Picture of the Week. Synacktiv wins this year's CanSecWest Pwn2Own GitHub: Mistakes happen DDoS for Hire. . .Or Not 144,000 malicious packages published No iPhones For Russian Presidential Staff I NUIT Edge Gets Crypto Microsoft's Email Extortion Show Notes: https://www.grc.com/sn/sn-916-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com kolide.com/securitynow Melissa.com/twit
The First Amendment prohibits the U.S. government from censoring speech. In this episode, drawing from internal Twitter documents known as “the Twitter files” and Congressional testimony from tech executives, former Twitter employees, and journalists, we examine the shocking formal system of censorship in which government employees are using their influence over private companies to indirectly censor speech in a way that they are clearly prohibited from doing directly. Please Support Congressional Dish – Quick Links Contribute monthly or a lump sum via PayPal Support Congressional Dish via Patreon (donations per episode) Send Zelle payments to: Donation@congressionaldish.com Send Venmo payments to: @Jennifer-Briney Send Cash App payments to: $CongressionalDish or Donation@congressionaldish.com Use your bank's online bill pay function to mail contributions to: 5753 Hwy 85 North, Number 4576, Crestview, FL 32536. Please make checks payable to Congressional Dish Thank you for supporting truly independent media! View the shownotes on our website at https://congressionaldish.com/cd270-the-twitter-files Background Sources Recommended Congressional Dish Episodes CD224: Social Media Censorship CD141: Terrorist Gifts & The Ministry of Propaganda (2017 NDAA) CD113: CISA is Law The Twitter Files "Capsule Summaries of all Twitter Files Threads to Date, With Links and a Glossary.” Matt Taibbi. Jan 4, 2023. Racket News. Matt Taibbi “The Democrats' Disastrous Miscalculation on Civil Liberties.” Matt Taibbi. Mar 12, 2023. Racket News. “#1940 - Matt Taibbi.” Feb 13, 2023. The Joe Rogan Experience. Hunter Biden Laptop Story “Smoking-gun email reveals how Hunter Biden introduced Ukrainian businessman to VP dad.” “13. They did the same to Facebook, according to CEO Mark Zuckerberg. ‘The FBI basically came to us [and] was like, “Hey... you should be on high alert. We thought that there was a lot of Russian propaganda in 2016 election. There's about to be some kind of dump similar to that”'” [tweet]. Michael Shellenberger [@ShellenbergerMD]. Dec 19, 2022. Twitter. Influence, Propaganda, and Censorship “From the Twitter Files: Pfizer board member Scott Gottlieb secretly pressed Twitter to hide posts challenging his company's massively profitable Covid jabs.” Alex Berenson. Jan 9, 2023. Unreported Truths. “Twitter Aided the Pentagon in Its Covert Online Propaganda Campaign.” Lee Fang. December 20, 2022. The Intercept. “Facebook, Twitter dismantle a U.S. influence campaign about Ukraine.” Aug 24, 2022. The Washington Post. Angus King Takedown Request Spreadsheet Audio Sources Hearing on the Weaponization of the Federal Government, the Twitter Files March 9, 2023 House Judiciary Committee, Subcommittee on the Weaponization of the Federal Government Witnesses: Matt Taibbi, Journalist Michael Shellenberger, Author, Co-founder of the Breakthrough Institute and the California Peace Coalition Clips 17:20 Rep. Jim Jordan (R-OH): In the run up to the 2020 Presidential election, FBI Special Agent Elvis Chan, in his deposition in Missouri versus Biden, said that he repeatedly, repeatedly, informed Twitter and other social media platforms of the likelihood of a hack and leak operation in the run up to that Presidential election. He did it even though there was no evidence. In fact, he said in his deposition that we hadn't seen anything, no intrusions, no hack, yet he repeatedly told them something was common. Yoel Ross, Head of Trust and Safety at Twitter, testified that he had had regular meetings with the Office of the Director of National Intelligence, the Department of Homeland Security, the FBI, and other folks regarding election security. During these weekly meetings, federal law enforcement agencies communicated that they expected a hack and leak operation. The expectations of a hack and leak operation were discussed throughout 2020. And he was told they would occur in a period shortly before the 2020 Presidential election, likely in October. And finally, he said "I also learned in these meetings, that there were rumors that a hack and leak operation would involve Hunter Biden." So what did the government tell him? A hack and leak operation was coming. How often did the government tell him this? Repeatedly for a year. When did the government say it was going to happen? October of 2020. And who did the government say it would involve? Hunter Biden. 19:35 Rep. Jim Jordan (R-OH): How did they know? Maybe it's because they had the laptop and they had had it for a year. 21:50 Rep. Jim Jordan (R-OH): Finally, as if on cue, five days later on October 19, 51 former intel[ligence] officials signed a letter with a now famous sentence "the Biden laptop story has all the classic earmarks of a Russian information operation." Something that was absolutely false. 25:25 Rep. Stacey Plaskett (D-VI): And the Republicans have brought in two of Elon Musk's public scribes to release cherry-picked, out-of-context emails and screenshots designed to promote his chosen narrative, Elon Musk's chosen narrative, that is now being paroted by the Republicans, because the Republicans think that these witnesses will tell a story that's going to help them out politically. 25:50 Rep. Stacey Plaskett (D-VI): On Tuesday, the majority released an 18 page report claiming to show that the FTC is quote, "harassing" Twitter -- oh my poor Twitter -- including by seeking information about its interactions with individuals before us today. How did the report reach this conclusion? By showing two single paragraphs from a single demand letter, even though the report itself makes clear that there were numerous demand letters with numerous requests, none of which we've been able to see, that are more demand letters and more requests of Twitter. 28:05 Rep. Stacey Plaskett (D-VI): Mr. Chairman, Americans can see through this. Musk is helping you out politically and you're going out of your way to promote and protect him and to praise him for his work. 28:15 Rep. Stacey Plaskett (D-VI): This isn't just a matter of what data was given to these so-called journalists before us now. 31:35 Rep. Stacey Plaskett (D-VI): Mr. Chairman, I'm not exaggerating when I say that you have called before you two witnesses who pose a direct threat to people who oppose them. 32:30 Rep. Stacey Plaskett (D-VI): We know this is because at the first hearing, the Chairman claimed that big government and big tech colluded to shape and mold the narrative and suppress information and censor Americans. This is a false narrative. We're engaging in false narratives here and we are going to tell the truth. 37:35 Michael Shellenberger: I recognize that the law allows Facebook, Twitter, and other private companies to moderate content on their platforms and I support the right of governments to communicate with the public, including to dispute inaccurate information, but government officials have been caught repeatedly pushing social media platforms to censor disfavored users and content. Often these acts of censorship threaten the legal protection social media companies need to exist, Section 230. If government officials are directing or facilitating such censorship, and as one law professor, it raises serious First Amendment questions. It is axiomatic that the government cannot do indirectly what it is prohibited from doing directly. 41:50 Matt Taibbi: My name is Matt Taibbi, I've been a reporter for 30 years and a staunch advocate of the First Amendment. Much of that time was spent at Rolling Stone magazine. Ranking Member Plaskett, I'm not a "so-called" journalist. I've won the National Magazine Award, the I.F Stone Award for Independent Journalism, and I've written 10 books, including four New York Times bestsellers. 45:35 Matt Taibbi: Ordinary Americans are not just being reported to Twitter for deamplification or deplatforming, but to firm's like Pay Pal, digital advertisers like Xandr, and crowdfunding sites like GoFundMe. These companies can and do refuse service to law abiding people and businesses whose only crime is falling afoul of a distant, faceless, unaccountable, algorithmic judge. 44:00 Matt Taibbi: Again, Ranking Member Plaskett, I would note that the evidence of Twitter-government relationship includes lists of tens of thousands of names on both the left and right. The people affected include Trump supporters, but also left leaning sites like Consortium and Truthout, the leftist South American channel TeleSUR, the Yellow Vest movement. That, in fact, is a key point of the Twitter files, that it's neither a left nor right issue. 44:40 Matt Taibbi: We learned Twitter, Facebook, Google and other companies developed a formal system for taking in moderation requests from every corner of government from the FBI, the DHS, the HHS, DOD, the Global Engagement Center at [the Department of] State, even the CIA. For every government agency scanning Twitter, there were perhaps 20 quasi private entities doing the same thing, including Stanford's Election Integrity Partnership, Newsguard, the Global Disinformation Index, and many others, many taxpayer funded. A focus of this fast growing network, as Mike noted, is making lists of people whose opinions beliefs, associations, or sympathies are deemed misinformation, disinformation or malinformation. That last term is just a euphemism for true but inconvenient. Undeniably, the making of such lists is a form of digital McCarthyism. 1:01:00 Matt Taibbi: So, a great example of this is a report that the Global Engagement Center sent to Twitter and to members of the media and other platforms about what they called "the Pillars of Russian Disinformation." Now, part of this report is what you would call, I think you would call, traditional hardcore intelligence gathering where they made a reasoned, evidence baseed case that certain sites were linked to Russian influence or linked to the Russian government. In addition to that, however, they also said that sites that quote, "generate their own momentum," and have opinions that are in line with those accounts are part of a propaganda ecosystem. Now, this is just another word for guilt by association. And this is the problem with the whole idea of trying to identify which accounts are actually the Internet Research Agency and which ones are just people who follow those accounts or retweeted them. Twitter initially did not find more than a handful of IRA accounts. It wasn't until they got into an argument with the Senate Select Intelligence Committee that they came back with a different answer. 