Stopping America’s next hate-crime killers on social media is no easy task

By Sarah N. Lynch and Mark Hosenball

WASHINGTON/LONDON (Reuters) – The pattern is clear: Hate-filled manifestos posted on websites populated by white supremacists, followed by gun attacks against blacks, Jews, Muslims, or Latin American immigrants.

In some cases, the killers use their internet posts to praise previous attacks by other white nationalists. And after new assaults, the manifestos get passed around, feeding the cycle of propaganda and violence.

Following the racially-motivated attack that killed 22 people at a Walmart store in El Paso, Texas, President Donald Trump said he wants police to do more to stop extremists who are active online before they can turn to murder.

But identifying and stopping the extremists who plan to launch an attack is much easier said than done.

Law enforcement experts say that the constitutional right of free speech means police cannot arrest someone simply on the basis of extremist rants online, unless they make a specific threat.

“You couldn’t just open a case on the words,” said Dave Gomez, a retired FBI agent who has worked on cases of both international and domestic terrorism.

“Posting something like that on the internet doesn’t harm anybody,” he said, adding that police can only successfully investigate a white supremacist when you can “connect his words to an overt act.”

The White House will discuss violent extremism online with representatives from a number of internet and technology companies on Friday, according to a White House spokesman.

Social media companies are reluctant to spy on or censor their users, though increasingly they are responding to demands that they take down obvious incitements to violence. And civil rights groups warn that tighter monitoring can lead to unconstitutional abuses of power

Another former FBI agent, who asked not to be identified, said closer monitoring of extremists’ websites would anyway be unlikely to prevent new mass shootings.

“There is not enough manpower. There is not enough technology to properly monitor the internet,” he said. “This is the number one thing we always say in law enforcement: ‘You can’t stop crazy. You can’t even predict crazy.’”

Trump said after the mass shootings last weekend in El Paso and Dayton, Ohio, that he would ask the Justice Department to work with local, state and federal agencies as well as social media companies “to develop tools that can detect mass shooters before they strike.”

Even before those attacks, The FBI in early July requested bids for a contractor to help it detect national security threats by trawling through social media sites.

“The use of social media platforms by terrorist groups, domestic threats, foreign intelligence services, and criminal organizations to further their illegal activity creates a demonstrated need for tools to properly identify the activity and react appropriately,” the FBI said in its request.

PRESSURE

Top law enforcement and domestic security officials from the United States, the United Kingdom, Canada, Australia and New Zealand met with leading social media and internet companies in London last week, and pushed them to help authorities track suspicious users.

The government officials noted in an agenda paper for the meeting that some companies “deliberately design their systems in a way that precludes any form of access to content, even in cases of the most serious crimes.”

“Tech companies should include mechanisms in the design of their encrypted products and services whereby governments, acting with appropriate legal authority, can obtain access to data in a readable and usable format,” the agenda paper said.

A final statement from the meeting said little about encryption, however, and neither company nor government officials talked about what was discussed.

Facebook and Microsoft confirmed they attended but Google, which was invited, did not respond to a request for comment. Other attendees included Roblox, Snap and Twitter, the statement said.

FBI agents say that broad surveillance powers enacted by Congress in the wake of the Sept., 11, 2001 attacks helped them track international terrorist groups and stop people with links to foreign groups like al Qaeda and Islamic State before they could carry out crimes.

But they key law criminalizing “material support” for terrorism does not apply to investigations or prosecutions of domestic terrorists, such as violent white supremacists, that commit hate crimes.

This week, the FBI Agents Association called on Congress to make domestic terrorism a federal crime in order to give agents more tools.

The Electronic Frontier Foundation, which promotes internet civil liberties, said the sheer amount of users posting aggressive content online makes it almost impossible to identify and track the people who pose an actual threat.

“Even though it seems like there is another mass shooting every week, if you are looking at the number of mass shooters versus the total population, it’s still a tiny, tiny number which means this is still a very rare event,” said Jeremy Gillula, the group’s tech products director. “It’s like trying to predict where lightning is going to strike.”

(Reporting by Sarah N. Lynch and Mark Hosenball; Editing by Alistair Bell)

Special Report: How Iran spreads disinformation around the world

FILE PHOTO: Iran's national flags are seen on a square in Tehran

By Jack Stubbs and Christopher Bing

LONDON/WASHINGTON (Reuters) – Website Nile Net Online promises Egyptians “true news” from its offices in the heart of Cairo’s Tahrir Square, “to expand the scope of freedom of expression in the Arab world.”

