Skip to main content

Home/ History Readings/ Group items tagged Crowns

Rss Feed Group items tagged

Javier E

The South's Fight for White Supremacy - The New York Times - 0 views

  • After the Confederate surrender at Appomattox in April 1865, he turned to a new project, publishing, in 1866, a book titled “The Lost Cause: A New Southern History of the War of the Confederates.”
  • “No one can read aright the history of America,” Pollard wrote, “unless in the light of a North and a South.” For all its bloodshed, he argued, the Civil War “did not decide negro equality; it did not decide negro suffrage; it did not decide State Rights. … And these things which the war did not decide, the Southern people will still cling to, still claim and still assert them in their rights and views.”
  • Here, then, was the ur-text of the Lost Cause, of the mythology of a South that believed its pro-slavery war aims were just, its fate tragic and its white-supremacist worldview worth defending
  • ...16 more annotations...
  • To Pollard, the Southern side had fought nobly for noble ends. “The war has left the South its own memories, its own heroes, its own tears, its own dead,” he wrote. “Under these traditions, sons will grow to manhood, and lessons sink deep that are learned from the lips of widowed mothers.” Pollard declared that a “‘war of ideas,’” a new war that “the South wants and insists upon perpetrating,” was now unfolding.
  • The South, Pollard wrote, “must wear the crown of thorns before she can assume that of victory.”
  • in “The Lost Cause Regained,” published in 1868. Pollard wrote that he was “profoundly convinced that the true cause fought for in the late war has not been ‘lost’ immeasurably or irrevocably, but is yet in a condition to be ‘regained’ by the South on ultimate issues of the political contest.” The issue was no longer slavery, but white supremacy, which Pollard described as the “true cause of the war” and the “true hope of the South.”
  • The Civil War, then, was to be fought perennially
  • And in many ways it unfolds still. The defiance of federal will from Reconstruction to our own day, the insistence on states’ rights in the face of the quest for racial justice and the revanchist reverence for Confederate emblems and figures are illuminated by engaging with the ethos of which Pollard so effectively wrote.
  • David W. Blight detailed how a white narrative of the war took hold, North and South, after Appomattox. As early as 1874 the historian William Wells Brown had said, “There is a feeling all over this country that the Negro has got about as much as he ought to have.”
  • In this recasting of reality, the Civil War was a family quarrel in which both sides were doing the best they could according to their lights.
  • White Americans chose to celebrate one another without reference to the actual causes and implications of the war. “The memory of slavery, emancipation and the 14th and 15th Amendments never fit well into a developing narrative in which the Old and New South were romanticized and welcomed back to a new nationalism,” Blight wrote, “and in which devotion alone made everyone right, and no one truly wrong
  • To recall that the war had been about what Lincoln had called a “new birth of freedom” meant acknowledging the nation’s failings on race. So white Americans decided to recall something else.
  • In such a view, it had all been a struggle between two reasonable parties over the nature of the Constitution; slavery was incidental
  • By minimizing race in the story of the war, white Americans felt free to minimize race not only in the past but in the present — leading, as Blight wrote, to “the denigration of Black dignity and the attempted erasure of emancipation from the national narrative of what the war had been about.”
  • in 1965, at a time when white Southerners were still deeply engaged in preserving Pollard’s Lost Cause, the editors of Ebony magazine published a special edition that became a book: “The White Problem in America.
  • “The problem of race in America, insofar as that problem is related to packets of melanin in men’s skins, is a white problem,” not a Black one, Lerone Bennett Jr., a historian and senior editor at Ebony, wrote in the volume’s opening essay. “And in order to solve that problem we must seek its source, not in the Negro but in the white American (in the process by which he was educated, in the needs and complexes he expresses through racism) and in the structure of the white community (in the power arrangements and the illicit uses of racism in the scramble for scarce values: power, prestige, income).”
  • King’s piece, “The Un-Christian Christian,” argued that white religious believers “too often … have responded to Christ emotionally, but they have not responded to His teachings morally.”
  • Baldwin closes the book by imagining the interior monologue of the white American who has been raised on the false history of the Lost Cause. “Do not blame me,” Baldwin wrote of the white “stammering” in his conscience. “I was not there. I did not do it. My history has nothing to do with Europe or the slave trade. Anyway, it was your chiefs who sold you to me.
  • on the same day … in the most private chamber of his heart always, he, the white man, remains proud of that history for which he does not wish to pay, and from which, materially, he has profited so much” — a history manipulated to make the unspeakable palatable.
clairemann

Could a Joe Biden Presidency Help Saudi Political Prisoners? | Time - 0 views

  • Saudi Arabian legal scholar Abdullah Alaoudh has become adept at spotting state-backed harassment.
  • “take advantage of what they called the chaos in the U.S. and kill me on the streets,” Alhaoudh tells TIME
  • Although the message ended with a predictable sign-off, “your end is very close, traitor,” Alaoudh was more struck by what he took to be a reference to protests and unrest in the months leading up to the U.S. elections.
  • ...22 more annotations...
  • For dissidents living outside the Kingdom, the American election has personal as well as political implications. On one side is an incumbent who has boasted he “saved [Crown Prince Mohammed bin Salman’s] ass”
  • On the other is Democratic challenger Joe Biden, who last year said he would make Saudi Arabia a “pariah,” singled out the kingdom for “murdering children” in Yemen, and said there’s “very little social redeeming value in the present Saudi leadership.”
  • Saudi Arabia was the destination for Trump’s first trip overseas in May 2017, a visit that set the tone for the strong alliance that has persisted ever since.
  • “but what I’m sure of is that a Biden Administration would not be as compliant and affectionate with Saudi Arabia as Trump has been.”
  • Al-Odah is one of hundreds detained or imprisoned in Saudi Arabia for activism of criticism of the government. He was arrested only hours after he tweeted a message to his 14 million followers calling on Saudi Arabia to end its blockade of the tiny Gulf Emirate of Qatar, Alaoudh says.
  • Court documents list al-Odah’s charges as including spreading corruption by calling for a constitutional monarchy, stirring public discord, alleged membership of the Muslim Brotherhood, and “mocking the government’s achievements.”
  • For some, like Alaoudh, those words offer a glimmer of hope that relatives detained in the kingdom might have improved prospects of release should Biden win in November
  • the historic ties between the U.S. and the Al Saud that date back to 1943, or business interests in the region is unclear, says Stephen McInerney, Executive Director at the non-partisan Washington-based Project on Middle East Democracy (POMED). What is clear, he says, is that “Trump and his family—and in particular Jared Kushner—have close personal ties to Mohammed Bin Salman.”
  • But subsequent behind-the-scenes meetings between Trump’s special advisor and son-in-law Jared Kushner’s and King Salman’s son Mohammed bin Salman (known as MBS) proved at least as significant as the President’s headline announcements.
  • ranging from 450,000 to “a million,” (the actual total is between 20,000 to 40,000, according to May report by the Center for International Policy.)
  • That closeness has translated into a reluctance to confront Saudi Arabia over its human rights abuses.
  • “at times there has been real bipartisan frustration or even outrage with him.”
  • Trump publicly mulled the possibility he was killed by a “rogue actor” — in line with what would become the Saudi narrative as outrage grew.
  • “I have no doubt that Donald Trump did protect and save whatever part of MBS’s body,”
  • Callamard says she would expect a Biden administration, “at a minimum, not to undermine the U.S.’s own democratic processes,” as Trump did in vetoing bipartisan bills pertaining to the Khashoggi murder and the sale of weapons to Saudi Arabia that were used in the Yemen war.
  • President Biden to not “justify violations by others or suggest that the U.S. doesn’t care about violations because of its economic interests.”
  • “end US support for Saudi Arabia’s war in Yemen, and make sure America does not check its values at the door to sell arms or buy oil.” The statement adds that Biden will “defend the right of activists, political dissidents, and journalists around the world to speak their minds freely without fear of persecution and violence.”
  • “I think there would be some international debate between those who want a very assertive change in the U.S.–Saudi relationship and those who would be more cautious,” says McInerney. “The more cautious approach would be in line with historical precedent.”
  • Saudi authorities tortured and sexually abused al Hathloul while she was in prison, her family says. On Oct 27, Hathloul began a new hunger strike in protest at authorities’ refusal to grant her a family visit in two months.
  • The only thing that allows them to ignore all the international pressure is that the White House has not talked about it, and has not given a clear message to the Saudis telling them that they don’t agree with this,” Hathloul says.
  • If Trump is re-elected, then experts see little chance of him changing tack—in fact, says Callamard, it would pose “a real test” for the resilience of the democratic institutions committed to upholding the rules-based order.
  • “Just the fact that we are filing the lawsuit here in Washington D.C. is a sign that we still have faith that there are other ways to pressure the Saudi government,”
Javier E

