Category Archives: Security

Rachelle Bergeron, Acting Attorney General of Yap and US Citizen, Assassinated by Slave Traders?

On October 8th a Republican politician (who formerly had been a Christian missionary to Pacific Islands) was indicted for running a human trafficking operation across Arizona, Arkansas and Utah. He fraudulently lured Pacific Islander women into the U.S. to put them in concentration camps and sell their children for $40K to American families, redirecting the mothers’ healthcare benefits to himself. Seized bank accounts suggest this generated at least $150K a month over the past two years,

Red pin upper left for Yap, Federated States of Micronesia (FSM).
Marshall Islands to the right.

On Monday, October 14, at around 7pm, Rachelle Bergeron, Acting Attorney General of Yap and a US citizen was killed by a shotgun fired into her chest at close range. It appears to have been an assassination in front of her home, just after she completed an evening jog and stopped at the rear of her car to open the hatchback.

In 2015, Bergeron moved to the Federated States of Micronesia (FSM), of which the island of Yap is a part, to serve as assistant Attorney General. This past January, she was promoted to acting Attorney General. She had a career-long focus on prosecuting human traffickers.

The Small Arms Survey, a Swiss nonprofit that analyzes gun ownership statistics, estimates there are 700 guns total owned by the civilian population of Micronesia, which numbers 104,000 people. Collins said Bergeron had a passion for fighting for justice for those who had been abused, especially women and children.

The nature of the murder (shot at close range on a predictable path, also killing her dog) and the fact that Bergeron was a high-profile political figure who focuses on human trafficking prosecution both suggest that she was assassinated, perhaps by slave traders or human traffickers.

Bergeron’s prosecution efforts were complicated in this island nation because culturally local politicians suppress reporting to protect the image of the islands, and families suppress reporting of human trafficking incidences to protect the image of their family.

Local authorities claim that many sex trafficking cases remain largely unreported because of victims’ fear of being shamed and embarrassed in FSM’s very small, family-based communities.

The people of FSM are typically very conservative and put their family’s reputation and care above all else. According to the 2010 population census, the FSM island Kosrae had only 6,616 people living on it. These island nation communities are very close knit. Shame and embarrassment toward the individual and their family could spread very quickly if a victim were to report a case of sex trafficking.

FSM women are looking for better socioeconomic opportunities to support themselves and their families. And unfortunately, some take advantage of this and exploit them for forced prostitution.

In 2013 the U.S. government was accused by Micronesian politicians of hurting the islands’ reputation in the international investment/development community. Local leaders protested being on a human trafficking watch list:

…both the Marshall Islands and the FSM are listed by the U.S. State Department as under Tier 2 watch list.

It means the country is where “absolute number of victims of severe forms of trafficking is very significant or is significantly increasing,” and where there is failure to provide evidence of “increasing efforts to combat severe forms of trafficking in persons from the previous year.”

Under Tier 2 watch list, the determination that a country is making significant efforts to bring itself into compliance with minimum standards was based on commitments by the country to take “additional steps over the next year.”

The U.S. State Department’s report says the Marshall Islands “is a destination country for women from East Asia subjected to sex trafficking. Foreign women are reportedly forced into prostitution in bars frequented by crew members of Chinese and other foreign fishing vessels,” among other things.

The same report says FSM “is a source and, to a limited extent, a destination country for women subjected to sex trafficking. Some reports suggest FSM women are recruited with promises of well-paying jobs in the United States and its territories, and are subsequently forced into prostitution or labor upon arrival.”

FSM is closely associated with the U.S., serving its interests since WWII, and 1,500 residents even serve in the American military.

Situated in the western Pacific Ocean, the Micronesia region comprises five sovereign, independent nations — the Federated States of Micronesia, an independent republic associated with the United States. It consists of four states spread across the western Pacific Ocean. From west to east, they are Yap, Chuuk, Pohnpei and Kosrae. Together, the states encompass more than 600 islands.

Yap has about 11,000 residents. Despite being a tiny island with a small population and tight-knit cultural norms, this type of incident isn’t the first. Another American working with women and children was murdered.