1:06:00 Rep. Debbie Wasserman-Schultz (D-FL): Before you became Elon Musk's handpicked journalists, and pardon the oxymoron, you stated this on Joe Rogan's podcast about being spoon fed information. And I quote, "I think that's true of any kind of journalism," and you'll see it behind me here. "I think that's true of any kind of journalism. Once you start getting handed things, then you've lost. They have you at that point and you got to get out of that habit. You just can't cross that line." Do you still believe what you told Mr. Rogan? Yes or no? Yes or no? Matt Taibbi: Yes. Rep. Debbie Wasserman-Schultz (D-FL): Good. Now, you crossed that line with the Twitter files. Matt Taibbi: No. Rep. Debbie Wasserman-Schultz (D-FL): Elon Musk -- It's my time, please do not interrupt me. Crowd: [laughter] Rep. Debbie Wasserman-Schultz (D-FL): Elon Musk spoon fed you his cherry-picked information, which you must have suspected promotes a slanted viewpoint, or at the very least generates another right wing conspiracy theory. 1:11:20 Matt Taibbi: That moment on the Joe Rogan show, I was actually recounting a section from Seymour Hersh's book, Reporter, where he described a scene where the CIA gave him a story and he was very uncomfortable. He said that "I, who had always gotten the secrets, was being handed the secrets." Again, I've done lots of whistleblower stories. There's always a balancing test that you make when you're given material, and you're always balancing newsworthiness versus the motives of your sources. In this case, the newsworthiness clearly outweighed any other considerations. I think everybody else who worked on the project agrees. 1:14:45 Rep. Dan Bishop (R-NC): Richard Stengel, you know who that is? Matt Taibbi: Yes, he's the former, the first head of the Global Engagement Center. Rep. Dan Bishop (R-NC): I want the American people to hear from him for 30 seconds. Richard Stengel: Basically, every country creates their own narrative story. And, you know, my old job at the State Department was what people used to joke as the "chief propagandist" job. We haven't talked about propaganda. Propaganda. I'm not against propaganda. Every country does it, and they have to do it to their own population. 1:24:20 Rep. Jim Jordan (R-OH): December 13, the very first letter that the FTC sends to Twitter after the Twitter files, 11 days after the first Twitter file, there have been five of them come out, the FTC's first demand in that first letter after the Twitter files come out is identify all journalists. I'm quoting "identify all journalists and other members of the media" to whom Twitter worked with. You find that scary, Mr. Taibbi, that you got a federal government agency asking a private company who in the press are you talking with? Matt Taibbi: I do find it scary. I think it's none of the government's business which journalists a private company talks to and why. I think every journalist should be concerned about that. And the absence of interest in that issue by my fellow colleagues in the mainstream media is an indication of how low the business has sunk. There was once a real esprit de corps and camaraderie within Media. Whenever one of us was gone after, we all kind of rose to the challenge and supported -- Rep. Jim Jordan (R-OH): It used to be, used to be the case. Matt Taibbi: Yeah, that is gone now. 1:28:50 Rep. Stacey Plaskett (D-VI): How many emails did Mr. Musk give you access to? Michael Shellenberger: I mean, we went through thousands of emails. Rep. Stacey Plaskett (D-VI): Did he give you access to all of the emails for the time period in which? Michael Shellenberger: We never had a single, I never had a single request denied. And not only that, but the amount of files that we were given were so voluminous that there was no way that anybody could have gone through them beforehand. And we never found an instance where there was any evidence that anything had been taken out. Rep. Stacey Plaskett (D-VI): Okay. So you would believe that you have probably millions of emails and documents, right? That's correct, would you say? Michael Shellenberger: I don't know if -- I think the number is less than that. Matt Taibbi: Millions sounds too high. Rep. Stacey Plaskett (D-VI): Okay. 100,000? Matt Taibbi: That's probably closer. Michael Shellenberger: Probably, yeah. Rep. Stacey Plaskett (D-VI): So 100,000 that both of you were seeing. 1:37:10 Matt Taibbi: There were a couple of very telling emails that wepublished. One was by a lawyer named [Sasha Cardiel???], where the company was being so overwhelmed by requests from the FBI and in fact they, they gave each other a sort of digital High Five after one batch, saying "that was a monumental undertaking to clear all of these," but she noted that she believed that the FBI was essentially doing word searches keyed to Twitter's Terms of Service, looking for violations of the Terms of Service, specifically so that they could make recommendations along those lines, which we found interesting. 1:48:15 Michael Shellenberger: And we haven't talked about Facebook, but we now know that we have the White House demanding that Facebook take down factual information and Facebook doing that. 1:48:25 Michael Shellenberger: And with Matt [Taibbi]'s thread this morning we saw the government contractors demanding the same thing of Twitter: accurate information, they said, that needed to be taken down in order to advance a narrative. 1:49:55 Matt Taibbi: You know, in conjunction with our own research, there's a foundation, the Foundation for Freedom Online, which, you know, there's a very telling video that they uncovered where the Director of Stanford's Election Integrity Partnership (EIP) talks about how CISA, the DHS agency, didn't have the capability to do election monitoring, and so that they kind of stepped in to "fill the gaps" legally before that capability could be amped up. And what we see in the Twitter files is that Twitter executives did not distinguish between DHS or CISA and this group EIP, for instance, we would see a communication that said, from CISA, escalated by EIP. So they were essentially identical in the eyes of the company. EIP is, by its own data, and this is in reference to what you brought up, Mr. Congressman, according to their own data, they significantly targeted more what they call disinformation on the right than on the left, by a factor I think of about ten to one. And I say that as not a Republican at all, it's just the fact of what we're looking at. So yes, we have come to the realization that this bright line that we imagine that exists between, say the FBI or the DHS, or the GEC and these private companies is illusory and that what's more important is this constellation of kind of quasi private organizations that do this work. 1:52:10 Rep. Sylvia Garcia (D-TX): What was the first time that Mr. Musk approached you about writing the Twitter files? Matt Taibbi: Again, Congresswoman that would — Rep. Sylvia Garcia (D-TX): I just need a date, sir. Matt Taibbi: But I can't give it to you, unfortunately, because this this is a question of sourcing, and I don't give up... I'm a journalist, I don't reveal my sources. Rep. Sylvia Garcia (D-TX): It's a question of chronology. Matt Taibbi: No, that's a question of sourcing — Rep. Sylvia Garcia (D-TX): Earlier you said that someone had sent you, through the internet, some message about whether or not you would be interested in some information. Matt Taibbi: Yes. And I refer to that person as a source. Rep. Sylvia Garcia (D-TX): So you're not going to tell us when Musk first approached you? Matt Taibbi: Again, Congresswoman, you're asking me, you're asking a journalist to reveal a source. Rep. Sylvia Garcia (D-TX): You consider Mr. Musk to be the direct source of all this? Matt Taibbi: No, now you're trying to get me to say that he is the source. I just can't answer — Rep. Sylvia Garcia (D-TX): Either he is or he isn't. If you're telling me you can't answer because it's your source, well, then the only logical conclusion is that he is in fact, your source. Matt Taibbi: Well, you're free to conclude that. Rep. Sylvia Garcia (D-TX): Well, sir, I just don't understand. You can't have it both ways. But let's move on because -- Unknown Representative 1: No, he can. He's a journalist. Unknown Representative 2: He can't, because either Musk is the source and he can't talk about it, or Musk is not the source. And if Musk is not the source, then he can discuss [unintelligible] Rep. Jim Jordan (R-OH): No one has yielded, the gentlelady is out of order, you don't get to speak — Multiple speakers: [Crosstalk] Rep. Jim Jordan (R-OH): The gentlelady is not recognized...[crosstalk]...he has not said that, what he has said is he's not going to reveal his source. And the fact that Democrats are pressuring him to do so is such a violation of the First Amendment. Multiple speakers: [Crosstalk] Rep. Sylvia Garcia (D-TX): I have not yielded time to anybody. I want to reclaim my time. And I would ask the chairman to give me back some of the time because of the interruption. Mr. Chairman, I am asking you, if you will give me the seconds that I lost. Rep. Jim Jordan (R-OH): We will give you that 10 seconds. Rep. Sylvia Garcia (D-TX): Thank you. Now let's talk about another item. When you responded to the ranking member, you said that you had free license to look at everything but yet you yourself posted on your...I guess it's kind of like a web page...I don't quite understand what Substack is, but what I can say is that "in exchange for the opportunity to cover a unique and explosive story, I had to agree to certain conditions." What were those conditions? She asked you that question and you said you had none. But you yourself posted that you had conditions? Matt Taibbi: The conditions, as I've explained multiple times -- Rep. Sylvia Garcia (D-TX): No sir, you have not explained, you told her in response to her question that you had no conditions. In fact, you used the word licensed, that you were free to look at all of them. All 100,000 emails. Matt Taibbi: The question was posed, was I free to to write about — Rep. Sylvia Garcia (D-TX): Sir, did you have any conditions? Matt Taibbi: The condition was that we publish — Rep. Sylvia Garcia (D-TX): Sir, did you have any conditions? Yes or no? A simple question. Matt Taibbi: Yes. Rep. Sylvia Garcia (D-TX): All right. Could you tell us what conditions those were? Matt Taibbi: The conditions were an attribution of sources at Twitter and that we break any news on Twitter. Rep. Sylvia Garcia (D-TX): But you didn't break it on Twitter. Did you send the file that you released today to Twitter first? Matt Taibbi: Did I send the...actually I did, yes. Rep. Sylvia Garcia (D-TX): Did you send it to Twitter first? Matt Taibbi: The Twitter files thread? Rep. Sylvia Garcia (D-TX): That was one of the conditions? Yes or no, sir. Matt Taibbi: The Twitter files thread actually did come out first. Rep. Sylvia Garcia (D-TX): But sir, you said earlier that you had to attribute all the sources to Twitter first. What you released today, did you send that to Twitter