Studies Reveal China’s Dominant Position in High-Tech Minerals

New clean energy technologies like solar power and electric vehicles are expected to remake the global energy industry. Trillions of dollars used to drill and ship oil and gas will instead be spent finding and processing the specialized minerals used to make high-tech gear including advanced electric generators and powerful, compact batteries.Energy analysts say this will challenge the United States, which will likely need to import vastly more minerals like cobalt, lithium and aluminum, at the same time that China has increased its control over the supply of some key resources.People cool off in the beach near the mining pipeline “Puerto Coloso” of the “Escondida” cooper mine in Antofagasta, Chile, Feb. 16, 2017.A VOA examination of U.S. government data shows how China has become the main supplier for some of the most important raw materials that Western countries import, giving Beijing leverage over the materials that go into everything from advanced fighter jets to solar panels.Not only has Beijing bought up some of the world’s biggest mines for these minerals, the country also has invested heavily in the processing facilities that refine the raw materials into industrially-useful products, strengthening Beijing’s position in global supply chains.Beijing has already given the world reason to worry about its reliability as a global supplier. In 2011, it used its position as the top global supplier of rare earth metals to cut exports, driving up prices. China’s critics say Beijing’s dominant position in so-called “critical minerals” gives them similar leverage.Aerial view of evaporation pools of the new state-owned lithium extraction complex, in the southern zone of the Uyuni Salt Flat, Bolivia, on July 10, 2019.35 critical mineralsThe United States has designated A man watches a conveyor belt loaded with chunks of raw cobalt after a first transformation at a plant in Lubumbashi, Congo, on Feb. 16, 2018, before being exported, mainly to China, to be refined.Chinese dominance in U.S. allies’ supply chainsOther Western countries have different lists of minerals considered critical to their economies. Among the lists of Australia, U.K. and Canada, rare earth minerals account for only one of the 24, 41 and 31 critical minerals, respectively.  The European Union classifies light and heavy rare earths as two separate critical elements on its 30 Critical Raw Materials (CRM) list.A study published last year by the European Commission’s Joint Research Center, a science and technology service agency, found that the production of a Rafale fighter aircraft requires a total of 16 CRMs, of which only three are rare earth elements. Although each country makes up its own list of “critical minerals” based on its strategic needs, China is a dominant supplier in all of the lists.In the EU’s list, China is the largest source of imports for 10 minerals. Among the 24 critical minerals identified by the Australian government in its Critical Minerals Prospectus 2020 report, China is listed as the largest producer of 11 of them.   In the U.K.’s Risk List, China is the leading producer of 23 minerals.Similar findings were reported by Chinese researchers as well.  A study published by China Geological Survey stated that “after combing through the list of Critical Minerals in the United States, the European Union, the United Kingdom and other countries, it can be seen that half or more of the country’s main producing countries and main sources of imports are our country.”The 2019 report said that of the 35 key minerals in the U.S., the largest supplier of 13 CMs is China, and China is also the largest producer of 19 CMs.This story originated in VOA’s Mandarin Service. 

SolarWinds Hackers Targeted 150 Organizations with Phishing, Microsoft Says

The state-backed Russian cyber spies behind the SolarWinds hacking campaign launched a targeted spear-phishing assault on U.S. and foreign government agencies and think tanks this week using an email marketing account of the U.S. Agency for International Development, Microsoft said.
The effort targeted about 3,000 email accounts at more than 150 different organizations, at least a quarter of them involved in international development, humanitarian and human rights work, Microsoft Vice President Tom Burt said in a blog post late Thursday.
It did not say what portion of the attempts may have led to successful intrusions.
The cybersecurity firm Volexity, which also tracked the campaign but has less visibility into email systems than Microsoft , said in a post  that relatively low detection rates of the phishing emails suggest the attacker was “likely having some success in breaching targets.”  
Burt said the campaign appeared to be a continuation of multiple efforts by the Russian hackers to “target government agencies involved in foreign policy as part of intelligence gathering efforts.” He said the targets spanned at least 24 countries.
The hackers gained access to USAID’s account at Constant Contact, an email marketing service, Microsoft said. The authentic-looking phishing emails dated May 25 purport to contain new information on 2020 election fraud claims and include a link to malware that allows the hackers to “achieve persistent access to compromised machines.”
Microsoft said in a  separate blog post that the campaign is ongoing and evolved out of several waves of spear-phishing campaigns it first detected in January that escalated to the mass-mailings of this week.
While the SolarWinds campaign, which infiltrated dozens of private sector companies and think tanks as well as at least nine U.S. government agencies, was supremely stealthy and went on for most of 2020 before being detected in December by the cybersecurity firm FireEye, this campaign is what cybersecurity researchers call noisy. Easy to detect.
Microsoft noted the two mass distribution methods used: the SolarWinds hack exploited the supply chain of a trusted technology provider’s software updates; this campaign piggybacked on a mass email provider.
With both methods, the company said, the hackers undermine trust in the technology ecosystem.