Opinion | This Is How Theocracy Shrivels - The New York Times - 0 views

  • Certain years leap out as turning points in world history: 1517, 1776 and 1917. These are years when powerful ideas strode onto the world stage: the Reformation, democratic capitalism and revolutionary Communism.
  • The period around 1979 was another such dawn. Political Islam burst onto global consciousness with the Iranian revolution, the rise of the mujahedeen after the Soviet invasion of Afghanistan, the Islamization program in Pakistan and the popularity of the Muslim Brotherhood across the Arab world.
  • By 2006, in an essay called “The Master Plan,” Lawrence Wright could report in The New Yorker how Al Qaeda had operationalized these dreams into a set of sweeping, violent strategies. The plans were epic in scope: expel the U.S. from Iraq, establish a caliphate, overthrow Arab regimes, initiate a clash with Israel, undermine Western economies, create “total confrontation” between believers and nonbelievers, and achieve “definitive victory” by 2020, transforming world history.
  • ...9 more annotations...
  • The ideas that seized the imagination of millions had deep and diverse intellectual roots. For example, the mid-20th century thinker Sayyid Qutb mounted a comprehensive critique of the soulless materialism of America, tracing it in part to the separation of church and state — the fatal error, he believed, that divided the spirit from the flesh. In the Muslim world, he argued, body and soul should not be split asunder, but should live united in a resurrected caliphate, governed by Shariah law.
  • When political Islamists tried to establish theocratically influenced rule in actual nations, their movement’s reputation was badly hurt. In one of extremism’s most violent, radical manifestations, the Islamic State’s caliphate in Iraq and Syria became a blood-drenched nightmare.
  • In his 2011 book, “The Missing Martyrs,” Charles Kurzman showed that fewer than one in every 100,000 Muslims had become an Islamist terrorist in the years since 9/11. The vast majority rejected the enterprise.
  • If extremists thought they could mobilize Muslim opinion through acts of clarifying violence, they have failed. Across 11 lands in which Pew surveyed Muslims in 2013, a median of only 13 percent had a favorable opinion of Al Qaeda.
  • even in more moderate places, political Islam is losing favor. In 2019, The Economist surveyed the data and concluded, “Across the Arab world people are turning against religious political parties and the clerics who helped bring them to power.
  • Many appear to be giving up on Islam, too.” Ayatollah Mohammad-Taqi Mesbah Yazdi of Iran noticed the trend in his own country: “Iranians are evading religious teachings and turning to secularism.”
  • Globally, terrorism is down. Deaths from attacks fell by 59 percent between 2014 and 2019. Al Qaeda’s core members haven’t successfully attacked the U.S. homeland since 9/11. In 2017, the Saudi crown prince, Mohammed bin Salman, began a process of marginalizing radical Wahhabism.
  • “most Islamist terrorism today tends to be local — the Taliban in Afghanistan, Boko Haram in Nigeria, al-Shabab in the Horn of Africa. That’s a major reversal from the glory days of Al Qaeda, when its leaders insisted that the focus must be not on the ‘near enemy’ (the local regimes) but rather the ‘far enemy’ (the United States and the West more broadly).”
  • it’s obvious that even local conflicts can create incredible danger. But the idea of global glory — a fundamental shaking of the world order — that burst on the world stage roughly 40 years ago has been brought low.
criscimagnael

How the Wreck of the Costa Concordia Changed an Italian Island - The New York Times - 0 views

  • Few of the 500-odd residents of the fishermen’s village will ever forget the freezing night of Jan. 13, 2012, when the Costa Concordia shipwrecked, killing 32 people and upending life on the island for years.
  • In no time, Giglio residents hosted thousands of journalists, law enforcement officers and rescue experts who descended on the port
  • “Get back on board!” a Coast Guard officer shouted at Mr. Schettino when he understood that the captain was in a lifeboat watching people scramble to escape, audio recordings of their exchange later revealed. “Go up on the bow of the ship on a rope ladder, and tell me what you can do, how many people are there and what they need. Now!”
  • ...11 more annotations...
  • What stands out now for many is how the wreck forever changed the lives of some of those whose paths crossed as a result. Friendships were made, business relations took shape and new families were even formed.
  • “It was such a shock for us,” said Bruna Danei, 42, who until 2018 worked as a secretary for the consortium that salvaged the wreck. “The work on the Costa Concordia was a life-changing experience for me in many ways.”
  • The local council voted to make Jan. 13 a day of remembrance on Giglio, but after this year it will stop the public commemorations and “make it a more intimate moment, without the media,” Mr. Ortelli said during the mass.
  • “Other victims’ families feel differently, but I am a Catholic and I have forgiven,” Mr. Rebello explained.
  • On Thursday, 10 years to the day of the tragedy, the victims’ families, some passengers and Italian authorities attended a remembrance Mass and threw a crown of flowers onto the waters where the Costa Concordia had rested. At 9:45 p.m., the time when the ship ran aground, a candlelit procession illuminated the port’s quay while church bells rang and ship sirens blared.
  • The officer has since pursued a successful career in politics, while Mr. Schettino is serving a 16-year sentence in a Roman prison for homicide and for abandoning the ship before the evacuation was completed.
  • The impact with the half-submerged rock near the island produced a gash in the hull more than 70 meters long, or about 76 yards, leading to blackouts on board and water pouring into the lower decks.
  • “I can’t forget the eyes of children, scared to death, and of their parents,” said Mr. Pellegrini, who had boarded the ship to speak with officials and organize the evacuation. “The metallic sound of the enormous ship tipping over and the gurgling of the sea up the endless corridors of the cruiser.”
  • “The tragedy will always stay with us as a community. It was an apocalypse for us.”
  • While the global attention shifted away from Giglio, residents have stayed in touch with the outside world through the people who temporarily lived there.
  • “So many nationalities — the world was at our door all of a sudden,” he said, remembering that night. “And we naturally opened it.”
lilyrashkind

French and Indian War - Seven Years War - HISTORY - 0 views

  • Also known as the Seven Years’ War, this New World conflict marked another chapter in the long imperial struggle between Britain and France.
  • William Pitt, the British turned the tide with victories at Louisbourg, Fort Frontenac and the French-Canadian stronghold of Quebec. At the 1763 peace conference, the British received the territories of Canada from France and Florida from Spain, opening the Mississippi Valley to westward expansion.
  • In the early 1750s, France’s expansion into the Ohio River valley repeatedly brought it into conflict with the claims of the British colonies, especially Virginia. In 1754, the French built Fort Duquesne where the Allegheny and Monongahela Rivers joined to form the Ohio River (in today’s Pittsburgh), making it a strategically important stronghold that the British repeatedly attacked. 
  • ...8 more annotations...
  • During 1754 and 1755, the French won a string of victories, defeating in quick succession the young George Washington, Gen. Edward Braddock and Braddock’s successor, Governor William Shirley of Massachusetts. In 1755, Governor Shirley, fearing that the French settlers in Nova Scotia (Acadia) would side with France in any military confrontation, expelled hundreds of them to other British colonies; many of the exiles suffered cruelly. Throughout this period, the British military effort was hampered by lack of interest at home, rivalries among the American colonies and France’s greater success in winning the support of the Indians. 
  • The tide turned in 1757 because William Pitt, the new British leader, saw the colonial conflicts as the key to building a vast British empire. Borrowing heavily to finance the war, he paid Prussia to fight in Europe and reimbursed the colonies for raising troops in North America. 
  • In July 1758, the British won their first great victory at Louisbourg, near the mouth of the St. Lawrence River. A month later, they took Fort Frontenac at the western end of the river. 
  • The British then closed in on Quebec, where Gen. James Wolfe won a spectacular victory in the Battle of Quebec on the Plains of Abraham in September of 1759 (though both he and the French commander, the Marquis de Montcalm, were fatally wounded). 
  • The arrangement strengthened the American colonies significantly by removing their European rivals to the
  • north and south and opening the Mississippi Valley to westward expansion.
  • The British crown borrowed heavily from British and Dutch bankers to bankroll the war, doubling British national debt. King George II argued that since the French and Indian War benefited the colonists by securing their borders, they should contribute to paying down the war debt.To defend his newly won territory from future attacks, King George II also decided to install permanent British army units in the Americas, which required additional sources of revenue.
  • Fifteen years after the Treaty of Paris, French bitterness over the loss of most of their colonial empire contributed to their intervention on the side of the colonists in the Revolutionary War.
Javier E

