{"id":9736,"date":"2024-12-12T10:35:08","date_gmt":"2024-12-12T17:35:08","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=9736"},"modified":"2024-12-12T10:35:08","modified_gmt":"2024-12-12T17:35:08","slug":"five-eyes-urges-broader-censorship-under-protect-the-children-campaign","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2024\/12\/12\/five-eyes-urges-broader-censorship-under-protect-the-children-campaign\/","title":{"rendered":"Five Eyes Urges Broader Censorship Under \u201cProtect the Children\u201d Campaign"},"content":{"rendered":"\n<p>This is interesting that Five Eyes is putting out a paper on the radicalization of young people online in a ploy against encryption and for identifying people (think digital ID). Of interest, recently the US government has been telling people to get off the phone networks because of Chinese hacking, and use encrypted chat clients like Signal and Telegram (Telegram Founder was arrested and detained in France, so compromised?). You&#8217;d have to think they have access to encrypted communication on those platforms via a backdoor or have broken the encryption (Telegram uses their own encryption not based on established cryptographic norms), and it&#8217;s legally less restrictive than the telecommunications networks to access as they see fit. Consequently, the young people angle combined with all these Muslims they&#8217;ve brought into western nations could easily be turned into a compelling reason for crackdowns on privacy. Factor in how effective the psyop for &#8220;Sovereign Citizens&#8221; has been, to where there is no shortage of useful idiots that can be weaponized for any agenda. <\/p>\n\n\n\n<p><a href=\"https:\/\/reclaimthenet.org\/ive-eyes-targets-encryption-online-anonymity-censorship-extremism\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/reclaimthenet.org\/ive-eyes-targets-encryption-online-anonymity-censorship-extremism<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_7e831173-3a4e-4e1b-9ef7-ba45bad0b18a\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<h5 class=\"wp-block-heading\">Global spy alliance shifts focus to encryption, calling for sweeping collaboration across governments and tech platforms.<\/h5>\n\n\n\n<p>By Didi Rankovic<\/p>\n\n\n\n<p><a href=\"https:\/\/reclaimthenet.org\/ive-eyes-targets-encryption-online-anonymity-censorship-extremism#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjQxNTI3IiwidG9nZ2xlIjpmYWxzZX0%3D\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/reclaimthenet.org\/wp-content\/uploads\/2024\/12\/Five-Eyes-scaled.jpg\" alt=\"A surreal cityscape with large blue eyes overlaying tall buildings, creating a futuristic and mysterious atmosphere.\" class=\"wp-image-205824\"\/><\/figure>\n\n\n\n<p>A network facilitating spy agencies\u2019 intelligence-sharing between the US, UK, Canada, Australia, and New Zealand, known as <a href=\"https:\/\/reclaimthenet.org\/new-reports-reveal-five-eyes-surge-in-biometric-data-collection\">Five Eyes<\/a>, has its sights set on encryption, and proceeding from that, also online anonymity.<\/p>\n\n\n\n<p>Even more online censorship would also not be a bad idea \u2013 these are some of the highlights from the first public-facing paper the organizations behind this group have published.<\/p>\n\n\n\n<p><strong>We obtained a copy of the paper for you <a href=\"https:\/\/docs.reclaimthenet.org\/Unclassified-Five-Eyes-CT-minors-paper.pdf\">here<\/a>.<\/strong><\/p>\n\n\n\n<p>And Five Eyes is not above promoting its ultimate and much more far-reaching goals by using the good old \u201cthink of the children\u201d \u2013 the paper\u2019s title is, Young People and Violent Extremism: A Call for Collective Action.<\/p>\n\n\n\n<p>Both it and an accompanying press release choose to consider online encryption as merely a tool used by criminals. At the same time, the paper is ignoring the fact that the entire internet ecosystem, from communications to banking and everything in between, requires strong encryption both for privacy, and security.<\/p>\n\n\n\n<p>But, Five Eyes focuses only on communications, which they vaguely refer to as online environments, and ones that can allow sex offenders access to children, they also mention extremists, and equally vaguely, \u201cother\u201d malign actors.<\/p>\n\n\n\n<p>Since encrypted platforms provide anonymity, the spies from the five countries (who refer to the state of affairs as, \u201ca large degree of anonymity\u201d) don\u2019t like that either \u2013 and again link it to negative scenarios, such as \u201cradicalization to violence.\u201d<\/p>\n\n\n\n<p>The paper is not specific on the exact mechanisms that would ramp up online censorship, but mentions both governments and the tech industry; the first category should \u201cstrengthen legislative support for law enforcement,\u201d while the other is urged to \u201ctake greater responsibility for the harm done on their platforms.\u201d<\/p>\n\n\n\n<p>Gaming platforms Discord, Instagram, Roblox as well as TikTok are singled out as \u201cseemingly innocuous\u201d \u2013 but the way Five Eyes sees it, they make violent extremism content \u201cmore accessible.\u201d<\/p>\n\n\n\n<p>The \u201cwhole-of-society response\u201d is the proposed solution to the problem of radicalization of minors in these countries. And the documents vow the alliance will continue working with \u201cgovernment agencies, the education sector, mental health and social well-being services, communities and technology companies.\u201d<\/p>\n\n\n\n<p>\u201cIt is important to work together early as once law enforcement and security agencies need to become involved, it is often too late,\u201d the paper warns.<\/p>\n\n\n\n<p>And so, a network whose members are likely, in one capacity or another, behind many of the existing attacks on online encryption and anonymity \u2013 has now come out as the campaign\u2019s supposedly \u201clatest recruit.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is interesting that Five Eyes is putting out a paper on the radicalization of young people online in a ploy against encryption and for identifying people (think digital ID). Of interest, recently the US government has been telling people to get off the phone networks because of Chinese hacking, and use encrypted chat clients [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[],"class_list":["post-9736","post","type-post","status-publish","format-standard","hentry","category-tech","category-world"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=9736"}],"version-history":[{"count":1,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9736\/revisions"}],"predecessor-version":[{"id":9737,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9736\/revisions\/9737"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=9736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=9736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=9736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}