À #Marseille, ce dimanche à 17h, @LaQuadrature et #Technopolice #Marseille se joignent à bien d'autres collectifs pour une projection-débat autour du documentaire « Nous sommes des champs de bataille », un film de Mathieu Rigouste sur le système sécuritaire.
Bande-annonce et informations : cinemalegyptis.org/films/nous-…
Nous sommes des champs de bataille - Le Gyptis
« Depuis le début des années 2000, j’enquête sur le système sécuritaire tout en participant aux luttes sociales. Et pour cette raison, j’ai été fiché par les services de renseignements français.Le Gyptis
The Pirate Post reshared this.
Phone companies keep press surveillance secret
A letter by Sen. Ron Wyden about surveillance of senators’ phone lines has an important lesson for journalists, too: Be careful in selecting your phone carrier.
On May 21, Wyden wrote his Senate colleagues revealing which wireless carriers inform customers about government surveillance requests (Cape, Google Fi, and US Mobile), and which don’t (AT&T, Boost Mobile, Charter/Spectrum, Comcast/Xfinity Mobile, T-Mobile, and Verizon).
A handy chart at the bottom of the senator’s press release provides a quick summary.
Wyden’s letter was inspired in part by a Department of Justice inspector general report that revealed that the DOJ had collected phone records of Senate staff as part of leak investigations under the first Trump administration.
But that report wasn’t just about surveillance of the Senate. It also discussed how the DOJ surveilled journalists at The New York Times, The Washington Post, and CNN in 2020-21 as part of leak investigations related to news reporting about the Trump campaign’s connections with Russia and Russia’s interference in the 2016 election.
Investigators demanded telephone records from phone companies for the work and personal phones of journalists at all three outlets. In all three cases, the telephone companies turned over the records, which would have shown the numbers dialed, the date and time of calls, and their duration — information that could reveal the identities of confidential sources.
The telephone companies apparently didn’t notify the Times, Post, or CNN that their records had been sought, even though they legally could have done so. The DOJ also didn’t give the news outlets notice, taking advantage of internal guidelines that allowed them to delay notice to news media companies about legal demands for communications records from third parties in certain circumstances. (The rules for delayed notice from the DOJ remain in effect in the recently revised DOJ news media guidelines.)
According to the inspector general report, DOJ cover letters to the telephone companies asked them not to disclose the demands because the DOJ claimed it might impede the investigation. But the DOJ never sought a court order prohibiting disclosure. One prosecutor told the IG that nondisclosure orders weren’t obtained for the telephone companies “because the providers typically do not notify subscribers when their records are sought.”
That’s a problem, and it’s exactly what Wyden called out in his recent letter. Journalists can’t oppose surveillance that they don’t know about. Notification is what enables journalists (or any other customer) to fight back against overbroad, unwarranted, or illegal demands for their data. That’s exactly what the Times did when Google notified the newspaper of demands for its journalists’ email records in connection with the same leak investigation in which investigators sought phone records from Times journalists.
The Times’ contract with Google required the company to notify the news outlet of government demands. But even contractual agreements might not be enough to compel phone companies to inform their customers when they’re being spied on. Wyden’s letter reveals that “three major phone carriers — AT&T, Verizon, and T-Mobile — failed to establish systems to notify (Senate) offices about surveillance requests, as required by their Senate contracts.”
In addition, even if large news outlets could negotiate contracts with their phone carriers that require notification of surveillance requests when legally allowed, that wouldn’t help their journalists who speak to sources using personal phones that aren’t covered by their employers’ contracts. Freelance journalists are also unlikely to have the power to negotiate notification into their phone contracts.
Rather than one-off contractual agreements then, it would be better for all phone companies to follow the lead of tech companies, like Google, that have a blanket policy of notifying customers of government demands for their data, assuming they’re not gagged. These policies are now widespread in the tech world, thanks to activism by groups like the Electronic Frontier Foundation, which has long monitored tech companies’ notification policies and encouraged them to do better.
Phone companies must do better, too. It’s a shame that some of the largest wireless carriers can’t be bothered to tell their customers when they’re being surveilled. Journalists — and all of us — who care about privacy have a choice to make when selecting their wireless provider: Do they want to know when they’re being spied on, or are they OK with being left in the dark?