first? Matt Taibbi: No, no, no, I post I posted it on Twitter Rep. Sylvia Garcia (D-TX): First. First, sir, or did you give it to the Chairman of the Committee or the staff of the Committee first? Matt Taibbi: Well, that's not breaking the story, that's giving...I did give — Rep. Sylvia Garcia (D-TX): So you gave all the information that you did not give to the Democrats, you gave it to the Republicans first, then you put it on Twitter? Matt Taibbi: Actually, no, the chronology is a little bit confused. Rep. Sylvia Garcia (D-TX): Well then tell us what the chronology was. Matt Taibbi: I believe the thread came out first. Rep. Sylvia Garcia (D-TX): Where? Matt Taibbi: On Twitter Rep. Sylvia Garcia (D-TX): On Twitter. So then you afterwards gave it to the Republicans, and not the Democrats? Matt Taibbi: Yes, because I'm submitting it for the record as my statement. Rep. Sylvia Garcia (D-TX): Did you give it to him in advance? Matt Taibbi: I gave it to them today. Rep. Sylvia Garcia (D-TX): You gave it to them today, but you still have not given anything to the Democrats. Well, I'll move on. 1:57:20 Rep. Sylvia Garcia (D-TX): Now in your discussion, in your answer, you also said that you were invited by a friend, Bari Weiss? Michael Shellenberger: My friend, Bari Weiss. Rep. Sylvia Garcia (D-TX): So this friend works for Twitter, or what is her....? Matt Taibbi: She's a journalist. Rep. Sylvia Garcia (D-TX): Sir, I didn't ask you a question. I'm now asking Mr. Shellenberger a question. Michael Shellenberger: Yes, ma'am, Bari Weiss is a journalist. Rep. Sylvia Garcia (D-TX): I'm sorry, sir? Michael Shellenberger: She's a journalist. Rep. Sylvia Garcia (D-TX): She's a journalist. So you work in concert with her? Michael Shellenberger: Yeah. Rep. Sylvia Garcia (D-TX): Do you know when she first was contacted by Mr. Musk? Michael Shellenberger: I don't know. Rep. Sylvia Garcia (D-TX): You don't know. So you're in this as a threesome? 2:00:10 Michael Shellenberger: Reading through the whole sweep of events, I do not know the extent to which the influence operation aimed at "pre-bunking" the Hunter Biden laptop was coordinated. I don't know who all was involved. But what we saw was, you saw Aspen and Stanford, many months before then, saying don't cover the material in the hack and leak without emphasizing the fact that it could be disinformation. Okay, so they're priming journalists to not cover a future hack and leak in a way that journalists have long been trained to in the tradition of the Pentagon Papers, made famous by the Steven Spielberg movie. They were saying [to] cover the fact that it probably came from the Russians. Then you have the former General Counsel to the FBI, Jim Baker, and the former Deputy Chief of Staff to the FBI, both arriving at Twitter in the summer of 2020, which I find, what an interesting coincidence. Then, when the New York Post publishes its first article on October 14, it's Jim Baker who makes the most strenuous argument within Twitter, multiple emails, multiple messages saying this doesn't look real. There's people, there's intelligence experts, saying that this could be Russian disinformation. He is the most strenuous person inside Twitter arguing that it's probably Russian disinformation. The internal evaluation by Yoel Roth, who testified in front of this committee, was that it was what it looked to be, which was that it was not a result of a hack and leak operation. And why did he think that? Because the New York Post had published the FBI subpoena taking the laptop in December of 2019. And they published the agreement that the computer store owner had with Hunter Biden that gave him permission, after he abandoned the laptop, to use it however he wanted. So there really wasn't much doubt about the provenance of that laptop. But you had Jim Baker making a strenuous argument. And then, of course, you get to a few days after the October 14 release, you have the president of the United States echoing what these former intelligence community officials were saying, which is that it looked like a Russian influence operation. So they were claiming that the laptop was made public by the conspiracy theory that somehow the Russians got it. And basically, they convinced Yoel Roth of this wild hack and leak story that somehow the Russians stole it, got the information, gave us the computer, it was bizarre. So you read that chain of events, and it appears as though there is an organized influence operation to pre-bunk.... Rep. Jim Jordan (R-OH): Why do you think they could predict the time, the method, and the person? Why could the FBI predict it? Not only did they predict this, they predicted it, so did the Aspen Institute, seemed like everyone was in the know saying, here's what's gonna happen, we can read the future. Why do you think, how do you think they were able to do that? Michael Shellenberger: I think the most important fact to know is that the FBI had that laptop in December 2019. They were also spying on Rudy Giuliani when he got the laptop and when he gave it to the New York Post. Now, maybe the FBI agents who are going to Mark Zuckerberg at Facebook and Twitter executives and warning of a hack and leak, potentially involving Hunter Biden, maybe those guys didn't have anything to do with the guys that had the top. We don't know that. I have to say, as a newcomer to this, as somebody that thought it was Russian disinformation in 2020, everybody I knew thought it was Russian disinformation, I was shocked to see that series of events going on. It looks to me like a deliberate influence operation. I don't have the proof of it, but the circumstantial evidence is pretty disturbing. 2:14:30 Matt Taibbi: We found, just yesterday, a Tweet from the Virality Project at Stanford, which was partnered with a number of government agencies, and Twitter, where they talked explicitly about censoring stories of true vaccine side effects and other true stories that they felt encouraged hesitancy. Now the imp— Unknown Representative: So these were true. Matt Taibbi: Yes. So they use the word truth three times in this email, and what's notable about this is that it reflects the fundamental misunderstanding of this whole disinformation complex, anti-disinformation complex. They believe that ordinary people can't handle difficult truths. And so they think that they need minders to separate out things that are controversial or difficult for them, and that's again, that's totally contrary to what America is all about, I think. 2:17:30 Rep. Dan Goldman (D-NY): Of course we all believe in the First Amendment, but the First Amendment applies to government prohibition of speech, not to private companies. 2:33:00 Rep. Dan Goldman (D-NY): And even with, Twitter you cannot find actual evidence of any direct government censorship of any lawful speech. 2:33:20 Rep. Jim Jordan (R-OH): I'd ask unanimous consent to enter into the record the following email from Clarke Humphrey, Executive Office of the Presidency, White House Office, January 23, 2021. That's the Biden Administration. 4:39am: "Hey folks," this goes to Twitter, "Hey folks, wanted..." they used the term Mr. Goldman just used, "wanted to flag the below Tweet, and I'm wondering if we can get moving on the process for having it removed ASAP." 2:35:40 Rep. Mike Johnson (R-LA): He said the First Amendment applies to government censorship of speech and not private companies, but what we're talking about and what the Chairman just illustrated is that what we have here and what your Twitter files show is the Federal government has partnered with private companies to censor and silence the speech of American citizens. 2:29:20 Matt Taibbi: In the first Twitter files, we saw an exchange between Representative Ro Khanna and Vijaya Gadde, where he's trying to explain the basics of speech law in America and she's completely, she seems completely unaware of what, for instance, New York Times v. Sullivan is. There are other cases like Bartnicki v. Vopper, which legalized the publication of stolen material, that's very important for any journalists to know. I think most of these people are tech executives, and they don't know what the law is around speech and around reporting. And in this case, and in 2016, you are dealing with true material. There is no basis to restrict the publication of true material no matter who the sources and how you get it. And journalists have always understood that and this has never been an issue or a controversial issue until very recently. 2:44:40 Rep. Kat Cammack (R-FL): Would you agree that there was a black list created in 2021? Michael Shellenberger: Sorry, yes, Jay Bhattacharya, the Stanford Professor, who I don't think anybody considers a fringe epidemiologist, was indeed -- I'm sorry, I couldn't, I didn't piece it together -- he was indeed visibility filtered. Rep. Kat Cammack (R-FL): Correct. And so this blacklist that was created, that really was used to de-platform, reduce visibility, create lists internally, where people couldn't even see their profiles, that was used against doctors and scientists who produced information that was contrary to what the CDC was putting out, despite the fact that we now know that what they were publishing had scientific basis and in fact was valid. Michael Shellenberger: Absolutely. And not only that, but these are secret blacklists, so Professor Bhattacharya had no idea he was on it. 43:05 Matt Taibbi: The original promise of the internet was that it might democratize the exchange of information globally. A free internet would overwhelm all attempts to control information flow, its very existence a threat to anti-democratic forms of government everywhere. What we found in the Files was a sweeping effort to reverse that promise and use machine learning and other tools to turn the Internet into an instrument of censorship and social control. Unfortunately, our own government appears to be playing a lead role. We saw the first hints and communications between Twitter executives before the 2020 election, when we read things like "flagged by DHS," or "please see attached report from FBI for potential misinformation." This would be attached to an Excel spreadsheet with a long list of names, whose accounts were often suspended shortly after. #1940 - Matt Taibbi February 13, 2023 The Joe Rogan Experience Clips Matt Taibbi: So this is another topic that is fascinating because it hasn't gotten a ton of press. But if you go back all the way to the early 70s, the CIA and the FBI got in a lot of trouble for various things, the CIA for assassination schemes involving people like Castro, the FBI for, you know, COINTELPRO and other programs, domestic surveillance, and they made changes after Congressional hearings, the Church Committee, that basically said the FBI, from now on, you have to have some kind of reason to be following somebody or investigating somebody, you have to have some kind of criminal predicate and we want you mainly to be investigating