive you nuts. It might never occur to you, or to ISIS, that this might be part of a cyberattack.

That's what the follow-on phases of Operation Glowing Symphony were about. Psy-ops with a high-tech twist. A member of ISIS would stay up all night editing a film and ask a fellow ISIS member to upload it. Operators with JTF ARES would make it so it didn't quite land at its destination. The ISIS member who stayed up all night starts asking the other ISIS member why he didn't do what he'd asked. He gets angry. And so on.

"We had to understand, how did all of that work?" Buckner said. "And so, what is the best way to cause confusion online?"

The ideas that flowed up from operators like Neil were endless. Let's drain their cellphone batteries; or insert photographs into videos that weren't supposed to be there. Task Force ARES would watch, react and adjust its plans. It would change passwords, or buy domain names, delete content, all in a way that made it (mostly) look like it was just run-of-the mill IT problems.

"Pinwheels of death; the network's working really slow," Cardon couldn't help smiling as he went through the list. "People get frustrated."

According to three people who were privy to after-action reports, ISIS's media operation was a shadow of its former self six months after Neil said "Fire" to start Operation Glowing Symphony. Most of the media operations servers were down and the group had not been able to reconstitute them.

There were lots of reasons for that, not the least of which is that getting a new server in the middle of a war zone deep inside Syria isn't easy to do. ISIS had plenty of cash but few credit cards, bank accounts or reputable emails that would allow it to order new servers from outside the country. Buying new domain names, which are used to identify IP addresses, is also complicated.

ISIS's popular online magazine, Dabiq, started missing deadlines and eventually folded. The group's foreign-language websites in everything from Bengali to Urdu also never came back up. The mobile app for Amaq Agency, the group's official news service, vanished.

"Within the first 60 minutes of go, I knew we were having success," Gen. Paul Nakasone, director of the NSA, told NPR in an interview. "We would see the targets start to come down. It's hard to describe but you can just sense it from being in the atmosphere, that the operators, they know they're doing really well. They're not saying that, but you're there and you know it."

Nakasone was there because he was the head of Joint Task Force ARES when Operation Glowing Symphony actually launched. Nakasone said that before ARES the fight against ISIS in cyberspace was episodic. JTF ARES ensures it is continuous. "We were going to make sure that anytime ISIS was going to raise money or communicate with their followers, we were going to be there."

Some critics have said that the mere fact that ISIS is still on the Web means Operation Glowing Symphony didn't work. Nakasone, naturally, sees it differently. He says ISIS has had to change the way it operates. It isn't as strong in cyberspace as it was. It is still there, yes, but not in the same way.

"We were seeing an adversary that was able to leverage cyber to raise a tremendous amount of money to proselytize," he said. "We were seeing a series of videos and posts and media products that were high-end. We haven't seen that recently. ... As ISIS shows their head or shows that ability to act, we're going to be right there."

Three years after Neil said "Fire," ARES is still in ISIS networks. Gen. Matthew Glavy is now the commander of Joint Task Force ARES. He says his operators still have a thumb on ISIS's media operations; the group is still having a lot of trouble operating freely on the Web. But it is hard to be sure why that is. While ARES has been hacking into ISIS in cyberspace, forces on the ground have driven the group out of most of Syria and Iraq.

ISIS itself has spread out. It now has fighters in Libya and Mali and even the Philippines. Glavy says his operators are still there. "We cannot have for them to gain the momentum that we saw in the past," he told me. "We have to learn that lesson."

"The whole point of the doomsday machine"

For most of the Obama administration, officials refused to talk about cyberattacks. Now the U.S. has not only confirmed the existence of cyberweapons but is starting to tell journalists, like those at NPR, about how they wield them. Cyberattacks, once taboo to even discuss, are becoming more normalized. In its military authorization bill last year, Congress cleared the way for the defense secretary to authorize some cyberattacks without going to the White House.

But there is a dark side to this new arsenal. The U.S. isn't the only country that has turned to cyber. Consider the case of Washington Post journalist Jamal Khashoggi, who was murdered in a Saudi embassy late last year; cybertools are thought to have been part of that case too. "A lot of the preparation for that and the lead-up to it had to do with Saudi Arabia using offensive weapons," said Ron Deibert, the director of the Citizen Lab at the University of Toronto's Munk School of Global Affairs.

Deibert's researchers found offensive cybertools tracking the journalist and his inner circle. "When we talk about offensive cyber operations, I think it's important to understand that it doesn't always come in one flavor," Deibert said, adding that the Khashoggi case is far from the exception. In Mexico alone, Citizen Lab found 27 cases of this kind of offensive cybertool targeting political rivals, reporters and civil rights lawyers. Six years ago, it rather famously discovered that China had been hacking into the Dalai Lama's computer networks.

Deibert is worried about escalation. "You really create conditions for an escalation of an arms race in cyberspace that really could come back to haunt the United States in the long run," Deibert said. "There's a demonstration effect. The equipment, the software, the methods, the capabilities proliferate." Deibert says U.S. reluctance to use offensive cyber has vanished. "Now ... what we're talking about is something that is more active," he said.

Nakasone made clear things had changed when he talked to NPR a few months ago at the NSA campus at Fort Meade. He uses terms like "persistent engagement" and "defend forward." He says that they are "part of the DOD cyber strategy that talks about acting outside our borders to ensure that we maintain contact with our adversaries in cyberspace."

In other words, you don't wait to be attacked in cyberspace. You do things that would allow you to hack back if there is an attack in the future. That could be deploying a small team in another country that asks for help or "hunting on our networks to look for malware, or it could be as we did in Operation Glowing Symphony, the idea of being able to impact infrastructure worldwide," he said.

All this is important now because you can draw a straight line from Joint Task Force ARES to a new unit from the NSA and U.S. Cyber Command: something called the Russia Small Group. Just as Joint Task Force ARES focused on ISIS, the Russia Small Group is organized in much the same way around Russian cyberattacks.

The mission against ISIS in cyberspace continues, though there is a dark side to fighting with this new arsenal: The U.S. isn't the only country using these kinds of weapons, and experts worry about proliferation. Josh Kramer for NPR hide caption

The mission against ISIS in cyberspace continues, though there is a dark side to fighting with this new arsenal: The U.S. isn't the only country using these kinds of weapons, and experts worry about proliferation.

In June, the New York Times reported that the U.S. had cracked into Russia's electrical power grid and planted malware there. Nakasone wouldn't confirm the Times story, but it isn't hard to see how planting malware in anticipation of needing it later would fit into the Russia Small Group's operations if it is modeled on ARES.

Nakasone said the first thing he did when he became NSA director in 2018 was to review what the Russians had done in the runup to the U.S. presidential election, so U.S. Cyber Command could learn from it and reverse-engineer it to see how it works. "It provided us with a very, very good road map of what they might do in the future," Nakasone said. He said Cyber Command was poised to act if the Russians attempt to hack the 2020 elections. "We will impose costs," he said, "on adversaries that attempt to impact our elections. I think it's important for the American public to understand that as with any domain air, land, sea, or space cyberspace is the same way; our nation has a force."

So why is Nakasone talking about this now?

Deibert thinks this is part of a deterrent justification. "You can't have cyber operations meaningfully deter your adversaries unless they know that you have these capabilities," he said. "But what's not probably being discussed or appreciated is the extent to which there is a systemic effect of the use of these operations. Other countries take notice."

At the end of Stanley Kubrick's film Dr. Strangelove there is an iconic scene in which the doomsday bomb is seen as the ultimate deterrent, but it only works as a deterrent if people know it exists. If you don't tell anyone about it, what good is it? "The whole point of the doomsday machine is lost if you keep it a secret," Peter Sellers concludes in the movie.

You could say the same thing about American offensive cyber operations. They have been so stealthy for so long, maybe people don't realize we have them.

We hear all about Russia's influence campaigns and Chinese intellectual property thefts and Iranian hackers trolling American infrastructure, but we rarely hear in any detailed way about the American response. Nakasone appears to be starting to address that.

The irony is that offensive cyber's richest target is us. "The United States is the country most highly dependent on these technologies," Deibert said. "And arguably the most vulnerable to these sorts of attacks. I think there should be far more attention devoted to thinking about proper systems of security, to defense."

That would mean trying to find a way to harden soft targets across the country, getting private companies to beef up their cybersecurity, getting the U.S. government to mandate standards. Offensive cyber, at this point anyway, may seem easier.

NPR's Adelina Lancianese contributed to this story.

See the original post here:

How The NSA And US Cyber Command Hacked ISIS's Media Operation - NPR

Posted in NSA

The FISA Oversight Hearing Confirmed That Things Need to Change – EFF

Section 215, the controversial law at the heart of the NSAs massive telephone records surveillance program, is set to expire in December. Last week the House Committee on the Judiciary held an oversight hearing to investigate how the NSA, FBI, and the rest of the intelligence community are using and interpreting 215 and other expiring national security authorities.

Congress last looked at these laws in 2015 when it passed the USA FREEDOM Act, which sought to end bulk surveillance and to bring much-needed transparency to intelligence agency activities. However, NSA itself has revealed that it has been unable to stay within the limits USA FREEDOM put on Section 215s Call Detail Records (CDR) authority. In response to these revelations, weve been calling for an end to the Call Details Records program, as well as additional transparency into the governments use of Section 215. If last weeks hearing made anything clear, its this: there is no good reason for Congress to renew the CDR authority.

Chairman Nadler began the hearing by asking Susan Morgan of the NSA if she could point to any specific instance where the CDR program helped to avert any kind of an attack on American soil. Morgan pushed back on the question, telling Chairman Nadler that the value of an intelligence program should not be measured on whether or not it stopped a terrorist attack, and that as an intelligence professional, she wants to make sure the NSA has every tool in the tool box available.

However, the NSA previously reported it had deleted all the information it received from the 215 program since 2015. Morgan confirmed that part of the reason the NSA chose to mass delete all the records was because not all the information was accurate or allowed under the law.

In other words, the NSA wants Congress to renew its authority to run a program that violates privacy protections and collects inaccurate information without providing any way to measure if the program was at all useful. The agencys best argument for why it wants to renew the legal authorization to use the CDR provision is because it might be useful one day.

Rep. Steve Cohen asked the panel if they could reassure his liberal friends that there have been meaningful reforms to the program. The witnesses cited some of the reforms from USA FREEDOM, passed in 2015, as evidence of post-Snowden reforms and safeguards.

However, their answer did not meaningfully address recent incidents where the NSA discovered that it had improperly collected information. Documents obtained by the ACLU include an assessment by the NSA itself that the overcollection had a significant impact on civil liberties and privacy, which is putting it mildly.

Fortunately, the committee did not appear to be convinced by this line of reasoning. As Rep. Sylvia Garcia told Morgan, If I have a broken hammer in my toolbox, I dont need to keep it.

We agree. No surveillance authority should exist purely because it might someday come in handy, particularly one that has already been used for illegal mass surveillance.