To move on, consign Boris Johnson and his vanity to spam - 0 views

  • Some voters, we should admit, enthused about Johnson because he made them laugh. I am haunted by the memory of a woman who told a BBC radio interviewer back in 2018: “I want Boris to become Tory leader because he will make politics fun!” But politics, and especially government, is not meant to be fun.
  • He is perhaps the most selfish human being I have ever met, indifferent to the welfare of anyone save himself. It is striking that he has few, if any, personal friends. He demands loyalty, but is incapable of giving it to others. He has neither principles nor personal convictions, save about his own ambitions and desires. Far from being the genial Mr Nice Guy he seeks to project, Tony Soprano would find him a tad ruthless.
  • He is a stranger to truth, a lifelong liar about big things and small.
  • ...3 more annotations...
  • A decade or two ago, while many foreigners did not especially like the British, they respected us as sensible, decent people who made our society work. Today, that sentiment has vanished, swept away by Johnson and Liz Truss, his own unworthy nominee to succeed himself.
  • At the end of Act 2 of Henry IV Part 2, jesting Falstaff pleads with Prince Hal not to “banish plump Jack”. The prince coldly answered: “I do. I will.” When the crown was placed upon Henry’s brow, the comedy of the fat charlatan was indeed played out, the scoundrel banished.
  • The Conservative Party, and the British people, have been very foolish to humour their own Falstaff through these past sorry years. If they cannot banish plump Boris now, they sacrifice all hope of regaining the respect for Britain which has been sacrificed to his cavorting.
Javier E

Whistleblower: Twitter misled investors, FTC and underplayed spam issues - Washington Post - 0 views