Tanker’s Impossible Voyage Signals New Sanction Evasion Ploy

The Cyprus-flagged oil tanker Berlina was drifting near the Caribbean island of Dominica earlier this year when tracking technology showed it stopping in its tracks and in two minutes turning around 180 degrees.It was an amazingly quick pivot since the 274-meter ship needs roughly 10 times that amount of time to perform such a maneuver.Even more intriguing: Around the same time the Berlina was pinging its location at sea, it was physically spotted loading crude oil in nearby Venezuela despite U.S. sanctions against such trading.Meanwhile, nine other ships, some connected to the same Greece-based owner of the Berlina, were digitally monitored moving nearby at an identical speed and direction with sudden draft changes, indicating they had somehow been loaded full of crude though apparently out at sea.The Berlina’s impossible journey could represent the next frontier of how rogue states and their enablers manipulate GPS-like tracking systems to hide their movements while circumventing sanctions, maritime experts say.Evading detectionIn recent years, as the U.S. has expanded economic sanctions and tracking technology has become more widely used, companies have adopted a number of techniques to evade detection. Most involve a ship going dark, by turning off its mandatory automated identification system or by “spoofing” the identity and registration information of another ship, sometimes a sunken or scrapped vessel.Windward, a maritime intelligence agency whose data is used by the U.S. to investigate sanctions violations, carried out a detailed investigation into the Berlina. It considers the movements of the Berlina and the other ships to be one of the first instances of orchestrated manipulation in which vessels went dark for an extended period while off-ship agents used machines to hide their activities by making it appear they were transmitting their locations normally.Militaries around the world have been using the same electronic warfare technology for decades. But it is only now cropping up in commercial shipping, with serious national security, environmental and maritime safety implications.“We believe this is going to spread really fast because it’s so efficient and easy,” Matan Peled, co-founder of Windward, said in an interview. “And it’s not just a maritime challenge. Imagine what would happen if small planes started adopting this tactic to hide their true locations?”Under a United Nations maritime treaty, ships of over 300 tons have been required since 2004 to use the automated identification system to avoid collisions and assist rescues in the event of a spill or accident at sea. Tampering with its use is a major breach that can lead to consequences for a vessel and its owners.But the maritime safety mechanism has also become a powerful mechanism for tracking ships engaged in rogue activities like illegal fishing or transporting sanctioned crude oil to and from places under U.S. or international sanctions like Venezuela, Iran and North Korea.In the cat-and-mouse game that has ensued, the advent of digital ghosts leaving false tracks could give the bad actors the upper hand, said Russ Dallen, the Miami-based head of Caracas Capital Markets brokerage, who tracks maritime activity near Venezuela.“It’s pretty clear the bad guys will learn from these mistakes and next time will leave a digital trail that more closely resembles the real thing,” Dallen said. “The only way to verify its true movement will be to get a physical view of the ship, which is time consuming and expensive.”Manipulation or malfunction?The Berlina never reported a port call while floating in the Caribbean. Nonetheless, on March 5, the draft indicated by its identification system went from 9 meters to 17 meters, suggesting it had been loaded with oil.Was it manipulation or a malfunction?While the Berlina’s voyage remains something of a mystery, Vortexa, a London-based energy cargo tracker, determined the tanker had loaded at the Venezuelan port of Jose on March 2 and then headed toward Asia. Separately, Windward also confirmed the crude delivery through two sources.Two months later, on May 5, the Berlina discharged its crude in a ship-to-ship transfer to a floating storage vessel, the CS Innovation, according to Vortexa. The CS Innovation remains off the coast of Malaysia where the transfer took place and has undertaken several ship-to-ship transfers in the interim, making it nearly impossible to know where Venezuela’s oil will end up.Adding to suspicions, the Berlina and at least four of the nine other vessels involved in the Caribbean voyage earlier this year are connected to the same Greek company, according to Windward. And all 10 vessels switched flags — another common ploy used to make it harder to keep track of ships — to Cyprus in the four months prior to the manipulation of the fleet’s tracking information.The AP was unable to locate any contact information for the Berlina’s ship manager or owner, both of which are based in the port city of Pireaus, near Athens.Peled said the Berlina’s activities may never have been detected if not for a tip it received from an external source that it wouldn’t identify.But the know-how gained from the investigation has allowed it to identify other recent examples of location tampering, including one in January when a ship it did not identify was spotted loading Iranian crude at Kharg island while broadcasting its location out at sea somewhere else in the Persian Gulf.While the U.S. government has additional resources to ferret out such deceptive practices, doing so will require extra effort.“It suggests the length to which rogue actors are willing to go, to hide their activities,” said Marshall Billingslea, an assistant Treasury secretary for terrorist financing during the Trump administration and former deputy undersecretary of the Navy. “It’s a worrisome trend and given the huge volume of maritime traffic will introduce a lot more noise into the system.”