In addition to the CDR program, Section 215 also allows the government to collect business records or other tangible things related to a specific order. Despite the innocuous name, the business records provision allows intelligence agencies to collect a vast range of documents. But we dont have a sense of just what kinds of sensitive information are collected, and on what scale.

Rep. Pramila Japayal pressed the witnesses on whether Section 215 allows the collection of sensitive information such as medical records, drivers license photographs, or tax records. Reading from the current law, Brad Wiegmann, Deputy Assistant Attorney General, responded that while the statute does contemplate getting these records, it also recognizes the sensitive nature of those records and requires the requests to be elevated for senior review.

In other words, the DOJ, FBI and NSA confirmed that under the right circumstances, they believe that the current authority in Section 215 allows the government to collect sensitive records on a showing that they are relevant to a national security investigation. Plus, as more and more of our home devices collect information on our daily lives, all the witnesses said they could easily envision circumstances where they would want footage from Amazons Ring, which EFF has already argued is a privacy nightmare.

In addition, Rep. Hank Johnson and Rep. Andy Biggs pressed the witnesses on whether the government collects geolocation information under Section 215, and if there has been guidance on the impact of the Supreme Courts landmark Carpenter decision on these activities. Wiegmann acknowledged that while there may be some Fourth Amendment issues, the committee would need to have a classified session to fully answer that question.

Additionally, when asked about information sharing with other federal agencies, none of the witnesses were able to deny that information collected under Section 215 could be used for immigration enforcement purposes.

Both of these revelations are concerning. Carpenter brought on a sea change in privacy law and it should be highly concerning to the public and to overseers in Congress that the intelligence community does not appear to be seriously consider its effect on national security surveillance.

As it considers whether or not to renew any of the authorities in Section 215, Congress must also considering what meaningful privacy and civil liberties safeguards to include. Relying on the NSA to delete millions of inaccurate records collected over many years is simply insufficient.

In 2015, in the wake of Edward Snowdens revelations about the NSA mass spying on Americans, Congress passed USA FREEDOM to modify and reform the existing statute. One of the provisions of that bill specifically requires government officials to conduct a declassification review of each decision, order, or opinion issued by the FISC that includes a significant construction or interpretation of any provision of law.

Both the text of the bill and statements from members of Congress who authored and supported it make clear that the law places new, affirmative obligations on the government to go back, review decades of secret orders and opinions, and make the significant ones public.

However, the DOJ has argued in litigation with EFF that this language is not retroactive and therefore only requires the government to declassify significant opinions issued after June 2015.

It also remains unclear how the government determines which opinions are significant or novel enough to be published, as well as how many opinions remain completely secret.

Allowing the Foreign Intelligence Surveillance Court (FISC) to interpret the impact of that decision on Section 215 programs in secret means that the public wont know if their civil liberties are being violated.

Releasing all significant FISC opinions, starting from 1978, will not only comply with what Congress required under USA FREEDOM in 2015, it will also help us better understand exactly what the FISC has secretly decided about our civil liberties. Adding a new provision that requires the FISC to detail to Congress how it determines which opinions are significant and how many opinions remain entirely secret would provide additional and clearly needed transparency to the process of administering secret law.

Despite repeated requests from the members of the panel to describe some way of measuring how effective these surveillance laws are, none of the witnesses could provide a framework. Congress must be able to determine whether any of the programs have real value and if the agencies are respecting the foundational rights to privacy and civil liberties that protect Americans from government overreach.

Back in March, EFF, along with the ACLU, New America's Open Technology Institute, EPIC and others, sent a letter to the U.S. House Committee on the Judiciary, detailing what additional measures are needed to protect individuals rights from abuses under the Patriot Act and other surveillance authorities. Hearing members of the Intelligence Community speak before the Judiciary Committee reconfirmed just how essential it is that these new protections and reforms be enacted.

We look forward to working with the US House Committee on the Judiciary to end the authority for the Call Details Records program once and for all and to ensure that there are real transparency mechanisms in the law to protect civil liberties.

Visit link:

The FISA Oversight Hearing Confirmed That Things Need to Change - EFF

Posted in NSA

Snowden’s Former NSA Boss, Steven Bay, Headlines IEEE Computer Society’s Cybersecurity Awareness Campaign with Talk on "Edward Snowden: The…

IEEE Computer Society's cybersecurity awareness activities include the following:

Webinar: October 23 at 11:00am PDTEdward Snowden: The Ultimate Insider Threat - Steven Bay, Security On-Demand"Strict data control systems could have stopped Snowden," explains Bay. "My missing employee, Edward Snowden, revealed himself to be the person behind the Top Secret NSA leaks that rocked the country in the proceeding days." In this presentation you will hear the inside story of the Snowden affair from his former boss and the lessons we learn from it. You will develop a better understanding of who insiders are, why they do what they do, and strategies you can deploy to better protect yourself from them. Secure your spot today.

Podcasts: Software Engineering Radio (SE Radio): The Podcast for Professional Software Developers

October 8:Securing Your APINeil Madden, author of theAPI Security in Actionbook and Security Director of ForgeRock, discusses the key technical features of securing an API.

October 22: Zero-Trust NetworksEvan Gilman and Doug Barth, authors of Zero-Trust Networks: building secure systems in untrusted networks discuss zero-trust networks.

"Our October Cybersecurity campaign is an extension of our long-standing dedication to the promotion and education of cybersecurity awareness and proactive efforts" said Melissa Russell, IEEE Computer Society's Executive Director. "Our related publications such as IEEESecurity and Privacy, as well as our technical conferences that include IEEE Symposium on Security and Privacy, and International Symposium on Hardware Oriented Security and Trust (HOST), are integral parts of the Computer Society's continuing commitment to sharing important security research and developments to our members and the computing community."

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online.

Register for the webinar, sign up for tips, and access all cybersecurity awareness information at IEEE Computer Society's Cybersecurity Awareness Campaign.

About IEEE Computer Society

The IEEE Computer Society is the world's home for computer science, engineering, and technology.A global leader in providing access to computer science research, analysis, and information, the IEEE Computer Society offers a comprehensive array of unmatched products, services, and opportunities for individuals at all stages of their professional career. Known as the premier organization that empowers the people who drive technology, its unparalleled resources include membership, international conferences, peer-reviewed publications,a unique digital library, standards, and training programs. Visitwww.computer.orgfor more information.

SOURCE IEEE Computer Society

http://www.computer.org

More here:

Snowden's Former NSA Boss, Steven Bay, Headlines IEEE Computer Society's Cybersecurity Awareness Campaign with Talk on "Edward Snowden: The...

Posted in NSA

Edward Snowden Weighs the Option of asylum in Germany – Modern Tokyo Times

Edward Snowden Weighs the Option of asylum in Germany

Horace C. White

Modern Tokyo Times

American whistleblower Edward Snowden has once again declared his interest to accept a political asylum offer from the German authorities. He, however, warned that if he mysteriously passes away, his death is nowhere a case of suicide. In an exclusive interview, the former US National Security Agency (NSA) contractor, nevertheless, doubted the possibility of Germany granting him such an offer, noting that the United States would perceive it as a breach of bilateral ties. Speaking with Germanys Die Welt newspaper, Snowden, 36, raked the German and French authorities for their seemingly lackadaisical disposition toward his ordeal.

Snowden sheds more light

Apparently disappointed at the turnout of his whistleblowing saga, the computer guru reinstated that the information he revealed didnt jeopardize peoples lives, wondering why he was subjected to such cruel treatment. Before now, the controversial whistleblower had unsuccessfully sought asylum in a number of countries, including Germany. Ever since Snowden leaked some documents belonging to the NSA, he has been in political exile in Russia.

The former NSA contractor also granted another exclusive interview to The Guardian to commemorate the publication of his memoir, Permanent Record. Speaking to The Guardian, Snowden argued that the world had become better today thanks to his revelations. He stated that his disclosure would have had disastrous consequences, if he had not had the guts to spill the beans, adding that the world has become safer and freer, as a result of his whistleblowing debut.

Background Information

Snowdens travails are no longer new to most ardent followers of cybersecurity news. For the benefit of those who dont know one of the worlds most popular whistleblower, Snowden is an American computer security consultant who came to the media spotlight in 2013 when he divulged highly classified information belonging to the American secret agency, NSA. Much as the whistleblower said that he did it for the right reason, the NSA declared him an enemy of the state for exposing its top-secret documents.

More Details

Ever since he divulged the information, Snowden has become one of the most wanted people in the United States. Hence, Snowden faces jail time in the U.S. because the Department of Justice (DoJ) has already slammed two count charges on him for violating the Espionage Act of 1917. The computer nerd, who would rarely discuss his private life, in 2017 got married to Lindsay Mills, a lady he describes as the love of my life. The wedding, which took place in Moscow, was top-secret. The NSA hired Snowden given that he had stints at the CIA. However, he would abandon his job at the NSA to fly to Hong Kong, where he divulged the content of important documents.

Content of the classified files

The content of the confidential documents described how the U.S. government is increasingly expanding its information-gathering capabilities around the world. During the interview, Snowden told The Guardian that the U.S. authorities are secretly collaborating with tech giants in order to build a robust database that will maintain the dossier on every human being living on planet Earth in likeness to Chinas SkyNet system.

Modern Tokyo News is part of the Modern Tokyo Times group

DONATIONS to SUPPORT MODERN TOKYO TIMES please pay PayPal and DONATE to sawakoart@gmail.com

http://moderntokyotimes.com Modern Tokyo Times International News and Japan News

https://www.pinterest.co.uk/moderntokyotimes/ Modern Tokyo Times is now on PINTEREST

http://sawakoart.com Sawako Utsumi personal website and Modern Tokyo Times artist

https://moderntokyonews.com Modern Tokyo News Tokyo News and International News

PLEASE JOIN ON TWITTER

https://twitter.com/MTT_News Modern Tokyo Times

PLEASE JOIN ON FACEBOOK

https://www.facebook.com/moderntokyotimes

Please follow and like us:

Here is the original post:

Edward Snowden Weighs the Option of asylum in Germany - Modern Tokyo Times

Posted in NSA

A Scientific Explainer of What Terrence Howard Was Talking About at the Emmys – VICE

In a year of big statements on the Emmys red carpet, from Viola Davis sneakers-and-gown combo to impassioned speeches on transgender rights and equal pay, one managed to stand out at last week's awards show: Empire star Terrence Howards deep dive into geometry, ancient philosophy, and quantum physics.

"Ive made some discoveries in my own personal life with the science that, yknow, Pythagoras was searching for, he told a very confused interviewer. I was able to open up the flower of life properly and find the real wave conjugations weve been looking for for 10,000 years.

It could have ended there, but then, Howard got down to the science:

All energy in the universe is expressed in motion, all motion is expressed in waves, all waves are curves, so where does the straight lines come from to make the Platonic solids? There are no straight lines. So when I took the flower of life and opened it properly, I found whole new wave conjugations that expose the in-between spaces. Its the thing that holds us all together.