Ten years ago a story unfolded of American teacher Kirsten Elisabeth Wolcott being stabbed to death on Yap after going for a jog, as officials emphasized crime against women like this never happens on their island:

“This is a difficult situation for the school, the mission and the Island of Yap,” Torres said. “The police officer said nothing like this has ever taken place in the past to a visitor.” […] Torres reported that women from the community are now taking turns staying overnight at the apartment of the female teachers to help them feel safe.

Volunteer women stepped in rather than the police to protect other women from being murdered, which is a huge clue in the present-day assassination case. Use of a shotgun also is a clue in an island with so few guns, as it seems premeditated and excessively violent (not just about opportunistic killing foreign women who jog); more like something you’d expect in Arkansas or Arizona.

Medical reports anecdotally have indicated that nearly 80% of women on Yap report being attacked by men, and studies to calculate real data have been blocked.

Anecdotally there are high rates of domestic violence in the small Micronesian State of Yap, Federated States of Micronesia (FSM), but there have been no studies to quantify the prevalence or characteristics of domestic violence in Yap or in any other state of the FSM. A survey was administered to women at the Yap hospital and community health centers from February through June 2011. Survey data were on domestic violence, which was supplemented by a focus group to explore the issues involved in greater detail. A high prevalence of domestic violence was documented by the survey; perceptions about this were explored in the focus group. On the questionnaire, 148 of 194 (76%) women reported at least one form of abuse. Given the small number of adult women in Yap, these findings suggest that domestic violence is a serious, pervasive problem that Yap needs urgently to address.

The assassination seems clearly a case linked to human trafficking criminal groups that believe they can get away with murdering an Attorney General on an island where anyone working on prevention of harms to women and children may be treated as a threat to the economy.

The FBI now has dispatched investigators to Yap, which may up-end the fact that the Pacific Islands have been a major source of modern-day human trafficking operations in the U.S. Treating women like animals and selling their children into American families is a practice documented recently in prosecution of a Republican politician running a multi-state modern-day slavery operation:

An Arizona politician ran an adoption fraud scheme that promised pregnant women thousands of dollars to lure them from a Pacific Island nation to the U.S., where they were crammed into houses to wait to give birth, sometimes with little to no prenatal care in what prosecutors called a human smuggling case.


Paul Petersen, the Republican assessor of Arizona’s most populous county, was charged in Utah, Arizona and Arkansas with counts including human smuggling, sale of a child, fraud, forgery and conspiracy to commit money laundering. The charges span about three years and involve some 75 adoptions. Investigators also found eight pregnant women from the Marshall Islands in raids of his properties outside Phoenix, and several more are waiting to give birth in Utah, authorities said.

“The commoditization of children is simply evil,” said Utah Attorney General Sean D. Reyes


In Arkansas, it wasn’t uncommon to find a dozen Marshallese mothers on the verge of giving birth in one house, said Duane Kees, the U.S. attorney for the western district of Arkansas. “Many of these mothers described their ordeal as being treated like property,” Kees said. “Make no mistake: this case is the purest form of human trafficking.” Arkansas has one the largest concentrations of Marshallese immigrants in the U.S. and the women would then be flown there or back to the Marshall Islands after giving birth, authorities said.

This Arizona politician’s conviction takes me back to 2013 when FSM said their investment/development fortunes would be hurt by investigating human trafficking.

Between December 2016 and September 2018, bank account records subpoenaed by an investigator show a little more than $2.7 million…

Perhaps the news reports are linked (see map above), and in any case they indicate a very troubling reality that men in offices of power continue to practice slavery and the women who challenge a business model of human exploitation are assassinated.

CVE-2019-14287 Sudoers bypass

A security announcement has been published by Sudo with patched versions rolling today

When sudo is configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, it is possible to run commands as root by specifying the user ID -1 or 4294967295.


If a sudoers entry is written to allow the user to run a command as any user except root, the bug can be used to avoid this restriction. For example, given the following sudoers entry:

bob myhost = (ALL, !root) /usr/bin/vi

User bob is allowed to run vi as any user but root. However, due to the bug, bob is actually able to run vi as root by running sudo -u#-1 vi, violating the security policy.
Only sudoers entries where the ALL keyword is present in the Runas specifier are affected. For example, the following sudoers entry is unaffected:

alice myhost = /usr/bin/id

In this example, alice is only allowed to run the id command as root. Any attempt to run the command as a different user will be denied.