Facebook Won’t Remove Posts Claiming COVID-19 is Human-made

Facebook says it will no longer remove claims that COVID-19 is human-made or manufactured “in light of ongoing investigations into the origin of COVID-19 and in consultation with public health experts.”There is rising pressure worldwide to investigate the origins of the pandemic, including the possibility that it came from a lab. Since the pandemic began, Facebook has been changing what it allows on the topic and what it bans. In February, it announced a host of new claims it would be prohibiting — including that COVID-19 was created in a Chinese lab. Other claims it added at the time included the false notion that vaccines are not effective or that they are toxic.Lisa Fazio, a professor of psychology at Vanderbilt University, said the reversal shows the difficulty of fact-checking in general, particularly with something unprecedented like the coronavirus, when experts can disagree and change their minds with new evidence.“It’s one reason that content moderation shouldn’t be static, scientific consensus changes over time,” Fazio said. “It’s also a reminder to be humble and that for some questions the best current answer is “we don’t know yet” or “it’s possible, but experts think it’s unlikely.”Facebook’s reversal comes as President Joe Biden ordered U.S. intelligence officials to “redouble” their efforts to investigate the origins of the COVID-19 pandemic, including any possibility the trail might lead to a Chinese laboratory. After months of minimizing these claims as a fringe theory, the Biden administration is joining worldwide pressure for China to be more open about the outbreak. It aims to head off GOP complaints that Biden has not been tough enough and to use the opportunity to press China on alleged obstruction.“We’re continuing to work with health experts to keep pace with the evolving nature of the pandemic and regularly update our policies as new facts and trends emerge,” said Guy Rosen, Facebook’s vice president of integrity, in a statement Wednesday.Facebook does not usually ban misinformation outright on its platform, instead adding fact-checks by outside parties, which includes The Associated Press, to debunked claims. The two exceptions have been around elections and COVID-19.

«Приватбанк»: наглядова рада призначила нового голову правління

«Пан Бьош є досвідченим банкіром із 35-річним досвідом роботи, який протягом 15 років працював на керівних провідних посадах у банківському секторі України і має ґрунтовне розуміння української та європейської банківських систем»