Trump, Musk e il grande fratello (DOGE) dei dati
In un recente post del LPE Project la giurista Salomé Viljoen della University of Michigan Law School offre l’ennesima prova di come i governi autoritari si basino sul controllo dei dati...
reshared this
Le 7 juin, aura lieu la deuxième journée de notre évènement « État d'urgence, 10 ans après », co-organisé avec les associations de l'Observatoire des Libertés et du Numérique (OLN)
Tout au long de l'après-midi, nous vous proposons de nombreux ateliers et discussions pour réfléchir aux manières de résister face à la répression et la surveillance. La journée se clôturera par la projection du film « Le Repli » de Joseph Paris et sera suivi de concerts et DJ set pour célébrer nos luttes ensemble !
The Pirate Post reshared this.
Salomé Viljoen
The Right Understands That All Governance Is Data Governance
"By eliminating teams that create and share valuable forms of federal data collection, DOGE is clearing the path for for-profit private alternatives (a longstanding right-wing dream for the National Weather Service), while hampering our public capacity to measure and understand American society (e.g. tracking maternal mortality in a post-Dobbs America)."
lpeproject.org/blog/the-right-…
The Right Understands That All Governance Is Data Governance
The tech arm of Trump 2.0 isn't just reshaping government — it's consolidating control over the data infrastructure that makes modern governance possible. By centralizing data flows and gutting public…LPE Project
reshared this
Big Tech und Kolonialismus: „Kommunikationsinfrastrukturen waren schon immer Werkzeuge der Kontrolle“
📢 Book Launch in Berlin!
🗓️ 2025.05.31
📍 Freifunk Wireless Community Weekend (@cbase).
ℹ️ networkcommons.org/posts/20250…
"The Rise of the Network Commons" traces the spread of wireless community networks from Europe to the Americas and Africa. It highlights how involving non-experts in building networks empowers communities and democratizes technology, shaping it to serve local needs over commercial interests.
#NetworkCommons
networkcommons.org
Berlin book launch of The Rise of the Network Commons
Saturday, 31 May 2025, 19:00-20:00 CEST c-base, Rungestrasse 20, 10179 berlinnetwork commons
reshared this
#CyberSecurity
insicurezzadigitale.com/vulner…
(in)sicurezza digitale
Notizie cybersecurity, malware, ransomware e sicurezza dei datiDario Fadda (inSicurezzaDigitale.com)
reshared this
Nooo la polizia nooo... #PotereAlPopolo: “Siamo stati infiltrati e spiati dalla polizia per 10 mesi”
La Polizia nega (fanpage.it/politica/la-polizia…) che ci sia mai stata un'operazione sotto copertura, ma la "smentita" è ancora più grave, perché la deliberata esclusione dell'autorità giudiziaria (legge 3 agosto 2007, n. 124) fa tornare il pensiero alle infiltrazioni cossighiane di matrice repressiva.
reshared this
EDRi-gram, 28 May 2025
What has the EDRis network been up to over the past two weeks? Find out the latest digital rights news in our bi-weekly newsletter. In this edition: Reopening the GDPR is a threat to our rights, 6 years of fighting censorship by Meta in Poland, & more!
The post EDRi-gram, 28 May 2025 appeared first on European Digital Rights (EDRi).
Gazzetta del Cadavere reshared this.
Croatia in preparation for AI Law: Activists warn of risks to rights and call for safeguards going beyond EU AI Act
EDRi affiliate Politiscope recently hosted an event in Croatia for journalists and activists to discuss human rights impact of Artificial Intelligence (AI), raise awareness about AI related harms, and to influence future national policy to incorporate safeguards for people’s rights.
The post Croatia in preparation for AI Law: Activists warn of risks to rights and call for safeguards going beyond EU AI Act appeared first on European Digital Rights (EDRi).
Sweden further cracks down on sex workers: What it means for digital rights
Despite overwhelming opposition from civil society, academic experts, and sex workers, the Swedish Parliament voted to adopt a law that expand the criminalisation of sex work. This will have have a chilling effect nationally and internationally, and affect digital rights.
The post Sweden further cracks down on sex workers: What it means for digital rights appeared first on European Digital Rights (EDRi).
6 years in court fighting against arbitrary censorship. What about user empowerment promised by the DSA?
Regardless of the final court judgment, this case highlights the urgent need for Poland to implement the DSA. Without its enforcement, users of the largest social media platforms — whether private individuals or CSOs — still stand little chance against the dominance of tech giants.
The post 6 years in court fighting against arbitrary censorship. What about user empowerment promised by the DSA? appeared first on European Digital Rights (EDRi).
