The Pentagon’s Antivaccine Propaganda Endangered Public Health and Tarnished U.S. Credibility

According to a June Reuters exposé, the Pentagon ran a secret antivaccine campaign in several developing countries at the height of the pandemic in 2020. Why? “To sow doubt about the efficacy of vaccines and other life-saving aid that was being supplied by China,” Reuters reported. Trump’s secretary of defense signed off on it; the Biden administration discontinued the program shortly after taking office. The Pentagon launched its propaganda operation in the Philippines (as COVID was raging), where it set up fake anti-vax accounts on social media. A military officer involved with the Pentagon’s psyop told Reuters: “We weren’t looking at this from a public health perspective. We were looking at how we could drag China through the mud.”

Such cavalier thinking has lethal consequences in the infodemic era. Timothy Caulfield, a University of Alberta public policy expert, put this bluntly in an interview with Scientific American: “The United States government made a conscious decision to spread misinformation that killed people.”

Is he being hyperbolic? Well, health experts are quite certain that antivaccine rhetoric proved deadly during the coronavirus pandemic and that, in the U.S., politicized misinformation led to COVID deaths in the hundreds of thousands. What fueled much of this antivaccine discourse? Conspiracy narratives about microchips and vaccine-risk cover-ups as well as other villainous plots to control humanity by governments or global institutions. Yes, it was bonkers. But now we know that when health authorities were desperately trying to tamp down these fears, the Pentagon was running its own conspiracy operation to discredit vaccines–just so it could score points against China. The revelation is a “worst case scenario story” for the global public health community, says Caulfield, “because it demonstrates that anti-vax misinformation was being spread by the government, and it reinforces people’s distrust in institutions.”

The fallout from the military’s covert psyop will reverberate on multiple levels. “When democratic governments employ this kind of information operation, they undermine the values and trust that sustain democracies,” says Kate Starbird, a disinformation expert at the University of Washington. Similarly the economist Alex Tabarrok writes that the Pentagon’s antivaccine campaign has “undermined U.S. credibility on the global stage and eroded trust in American institutions.” (No doubt, but the latter has been on a precipitous decline for a while.)

The question now is: What can be done to prevent something like this happening again? International development economist Charles Kenny says it’s time to “ban intelligence operations from interfering in public health.” That would be a welcome start, but let’s not hold our breath. We’ve been down this road before: In 2011, the CIA used a fake hepatitis vaccination program to search for Osama bin Laden in Pakistan. After the ploy came to light several years later, terrorists murdered legitimate polio vaccine workers, and there was a resurgence of polio in the population. In 2014 the White House vowed the CIA would no longer use vaccine programs as a cover for spy operations. Here we are a decade later, however, and it appears the Pentagon wasn’t bound by that promise and won’t be keeping it in the future.

The U.S. government’s past ignoble deceptions of its own citizens should have served plenty of warning that this is foolish. We owe today’s UFO craze to the cover-up of a military balloon crash in 1947, only acknowledged decades later by the U.S. Air Force. More seriously, during the cold war, the CIA secretly funded a slew of American cultural and political organizations to (unwittingly) help wage its propaganda campaign against the Soviet Union, promoting favored artists in commissar like fashion. Then U.S. secretary of state Colin Powell touted completely fallacious “weapons of mass destruction” buncombe to the United Nations to justify the botched invasion of Iraq in 2003. Now overlay this with the vaccine deceptions used by America’s spymasters in Pakistan and more recently in the Philippines. It makes for a confusing lens to view a world overrun with fake news, bots and troll armies.

John Lisle, a University of Texas historian who researches cold war science and the intelligence community, says that the Pentagon should have learned from history before undertaking its recent antivaccine disinformation campaign. “It may have been intended to make Filipinos distrust China, but its legacy will be to make Americans distrust the government.”

Source: The Pentagon’s Antivaccine Propaganda Endangered Public Health and Tarnished U.S. Credibility | Scientific American

Before George Bush the younger it would have seemed beyond belief that stupidity of this kind was possible. But since the US has descended into unimaginable lows with their presidential choices and policies with the amount of corruption that has accompanied this, it almost seems like something you kind of shrug at.