Russia, Iran Leading Disinformation Charge on Facebook

Russia and Iran are leading the way when it comes to pushing bad information on one of the world’s most popular social media platforms, and new analysis finds they are getting savvier at evading detection. Facebook issued a report Wednesday looking at so-called coordinated inauthentic behavior over the past four years, warning that despite ongoing efforts to identify and remove disinformation networks, there is no let-up in attempts to exploit or weaponize conflict and crisis. “Threat actors have adapted their behavior and sought cover in the gray spaces between authentic and inauthentic engagement and political activity,” according to the Facebook report, which looked at the more than 150 networks from more than 50 countries that its security teams took down from 2017 to 2020. “We know they will continue to look for new ways to circumvent our defenses,” the report added, noting disinformation efforts were evenly split between foreign and domestic efforts. “Domestic IO also continues to push the boundaries of acceptable online behavior worldwide” per @Facebook “About half of the influence operations we’ve removed since 2017–including in #Moldova, #Honduras, #Romania, #UK, US, #Brazil & #India–were conducted by locals…” pic.twitter.com/e2pLpgLNaJ— Jeff Seldin (@jseldin) May 26, 2021 Russia, Iran influence efforts Overall, Russia was the biggest purveyor of disinformation, according to the analysis, with 27 identified influence operations during the four-year timeframe. Of those, 15 were connected to the St. Petersburg-based Internet Research Agency (IRA) or other entities linked to Yevgeny Prigozhin, a Russian oligarch with close ties to Russian President Vladimir Putin. US Hits Back at Russian Election Disinformation Ring New sanctions target the ‘inner circle’ of Ukrainian politician Andrii Derkach, previously outed by U.S. officials as a long-time Russian agent Another four Russian networks were traced to the Kremlin’s intelligence services and two more originated with Russian media sites. Iran was second on the list, with 23 inauthentic networks, nine of which were connected to the government or Iranian state broadcasters. Myanmar ranked third, with nine disinformation networks, followed by the United States and Ukraine. NEW: #Russia, #Iran#Myanmar top @Facebook’s list of sources for influence ops/ Coordinated Inauthentic Behavior in new report covering 2017-2020US is 4th, #Ukraine is 5th pic.twitter.com/X2Z45AqUO2— Jeff Seldin (@jseldin) May 26, 2021Facebook said the culprits in the United States and Ukraine included public relations firms, fringe political actors, and in the case of Ukraine, two political parties. China’s ‘strategic communication’ China, accused by U.S. intelligence officials for running multiple, intensive influence operations, did not make Facebook’s list of illicit disinformation networks, but not because Beijing was not active. Outgoing US Intel Chief Warns China Seeking Global Domination Director of National Intelligence John Ratcliffe has repeatedly sounded alarms about Beijing’s efforts, but now says China is prepared for an ‘open-ended period of confrontation’ with US “The China-origin activity on our platform manifested very differently than IO [influence operations] from other foreign actors, and the vast majority of it did not constitute CIB [Coordinated Inauthentic Behavior],” the Facebook report said. “Much of it was strategic communication using overt state-affiliated channels [e.g. state-controlled media, official diplomatic accounts] or large-scale spam activity that included primarily lifestyle or celebrity clickbait and also some news and political content.” #Election2020: “In the year leading up to the US 2020 election, we exposed over a dozen CIB operations targeting US audiences, including an equal number of networks originating from #Russia, #Iran, & the #UnitedStates itself” per @Facebookpic.twitter.com/MISQHnJigc— Jeff Seldin (@jseldin) May 26, 2021The Facebook report warned, however, that catching sophisticated disinformation actors like China and Russia is getting more difficult. “They are showing more discipline to avoid careless mistakes,” the report said. “Some are also getting better at avoiding language discrepancies.” Amplifying, outsourcing disinformation Facebook further warned that countries like Russia and China “are getting better at blurring the lines between foreign and domestic activity by co-opting unwitting [but sympathetic] domestic groups to amplify their narratives.” Another concerning trend identified in the Facebook report: outsourcing. “Over the past four years, we have investigated and removed influence operations conducted by commercial actors—media, marketing and public relations companies, including in Myanmar, the U.S., the Philippines, Ukraine, the UAE [United Arab Emirates] & Egypt,” according to the report. The report said despite a growing number of influence operations and their growing sophistication, many of them are being identified and taken down more quickly than in the past. But Nathaniel Gleicher, the head of Facebook security policy, said the social media platform can only do so much by itself. “Countering IO is a whole-of-society challenge. Defenders are most effective when gov’ts, industry, and civil society work together,” Gleicher wrote on Twitter. “We know threat actors are continuing to innovate, so we can’t take our foot off the gas now,” he added. “We have to keep pressing to stay ahead of adversarial innovation in 2021 and beyond.” 
 