Trump decide per decreto qual è la migliore scienza (di Stato)
reshared this
#CyberSecurity
securebulletin.com/ransomware-…
Ransomware attack in MathWorks outage that paralyzed MATLAB - Secure Bulletin
When the world’s engineers, scientists, and students logged in to MATLAB on May 18, 2025, many were met with silence—a digital void where powerful tools once lived.dark6 (securebulletin.com)
reshared this
Schengener Informationssystem: Jeden Tag 41 Millionen Fahndungsabfragen in Europa
ʙwɑnɑ нoɴoʟʊʟʊ reshared this.
In memoria di John Young e Cryptome
Siamo onorati di pubblicare questo contributo, scritto da Jaromil, per ricordare il co-fondatore del leggendario archivio internet Cryptome, morto all’età di 89 anni il 28 marzo scorso. John Young è morto. Aveva ottantanove anni. La sua opera con Cryptome è eminente per molti di coloro che furono attivi agli albori delle reti digitali. Young assieme a sua moglie Deborah Natsios fu il…
Rendez-vous le 6 juin pour la première journée de l'évènement « Etat d'urgence, 10 ans après » !
Retrouvez le détail des intervenant·es qui participeront au colloque organisé par l'Observatoire des Libertés et du Numérique (OLN) le 6 juin prochain à Paris.
La matinée sera consacrée à la loi de 2015 sur le renseignement, tandis que l'après-midi les discussions porteront sur l'augmentation des pouvoirs de répression de l’administration dans la dernière décennie.
The Pirate Post reshared this.
Inscription requise sur framaforms.org/colloque-du-ven…
Et retrouvez le programme complet des deux journées sur laquadrature.net/10ans-urgence…
État d'urgence, 10 ans après
Vendredi 6 juin Colloque : Bilan critique de la loi Renseignement de 2015 et d'une décennie de répression administrative Participation à prix libre, sur inscription requise via ce formulaire.La Quadrature du Net
ePA ohne Selbstbestimmung: Befunde sollen für alle Praxen sichtbar bleiben
reshared this
Switzerland as well. As it is apart from EU if you use protonmail, swisscows or any product from there all mails, vpn, and other services data is theirs from now on. Since yesterday.
Bye bye freedom.
👏 It is with great excitement that we announce the appointment of @Ambersinha as EDRi’s new Executive Director! 👏
He will join us in late 2025, as responsible for leading the organisation in achieving its mission and strategy, securing its financial sustainability and ensuring oversight, and the daily management.
Amber brings a vision that recognises Europe’s role in the world, civil society’s need for intersectional work and for a justice lens in EDRi’s strategy.
➡️ edri.org/our-work/welcoming-ou…
Welcoming our new Executive Director Amber Sinha - European Digital Rights (EDRi)
It is with great excitemenet that we announce the appointment of Amber Sinha as EDRi’s new Executive Director.European Digital Rights (EDRi)
reshared this
Konsultation zu Vorratsdatenspeicherung: EU-Kommission fragt, wie viel Überwachung OK ist
Bastian’s Night #427 May, 29th
Every Thursday of the week, Bastian’s Night is broadcast from 21:30 CET (new time).
Bastian’s Night is a live talk show in German with lots of music, a weekly round-up of news from around the world, and a glimpse into the host’s crazy week in the pirate movement aka Cabinet of Curiosities.
If you want to read more about @BastianBB: –> This way
A Pirate’s Guide to Privacy: Tor and Tails: A way to go forward.
This is a contributed article by a member in the USPP Discord. You can join and contribute as well.
Part ofA Guide to Being Anonymous
One advanced method many aspiring pirates or privacy concerned folks can take nowadays is using a proxy to mask your IP.
The Onion Router, or TOR, is a proxy system that uses a chain of proxies, or relays, to further hide your IP behind multiple layers.
Tor can be used for basic private browsing, more anonymous communications, and is a tool used by many journalists and activists globally to keep themselves private and secure. It’s one of the best tools for avoiding online surveillance and censorship.
For more advanced use is Tails OS. Famously used by Edward Snowden during his whistleblowing, Tails OS is a Debian based operating system that routes everything through Tor for more complete anonymity.
How does Tor work?
Tor is a global network of computers run by volunteers, designed to provide online anonymity to its users. It accomplishes this through a combination of innovative features and a unique network infrastructure known as onion routing. The Tor network consists of thousands of servers, called Tor relays, operated by volunteers worldwide, making it extremely difficult to trace the origin and destination of internet activity.