cases. But after 9/11 they peeled all this back. There was a series of Attorney General memos that essentially re-fashioned what the FBI does, and now they don't have to be doing crimefighting all the time. Now they can be doing basically 100% intelligence gathering all the time. They can be infiltrating groups for no reason at all, not to build cases, but just to get information. And so that's why they're there. They're in these groups, they're posted up outside of the homes of people they find suspicious, but they're not building cases and they're not investigating crimes. It's sort of like Minority Report there, right? It's pre-crime. Matt Taibbi: We see reports in these files of government agencies sending lists of accounts that are accusing the United States of vaccine corruption. Now, what they're really talking about is pressuring foreign countries to not use generic vaccines. Right. And, you know, that's a liberal issue, that's a progressive issue. The progressives want generic vaccines to be available to poor countries, okay? But, you know, you can use this tool to eliminate speech about that if you want too, right? I think that's what they don't get is that the significance is not who [it's used against], the significance is the tool. What is it capable of doing, right? How easily is it employed, and you know, how often is it used? And they don't focus on that. Joe Rogan: Has anything been surprising to you? Matt Taibbi: A little bit. I think going into it, I thought that the relationship between the security agencies like the FBI and the DHS and companies like Twitter and Facebook, I thought it was a little bit less formal. I thought maybe they had kind of an advisory role. And what we find is that it's not that, it's very formalized. They have a really intense structure that they've worked out over a period of years where they have regular meetings. They have a system where the DHS handles censorship requests that come up from the States and the FBI handles international ones, and they all float all these companies and it's a big bureaucracy. I don't think we expected to see that. Matt Taibbi: I was especially shocked by an email from a staffer for Adam Schiff, the Congressperson, the California Congressman. And they're just outright saying we would like you to suspend the accounts of this journalist and anybody who retweets information about this Committee. You know, I mean, this is a member of Congress. Joe Rogan: Yeah. Matt Taibbi: Right? Most of these people have legal backgrounds. They've got lawyers in the office for sure. And this is the House Intelligence Committee. Protecting Speech from Government Interference and Social Media Bias, Part 1: Twitter's Role in Suppressing the Biden Laptop Story February 8, 2023 House Committee on Oversight and Accountability Witnesses: Vijaya Gadde, Former Chief Legal Officer, Twitter James Baker, Former Deputy General Counsel, Twitter Yoel Roth, Former Global Head of Trust & Safety, Twitter Annika Collier Navaroli, Former Policy Expert for Content Moderation, Twitter Clips 14:50 Rep. Jamie Raskin (D-MD): What's more, Twitter's editorial decision has been analyzed and debated ad nauseam. Some people think it was the right decision. Some people think it was the wrong decision. But the key point here is that it was Twitter's decision. Twitter is a private media company. In America, private media companies can decide what to publish or how to curate content however they want. If Twitter wants to have nothing but Tweets commenting on New York Post articles run all day, it can do that. If it makes such tweets mentioning New York Post never see the light of day they can do that too. That's what the First Amendment means. 16:05 Rep. Jamie Raskin (D-MD): Officially Twitter happens to think they got it wrong about that day or two period. In hindsight, Twitter's former CEO Jack Dorsey called it a mistake. This apology might be a statement of regret about the company being overly cautious about the risks of publishing contents and potentially hacked or stolen materials, or it may reflect craven surrender to a right wing pressure campaign. But however you interpreted the apology just makes the premise of this hearing all the more absurd. The professional conspiracy theorists who are heckling and haranguing this private company have already gotten exactly what they want: an apology. What more do they want? And why does the US Congress have to be involved in this nonsense when we have serious work to do for the American people? 26:20 James Baker: The law permits the government to have complex, multifaceted, and long term relationships with the private sector. Law enforcement agencies and companies can engage with each other regarding, for example, compulsory legal process served on companies, criminal activity that companies, the government, or the public identify, such as crimes against children, cybersecurity threats, and terrorism, and instances where companies themselves are victims of crime. When done properly, these interactions can be beneficial to both sides and in the interest of the public. As you Mr. Chairman, Mr. Jordan, and others have proposed, a potential workable way to legislate in this area may be to focus on the actions of federal government agencies and officials with respect to their engagement with the private sector. Congress may be able to limit the nature and scope of those interactions in certain ways, require enhanced transparency and reporting by the executive branch about its engagements, and require higher level approvals within the executive branch prior to such engagements on certain topics, so that you can hold Senate confirmed officials, for example, accountable for those decisions. In any event, if you want to legislate, my recommendation is to focus first on reasonable and effective limitations on government actors. Thank you, Mr. Chairman. 31:05 Vijaya Gadde: On October 14, 2020, The New York Post tweeted articles about Hunter Biden's laptop with embedded images that looked like they may have been obtained through hacking. In 2018, we had developed a policy intended to prevent Twitter from becoming a dumping ground for hacked materials. We applied this policy to the New York Post tweets and blocked links to the articles embedding those sorts of materials. At no point to Twitter otherwise prevent tweeting, reporting, discussing or describing the contents of Mr. Biden's laptop. People could and did talk about the contents of the laptop on Twitter or anywhere else, including other much larger platforms, but they were prevented from sharing the primary documents on Twitter. Still, over the course of that day, it became clear that Twitter had not fully appreciated the impact of that policy on free press and others. As Mr. Dorsey testified before Congress on multiple occasions, Twitter changed its policy within 24 hours and admitted its initial action was wrong. This policy revision immediately allowed people to tweet the original articles with the embedded source materials, relying on its long standing practice not to retroactively apply new policies. Twitter informed the New York Post that it could immediately begin tweeting when it deleted the original tweets, which would have freed them to retweet the same content again. The New York Post chose not to delete its original tweets, so Twitter made an exception after two weeks to retroactively apply the new policy to the Post's tweets. In hindsight, Twitter should have reinstated the Post account immediately. 35:35 Yoel Roth: In 2020, Twitter noticed activity related to the laptop that at first glance bore a lot of similarities to the 2016 Russian hack and leak operation targeting the DNC, and we had to decide what to do. And in that moment with limited information, Twitter made a mistake. 36:20 Yoel Roth: It isn't obvious what the right response is to a suspected, but not confirmed, cyber attack by another government on a Presidential Election. I believe Twitter erred in this case because we wanted to avoid repeating the mistakes of 2016. 38:41 Annika Collier Navaroli: I joined Twitter in 2019 and by 2020 I was the most senior expert on Twitter's U.S. Safety Policy Team. My team's mission was to protect free speech and public safety by writing and enforcing content moderation policies around the world. These policies include things like abuse, harassment, hate speech, violence and privacy. 41:20 Annika Collier Navaroli: With January 6 and many other decisions, content moderators like me did the very best that we could. But far too often there are far too few of us and we are being asked to do the impossible. For example, in January 2020 after the US assassinated an Iranian General and the US president decided to justify it on Twitter, management literally instructed me and my team to make sure that World War III did not start on the platform. 1:08:20 Rep. Nancy Mace (R-SC): Did the US government ever contact you or anyone at Twitter to censor or moderate certain Tweets, yes or no? Vijaya Gadde: We receive legal demands to remove content from the platform from the US government and governments all around the world. Those are published on a third party website. 1:12:00 Yoel Roth: The number one most influential part of the Russian active measures campaign in 2016 was the hack and leak targeting John Podesta. It would have been foolish not to consider the possibility that they would run that play again. 1:44:45 Yoel Roth: I think one of the key failures that we identified after 2016 was that there was very little information coming from the government and from intelligence services to the private sector. The private sector had the power to remove bots and to take down foreign disinformation campaigns, but we didn't always know where to look without leads supplied by the intelligence community. That was one of the failures highlighted in the Senate Intelligence Committee's report and in the Mueller investigation, and that was one of the things we set out to fix in 2017. Rep. Gerry Connolly (D-VA): On September 8 2019, at 11:11pm, Donald Trump heckled two celebrities on Twitter -- John Legend and his wife Chrissy Teigen -- and referred to them as "the musician John Legend and his filthy mouth wife." Ms. Teigen responded to that email [Tweet] at 12:17am. And according to notes from a conversation with you, Ms. Navaroli's, counsel, your counsel, the White House almost immediately thereafter contacted Twitter to demand the tweet be taken down. Is that accurate? Annika Collier Navaroli: Thank you for the question. In my role, I was not responsible for receiving any sort of request from the government. However, what I was privy to was my supervisors letting us know that we had received something along those lines or something of a request. And in that particular instance, I do remember hearing that we had received a request from the White House to make sure that we evaluated this tweet, and that they wanted it to come down because it was a derogatory statement towards the President. Rep. Gerry Connolly (D-VA): They wanted it to come down. They made that request. Annika Collier Navaroli: To my recollection, yes. Rep. Gerry Connolly (D-VA): I thought that was an inappropriate action by a government official, let alone the White House. But it wasn't Joe Biden, about his son's laptop. It was Donald Trump because he didn't like what Chrissy Teigen had to say about him, is that correct? Annika Collier Navaroli: Yes, that is correct. Rep. Gerry Connolly (D-VA): My, my, my. 1:45:15 Rep. Shontel Brown (D-OH): Mr. Roth, were those communication channels useful to Twitter as they work to combat foreign influence operations? Yoel Roth: Absolutely, I would say they were one of the most essential pieces of how Twitter prepared for future elections. 