WhatsApp Files Lawsuit in India over New Laws That Impact User Privacy

WhatsApp has filed a lawsuit challenging the Indian government’s new rules that require the Facebook-owned messaging platform to make people’s messages traceable, a move it says would undermine the privacy of users.The lawsuit was filed as India brought sweeping new regulations into force on Wednesday to make social media and technology companies, that have tens of millions of users in the country, more accountable for content on their platform.One of the new rules would require messaging platforms to identify the “first originator of information” when authorities demand it. WhatsApp wants that regulation blocked saying that it undermines citizens’ fundamental right to privacy.In a statement issued after the lawsuit was filed, the government said it respects the right to privacy as a fundamental right but “no Fundamental Right, including the Right to Privacy, is absolute and it is subject to reasonable restrictions.”The statement by the Ministry of Electronics and Information Technology said the requirement to disclose the origin of a particular message will only arise in the case of “prevention, investigation or punishment” of very serious offences.With over 40 million users, India is one of the biggest markets for the messaging platform. It has said that it is committed to protecting the privacy of people’s personal messages.“Technology and privacy experts have determined that traceability breaks end-to-end encryption and would severely undermine the privacy of billions of people who communicate digitally,” WhatsApp says in a blog post on its website. It said that a government “that chooses to mandate traceability is effectively mandating a new form of mass surveillance.”Technology experts in New Delhi called the lawsuit by WhatsApp significant.“This is one of the most significant lawsuits for privacy and it has implications not just for Indian users but globally. What will be debated in court is — can privacy of all users be compromised because there might be a legitimate demand from law enforcement agencies for information on one user or one message,” said Nikhil Pahwa, a digital rights activist and founder of technology publication Medianama. “Basically many governments around the world don’t want these kind of encrypted platforms because these platforms are blind to them and do not allow mass surveillance.”FILE – Rohitash Repswal, a digital marketer, shows a software tool that appears to automate the process of sending messages to WhatsApp users, on a screen inside his office in New Delhi, India, May 8, 2019.The sweeping new rules that were announced in February give the government more power to order social media companies, digital media and streaming platforms to remove content that it considers unlawful and require them to help with police investigations in identifying people who post “misinformation.” The employees of the companies in India can be held criminally liable for failing to comply with the government’s requests.Social media companies in India have been facing a tougher environment as the government seeks to regulate content posted online, which has become one of the most important spaces to express dissenting views.A spokesman for the opposition Congress Party, Abhishek Manu Singhvi, said the new rules were “extremely dangerous” for free speech and creativity, “unless extreme restraint is exercised” in implementing them.Critics accuse the government of trying to stifle online criticism and point to its requests to Twitter last month to remove several tweets including some that were critical of the government’s handling of the pandemic ravaging India. The government had said the messages could incite panic and were misinformation.Police also turned up at the local offices of Twitter in New Delhi on Monday to serve notice to the company concerning an investigation into the tagging of some government official’s tweets as “manipulated media.” 