Injecting Rhino horns with radioactive isotopes safe for the animals but poisons people eating them and sets off alarms at (air)ports

Scientists in South Africa are now injecting the horns of live rhinos with non-toxic radioactive isotopes to make the horns unfit for human consumption and allow for easier tracking at international border crossings, according to a press release from the University of the Witwatersrand in Johannesburg.

Launched on Tuesday by the university’s Radiation and Health Physics Unit (RHPU), the program has been in the works for several years as a way to fight back against poachers who sell the horns, which are often smuggled out of the country and used as alternative medicine therapies.

Humorously dubbed the Rhisotope Project, low doses of radioisotopes are being drilled into the horns of 20 sedated rhinos, whose health will be monitored for the next six months. If successful, the program could be expanded to include elephants and pangolins, as well other plants and animals, according to the university.

Consuming products made from the horns will make them “essentially poisonous for human consumption,” as one of the researchers told France’s AFP, but the primary goal is actually to identify the smuggling efforts before they even leave the country.

Most major airports and harbors, including those in South Africa, already have the infrastructure to detect radioactive material, an effort to protect them from nuclear weapons. Theoretically, anyone trying to smuggle these now-radioactive horns would set off the alarms and instigate a very serious police response. But the scientists are quick to point out that the process isn’t harmful to the animals.

“Each insertion was closely monitored by expert veterinarians and extreme care was taken to prevent any harm to the animals,” Professor James Larkin who’s leading the project, said in a press release. “Over months of research and testing we have also ensured that the inserted radioisotopes hold no health or any other risk for the animals or those who care for them.”

Witwatersrand posted a video to YouTube showing the novel process the university’s team has undertaken to fight back against poaching.

WATCH | A novel way to save rhinos

“Every 20 hours in South Africa a rhino dies for its horn,” Larkin said. “These poached horns are then trafficked across the world and used for traditional medicines, or as status symbols. This has led to their horns currently being the most valuable false commodity in the black-market trade, with a higher value even than gold, platinum, diamonds and cocaine.”

The International Rhino Foundation reports that 499 rhinos were killed in South Africa in 2023, an 11% decrease from 2022. There are an estimated 16,800 white rhinos and 6,500 black rhinos left in the entire world. South Africa alone has roughly 80% of the world’s white rhinos and about 30% of the world’s black rhinos.

Source: The EPA Is Doing Its Job Again

Apple set to pay away Batterygate and audio defect lawsuits for pocket change

Apple is preparing to settle two lawsuits next month over alleged iPhone flaws, provided the respective judges agree to the terms of the deals.

The first planned settlement, for In re Apple Inc. Stockholder Derivative Litigation, 4:19-cv-05153-YGR, aims to resolve investor pique over the impact of “Batterygate” on Apple stock.

Filed in 2019, the case [PDF] seeks compensation for unexplained iPhone shutdowns that started occurring in 2016 as a result of battery aging that left devices unable to handle processing demands.

“Instead of alerting customers about this solution, beginning in January 2017, Apple published iOS updates that secretly ‘fixed’ the shutdown issues by dramatically slowing the performance of older iPhone models without the owner’s knowledge or consent,” the initial complaint alleged.

“These updates silently introduced a trade-off between battery life and performance reduction without informing iPhone owners that a simple $79 replacement battery would restore both.”

This was something of a scandal at the time and led to a fine of $11.4 million from Italian regulators in 2018, a $113 million penalty extracted by 34 US states, consumer litigation that led to a settlement of $310-$500 million, and a fine of about $27 million in France. There’s also a UK claim for up to £853 million ($1.03 billion) that has yet to be resolved.

Apple investors now stand to recoup a paltry $6 million if Judge Yvonne Gonzalez Rogers approves the deal [PDF] in a hearing scheduled for July 16, 2024. That would be almost 0.002 percent of the $383.29 billion in revenue Apple collected in 2023.