No Ordinary Murder: Mozambique Police Death Squad Kill Election Observer

Club of Mozambique explains how the assassination getaway failed and thus disclosed identities of the death squad:

This was no ordinary murder: Matavel, a leading figure in election observation, was shot dead in broad daylight, as he was leaving an observation training session in the southern city of Xai-Xai. But the assassins became involved in a traffic accident in which two of them died, two were arrested, and a fifth is on the run. On Tuesday the General Command of the Mozambican police announced that four of the assassins were members of the police force. For the first time the existence of a death squad, operating inside the police, was proved.

Why U.S. Abandoned Allies in Syria

A Kurdish female fighter stands guard on Mount Sinjar in northwest Iraq. Photo by Asmaa Waguih, Reuters for a photo report in IBTimes

I’ve been asked repeatedly how it can be that everyone outside the White House disagrees with abandoning U.S. allies in Syria, and yet the White House is proceeding with an abrupt cut-and-run. What is in it for the White House to go against popular opinion? More to the point, some ask how a White House pulling out of Syria can be seen as any different from Nixon’s campaign promises to pull out of Vietnam?

These are fair questions. Given everyone across the political spectrum today thinks quitting support of allies in Syria is a bad idea, including those who remain apolitical and think most about national security, what possibly could motivate such an epic bad decision?

While tempting to immediately link the move to profit and greed of a family/cabal occupying the White House (e.g real-estate deals) it seems to be more the inverse situation. There’s a lack of enrichment opportunity from current allies, only regional stability. That means there’s a larger international relations angle on this that fits into what we’ve seen over the last couple years in the rise of totalitarian ideology that aims to profit and expand control with destabilization tactics.

It also means that Nixon and the current White House strategy are rooted in the same corruption, while being opposite strategically. Overwhelming numbers of Americans want the U.S. to keep troops in Syria, while overwhelming numbers of Americans in the 1960s wanted the U.S. to remove troops in Vietnam. In both cases, the White House is making corrupt policy decisions for personal gain, ignoring national security concerns.

Nixon Prolonged Vietnam War for Political Gain—And Johnson Knew About It, Newly Unclassified Tapes Suggest. Nixon ran on a platform that opposed the Vietnam war, but to win the election, he needed the war to continue.

The U.S. since 2016 has been re-orienting foreign policy away from allies unless they directly or indirectly enrich the White House’s occupying family. It means abandoning even winning situations where payment to politicians hasn’t been prioritized over all other concerns, including national and international security.

This is why now we see troops being increased into Saudi Arabia with qualifications like “agreed to pay us” while being pulled from areas lacking monetary enrichment. Nixon was corrupt to win elections and consolidate power, while the current administration is corrupt for aggressive self-enrichment on top of power consolidation.

The difference between 1968 and 2016 is level of corruption. Today it is far higher and more obvious.

First, Putin has been said to want to destabilize Europe by tactically capitalizing on refugees:

Russia has been accused of “weaponising” the refugee crisis as a way of destabilising Europe – a claim recently reinforced by Nato’s top commander in Europe. That assertion may well be disputed. What is beyond doubt is the continuing need to know what Russia is thinking, and what goals it might pursue as it watches the EU confront multiple crises.

Second, crisis is an expected outcome from the U.S. shooting itself in the foot and abruptly abandoning its allies, implicitly opening the door for Turkey to intervene and stir conflict.

Turkey’s offensive is likely not only to damage America’s diplomatic credibility and create a humanitarian crisis; it could lead to the escape of thousands of ISIS prisoners currently being held by Kurdish forces. In one of his more galling statements in a week that was full of them, Trump said this wouldn’t be America’s problem since they would likely be “escaping to Europe. That’s where they want to go.” With northeastern Syria once again an active battlefield, and Iraq engulfed in a new round of political chaos, conditions are certainly ripe for a new resurgence of ISIS or a new organization that takes up its mantle.