Gaza-based Journalists in Hamas Chat Blocked From Facebook-owned WhatsApp

A few hours after the latest cease-fire took effect in the Gaza Strip, a number of Palestinian journalists in the coastal enclave found they were blocked from accessing WhatsApp messenger — a crucial tool used to communicate with sources, editors and the world beyond the blockaded strip.  The Associated Press reached out to 17 journalists in Gaza who confirmed their Whatsapp accounts had been blocked since Friday. By midday Monday, only four journalists — working for Al Jazeera — confirmed their accounts had been restored.The incident marks the latest puzzling move concerning WhatsApp’s owner Facebook Inc. that’s left Palestinian users or their allies bewildered as to why they’ve been targeted by the company, or if indeed they’d been singled out for censorship at all.Twelve of the 17 journalists contacted by the AP said they had been part of a WhatsApp group that disseminates information related to Hamas military operations. Hamas, which rules over the Gaza Strip, is viewed as a terrorist organization by Israel and the United States, where WhatsApp owner Facebook is headquartered.It’s unclear if the journalists were targeted because they’d been following that group’s announcements on WhatsApp.  Hamas runs Gaza’s Health Ministry, which has a WhatsApp group followed by more than 80 people, many of them journalists. That group, for example, has not been blocked.  Hassan Slaieh, a freelance journalist in Gaza whose WhatsApp account is blocked, said he thinks his account might have been targeted because he was on a group called Hamas Media.”This has affected my work and my income because I lost conversations with sources and people,” Slaieh said.  Al Jazeera’s chief correspondent in Gaza, Wael al-Dahdouh, said his access to WhatsApp was blocked around dawn on Friday before it was reinstated Monday. He said journalists subscribe to Hamas groups only to get information needed to do journalistic work.A WhatsApp spokesperson said the company bans accounts to comply with its policies “to prevent harm as well as applicable law.” The company said it has been in touch with media outlets over the last week about its practices. “We will reinstate journalists if any were impacted,” the company said.  Israeli Missiles Destroy Gaza Building Housing Foreign Media OutletsAssociated Press says the ‘world will know less about’ escalating violence in Gaza because of attack on buildingAl Jazeera said that when it sought information regarding its four journalists in Gaza impacted by the blockage, they were told by Facebook that the company had blocked the numbers of groups based out of Gaza and consequently the cell phone numbers of Al Jazeera journalists were part of the groups they had blocked.Among those affected by the WhatsApp blockage are two Agence France-Presse journalists. The Paris-based international news service told the AP it is working with WhatsApp to understand what the problem is and to restore their accounts.The 11-day war caused widespread destruction across Gaza  with 248 Palestinians, including 66 children and 39 women, killed in the fighting. Israel says 12 people in Israel, including two children, also died.It’s not the first time journalists have been suddenly barred from WhatsApp. In 2019, a number of journalists in Gaza had their accounts blocked without explanation. The accounts of those working with international media organizations were restored after contacting the company.  Facebook and its photo and video-sharing platform Instagram were criticized this month for removing posts and deleting accounts by users posting about protests against efforts to evict Palestinians from their homes in east Jerusalem’s Sheikh Jarrah neighborhood. It prompted  an open letter signed by 30 organizations demanding to know why the posts had been removed.Gaza Diary: Shouts, a Hurried Evacuation, and Then the Bombs Came AP journalist details the destruction of the building housing his officesThe New York Times also reported that some 100 WhatsApp groups were used by Jewish extremists in Israel for the purpose of committing violence against Palestinian citizens of Israel.  WhatsApp said it does not have access to the contents of people’s personal chats, but that they ban accounts when information is reported they believe indicates a user may be involved in causing imminent harm. The company said it also responds to “valid legal requests from law enforcement for the limited information available to us.”The Arab Center for the Advancement of Social Media, or 7amleh, said in a report published this month that Facebook accepted 81% of requests made by Israel’s Cyber Unit to remove Palestinian content last year. It found that in 2020, Twitter suspended dozens of accounts of Palestinian users based on information from the Israeli Ministry of Strategic Affairs.Al-Dahdouh, the Al Jazeera correspondent, said although his account was restored, his past history of chats and messages was erased.  “The groups and conversations were back, but content is erased, as if you are joining a new group or starting a new conversation,” he said. “I have lost information, images, numbers, messages and communications.”Al Jazeera said its journalists in Gaza had their WhatsApp accounts blocked by the host without prior notification.”Al Jazeera would like to strongly emphasize that its journalists will continue to use their WhatsApp accounts and other applications for newsgathering purposes and personal communication,” the news network told the AP. “At no time, have Al Jazeera journalists used their accounts for any means other than for personal or professional use.”The Qatar-based news network’s  office in Gaza was destroyed during the war by Israeli airstrikes that took down the high-rise residential and office tower, which also housed The Associated Press offices. Press freedom groups accused the military, which claimed the building housed Hamas military intelligence, of trying to censor coverage of Israel’s offensive. The Israeli military telephoned a warning, giving occupants of the building one hour to evacuate.  Sada Social, a West Bank-based center tracking alleged violations against Palestinian content on social media, said it was collecting information on the number of Gaza-based journalists impacted by the latest WhatsApp decision.   

India, Twitter Dispute Intensifies Over Alleged ‘Manipulated Media’

Indian police officials say they visited Twitter’s Delhi and Gurgaon offices to serve notice to the company’s managing director concerning an investigation into the company tagging some government official’s tweets as “manipulated media.”Several leaders of Prime Minister Narendra Modi’s Bharatiya Janata Party (BJP) shared parts of a document they said was created by their main political opposition, Congress, which allegedly showed how it planned to hinder the government’s response to the coronavirus pandemic.Some have been critical of the government’s handling of the pandemic. The BJP has blamed state governments for the slow response and ignoring warnings by Modi of a second wave.Congress said the documents were fake and complained to Twitter, which tagged the posts as manipulated.Twitter tags posts as “manipulated media” “that include media (videos, audio, and images) that have been deceptively altered or fabricated.”Twitter has not commented on this case.Modi’s administration has reportedly ordered Twitter to take down posts critical of its handling of the coronavirus in recent months. It has also complained when those orders were not followed.India has been hit hard by a second wave of the pandemic in recent months. The country has reported nearly 27 million cases and over 300,000 deaths.The latest dispute between the Indian government and U.S. social media giants Twitter and Facebook come as a deadline nears for the platforms to comply with new government takedown requests.Officials have warned both companies that failure to comply with the new rules “could lead to loss of status and protections as intermediaries.”

