Professor William LeoGrande, Associate Vice Provost for Academic Affairs in the Department of Government at the American University, and Professor of Politics and International Relations at Florida International University, Eduardo Gamarra, analyze with host Carol Castiel the roots and ramifications of twin crises in the Caribbean: the assassination of Haiti’s President, Jovenal Moïse, and ensuing power struggle and the largest and most widespread protests in Cuba in decades. How does the turmoil affect US policy toward the region? Given the large Cuban and Haitian Diaspora communities in the United States, how does the Biden Administration deal with both domestic and international dimension of policy?
…
Category: eNews
Digital and technology news. A newsletter is a printed or electronic report containing news concerning the activities of a business or an organization that is sent to its members, customers, employees or other subscribers
Pope Reverses Benedict, Reimposes Restrictions on Latin Mass
Pope Francis cracked down Friday on the spread of the old Latin Mass, reversing one of Pope Benedict XVI’s signature decisions in a major challenge to traditionalist Catholics who immediately decried it as an attack on them and the ancient liturgy.
Francis reimposed restrictions on celebrating the Latin Mass that Benedict relaxed in 2007 and went further to limit its use. The pontiff said he was acting because Benedict’s reform had become a source of division in the church and been exploited by Catholics opposed to the Second Vatican Council, the 1960s meetings that modernized the church and its liturgy.
Critics said they had never witnessed a pope so thoroughly reversing his predecessor. That the reversal concerned something so fundamental as the liturgy, while Benedict is still alive and living in the Vatican as a retired pope, only amplified the extraordinary nature of Francis’ move, which will surely result in more right-wing hostility directed at him.
Francis, 84, issued a new law requiring individual bishops to approve celebrations of the old Mass, also called the Tridentine Mass, and requiring newly ordained priests to receive explicit permission to celebrate it from their bishops, in consultation with the Vatican.
Under the new law, bishops must also determine if the current groups of faithful attached to the old Mass accept Vatican II, which allowed for Mass to be celebrated in the vernacular rather than Latin. These groups cannot use regular churches; instead, bishops must find alternate locations for them without creating new parishes.
In addition, Francis said bishops are no longer allowed to authorize the formation of any new pro-Latin Mass groups in their dioceses.
Francis said he was taking action to promote unity and heal divisions within the church that had grown since Benedict’s 2007 document, Summorum Pontificum. He said he based his decision on a 2020 Vatican survey of all the world’s bishops, whose “responses reveal a situation that preoccupies and saddens me, and persuades me of the need to intervene.”
The pope’s rollback immediately created an uproar among traditionalists already opposed to Francis’ more progressive bent and nostalgic for Benedict’s doctrinaire papacy.
“This is an extremely disappointing document which entirely undoes the legal provisions,” of Benedict’s 2007 document, said Joseph Shaw, chairman of the Latin Mass Society of England and Wales.
While Latin celebrations can continue, “the presumption is consistently against them: bishops are being invited to close them down,” Shaw said, adding that the requirement for Latin Masses to be held outside a parish was “unworkable.”
“This is an extraordinary rejection of the hard work for the church and the loyalty to the hierarchy which has characterized the movement for the Traditional Mass for many years, which I fear will foster a sense of alienation among those attached to the church’s ancient liturgy,” he said.
Benedict had issued his document in 2007 to reach out to a breakaway, schismatic group that celebrates the Latin Mass, the Society of St. Pius X, and which had split from Rome over the modernizing reforms of Vatican II.
But Francis said Benedict’s effort to foster unity had essentially backfired.
The opportunity offered by Benedict, the pope said in a letter to bishops accompanying the new law, was instead “exploited to widen the gaps, reinforce the divergences, and encourage disagreements that injure the Church, block her path, and expose her to the peril of division.”
Francis said he was “saddened” that the use of the old Mass was accompanied by a rejection of Vatican II itself “with unfounded and unsustainable assertions that it betrayed the Tradition and the ‘true Church.’”