  • Twitter executives deceived federal regulators and the company’s own board of directors about “extreme, egregious deficiencies” in its defenses against hackers, as well as its meager efforts to fight spam, according to an explosive whistleblower complaint from its former security chief.
  • The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.
  • Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.
  • ...56 more annotations...
  • “Security and privacy have long been top companywide priorities at Twitter,” said Twitter spokeswoman Rebecca Hahn. She said that Zatko’s allegations appeared to be “riddled with inaccuracies” and that Zatko “now appears to be opportunistically seeking to inflict harm on Twitter, its customers, and its shareholders.” Hahn said that Twitter fired Zatko after 15 months “for poor performance and leadership.” Attorneys for Zatko confirmed he was fired but denied it was for performance or leadership.
  • the whistleblower document alleges the company prioritized user growth over reducing spam, though unwanted content made the user experience worse. Executives stood to win individual bonuses of as much as $10 million tied to increases in daily users, the complaint asserts, and nothing explicitly for cutting spam.
  • Chief executive Parag Agrawal was “lying” when he tweeted in May that the company was “strongly incentivized to detect and remove as much spam as we possibly can,” the complaint alleges.
  • Zatko described his decision to go public as an extension of his previous work exposing flaws in specific pieces of software and broader systemic failings in cybersecurity. He was hired at Twitter by former CEO Jack Dorsey in late 2020 after a major hack of the company’s systems.
  • “I felt ethically bound. This is not a light step to take,” said Zatko, who was fired by Agrawal in January. He declined to discuss what happened at Twitter, except to stand by the formal complaint. Under SEC whistleblower rules, he is entitled to legal protection against retaliation, as well as potential monetary rewards.
  • A person familiar with Zatko’s tenure said the company investigated Zatko’s security claims during his time there and concluded they were sensationalistic and without merit. Four people familiar with Twitter’s efforts to fight spam said the company deploys extensive manual and automated tools to both measure the extent of spam across the service and reduce it.
  • In 1998, Zatko had testified to Congress that the internet was so fragile that he and others could take it down with a half-hour of concentrated effort. He later served as the head of cyber grants at the Defense Advanced Research Projects Agency, the Pentagon innovation unit that had backed the internet’s invention.
  • Overall, Zatko wrote in a February analysis for the company attached as an exhibit to the SEC complaint, “Twitter is grossly negligent in several areas of information security. If these problems are not corrected, regulators, media and users of the platform will be shocked when they inevitably learn about Twitter’s severe lack of security basics.”
  • Zatko’s complaint says strong security should have been much more important to Twitter, which holds vast amounts of sensitive personal data about users. Twitter has the email addresses and phone numbers of many public figures, as well as dissidents who communicate over the service at great personal risk.
  • This month, an ex-Twitter employee was convicted of using his position at the company to spy on Saudi dissidents and government critics, passing their information to a close aide of Crown Prince Mohammed bin Salman in exchange for cash and gifts.
  • Zatko’s complaint says he believed the Indian government had forced Twitter to put one of its agents on the payroll, with access to user data at a time of intense protests in the country. The complaint said supporting information for that claim has gone to the National Security Division of the Justice Department and the Senate Select Committee on Intelligence. Another person familiar with the matter agreed that the employee was probably an agent.
  • “Take a tech platform that collects massive amounts of user data, combine it with what appears to be an incredibly weak security infrastructure and infuse it with foreign state actors with an agenda, and you’ve got a recipe for disaster,” Charles E. Grassley (R-Iowa), the top Republican on the Senate Judiciary Committee,
  • Many government leaders and other trusted voices use Twitter to spread important messages quickly, so a hijacked account could drive panic or violence. In 2013, a captured Associated Press handle falsely tweeted about explosions at the White House, sending the Dow Jones industrial average briefly plunging more than 140 points.
  • After a teenager managed to hijack the verified accounts of Obama, then-candidate Joe Biden, Musk and others in 2020, Twitter’s chief executive at the time, Jack Dorsey, asked Zatko to join him, saying that he could help the world by fixing Twitter’s security and improving the public conversation, Zatko asserts in the complaint.
  • The complaint — filed last month with the Securities and Exchange Commission and the Department of Justice, as well as the FTC — says thousands of employees still had wide-ranging and poorly tracked internal access to core company software, a situation that for years had led to embarrassing hacks, including the commandeering of accounts held by such high-profile users as Elon Musk and former presidents Barack Obama and Donald Trump.
  • But at Twitter Zatko encountered problems more widespread than he realized and leadership that didn’t act on his concerns, according to the complaint.
  • Twitter’s difficulties with weak security stretches back more than a decade before Zatko’s arrival at the company in November 2020. In a pair of 2009 incidents, hackers gained administrative control of the social network, allowing them to reset passwords and access user data. In the first, beginning around January of that year, hackers sent tweets from the accounts of high-profile users, including Fox News and Obama.
  • Several months later, a hacker was able to guess an employee’s administrative password after gaining access to similar passwords in their personal email account. That hacker was able to reset at least one user’s password and obtain private information about any Twitter user.
  • Twitter continued to suffer high-profile hacks and security violations, including in 2017, when a contract worker briefly took over Trump’s account, and in the 2020 hack, in which a Florida teen tricked Twitter employees and won access to verified accounts. Twitter then said it put additional safeguards in place.
  • This year, the Justice Department accused Twitter of asking users for their phone numbers in the name of increased security, then using the numbers for marketing. Twitter agreed to pay a $150 million fine for allegedly breaking the 2011 order, which barred the company from making misrepresentations about the security of personal data.
  • After Zatko joined the company, he found it had made little progress since the 2011 settlement, the complaint says. The complaint alleges that he was able to reduce the backlog of safety cases, including harassment and threats, from 1 million to 200,000, add staff and push to measure results.
  • But Zatko saw major gaps in what the company was doing to satisfy its obligations to the FTC, according to the complaint. In Zatko’s interpretation, according to the complaint, the 2011 order required Twitter to implement a Software Development Life Cycle program, a standard process for making sure new code is free of dangerous bugs. The complaint alleges that other employees had been telling the board and the FTC that they were making progress in rolling out that program to Twitter’s systems. But Zatko alleges that he discovered that it had been sent to only a tenth of the company’s projects, and even then treated as optional.
  • “If all of that is true, I don’t think there’s any doubt that there are order violations,” Vladeck, who is now a Georgetown Law professor, said in an interview. “It is possible that the kinds of problems that Twitter faced eleven years ago are still running through the company.”
  • “Agrawal’s Tweets and Twitter’s previous blog posts misleadingly imply that Twitter employs proactive, sophisticated systems to measure and block spam bots,” the complaint says. “The reality: mostly outdated, unmonitored, simple scripts plus overworked, inefficient, understaffed, and reactive human teams.”
  • One current and one former employee recalled that incident, when failures at two Twitter data centers drove concerns that the service could have collapsed for an extended period. “I wondered if the company would exist in a few days,” one of them said.
  • The current and former employees also agreed with the complaint’s assertion that past reports to various privacy regulators were “misleading at best.”
  • For example, they said the company implied that it had destroyed all data on users who asked, but the material had spread so widely inside Twitter’s networks, it was impossible to know for sure
  • As the head of security, Zatko says he also was in charge of a division that investigated users’ complaints about accounts, which meant that he oversaw the removal of some bots, according to the complaint. Spam bots — computer programs that tweet automatically — have long vexed Twitter. Unlike its social media counterparts, Twitter allows users to program bots to be used on its service: For example, the Twitter account @big_ben_clock is programmed to tweet “Bong Bong Bong” every hour in time with Big Ben in London. Twitter also allows people to create accounts without using their real identities, making it harder for the company to distinguish between authentic, duplicate and automated accounts.
  • In the complaint, Zatko alleges he could not get a straight answer when he sought what he viewed as an important data point: the prevalence of spam and bots across all of Twitter, not just among monetizable users.
  • Zatko cites a “sensitive source” who said Twitter was afraid to determine that number because it “would harm the image and valuation of the company.” He says the company’s tools for detecting spam are far less robust than implied in various statements.
  • The complaint also alleges that Zatko warned the board early in his tenure that overlapping outages in the company’s data centers could leave it unable to correctly restart its servers. That could have left the service down for months, or even have caused all of its data to be lost. That came close to happening in 2021, when an “impending catastrophic” crisis threatened the platform’s survival before engineers were able to save the day, the complaint says, without providing further details.
  • The four people familiar with Twitter’s spam and bot efforts said the engineering and integrity teams run software that samples thousands of tweets per day, and 100 accounts are sampled manually.
  • Some employees charged with executing the fight agreed that they had been short of staff. One said top executives showed “apathy” toward the issue.
  • Zatko’s complaint likewise depicts leadership dysfunction, starting with the CEO. Dorsey was largely absent during the pandemic, which made it hard for Zatko to get rulings on who should be in charge of what in areas of overlap and easier for rival executives to avoid collaborating, three current and former employees said.
  • For example, Zatko would encounter disinformation as part of his mandate to handle complaints, according to the complaint. To that end, he commissioned an outside report that found one of the disinformation teams had unfilled positions, yawning language deficiencies, and a lack of technical tools or the engineers to craft them. The authors said Twitter had no effective means of dealing with consistent spreaders of falsehoods.
  • Dorsey made little effort to integrate Zatko at the company, according to the three employees as well as two others familiar with the process who spoke on the condition of anonymity to describe sensitive dynamics. In 12 months, Zatko could manage only six one-on-one calls, all less than 30 minutes, with his direct boss Dorsey, who also served as CEO of payments company Square, now known as Block, according to the complaint. Zatko allegedly did almost all of the talking, and Dorsey said perhaps 50 words in the entire year to him. “A couple dozen text messages” rounded out their electronic communication, the complaint alleges.
  • Faced with such inertia, Zatko asserts that he was unable to solve some of the most serious issues, according to the complaint.
  • Some 30 percent of company laptops blocked automatic software updates carrying security fixes, and thousands of laptops had complete copies of Twitter’s source code, making them a rich target for hackers, it alleges.
  • A successful hacker takeover of one of those machines would have been able to sabotage the product with relative ease, because the engineers pushed out changes without being forced to test them first in a simulated environment, current and former employees said.
  • “It’s near-incredible that for something of that scale there would not be a development test environment separate from production and there would not be a more controlled source-code management process,” said Tony Sager, former chief operating officer at the cyberdefense wing of the National Security Agency, the Information Assurance divisio
  • Sager is currently senior vice president at the nonprofit Center for Internet Security, where he leads a consensus effort to establish best security practices.
  • The complaint says that about half of Twitter’s roughly 7,000 full-time employees had wide access to the company’s internal software and that access was not closely monitored, giving them the ability to tap into sensitive data and alter how the service worked. Three current and former employees agreed that these were issues.
  • “A best practice is that you should only be authorized to see and access what you need to do your job, and nothing else,” said former U.S. chief information security officer Gregory Touhill. “If half the company has access to and can make configuration changes to the production environment, that exposes the company and its customers to significant risk.”
  • The complaint says Dorsey never encouraged anyone to mislead the board about the shortcomings, but that others deliberately left out bad news.
  • When Dorsey left in November 2021, a difficult situation worsened under Agrawal, who had been responsible for security decisions as chief technology officer before Zatko’s hiring, the complaint says.
  • An unnamed executive had prepared a presentation for the new CEO’s first full board meeting, according to the complaint. Zatko’s complaint calls the presentation deeply misleading.
  • The presentation showed that 92 percent of employee computers had security software installed — without mentioning that those installations determined that a third of the machines were insecure, according to the complaint.
  • Another graphic implied a downward trend in the number of people with overly broad access, based on the small subset of people who had access to the highest administrative powers, known internally as “God mode.” That number was in the hundreds. But the number of people with broad access to core systems, which Zatko had called out as a big problem after joining, had actually grown slightly and remained in the thousands.
  • The presentation included only a subset of serious intrusions or other security incidents, from a total Zatko estimated as one per week, and it said that the uncontrolled internal access to core systems was responsible for just 7 percent of incidents, when Zatko calculated the real proportion as 60 percent.
  • Zatko stopped the material from being presented at the Dec. 9, 2021 meeting, the complaint said. But over his continued objections, Agrawal let it go to the board’s smaller Risk Committee a week later.
  • Agrawal didn’t respond to requests for comment. In an email to employees after publication of this article, obtained by The Post, he said that privacy and security continues to be a top priority for the company, and he added that the narrative is “riddled with inconsistences” and “presented without important context.”
  • On Jan. 4, Zatko reported internally that the Risk Committee meeting might have been fraudulent, which triggered an Audit Committee investigation.
  • Agarwal fired him two weeks later. But Zatko complied with the company’s request to spell out his concerns in writing, even without access to his work email and documents, according to the complaint.
  • Since Zatko’s departure, Twitter has plunged further into chaos with Musk’s takeover, which the two parties agreed to in May. The stock price has fallen, many employees have quit, and Agrawal has dismissed executives and frozen big projects.
  • Zatko said he hoped that by bringing new scrutiny and accountability, he could improve the company from the outside.
  • “I still believe that this is a tremendous platform, and there is huge value and huge risk, and I hope that looking back at this, the world will be a better place, in part because of this.”
Javier E

How Nations Are Losing a Global Race to Tackle A.I.'s Harms - The New York Times - 0 views