Its views on America do not chime with those of Egypt’s state media, which celebrate Donald Trump’s warm relations with Cairo. In one recent article, Nile Net Online derided the American president as a “low-level theater actor” who “turned America into a laughing stock” after he attacked Iran in a speech at the United Nations.

Until recently, Nile Net Online had more than 115,000 page-followers across Facebook, Twitter and Instagram. But its contact telephone numbers, including one listed as 0123456789, don’t work. A Facebook map showing its location dropped a pin onto the middle of the street, rather than any building. And regulars at the square, including a newspaper stallholder and a policeman, say they have never heard of the website.

The reason: Nile Net Online is part of an influence operation based in Tehran.

It’s one of more than 70 websites found by Reuters which push Iranian propaganda to 15 countries, in an operation that cybersecurity experts, social media firms and journalists are only starting to uncover. The sites found by Reuters are visited by more than half a million people a month and have been promoted by social media accounts with more than a million followers.

The sites underline how political actors worldwide are increasingly circulating distorted or false information online to influence public opinion. The discoveries follow allegations that Russian disinformation campaigns have swayed voters in the United States and Europe. Advisers to Saudi Arabia’s crown prince and the army in Myanmar are also among those using social media to distribute propaganda and attack their enemies. Moscow has denied the charges; Riyadh and Yangon have not commented.

Former CIA director John Brennan told Reuters that “countries around the globe” are now using such information warfare tactics.

“The Iranians are sophisticated cyber players,” he said of the Iranian campaign. “There are elements of the Iranian intelligence services that are rather capable in terms of operating (online).”

Traced by building on research from cybersecurity firms FireEye and ClearSky, the sites in the campaign have been active at different times since 2012. They look like normal news and media outlets, but only a couple disclose any Iranian ties.

Reuters could not determine whether the Iranian government is behind the sites; Iranian officials in Tehran and London did not reply to questions.

But all the sites are linked to Iran in one of two ways. Some carry stories, video and cartoons supplied by an online agency called the International Union of Virtual Media (IUVM), which says on its website it is headquartered in Tehran. Some have shared online registration details with IUVM, such as addresses and phone numbers. Twenty-one of the websites do both.

Emails sent to IUVM bounced back and telephone numbers the agency gave in web registration records did not work. Documents available on the main IUVM website say its objectives include “confronting with remarkable arrogance, western governments and Zionism front activities.”

Nile Net Online did not respond to questions sent to the email address on its website. Its operators, as well as those of the other websites identified by Reuters, could not be located. Previous owners identified in historical registration records could not be reached. The Egyptian government did not respond to requests for comment.

“UNSPOKEN TRUTH”

Some of the sites in the Iranian operation were first exposed in August by companies including Facebook, Twitter and Google’s parent, Alphabet after FireEye found them. The social media companies have closed hundreds of accounts that promoted the sites or pushed Iranian messaging. Facebook said last month it had taken down 82 pages, groups and accounts linked to the Iranian campaign; these had gathered more than one million followers in the United States and Britain.

But the sites uncovered by Reuters have a much wider scope. They have published in 16 different languages, from Azerbaijani to Urdu, targeting Internet users in less-developed countries. That they reached readers in tightly controlled societies such as Egypt, which has blocked hundreds of news websites since 2017, highlights the campaign’s reach.

The Iranian sites include:

* A news site called Another Western Dawn which says its focus is on “unspoken truth.” It fooled the Pakistani defense minister into issuing a nuclear threat against Israel; * Ten outlets targeting readers in Yemen, where Iran andU.S. ally Saudi Arabia have been fighting a proxy conflict since civil war broke out in 2015; * A media outlet offering daily news and satirical cartoons in Sudan. Reuters could not reach any of its staff; * A website called Realnie Novosti, or “Real News,” for Russian readers. It offers a downloadable mobile phone app but its operator could not be traced. The news on the sites is not all fake. Authentic stories sit alongside pirated cartoons, as well as speeches from Iran’s Supreme Leader Ayatollah Ali Khamenei. The sites clearly support Iran’s government and amplify antagonism to countries opposed to Tehran – particularly Israel, Saudi Arabia and the United States. Nile Net’s “laughing stock” piece was copied from an Iranian state TV network article published earlier the same day.