Christopher Bellitto, professor of church history at Kean University, said Francis was right to intervene, noting that Benedict’s original decision had had a slew of unintended consequences that not only created internal divisions but temporarily roiled relations with Jews.
“Francis hits it right on the head with his observation that Benedict’s 2007 loosening of regulations against the Latin rite allowed others to use it for division,” he said. “The blowback proves his point.”
The blowback was indeed fierce, though it’s also likely that many will simply ignore Francis’ decree and continue as before with sympathetic bishops. Some of these traditionalists and Catholics already were among Francis’ fiercest critics, with some accusing him of heresy for having opened the door to letting divorced and civilly remarried Catholics receive Communion.
Rorate Caeli, a popular traditionalist blog run out of the U.S., said Francis’ “attack” was the strongest rebuke of a pope against his predecessors in living memory.
“Francis HATES US. Francis HATES Tradition. Francis HATES all that is good and beautiful,” the group tweeted. But it concluded: “FRANCIS WILL DIE, THE LATIN MASS WILL LIVE FOREVER.”
Messa in Latino, an Italian traditionalist blog, was also blistering in its criticism.
“Mercy always and only for sinners (who are not asked to repent) but no mercy for those few traditional Catholics,” the blog said Friday.
For years, though, Francis has made known his distaste of the old liturgy, privately labeling its adherents self-referential naval gazers who are out of touch with the needs of the church. He has cracked down on religious orders that celebrated the old Mass exclusively and frequently decried the “rigidity” of tradition-minded priests who prioritize rules over pastoral accompaniment.
Traditionalists have insisted that the old liturgy was never abrogated, and that Benedict’s 2007 reform had allowed it to flourish.
They point to the growth of traditionalist parishes, often frequented by young, large families, as well as new religious orders that celebrate the old liturgy. The Latin Mass Society says the number of traditional Masses celebrated each Sunday in England and Wales had more than doubled since 2007, from 20 to 46.
But for many, the writing was on the wall as soon as Francis stepped out onto the loggia of St. Peter’s Basilica after his 2013 election without the ermine-trimmed red velvet cape that was preferred by Benedict and is a symbol of the pre-Vatican II church.
The restrictions went into immediate effect with its publication in Friday’s official Vatican newspaper, L’Osservatore Romano.
…
Persians of Israel: Menashe Amir (Part 2 – Fighting Holocaust Denial with Yad Vashem)
Israel-based Yad Vashem is the world’s leading organization dedicated to Holocaust awareness. It seeks to remind humanity about what could result from the modern-day extreme hatreds and genocidal ideologies fueling international tensions and conflicts. One source of concern for Yad Vashem is Iran, whose leaders repeatedly have denied and questioned the facts of the Holocaust in recent years. In this Persians of Israel episode, we learn what Yad Vashem has done to try to educate Iranians about the Holocaust, and how veteran Persian Israeli journalist Menashe Amir played a key role in that effort. Amir, who gives VOA’s Michael Lipin a tour of Yad Vashem’s Jerusalem museum, explains how they worked together to improve the Iranian people’s understanding of the Holocaust after then-Iranian president Mahmoud Ahmadinejad first called it a “myth” in 2005. Amir also shares what he thinks still must be done to show Iranians and others why such genocides should never happen again.
…
Australia Called ‘Easy’ Target for Hackers
Australian cybersecurity experts are calling for more aggressive government action to protect businesses from ransomware attacks. Experts have warned a “tsunami of cybercrime” has cost the global economy about $743 billion.
Big companies can be attractive targets for cybercriminals who can extort millions of dollars after stealing sensitive commercial information.
The Cybersecurity Cooperative Research Centre is a collaboration between industry representatives, the Australian government and academics.
Its chief executive, Rachael Falk, believes Australia is an easy target for hackers because cyber defenses can be weak.
“More often than not, it is by sending an email where an employee clicks on a link,” she said. “They get into that organization, they have a good look around and they work out what is valuable data here that we can encrypt, which means we lock it up and we will take a copy of it. And then we will encrypt all the valuable data in that organization and then we will hold them to ransom for money. So, it is a business model for criminals that earns them money.”