Howard's mind-boggling answer to a casual interview question about quitting acting after Empire ends was notable enough that the clip went viral on Twitter last week.

Theres a lot to unpack here, but most surprising of all is that it's partly based on real science. When it comes to straight lines, hes not wrong.

There are no straight lines, actually

Its true that there are no straight lines in the physical world that we see and experience around us, but this has very little to do with wave-curvature or Howards (false) claim that all energy is expressed in motion. Instead, its a quirk of maths and logic due to how we define "straight" and how we define "line."

Strictly speaking, any line (straight or curved) has a thickness of zerothats just what we mean in mathematical terms when we refer to a line. If a "straight" line with a finite length has any thickness at all, it is actually an extremely thin rectangle, not a line.

It should be obvious then that no true lines exist physically; even the thinnest line we can draw has a width greater than zero. Straight lines are an idealised mathematical concept, and so arguably don't "exist."

So we can prove Howards claim without even touching on whether real-world objects with straight lines exist. As it turns out, hes onto something here, too.

Take any physical object with lines that look perfectly straight. The closer we look, the more we see imperfections or inconsistencies in materials which reveal that there are tiny deviations from perfect straightness.

Even light doesnt really travel in straight lines. At the smallest physical scale, quantum physics jumps into action, which means things get really weird. At the quantum level, theres more to light than meets the eye, since it is made up of light particles (photons) which sometimes behave like one continuous wave, and sometimes like individual particles.

If we couldnt break down light into photons, then it could be said to move in perfectly straight lines. But photons have the strange property of not having trajectories we can calculate; they simply show up at an end point when we go to measure them.

All energy is motion, and all motion is a wave

At this point, it might be wise for Howard not to pursue a potential post- Empire career as a science professor.

Motion is one type of energy (called kinetic energy), but its certainly not the only fundamental type of energy. All forms of energy can be classed into one of two overall types: kinetic (motion) or potential, which is the energy stored when forces act on an object which would cause motion in the right conditions, like stored electrical energy.

Within the two broad types of energy, other forms include electrical energy, thermal energy, radiation, nuclear energy, and others.

Its also not true that all motion is a wave. In fact, I suspect Howard meant to put this entire statement in reverse: "All motion is energy, and all energy is a wave." This is closer to the truth, but still misses the mark.

Due to quantum physics, everything behaves in weird, form-changing ways when you get down to an infinitesimally small level. Stationary particles with mass convert some of their mass into energy in order to have motion (energy-mass equivalence) and energetic particles behave like waves with frequency, and vice versa (wave-particle duality).

Quantum physics reveals that properties of particles (mass, energy, motion, momentum, location, etc.) are interchangeable with properties of waves (frequency, wavelength), but it doesnt tell us that everything is made up of curved waves. In fact, quantum physics prevents us from making definitive statements like this.

What are Platonic solids and the flower of life?

Howard probably didnt come up with these theories himself. Hes clearly into "sacred geometry," a new-age spiritual practice that runs with the ideas of ancient philosophers and mathematicians like Plato, Euclid and Pythagoras.

Platonic solids are a set of five 3D shapes where all the faces are uniformly shaped and sized, all edges and angles are regular, and each corner of the object has the same number of faces meeting at that point. Examples of Platonic solids are cubes and tetrahedrons.

Sacred geometry assigns new meaning to geometrical objects like these and more complex shapes like the "flower of life,"a geometric pattern which contains all five Platonic solids within itusing them to connect with different energies.

Today this idea seems like pseudo-science at best, but long after Plato and his contemporaries came and went, "real scientists continued to obsess over how to relate geometry to the physical or natural world.

Take the important 17th century physicist Johannes Kepler, who tried (and failed) to use Platonic solids to model the solar system. Even though he abandoned the geometrical side of his work, his original theories eventually gave rise to revolutionary theories of planetary orbits, which are still used to describe movement of planets today.

So, in some respects Howard is actually in good company. But I still wouldnt recommend following his lead and using outdated ideas about obscure shapes to guide your important life decisions.

The rest is here:

A Scientific Explainer of What Terrence Howard Was Talking About at the Emmys - VICE

Precision physics with ‘tabletop’ experiments – Stanford University News

The history of particle accelerators is one of seemingly constant one-upmanship. Ever since the 1920s, the machines which spur charged particles to near light speeds before crashing them together have grown ever larger, more complex and more powerful.

Consider: When the 2-mile-long linear accelerator at SLAC National Accelerator Laboratory opened for business in 1966, it could boost electrons to energies of about 19 gigaelectronvolts. The Large Hadron Collider (LHC) at CERN, which finished construction in 2008, can boost protons to more than 700 times higher energy levels and resides in a massive elliptical tunnel wide enough to encircle a small town. Future supercolliders being planned by CERN, China and Japan promise to be even more immense and energetic (and also more expensive).

The strategy has paid off handsomely with discoveries that have helped confirm the soundness of the Standard Model, our current best understanding of how natures fundamental forces and subatomic matter interact.

As successful as particle accelerators have been, however, Stanford theorists Savas Dimopoulos and Peter Graham are betting that scientific treasures await discovery in the other direction as well. For years, the pair have argued that smaller and less expensive, but more sensitive, instruments could help answer stubborn mysteries in physics that have resisted the efforts of even the largest atom smashers questions like What is dark matter? and Do extra spatial dimensions exist?

Peter and I and our group have been thinking about this for 15 years, said Dimopoulos, who is the Hamamoto Family Professor at Stanfords School of Humanities and Sciences. We were sort of lonely but very happy because we were exploring new territory all the time and it was a lot of fun. We felt like eternal graduate students.

Peter Graham and Savas Dimopoulos are among Stanford physicists working on smaller-scale devices to answer large questions. (Image credit: L.A. Cicero)

But their ideas have been slowly gaining traction among physicists, and last fall the Gordon and Betty Moore Foundation awarded Stanford and SLAC researchers three grants totaling roughly $15 million to use quantum technologies to explore new fundamental physics. Key to these efforts are the kinds of small-scale, tabletop experiments (so-called because most of them would fit on a lab bench or in a modest-sized room) that Dimopoulos and Graham have long advocated for. Everything is smaller, except for the ideas, Dimopoulos quipped. These types of experiments could help solve some very important problems in physics.

The instruments Dimopoulos and Graham have in mind exploit the weird properties of quantum mechanics such as wave-particle duality and the seemingly telepathic link between entangled particles to detect and measure minute signals and effects that particle accelerators are simply not attuned to.

Tabletop experiments are considered high-risk, high-reward projects because they are generally cheaper to build and operate than colliders, said Asimina Arvanitaki, a theoretical physicist at the Perimeter Institute. If youre pitching a project that costs several billion dollars, you better have a very good reason for its existence and be reasonably sure youre going to succeed, added Arvanitaki, a former Stanford postdoc in Dimopoulos lab. But the cost of tabletop experiments is so low, and the timescales for producing results is so short, that it takes some of that pressure off.

The Moore Foundation grants will fund three projects: Two are experimental and will focus on developing new technologies for detecting dark matter and measuring gravitational waves. But the third, worth about $2.5 million and awarded to Dimopoulos and Graham, will be used to further develop the theoretical underpinnings that will enable future experiments.

Theres been a history of particle accelerators discovering new physics and finding new particles, but its not clear that that can go on forever, so its important to think of other complementary ways to get at these underlying questions about nature, said Ernie Glover, the Moore Foundations science program officer.

Everything is smaller, except for the ideas. These types of experiments could help solve some very important problems in physics.

Savas Dimopoulos

Professor of Physics

Crucially, the experiments Dimopoulos and Graham are proposing rely on relatively mature, high-precision technologies that, for the most part, were developed with other uses in mind and for other fields, such as medicine and applied physics. Thats what got us really excited, Dimopoulos said. We realized there were all these possibilities out there that particle theorists werent really thinking about.

A good example is nuclear magnetic resonance, or NMR, imaging, which forms the basis of magnetic resonance imaging, or MRI, a common medical scanning technique.

A few years ago, Graham and others theorized that a proposed ultralightweight dark matter candidate called an axion could influence the nuclear spin of normal matter. Dark matter is thought to make up the bulk of the matter in the universe, but it has evaded every attempt so far at characterization. Excited, Graham contacted an atomic physicist at the University of California, Berkeley, named Dmitry Budker to discuss designing a dark matter detector based on this effect only to discover that the technology already exists.

He said its going to work because what we were describing was basically NMR, said Graham, a theoretical physicist at the Stanford Institute for Theoretical Physics.

Graham and Budker teamed up with other physicists to design the Cosmic Axion Spin Precession Experiment, or CASPEr, which uses NMR (nuclear magnetic resonance) to detect axion and axion-like particles. These particles are predicted to have such weak interactions and low masses that they would never show up in a collider, which are better equipped to search for massive dark matter candidates such as WIMPs (weakly interacting massive particles).

Former Stanford postdoc Asimina Arvanitaki, now at the Perimeter Institute, has proposed several tabletop experiments to investigate physics beyond the reach of particle colliders. (Image credit: Colin Hunter)

Similarly, another Moore Foundation-funded tabletop experiment called MAGIS-100 relies on atom interferometry technology initially developed in the 1990s as a general-purpose tool for making precise measurements. The project, a collaboration between Stanfords Mark Kasevich and Jason Hogan and researchers at Fermilab and other universities, could potentially detect ripples in spacetime known as gravitational waves around 1 hertz, a frequency range beyond the sensitivity of most existing or even proposed detectors.

Current gravitational wave detectors like LIGO are sensitive to the very final moments of the black hole collisions that generate the spacetime ripples, but MAGIS-100 could provide scientists with a much longer viewing window.

LIGO saw just a fraction of a second of the event, but the black holes were twirling around each other and generating gravitational waves for millions or billions of years before that. Those waves were just in lower frequency bands, Graham said. By looking at other frequencies, we could observe the black holes for longer and perhaps discover new gravitational wave sources.

Dimopoulos and Graham plan to use the Moore Foundation-funding to continue devising new schemes for co-opting technologies like NMR and atom interferometry in the service of fundamental physics research.

Its that connection thats hard, Graham said. The experimental physicists and engineers who develop the technologies arent necessarily thinking about what other deep, fundamental questions could be tested, and the theorists are often unaware that tools for testing their ideas already exist.

But Dimopoulos and Graham are now old hands at making such connections. In principle, you have to know all possible technologies, Graham said. In practice, you just have to know the right ones, but it takes a nontrivial intuition to realize something like Oh, wait a minute, it looks like this technique might actually be able to observe extra dimensions or some other new physics.

In one sense, what Dimopoulos and Graham are advocating for is a return to the way physics was done before colliders came to play such an important role in physics and the division of physicists into primarily theoretical and experimental camps.