Some of the sites are slapdash. The self-styled, misspelled “Yemen Press Agency” carries a running update of Saudi “crimes against Yemenis during the past 24 hours.” Emails sent to the agency’s listed contact, Arafat Shoroh, bounced back. The agency’s address and phone number led to a hotel in the Yemeni capital, Sana’a, whose staff said they had never heard of Shoroh.

The identity or location of the past owners of some of the websites is visible in historical Internet registration records: 17 of 71 sites have in the past listed their locations as Iran or Tehran, or given an Iranian telephone or fax number. But who owns them now is often hidden, and none of the Iranian-linked operators could be reached.

More than 50 of the sites use American web service providers Cloudflare and OnlineNIC – firms that provide website owners with tools to shield themselves from spam and hackers. Frequently, such services also effectively conceal who owns the sites or where they are hosted. The companies declined to tell Reuters who operates the sites.

Under U.S law, hosting and web services companies are not generally liable for the content of sites they serve, said Eric Goldman, co-director of the High Tech Law Institute at Santa Clara University. Still, since 2014, U.S. sanctions on Iran have banned “the exportation or re-exportation, directly or indirectly, of web-hosting services that are for commercial endeavors or of domain name registration services.”

Douglas Kramer, general counsel for Cloudflare, said the services it provides do not include web-hosting services. “We’ve looked at those various sanctions regimes, we are comfortable that we are not in violation,” he told Reuters.

A spokesman for OnlineNIC said none of the sites declared a connection to Iran in their registration details, and the company was in full compliance with U.S. sanctions and trade embargoes.

The U.S. Treasury’s Office of Foreign Assets Control (OFAC) declined to comment on whether it planned an investigation.

ANOTHER WESTERN DAWN

The Kremlin is widely seen as the superpower in modern information warfare. From what is known so far, Russia’s influence operation – which Moscow denies – dwarfs Iran’s. According to Twitter, nearly 4,000 accounts connected to the Russian campaign posted over 9 million tweets between 2013 and 2018, against over 1 million tweets from fewer than 1,000 accounts believed to originate in Iran.

Even though the Iranian operation is smaller, it has had impact on volatile topics. AWDnews – the site with the focus on “unspoken truth” – ran a false story in 2016 which prompted Pakistan’s defense minister to warn on Twitter he had the weapons to nuke Israel. He only found out that the hoax was part of an Iranian operation when contacted by Reuters.

“It was a learning experience,” said the deceived politician, 69-year-old Khawaja Asif, who left Pakistan’s government earlier this year. “But one can understand that these sorts of things happen because fake news has become something huge. It’s something which anyone is capable of now, which is very dangerous.”

Israeli officials did not respond to a request for comment.

AWDnews publishes in English, French, Spanish and German and, according to data from web analytics company SimilarWeb, receives around 12,000 unique visitors a month. Among others who shared stories from AWDnews and the other websites identified by Reuters were politicians in Britain, Jordan, India, and the Netherlands; human-rights activists; an Indian music composer and a Japanese rap star.

In August 2015, an official account for a European department of the World Health Organization (WHO) tweeted an AWDnews story. Annalisa Buoro, secretary for the WHO’s European Office for Investment for Health and Development, said the person running the department’s Twitter account at the time did not know the website was part of an Iranian campaign.

She said the tweet had gone out when the account had a relatively small following, limiting the damage, but “on the other hand, I am very concerned … because as a UN agency we have a huge responsibility.”

JOBS FOR WOMEN

FireEye, a U.S. cybersecurity firm, originally named six websites as part of the Iranian influence operation. Reuters examined those sites, and their content led to the Tehran-based International Union of Virtual Media.

IUVM is an array of 11 websites with names such as iuvmpress, iuvmapp and iuvmpixel. Together, they form a library of digital material, including mobile phone apps, items from Iranian state media and pictures, video clips and stories from elsewhere on the web, which support Tehran’s policies.

Tracking usage of IUVM content across the Internet led to sites which have used its material, registration details, or both. For instance, 22 of the sites have shared the same phone number, which does not work and has also been listed for IUVM. At least seven have used the same address, which belongs to a youth hostel in Berlin. Staff at the hostel told Reuters they had never heard of the sites in question. The site operators could not be reached to explain their links with IUVM.

Two sites even posted job advertisements for IUVM, inviting applications from women with “ability to work effectively and knowledge in dealing with social networks and (the) Internet.”