The consequences for businesses can be extreme. They can lose valuable data, or have it leaked or sold by cyberthieves. In some cases, hackers can disable an organization’s entire operation. In March, a cyberattack disrupted broadcasts by Channel Nine, one of Australia’s most popular commercial television news networks. It sought help from the Australian Signals Directorate, a government intelligence agency.
Researchers want the government to require Australian companies to tell authorities when they are being targeted.
They also want clarity on whether paying ransoms is legal. Experts have said Australian law does not make it clear whether giving money to hackers is a criminal offense.
There is also a call for the government to use tax incentives to encourage Australian businesses to invest in cybersecurity.
Last year, federal government agencies said China had been responsible for a series of cyberattacks on Australian institutions, including hospitals and state-owned companies.
…
Iranian Hackers Target US Military, Defense Companies
Iran appears to be intensifying its effort to exploit U.S. and Western targets in cyberspace, running a campaign aimed at manipulating American military personnel and defense companies on social media.
Tehran’s latest campaign, orchestrated on Facebook by a group known as Tortoiseshell, used a series of sophisticated, fake online personas to make contact with U.S. servicemembers and employees of major defense companies in order to infect their computers with malware and extract information.
“This activity had the hallmarks of a well-resourced and persistent operation, while relying on relatively strong operational security measures to hide who’s behind it,” Facebook said Thursday in a blog post, calling it part of a “much broader cross-platform cyber espionage operation.”
Personas used
Employees of defense companies in the U.K. and other European countries were also targeted.
“These accounts often posed as recruiters and employees of defense and aerospace companies from the countries their targets were in,” Facebook said. “Other personas claimed to work in hospitality, medicine, journalism, NGOs and airlines.”
And the hackers were in no hurry.
“Our investigation found that this group invested significant time into their social engineering efforts across the internet, in some cases engaging with their targets for months,” Facebook said. “They leveraged various collaboration and messaging platforms to move conversations off-platform and send malware to their targets.”
Facebook said it has notified users who appeared to have been targeted, took down the fake accounts and blocked the malicious domains from being shared.
The social media company said it was able to trace the activity to Iran, in part because of the distinctive malware, known to have been developed by Mahak Rayan Afraz, a Tehran-based company with links to Iran’s Islamic Revolutionary Guard Corps.
Mandiant Threat Intelligence, a private cybersecurity company, said Thursday that it agreed with Facebook’s assessment that Iran, and the IRGC in particular, was behind the campaign.
Tortoiseshell “has historically targeted people and organizations affiliated with the U.S. military and information technology providers in the Middle East since at least 2018,” Mandiant Senior Principal Analyst Sarah Jones said in an email.
Jones also said it was noteworthy that some of the fake domains associated with the Iranian campaign used the name of former U.S. President Donald Trump, including, “trumphotel[.]net”, “trumporganization[.]world”, and “trumporganizations[.]com”.
“Domains such as these could suggest social engineering associated with U.S. political topics,” Jones said. “We have no evidence that these domains were operationalized or used to target anyone affiliated with the Trump family or properties.”
Facebook, which discovered the hacking campaign, did not comment on whether Iran managed to steal any critical or sensitive data.
U.S. military officials also declined to speak about what, if anything, the Iranian hackers were able to steal.
“For operational security purposes, U.S. Cyber Command does not discuss operations, intelligence and cyber planning,” a spokesperson told VOA.
“The threats posed by social media interactions are not unique to any particular social media platform and Department of Defense personnel must be cautious when engaging online,” the spokesperson added.
‘Significant threat’
U.S. intelligence officials have been increasingly concerned about Iran’s growing capabilities and aggressiveness in cyberspace.
In its annual Worldwide Threat Assessment, published in April, the Office of the Director of National Intelligence called Tehran “a significant threat to the security of U.S. and allied networks and data.”
“We expect Tehran to focus on online covert influence, such as spreading disinformation about fake threats or compromised election infrastructure and recirculating anti-U.S. content,” the report said.