Before World War II, physics was just like what were doing right now, Dimopoulos said. Felix Bloch was both a theorist and an experimentalist, and so was Enrico Fermi. Even Einstein did experiments. There wasnt a ready group of experimentalists that you could outsource your ideas to. You had to invent the techniques and look around at emerging technologies.

To read all stories about Stanford science, subscribe to the biweeklyStanford Science Digest.

See the original post:

Precision physics with 'tabletop' experiments - Stanford University News

Andrea Young uncovers the strange physics of 2-D materials – Science News

Speaking with Andrea Young feels likewatching a racehorse holding itself back at the starting gate. We met on thecampus of the University of California, Santa Barbara, where hes a condensedmatter physicist, to chat about his work on 2-D materials. His mind seems to beworking faster than the conversation can flow. My sense is, once the reins areloosened and hes back in the lab hell take off.

Youngs colleagues confirm thats thecase. Hes a whirlwind, says physicist Raymond Ashoori of MIT. When Young wasa postdoc in his lab, Ashoori says, it felt like an idea a minute.

Young, 35, has a way with substances shaved to the thickness of a single atom, such as the sheets of carbon known as graphene. His research has revealed new states of matter, and advanced scientists understanding of the strange physics that arises when materials are sliced thin.

Headlines and summaries of the latest Science News articles, delivered Tuesdays and Thursdays

Things change a lot when you change thenumber of dimensions, Young says.

As a graduate student at ColumbiaUniversity, Young helped create a new type of material that transformed howscientists study graphene. Along with physicists Cory Dean, Philip Kim andcolleagues, Young devised a technique for layering graphene with othermaterials, in particular another compound that forms 2-D sheets called hexagonalboron nitride. The combination makes the sometimes-finicky graphene easier towork with. And the materials electrons can be coaxed to behave in unusual ways,interacting strongly with one another, for example. Reported in Nature Nanotechnology in 2010, the technique was quickly adopted byscientists around the world. Everybody uses it now, Ashoori says.

After his time at Columbia, Young went on to stints at MIT and the Weizmann Institute of Science in Rehovot, Israel, before landing at UC Santa Barbara in 2015. So far, Young has used his layering technique to reveal new quantum phenomena and states of matter with tongue-twisting names like Hofstadters butterfly and fractional Chern insulators. In many of the materials Young studies, electrons exhibit collective behavior, resulting in quasiparticles, excitations in a material that mimic a real subatomic particle. Its a bit like how a crowd of individual people can do the wave by working together.

Keeping up with Youngs rapid progress inthe lab kept his graduate adviser, Kim, busy. Hes extremely brilliant andvery energetic, says Kim, now at Harvard University. Youngs understanding oftheoretical concepts, in combination with experimental know-how, makes himquick to generate and implement new ideas, or follow up on hot research topics.In 2018, he, Dean and colleagues were the first to replicate a blockbusterresult in condensed matter physics: Two sheets of graphene, when layered androtated with respect to one another, become superconducting, allowing electrons to flow without resistance. Youngand colleagues added their own twist, reporting in the March 8 Science that the materialssuperconductivity could be tuned by putting it under pressure.

Youngs swiftness seems to take multipleforms quickness of thought, experimental agility and even fleetness of foot.During a particularly frenzied time, Dean, who has collaborated with Young foryears, was headed to the lab bright and early at around 7 a.m. When Dean lookedup, 100 yards ahead of me was Andrea, rushing even faster to get to the lab.

Youngs fascination with physics came onquickly, too: From my earliest memories, I wanted to be a physicist, and itsnot clear where that idea got nucleated, says Young, who grew up inWashington, D.C.

He doesnt see himself as fast, though. Ratherthan aiming for quick developments, he says that hes motivated by big-picture,long-term questions. His current passion is searching for a proposed new classof quasiparticles, called non-abelian anyons. Thats become the thing that Im obsessed with, he says.

Scientists have discovered a widevariety of quasiparticles, but anyons dont fit into either of the twocategories all other particles do. They arent fermions, familiar particleslike electrons, protons and neutrons; nor are they bosons, which include force-carryingparticles, such as photons, particles of light that transmit electromagneticforces.

Anyons, which appear only in twodimensions, are misfits. And non-abelian anyons are stranger still. Theorysuggests they can be braided with one another by swapping their locations ina material. That braiding could protect fragile quantum information frombecoming corrupt, potentially allowing scientists to create quantum computersthat can perform calculations no standard computer can.

But no one has definitively shown thatnon-abelian anyons exist and have the useful properties necessary for quantumcomputing. A new state of matter called a fractional Chern insulator, which Young and colleagues reported for the firsttime in 2018 in Science, could be alikely hiding place. Young hunter of strange denizens of 2-D matter is inpursuit.

Link:

Andrea Young uncovers the strange physics of 2-D materials - Science News

Princeton announces initiative to propel innovations in quantum science and technology – Quantaneo, the Quantum Computing Source

The new initiative builds on Princetons world-renowned expertise in quantum science, the area of physics that describes behaviors at the scale of atoms and electrons. Quantum technologies have the potential to revolutionize areas ranging from secure data transmission to biomedical research, to the discovery of new materials.

The inaugural director will be Andrew Houck, professor of electrical engineering and a pioneer in quantum computing technologies. The initiative will bring together over 30 faculty members from departments across campus in the sciences and engineering.

This initiative enables the work of our extraordinary quantum faculty and their teams to grow research capabilities and attract talented minds at all levels to Princeton, so that they can discover new materials, design new algorithms, and explore the depths of the underlying science in an exciting environment of discovery and innovation, said Dean for Research Pablo Debenedetti, the Class of 1950 Professor in Engineering and Applied Science and professor of chemical and biological engineering.

The potential benefits to society from quantum information science make this an essential endeavor for Princeton. The initiative will provide tremendous opportunities for Princeton students and postdoctoral researchers to make profound contributions to future technologies, said Deborah Prentice, University provost and the Alexander Stewart 1886 Professor of Psychology and Public Affairs.

The initiative comes at a time of national momentum for quantum sciences at the University, government and industry level. In 2018, the federal government established the National Quantum Initiative to energize research and training in quantum information science and technology. New technologies over the past decade have enabled companies including Google, IBM and others to build research-stage quantum computers.

The Princeton Quantum Initiative will enable new collaborations both across campus and with other universities and industry. Within the University, the initiative will include faculty in the departments of electrical engineering, physics, chemistry, computer science and mechanical and aerospace engineering.

Princeton has world leaders at all layers of this technology, including foundational science, materials synthesis and characterization, quantum device platforms, computer architecture, algorithm design and computational complexity, said Houck. We have an incredible collection of experts in their respective disciplines, and the Princeton Quantum Initiative gives us an entity which brings everyone together to accelerate the pace of discovery.

To support the future of quantum research, the initiative will train a new generation of quantum scientists and engineers through financial support for graduate students and postdoctoral researchers. Annually, Princeton will award two prestigious graduate student fellowships, each providing support for three years, as well as two postdoctoral fellowships for three-year terms, with fellows able to choose projects and faculty mentors.

For undergraduates, the initiative will build on Princetons leadership in the development of courses whose target audience includes those with no prior quantum physics background. The initiative will help coordinate teaching efforts across departments, offer more cohesive and wide-ranging instruction in quantum science and engineering, and provide undergraduates with opportunities to work on faculty-led projects.

The research supported through the initiative will span areas from new materials science for quantum devices to quantum computer architecture, algorithm design and computational complexity.

Quantum science promises to deliver dramatic enhancements in information processing and communications. Computers built on quantum principles can solve problems that are impossible with todays machines, potentially leading to discoveries in fields such as chemistry, materials science, optimization and information security.

Sensors based on quantum approaches can probe materials and biological systems at the nanoscale with unprecedented precision and resolution. Such sensors could detect medical conditions or be used for quality control in manufacturing of sensitive electronic equipment.

Quantum communication systems can provide provably secure communication that cannot be hacked without detection. Quantum encryption could someday replace todays internet security algorithms to ensure privacy of data transmissions.

Princeton has a long history of contributing foundational discoveries in quantum science. Over the decades, Princeton researchers have made major contributions to quantum theory and trained graduate students that have become leading quantum scientists and technologists. More on the research expertise of Princetons quantum scientists and engineers is available online.

Original post:

Princeton announces initiative to propel innovations in quantum science and technology - Quantaneo, the Quantum Computing Source

Is It a Wave or a Particle? It’s Both, Sort Of. – Space.com

Paul M. Sutter is an astrophysicist at The Ohio State University, host of Ask a Spaceman and Space Radio, and author of "Your Place in the Universe." Sutter contributed this article to Space.com's Expert Voices: Op-Ed & Insights.

Is it a wave, or is it a particle? This seems like a very simple question. Waves are very distinct phenomena in our universe, as are particles. And we have different sets of mathematics to describe each of them. So, if we want to go about describing the entire universe, this appears to be a very handy classification scheme except when it isn't. And it isn't in one of the most important aspects of our universe: the subatomic world.

When it comes to things like photons and electrons, the answer to the question "Do they behave like waves or particles?" is yes.

Related: Antimatter Is Both a Particle and a Wave, New Experiment Confirms

At first glance (and even at deeper glances), waves and particles are very different. A particle is, as best as I can put it, a thing. It's a small, single, finite object. You can hold a particle in your hand. You can throw a particle at someone else and watch it bounce off of them. It's localized. You can point to a particle and say, "Look, the particle is right there, exactly where I'm pointing."

Particles have momentum and positions.Particles will move in straight lines until something changes their direction.Particles can bounce off of other particles, and they can change trajectories. Think of bullets or speeding cars. Theyre not literally small, subatomic particles, but they act like particles when they hit other things.. Many physical interactions can be described simply as particles bouncing off of one another.

On the other hand, waves are almost completely different. They're not localized. If you want to indicate where a wave is, you have to move your hands around vaguely gesturing, saying, "It's all over there." You can't hold the wave in your hand. Instead, the wave passes over, around or even through your hand.

This animation shows what happens when two waves (shown in green and blue) interfere.

(Image credit: Wolfgang Christian/Francisco Esquembre/Francisco Esquembre, CC BY-SA 4.0)

Waves are oscillations, meaning they wiggle. They transport energy from one place to another. Waves don't really bounce off of, but instead interfere with, one another. Sometimes, when the waves come together just right, crest meet crests, and you get double waves. This is called "constructive interference." But sometimes, the waves cancel each other out, and you get nothing at all an interaction known as "destructive interference." Waves can turn corners, and when they pass through narrow openings, they can fan out, or diffract. There are many types of waves in our universe, like ocean waves and waves on a Slinky.

Both waves and particles are described by very, very different sets of mathematical equations. So, if you want to describe something scientifically, first you have to decide if it's a wave or a particle; then you can pull out the correct mathematical tools to make predictions about how it will behave and act. And for a couple hundred years, this line of thinking was a fine approach to solving all the physics problems in the world.

