Civil Liberties Organization Demands Inquiry into UK Data Protection Authority

Numerous civil liberties advocates and legal professionals are demanding an inquiry into the UK’s data protection regulator. The regulator has referred to the situation as a “collapse in enforcement activity” following a significant scandal, specifically the Afghanistan data breach.

A group of 73 individuals—including academics, leading lawyers, data protection specialists, and organizations like Statewatch and the Good Law Project—have sent a letter to Chi Onwurah, the chair of the bipartisan Commons Science, Innovation and Technology Committee. This effort was coordinated by the Open Rights Group and calls for an investigation into the actions of Information Commissioner John Edwards’ office.

“We are alarmed by the failure in enforcement actions by the Directorate of Intelligence, which has resulted in not formally investigating the Ministry of Defense (MoD) after the Afghanistan data breach,” stated the signatories. They caution that there are “more serious structural flaws” beyond just data breaches.

The Afghanistan data breach represented a grave leak involving information about Afghan individuals who collaborated with British forces prior to the Taliban’s takeover in August 2021. Those whose names were disclosed indicated that this exposure endangered their lives.

“Data breaches can pose serious risks to individuals and disrupt the continuity of government and business,” the letter emphasized. “However, during a recent hearing conducted by your committee, Commissioner John Edwards suggested he has no intention of reassessing his approach to data protection enforcement, even in light of the most significant data breach ever in the UK.”

The signatories also referenced other notable data breaches, including those affecting the victims of the Windrush scandal.

They argue that the ICO has adopted a “public sector approach” to such incidents, issuing disciplinary actions characterized by unenforceable written warnings and substantially lowering fines.

“The ICO’s choice not to initiate any formal action against the MoD, despite ongoing failures, is as remarkable as its lack of documentation regarding its decisions. This paints a picture in which the ICO’s public sector approach provides minimal deterrence and fails to encourage effective data management across government and public entities.”

“The response to the Afghanistan data breach signifies a broader issue. Many have been left disillusioned by the ICO’s lack of use of its remedial powers and its continual shortcomings.”

The letter warns that the trend of declining enforcement in the public sector will inevitably reflect in the accompanying statistics. Latest ICO report Enforcement actions by the private sector are also becoming increasingly rare, as the ICO fails to pursue matters and organizations redirect resources away from compliance and responsible data practices.

“Instead of simply hoping for a positive outcome, Congress has endowed the ICO with ample authority to ensure compliance with legally binding orders. During the hearing you conducted, it was clear that the ICO opted not to exercise these powers regarding the Afghan data breach.”

“Regrettably, the Afghanistan data breach is not an isolated case but rather an indication of deeper structural issues in the operations of ICOs.”

The letter concludes with the assertion that “change seems improbable unless the Science, Innovation and Technology Committee steps in with its oversight capabilities.”

An ICO spokesperson commented: “We possess a comprehensive array of regulatory powers and tools to tackle systemic concerns within specific sectors or industries.”

“We appreciate the essential role civil society plays in scrutinizing our decisions and look forward to discussing our strategies in our upcoming regular meeting. We also welcome the opportunity to clarify our work when engaging with or presenting before the DSIT Selection Committee.”

Source: www.theguardian.com

How the US Agriculture Organization Played a Crucial Role in Combating Bird Flu

Prevalent strains of avian flu affecting US livestock

Mediamedium/Alamy

Since the beginning of Donald Trump’s administration in January, key US public health organizations have reduced their pandemic preparedness efforts regarding potential avian flu outbreaks. However, in contrast, another government agency has ramped up its activities.

The U.S. Department of Health and Human Services (HHS) previously conducted regular updates on measures to prevent a broader transmission of the deadly avian influenza virus known as H5N1 among humans, but these efforts were largely suspended after Trump took office. Funding for vaccines targeting the virus was also cancelled. Meanwhile, the USDA intensified its fight against the spread of H5N1 in poultry and dairy populations.

This particular strain of avian flu, named H5N1, poses a significant risk to human health, with about half of the nearly 1,000 individuals who tested positive globally since 2003. While the virus spreads quickly among birds, it remains poorly adapted to infect humans and is not known to transmit between individuals. However, mutations might enhance its ability to spread among mammals, presenting an escalating risk with increasing infections in mammals.

The likelihood of H5N1 evolving into a more human-threatening variant has significantly amplified since March 2024, when it transitioned from migratory birds in Texas to dairy cattle. More than 1,070 flocks across 17 states have since been affected.

H5N1 also impacts poultry, making it more human-compatible. Since 2022, nearly 175 million domestic birds in the US have been culled due to H5N1, with 71 people testing positive after direct contact with infected livestock.

“We must take [H5N1] seriously. Its spread continues, and it frequently spills over into humans,” says Sheema Calkdawara from Emory University in Georgia. The virus has already claimed lives in the US, including children in Mexico this year.