  • When European Union leaders introduced a 125-page draft law to regulate artificial intelligence in April 2021, they hailed it as a global model for handling the technology.
  • E.U. lawmakers had gotten input from thousands of experts for three years about A.I., when the topic was not even on the table in other countries. The result was a “landmark” policy that was “future proof,” declared Margrethe Vestager, the head of digital policy for the 27-nation bloc.
  • Then came ChatGPT.
  • ...45 more annotations...
  • The eerily humanlike chatbot, which went viral last year by generating its own answers to prompts, blindsided E.U. policymakers. The type of A.I. that powered ChatGPT was not mentioned in the draft law and was not a major focus of discussions about the policy. Lawmakers and their aides peppered one another with calls and texts to address the gap, as tech executives warned that overly aggressive regulations could put Europe at an economic disadvantage.
  • Even now, E.U. lawmakers are arguing over what to do, putting the law at risk. “We will always be lagging behind the speed of technology,” said Svenja Hahn, a member of the European Parliament who was involved in writing the A.I. law.
  • Lawmakers and regulators in Brussels, in Washington and elsewhere are losing a battle to regulate A.I. and are racing to catch up, as concerns grow that the powerful technology will automate away jobs, turbocharge the spread of disinformation and eventually develop its own kind of intelligence.
  • Nations have moved swiftly to tackle A.I.’s potential perils, but European officials have been caught off guard by the technology’s evolution, while U.S. lawmakers openly concede that they barely understand how it works.
  • The absence of rules has left a vacuum. Google, Meta, Microsoft and OpenAI, which makes ChatGPT, have been left to police themselves as they race to create and profit from advanced A.I. systems
  • At the root of the fragmented actions is a fundamental mismatch. A.I. systems are advancing so rapidly and unpredictably that lawmakers and regulators can’t keep pace
  • That gap has been compounded by an A.I. knowledge deficit in governments, labyrinthine bureaucracies and fears that too many rules may inadvertently limit the technology’s benefits.
  • Even in Europe, perhaps the world’s most aggressive tech regulator, A.I. has befuddled policymakers.
  • The European Union has plowed ahead with its new law, the A.I. Act, despite disputes over how to handle the makers of the latest A.I. systems.
  • The result has been a sprawl of responses. President Biden issued an executive order in October about A.I.’s national security effects as lawmakers debate what, if any, measures to pass. Japan is drafting nonbinding guidelines for the technology, while China has imposed restrictions on certain types of A.I. Britain has said existing laws are adequate for regulating the technology. Saudi Arabia and the United Arab Emirates are pouring government money into A.I. research.
  • A final agreement, expected as soon as Wednesday, could restrict certain risky uses of the technology and create transparency requirements about how the underlying systems work. But even if it passes, it is not expected to take effect for at least 18 months — a lifetime in A.I. development — and how it will be enforced is unclear.
  • Many companies, preferring nonbinding codes of conduct that provide latitude to speed up development, are lobbying to soften proposed regulations and pitting governments against one another.
  • “No one, not even the creators of these systems, know what they will be able to do,” said Matt Clifford, an adviser to Prime Minister Rishi Sunak of Britain, who presided over an A.I. Safety Summit last month with 28 countries. “The urgency comes from there being a real question of whether governments are equipped to deal with and mitigate the risks.”
  • Europe takes the lead
  • In mid-2018, 52 academics, computer scientists and lawyers met at the Crowne Plaza hotel in Brussels to discuss artificial intelligence. E.U. officials had selected them to provide advice about the technology, which was drawing attention for powering driverless cars and facial recognition systems.
  • as they discussed A.I.’s possible effects — including the threat of facial recognition technology to people’s privacy — they recognized “there were all these legal gaps, and what happens if people don’t follow those guidelines?”
  • In 2019, the group published a 52-page report with 33 recommendations, including more oversight of A.I. tools that could harm individuals and society.
  • By October, the governments of France, Germany and Italy, the three largest E.U. economies, had come out against strict regulation of general purpose A.I. models for fear of hindering their domestic tech start-ups. Others in the European Parliament said the law would be toothless without addressing the technology. Divisions over the use of facial recognition technology also persisted.
  • So when the A.I. Act was unveiled in 2021, it concentrated on “high risk” uses of the technology, including in law enforcement, school admissions and hiring. It largely avoided regulating the A.I. models that powered them unless listed as dangerous
  • “They sent me a draft, and I sent them back 20 pages of comments,” said Stuart Russell, a computer science professor at the University of California, Berkeley, who advised the European Commission. “Anything not on their list of high-risk applications would not count, and the list excluded ChatGPT and most A.I. systems.”
  • E.U. leaders were undeterred.“Europe may not have been the leader in the last wave of digitalization, but it has it all to lead the next one,” Ms. Vestager said when she introduced the policy at a news conference in Brussels.
  • In 2020, European policymakers decided that the best approach was to focus on how A.I. was used and not the underlying technology. A.I. was not inherently good or bad, they said — it depended on how it was applied.
  • Nineteen months later, ChatGPT arrived.
  • The Washington game
  • Lacking tech expertise, lawmakers are increasingly relying on Anthropic, Microsoft, OpenAI, Google and other A.I. makers to explain how it works and to help create rules.
  • “We’re not experts,” said Representative Ted Lieu, Democrat of California, who hosted Sam Altman, OpenAI’s chief executive, and more than 50 lawmakers at a dinner in Washington in May. “It’s important to be humble.”
  • Tech companies have seized their advantage. In the first half of the year, many of Microsoft’s and Google’s combined 169 lobbyists met with lawmakers and the White House to discuss A.I. legislation, according to lobbying disclosures. OpenAI registered its first three lobbyists and a tech lobbying group unveiled a $25 million campaign to promote A.I.’s benefits this year.
  • In that same period, Mr. Altman met with more than 100 members of Congress, including former Speaker Kevin McCarthy, Republican of California, and the Senate leader, Chuck Schumer, Democrat of New York. After testifying in Congress in May, Mr. Altman embarked on a 17-city global tour, meeting world leaders including President Emmanuel Macron of France, Mr. Sunak and Prime Minister Narendra Modi of India.
  • , the White House announced that the four companies had agreed to voluntary commitments on A.I. safety, including testing their systems through third-party overseers — which most of the companies were already doing.
  • “It was brilliant,” Mr. Smith said. “Instead of people in government coming up with ideas that might have been impractical, they said, ‘Show us what you think you can do and we’ll push you to do more.’”
  • In a statement, Ms. Raimondo said the federal government would keep working with companies so “America continues to lead the world in responsible A.I. innovation.”
  • Over the summer, the Federal Trade Commission opened an investigation into OpenAI and how it handles user data. Lawmakers continued welcoming tech executives.
  • In September, Mr. Schumer was the host of Elon Musk, Mark Zuckerberg of Meta, Sundar Pichai of Google, Satya Nadella of Microsoft and Mr. Altman at a closed-door meeting with lawmakers in Washington to discuss A.I. rules. Mr. Musk warned of A.I.’s “civilizational” risks, while Mr. Altman proclaimed that A.I. could solve global problems such as poverty.
  • A.I. companies are playing governments off one another. In Europe, industry groups have warned that regulations could put the European Union behind the United States. In Washington, tech companies have cautioned that China might pull ahead.
  • In May, Ms. Vestager, Ms. Raimondo and Antony J. Blinken, the U.S. secretary of state, met in Lulea, Sweden, to discuss cooperating on digital policy.
  • “China is way better at this stuff than you imagine,” Mr. Clark of Anthropic told members of Congress in January.
  • After two days of talks, Ms. Vestager announced that Europe and the United States would release a shared code of conduct for safeguarding A.I. “within weeks.” She messaged colleagues in Brussels asking them to share her social media post about the pact, which she called a “huge step in a race we can’t afford to lose.”
  • Months later, no shared code of conduct had appeared. The United States instead announced A.I. guidelines of its own.
  • Little progress has been made internationally on A.I. With countries mired in economic competition and geopolitical distrust, many are setting their own rules for the borderless technology.
  • Yet “weak regulation in another country will affect you,” said Rajeev Chandrasekhar, India’s technology minister, noting that a lack of rules around American social media companies led to a wave of global disinformation.
  • “Most of the countries impacted by those technologies were never at the table when policies were set,” he said. “A.I will be several factors more difficult to manage.”
  • Even among allies, the issue has been divisive. At the meeting in Sweden between E.U. and U.S. officials, Mr. Blinken criticized Europe for moving forward with A.I. regulations that could harm American companies, one attendee said. Thierry Breton, a European commissioner, shot back that the United States could not dictate European policy, the person said.
  • Some policymakers said they hoped for progress at an A.I. safety summit that Britain held last month at Bletchley Park, where the mathematician Alan Turing helped crack the Enigma code used by the Nazis. The gathering featured Vice President Kamala Harris; Wu Zhaohui, China’s vice minister of science and technology; Mr. Musk; and others.
  • The upshot was a 12-paragraph statement describing A.I.’s “transformative” potential and “catastrophic” risk of misuse. Attendees agreed to meet again next year.
  • The talks, in the end, produced a deal to keep talking.
Javier E

Opinion | U.S. Military Aid Is Killing Civilians in Gaza - The New York Times - 0 views