DEMOLISHED HOME

One of IUVM’s most popular users is a site called Sudan Today, which SimilarWeb data shows receives almost 150,000 unique visitors each month. On Facebook, it tells its 57,000 followers that it operates without political bias. Its 18,000 followers on Twitter have included the Italian Embassy in Sudan, and its work has been cited in a report by the Egyptian Electricity Ministry.

The office address registered for Sudan Today in 2016 covers a whole city district in north Khartoum, according to archived website registration details provided by WhoisAPI Inc and DomainTools LLC. The phone number listed in those records does not work.

Reuters could not trace staff members named on Sudan Today’s Facebook page. The five-star Corinthia hotel in central Khartoum, where the site says it hosted an anniversary party last year, told Reuters no such event took place. And an address listed on one of its social media accounts is a demolished home.

Sudan used to be an Iranian ally but has changed sides to align itself with Saudi Arabia, costing Tehran a foothold in the Horn of Africa just as it becomes more isolated by the West. In that environment, Iran sees itself as competing with Israel, Saudi Arabia and the United States for international support, and is taking the fight online, said Ariane Tabatabai, a senior associate and Iran expert at the Center for Strategic and International Studies in Washington, D.C.

Headlines on Sudan Today’s homepage include a daily round-up of stories from local newspapers and Ugandan soccer results. It also features reports on bread prices – which doubled in January after Khartoum eliminated subsidies, triggering demonstrations.

Ohad Zaidenberg, senior researcher at Israeli cybersecurity firm ClearSky, said this mixture of content provides the cover for narratives geared at influencing a target audience’s attitudes and perceptions.

The site also draws attention to Saudi Arabia’s military actions in Yemen. Since Sudanese President Omar al-Bashir ended his allegiance with Iran he has sent troops and jets to join Saudi-led forces in the Yemeni conflict.

One cartoon from IUVM published by Sudan Today in August shows Donald Trump astride a military jet with an overflowing bag of dollar bills tucked under one arm. The jet is draped with traditional Saudi dress and shown dropping bombs on a bloodstained map of Yemen. The map is littered with children’s toys and shoes.

Turkish cartoonist Mikail Çiftçi drew the original. He told Reuters he did not give Sudan Today permission to use it.

Alnagi Albashra, a 28-year-old software developer in Khartoum, said he likes to read articles on Sudan Today in the evenings when waiting for his baby to fall asleep. But he and three other Sudan Today readers reached by Reuters had no idea who was behind the site.

“This is a big problem,” he said. “You can’t see that they are not in Sudan.”

Government officials in Khartoum, the White House, the Italian Embassy and the Egyptian Electricity Ministry did not respond to requests for comment.

BACKBONE

It is unclear who globally is tasked with responding to online disinformation campaigns like Iran’s, or what if any action they should take, said David Conrad, chief technology officer at ICANN, a non-profit which helps manage global web addresses.

Social media accounts can be deleted in bulk by the firms that provide the platforms. But the Iranian campaign’s backbone of websites makes it harder to dismantle than social media because taking down a website often requires the cooperation of law enforcement, Internet service providers and web infrastructure companies.

Efforts by social media companies in the United States and Europe to tackle the campaign have had mixed results.

Shortly after being contacted by Reuters, Twitter suspended the accounts for Nile Net Online and Sudan Today. “Clear attribution is very difficult,” a spokeswoman said but added that the company would continue to update a public database of tweets and accounts linked to state-backed information operations when it had new information.

Google did not respond directly to questions about the websites found by Reuters. The company has said it identified and closed 99 accounts which it says are linked to Iranian state media. “We’ve invested in robust systems to identify influence operations launched by foreign governments,” a spokeswoman said.

Facebook said it was aware of the websites found by Reuters and had removed five more Facebook pages. But a spokesman said that based on Facebook user data, the company was not yet able to link all the websites’ accounts to the Iranian activity found earlier. “In the past several months, we have removed hundreds of Pages, Groups, and accounts linked to Iranian actors engaging in coordinated inauthentic behavior. We continue to remove accounts across our services and in all relevant languages,” he said.

Accounts linked to the Iranian sites remain active online, especially in languages other than English. On Nov. 30, 16 of the Iranian sites were still posting daily updates on Facebook, Twitter, Instagram or YouTube – including Sudan Today and Nile Net Online. Between them, the social media accounts had more than 700,000 followers.