Those two points together suggest the U.S. withdrawal hands Russia more leverage over the democratic nations (Kurds) and states (EU) that threaten the Erdoğan and Assad anti-democratic regimes. Furthermore it serve Putin’s doctrine of destabilization so he may capitalize on human suffering for political objectives.

In security circles the U.S. abandonment of allies could be called a penny-wise pound-foolish strategy that degrades American foreign policy and its own security. The U.S. administration covers the loss with claims of providing immediate gratification domestically. Clearly however it will cause far wider suffering and higher cost in the near future. Here is why even those immediate gratification claims don’t make any sense:

Given there are so few American soldiers in this draw-down, it can’t be said to be in the name of a troop withdrawal from conflict or ending a war. This is especially true because thousands of troops were just deployed to Saudi Arabia, so the balance stands at greater and less-efficient deployments to the region.

Inversely it can be said while there are so few American troops, Syria was a cost-center that produced a high return on investment primarily in terms of regional and national safety. Yet regional stability no longer is valued as before, as the administration has sought personal alignment with dictators not to mention kick-backs and pocket-linings. Thus troops are being sent to Saudi Arabia as an alignment gesture, whether they stabilize or not.

Saudis regularly pay billions for old American cluster bombs to kill children and disrupt food production with campaigns that cause long-term regional destabilization.

In 2008 an international treaty called the convention on cluster munitions severely limiting the use, transfer and stockpiling of cluster bombs was adopted by 30 countries. By 2018 it had been signed by 120 states. The US, which sells arms to Saudi-led forces fighting in Yemen, was not one of them.

“Cluster munitions went through a proportionality test to measure military advantages gained versus civilian harm of their use,” said Rawan Shaif, the lead Yemen researcher at the open source investigative organisation Bellingcat, of the Geneva conventions relating to the protection of victims of armed conflict. “There’s no military advantage in using a cluster munition in a farm, unless your aim is to make that area uninhabitable for generations of civilians and military alike.”

The cluster bomb that killed Raja was manufactured at the Milan Army Ammunition Plant in 1977. The large site, just north of Jackson in west Tennessee, encompasses 231 miles (372km) of roads and 88 miles (142km) of railways and is nicknamed Bullet Town by residents.

And in terms of national safety, the administration has exhibited a harm externality mindset, where threats of ISIS are foolishly downplayed because harms to self (U.S.) are factored as longer-term and therefore ignored compared with harm being publicly wished as an immediate threat (as promised by Putin) to others (EU).

In conclusion, while there are elements of a White House chasing personal profits and even putting money in pockets of some other Americans, overall this ill-conceived abandonment of allies is to serve a reorientation away from allies who don’t line the pockets of the White House family. This means an alignment of the U.S. administration to the anti-EU policy of Russia, which cruelly capitalizes on humanitarian crisis and undermines stability, as directed in this region by Turkey and Syria.

More to the point, the US administration appears happy to drop any ally that isn’t immediately enriching them personally. The request for the White House to directly oppose the values and commitments of the American people comes from Putin, who wants to reassert exploitative control over the region using regional tension between Assad and Erdoğan. The tension generates refugees into a crisis, which then can be manipulated into expanding militarized control by dictators as well as directed as pressure on democratic states in EU.

One last thought on this is the significance of women in the Kurdish forces and how values that traditionally would be consistent with the U.S. are now bizarrely misaligned. Given both Putin and Trump repeatedly have stated in the open how they disrespect and dislike women, it should not be overlooked how misogyny factors into a decision to suddenly divorce the U.S. from its long-time allies.

Kurdish history is replete with cases of women assuming leadership roles in the realm of religion, politics and even in the military sphere.

Updated to add: retired U.S. Admiral McRaven refers to the current White House as having a transactional value system

Austria Espionage Card Index 1849-1868

The neo-absolutist state secret service kept an espionage card index for surveillance of Vienna residents 1849-1868.