The problems with this approach started with light itself. In the early 1800s, the English scientist Thomas Young played some games with light by shining some beams through two narrow openings onto a screen behind them. What he found was a classic interference pattern with stripes of varying intensity on the screen. This is exactly what water waves would do when passing through two narrow channels. Some of the light waves would add together, and some of the waves would cancel out, leaving a striped pattern on the back screen. This is pretty solid evidence that light acts like a wave, because this is exactly what waves do.

This idea was bolstered a few decades later when Scottish physicist James Clerk Maxwell figured out that electricity and magnetism were actually two sides of the same electromagnetic coin and, in the process, realized that light is waves of electricity and magnetism. That gave a conclusive picture as to what's doing the waving when it comes to light: its electricity and magnetism. Light is a wave. Book it, done.

Then, in the late 1800s, German theoretical physicist Max Planck threw a monkey wrench into everything when he studied blackbody radiation. To explain his observations, he proposed that light can be emitted only in discrete little chunks. A few years later, Albert Einstein threw his weight into the matter by studying the photoelectric effect, and proposed that not only is light emitted in little chunks, but light itself is made of little packets of energy called photons. In other words, light was behaving as a particle in these experiments.

So, different kinds of physics experiments were revealing different kinds of properties of light. Sometimes, light acted like a wave, and sometimes, light acted like a particle. Which was it? The answer is that it's both. And it gets even worse.

In the 1920s, a young physicist named Louis de Broglie made a radical suggestion: Since light has energy, momentum and a wavelength, and matter has energy and momentum, maybe matter has a wavelength, too. That's something that's easy to say but hard to wrap your head around. What does it mean for matter to have a wavelength? Or was de Broglie just horribly mistaken?

It turns out that de Broglie nailed it. At first blush, you may wonder how electrons could be anything but particles, because you can literally hold them in your hand, and they do a lot of bouncing. When you shoot electrons through two slits, you end up with the exact same interference pattern that you do with lights: alternating vertical stripes of more and fewer electrons.

A famous 1800s physics experiment, the double-slit experiment, revealed that light behaves like both particles and waves.

(Image credit: Jordgette/Wikimedia Commons, CC BY-SA 3.0)

What's going on? Electrons are acting like waves when they don't look anything like waves. What's doing the waving?

The answer comes through quantum mechanics, and describing that answer involves interpreting some of the deep mathematics. The most common picture, called the Copenhagen interpretation, says that the wave that we associate with matter is a wave of probability representing all the possible places where a particle might be the next time we go looking for it. This range of probability is described by an equation that has the same mathematical bones as that of any other wave equation. In this picture, that's what's doing the waving: the possible places the particle could be.

So, as the electrons pass through the slits in de Broglie's experiment, they can't exactly decide where they want to be. Those waves of uncertainty crash into each other and interfere, merging and canceling each other out just like any other waves. Then, when an electron's wave hits the back screen, the particle finally has to decide where to land. Slowly, electron by electron, the wave pattern builds up.

Just like light, sometimes matter acts like a particle, and sometimes, it acts like a wave. So, are light and matter made of waves or particles? The answer is both, sort of.

Learn more by listening to the episode "Is everything a wave or a particle, and why does my head hurt?" on the Ask A Spaceman podcast, available oniTunesand on the web ataskaspaceman.com. Thanks to Rowan H., Ethan L., Broc P., Madhab D., Grisham J., Jeff G., Cortney H., Joshua Z., @shrenicshah, Mike D., Lynn R., A C, Rick S., Robert P., and @ShaunFosmark for the questions that led to this piece! Ask your own question on Twitter using #AskASpaceman or by following Paul @PaulMattSutter and facebook.com/PaulMattSutter.

Follow us on Twitter @Spacedotcom and onFacebook.

Need more space? You can get 5 issues of our partner "All About Space" Magazine for $5 for the latest amazing news from the final frontier!

(Image credit: All About Space magazine)

More:

Is It a Wave or a Particle? It's Both, Sort Of. - Space.com

Quantum-inspired Beckman Institute celebration will be anything but small – Central Illinois Buzz

Wednesday, Oct. 2 ,will be declared Beckman Institute Day by the mayors of Urbana, Champaign and Savoy, who, along with others at the University of Illinois Campus, will mark the science centers 30th anniversary in song, word and artistic visualization.

The Jupiter String Quartet of the College of Fine + Applied Arts will be giving an encore performance of Quantum Rhapsodies, originally presented in April, with narration by creator and physicist Smitha Vishveshwara on Wednesday at 6 pm The program, shown in the centers atrium, features visualizations of the quantum world and is a meditation on quantum physics and its role in our universe through live music, narration and visuals.

A reception will precede the performance and proclamation at 5:30 pm. The 30th anniversary celebration kicks off with Mayors Diane W. Marlin of Urbana and Deborah Frank Feinen of Champaign, along with Savoy Village President Joan Dykstra making the official proclamation at 5:50 pm in the atrium of the Beckman Institute of Advanced Science and Technology.

An informal Q&A session with the shows creators will follow at about 7 pm. The Beckman Institute is also hosting several other events in conjunction with its anniversary celebration, including a sold-out pop-up escape room.

On Oct. 3 at 4 pm, a talk from Columbia University Professor Yaakov Stern on how lifestyle, genetics and brain anatomy may affect age- or dementia-related brain changes, Cognitive Reserve: An Evolving Concept.

Following the lecture at 5:30 pm there will be light refreshments served in the atrium, where a few of Beckmans graduate students and postdoctoral researchers will share informal and compelling stories about their research. The students are currently attending a three-day workshop with NPR podcast host Sandra Tsing Loh.

Follow this link:

Quantum-inspired Beckman Institute celebration will be anything but small - Central Illinois Buzz

Our world is in need of the Mahatmas teachings: Dalai Lama – Livemint

For decades, the 14th Dalai Lama has said that kindness is the only religion, and that differences can be put aside if people see themselves as belonging to a larger world community. Gandhis words, as well as the teachings of Buddhist masters, have guided him, he says. While accepting the Nobel Peace Prize in Oslo in 1989, he said it was a tribute to the man who founded the modern tradition of non-violent action for change, Mahatma Gandhi, whose life taught and inspired me". To mark Gandhis 150th birth anniversary, the Dalai Lama spoke to Mint about the continuing relevance of Gandhi and the ideas of non-violence and kindness.

What is it about Mahatma Gandhi that continues to inspire you?

He was the most influential person of the 20th century with his idea of non-violence, ahimsa. He took a 3,000-year-old Indian tradition of ahimsa and karuna (compassion) and made it something living and relevant. He made it relevant by fighting for Indias freedom through non-violencethats great.

At that time, some people may have felt that Gandhis non-violence was a sign of weakness, but non-violence under difficult circumstances is a strength, not a weakness. As far as I know, Nelson Mandela totally followed Mahatma Gandhis way. As did Martin Luther King (Jr).

Personally, since childhood, we often heard about Mahatma Gandhi of India". On one occasion in a dream, I met Mahatma Gandhiji (chuckles). We didnt talk, just his face (appeared). In winter, I stayed in the Potala Palace, in summer in the Norbulingka Palace. So once, during winter in the Potala, in my dream, Mahatma Gandhiji appeared. Not like in the pictures but a real Gandhi (laughs).

What is the relevance of Gandhis ideas and non-violence today?

It is quite simple. Now, many scientists say basic human nature is compassionate because we are social animals. In ancient times, the community meant your own family and your own village; in the modern sense, community is the whole world. The world is the same human community. If you think of that, non-violence is very relevant. As individuals, our future and our prosperity depends on the world community, on all communities.

We Tibetans consider India our sacred neighbour because the Buddha dharma came from India. I jovially tell people, traditionally, for thousands of years we considered Indians our guru, and we were the chela (disciple), the very reliable chela. In the gurus own land, the Nalanda tradition has been seeing many ups and downs. During these periods, we, as the reliable chela, kept the Nalanda tradition intact.

Previously, you were the guru and we the chela; now I think its different (laughs). You have forgotten the Nalanda tradition, but weve kept it alive. Here in exile, we have our own organized community and have re-established all those historical monastic traditions in this country. So now, one of my commitments is to revive the ancient Indian knowledge of ahimsa and karuna, not through prayer but through training the mind and emotion.

Do you think Mahatma Gandhi was an influential guru or a humble chela?

First, he was a chela of Indias thousands-years-old tradition. Then, many millions of followers came along and they considered Mahatma Gandhi a guru

Do you think Gandhi was influential because he never thought of himself as a guru but as a chela?

Completely agree. Thats true. Frankly speaking, I also have many followers. I have always considered myself a simple Buddhist monk. The seven billion human beings in the world are the same mentally, emotionally and physically. This conviction brings a sense of oneness with seven billion beings. Some Lamas, including some Indian gurus, they feel they have something special (laughs).

I, too, face some danger of people praising me too much. Then, at that time, you must tell yourself, You are a humble follower of Buddha." Thats very important. If you yourself become a slave of destructive emotion, how can you teach other people?Dalai Lama

So do you think weakness is part of greatness?

This is quite a philosophical question (laughs). It is important to know your own weakness. Then you can improve. If some Tibetan and Hindu Lamas consider themselves great, it is important to test, to criticize, to tease them. If they still remain completely calm, that shows they truly practice or implement what they teach other people.

Today, how do people live in simplicity, with older traditions, without ego or anger, when there is so much inequality and distraction due to technology?

Modern education came from the West, introduced by the British. This system does not know how to tackle emotional problems through meditation. Modern education is oriented towards material wealth. So, when people face anger, hatred, fear or jealousy, they do not know how to tackle it. India must revive ancient knowledge through analytic meditation to reduce destructive emotion, and increase constructive emotion.

My latest commitment is to try to revive this ancient Indian knowledge in modern India. It is the only nation that can combine modern education, technology, science, these things that are very useful, with ancient Indian knowledge of how to bring peace of mind.

Was Gandhi a link between the ancient and modern?

Gandhiji totally dedicated himself to non-violence but I dont know how much he contributed to combine modern education and ancient Indian education about the mind. Gandhiji was a very practical person and educated in England. He was committed to ahimsa, but karuna (compassion), I dont know.

How do you make Mahatma Gandhi, 150 years after his birth, relevant today? The younger generation only sees him on Indian currency notes...

(chuckles) The world needs Mahatma Gandhijis teachings and practice of non-violence. Many problems in the world today are of our own creation. Whenever we see a problem, our first reaction is to ask how to tackle this by force. Thats totally wrong. Violence may be a sincere motivation, but the method is wrong. Violence is mutual destruction. In human history, the weapon has become very important. That is the outdated way. One nation cannot eliminate the rest of the nations who are not very friendly with it. Whether we like it or not, we have to live side by sidethats the reality.

A modern education is very much oriented towards material wealththats not adequate. How to tackle anger, fearthese are not religious matters, these are a question of health of the mind of the human being. Education should include education about peace of mind, not based on religious faith but on common sense.

Mahatma Gandhi preached ahimsa and you talk of kindness. How are the two different or similar?