(Additional reporting by Nadine Awadalla in Cairo, Erich Knecht and Khalid Abdelaziz in Khartoum, Bozorgmehr Sharafedin Nouri and Ryan McNeill in London; Edited by Sara Ledwith)

Facebook, Google to tackle spread of fake news, advisors want more

FILE PHOTO - Commuters walk past an advertisement discouraging the dissemination of fake news at a train station in Kuala Lumpur, Malaysia March 28, 2018. REUTERS/Stringer

By Foo Yun Chee

BRUSSELS (Reuters) – Facebook, Google, and other tech firms have agreed on a code of conduct to do more to tackle the spread of fake news, due to concerns it can influence elections, the European Commission said on Wednesday.

Intended to stave off more heavy-handed legislation, the voluntary code covers closer scrutiny of advertising on accounts and websites where fake news appears, and working with fact checkers to filter it out, the Commission said.

But a group of media advisors criticized the companies, also including Twitter and lobby groups for the advertising industry, for failing to present more concrete measures.

With EU parliamentary elections scheduled for May, Brussels is anxious to address the threat of foreign interference during campaigning. Belgium, Denmark, Estonia, Finland, Greece, Poland, Portugal, and Ukraine are also all due to hold national elections next year.

Russia has faced allegations – which it denies – of disseminating false information to influence the U.S. presidential election and Britain’s referendum on European Union membership in 2016, as well as Germany’s national election last year.

The Commission told the firms in April to draft a code of practice or face regulatory action over what it said was their failure to do enough to remove misleading or illegal content.

European Digital Commissioner Mariya Gabriel said on Wednesday that Facebook, Google, Twitter, Mozilla, and advertising groups – which she did not name – had responded with several measures.

“The industry is committing to a wide range of actions, from transparency in political advertising to the closure of fake accounts and …we welcome this,” she said in a statement.

The steps also include rejecting payment from sites that spread fake news, helping users understand why they have been targeted by specific ads, and distinguishing ads from editorial content.

But the advisory group criticized the code, saying the companies had not offered measurable objectives to monitor its implementation.

“The platforms, despite their best efforts, have not been able to deliver a code of practice within the accepted meaning of effective and accountable self-regulation,” the group said, giving no further details.

Its members include the Association of Commercial Television in Europe, the European Broadcasting Union, the European Federation of Journalists and International Fact-Checking Network, and several academics.

(Reporting by Foo Yun Chee; editing by Philip Blenkinsop and John Stonestreet)

Genealogy websites help California police find Golden State Killer suspect

By Fred Greaves

SACRAMENTO, Calif. (Reuters) – California investigators tracked down the man they suspect is the Golden State Killer by comparing crime scene DNA to information on genealogy websites consumers use to trace their ancestry, a prosecutor said on Thursday.

Former police officer Joseph James DeAngelo, 72, was arrested on Tuesday outside the Sacramento-area home where he has lived for at least two decades, not far from the site of the first of eight murders he is charged with committing 40 years ago.

DeAngelo, described by neighbors as an oddball and loner known to fly into occasional fits of solitary rage, is suspected of 12 slayings in all. He also is accused of committing 45 rapes and scores of home invasions in a crime spree that spanned 10 years and 10 California counties during the 1970s and 1980s.

Announcing his arrest on Wednesday, authorities said DeAngelo’s name had never surfaced as a suspect prior to last week, when a DNA match was made.

Officials initially did not disclose how their investigation led to DeAngelo, whose DNA had never previously been collected.

But on Thursday, Steve Grippi, chief deputy district attorney for Sacramento County, said detectives narrowed their search by using genetic information available through commercial genealogy websites furnishing personal family histories to consumers who send DNA samples in for analysis.

Confirming details first reported by the Sacramento Bee newspaper, Grippi said investigators compared DNA samples left by the perpetrator at a crime scene to genetic profiles on the ancestry sites, looking for similarities.

He did not address whether the websites volunteered the information or were subject to a search warrant or subpoena.

Detectives followed the family trees of close matches, seeking blood relatives who fit a rough profile of the killer. The process produced a lead a week ago, pointing to DeAngelo based on his age and whereabouts at the time of the attacks, Grippi said.

Investigators found DeAngelo, placed him under surveillance and obtained his DNA from a discarded object, finding a match to a crime scene sample. A second, more decisive sample was collected from him days later and came back positive on Monday.