Ransomware Moves from ‘Economic Nuisance’ to National Security Threat

The recent cyberattack on Colonial Pipeline, the operator of the largest petroleum pipeline in the U.S., shows how internet criminals are increasingly targeting companies and organizations for ransom in what officials and experts term a growing national security threat.These hackers penetrate victims’ computer systems with a form of malware that encrypts the files, then they demand payments to release the data. In 2013, a ransomware attack typically targeted a person’s desktop or laptop, with users paying $100 to $150 in ransom to regain access to their files, according to Michael Daniel, president and CEO of Cyber Threat Alliance.“It was a fairly minimal affair,” said Daniel, who served as cybersecurity coordinator on the National Security Council under U.S. President Barack Obama, at the RSA Cybersecurity Conference this week.In recent years, ransomware has become a big criminal enterprise. Last year, victim organizations in North America and Europe paid an average of more than $312,000 in ransom, up from $115,000 in 2019, according to a recent report by the cybersecurity firm Palo Alto Networks. The highest ransom paid doubled to $10 million last year while the highest ransom demand grew to $30 million, according to Palo Alto Networks.“Those are some very significant amounts of money,” Daniel said. “And it’s not just individuals being targeted but things like school systems.”Last year, some of the largest school districts in the U.S., including Clark County Public Schools in Nevada, Fairfax County Public Schools in Virginia and Baltimore County Public Schools in Maryland, FILE – In this Sept. 12, 2019, photo, County Sheriff Janis Mangum stands in a control room at the county jail in Jefferson, Ga. A ransomware attack in March took down the office’s computer system.Colonial’s payment wasn’t the largest ransom paid by a single organization. Last year, Garmin, the maker of the popular fitness tracker, reportedly FILE – In this Aug. 22, 2019, file photo, signs on a bank of computers tell visitors that the machines are not working at the public library in Wilmer, Texas. Twenty-two local governments in Texas were hit by ransomeware in August 2019.Last month, the U.S. Justice Department created a task force to develop strategies to combat ransomware.“This is something we’re acutely focused on,” Monaco said.In a report to the Biden administration last month, an industry-backed task force called for a more aggressive response to ransomware.“It will take nothing less than our total collective effort to mitigate the ransomware scourge,” the task force wrote.In a typical ransomware attack, hackers lock a user’s or company’s data, offering keys to unlock the files in exchange for a ransom.But over the past year, hackers have adopted a new extortion tactic. Instead of simply encrypting a user’s files for extortion, cyber actors “exfiltrate” data, threatening to leak or destroy it unless a ransom is paid.Using dedicated leak sites, the hackers then release the data slowly in an effort “to increase pressure on the victim organization to pay the extortion, rather than posting all of the exfiltrated data at once.”In March, cybercriminals used this method when they encrypted a large Florida public school district’s servers and stole more than 1 terabyte of sensitive data, demanding $40 million in return.“If this data is published you will be subject to huge court and government fines,” the Conti cybercrime gang warned a Broward County Public Schools official.The district refused to pay.Cybersecurity experts have a term for this tactic: double extortion. The method gained popularity during the COVID-19 pandemic as cyber criminals used it to extort hospitals and other critical service providers.“They’re looking to increase the cost to the victim,” Meyers said at the RSA conference.Recent attacks show cyber criminals are upping their game. In October, hackers struck Finnish psychotherapy service Vastaamo, stealing the data of 400 employees and about 40,000 patients. The hackers not only demanded a ransom from Vastaamo but also smaller payments from individual patients.This was the first notable case of a disturbing new trend in ransomware attacks, according to researchers at Check Point.“It seems that even when riding the wave of success, threat groups are in constant quest for more innovative and more fruitful business models,” the researchers wrote.