2:42:35 Rep. Becca Balint (D-VA): Ms. Gadde, did anyone from the Biden campaign or the Democratic National Committee direct Twitter to remove or take action against the New York Post story? Vijaya Gadde: No. 4:15:45 Rep. Kelly Armstrong (R-ND): And now we forward to 2020. And earlier you had testified that you were having regular interactions with National Intelligence, Homeland Security and the FBI. Yoel Roth: Yes, I did. Rep. Kelly Armstrong (R-ND): And primarily to deal with foreign interference? Yoel Roth: Primarily, but I would say -- Rep. Kelly Armstrong (R-ND): But you had said earlier your contact with Agent Chang was primarily with foreign interference? Yoel Roth: Yes, that's right. Rep. Kelly Armstrong (R-ND): And these were emails....were there meetings? Yoel Roth: Yes, Twitter met quarterly with the FBI Foreign Interference Task Force and we had those meetings running for a number of years to share information about malign foreign interference. Rep. Kelly Armstrong (R-ND): Agents from Homeland Security or Intelligence, or just primarily the FBI? Yoel Roth: Our primary contacts were with the FBI and in those quarterly meetings, they were, I believe, exclusively with FBI personnel. 4:18:05 Rep. Kelly Armstrong (R-ND): Earlier today you testified that you were following national security experts on Twitter as a reason to take down the New York Post story on Hunter Biden's laptop. Yoel Roth: Yes, sir, I did. Rep. Kelly Armstrong (R-ND): So after 2016, you set up all these teams to deal with Russian interference, foreign interference, you're having regular meetings with the FBI, you have connections with all of these different government agencies, and you didn't reach out to them once? Yoel Roth: Is that question in reference to the day of the New York Post article? Rep. Kelly Armstrong (R-ND): Yeah. Yoel Roth: That's right. We generally did not reach out to the FBI to consult on content moderation decisions, especially where they related to domestic activity. It's not that we wouldn't have liked that information, we certainly would have. It's that I don't believe it would have been appropriate for us to consult with the FBI. Rep. Kelly Armstrong (R-ND): In December of 2020, you did a declaration to the Federal Election Commission that the intelligence community expected a leak and a hack operation involving Hunter Biden. Recently, Mark Zuckerberg confirmed that the FBI warned Meta that there was a high effort of Russian propaganda including language specific enough to fit the Hunter Biden laptop security story. You're talking to these people for weeks and months, years prior to this leaking. They have specifically told you in October, that there's going to be a leak potentially involving Hunter Biden's laptop. They legitimately and literally prophesized what happened. And you didn't contact any of them? Yoel Roth: No, sir, I did not. Rep. Kelly Armstrong (R-ND): Did they reach out to you? Yoel Roth: On and around that day, to the best of my recollection, no, they did not. Rep. Kelly Armstrong (R-ND): After the story was taken down and you guys did it, and you personally disagreed with it Ms. Gadde, did you contact them and say is "Hey, is this what you were talking about?" Yoel Roth: If that question was directed to me. No, I did not. Rep. Kelly Armstrong (R-ND): Ms. Gadde, did you talk to anybody from the FBI? Vijaya Gadde: Not to the best of my recollection. Rep. Kelly Armstrong (R-ND): So I guess my question is, what is the point of this program? You have constant communication, they're set up for foreign interference. They've legitimately warned you about this very specific thing. And then all of a sudden, everybody just walks away? 5:18:55 Rep. Melanie Stansbury (D-NM): We are devoting an entire day to this conspiracy theory involving Twitter. Now, the mission of this committee is to root out waste, fraud and abuse and to conduct oversight on behalf of the American people. And if you need any evidence of waste, fraud and abuse, how about the use of this committee's precious time, space and resources to commit to this hearing? 5:58:25 Rep. Eric Burlison (R-MO): Back to Mr. Roth, is it true that Twitter whitelisted accounts for the Department of Defense to spread propaganda about its efforts in the Middle East? Did they give you a list of accounts that were fake accounts and asked you to whitelist those accounts? Yoel Roth: That request was made of Twitter. To be clear, when I found out about that activity, I was appalled by it. I undid the action and my team exposed activity originating from the Department of Defense's campaign publicly. We've shared that data with the world and research about it has been published. 6:07:20 Rep. Jim Jordan (R-OH): Mr. Roth, I want to go back to your statement in your declaration to the FEC "I learned that a hack and leak operation would involve Hunter Biden," who did you learn that from? Yoel Roth: My recollection is it was mentioned by another technology company in one of our joint meetings, but I don't recall specifically whom. Rep. Jim Jordan (R-OH): You don't know the person's name? Yoel Roth: I don't even recall what company they worked at. No, this was a long time ago. Rep. Jim Jordan (R-OH): And you're confident that it was from a tech company, not from someone from the government? Yoel Roth: To the best of my recollection, yes. Rep. Jim Jordan (R-OH): Did anyone from the government, in these periodic meetings you had, did they ever tell you that a hack and leak operation involving Hunter Biden was coming? Yoel Roth: No. Rep. Jim Jordan (R-OH): Did Hunter Biden's name come up at all these meetings? Yoel Roth: Yes, his name was raised in those meetings, but not by the government to the best of my recollection. 6:09:30 Rep. Jim Jordan (R-OH): Mr. Roth, why were you reluctant, based on what I read in the Twitter files, why were you reluctant to work with the GEC? Yoel Roth: It was my understanding that the GEC, or the Global Engagement Center of the State Department, had previously engaged in at least what some would consider offensive influence operations. Not that they were offensive as in bad, but offensive as in they targeted entities outside of the United States. And on that basis, I felt that it would be inappropriate for Twitter to engage with a part of the State Department that was engaged in active statecraft. We were dedicated to rooting out malign foreign interference no matter who it came from. And if we found that the American government was engaged in malign foreign interference, we'd be addressing that as well. 6:13:50 Rep. James Comer (R-KY): Twitter is a private company, but they enjoy special liability protections, Section 230. They also, according to the Twitter files, receive millions of dollars from the FBI, which is tax dollars, I would assume. And that makes it a concern of the Oversight Committee. Does Section 230's Sweeping Immunity Enable Big Tech Bad Behavior? October 28, 2020 Senate Commerce, Science and Transportation Committee Witnesses: Jack Dorsey, [Former] CEO, Twitter Sundar Pichai, CEO, Alphabet and Google Mark Zuckerberg, CEO, Facebook [Meta] Clips 2:20:40 Sen. Ed Markey (D-MA): The issue is not that the companies before us today are taking too many posts down. The issue is that they're leaving too many dangerous posts up. In fact, they're amplifying harmful content so that it spreads like wildfire and torches our democracy. 3:15:40 Mark Zuckerberg: Senator, as I testified before, we relied heavily on the FBI, his intelligence and alert status both through their public testimony and private briefings. Sen. Ron Johnson (R-WI): Did the FBI contact you, sir, than your co star? It was false. Mark Zuckerberg: Senator not about that story specifically. Sen. Ron Johnson (R-WI): Why did you throttle it back? Mark Zuckerberg: They alerted us to be on heightened alert around a risk of hack and leak operations around a release and probe of information. Emerging Trends in Online Foreign Influence Operations: Social Media, COVID-19, and Election Security June 18, 2020 Permanent Select Committee on Intelligence Watch on YouTube Witnesses: Nathaniel Gleicher, Head of Security Policy at Facebook Nick Pickles, Director of Global Public Policy Strategy and Development at Twitter Richard Salgado, Director for Law Enforcement and Information Security at Google 1:40:10 Nathaniel Gleicher: Congressman, the collaboration within industry and with government is much, much better than it was in 2016. I think we have found the FBI, for example, to be forward leaning and ready to share information with us when they see it. We share information with them whenever we see indications of foreign interference targeting our election. The best case study for this was the 2018 midterms, where you saw industry, government and civil society all come together, sharing information to tackle these threats. We had a case on literally the eve of the vote, where the FBI gave us a tip about a network of accounts where they identified subtle links to Russian actors. Were able to investigate those and take action on them within a matter of hours. Cover Art Design by Only Child Imaginations Music Presented in This Episode Intro & Exit: Tired of Being Lied To by David Ippolito (found on Music Alley by mevio)
Hashtag Realtalk with Aaron Bregg
In this episode I had a chance to talk with Derek Smith about the importance of securing your hybrid cloud environments. Derek is the Director of Cloud Strategic Alliances and Brand for Trace3. We took the time to break down several different issues that are happening right now across multiple industries.Talking Points:How do you build a solution agnostic environment?How can we learn from the recent issues with Southwest to help going forward?How do you marry up your resiliency goals with your security goals?Breaking down the Broadcom takeover of VMWare and what it means to your environmentsEpisode Sponsor:Trace3 is a technology solutions provider based out of Irvine California with offices in Grand Rapids Michigan and other regional locations. Proceeds from the sponsorship will be going towards helping the Mecosta-Osceola Career Center reach and attract more young girls to the IT and Security program.