The settlement, disclosed to investors in May, requires Apple to notify customers in a clear and conspicuous way when it makes changes to iOS Performance Management. And alongside increased commitments to transparency – traditionally not Apple’s strong suit – it imposes verification obligations on its chief compliance officer.

The second claim awaiting settlement approval is Tabak, et al. v. Apple Inc., 4:19-CV-02455-JST, a lawsuit over an alleged audio chip defect in Apple’s iPhone 7 and 7 Plus models that resulted in intermittent sound issues.

According to the complaint, the alleged defect was caused by solder that failed to adhere to the logic board when stressed, thereby breaking the electrical connection between the audio chip and board.

Apple has denied the allegations, but to be rid of the litigation is willing to pay $35 million to resolve the claim, provided Judge Jon Tigar approves the arrangement in a hearing scheduled for July 18.

If the deal goes through, affected members of the class could receive payments ranging from $50 to $349 for their trouble. Of the 1,649,497 Settlement Class Members, 114,684 payment forms have been submitted to the claim administrator. Those notified of membership in the class have until July 3 to respond.

Source: Apple set to pay away Batterygate and audio defect lawsuits • The Register

EU’s ‘Going Dark’ Expert Group Publishes 42-Point Surveillance Plan For Access To All Devices And Data At All Times

Techdirt has been covering the disgraceful attempts by the EU to break end-to-end encryption — supposedly in order to “protect the children” — for two years now. An important vote that could have seen EU nations back the proposal was due to take place recently. The vote was cancelled — not because politicians finally came to their senses, but the opposite. Those backing the new law were worried the latest draft might not be approved, and so removed it from the agenda, to allow a little more backroom persuasion to be applied to holdouts.

Although this “chat control” law has been the main focus of the EU’s push for more surveillance of innocent citizens, it is by no means the end of it. As the German digital rights site Netzpolitik reports, work is already underway on further measures, this time to address the non-existent “going dark” threat to law enforcement:

The group of high-level experts had been meeting since last year to tackle the so-called „going dark“ problem. The High-Level Group set up by the EU was characterized by a bias right from the start: The committee is primarily made up of representatives of security authorities and therefore represents their perspective on the issue.

Given the background and bias of the expert group, it’s no surprise that its report, “Recommendations from the High-Level Group on Access to Data for Effective Law Enforcement”, is a wish-list of just about every surveillance method. The Pirate Party Member of the European Parliament Patrick Breyer has a good summary of what the “going dark” group wants:

according to the 42-point surveillance plan, manufacturers are to be legally obliged to make digital devices such as smartphones, smart homes, IoT devices, and cars monitorable at all times (“access by design”). Messenger services that were previously securely encrypted are to be forced to allow for interception. Data retention, which was overturned by the EU Court of Justice, is to be reenacted and extended to OTT internet communications services such as messenger services. “At the very least”, IP connection data retention is to be required to be able to track all internet activities. The secure encryption of metadata and subscriber data is to be prohibited. Where requested by the police, GPS location tracking should be activated by service providers (“tracking switch”). Uncooperative providers are to be threatened with prison sentences.

It’s an astonishing list, not least for the re-appearance of data retention, which was thrown out by the EU’s highest court in 2014. It’s a useful reminder that even when bad laws are overturned, constant vigilance is required to ensure that they don’t come back at a later date.

Source: EU’s ‘Going Dark’ Expert Group Publishes 42-Point Surveillance Plan For Access To All Devices And Data At All Times | Techdirt

These people don’t seem to realise that opening this stuff up for law enforcement (who do misuse their powers), also opens it up to criminals.

Corrupt US supreme court thinks corruption is not corrupt and just basically legalized bribery

[…] if you’re rich enough, says the US supreme court, you can now pay off state and local officials for government acts that fit your policy preferences or advance your interests. You can give them lavish gifts, send them on vacations, or simply cut them checks. You can do all of this so long as the cash, gifts or other “gratuities” are provided after the service, and not before it – and so long as a plausible deniability of the meaning and intent of these “gratuities” is maintained.