The U.S. intelligence community, earlier this year, also accused Iran of meddling in the 2020 U.S. presidential election, carrying out a “multi-pronged covert influence campaign intended to undercut former President Trump’s reelection prospects.”
U.S. officials said part of that effort involved hacking voter registration systems in at least one U.S. state and using the information to send prospective voters threatening emails.
More recently, the cybersecurity firm Proofpoint said a separate Iranian hacker collective with ties to the IRGC, known as TA453 and Charming Kitten, posed as British university professors to steal information and research from think tanks and academics.
…
Experts Say Genetic Data Collection by Chinese Company Presents Global Policy Challenge
A Chinese gene company is collecting genetic data through prenatal tests from women in more than 50 countries for research on the traits of populations, raising concern that such a large DNA database could give China a technological advantage and the strategic edge to dominate global pharmaceuticals, according to a recent news report.
Analysts expressed unease with the developments exclusively reported by Reuters at BGI Group, the Chinese gene company, which is collecting genetic data via its NiPT prenatal test with the brand name NIFTY (Non-Invasive Fetal TrisomY).
The tests, sold in more than 50 countries, can detect abnormalities such as Down syndrome in the fetus by capturing DNA from the placenta in the bloodstream about 10 weeks into a pregnancy.
The tests are sold in 52 countries, including Germany, Spain and Denmark, as well as in Britain, Canada, Australia, Thailand, India and Pakistan, according to Reuters. They are not sold in the United States, where “government advisers warned in March that the genomic data BGI is amassing and analyzing with artificial intelligence could give China a path to economic and military advantage,” Reuters reported.
Collecting the biggest and most diverse set of human genomes could propel China to dominate global pharmaceuticals, and also potentially lead to genetically enhanced soldiers, or engineered pathogens to target the U.S. population or food supply, the U.S. advisers said, according to Reuters.
Reggie Littlejohn, founder and president of the rights group Women’s Rights Without Frontiers, said that due to China’s strategy of fusing military and civilian interests, “any Chinese company can be forced by the government to supply its information to the military.”
China sells the prenatal tests “a good product at a lower cost because they’re able to do that,” Littlejohn said. “But what people don’t realize is that when they get these lower cost genetic tests,” the collected information goes to the Chinese military,” she told VOA via a video interview using Microsoft Teams.
The Reuters report said the company has “worked with the Chinese military to improve ‘population quality’ and on genetic research to combat hearing loss and altitude sickness in soldiers.”
China’s Ministry of Foreign Affairs dismissed the report, telling Reuters it was “a groundless accusation and smear campaign.”
Dan Harris, an international lawyer and author at the China Law Blog, told VOA Mandarin that he believes democratic entities, such as the United States, Japan, Korea, Australia and the European Union, are going to realize they “need to enact special laws to deal with China and China’s hoovering of data.”
Crystal Grant, a data scientist and molecular biologist with a Ph.D. in genetics who is a technology fellow in the Speech, Privacy and Technology Project at the American Civil Liberties Union, told VOA Mandarin via Teams video interview that this accumulation of DNA will challenge genomic policy worldwide.
By using what she described as “this massive amount of information” and supercomputers “to crack those codes is going to be a threat to genomic policy everywhere,” she told VOA in a video interview.
Huang Yanzhong, a senior fellow for global health at the Council of Foreign Relations, told VOA Mandarin in a TV interview in February that rapid advances in genetics and biotechnology have highlighted the need for the international community to step up regulations to prevent data abuse.
“It is not just China. The progress in the legal framework in this area is lagging behind,” Huang said. “It’s vital for the international community to sit down and work out a framework.”
Genetic engineering
Yet researchers worldwide in the academic, private and government sectors, are refining genetic engineering techniques and knowledge.
China’s interest in the field is not new. In 2018, researcher He Jiankui announced that he had produced twins genetically altered to resist HIV using a relatively new, accurate and very fast American-developed genetic editing technique known by its acronym, CRISPR.