ITSPmagazine | Technology. Cybersecurity. Society
Guests:Alissa Knight, Hacker-turned-producer and founder of Knight Studios [@knightinkmedia]On LinkedIn | https://linkedin.com/in/alissaknightOn Twitter | https://twitter.com/knightinkmediaOn Facebook | https://www.facebook.com/knightalissaOn YouTube | https://www.youtube.com/channel/UCejZj1i5m_UlwPqu_7IqBwQShannon Wilkinson, CEO and Founder of Tego Cyber, women in technology and STEM advocate, and formerly with the United Nations [@tegocyber]On Twitter | https://twitter.com/SWilkinsonCyberOn LinkedIn | https://linkedin.com/in/swilkinsoncyber____________________________Host: Deb RadcliffOn ITSPmagazine
Hashtag Realtalk with Aaron Bregg
In the episode I had a chance to talk to not one, not two but THREE talented gents about the future of medical and IoT device security. Nathanael Dick, Russ Ramsay and Dan Rittersdorf all work for a great, and local, embedded systems engineering company called DornerWorks.I was fortunate enough to do the podcast prep meeting in person and was able to tour their very cool West Michigan offices. Obviously, medical device security is very important to me considering I work in healthcare. However, we touched on the following other relevant IoT security topics:A brief overview of what is the current state of IoT securityWhat are some common misconceptions about medical IoT security (e.g. IV Pump hacking)What happens when an embedded device is at end-of-life (e.g. when patching isn't an option. Use PACS as an example)How is FDA compliance going to affect embedded control manufacturers like Dorner Works?What does the near future look like? (Securing Distributed AI)At the end of the episode we were visited by a very talented co-worker, Taylor E. Taylor was gracious enough to talk to the importance of being an ally to black woman and supporting charities like Black Girls Who Code.Episode Sponsor:Huge thanks to DornerWorks for sponsoring this episode. DornerWorks is a Embedded Systems Engineering company based in West Michigan.
Unlock The Roadmap To Become A Successful Privacy Consultant Are you a current or aspiring Privacy Pro looking to pivot your career to become a Data Privacy Consultant? This episode has all the information you need to thrive! Hi, my name is Jamal Ahmed and I'd like to invite you to listen to this special episode of the #1 ranked Data Privacy podcast.In this episode, discover:Tips and strategies to create a thriving career as a Privacy ConsultantWhat makes consultancy roles dynamic, challenging and excitingWhy a tickbox approach to privacy is detrimental to success Why every Privacy Pro should learn about Privacy Enhancing TechnologiesDon't miss out on this valuable conversation that will take your privacy program to new heights! Tahir Latif is an Experienced senior leader and advisor currently directing a global team of Data Privacy experts, engineers and delivery specialists with deep experience maturing Data Governance and Information Security practices to identify and achieve regulatory compliance goals in Banking, Insurance, Education, Health Sciences, Industry 4.0, Telco, Manufacturing, Energy, Aerospace industry verticals.Follow Jamal on LinkedIn: https://www.linkedin.com/in/kmjahmed/Follow Tahir on LinkedIn: https://www.linkedin.com/in/tahirlatif101/Take your career to the next level with The Privacy Pros Ultimate CIPPE Certification Programme: http://bit.ly/3ZmiJZzGet Exclusive Insights, Secret Expert Tips & Actionable Resources For A Thriving Privacy Career That We Only Share With Email Subscribers► https://newsletter.privacypros.academy/sign-upSubscribe to the Privacy Pros Academy YouTube Channel► https://www.youtube.com/c/PrivacyProsJoin the Privacy Pros Academy Private Facebook Group for:Free LIVE TrainingFree Easy Peasy Data Privacy GuidesData Protection Updates and so much moreApply to join here whilst it's still free: https://www.facebook.com/groups/privacypro
We Hack Purple Podcast Episode 67 with Jeremy VenturaIn this episode of the We Hack Purple podcast host Tanya Janca met with Jeremy Ventura of ThreatX, to discuss how we can help more people from underrepresented groups into tech and specifically into the field of Cybersecurity / InfoSec. How do we get them a seat at the table? How can we share knowledge and educate people en mass? Can we advocate for others? (Spoiler alert: Jeremy and I gave several examples of both sides of that equation) We talked about “Saying yes more often!” when we are asked to do something a bit outside our comfort zone, if it might bring us new opportunities. We talked about imposter syndrome, different learning styles, and that you can come from any career, education or background, and there's a place for YOU in our field!Jeremy also shared some links and events too!ThreatX Cyber 101 Event! March 23, 2023The ThreatX blogJeremy's LinkedIn#CyberMentoringMondayEXploring Cyber Security - web cast Date unknown - early MarchArticle about #CyberMentoringMonday, read here: Article about mentoring and advocacyJeremy's Bio:Jeremy Ventura is a cybersecurity professional, specializing in advising organizations on information security best practices. He has years of experience in vulnerability management, email security, incident response and security center operations. At ThreatX, he is responsible for the development and presentation of thought leadership across all areas of cybersecurity. Ventura is an industry leader that can regularly be seen in media, blog posts, podcasts and at speaking events. Previously, Ventura worked at Gong, Mimecast, Tenable and IBM, among other security organizations. Ventura holds a Master's Degree in Cybersecurity and Homeland Security.Very special thanks to our sponsor: The Diana Initiative!The Diana Initiative Is: A diversity-driven conference committed to helping all underrepresented people in Information Security. This year the theme is “Lead the Change.”The Diana Initiative is seeking sponsors for their annual event happening Monday August 7, 2023 in Las Vegas - https://www.dianainitiative.org/sponsor/ for more informationThe Diana Initiative Call For Presentations opens on March 1, if you have a topic you want to share submit at tdi. https://tdi.mobi/CFPJoin We Hack Purple!Check out our brand new courses in We Hack Purple Academy. Join us in the We Hack Purple Community: A fun and safe place to learn and share your knowledge with other professionals in the field. Subscribe to our newsletter for even more free knowledge! You can find us, in audio format, on Podcast Addict, Apple Podcast, Overcast, Pod, Amazon Music, Spotify, and more!
ITSPmagazine | Technology. Cybersecurity. Society
Guest: Jess Vachon, Chief Information Security Officer, Context Labs BV [@contextlabsbv]On Mastodon | https://infosec.exchange/@infosec_jessOn Twitter | https://twitter.com/infosec_jessOn LinkedIn | https://www.linkedin.com/in/jessvachon1/________________________________Host: Alyssa MillerOn ITSPmagazine
Rinki Sethi is the VP & CISO at BILL. Rinki was formerly the VP & CISO at Twitter, the VP of Information Security at IBM, and the VP of Information Security at Palo Alto Networks. This microcast is a short version of our full interview with Sethi, which you can listen to at https://soundcloud.com/cybercrimemagazine/cybersecurity-challenging-the-norm-rinki-sethi-twitter
When it comes to succeeding in the workplace, what is the role of culture? How do you know if it's one of cultivation or one that's toxic? And what can you do about it?Today, my guest is Amy Scites, Sr. Engineer for Information Security & Risk at Cardinal Health. I wanted to talk to her about standing up to toxic workplace cultures, and knowing your worth.
Renita Rhodes talks about how she was able to balance being a mom with a young child, while pursuing a successful career in cybersecurity. Despite facing several challenges such as not having an official mentor, she remained determined to succeed in a field dominated by men.As a result of her efforts, Renita found a way to balance motherhood and a successful career in tech. If you're in a similar situation as Renita was (trying to raise a family while pursuing a career in tech), then this episode is a must-listen for inspiration and motivation.Listen as she discusses her journey, her strategies for juggling family responsibilities, and her inspiring message and tips for women looking to break into tech. Background Info:Renita is a Lead Audit Manager-Information and Cyber Security for a well-known worldwide bank, supporting the coverage of the bank's core Cybersecurity controls. She supports coverage in areas such as - Cyber Threat Fusion Center, - Data Loss Protection,- Security Information and Event Management, - Cryptographic Services, and - Network Security Management.Renita also works as a Cybersecurity and Information Systems Adjunct Professor at Maryville University and Harris Stowe State University, teaching the; Cyber Law, Policy and Compliance, Security Information and Event Management, Introduction to Information Security, Applied Programming - Python and Systems Analysis and Design courses.If you got value out of this episode, subscribe to this channel and please share this conversation with someone who will benefit from it.