I dont know. You should examine. But sometimes, I feel my work is more at a mental level, his was more at an action level (laughs). Im a student of the Nalanda tradition. From childhood, we learn logic and psychology.

Do you think Mahatma Gandhi was more of a politician or a spiritual leader?

After he returned from England, Gandhi started the non-violence movement in South Africa. This was purely a moral and spiritual issue. Then he came to India, and practised non-violence. In India as he himself is an Indian, maybe there was some political implication. In South Africa, it was pure theory and philosophy; he was a spiritual leader.

I always consider myself a follower of Mahatma Gandhiji. In the philosophical field, my knowledge may be better than Gandhiji (chuckles) because we study from childhood the Nalanda texts, which deal with quantum physics. When I have discussions with scientists on quantum physics, I respect them, but mentally, I feel I know better (laughs). Quantum physics clearly explains the differences between appearance and reality. In order to tackle our destructive emotions such as anger and extreme attachment, we need to understand this gapthat nothing exists objectively as it appears but is entirely dependent on the observer.

Like Gandhiji, you have faced great challenges in your life in the pursuit of your objective. How do you remain an optimist?

First, I consider myself one of seven billion human beings. I see no difference. Chinese, Tibetan, Indian, European... We are the same, emotionally, physically, mentally. On that level, my commitment is to try to promote peace of mind among seven billion beings, to offer compassion or karuna, strictly secularly, not based on religion.

My second commitment as a Buddhist monk is promotion of religious harmony. I have full confidence that religious harmony is possible. Look at India. For more than 2,000 years, so many religions from outside have lived together alongside the home-grown traditions. There are little problems, but thats mainly because politicians manipulate; but basically, religious harmony is very much alive here.

I always tell Tibetans, it is much better to keep Chinese as our brothers and sisters than consider them as our enemyno use. For the time being, there is a problem with the Chinese neighbour, but that is a few individuals in the Communist Party. A number of Chinese leaders now realize that their 70-year policy regarding Tibet is unrealistic. There was too much emphasis on the use of force. So now they are in a dilemma: How to deal with the Tibetan problem? So things are changing. I think within one or two years, there is a possibility of me visiting China. But I love freedom and I enjoy Indias freedom. Indian freedom over 60 years has spoilt me (laughs).

Is there a link between the conflict in the world and the way we live?

The source of the problem is a self-centred attitude. The antidote is altruism. With greater altruism, the self-centred attitude reduces. This attitude brings anger, hatred and fear. Science has found that the basic human nature is compassionate. Our basic nature is to be social, appreciate the others kindness, smile. Live in kindness.

You said at the start of the interview that you saw Gandhi in your dream. If you were to really meet him today, what would be the first thing you would say to him?

I very much want to meet him, and first, touch his feet. Then, I think he may have some idea about how to deal with China.

Read the original:

Our world is in need of the Mahatmas teachings: Dalai Lama - Livemint

Censorship and online threats against the press spell trouble for the future of Pakistani journalism – Global Voices

Pakistani journalist Najam Sethi talks with CPJ about how journalists are being silenced in Pakistan. Screenshot from Video.

Deaths, threats, layoffs, late salaries, censorship and bans on TV channels have become the norm for media professionals in Pakistan.

On June 16, 2019, Pakistani blogger and independent journalist Billal Khan, who ran a YouTube channel where he interviewed political figures and talked about religion and politics, was stabbed to death by unknown individuals. Reports speculate that his criticism of the Pakistan army and Inter-Services Intelligence (ISI), Pakistan's leading intelligence agency, led to his killing.

In mid-September 2019, Zaffar Abbas, a journalist with the privately-owned Channel 7-News, was found dead in a dry well in Vehari, Pakistan.According to police sources, Abbas was returning home late at night from the Kot Malik area on September 7 when he went missing. On the familys behest, a kidnapping case was registered against unidentified people, and the reason for the incident is yet to be determined.

A number of journalists have recently been reported dead and in most cases, the perpetrators could not be identified. According to the Committee to Protect Journalists (CPJ), as many as 61 journalists have been killed in Pakistan since 1992.

In an interview with CPJ, Najam Sethi, a seasoned journalist and former Caretaker Chief Minister of Punjab, said that journalists in Pakistan are going through the worst time in the history of the country. In August, the TV Channel 24 HD cancelled the Najam Sethi Show, a news and political commentary program, after Sethi reported about Prime Minister Imran Khan's alleged marital issues:

Sethi also spoke about how journalists are being silenced: every time they raise their voice, criticize the government or do shows, they are labelled as traitors or have their credentials questioned.

Censorship has increased in Pakistan. Anything critical of the government, as well as various interviews with politicians, have been taken off-air on the orders of various government departments. Journalistshave also started receiving emails from social media platforms warning them about their posts against the Pakistan government. Reporters without Borders wrote an open letter to Pakistan's prime minister and voiced its concerns regarding the treatment of journalists in the country.

Sethi rightly points out the critical situation faced by journalists. The social media factor is one that can't be ignored: it has become an arena where online bullying and threats against journalists have taken place, with female journalists taking the brunt of the attacks.

Recently, the ruling Pakistan Tehreek e Insaf partys Twitter handle warned journalistGharidah Farooqiagainst making too many anti-state comments:

For the past few years, columnist Cyril Almeda, a recipient of the International Press Institute's (IPI) 71st World Press Freedom Hero Award, has come under fire from the state for publishing an exclusive story in the Dawn newspaper regarding a top-level meeting of civil-military leaders in 2016. In 2018, Almeida was slapped with a treason charge for an interview he did with the former prime minister, Nawaj Sharif.

In January 2019, Almeda was suspended from writing for the newspaper:

By September, Almeida announced that he would resume writing and that his latest column would be equally hard-hitting:

The climate is not an easy one to work in. As Dawn editor Zafar Abbas said in an interview, They are no longer trying to kill journalists. They are trying to kill journalism.

While these are some of the more egregious cases, journalists face constant challenges in the form of late payments and increased layoffs. Many media houses claim they are not getting government advertisements and are forced to downsize as a result. Reports suggest that ad volumes are being reduced for certain media houses as a tool of punishment.

Advertisements placed by Pakistan's government institutions account for 25 percent of total ad spend in the country. However, many note that the first ones to bear the brunt of layoffs are the journalists critical of the powers that be. Given these circumstances, the future of journalism in Pakistan appears to be fairly bleak.

Read this article:

Censorship and online threats against the press spell trouble for the future of Pakistani journalism - Global Voices

No trivial censorship at Hayner: Librarians bust out the banned books – Alton Telegraph

Local libraries celebrate Banned Books Week

Scott Cousins, scousins@thetelegraph.com

Morgan Berry, Hayner Library circulation manager, works with a display she set up for Banned Books Week in the downtown library branch on Belle Street in Alton. The annual event, Sept. 22-28, is sponsored by the American Library Association.

Morgan Berry, Hayner Library circulation manager, works with a display she set up for Banned Books Week in the downtown library branch on Belle Street in Alton. The annual event, Sept. 22-28, is sponsored by

Morgan Berry, Hayner Library circulation manager, works with a display she set up for Banned Books Week in the downtown library branch on Belle Street in Alton. The annual event, Sept. 22-28, is sponsored by the American Library Association.

Morgan Berry, Hayner Library circulation manager, works with a display she set up for Banned Books Week in the downtown library branch on Belle Street in Alton. The annual event, Sept. 22-28, is sponsored by

No trivial censorship at Hayner: Librarians bust out the banned books

ALTON Charlottes Web has animals talking like humans.

The Adventures of Huckleberry Finn has racial themes and language.

Alice in Wonderland has drug-related themes and is written by someone who was kind of strange.

The Holy Bible has, obviously, religious themes.

And Captain Underpants has a same-sex couple and is somewhat anti-authoritarian.

Someone, at one time or another, has tried to ban them all.

Banned Books Week, Sept. 22-28, celebrates books that are difficult to deal with and encourages people not only to read them but to talk about them. Since the early 1980s, the annual event sponsored by the American Library Association and a coalition of other groups celebrating the freedom to read.

The biggest thing is showing that libraries are a place that are completely against censorship, said Morgan Berry, downtown circulation manager for the Hayner Public Library. We are here to provide materials of all kinds. A library is a place for everybody.

On Monday Berry put together a display of banned or challenged books, as well as the reasons. She also noted that book covers decorating the counter included a large number of banned books.

Books are being challenged all the time, she said, often for reasons that are trivial.

Top banned/challenged books of 2018

1. George by Alex Gino: banned, challenged, and relocated because it was believed to encourage children to clear browser history and change their bodies using hormones, and for mentioning dirty magazines, describing male anatomy, creating confusion, and including a transgender character

2. A Day in the Life of Marlon Bundo by Jill Twiss, illustrated by EG Keller: banned and challenged for including LGBTQIA+ content, and for political and religious viewpoints

3. Captain Underpants series written and illustrated by Dav Pilkey: series was challenged because it was perceived as encouraging disruptive behavior, while Captain Underpants and the Sensational Saga of Sir Stinks-A-Lot was challenged for including a same-sex couple

4. The Hate U Give by Angie Thomas: banned and challenged because it was deemed anti-cop, and for profanity, drug use, and sexual references.

5. Drama written and illustrated by Raina Telgemeier: banned and challenged for including LGBTQIA+ characters and themes.

6. Thirteen Reasons Why by Jay Asher: Reasons: banned, challenged, and restricted for addressing teen suicide.

7. This One Summer by Mariko Tamaki, illustrated by Jillian Tamaki: banned and challenged for profanity, sexual references, and certain illustrations

8. Skippyjon Jones series written and illustrated by Judy Schachner: challenged for depicting stereotypes of Mexican culture

9. The Absolutely True Diary of a Part-Time Indian by Sherman Alexie: banned and challenged for sexual references, profanity, violence, gambling, and underage drinking, and for its religious viewpoint.

10. This Day in June by Gayle E. Pitman, illustrated by Kristyna Litten: challenged and burned for including LGBTQIA+ content.

11. Two Boys Kissing by David Levithan: challenged and burned for including LGBTQIA+ content

Source: American Library Association

The one that surprised me the most was Charlottes Web, she said, because I remember reading that growing up.

At the Wood River Public Library, displays on some of the bookshelves show some of the banned books. The library also is running a contest in which patrons can guess which banned book is shredded in a jar.

I think its important to show people that people continue to challenge these books, said circulation clerk Amy Gibbons, who helped put up the display.

There are so many reasons they are banned, or challenged, or whatever, she said. But its important to us at the Wood River Library to know that we do not censor our materials. We believe its important for people to make their own decisions or read what they want to read.

Gibbons said she did not recall any attempts at Wood River to ban or challenge any books. They once got complaints about a magazine cover, she said.

I think it was a Rolling Stone magazine, Gibbons said. There were several people who were not happy with the cover. I think there was partial nudity on the cover and we had several patrons ask us to remove that.

They were told that it is not something the library does.