Tor’s functionality is based on the principle of onion routing. This process creates a private network pathway with layers of encryption, similar to the layers of an onion. Here’s a detailed breakdown of how it works:
1. Circuit Establishment
When you connect to the Tor network, your Tor client downloads a list of all available Tor relays. It then selects three relays to create a circuit: a guard node, a middle (relay) node, and an exit node.
2. Layered Encryption
Your request is encrypted in multiple layers, with each layer only decryptable by its corresponding node. This ensures that no single node knows both the origin and destination of the data.
3. Data Transmission
The encrypted request is sent through the selected nodes:
+ The guard node (entry node) only knows your IP address and the middle relay. It decrypts the outer layer of encryption.
- The middle node only knows the guard relay and the exit relay. It decrypts the next layer of encryption.
- The exit node knows what you’re requesting from the internet and the middle relay, but not your identity or the guard relay. It decrypts the final layer and sends your request to its destination.
A single relay never knows both where the encrypted connection is coming from and where it is going to:
+ The 1st relay only knows where you are coming from but not where you are going to.
+ This 3rd relay only knows where you are going to but not where you are coming from.
+ The connection to the final destination is encrypted whenever possible to prevent the 3rd relay from reading its content.
This way, Tor is secure by design even if a few relays are malicious.
Organizations running Tor relays include universities like the MIT, activist groups like Riseup, nonprofits like Derechos Digitales, Internet hosting companies like Private Internet Access, and so on. The huge diversity of people and organizations running Tor relays makes it more secure and more sustainable.
4. Response Routing
The response from the website follows the same path back through the Tor network, with each node encrypting the data before passing it to the previous node.
5. Circuit Renewal
To further enhance anonymity, Tor creates a new circuit every 10 minutes for new connections, making long-term traffic analysis even more challenging.
This process effectively separates the content you’re requesting from anything that can be used to establish your identity, providing a high degree of anonymity.
Downloading and Installing Tor Browser
The best way to start using Tor for your online uses is todownload The Tor Browser from The Tor Project and use it for your daily browsing. They have packages and installation files for various operating systems listed there. You can download it for Windows, Mac, Linux, and Android!
For the more secure, you can also download their PGP keys and check the signatures and hashes to ensure the integrity of your downloads.
Downloading for iPhone
The Tor Project recommends installing two applications to effectively use Tor for your browsing needs on iPhone:Orbot andOnion Browser. WikiHow hasa great guide on how to use them effectively together.
Well, what about Tails?
Tails OS is an operating system you install onto a USB that always starts on a clean slate when you turn it on.
Amnesia
Tails always starts from the same clean state and everything you do disappears automatically when you shut down Tails. Nothing is written to storage unless you set up secure and encrypted persistent storage.
Without Tails, almost everything you do can leave traces on the computer:
- Websites that you visited, even in private mode
- Files that you opened, even if you deleted them
- Passwords, even if you use a password manager
- All the devices and Wi-Fi networks that you used
Tor for everything
Everything you do on the Internet from Tails goes through the Tor network. As discussed above, that’s pretty awesome.
Downloading and using Tails
Downloading, verifying, and installing Tails requires about an hour of your time and:
- A USB stick of 8 GB minimum or a recordable DVD.
All the data on this USB stick or DVD is lost when installing Tails.
- The ability to start from a USB stick or a DVD reader.
- A 64-bit x86-64 IBM PC compatible processor.
Tails does not work on ARM or PowerPC processors.
Tails does not work on 32-bit computers since Tails 3.0 (June 2017).
- 2 GB of RAM to work smoothly.
Tails can work with less than 2 GB RAM but might behave strangely or crash.
For Mac
Unfortunately, we don’t know of any Mac model that works well in Tails and can run the latest macOS version.
For Android
Tails doesn’t work on smartphones or tablets. The hardware of smartphones and tablets is very different from the hardware of computers. For now, it’s impossible to make smartphone and tablet hardware work with Linux distributions like Tails.
Further reading:
Wikipedia: About The Tor Network
reshared this
Berliner Datenschutzbeauftragte: Staatsanwaltschaft hat bei Gesichtserkennungssystem gegen Datenschutzrecht verstoßen
#CyberSecurity
securebulletin.com/anatomy-of-…
Anatomy of the Winos 4.0 campaign - Secure Bulletin
The Winos 4.0 campaign, as dissected by Rapid7, exemplifies the evolving sophistication of contemporary malware operations targeting Chinese-speaking environments.securebulletin.com
reshared this
Resilience in Germany: A Fragile State of Preparedness
Germany’s ability to ensure societal resilience has significantly declined in recent decades according to political scientist and PPI alternate board member Schoresch Davoodi. In a working paper, he warns that political complacency and socio-economic mismanagement expose the country to multifaceted vulnerabilities.