However, the number of incidents has minimized since Trump took office, with the last recorded human case in February and a significant reduction in affected poultry herds by 95% from then through June. Outbreaks within dairy cattle herds are also being managed effectively.

The cause of this decline remains unclear. Some speculate it may be due to a decrease in bird migration, limiting the opportunities for the virus to jump from wild birds to livestock. It may also reflect the USDA’s proactive containment strategies on farms. In February, USDA detailed a $1 billion investment plan to combat H5N1, which includes free biosecurity evaluations to help farmers enhance their defenses against the virus. Only one workplace among the 150 reviewed reported an outbreak.

Under Trump’s administration, the USDA also maintained its national milk testing initiative, requiring farms to submit raw milk samples for influenza testing. Should a farm test positive for H5N1, the USDA can monitor livestock and take preventative measures. The USDA initiated a comprehensive program in December, further enhancing their engagement in 45 states.

“The National Milk Test Strategy is a robust approach,” states Erin Sorrell from Johns Hopkins University in Maryland. Coupled with improvements in on-farm biosecurity, milk testing is crucial for containing outbreaks, Sorrell believes.

Despite the USDA’s heightened efforts concerning H5N1, HHS doesn’t seem to be keeping pace. According to Sorrell, the decrease in human cases may also be due to diminished surveillance resulting from staff cuts. In April, HHS announced 10,000 job cuts, impacting 90% of the workforce at the National Institute for Occupational Safety and Health, which monitors H5N1 incidence among farm workers.

“As the saying goes, you can’t detect something unless you test for it,” Sorrell comments. Nevertheless, a spokesperson from the US Centers for Disease Control and Prevention (CDC) stated that their guidance and surveillance initiatives remain unchanged. “State and local health departments are still tracking illnesses in individuals exposed to sick animals,” they expressed to New Scientist. “The CDC is dedicated to promptly sharing information regarding H5N1 as necessary.”

Vaccination strategies are another area of contention between USDA and HHS. USDA has allocated $100 million towards the development of vaccines and additional strategies to mitigate H5N1’s spread among livestock, while HHS has halted $776 million in contracts aimed at developing influenza vaccines. This contract, which ended on May 28, was with Moderna for a vaccine targeting various influenza subtypes, including H5N1, potentially leading to future pandemics. This announcement coincided with Moderna revealing that nearly 98% of around 300 participants who received two H5 vaccines in clinical trials exhibited antibody levels considered protective against the virus.

The US currently possesses approximately 5 million doses of the H5N1 vaccine, produced via egg-based and cultured cell methods, which is more time-consuming compared to mRNA vaccines such as Moderna’s. Sorrell observes that Moderna’s mRNA vaccine platform enables rapid government response and production capabilities during a pandemic, providing a solid foundation should a general public vaccine be required.

HHS’s cancellation of its contract stemmed from concerns regarding the mRNA vaccine technology, an issue previously flagged by Robert F. Kennedy Jr., a leading public health figure in the nation. “The reality is that mRNA technology remains inadequately tested, and we will not waste taxpayer dollars repeating past errors,” stated HHS Communications Director Andrew Nixon, as reported by New Scientist.

However, mRNA technology is far from novel and has been in development for over 50 years, with various clinical trials confirming its safety. Like all treatments, there can be mild side effects, but these are typical of most medical interventions. In a recent announcement, Moderna indicated its intention to seek alternative funding avenues for the project.

“I firmly believe we shouldn’t dismiss any option, including various vaccine strategies,” asserts Calkdawara.

“Vaccinations are the most effective defense against infectious diseases,” emphasizes Sorrell. “Having them available as a contingency provides a wider range of options.”

Topics:

Source: www.newscientist.com

Officials from Jewish non-profit organization claim that Iron Mask promotes violence with his “Nazi salute”

According to a well-known US Jewish civil society, Donald Trump’s repetitive fascist-style salute could potentially incite violence.

Amy Spitalnick, the highest executive officer of the Jewish Council, a prominent non-profit organization based in New York City, emphasized the problematic nature of Trump’s salute during a recent rally.

Despite attempts to downplay the incident, Spitalnick firmly believes that the salute carries historical connotations and should not be dismissed lightly.

She highlighted the significance of the Nazi salute in political discourse and criticized those who fail to understand the gravity of such gestures.

Spitalnick also pointed out the dangerous implications of Trump’s support for far-right ideologies, urging people to take action against hate speech and extremism.

While some groups attempted to downplay the incident, Spitalnick and the Jewish Council remained steadfast in their condemnation of Trump’s salute.

Amy Spitalnick outside the United Nations in New York City on September 22, 2023. Photo: Rob Kim/Getty Image for New York’s protest movement

Spitalnick expressed disappointment in the lack of accountability from the Trump administration and its tolerance for extremist behavior.

In light of these events, Spitalnick urged people to remain vigilant and not underestimate the potential harm caused by such actions.