That was the ruling authored by Kavanaugh in Snyder v United States, a 6-3 opinion issued on Wednesday, in which the supreme court dealt the latest blow to federal anti-corruption law. In the case, which was divided along ideological lines, the court held that “gratuities” – that is, post-facto gifts and payments – are not technically “bribes”, and therefore not illegal. Bribes are only issued before the desired official act, you see, and their meaning is explicit; a more vague, less vulgarly transactional culture of “gratitude” for official acts, expressed in gifts and payments of great value, is supposed to be something very different. The court has thereby continued its long effort to legalize official corruption, using the flimsiest of pretexts to rob federal anti-corruption statutes of all meaning.

The case concerns James Snyder, who in 2013 was serving as the mayor of small-town Portage, Indiana. Late that year, the city of Portage awarded a contract to Great Lakes Peterbilt, a trucking company, and bought five tow trucks from them; a few weeks later, Snyder asked for and accepted a check for $13,000 from the company. Snyder was found guilty of corruption and sentenced to 21 months in federal prison. He argued that the kickback was not illegal because it came after he awarded a contract to the company that ultimately paid him off, not before.

Absurdly the US supreme court agreed, classifying such payments as mere tokens of appreciation and claiming they are not illegal when they are not the product of an explicit agreement meant to influence official acts in exchange for money.

In so doing, the court has narrowed the scope of anti-corruption law for state and local officials to apply to only those exchanges of money, goods and official favor in which an explicit quid pro quo arrangement can be proved.

[…]

The court’s narrow vision of corruption – one in which only explicit, whispered deals in shadowy, smoke-filled back rooms count as “corruption”, and all other forms of influence and exchange are something other than the genuine article – also fundamentally misunderstands how influence-peddling works. In his controlling opinion, Kavanaugh emphasizes that in order to be an illegal bribe, a gift or payment must be accompanied by “a corrupt state of mind” on behalf of the official or benefactor. But corruption, influence-peddling, and unfair and undue methods of persuasion are more subtle and complicated than this in practice.

For an example, we need look no further than the conservative justices of the supreme court itself, who have become notorious, in recent years, for accepting lavish gifts and chummy intimacy from rightwing billionaires. According to investigative reporting by ProPublica, Clarence Thomas has accepted vacations, real estate purchases, tuition for his young relatives, and seemingly innumerable private jet trips from the billionaire Harlan Crow, as well as financing for an RV from another wealthy patron, Anthony Welters. Thomas has argued that these gifts and favors are merely the “personal hospitality” of “close personal friends”.

[…]

Source: The US supreme court just basically legalized bribery | Moira Donegan | The Guardian

ID verification service that works with TikTok and X left its admin credentials wide open for a year

An ID verification company that works on behalf of TikTok, X and Uber, among others, has left a set of administrative credentials exposed for more than a year, as reported by 404 Media. The Israel-based AU10TIX verifies the identity of users by using pictures of their faces and drivers’ licenses, potentially opening up both to hackers.

“My personal reading of this situation is that an ID Verification service provider was entrusted with people’s identities and it failed to implement simple measures to protect people’s identities and sensitive ID documents,” Mossab Hussein, the chief security officer at cybersecurity firm spiderSilk who originally noticed the exposed credentials, said.

The set of admin credentials that were left exposed led right to a logging platform, which in turn included links to identity documents. There’s even some reason to suspect that bad actors got ahold of these credentials and actually used them.

They appear to have been scooped up by malware in December 2022 and placed on a Telegram channel in March 2023, according to timestamps and messages acquired by 404 Media. The news organization downloaded the credentials and found a wealth of passwords and authentication tokens linked to someone who lists their role on LinkedIn as a Network Operations Center Manager at AU10TIX.

If hackers got ahold of customer data, it would include a user’s name, date of birth, nationality, ID number and images of uploaded documents. It’s pretty much all an internet gollum would need to steal an identity. All they would have to do is snatch up the credentials, log in and start wreaking havoc. Yikes.

[…]

Source: An ID verification service that works with TikTok and X left its credentials wide open for a year