In 2018, the ALAs Office for Intellectual Freedom tracked 347 challenges to library, school and university materials, resulting in 483 challenges or bans.

A common theme in many of the books are LGBT themes and sexuality. Many of the books on the 2018 list are repeats from one or more previous lists.

Ive seen a lot of the LGBTQ themes, Gibbons said. Some people are still uncomfortable with that sort of thing.

That has been the biggest, Morgan said. Especially now that they are coming out with more childrens books that have same-sex parents or talk about transgender.

She also said anti-cop or anti-authority issues are also cited as the reason for banning or challenging a book.

Morgan said one of the things people can do is simply know what they are reading.

Every book has a synopsis, she said. Every book has reviews you can read.

Some of the challenged/banned books over the past few years include the Pulitzer Prize-winning To Kill A Mockingbird for its racial themes; The Holy Bible for its religious viewpoint; The Hunger Games trilogy for being anti-ethnic, anti-family, offensive language, occult/satanic themes and violence; and Brave New World for insensitivity, nudity, racism, religious viewpoint and being sexually explicit.

Both Morgan and Gibbons agree there is a big difference between censorship and providing guidance. Gibbons said the appropriateness of literature for specific age groups is something that needs to be considered.

We have different levels, she said. Obviously our childrens books are separated from the adult books.

If a 6-year-old comes to me and asks me for a book recommendation obviously Im not going to steer them toward this area, she said, pointing to the adult section.

Both also said it is important for parents to discuss what their children are reading.

When you give children the freedom to choose what theyre going to read, with some parameters, obviously, it helps them to grow as a person and figure out what they like to read, Gibbons added.

For more information, visit the ALA online at http://www.ala.org or http://www.bannedbooksweek.org.

Reach reporter Scott Cousins at 618-208-6447.

See the rest here:

No trivial censorship at Hayner: Librarians bust out the banned books - Alton Telegraph

China: Sinisation of the Catholic Church, Censorship, and Repression – FSSPX.News

Fr. Anthony Yao Shun, age 54, was ordained bishop of Jining on August 26th, in the Our Lady of the Rosary Cathedral of Jining in the north of the country. Jining is the most important diocese of Inner Mongolia, home to about 70,000 Catholics. The ceremony was presided over by Bishop Paul Meng Qinglu, Bishop of Hohhot, Vice President of the Patriotic Association (official) of Chinese Catholics (CCPA), reported Elgises dAsie(Churches of Asia), the information bureau of the Foreign Missions of Paris.

Bishop Stephen Xu Hongwei, appointed coadjutor bishop of the diocese of Hanzhong, in Shannxi province, was ordained on August 28 in St. Michaels Cathedral of Hanzhong. The Press Office of the Holy See confirmed that these two ordinations took place under the Sino-Vatican Provisional Agreement, the pope accepted Bishop Yao and Bishop Xu before signing the Agreement.

Indeed, explains Sandro Magister on his blog Settimo Cielo on August 31st, both of the new bishops had been elected to this role, last April, by assemblies of priests, religious, and laymen of the respective dioceses, all of them selected by the Chinese authorities, brought together at a hotel and instructed on whom to vote for. And in both cases it was the Chinese pseudo-episcopal conference, made up only of bishops officially recognized by the government, that presented the new bishops to Rome, which accepted them. The precise terms of the accord between the two sides are still secret, but it is abundantly clear that this is how it works.

The official media of the Peoples Republic of China have shown, with photos, that Bishop Yao Shuns episcopal ordination was conducted without any particular tension and in accordance with the provisions of the Agreement. On the Vaticans side, they also stressed the consensus that directed the appointment of the new Bishop of Jining. On August 26, Gianni Valente, in Vatican Insider, the Holy Sees official media, wrote, the choice of the new bishop prompted the emergence of an important unanimous consent by the Holy See, the diocesan community, and the political apparatus around the profile of the candidate. And the Vaticanist congratulates himself that the Provisional Agreement concluded between the Holy See and the government of Beijing on the appointment of Chinese bishops provides the mechanism for finding solutions that are always in keeping with the apostolic nature of the Church, by keeping the door open for frank and direct discussion with the Chinese political authorities.

Meanwhile, the sinisation of Catholicism is a reality that is progressing in China, supported by the Chinese Communist Party, to correspond with the directives issued by President Xi Jinping in 2015. According to these directives, says Elgises dAsie (EDA), appear the censorship and modifications of classic texts in textbooks. Words such as God, Bible, or Christ have been removed from Hans Christian Andersen, Daniel Defoe, Anton Chekhov, Leo Tolstoy, and Victor Hugo, eliminating any religious reference. At the beginning of the year, explains the agency of the Foreign Missions of Paris (MEP), the Publishers of Popular Education, related to the government, published a textbook for the pupils of CM2 (middle school) level, containing four extracts from the works of foreign authors that have been censored to match the wishes of the Chinese Communist Party. Censorship that has spread throughout Chinese education, to the university where some teachers condemn and confiscate classics containing religious words. In fact, from now on, religions must assimilate to Chinese culture and submit to the Party. Sinisation consists in exalting national patriotism against foreign religions like Christianity. According to observers, this campaign against Christianity is due to fears that China will become the most Christian country in the world by 2030, as predicted by some sociologists, such as the American Fenggang Yang of the University of Purdue. (see DICI No. 375, August 2018) For more critical observers, sinisation also serves as a shield against democracy, human rights, and the rule of law.

This is the case in Hong Kong, which Beijing would like to totally subjugate, by removing certain rights, in force since 1997, on freedom of conscience and freedom of religion. Religious practice is free there, contrary to how it is in Mainland China.

Since March 31, the island of Hong Kong has opposed the government law to facilitate extradition to Mainland China. In recent weeks, the confrontations of the anti-extradition movement with the police have shown the first appearance of great police violence to suppress the movement. For this reason, writes Fr. Bernardo Cervellera director of the AsiaNews agency, a key issue of the protesters is the opening of an independent investigation into the excessive use of force by police, suspected of being in cahoots with certain local mafias, and of being led, advised, and supported by the Chinese Peoples Armed Police.

The Italian agency Foreign Missions explained on September 7 that several shopping centers located near subway stations had become the scene of the anti-extradition movement protests, as a sign of protest against police violence in the subway. In fact, AsiaNews continues, the authorities refuse to broadcast the videos of the evening of August 31, when the police went down into the Prince Edward Station indiscriminately hitting protesters and passengers and spraying stinging gas. And after expelling journalists and photographers, the police spent long hours in the station. The movement is asking for the videos of this police intervention to be broadcast, as since then some protesters have disappeared. Although the government denies that there were deaths in the August 31 assault, groups of young people have deposited flowers and messages in front of the station, says AsiaNews.

It is also necessary to explain why the majority of the demonstrators are young (nearly 60% are under 29 years old), continues Cervellera, in an article of September 9th. Above all, there is the anger and disappointment that for two years the government has been deaf to the demands of democracy; and that adds to the frustration of seeing government policy that does not support social housing, but facilitates the growth of expensive buildings and luxury apartments. So that young people cannot plan to buy a house or a home to establish a family. Finally, there is the immigration policy imposed by China that facilitates the entry into the territory of Chinese graduates, ready to work for wages lower than those of the people of Hong Kong. This is dropping the labor market to the point where many young people in Hong Kong are forced to emigrate to find work.

Cardinal Joseph Zen Ze-kiun, bishop emeritus of Hong Kong, wrote on his blog on September 2, addressing the authorities: Accept at least two requirements: remove the evil law and set up an independent investigation committee. If its a yes, I hope everyone will accept a truce, if not, October 1 [National Day] may be a great tragedy. This October 1, 2019 Beijing hopes to celebrate with panache 70 years of the Peoples Republic of China. Will it be a new Tiananmen, as in 1989?

View original post here:

China: Sinisation of the Catholic Church, Censorship, and Repression - FSSPX.News

Censorship and Contemporary Banned Books – Pinnacle

The Hate You Giveby Angie Thomas andEleanor and Parkby Rainbow Rowell have become two of the most popular young adult books of the last five years.The Hate You Givefollows the story of Starr Carter, who lives somewhat of a double life between her interactions in her mostly African American neighborhood and attending a mostly white private school.

After she witnesses the shooting of her childhood friend via police brutality, she must deal with the aftermath. Eleanor and Park,takes place in the late 1980s and follows the blossoming love story between Eleanor Douglas and Park Sheridan and their story involving themes of domestic abuse and body image. At the surface, these two books do not have much in common. However, both of these novels have been challenged by censorship and the banned book system.

Books can be censored by school districts for many different reasons. In the case of Angie Thomas novel The Hate You Giveand Rainbow Rowells novelEleanor and Park, violence and vulgarity are the largest contributing factors to their removal from library shelves, even though these claims may not be the real reasons behind their removal; instead, themes involving sexual undertones and references to political movements are their hidden reasons for removal, causing major controversy in the literary community.

According to the American Library Associations (ALA)website, the largest threats associated with banned books include violations of the First Amendment like access to information, access to library resources due to issues like the digital divide, academic freedom and the rights of students and minors within the public school system.

In the case of Angie Thomas and Rainbow Rowells novels, the biggest arguments made by school boards against their respective novels hide under the disguise of larger issues such as vulgar language instead of focusing on the true messages and important themes in the novels.

According to Vanessa Diaz of BookRiot, a website the tracks contemporary book bans,The Hate You Givewas removed from a Texas school district for use of, four-letter expletives to the use of the N-word. in late 2017. It is suggested, however, that the real reason for the ban was the material within the book which was heavily inspired by the Black Lives Matter Movement and the police brutality that has raided news channels and social media over the last five years.

In the case ofEleanor and Park, a challenge in an Oregon school district was made with a similar claim. According to the Intellectual Freedom Blog, which is run by the ALA, the true reason that it was pulled from shelves was for sexual issues and undertones in the novel. The article even quotes a parent calling the book, Its is the most profane and obscene work we have ever read in our lives, says Kristin Pekoll of Intellectual Freedom Blog.

The controversy surrounding banned books like Rowell and Thomas novels are ridiculous and even harmful to society as many believe censorship in any capacity should be looked upon as scary especially when it is made by a governing body, including school boards. The parents should ultimately be the ones to create boundaries on the things that children should and shouldnt be interacting with.

I was considered a sheltered kid myself, not allowed to read things such as the Harry Potterseries orTwilightuntil my parents felt I could make my own decisions. I still had the option to through school and it was really up to me when I was not around my parents, to choose what to read and what not to read. For that I am grateful. Many books that may contain harsher themes that I read when I was younger such asThe Fault In Our Starsby John Green orTo Kill A Mockingbirdby Harper Lee have been challenged for other reasons but had I not read them, their impact and how they shaped me into who I am would have not existed. I think the same thing goes forThe Hate U GiveandEleanor and Park.