ITSPmagazine | Technology. Cybersecurity. Society
Community Member Contributor: Matthew Rosenquist, CISO at Eclipz.ioOn LinkedIn | https://www.linkedin.com/in/matthewrosenquist/On Twitter | https://twitter.com/Matt_RosenquistOn Medium | https://matthew-rosenquist.medium.com/HostsSean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli______________________Episode DescriptionOrganizations are asking a lot of their CISOs—from protecting internal digital assets to verifying the security postures of customers and partners, managing cyber insurance and compliance requirements, and acting fast anytime a security issue arises (real or otherwise). Taking on this challenge is made more difficult by the five areas in which CISOs tend to struggle—leadership, strategic thinking, optimizing for threats, promoting teamwork, and maximizing value. In this post from the Blue Lava Community, Matthew Rosenquist, the CISO at Eclipz.io, examines these five areas and presents strategies CISOs can apply to overcome the common mistakes made to instead provide cybersecurity value that can be measured in business terms at the C-suite table.LinkedIn Post: Five Biggest Mistakes of Cybersecurity Programs______________________For more podcasts from Crucial Conversations with The Blue Lava Community, visit: https://www.itspmagazine.com/crucial-conversations-podcastTo access the full collection of Blue Lava Community resources, visit: https://itspm.ag/blclog22To learn more about Blue Lava, visit: https://itspm.ag/blue-lava-w2qs______________________Are you interested in sponsoring an ITSPmagazine Channel?
In this episode, executive principal at Risk Masters International's Steven Ross discusses why vendors of IT products and services are advertising information security, why businesses are not advertising their security and how to use information security as a component of organizations' public images with host Safia Kazi.
Armenian News Network - Groong: Week In Review Podcast
Cyber Laws and Threats in ArmeniaA conversation with Artur PapyanIn this Conversations on Groong episode, we'll be talking about the Internet censorship bill proposed in Armenia before the new year. We'll also talk about the threat and activity of some Cyber spying malware in Armenia, such as the Israeli Pegasus software, which represents a threat to journalists and freedom of expression.Topics: - Censoring the Internet - Cyberthreats and Cyberspying in ArmeniaGuest: Artur Papyan, malware researcher, digital security consultant, co-founder of CyberHub, and director of the Media DIversity Institute.Hosts:Asbed Bedrossian TW/@qubriqHovik Manucharyan TW/@HovikYerevanEpisode 229 | Recorded: February 24, 2023Subscribe and follow us everywhere you are: linktr.ee/groong
Renita Rhodes stops by to share her insights on how you can enter the Cybersecurity field without a lot of professional experience. Our conversation hovered on a topic that tends to generate a lot of debate: Are There Cybersecurity Jobs For People With No Experience?0:00 Renita's says don't do "this" when trying to transition into Cybersecurity.2:10 One less talked about way Renita recommends to get into Cybersecurity.6:22 A couple of non-technical Cybersecurity jobs to keep in mind.10:02 These dogs ain't loyal!
Welcome to Episode 133a Main Topic Red Hat Insights Vulnerability Service with John Spinks Who's John? What is insights (high level overview) What is the vulnerability service? How does it identify vulnerabilities? How does it fix vulnerabilities? Centralized view - helps you prioritize Data from OVAL - https://access.redhat.com/solutions/4161 Security Rules [https://access.redhat.com/articles/2968471 Known exploits Affected but not vulnerable Wanna watch a video? https://youtu.be/b1qGrmZjoO0 What else does insights do? What about all that data, what am I sending to red hat? https://www.redhat.com/en/technologies/management/insights/data-application-security Watch us live on the 2nd and 4th Thursday of every month! Subscribe and hit the bell! https://www.youtube.com/IronSysadminPodcast OR https://twitch.tv/IronSysadminPodcast Discord Community: https://discord.gg/wmxvQ4c2H6 Matrix Space: https://matrix.to/#/#IronSysadmin:trixie.undrground.org Find us on Twitter, and Facebook! https://www.facebook.com/ironsysadmin https://www.twitter.com/ironsysadmin ActivityPub: @firstname.lastname@example.org https://social.undrground.org/@gangrif Subscribe wherever you find podcasts! And don't forget about our patreon! https://patreon.com/ironsysadmin Intro and Outro music credit: Tri Tachyon, Digital MK 2 http://freemusicarchive.org/music/Tri-Tachyon/
Link to Blog Post This week's Cyber Security Headlines – Week in Review, February 20-24, is hosted by Rich Stroffolino with our guest, Jared Mendenhall, Head of Information Security, Impossible Foods Thanks to our show sponsor, Barricade Cyber Have you fallen victim to a ransomware attack? Don't worry! Barricade Cyber Solutions has helped thousands of customers in situations just like yours. Our proprietary ransomware recovery services are designed to quickly get your business back on track. Our team of experts will identify the source of the attack and provide a comprehensive solution to prevent it from happening again. You can count on us for the security of your data and systems. Visit barricadecyber.com All links and the video of this episode can be found on CISO Series.com
ITSPmagazine | Technology. Cybersecurity. Society
Guest: Kayla Williams, CISO, Devo [@devo_inc] and co-host of the Locked Down Podcast on ITSPmagazineOn ITSPmagazine
Federal Contracting Made Easy's podcast
In this podcast, we will discuss how to hide recent apps in macOS Ventura, the latest version of the operating system. If you're someone who values privacy and wants to keep your recent activity away from prying eyes, then this is the podcast for you. We will walk you through step-by-step instructions on how to hide your recent apps, ensuring that your sensitive information is not accessible to others. We will also discuss the reasons why you might want to hide your recent apps and the potential risks of leaving your recent activity exposed. Whether you're using your Mac for personal or professional use, this podcast will provide you with the information you need to safeguard your privacy and protect your sensitive information.
This episode of The Tech Trek explores the field of Information Security. Host Amir Bormand sits down with Rohit Parchuri, the Chief Information Security Officer of Yext, to discuss Rohit's background, experiences, and insights concerning the world of Cyber Security. Highlights 02:09 - Amir and Rohit briefly discuss the history of the CISO (Chief Information Security Officer) role. 06:23 - Rohit explains his strategies for building out Security Information teams. 10:14 - How do Security Architects fit into the Cloud Security pipeline? 14:12 - Rohit shares his insights on dealing with human issues versus technical issues. 21:52 - How to meet the needs of your team by anticipating potential challenges that may arise later. Guest: Rohit Parchuri is an accomplished Information Security executive with an established record building, structuring, and institutionalizing Cyber Security principles and disciplines in a variety of organizational domains. He is currently leading the Cybersecurity program at Yext, a bleeding-edge AI Search platform. In this role, Rohit is responsible for building and executing Cyber Security and Compliance program. In addition to his day job at Yext, Rohit serves as a Board Advisor for a multitude of technology companies and educational institutions. As a part of these roles, he assumes the responsibility of advising on Cybersecurity matters, market penetration, and product strategy while educating and assisting in curriculum building for the Cybersecurity executive degree program/s at CSU, California. Rohit graduated from Depaul University at Chicago with a Master's degree in Computer and Network Security Assurance, specializing in Application Security. He has also achieved a Master in Business Administration degree. Originally from India, Rohit is an avid hiker and tries his hand at tennis every chance he gets. LinkedIn: https://www.linkedin.com/in/rohit-parchuri/ Twitter: https://twitter.com/rohitparchuri ___ Thank you so much for checking out this episode of The Tech Trek, and we would appreciate it if you would take a minute to rate and review us on your favorite podcast player. Want to learn more about us? Head over at https://www.elevano.com Have questions or want to cover specific topics with our future guests? Please message me at https://www.linkedin.com/in/amirbormand (Amir Bormand)
Mirza Asrar Baig, Founder and CEO of CTM360, shared his story of starting a cybersecurity company from Bahrain in the Middle East. Contrary to the usual way, Mirza didn't take VC funding, didn't launch a point product, and didn't immediately try to sell in Europe and North America. Find out why he took this different approach and how it is working. Listen to his episode to hear about:Mirza's multi-capability approachHow he differentiates IT Security, Information Security, and CybersecurityWhy a person called Charlie was important to the founding of CTM360Resources:Contact Arsalan Iqbal at CTM 360 by email: email@example.com Other episodes you'll enjoy: Dave Phelps, RSM at Crowdstrike - Make your territory, your franchiseVladi Sandler, Co-Founder and CEO at Lightspin talks about protecting cloud and Kubernetes environments from unknown risksThe power of asking short questions like Barbara WaltersConnect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
#021 - In this next episode I was honored to be joined by Sean A. Ahrens MA, CPP, CSC, BSCP, FSyl. He's a leader in physical security consulting who has tremendous experience supporting clients across all major industries, when it comes to workplace violence, security technology, CPTED, expert witness consulting, and much more. He's earned his master's in organizational security management from Webster University, and overall, he's just a wealth of knowledge.Today's podcast focuses on one topic in particular: involuntary separations in the workplace (also known as involuntary terminations).Sean worked with a team of his peers in threat assessment and HR to create an informative, peer reviewed, 25-page document to educate organizations and business leaders about how to approach the complexities of these events.--INVOLUNTARY EMPLOYMENT SEPARATION/TERMINATION STRATEGIES V2: https://www.ahrenssecurity.com/_files/ugd/9ec069_80cd94822f104b86a362af22e23e73e7.pdfIf you'd like to get the resources and show notes mentioned in this episode, go to:https://thesecuritystudent.com/shownotes