Authorities have not disclosed the relative whose DNA helped solve the case. DeAngelo is known to have at least two adult children.

DeAngelo is scheduled to make his first court appearance in Sacramento on Friday, facing two counts of murder.

On Thursday, sheriff’s detectives and FBI agents spent hours combing through his modest single-story house in Citrus Heights, a Sacramento suburb, and probing the backyard with poles for signs of digging. Red marker flags were visible in an embankment at the rear of the yard, enclosed by a tall wooden fence.

“Those are fairly standard search techniques,” said Lieutenant Paul Belli, a homicide detective for the sheriff’s department. “There’s no reason to believe there are bodies buried back there.”

Among the items of evidence collected from the house were computers and firearms, he said.

Investigators also sought articles of clothing that might help tie the suspect to particular crimes, such as ski masks or gloves worn during the attacks, or jewelry, driver’s licenses and other personal effects taken from victims, apparently as keepsakes or trophies, Belli said.

Belli said he doubted additional victims would emerge because exhaustive DNA database searches had turned up no further matches.

Neighbor Paul Sanchietti, 58, said he was left “bone-chilled” by news that DeAngelo, who lived four houses away, had been arrested as a suspected serial killer.

In the 20 years they lived as neighbors, Sanchietti said he could recount speaking just a few words with DeAngelo on two occasions, once when they pushed a stalled car out of the middle of the street.

“It just felt like he wanted to be left alone,” Sanchietti said of his neighbor, who he said had a reputation in the community for loud, angry outbursts.

“He would be outside in his driveway working on his car or something, and he would go into these rally loud tirades, Sanchietti told Reuters, adding that he nevertheless was unaware of DeAngelo ever running afoul of law enforcement.

(Reporting in Sacramento by Fred Greaves. Additional reporting and writing by Steve Gorman in Los Angeles; Editing by Cynthia Osterman and Michael Perry)

U.S. House passes bill to penalize websites for sex trafficking US

FILE PHOTO - The U.S. Capitol Building is lit at sunset in Washington, U.S., December 20, 2016. REUTERS/Joshua Roberts

By Dustin Volz

WASHINGTON (Reuters) – The U.S. House of Representatives on Tuesday overwhelmingly passed legislation to make it easier to penalize operators of websites that facilitate online sex trafficking, chipping away at a bedrock legal shield for the technology industry.

The bill’s passage marks one of the most concrete actions in recent years from the U.S. Congress to tighten regulation of internet firms, which have drawn heavy scrutiny from lawmakers in both parties over the past year due to an array of concerns regarding the size and influence of their platforms.

The House passed the measure 388-25. It still needs to pass the U.S. Senate, where similar legislation has already gained substantial support, and then be signed by President Donald Trump before it can become law.

Speaker Paul Ryan, in a statement before the vote, said the bill would help “put an end to modern-day slavery here in the United States.”

The White House issued a statement generally supportive of the bill, but said the administration “remains concerned” about certain provisions that it hopes can be resolved in the final legislation.

Several major internet companies, including Alphabet Inc’s Google and Facebook Inc, had been reluctant to support any congressional effort to dent what is known as Section 230 of the Communications Decency Act, a decades-old law that protects them from liability for the activities of their users.

But facing political pressure, the internet industry slowly warmed to a proposal that gained traction in the Senate last year, and eventually endorsed it after it gained sizeable bipartisan support.

Republican Senator Rob Portman, a chief architect of the Senate proposal, said in a statement he supported the House’s similar version and called on the Senate to quickly pass it.

The legislation is a result of years of law-enforcement lobbying for a crackdown on the online classified site backpage.com, which is used for sex advertising.

It would make it easier for states and sex-trafficking victims to sue social media networks, advertisers and others that fail to keep exploitative material off their platforms.

Some critics warned that the House measure would weaken Section 230 in a way that would only serve to further help established internet giants, who possess larger resources to police their content, and not adequately address the problem.

“This bill will only prop up the entrenched players who are rapidly losing the public’s trust,” Democratic Senator Ron Wyden, an original author of Section 230, said. “The failure to understand the technological side effects of this bill – specifically that it will become harder to expose sex-traffickers, while hamstringing innovation – will be something that this Congress will regret.”