Skip past newsletter promotions

She emphasized the importance of holding individuals accountable for their actions, especially those in positions of power like Musk and Trump.

Source: www.theguardian.com

“Hackers from UK and US team up to take down Rockbit criminal organization” – Cybercrime

Britain’s National Crime Agency (NCA) seized control of international ransomware group LockBit’s “command and control” infrastructure on Tuesday in a major law enforcement operation. The NCA plans to reuse its technology to expose the group’s activities to the world.

The joint operation by the NCA, FBI, Europol, and an international coalition of law enforcement agencies was revealed in a post on Rockbit’s own website. The post stated, “This site is currently under the control of the UK National Crime Agency, working closely with the FBI and international law enforcement agency Operation Kronos.”

Two people associated with LockBit were arrested in Poland and Ukraine, and two defendants believed to be related to the company were arrested and charged in the United States. Two more names have been released, but the Russian nationals are still at large. Authorities also froze more than 200 cryptocurrency accounts associated with the criminal organization.

According to the NCA, the disruption to LockBit operations is much more extensive than initially revealed. The agency not only seized control of the public website but also controlled Rockbit’s primary administrative environment, the management, and deployment of the hacking techniques it used to extort companies and individuals around the world. They also took control of the enabling infrastructure.

“Through close collaboration, we hacked the hackers. We took control of the infrastructure, seized the source code, and obtained keys to help victims decrypt their systems,” said NCA Director General Graham Biggar.

“As of today, LockBit is locked out. We have undermined the ability of a group that relied on secrecy and anonymity, and most importantly its credibility.”

The organization pioneered the ‘ransomware-as-a-service’ model, outsourcing the actual target selection and attack to a network of semi-independent ‘affiliates’, providing the tools and infrastructure, and paying ransom fees in return.

While ransomware typically works by encrypting data on an infected machine and demanding payment for the decryption key, LockBit copies the stolen data and releases it publicly if the fee is not paid. They threatened to do so and promised to delete the copies once the ransom was received.

However, the NCA said that promise was false. Some of the data found on LockBit’s systems belonged to victims who paid the ransom.

Home Secretary James Cleverley said: “The NCA’s world-class expertise has delivered a huge blow to those behind the world’s most prolific ransomware.”

Skip past newsletter promotions

“The criminals operating LockBit are sophisticated and highly organized, but they have not escaped the clutches of UK law enforcement and our international partners.”

The “Hackback” campaign has also recovered over 1,000 decryption keys intended for victims of LockBit’s attacks, and plans to contact victims to assist them in recovering their encrypted data.

In a blog post last month, Ciaran Martin, former director of the National Cyber Security Center, said: Announcement of involvement of Russian hackers Cybercrime undermines many common law enforcement tactics. “Impose costs where you can. There are things you can do to harass and harass cybercriminals,” he warned. “But as long as Russian safe havens exist, this will not be a strategic solution.”

Source: www.theguardian.com

Code.org, a nonprofit organization, files a lawsuit against WhiteHat Jr, Byju’s organization, over disputed membership fee payments

US education nonprofit Code.org has filed a lawsuit in California District Court, alleging that WhiteHat Jr, a subsidiary of Byju, violated its licensing agreement by continuing to use Code.org’s platform without paying fees.

WhiteHat Jr, which was sold to Byju’s in 2020 for $300 million, partnered with Code.org last year, agreeing to pay $4 million over four years to license Code.org’s coding education platform. However, in a lawsuit filed earlier this month, Code.org alleges that WhiteHat Jr. failed to adhere to its payment schedule while continuing to utilize its coding courseware.

According to the Code.org complaint, WhiteHat Jr paid the 2022 license fee, but notified the nonprofit earlier this year that it would not be able to make the remaining payments scheduled in the four-year contract. Code.org claims that WhiteHat Jr requested that his original contract be amended to backload unpaid license fee obligations. But Code.org’s lawyers argue that the original contract makes clear that termination does not relieve WhiteHat Jr. of its obligation to pay all future license fees. There is.

“To date, White Hat has not paid either its Q1 2023 invoice or its Q2 2023 invoice. In fact, despite repeated written and verbal requests for payment by Code.org, , WhiteHat has not made any payments in excess of the $1 million it paid pursuant to the 2022 invoice before the agreement was amended,” Code.org’s lawyers claim.

Byju’s did not respond to a request for comment.

The lawsuit is the latest trouble for Byju stemming from its acquisition of WhiteHat Jr, and adds to existing problems the company has faced since the acquisition. The Indian edtech giant, which was valued at $22 billion in a funding round in early 2022, was considering whether to wind down WhiteHat Jr earlier this year, TechCrunch reported.

This also makes Byju’s predicament even worse. Byju’s is facing a difficult situation due to prolonged delays in financial reporting and governance issues. Byju’s leading backer, Prosus, recently reduced the startup’s valuation to less than his $3 billion.

Source: techcrunch.com