In this episode of CHATTIN CYBER, Marc Schein interviews Gregory Radabaugh about his wide range of experience in the military and information security, what the Russian-Ukrainian war illuminates about information security, and the essential practices civilians and security forces must equally adopt to strengthen cybersecurity. Retired Air Force veteran of 30 years, Greg comes with a repertoire of wealth that ranges beyond overseas reconnaissance missions. He has experience as a DOD civilian, a Defence Intelligence Agency analyst, senior Information Operations planner for the Air Force ISR agency (Intelligence Surveillance Reconnaissance), Director of the Joint Information Operations Warfare Centre, and many high-importance controlled defence and intelligence roles. But after finally retiring from the Department of Defense after 44 years, Greg has founded his own consulting company, Greg Bear Consulting. With the ongoing Russian-Ukrainian war always keeping world tensions high, Greg suggests you give “Unrestricted Warfare by Colonel Qiao Liang and Colonel Wang Xiangsui” a read for learning in depth about permanent warfare and the absence of a difference between civilian and military targets in the Ukraine-Russia war. Noting from the war updates, Greg shares that although Russia seems to be focussing on justifying their actions to their internal audience, making them see that all is being done to protect them, Ukraine is focussing on the external audience, primarily the West, trying to gain support from the US, NATO, and others providing material, financial, and medical support. He also discusses how both the countries are gathering and making use of commercially available data for warfare – from tracking locations, to cellphone ranges, and a whole lot more. Everything happening in the war is striking from an information perspective. The civilian sector, he adds, must prepare for war at this point as they could be used to incite or escalate conflict. There could be Denial Of Service attacks, deception, and other planned operations to impact the military by attacking people relevant to its personnel. Families of military personnel are especially targeted by these attacks. This is a side most people aren't prepared for. In conclusion, Greg shares that the civilian private sector needs to start thinking about security the same way the military does – for operational security. Using mobile phones and cameras in essential meeting places, not considering the secondary and tertiary access points in places, are a couple of the many things that go unnoticed. For more about it, tune in to this episode with Greg! Highlights: “The Western concepts of the law of armed conflict relying on Westphalian concepts of chivalry, interior, and territorial integrity, and what constitutes an armed attack don't apply to our adversaries and potential adversaries in the information environment.” “Think about how to provide operational security to your business. And then think about how do you shut down our second and tertiary information leakages and then decide, how do I mitigate this threat by doing things, for example, having an offline backup of my network, or having a secondary network that's offline that can go online immediately, if your primary one goes down?” “A greater awareness of these operations in the information environment is crucial to private sector success of industrial control systems, security is going to be absolutely critical to maintaining our first world environment that we live in and enjoy today.” Time-Stamps: [00:40] - Greg's early life and founding Greg Bear Consulting [05:29] - Where to connect with Greg [06:26] - What's happening with the Russian-Ukrainian war? [15:19] - Should the civilian sector prepare for a conflict at this point? [20:42] - What can you do to protect yourself from cyber attacks? Connect with Greg: Website: https://www.af.
Steve Gibson discusses with Leo Laporte on Security Now the concerns of ChatGPT AI tool getting into the hands of bad actors. What guardrails are in place for these concerns? Watch the full episode: https://twit.tv/sn910 Hosts: Leo Laporte and Steve Gibson You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
Steve Gibson discusses with Leo Laporte on Security Now the concerns of ChatGPT AI tool getting into the hands of bad actors. What guardrails are in place for these concerns? Watch the full episode: https://twit.tv/sn910 Hosts: Leo Laporte and Steve Gibson You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
(Recorded Jan. 27, 2023)No Matt this episode, so we have two guests in the rotating chair(s): Nick Biasini and David Liebenberg. Lurene, Mitch and our two esteemed companions talk about the human problem of ransomware. Lurene says getting rid of email altogether is the best option — but since that doesn't seem likely anytime soon, what are some other options for enterprises and companies to avoid being hit with the latest phishing scam? Other suggested talking points:Wawa vs. SheetzWhy everyone has a "Dave in Accounting"Lurene being way ahead of the curve on Twitter's slow demise
ITSPmagazine | Technology. Cybersecurity. Society
Guest: Saman Fatima, Host of the Off The Record With Saman — Student Abroad PodcastOn ITSPmagazine
ITSPmagazine | Technology. Cybersecurity. Society
Guest: Joanna Teljeur, Independent voice actorOn LinkedIn | https://www.linkedin.com/in/joannateljeur/On Facebook | https://www.facebook.com/joannateljeur____________________________Host: Deb RadcliffOn ITSPmagazine
ITSPmagazine | Technology. Cybersecurity. Society
Community Member Contributor: Dutch Schwartz, Principal Security Specialist, Amazon Web Services (AWS) [@AWSSecurityInfo]On LinkedIn | https://www.linkedin.com/in/dutchschwartzOn Twitter | https://twitter.com/dutch_26HostsSean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli______________________Episode DescriptionIn this episode, Dutch Schwartz—a Principal Security Specialist with Amazon Web Services—discusses how CISOs and other cybersecurity leaders need to expand upon their technical skills and include leadership competencies. Doing so allows cybersecurity leaders to connect with other leaders in the organization and their cybersecurity teams. This, in turn, makes it possible for cybersecurity activities to enable the business to knowingly take the risks it wants to take and then manage and mitigate those risks when they become problematic.______________________For more podcasts from Crucial Conversations with The Blue Lava Community, visit: https://www.itspmagazine.com/crucial-conversations-podcastTo access the full collection of Blue Lava Community resources, visit: https://itspm.ag/blclog22To learn more about Blue Lava, visit: https://itspm.ag/blue-lava-w2qs______________________Are you interested in sponsoring an ITSPmagazine Channel?
ITSPmagazine | Technology. Cybersecurity. Society
Guest: Jerry Bell, VP and CISO, IBM Public Cloud [@IBM | @IBMcloud] and founder & co-host of the Defensive Security Podcast [@defensivesec]On Mastodon | https://infosec.exchange/@jerryOn Twitter | https://twitter.com/MaliciouslinkOn LinkedIn | https://www.linkedin.com/in/maliciouslink/InfoSec.Exchange | https://infosec.exchange/home________________________________Host: Alyssa MillerOn ITSPmagazine
In this episode of the We Hack Purple podcast host Tanya Janca met with Anant Shrivastava! We talked about securing the entire software supply chain (including your CI/CD and where you get your packages from), and how it is more than just buying a software composition analysis (SCA) tool. He explained the new and very different risks of securing a mobile app versus a regular web app or an API, that's he's more of an ops than a dev person, and how the risks are all coming together now that many of us are doing DevOps. He shared his numerous open source projects, such as: Code vigilant: https://codevigilant.com/, TamerPlatform : https://tamerplatform.com/ and HackingArchivesOfIndia https://hackingarchivesofindia.com/. Anant's Bio:Anant Shrivastava is an experienced information security professional with over 15 years of corporate experience. He has expertise in Network, Mobile, Application and Linux Security. He is the founder of Cyfinoid Research, a cyber security research firm and has previously served as Technical Director at NotSoSecure Global Services, a boutique cyber security consultancy. He is a frequent speaker and trainer at international conferences such as BlackHat, Nullcon, and c0c0n. Additionally, Anant leads the open source projects Tamer Platform and CodeVigilant and maintains the Hacking Archives of India. He also participates in open communities targeted towards spreading information security knowledge such as null (null.community). His work can be found at anantshri.info and his blog is here https://blog.anantshri.info/!Very special thanks to our sponsor: The Diana Initiative!The Diana Initiative is seeking sponsors for their annual event happening Monday August 7, 2023 in Las Vegas - https://www.dianainitiative.org/sponsor/ for more informationThe Diana Initiative Call For Presentations opens on March 1, if you have a topic you want to share submit at tdi.The Diana Initiative Is: A diversity-driven conference committed to helping all underrepresented people in Information Security. This year the theme is “Lead the Change.” You can submit to be a speaker at tdi . mobi / CFP or if your company would like to support the event by sponsoring check out https://www.dianainitiative.org/sponsor/Join We Hack Purple!Join us in the We Hack Purple Community: A fun and safe place to learn and share your knowledge with other professionals in the field. Subscribe to our newsletter for even more free knowledge! You can find us, in audio format, on Podcast Addict, Apple Podcast, Overcast, Pod, Amazon Music, Spotify, and more!
#020 - In this next episode I was happy to be joined by Jameson Ritter, CTM, CPP, PSP, PCI, all the way from the North Star State. He's a security leader, with a passion for threat management and violence prevention. His experience ranges from Air Force EOD, to Law Enforcement, to protecting private organizations.And what I think you'll enjoy most about my conversation with Jameson is his enthusiasm for getting people interested in threat assessment (myself included). Plus he shared great insights about the human element of workplace training, his ideas on the importance of networking with our security peers, and of course — why you should consider participating with ATAP (Association of Threat Assessment Professionals).If you'd like to get the resources and show notes mentioned in this episode, go to:https://thesecuritystudent.com/shownotes