Germany celebrated the stability of the 1990s and early 2000s without preparing for the disruptive forces of digital transformation, globalization, and geopolitical shifts. The nation’s overdependence on exports, Chinese markets, and Russian energy, coupled with a slow digital transition, creates strategic weaknesses. Neglecting critical infrastructure, particularly information technology and public services, renders Germany susceptible to cyberattacks and external shocks.
Davoodi also highlights growing domestic inequality, social fragmentation, and political alienation, particularly among low-income communities. Urban gentrification, rising debt, and unequal access to education fuel this divide, threatening social cohesion. He warns that, if left unaddressed, these tensions could destabilize German democracy, echoing the unrest seen in other European nations.
He critiques Germany’s media landscape for lacking social diversity, resulting in biased narratives and underrepresentation of disadvantaged voices. Moreover, he stresses the need for structural reforms, such as inclusive education, fair media practices, and new civic platforms to rebuild trust and solidarity across classes.
Political complacency and socio-economic mismanagement expose the country to multifaceted vulnerabilities. Artificial intelligence will not protect Germany. Our society must first fix itself with domestic support programs. Will Germany seize this warning as its moment to reform or risk repeating the mistakes of its past?
Member Meeting, Tonight, 8pm
Our next member meeting is today, Sunday, May 25th. We will start at 8pm and it will end by 9pm.
To participate:
- go to communitybridge.com/bbb-room/m…;
- enter your name;
- enter the access code listed on the page;
- click the Join button.
Summaries of the meetings and agendas are at our wiki. You can check out the 2025, 2024, 2023 and 2022 meeting recordings.
Giudici a difesa dell'università
Nell’attacco dell’amministrazione Trump alle università americane i giudici sono chiamati difendere la libertà e l’autonomia accademiche quali pilastri fondamentali della democrazia.
reshared this
Brandung-Live #93 on May, 25th
The next “Brandung-Live” will be on 25.05.2025 at 20.00h CEST/DST.
News from Potsdam, Brandenburg, the Pirates of Germany and international news – in German.
If you want to join the conversation, just contact info@PiratesOnAir.net.
§ 188 StGB gehört abgeschafft, bzw. extrem stark reformiert/abgeschwächt so dass solche Fälle nicht mehr möglich sind. Aktuell wirkt dieser furchtbare Paragraph wie die früheren Majestätsbeleidungsgesetze in Monarchien.
Bis dahin empfehle ich (also wahrscheinlich für immer): VPN, Proxies bzw. die komplette digitale Emigration aus D bzw. gleich komplett aus der EU und Anonymität soweit es nur irgendwie geht.
We plan to sue if Paramount settles with Trump over CBS lawsuit
FOR IMMEDIATE RELEASE:
Freedom of the Press Foundation (FPF) has informed Paramount Global executives that it plans to file a lawsuit if Paramount settles with President Donald Trump over his court case against CBS News.
News reports indicate Paramount Global is prepared to settle Trump’s frivolous and unconstitutional complaint against its subsidiary, CBS News, over its editing of an interview with then-Vice President Kamala Harris. United States senators and others have said the purpose of settling may be to bribe the president to clear the path for Paramount to finalize a merger with Skydance Media.
We’ve written previously about how Trump’s complaint against CBS is a clear First Amendment violation and threatens the basic press freedom rights of other news outlets.
So today, FPF sent a letter to Paramount Chair Shari Redstone to put her and other Paramount executives on notice that it plans to file a shareholder’s derivative lawsuit should Paramount settle with Trump, and to demand that Paramount preserve all records that may be relevant to its claims. FPF is a Paramount Global shareholder.
A derivative lawsuit is a procedure that allows shareholders of a company to recover damages incurred due to impropriety by executives and directors. Any damages award would go to Paramount, not FPF.
Paramount executives have reportedly feared liability for settling, and this week, U.S. Sens. Ron Wyden, Bernie Sanders, and Elizabeth Warren opened an investigation of whether settling would violate bribery laws and asking whether Paramount had evaluated the risk of derivative liability.
FPF Director of Advocacy Seth Stern said:
“Corporations that own news outlets should not be in the business of settling baseless lawsuits that clearly violate the First Amendment and put other media outlets at risk. A settlement of Trump’s meritless lawsuit may well be a thinly veiled effort to launder bribes through the court system. Not only would it tank CBS’s reputation but, as three U.S. senators recently explained, it could put Paramount executives at risk of breaking the law.