Here’s an example I captured from a museum’s archive:

Encyclopedia Britannica explains the living conditions during this period, not terribly far from where some in the U.S. want things to go today:

Freedom of the press as well as jury and public trials were abandoned, corporal punishment by police orders restored, and internal surveillance increased. The observation of the liberal reformer Adolf Fischhof that the regime rested on the support of a standing army of soldiers, a kneeling army of worshippers, and a crawling army of informants was exaggerated but not entirely unfounded. One of the more backward developments was the concordat reached with the papacy that gave the church jurisdiction in marriage questions, partial control of censorship, and oversight of elementary and secondary education. Priests entrusted with religious education in the schools had the authority to see to it that instruction in any field, be it history or physics, did not conflict with the church’s teachings.

California Posts CCPA Proposed Regulations

The California Attorney General (AG) Xavier Bacerra has posted Proposed Regulations to implement the California Consumer Privacy Act of 2018 (CCPA). Bacerra also has posted a Notice of Proposed Rulemaking Action (NOPA) and an Initial Statement of Reasons (ISOR).

Critics already are playing up that they can’t do business if they have to follow regulations set to protect privacy of consumers. These lobbying types are, of course, peddling risk management nonsense in the face of far too many breaches and a long slide downward of consumer confidence in data platforms.

The current round of criticism reminds me of those opposed to food safety regulations even after Upton Sinclair’s 1906 book The Jungle pointed out how rats and workers’ body parts were being ground up and shipped as sausage.

Cloud providers are like sausage factories, especially the largest ones, and for far too long have been allowed to operate without basic duties of care, deliberately avoiding innovation investment because avoiding accountability for harms. And yes, Facebook is the wurst.

Those of us actively innovating in information technology see regulations such as CCPA as welcome guard rails, which spur long overdue innovations in data platform controls and help the data platform market grow more safely.

The proposed regulations set out some clear “shall not” of consumer personal information:

(3) A business shall not use a consumer’s personal information for any purpose other than those disclosed in the notice at collection. If the business intends to use a consumer’s personal information for a purpose that was not previously disclosed to the consumer in the notice at collection, the business shall directly notify the consumer of this new use and obtain explicit consent from the consumer to use it for this new purpose.
(4) A business shall not collect categories of personal information other than those disclosed in the notice at collection. If the business intends to collect additional categories of personal information, the business shall provide a new notice at collection.
(5) If a business does not give the notice at collection to the consumer at or before the collection of their personal information, the business shall not collect personal information from the consumer.

They also set out clear timelines for requests to delete data:

(a) Upon receiving a request to know or a request to delete, a business shall confirm receipt of the request within 10 days and provide information about how the business will process the request. The information provided shall describe the business’s verification process and when the consumer should expect a response, except in instances where the business has already granted or denied the request.
(b) Businesses shall respond to requests to know and requests to delete within 45 days. The 45-day period will begin on the day that the business receives the request, regardless of time required to verify the request.

EU Court: Holocaust Denial is not Protected Speech

General Eisenhower wisely and famously wrote to General Marshal in 1945 that we need to protect the future by carefully documenting the past:

I made the [Buchenwald concentration camp in Thuringia, Germany] visit deliberately, in order to be in position to give first-hand evidence of these things if ever, in the future, there develops a tendency to charge these allegations merely to “propaganda.”

Presidential archive copy of a letter from General Eisenhower to General Marshall, April 15, 1945.

General Patton and others wrote similar records of disgust at what they saw, as well as concern with the German people’s ability to operate around and in these death camps as if genocide was just business as usual.

And now a smart ruling has been heard from the European Court of Human Rights that should have an immediate and serious impact to data platform safety regulation:

Pastoers’ argument that his statements were protected by Article 10, which protects freedom of expression, was “manifestly ill-founded,” given that he “had intentionally stated untruths in order to defame the Jews and the persecution that they had suffered,” the Strasbourg, France-based court ruled on Thursday. His complaint that he was denied a fair trial in Germany was also rejected by the ECHR.

Pastoers had given a speech a day after Holocaust Remembrance Day in 2010…


The tribunal said the German had deliberately obscured some of his remarks to try to get his message across more subtly.

“The impugned part had been inserted into the speech like ‘poison into a glass of water, hoping that it would not be detected immediately,’” the court said.