In 2019, a Chinese court found He guilty of using “illegal medical practices” and sentenced He to three years in prison.
Prenatal privacy
Reuters found no evidence BGI violated patient privacy agreements or regulations. “However, the privacy policy on the NIFTY test’s website says data collected can be shared when it is ‘directly relevant to national security or national defense security’ in China,” the report stated.
BGI dismissed the Reuters report, saying that the company’s research has met national and international requirements.
“All NIPT data collected overseas are stored in BGI’s laboratory in Hong Kong and are destroyed after five years, as stipulated by General Data Protection Regulation (GDPR),” the company said in a statement released on July 9.
BGI emphasized that it developed the NIPT test alone, not in a partnership with China’s military.
Reuters interviewed four women who have used the BGI’s prenatal tests in Poland, Spain and Thailand. They all signed consent forms stating that their genetic data would be stored and used for research, yet they are not aware that their genetic information could end up in China.
Harris, the lawyer, told VOA that most of the time, people didn’t know what they were signing.
“Maybe the sign off says that it will be limited to BGI and BGI access, though XYZ, a Chinese military company, might be one of BGI’s subsidiaries,” which would mean that the consent form allowed BGI to transfer a woman’s genetic information to the Chinese military, he told VOA via Microsoft Teams.
One of the women, a 32-year-old office administrator from Poland, told Reuters that she would have chosen a different test had she known that her data might end up in China being used for research involving military applications.
U.S. federal authorities have been watching BGI’s record on data collection. Bill Evanina, former director of the United States National Counterintelligence and Security Center, told the CBS-TV newsmagazine 60 Minutes in January that he was extremely concerned when BGI offered to provide COVID-19 testing kits to several U.S. states last year.
“Knowing that BGI is a Chinese company, do we understand where that data’s going?” Evanina asked. They are the ultimate company that shows connectivity to both the communist state as well as the military apparatus.”
Edward You, supervisory special agent with the FBI and a former biochemist, told 60 Minutes in the same January episode that Beijing authorities are betting that accumulating large amounts of human DNA will prove to be a successful strategy.
“They are building out a huge domestic database,” You said. “And if they are now able to supplement that with data from all around the world, it’s all about who gets the largest, most diverse data set. And so, the ticking time bomb is that once they’re able to achieve true artificial intelligence, then they’re off to the races in what they can do with that data.”
…
US Offering up to $10 Million for Information to Combat Overseas Ransomware Attacks
The U.S. government said Thursday it will begin offering up to $10 million for information to identify or locate malicious cyber actors working on behalf of a foreign government that are trying to cripple the internet operations of American businesses and infrastructure.The new reward was announced as the U.S. faces a growing threat from ransomware attacks – the demand from foreign entities that U.S. corporations and institutions pay millions of dollars to unlock critical technology systems that hackers have seized. The attacks have usually originated overseas, frequently from Russia, according to U.S. officials.Already this year, one of the largest pipeline operators in the U.S., a major meat processing company and, most recently, hundreds of small businesses have been hit by ransomware, forcing companies to pay millions of dollars to restore their operations or risk losing vital data.The U.S. says that about $350 million in ransom was paid to malicious cyber actors in 2020, a more than 300% increase from the year before.The U.S. State Department said it has created a new Tor-based channel to let potential sources anonymously report tips on malicious activity.At the same time, the departments of Justice and Homeland Security created a new website, stopransomware.gov, with information for organizations to learn how to protect themselves and respond to attacks.Homeland Security Secretary Alejandro Mayorkas told CNN it is a “one-stop shop” for information on “how one can prevent oneself from becoming a victim of ransomware, and should one become a victim, how one can work with the federal government in partnership to address the situation.”“Of course, we advise they not pay that ransom,” he said. In a statement, Attorney General Merrick Garland said the government alone cannot prevent the ransomware attacks.“It is critical for business leaders across industries to recognize the threat, prioritize efforts to harden their systems and work with law enforcement by reporting these attacks promptly,” Garland said.
…