App Store Would Be ‘Toxic’ Mess Without Control, Apple CEO Says

Apple’s online marketplace would become a “toxic” mess if the iPhone maker were forced to allow third-party apps without reviewing them, chief executive Tim Cook said in testimony at a high-stakes trial challenging the company’s tight control of its platform.Cook, the last scheduled witness in the case brought by Fortnite maker Epic Games, delivered a strong defense of Apple’s procedures for reviewing and approving all the apps it offers for iPhone and iPad users.”We could no longer make the promise … of privacy, safety and security,” Cook said under questioning from Apple attorney Veronica Moye in federal court in California.Cook said Apple’s review process helps keep out malicious software and other problematic apps, helping create a safe place for consumers.Without this review, the online marketplace “would become a toxic kind of mess,” he said.”It would also be terrible for the developer, because the developer depends on the store being a safe and trusted place.”Cook’s testimony caps a high-profile trial which opened earlier this month in which Apple is accused of abusing a monopoly on its marketplace by creating a “walled garden” that squeezes app makers.’Not about money’Under cross-examination, Cook sparred with Epic lawyer Gary Bornstein about the profitability of the App Store.Cook disputed Epic’s contention that its profit margin on apps was some 80%, but the exact figure was not disclosed in court due to confidentiality.The Apple executive said the proprietary payments system challenged by Epic was about convenience for consumers, more than about profits.”We always put the user at the center of everything we do,” Cook said. “It has nothing to do with money.”During his testimony, Cook defended Apple’s policy of barring apps directing consumers to other platforms to purchase subscriptions or credits for games and other services.”It would be akin to Best Buy advertising that you can go across the street to the Apple Store to buy an iPhone,” he said.Epic, maker of the popular Fortnite video game, is seeking to force Apple to open up the marketplace to third parties seeking to circumvent Apple’s procedures and commissions of up to 30%.Apple booted Fortnite from its App Store last year after Epic dodged revenue sharing with the iPhone maker.Apple does not allow users of its popular devices to download apps from anywhere but its App Store, and developers have to use Apple’s payment system, which takes its cut.The Epic lawyer also questioned Cook about Apple’s arrangement with Google to be the default search engine for the iPhone maker’s Safari browser, another area scrutinized by antitrust officials.Cook acknowledged that Google pays for this position but added that Apple made the arrangement “in the best interest of the user.”The case before District Court Judge Yvonne Gonzalez Rogers in Oakland comes with Apple feeling pressure from a wide range of app makers over its control of the App Store, which critics say represents monopolistic behavior.The European Union has formally accused Apple of unfairly squeezing out music streaming rivals based on a complaint brought by Sweden-based Spotify and others, which claim the California group sets rules that favor its own Apple Music.A recently formed Coalition for App Fairness, which includes both Spotify and Epic, have called for Apple to open up its marketplace, claiming its commission is a “tax” on rivals.Closing arguments in the bench trial in California were expected early next week, with the judge expected to rule within several weeks.

South Korea Seeks Tax Cuts, Incentives for US Investment

South Korea requested from the United States incentives such as tax deductions and infrastructure construction to ease the U.S. investment of Korean firms, including leading chipmaker Samsung Electronics, its presidential office said Friday.South Korean President Moon Jae-in, in Washington for a summit with U.S. President Joe Biden, told a gathering of U.S. Secretary of Commerce Gina Raimondo, her South Korean counterpart and CEOs of Qualcomm, Samsung and other companies that both countries can benefit by strengthening supply chain cooperation.Biden has advocated for support for the U.S. chip industry amid a global chip shortage that has hit automakers and other industries.He met with executives from major companies including Samsung in April and previously announced plans to invest $50 billion in semiconductor manufacturing and research.Samsung plans to invest $17 billion for a new plant for chip contract manufacturing in the United States, South Korea’s presidential Blue House added in a statement, confirming plans previously reported.In February, documents filed with Texas state officials showed that Samsung is considering Austin, Texas, as one of the sites for a new $17 billion chip plant that the South Korean firm said could create 1,800 jobs.There has been no new public documentation filed on the potential Texas chip plant application since March, the website for the Texas Comptroller of Public Accounts showed Friday.The U.S. Department of Commerce and the Korean industry ministry agreed Friday that for continuous chip industry cooperation, policy measures such as incentive support, joint research and development, cooperation on setting standards, and manpower training and exchange are needed, the Blue House said.Meanwhile, DuPont announced plans to establish an R&D center in South Korea to develop original chip technologies such as photoresist for extreme ultraviolet (EUV) lithography, the Blue House said.