An example of hidden Nazi messages in daily communications is one of the most popular blog posts I’ve ever written. Detecting it isn’t the hard part.

Acting upon it has been the bigger issue, as Google, Twitter and Facebook executive management have repeatedly and intentionally declined to block poisonous speech. They operate a philosophically and historically misguided willingness to profit as Americans from dispensing known harms that seriously damage markets around the world.

For example, documented hate group FAIR in the last year alone has spent $934,000 on Twitter ads, $910,000 on Facebook ads, and $111,000 on Google/YouTube ads.

…founder, John Tanton, has expressed his wish that America remain a majority-white population: a goal to be achieved, presumably, by limiting the number of nonwhites who enter the country.

Another way of looking at this is Facebook records income from dispensing poison:

From May 2018, when Facebook began publishing its archive of political and social advertisements, to September 17, 2019, at least 38 hate groups and hate figures, or their political campaigns, paid Facebook nearly $1.6 million to run 4,921 sponsored ads. Some ads call undocumented immigration an “invasion.” Others claim that LGBTQ people are “evil.”

“This is an astounding amount of money that’s been allowed to be spent by hate groups,” Keegan Hankes, interim research director of SPLC’s Intelligence Project, told Sludge. “It reaches a lot of people with some very toxic ideologies. Obviously that’s incredibly worrisome, if not a little unsurprising given Facebook’s track record specifically around these ideologies.”

Even more to the point, Facebook has hired people into executive positions with intent to undermine democracy through dispensing misinformation:

Harbath is Facebook’s head of global elections policy. She literally worked for Rudy Giuliani. I can’t make this up.

And insider threats in data platforms who are virulently anti-democracy and who like to use hate dissemination and misinformation techniques are not something to be surprised about, as I presented at Kiwicon in 2016.

Hate groups flock towards technology positions, and attempt to insert or influence staff there, like criminal syndicates attracted to bank jobs.

When Can You Trust Cloud Providers?

The Raft of the Medusa by Géricault depicts service provider incompetence of 1816: “Crazed, parched and starved, they slaughtered mutineers, ate their dead companions and killed the weakest”

Our first book detailed the infrastructure risks in cloud environments. It gave basic instructions for how to make it safe to build a cloud.

However, I realized right away that a second book would be necessary as I saw operations going awry. People offering data “services” in cloud environments were doing so unethically.

That’s why since 2013 I’ve been working on tangible, actionable solutions to problems in cloud environments like the impostor CISO, the immoral SRE, and the greedy CEO.

It has been a much harder book to write because The Realities of Securing Big Data crosses many functional lines in an organization from legal to engineering, sales to operations. A long-time coming now, it hopefully will clarify how and why things like this keep happening, as well as what exactly we can do about it:

We recently found that some email addresses and phone numbers provided for account security may have been used unintentionally for advertising purposes. This is no longer happening and we wanted to give you more clarity around the situation:

…and that led to everyone asking an obvious question.

You may remember a very similar incident last year and wonder why nobody at Twitter thought to test their systems to make sure they didn’t have the same security flaws as a safety laggard like Facebook.

Facebook is not content to use the contact information you willingly put into your Facebook profile for advertising. It is also using contact information you handed over for security purposes and contact information you didn’t hand over at all.

Facebook and Twitter, after flashy high-profile CISO hires and lots of PR about privacy, both have sunken to terrible reputations. They rank towards the same levels as Wells Fargo in terms of customer confidence.

Facebook has experienced a tumultuous time due to privacy concerns and issues regarding election interference, ranked 94th. Wells Fargo ranked 96th. The Trump Organization ranked 98th, considered a “very poor” reputation.

The Drum says even the advertising industry is calling out Twitter for immorality and incompetence:

Neville Doyle, chief strategy officer at Town Square, suggested it was “enormously improbable” that Twitter ‘inadvertently’ improved its ad product with the sensitive data, and blasted the tech giant for being either “either immoral or incompetent”. Either way, he said, it was playing “fast and loose with users’ privacy”. Respected ad-tech and cybersecurity expert Dr Augustine Fou, who was previously chief digital officer at media agency Omnicom’s healthcare division, also branded Twitter’s announcement as “total chickenshit”. Last July, the Federal Trade Commission (FTC) fined Facebook $5bn for improperly handling user data, the largest fine ever imposed on company for violating consumers’ privacy.