  • The United States currently provides Israel with at least $3.8 billion in annual military assistance, the most to any country per year, with the recent exception of Ukraine. High levels of assistance date back roughly to the 1970s and reflect a longstanding American bargain with Israel of security for peace — the notion that the more secure Israel feels, the more concessions it will be able to make to the Palestinians.
  • Since the mid-1990s, the United States has also been a major sponsor of the Ramallah-based Palestinian Authority Security Forces, providing training and equipment on the theory that as the Palestinians stand up, the Israelis can stand down.
  • In both cases, the rationale for U.S. security assistance is fatally flawed.
  • ...16 more annotations...
  • On the Israeli side, blind U.S. security guarantees have not provided a path to peace. Instead, they have provided Israel with the reassurance that it can engage in increasingly destructive efforts, such as the expansion of illegal settlements in the West Bank, without any real consequences.
  • At the same time, Israel has become a global leader in weapons exports and boasts one of the most technologically sophisticated militaries in the world. All of these factors have created a sense among Israeli policymakers that they can indefinitely contain — physically and politically — the Palestinian question.
  • Nowhere is this more apparent than in the recent efforts, driven by the United States, first under the Trump administration and continuing under President Biden, to pursue normalization between Israel and the Arab world. While in many ways this normalization is long overdue, it has been premised on the notion that economic incentives — and a shared regional security interest in deterring malign Iranian influence — can integrate Israel, indefinite occupation and all, into the Arab world.
  • This premise has been shattered — likely intentionally on Hamas’s part — by the Gaza conflict and its rapid recentering of the Palestinian cause on a global stage.
  • As civilian deaths in Gaza and the West Bank continue to mount, it is clear any sort of Saudi normalization agreement with Israel that does not also include substantive progress on a political solution for the Palestinian cause will be difficult to advance.
  • Under the Leahy laws, the United States is prohibited from providing security assistance to any unit that is credibly accused of having committed a gross violation of human rights. Unlike almost all other recipients, which are vetted along these lines before they receive assistance, for Israel the process is reversed: The assistance is provided, and the United States then waits to receive reports of violations, assessing their credibility through a process known as the Israel Leahy vetting forum, which includes consultation with the government of Israel.
  • To date, the forum has never come to consensus that any Israeli security force unit or soldier has committed a gross violation of human rights — despite the findings of international human rights organizations
  • the U.S. failure to impose accountability on Israel for such violations may provide Israel with a sense of impunity, increasing the likelihood of gross violations of human rights (including those committed by settlers against Palestinian civilians) and further breaking the trust between Israel and Palestinians that would be needed for any sort of lasting peace.
  • Working on the ground with the authority, I saw how the major focus of U.S. efforts was to prove to the Israel Defense Forces that their Palestinian counterparts could be trusted to take on the mission of securing Israel
  • Palestinian intelligence officials would be provided with target information by Israel, and Palestinian forces would be expected to take on missions previously conducted by the Israel Defense Forces to detain those targets. This effort not only undermined Palestinian support for the authority but also failed to convince the Israelis, who saw any Palestinian courts’ (correct) refusal to hold Palestinian detainees without due process as proof of a revolving door in the system.
  • Even worse, in 2008 and ’09, when Israel’s Operation Cast Lead, which resulted in over 1,300 Palestinian deaths in Gaza, sparked protests in the West Bank, it was the Palestinian Authority Security Forces that physically stood between demonstrators and the Israel Defense Forces. From my balcony in Ramallah, I saw this as a proof of success and reported as much to Washington at the time. In hindsight, it was perhaps the death knell for the legitimacy of the Palestinian Authority in the eyes of its people.
  • If the United States is to continue to employ military and security assistance as a tool of its engagement in the Israeli-Palestinian conflict (and there are good arguments why it should not), it must change its approach significantly. One way to do this would be simply by applying the laws and policies that it applies to every other country in the world: There is no point in having leverage that could pressure Israel to cease actions that undermine peace if we refuse to even consider using it
  • The United States could also start conditioning its military assistance to Israel (as it does for many other recipients) on certain verifiable political conditions being met. In Israel’s case, these may include a halt to or dismantling of settlement infrastructure in the West Bank.
  • Another thing the U.S. might do is consider reframing its security assistance on the Palestinian side to reinforce, rather than undermine, the legitimacy of the Palestinian Authority
  • Doing so would require structuring assistance in a way that enables Palestinian society control over its own security forces. It would also require the recognition of Palestinian statehood
  • I resigned from my job because I do not believe that U.S. arms should be provided in a situation if we know they are more likely than not — in the words of the Biden administration’s own guiding policy — to lead to or to aggravate the risk of human rights violations, including widespread civilian harm and death.
lilyrashkind

DeSantis courts further controversy by honoring swimmer who finished second to Lia Thom... - 0 views

  • The Republican governor, already embroiled in a fight with Disney over the state's so-called "Don't Say Gay" bill, claimed that the NCAA is "perpetuating a fraud" and declared University of Virginia freshman and Florida native Emma Weyant the "rightful winner" of the race.Weyant had finished about 1.75 seconds behind Thomas, who has come to personify the ongoing discourse on trans women's participation in sports and the balance between inclusion and fair play."The NCAA is basically taking efforts to destroy women's athletics," the Republican governor said in a news conference. "They're trying to undermine the integrity of the competition and crown someone else."
  • field.Read MoreTuesday's proclamation comes against the backdrop of DeSantis' showdown with Disney over the controversial Florida bill that would ban classroom instruction about sexual orientation and gender identity before fourth grade. A day after Disney CEO Bob Chapek publicly condemned the legislation -- which DeSantis has said he will sign into law -- the Florida governor ripped Disney as a "woke corporation" to a room of supporters.
  • "In Florida, we reject these lies and recognize Sarasota's Emma Weyant as the best women's swimmer in the 500y freestyle," he said in a tweet.
  • ...2 more annotations...
  • While sex is a category that refers broadly to physiology, a person's gender is an innate sense of identity. The factors that go into determining the sex listed on a birth certificate may include anatomy, genetics and hormones, and there is broad natural variation in each of these categories. For this reason, critics have said the language of "biological sex," as used in DeSantis' proclamation, is overly simplistic and misleading.A 2017 report in the journal Sports Medicine that reviewed several related studies found "no direct or consistent research" on trans people having an athletic advantage over their cisgender peers, at any state of their transition, and critics say postures like DeSantis' will only add to the discrimination that trans people face, particularly trans youth.
  • So far this year, Iowa and South Dakota have approved legislation banning transgender women and girls from participating on sports teams consistent with their gender at accredited schools and colleges. And last year, Alabama, Arkansas, Florida, Mississippi, Montana, Tennessee, Texas and West Virginia enacted similar sports bans, infuriating LGBTQ advocates, who argue conservatives are creating an issue where there isn't one.
Javier E

A Hamline Adjunct Showed a Painting of the Prophet Muhammad. She Lost Her Job. - The Ne... - 0 views