While I have never read those books-even though they are both on my to be read lists-I know of many people who have been deeply impacted by these novels for one reason or another. To censor or ban these books from student consumption in one way or another is truly wrong especially when the true reasons behind their removal from schools and libraries are hidden or not publicly discussed.

Read more from the original source:

Censorship and Contemporary Banned Books - Pinnacle

YouTube reverses the not-so-subtle censorship of Steven Crowder and others – Reclaim The Net

Critics of YouTube's business and tactics, specifically those coming from the conservative portion of the US politics and society, repeatedly cry foul declaring this Google-owned, super influential platform as one that is habitually using its power to sway users effectively towards its own vast preference as a global video giant.

But could YouTube at the same time be deliberately putting in many roadblocks, some more subtle than others all the way to the ultimate goal of suppressing legitimate, conservative online voices?

The evidence seems to point that way.

This question has not merely been an ongoing accusation made by observers and active participants who theorize bad intent on the part of Big Tech but in fact, this has also been a question put forward by some Google insiders, in their public testimonies that support similar claims all boiling down to accusing YouTube of being motivated by bias, fueled by some very real real world politics and allegiances.

And that activity, if true, would be something very disappointing to normal users not only in the US, but around the world where the myth of an objective, knowledge-based, data-driven, scientific search result might still be strong with Google and its various services.

That said the case of comedian and political commentator Steven Crowder might, overall, provide one of the most obvious examples clearly proving the accusation of YouTube employing a negative, multi-pronged approach to what the social media giant sees as the problem namely, suppressing online opinions it disagrees with but doing it on ideological and political grounds.

Granted in an ideal world and a true democracy, this is not even something that should emerge as a problem after all, a democracy's genuine freedom of speech and a capitalist system's genuine transactional nature should be enough to satisfy both parties in any YouTube/Creator relationship.

Nevertheless, something is clearly amiss and here we are, just over a year ahead of the next US presidential election, looking at how Google/YouTube are choosing to position themselves within their own truth.

Right now, Steven Crowder's YouTube channel is emerging as the poster child for all the different ways YouTube might go after creators it eventually seems to want to squeeze out of the platform while not exactly deciding to outright remove them.

If a creator clearly violated YouTube's terms of service and/or guidelines, they would be an easy to ban. But if, like in Crowder's case, the platform had no objective reason to get rid of them the platform seems to just continues to look for other ways to downgrade their content.

YouTube's actions, and the aftermath

Earlier in the year, YouTube demonetized Crowder's channel after the comedian's brand of humor happened to mash badly with that of a rival content creator, Carlos Maza. Long story short: YouTube at the time erred on the side of censorship and demonetized Crowder's channel without outright banning him.

But now, YouTube seems to be fighting its ideological enemies far more subtly by making them dissipate all the way to disappearing in that all-important segment the search results.

In a new video this week, Crowder tells his followers about YouTube's latest censorship tactic and what it means for the channel, as well as for the rest of the conservative movement.

YouTube's policy, Crowder explains, means that while subscribed audience members might be as present as ever, and providing as many clicks on videos as before and often more than before conservative channels such as his are finding it super difficult to grow their audiences right now.

This sounds illogical: a channel like Crowder's, that has managed to grow views on its videos nearing a million views per clip easily squeezing out progressive favorites like The Young Turks must also surely be able to grow its own subscriber base on YouTube? Apparently, not so.

Crowder says in the video that this is indeed not the case and expressing doubt that this highly unlikely turn of events might have happened as anything organic on the internet. Overall Crowder's recommendations from YouTube are down.

In fact he found out that searches on YouTube for Steven Crowder consistently returned results for pretty much anything such as mentions and references in other creators' videos but not results to his actual channel. The same was true for other conservative commentators and organizations.

In the wake of this, some progress has been made, judging by Crowder's recent tweet and others, like political commentator Mark Dice who tweeted to say that YouTube has quietly fixed it. FINALLY. Crowder highlighted how the search results looked before and after his lawyer contacted YouTube about the issue.

Dice's original complaint had to do with YouTube burying results about his own channel at the bottom of any search of his own name something that appeared to be a common enough tactic on the part of YouTube.

The internet needs your voice more than ever.

Read more from the original source:

YouTube reverses the not-so-subtle censorship of Steven Crowder and others - Reclaim The Net

Joe Biden wants to censor Rudy Giuliani – Whats on Politics – Politics

According to the camp of former VP and now presidential candidate Joe Biden, Pres. Donald Trumps personal attorney, Rudy Giulianishouldnt be allowed to appear in television interviews, or be covered by any major news networks.

Bidens top campaign advisers recently wrote an email to news executives demanding them not to give airtime to Giulianiin any media channel after the former NYC mayor, in several talk shows, repeatedly called for investigations on the Bidens for what he said were apparently corrupt dealings with Ukraine and China, while Biden was vice president.

The Daily Beast, which first reported the existence of the said request letter, said it was sent to CBS News, Fox News, NBC News, and CNN arguing that it is editorially irresponsible to book the presidents personal lawyer to appear in their shows.

We are writing today with grave concern that you continue to book Rudy Giuliani on your air to spread false, debunked conspiracy theories on behalf of Donald Trump,Bidens campaign team wrote.

While you often fact check his statements in real time during your discussions, that is no longer enough. By giving him your air time, you are allowing him to introduce increasingly unhinged, unfounded and desperate lies into the national conversation, the letter reportedly drafted by top aides Kate Bedingfield and Anita Dunn, said.

We write to demand that in service to the facts, you no longer book Rudy Giuliani, a surrogate for Donald Trump who has demonstrated that he will knowingly and willingly lie in order to advance his own narrative, it added, noting that Giuliani is not a public official, and holds no public office that would entitle him to opine on the nations airwaves.

Heres a copy of Team Bidens demand letter calling for censorship on Giuliani:

I didnt know that the emboldened Biden campaign team is that powerful now that they are actually demanding for censorship.

For those not closely watching the news, the former New York City mayor has been making the rounds on television shows defending Donald Trump from the Ukraine controversy that has resulted to the Democrat led House launching a formal impeachment inquiry against the President. Giulianihas also blasted the liberal lawmakers for not investigating evidence of Bidens possible corruption that he claims has been hiding in plain sight for months.

Your obligation is to provide the American people with an informed, fact-based and responsible coverage and debate of critical issues, the letter from Bidens team further read.

While you have been aggressive in pushing back on him in real time, it is well known that the dedicated liar always has the advantage, pushing out outlandish falsehoods and disinformation in the knowledge that it is hard for the corrections to catch up, the letter further said.

Responding to the demand of Bidens camp, Trumps 2020 campaign manager Brad Parscale tweeted:

Can we request the removal of Democrats on TV that push hoaxes? Wait, but then who would do the interviews?

Giuliani has insisted he didnt work with anybody to get dirt on Joe Biden, saying that whatever information he has about the corruption allegations against the Biden was handed by the Ukrainians.

The basis of Democrats impeachment inquiry against Donald Trump is a phone call he made with Ukraine President Volodymyr Zelensky, where he suggested that Ukraines new leader look into Bidens claims about the firing of prosecutor Viktor Shokin. On the same call, Trump separately sought Ukraines help in investigating foreign interference in the 2016 elections.

Zelensky has already stated there was no pressure from Trump during the conversation to investigate anything.

Back to Biden; his move to pressure Ukraine was on record. Biden has acknowledged> on camera that when he was vice president, he successfully pressured Ukraine to fire prosecutor Shokin, who was investigating the natural gas firm Burisma Holdings where son Hunter Biden had a high position on the board.

Critics of Biden have argued that Hunter gets paid tens of thousands of dollars, despite having limited relevant experience to the industry. The vice president, was also on record threatening to withhold $1 billion in critical US aid to Ukraine if Shokin was not fired.

Heres Giulianis response:

From the moment you read The New York Times article in 2015 and you saw that Biden got away with having his son pulling down millions from the crookedest oligarch in Russia, you knew this was going to happen. I prosecuted corruption, Democrats and Republicans. I can smell this.

They are silencing me because I showed up with an affidavit and an accuser who is willing to stand up and point the finger at Joe Biden and say youre a crook. And I have the proof and I have the documents and Ive got the witness will say the corroboration because there are more witnesses where he came from and they are not going to escape this,Giuliani said.

Its scandal after scandal covered up by a compliant crooked press, the former New York mayor, added.

From threatening to withhold a critical aid to Ukraine if the prosecutor investigating them is not fired, now, Biden is coming after Giulianiso the former mayor will be silenced.

Looks like Biden is in the habit of demanding the removal of those who are investigating him.

But then again, even if he got exposed, that doesnt mean there will be consequences. At least not with Democrats in Congress.

See more here:

Joe Biden wants to censor Rudy Giuliani - Whats on Politics - Politics

Censorship leaves us in the dark: Keep the light on! – Del Rio News Herald

Yesterday ended Banned Books Week. This years theme was Censorship Leaves Us in the Dark: Keep the Light On! The American Library Association wants us to know:

Books are still being banned and challenged today. A challenge is an attempt to remove or restrict materials, based upon the objections of a person or group. A banning is the removal of those materials.

While books have been and continue to be banned, part of the Banned Books Week celebration is the fact that, in a majority of cases, the books have remained available. This happens only thanks to the efforts of librarians, teachers, students, and community members who stand up and speak out for the freedom to read.

I am betting you have read a banned or challenged book or two in your day perhaps one of these classics?

The Grapes of Wrath by John Steinbeck

To Kill a Mockingbird by Harper Lee

The Lord of the Flies by William Golding

1984 by George Orwell

Of Mice and Men by John Steinbeck

Brave New World by Aldous Huxley

Animal Farm by George Orwell

Gone with the Wind by Margaret Mitchell

The Call of the Wild by Jack London

The Lord of the Rings by J.R.R. Tolkien

Now, I must admit that there are books on library shelves that I would not choose to read or even recommend others to read. BUT, as a professional librarian, I agree with the following statements provided in the American Library Associations Banned Book Week press kit:

Censorship by librarians of constitutionally protected speech, whether for protection or for any other reason, violates the First Amendment.

As Supreme Court Justice William J. Brennan, Jr., in Texas v. Johnson, said most eloquently:

If there is a bedrock principle underlying the First Amendment, it is that the government may not prohibit the expression of an idea simply because society finds the idea itself offensive or disagreeable.

If we are to continue to protect our First Amendment, we would do well to keep in mind these words of Noam Chomsky: If we dont believe in freedom of expression for people we despise, we dont believe in it at all.

Or these words of Supreme Court Justice William O. Douglas (The One Un-American Act. Nieman Reports, vol. 7, no. 1, Jan. 1953, p. 20): Restriction of free thought and free speech is the most dangerous of all subversions. It is the one un-American act that could most easily defeat us.

Keep the light on so you can read (whatever you want)!

Willie Braudaway strives to make life better as a librarian, genealogist, and member of various community organizations. Contact her at librarywillie@hotmail.com.

See the rest here:

Censorship leaves us in the dark: Keep the light on! - Del Rio News Herald