The technology fixes ahead are more straightforward than you might imagine, as well as the management fixes.

In brief, you can trust a cloud provider when you can verify in detail a specific set of data boundaries and controls are in place, with transparency around staffing authorizations and experience related to delivering services. Over the years I’ve led many engineering teams to build exactly this, so I’m speaking from experience of what’s possible. I’ve stood in customer executive meetings to detail how controls work and why the system was designed to mitigate cloud insider threats, including executives at the highest levels.

You should be especially concerned if management lacks an open and public resume of prior steps taken over years to serve the privacy needs of others, let alone management that lacks the ability to deconstruct how their control architecture was built from the start to serve your best interests.

What has been hard, especially through the years of Amazon’s “predator bully” subscription model being worshiped by sales teams, is keeping safety oriented around helping others. Tech cultures in America tend to cultivate “leaders” that think of innovation as separation; having no way to relate to the people they are serving.

The tone now seems to be changing as disclosures are increasing and we’re seeing exposure of the wrong things done by people who wanted to serve others while being unable to relate to them. Hoarding other people’s assets for self-gain in a thinly-veiled spin to be their “service provider” should never have been the meaning of cloud.

Study Details Racism in LAPD Traffic Stops

Data in a new LA Times report (and posted to github) reveals that despite whites being found with contraband more often, blacks and latinos are stopped far more often to be searched.

…a black person in a vehicle was more than four times as likely to be searched by police as a white person, and a Latino was three times as likely.

Yet whites were found with drugs, weapons or other contraband in 20% of searches, compared with 17% for blacks and 16% for Latinos. The totals include both searches of the vehicles and pat-down searches of the occupants.

The analysis in the report indicates less evidence was used to prompt a search of latinos and blacks than whites. On top of that, after being stopped and searched, whites also saw better treatment and lower arrest rates.

Blacks and Latinos were more than three times as likely as whites to be removed from the vehicle and twice as likely to either be handcuffed or detained at the curb, the Times analysis found.

About 3% of blacks and Latinos stopped by the LAPD were arrested, compared with 2% of whites.

To put it another way, the city is 9% black yet 27% of people being searched are black; the city is 28% white, yet 18% of those being searched are white.

US Administration Fights to Protect Human Trafficking and Disinformation Platforms

The U.S. already has a reputation for its lax approach to infrastructure regulation that “encouraged the spread of disinformation and supported a powerful forum for harassment and bullying”.

Current occupants of the White House are taking that even further.

American infrastructure is said to be getting legal protections against accountability pushed on foreign trade deals, known as adding in Section 230.

Last year, Congress overwhelmingly approved a bill making it possible to sue online platforms for knowingly facilitating sex trafficking. Lawmakers have raised the prospect of creating additional carve-outs for the online sale of opioids. Critics of Section 230 say they are alarmed by the inclusion of its provisions in trade deals.

In other words despite representatives in U.S. government working to protect the world from clear and documented harms, the White House is headed in an opposite direction by trying to instead protect criminal behavior such as child trafficking operating in the U.S..

This relates directly to other recent news that the American cloud service providers often are abused by men operating them to victimize women and children around the world.

Studies repeatedly show “it’s disproportionately women who are targeted” using cloud services and enslaved.

Seventy-six percent of trafficked persons are girls and women and the Internet is now a major sales platform.

Epstein no longer being protected by powerful American men, found dead in his cell and quickly forgotten, may actually mean he was replaced by technology…and that’s why now it is being made untouchable instead of him.

By allowing lawsuits to proceed as one would normally expect, a court would be able to deliberate and find the right balance between freedoms of expression and clear cases of harm.

“The use of Twitter by the defendants to post allegedly defamatory statements cannot subject the plaintiff to the terms of use agreement and the forum selection clause as it would not subject a plaintiff who did not have a Twitter account to the terms of use agreement,” the ruling states.