  • University officials and administrators all declined interviews. But Dr. Miller, the school’s president, defended the decision in a statement.“To look upon an image of the Prophet Muhammad, for many Muslims, is against their faith,” Dr. Miller’s statement said, adding, “It was important that our Muslim students, as well as all other students, feel safe, supported and respected both in and out of our classrooms.”
  • In a December interview with the school newspaper, the student who complained to the administration, Aram Wedatalla, described being blindsided by the image.
  • The administration, he said, “closed down conversation when they should have opened it up.”
  • ...17 more annotations...
  • The painting shown in Dr. López Prater’s class is in one of the earliest Islamic illustrated histories of the world, “A Compendium of Chronicles,” written during the 14th century by Rashid-al-Din (1247-1318).Shown regularly in art history classes, the painting shows a winged and crowned Angel Gabriel pointing at the Prophet Muhammad and delivering to him the first Quranic revelation. Muslims believe that the Quran comprises the words of Allah dictated to the Prophet Muhammad through the Angel Gabriel.
  • The image is “a masterpiece of Persian manuscript painting,” said Christiane Gruber, a professor of Islamic art at the University of Michigan. It is housed at the University of Edinburgh; similar paintings have been on display at places like the Metropolitan Museum of Art. And a sculpture of the prophet is at the Supreme Court.Dr. Gruber said that showing Islamic art and depictions of the Prophet Muhammad have become more common in academia, because of a push to “decolonize the canon” — that is, expand curriculum beyond a Western model.
  • Dr. Gruber, who wrote the essay in New Lines Magazine defending Dr. López Prater, said that studying Islamic art without the Compendium of Chronicles image “would be like not teaching Michaelangelo’s David.”
  • Yet, most Muslims believe that visual representations of Muhammad should not be viewed, even if the Quran does not explicitly prohibit them. The prohibition stems from the belief that an image of Muhammad could lead to worshiping the prophet rather than the god he served.
  • There are, however, a range of beliefs. Some Muslims distinguish between respectful depictions and mocking caricatures, while others do not subscribe to the restriction at all.
  • Omid Safi, a professor of Asian and Middle Eastern Studies at Duke University, said he regularly shows images of the Prophet Muhammad in class and without Dr. López Prater’s opt-out mechanisms. He explains to his students that these images were works of devotion created by pious artists at the behest of devout rulers.“That’s the part I want my students to grapple with,” Dr. Safi said. “How does something that comes from the very middle of the tradition end up being received later on as something marginal or forbidden?”
  • Dr. López Prater, a self-described art nerd, said she knew about the potential for conflict on Oct. 6, when she began her online lecture with 30 or so students.She said she spent a few minutes explaining why she was showing the image, how different religions have depicted the divine and how standards change over time.“I do not want to present the art of Islam as something that is monolithic,” she said in an interview, adding that she had been shown the image as a graduate student. She also showed a second image, from the 16th century, which depicted Muhammad wearing a veil.
  • Dr. López Prater said that no one in class raised concerns, and there was no disrespectful commentary.
  • After the class ended, Ms. Wedatalla, a business major and president of the university’s Muslim Student Association, stuck around to voice her discomfort.Immediately afterward, Dr. López Prater sent an email to her department head, Allison Baker, about the encounter; she thought that Ms. Wedatalla might complain.Ms. Baker, the chair of the digital and studio art department, responded to the email four minutes later.“It sounded like you did everything right,” Ms. Baker said. “I believe in academic freedom so you have my support.”
  • As Dr. López Prater predicted, Ms. Wedatalla reached out to administrators. Dr. López Prater, with Ms. Baker’s help, wrote an apology, explaining that sometimes “diversity involves bringing contradicting, uncomfortable and coexisting truths into conversation with each other.”
  • Ms. Wedatalla declined an interview request, and did not explain why she had not raised concerns before the image was shown. But in an email statement, she said images of Prophet Muhammad should never be displayed, and that Dr. López Prater gave a trigger warning precisely because she knew such images were offensive to many Muslims. The lecture was so disturbing, she said, that she could no longer see herself in that course.
  • Four days after the class, Dr. López Prater was summoned to a video meeting with the dean of the college of liberal arts, Marcela Kostihova.
  • Dr. Kostihova compared showing the image to using a racial epithet for Black people, according to Dr. López Prater.“It was very clear to me that she had not talked to any art historians,” Dr. López Prater said.
  • A couple of weeks later, the university rescinded its offer to teach next semester.
  • Dr. López Prater said she was ready to move on. She had teaching jobs at other schools. But on Nov. 7, David Everett, the vice president for inclusive excellence, sent an email to all university employees, saying that certain actions taken in an online class were “undeniably inconsiderate, disrespectful and Islamophobic.”
  • Dr. López Prater, who had only begun teaching at Hamline in the fall, said she felt like a bucket of ice water had been dumped over her head, but the shock soon gave way to “blistering anger at being characterized in those terms by somebody who I have never even met or spoken with.” She reached out to Dr. Gruber, who ended up writing the essay and starting the petition.
  • At the Dec. 8 forum, which was attended by several dozen students, faculty and administrators, Ms. Wedatalla described, often through tears, how she felt seeing the image.“Who do I call at 8 a.m.,” she asked, when “you see someone disrespecting and offending your religion?”Other Muslim students on the panel, all Black women, also spoke tearfully about struggling to fit in at Hamline. Students of color in recent years had protested what they called racist incidents; the university, they said, paid lip service to diversity and did not support students with institutional resources.
Javier E

Opinion | The Pandemic Probably Started in a Lab. These 5 Key Points Explain Why. - The... - 0 views