(Reporting by Dustin Volz; editing by Sandra Maler and Lisa Shumaker)

In reversal, U.S. internet firms back bill to fight online sex trafficking

A computer keyboard is seen in Bucharest April 3, 2012.

By Dustin Volz

WASHINGTON (Reuters) – Major U.S. internet firms on Friday said they would support legislation to make it easier to penalize operators of websites that facilitate online sex trafficking, marking a sharp reversal for Silicon Valley on an issue long considered a top policy priority.

The decision to endorse a measure advancing in the U.S. Senate could clear the way for Congress to pass the first rewrite of a law adopted 21 years ago that is widely considered a bedrock legal shield for the internet industry.

Michael Beckerman, president of the Internet Association, said in a statement it supported a bipartisan proposal advancing in the U.S. Senate making it easier for states and sex-trafficking victims to sue social media networks, advertisers and others that fail to keep exploitative material off their platforms.

“Important changes made to (Stop Enabling Sex Traffickers Act) will grant victims the ability to secure the justice they deserve, allow internet platforms to continue their work combating human trafficking, and protect good actors in the ecosystem,” Beckerman said. His organization represents tech companies including Facebook, Amazon and Alphabet’s Google.

This week, the U.S. Senate Commerce Committee said it would vote next week on the bill authored by Republican Rob Portman and Democrat Richard Blumenthal.

The internet industry has fought such a change in the law for years, but now Washington is stepping up scrutiny on the sector on a range of policy issues after decades of hands-off regulation.

U.S. technology companies had long opposed any legislation seeking to amend Section 230 of the decades-old Communications Decency Act, arguing it is a bedrock legal protection for the internet that could thwart digital innovation and prompt endless litigation.

Bill negotiators agreed to make a handful of technical changes to the draft legislation, which Beckerman said helped earn support of the internet companies.

Those changes include clarity that criminal charges are based on violations of federal human trafficking law and that a standard for liability requires a website “knowingly” assisting of facilitating trafficking.

 

(Reporting by Dustin Volz; Editing by David Gregorio)

 

Researchers uncover flaw that makes Wi-Fi vulnerable to hacks

A magnifying glass is held in front of a computer screen in this picture illustration taken in Berlin May 21, 2013

(Reuters) – Belgian researchers have discovered a flaw in a widely used system for securing Wi-Fi communications that could allow hackers to read information that was previously understood to be encrypted, or infect websites with malware, they said on Monday.

Researchers Mathy Vanhoef and Frank Piessens of Belgian university KU Leuven disclosed the bug in the WPA2 protocol, which secures modern Wi-Fi systems used by vendors for wireless communications between mobile phones, laptops and other connected devices with Internet-connected routers or hot spots.

“If your device supports Wi-Fi, it is most likely affected,” they said on a website, www.krackattacks.com, that they set up to provide technical information about the flaw and methods for attacking vulnerable devices.

It was not immediately clear how difficult it would be for hackers to exploit the bug, or if the vulnerability has previously been used to launch any attacks.

The Wi-Fi Alliance, an industry group that represents hundreds of Wi-Fi technology companies, said the issue “could be resolved through a straightforward software update.”

The group said in a statement it had advised members to quickly release patches and recommended that consumers quickly install those security updates.

 

 

(Reporting by Jim Finkle in Toronto; editing by Susan Thomas)

 

GoDaddy removes white supremacist website after offensive post

The logo for internet company GoDaddy inc is shown on a computer screen

(Reuters) – The web hosting company GoDaddy said on Sunday it had given The Daily Stormer 24 hours to move its domain to another provider after the extremist web site posted an article denigrating the woman who was killed at a white nationalist rally in Virginia.

“We informed The Daily Stormer that they have 24 hours to move the domain to another provider, as they have violated our terms of service,” GoDaddy Inc said on its official Twitter page.

The Daily Stormer is a neo-Nazi, white supremacist website associated with the alt-right movement, which was spear-heading the rally on Saturday in Charlottesville, Virginia which resulted in violence, including the death of Heather Heyer, who was fatally struck by a car allegedly driven by a man with white nationalist views.

The hosting company’s rules of conduct ban using its services in a manner that “promotes, encourages or engages in terrorism, violence against people, animals or property.” Company representatives could not immediately be reached for comment.

The post on Heyer denigrated her physical appearance and what it said were anti-white male views.

On Monday, a note appeared on the Daily Stormer’s home page, which claimed that the site had been taken over by Anonymous, a loose-knit collective of hacker activists that intended to permanently take it offline in 24 hours.