  • a growing volume of evidence — gleaned from public records released under the Freedom of Information Act, digital sleuthing through online databases, scientific papers analyzing the virus and its spread, and leaks from within the U.S. government — suggests that the pandemic most likely occurred because a virus escaped from a research lab in Wuhan, China.
  • If so, it would be the most costly accident in the history of science.
  • The SARS-like virus that caused the pandemic emerged in Wuhan, the city where the world’s foremost research lab for SARS-like viruses is located.
  • ...48 more annotations...
  • Dr. Shi’s group was fascinated by how coronaviruses jump from species to species. To find viruses, they took samples from bats and other animals, as well as from sick people living near animals carrying these viruses or associated with the wildlife trade. Much of this work was conducted in partnership with the EcoHealth Alliance, a U.S.-based scientific organization that, since 2002, has been awarded over $80 million in federal funding to research the risks of emerging infectious diseases.
  • Their research showed that the viruses most similar to SARS‑CoV‑2, the virus that caused the pandemic, circulate in bats that live roughly 1,000 miles away from Wuhan. Scientists from Dr. Shi’s team traveled repeatedly to Yunnan province to collect these viruses and had expanded their search to Southeast Asia. Bats in other parts of China have not been found to carry viruses that are as closely related to SARS-CoV-2.
  • When the Covid-19 outbreak was detected, Dr. Shi initially wondered if the novel coronavirus had come from her laboratory, saying she had never expected such an outbreak to occur in Wuhan.
  • The SARS‑CoV‑2 virus is exceptionally contagious and can jump from species to species like wildfire. Yet it left no known trace of infection at its source or anywhere along what would have been a thousand-mile journey before emerging in Wuhan.
  • The year before the outbreak, the Wuhan institute, working with U.S. partners, had proposed creating viruses with SARS‑CoV‑2’s defining feature
  • The laboratory pursued risky research that resulted in viruses becoming more infectious: Coronaviruses were grown from samples from infected animals and genetically reconstructed and recombined to create new viruses unknown in nature. These new viruses were passed through cells from bats, pigs, primates and humans and were used to infect civets and humanized mice (mice modified with human genes). In essence, this process forced these viruses to adapt to new host species, and the viruses with mutations that allowed them to thrive emerged as victors.
  • Worse still, as the pandemic raged, their American collaborators failed to publicly reveal the existence of the Defuse proposal. The president of EcoHealth, Peter Daszak, recently admitted to Congress that he doesn’t know about virus samples collected by the Wuhan institute after 2015 and never asked the lab’s scientists if they had started the work described in Defuse.
  • By 2019, Dr. Shi’s group had published a database describing more than 22,000 collected wildlife samples. But external access was shut off in the fall of 2019, and the database was not shared with American collaborators even after the pandemic started, when such a rich virus collection would have been most useful in tracking the origin of SARS‑CoV‑2. It remains unclear whether the Wuhan institute possessed a precursor of the pandemic virus.
  • In 2021, The Intercept published a leaked 2018 grant proposal for a research project named Defuse, which had been written as a collaboration between EcoHealth, the Wuhan institute and Ralph Baric at the University of North Carolina, who had been on the cutting edge of coronavirus research for years. The proposal described plans to create viruses strikingly similar to SARS‑CoV‑2.
  • Coronaviruses bear their name because their surface is studded with protein spikes, like a spiky crown, which they use to enter animal cells. The Defuse project proposed to search for and create SARS-like viruses carrying spikes with a unique feature: a furin cleavage site — the same feature that enhances SARS‑CoV‑2’s infectiousness in humans, making it capable of causing a pandemic. Defuse was never funded by the United States.
  • owever, in his testimony on Monday, Dr. Fauci explained that the Wuhan institute would not need to rely on U.S. funding to pursue research independently.
  • While it’s possible that the furin cleavage site could have evolved naturally (as seen in some distantly related coronaviruses), out of the hundreds of SARS-like viruses cataloged by scientists, SARS‑CoV‑2 is the only one known to possess a furin cleavage site in its spike. And the genetic data suggest that the virus had only recently gained the furin cleavage site before it started the pandemic.
  • Ultimately, a never-before-seen SARS-like virus with a newly introduced furin cleavage site, matching the description in the Wuhan institute’s Defuse proposal, caused an outbreak in Wuhan less than two years after the proposal was drafted.
  • When the Wuhan scientists published their seminal paper about Covid-19 as the pandemic roared to life in 2020, they did not mention the virus’s furin cleavage site — a feature they should have been on the lookout for, according to their own grant proposal, and a feature quickly recognized by other scientists.
  • At the Wuhan Institute of Virology, a team of scientists had been hunting for SARS-like viruses for over a decade, led by Shi Zhengl
  • In May, citing failures in EcoHealth’s monitoring of risky experiments conducted at the Wuhan lab, the Biden administration suspended all federal funding for the organization and Dr. Daszak, and initiated proceedings to bar them from receiving future grants. In his testimony on Monday, Dr. Fauci said that he supported the decision to suspend and bar EcoHealth.
  • Separately, Dr. Baric described the competitive dynamic between his research group and the institute when he told Congress that the Wuhan scientists would probably not have shared their most interesting newly discovered viruses with him. Documents and email correspondence between the institute and Dr. Baric are still being withheld from the public while their release is fiercely contested in litigation.
  • In the end, American partners very likely knew of only a fraction of the research done in Wuhan. According to U.S. intelligence sources, some of the institute’s virus research was classified or conducted with or on behalf of the Chinese military.
  • In the congressional hearing on Monday, Dr. Fauci repeatedly acknowledged the lack of visibility into experiments conducted at the Wuhan institute, saying, “None of us can know everything that’s going on in China, or in Wuhan, or what have you. And that’s the reason why — I say today, and I’ve said at the T.I.,” referring to his transcribed interview with the subcommittee, “I keep an open mind as to what the origin is.”
  • The Wuhan lab pursued this type of work under low biosafety conditions that could not have contained an airborne virus as infectious as SARS‑CoV‑2.
  • Labs working with live viruses generally operate at one of four biosafety levels (known in ascending order of stringency as BSL-1, 2, 3 and 4) that describe the work practices that are considered sufficiently safe depending on the characteristics of each pathogen. The Wuhan institute’s scientists worked with SARS-like viruses under inappropriately low biosafety conditions.
  • ​​Biosafety levels are not internationally standardized, and some countries use more permissive protocols than others.
  • In one experiment, Dr. Shi’s group genetically engineered an unexpectedly deadly SARS-like virus (not closely related to SARS‑CoV‑2) that exhibited a 10,000-fold increase in the quantity of virus in the lungs and brains of humanized mice. Wuhan institute scientists handled these live viruses at low biosafety levels, including BSL-2.
  • Even the much more stringent containment at BSL-3 cannot fully prevent SARS‑CoV‑2 from escaping. Two years into the pandemic, the virus infected a scientist in a BSL-3 laboratory in Taiwan, which was, at the time, a zero-Covid country. The scientist had been vaccinated and was tested only after losing the sense of smell. By then, more than 100 close contacts had been exposed. Human error is a source of exposure even at the highest biosafety levels, and the risks are much greater for scientists working with infectious pathogens at low biosafety.
  • An early draft of the Defuse proposal stated that the Wuhan lab would do their virus work at BSL-2 to make it “highly cost-effective.” Dr. Baric added a note to the draft highlighting the importance of using BSL-3 to contain SARS-like viruses that could infect human cells, writing that “U.S. researchers will likely freak out.”
  • Years later, after SARS‑CoV‑2 had killed millions, Dr. Baric wrote to Dr. Daszak: “I have no doubt that they followed state determined rules and did the work under BSL-2. Yes China has the right to set their own policy. You believe this was appropriate containment if you want but don’t expect me to believe it. Moreover, don’t insult my intelligence by trying to feed me this load of BS.”
  • SARS‑CoV‑2 is a stealthy virus that transmits effectively through the air, causes a range of symptoms similar to those of other common respiratory diseases and can be spread by infected people before symptoms even appear. If the virus had escaped from a BSL-2 laboratory in 2019, the leak most likely would have gone undetected until too late.
  • One alarming detail — leaked to The Wall Street Journal and confirmed by current and former U.S. government officials — is that scientists on Dr. Shi’s team fell ill with Covid-like symptoms in the fall of 2019. One of the scientists had been named in the Defuse proposal as the person in charge of virus discovery work. The scientists denied having been sick.
  • The hypothesis that Covid-19 came from an animal at the Huanan Seafood Market in Wuhan is not supported by strong evidence.
  • In December 2019, Chinese investigators assumed the outbreak had started at a centrally located market frequented by thousands of visitors daily. This bias in their search for early cases meant that cases unlinked to or located far away from the market would very likely have been missed
  • To make things worse, the Chinese authorities blocked the reporting of early cases not linked to the market and, claiming biosafety precautions, ordered the destruction of patient samples on January 3, 2020, making it nearly impossible to see the complete picture of the earliest Covid-19 cases. Information about dozens of early cases from November and December 2019 remains inaccessible.
  • A pair of papers published in Science in 2022 made the best case for SARS‑CoV‑2 having emerged naturally from human-animal contact at the Wuhan market by focusing on a map of the early cases and asserting that the virus had jumped from animals into humans twice at the market in 2019
  • More recently, the two papers have been countered by other virologists and scientists who convincingly demonstrate that the available market evidence does not distinguish between a human superspreader event and a natural spillover at the market.
  • Furthermore, the existing genetic and early case data show that all known Covid-19 cases probably stem from a single introduction of SARS‑CoV‑2 into people, and the outbreak at the Wuhan market probably happened after the virus had already been circulating in humans.
  • Not a single infected animal has ever been confirmed at the market or in its supply chain. Without good evidence that the pandemic started at the Huanan Seafood Market, the fact that the virus emerged in Wuhan points squarely at its unique SARS-like virus laboratory.
  • With today’s technology, scientists can detect how respiratory viruses — including SARS, MERS and the flu — circulate in animals while making repeated attempts to jump across species. Thankfully, these variants usually fail to transmit well after crossing over to a new species and tend to die off after a small number of infections
  • investigators have not reported finding any animals infected with SARS‑CoV‑2 that had not been infected by humans. Yet, infected animal sources and other connective pieces of evidence were found for the earlier SARS and MERS outbreaks as quickly as within a few days, despite the less advanced viral forensic technologies of two decades ago.
  • Even though Wuhan is the home base of virus hunters with world-leading expertise in tracking novel SARS-like viruses, investigators have either failed to collect or report key evidence that would be expected if Covid-19 emerged from the wildlife trade. For example, investigators have not determined that the earliest known cases had exposure to intermediate host animals before falling ill.
  • No antibody evidence shows that animal traders in Wuhan are regularly exposed to SARS-like viruses, as would be expected in such situations.
  • In previous outbreaks of coronaviruses, scientists were able to demonstrate natural origin by collecting multiple pieces of evidence linking infected humans to infected animals
  • In contrast, virologists and other scientists agree that SARS‑CoV‑2 required little to no adaptation to spread rapidly in humans and other animals. The virus appears to have succeeded in causing a pandemic upon its only detected jump into humans.
  • it was a SARS-like coronavirus with a unique furin cleavage site that emerged in Wuhan, less than two years after scientists, sometimes working under inadequate biosafety conditions, proposed collecting and creating viruses of that same design.
  • a laboratory accident is the most parsimonious explanation of how the pandemic began.
  • Given what we now know, investigators should follow their strongest leads and subpoena all exchanges between the Wuhan scientists and their international partners, including unpublished research proposals, manuscripts, data and commercial orders. In particular, exchanges from 2018 and 2019 — the critical two years before the emergence of Covid-19 — are very likely to be illuminating (and require no cooperation from the Chinese government to acquire), yet they remain beyond the public’s view more than four years after the pandemic began.
  • it is undeniable that U.S. federal funding helped to build an unprecedented collection of SARS-like viruses at the Wuhan institute, as well as contributing to research that enhanced them.
  • Advocates and funders of the institute’s research, including Dr. Fauci, should cooperate with the investigation to help identify and close the loopholes that allowed such dangerous work to occur. The world must not continue to bear the intolerable risks of research with the potential to cause pandemics.
  • A successful investigation of the pandemic’s root cause would have the power to break a decades-long scientific impasse on pathogen research safety, determining how governments will spend billions of dollars to prevent future pandemics. A credible investigation would also deter future acts of negligence and deceit by demonstrating that it is indeed possible to be held accountable for causing a viral pandemic
  • Last but not least, people of all nations need to see their leaders — and especially, their scientists — heading the charge to find out what caused this world-shaking event. Restoring public trust in science and government leadership requires it.
« First ‹ Previous 141 - 153 of 153
Showing 20 items per page