Other original content remained on the Daily Stormer site, including appeals for financial support and the article attacking Heyer.

YourAnonNews, a Twitter feed that promotes attacks conducted by hackers who identify with Anonymous, said it had no confirmation that members of the group were involved.

It said it suspected the notice was posted as a “stunt.”

Daily Storm publisher Andrew Anglin could not immediately be reached for comment.

Scottsdale, Arizona-based GoDaddy, is one of the largest U.S. web hosting providers with some 6,000 employees.

 

(Reporting by Chris Michaud and Jim Finkle; Editing by Michael Perry and Nick Zieminski)

 

China holds drill to shut down ‘harmful’ websites

Computer code is seen on a screen above a Chinese flag in this July 12, 2017 illustration photo. REUTERS/Thomas White/Illustration

By Sijia Jiang

HONG KONG (Reuters) – China held a drill on Thursday with internet service providers to practice taking down websites deemed harmful, as the country’s censors tighten control ahead of a sensitive five-yearly political reshuffle set to take place later this year.

Internet data centers (IDC) and cloud companies – which host website servers – were ordered to participate in a three-hour drill to hone their “emergency response” skills, according to at least four participants that included the operator of Microsoft’s cloud service in China.

China’s Ministry of Public Security called for the drill “in order to step up online security for the 19th Party Congress and tackle the problem of smaller websites illegally disseminating harmful information”, according to a document circulating online attributed to a cyber police unit in Guangzhou.

An officer who answered the phone in the Guangzhou public security bureau confirmed the drill but declined to elaborate.

President Xi Jinping has overseen a tightening of China’s cyberspace controls, including tough new data surveillance and censorship rules. This push is now ramping up ahead of an expected consolidation of power at the Communist Party Congress this autumn.

The drill asked internet data centers to practice shutting down target web pages speedily and report relevant details to the police, including the affected websites’ contact details, IP address and server location.

China’s cyberspace administration declined to comment, saying it was not the correct department to address the question to. China’s Ministry of Public Security did not respond to a faxed request for comment.

Several service providers, including 21Vianet Group and VeryCloud, issued notices to users, warning of possible temporary service disruptions on Thursday afternoon as a result of the drill, which were confirmed to Reuters by their customer service representatives.

Nasdaq-listed 21 Vianet Group is China’s largest carrier-neutral internet data center services provider according to its website, and counts many Western multinationals including Microsoft, IBM, Cisco and HP among its clients. It runs Microsoft’s Azure-based services in China.

21 Vianet Group did not immediately respond to an emailed request for comment.

China has been tightening its grip on the internet, including a recent drive to crack down on the usage of VPNs to bypass internet censorship, enlisting the help of state-owned telecommunication service providers to upgrade the so-called Great Firewall.

Apple last week removed VPN apps from its app store, while Amazon’s China partner warned users not to use VPNs.

(Reporting by Sijia Jiang; Additional reporting by Susan Gao and Jasper Ng in HONG KONG and Ben Blanchard in Beijing; Editing by Mark Potter)

China takes action on thousands of websites for ‘harmful’, obscene content

Customers use computers at an internet cafe in Hefei, Anhui province

BEIJING (Reuters) – China has shut down or “dealt with” thousands of websites for sharing “harmful” erotic or obscene content since April, the state’s office for combating pornography and illegal publications announced on Thursday.

The office said 2,500 websites were prosecuted or shut down and more than 3 million “harmful” posts were deleted in eight months up to December during a drive to “purify” the internet in China and protect youth, the official Xinhua news agency reported.

The government has tightening its grip on Chinese cyberspace in recent months, in particular placing new restrictions on the fast-growing live-streaming industry.

The state has a zero-tolerance approach to what it considers lewd, smutty or illegal content and has in past crackdowns removed tens of thousands of websites in a single year.

Two popular news websites were also punished for spreading “illegal” content, Xinhua reported. It did not elaborate.

Aside from live-streaming, the office worked alongside the Ministry of Public Security, the ministry of Industry and Information Technology and the Cyberspace Administration of China to target cloud storage, chat apps and “vulgar” videos.

Social media platforms have become a key tool for spreading illegal content and mobile pay platforms including Alipay and WeChat pay have allowed individuals to make big profits, the office said.

(Reporting by Christian Shepherd; Editing by Robert Birsel)