“Our mission as a press freedom organization is to defend the rights of journalists and the public, not the financial interests of corporate higher-ups who turn their backs on them. When you run a news organization, you have the responsibility to protect First Amendment rights, not abandon them to line your own pockets.
“We hope Paramount will reconsider the dangerous path it appears to be contemplating but, if not, we are prepared to pursue our rights as shareholders. And we hope other Paramount shareholders will join us.”
John Cusack, an FPF founding board member, activist and actor, added, “I’m proud that Freedom of the Press Foundation is doing what CBS’s corporate owners won’t — standing up for press freedom and against authoritarian shakedowns. People who aren’t willing to defend the First Amendment should not be in the news business.”
You can read FPF’s letter here.
Please contact us if you would like further comment.
Arrivano le API 🐝
Un importante passo per standardizzare la condivisione dei dati che la piattaforma #Ransomfeed produce, in maniera aperta e documentata.
💻 Questo aiuterà a diminuire il gap che si crea con RSS rispetto a certe piattaforme di intelligence migliorando l’integrazione a 360 gradi
L’endpoint per iniziare è questo:
➡️ api.ransomfeed.it/docs oppure
➡️ api.ransomfeed.it/docs/html
reshared this
Recent leaks show why source protection matters
Dear Friend of Press Freedom,
This week we examine how leaks are fueling reporting in spite of crackdowns on whistleblowers and journalists. And Rümeysa Öztürk may be out of jail but her ordeal isn’t over. It’s now the 59th day that she’s facing deportation by the United States government for writing an op-ed it didn’t like. More press freedom news below.
Recent leaks show why source protection matters
Our Freedom of Information Act request for an intelligence community memo and the reporting that’s followed have turned into “exhibit A” on why leaks to the press serve the public interest.
Journalists have written about how the memo belies the Trump administration’s own rationale for mass deporting Venezuelans, and we’ve explained how it confirms that Attorney General Pam Bondi’s basis for repealing her predecessor’s safeguards against subpoenaing journalists was bunk.
But even more revelations have followed. This week the Times reported that Director of National Intelligence official Joe Kent pressured intelligence agencies to rewrite their assessment on the Venezuelan government’s control of gang members to support Trump’s position and then supported the release of the rewritten memo because he didn’t understand what it actually said. We also learned that there is a major rift between Secretary of State Marco Rubio and the intelligence community.
Read on our website. For more on leak investigations, catch us live on May 28 at 11 a.m. PT / 2 p.m. ET with Telos.news founder Ryan Lizza and Pulitzer Prize winner James Risen.
Don’t empower Trump to define terrorism
Rümeysa Öztürk never supported terrorism. That’s not even debatable now.
But lack of evidence isn’t stopping the Trump administration’s efforts to deport her and others. So when Congress contemplates further empowering the same administration to arbitrarily deem its opponents’ conduct “support of terrorism,” alarm bells should sound.
Well, ring-a-ling. Last year’s “nonprofit killer” bill, which would allow the administration to deem rights organizations and nonprofit news outlets terrorist supporters and revoke their tax-exempt status, is making a comeback. Read more here.
An open letter to leaders of American institutions
Freedom of the Press Foundation (FPF) was proud to join a letter led by the Knight First Amendment Institute at Columbia University urging leaders of civic and other major institutions to defend free speech amid the Trump administration’s multifront assault on First Amendment freedoms.
As the letter says, “If our democracy is to survive, the freedoms of speech and the press need a vigorous, determined defense.” Read the whole thing.
US press freedom groups launch Journalist Assistance Network
Five major U.S.-based press freedom organizations (including FPF) announced the launch of a network to provide legal and safety resources and training to journalists and newsrooms in the United States. Read more about it here.
What we’re reading
Coalition to Columbia, Barnard: ‘Do better’ for student journalists (Student Press Law Center). We joined a coalition demanding Columbia stop investigating student journalists and respect students’ free press rights.
Paramount could violate anti-bribery law if it pays to settle Trump’s ‘60 Minutes’ lawsuit, senators claim (Variety). Don’t just take our word for it. Settling with Trump puts Paramount executives at risk of significant liability. It also puts CBS at risk of further shakedowns.
Why does GOP budget bill focus on punishing people who leak tax returns? (The Intercept). “Lawmakers and judges should focus on stopping tax evasion by the rich and powerful, not on disproportionate punishments for whistleblowers,” explained FPF Advocacy Director Seth Stern.
Trump administration asks Supreme Court to keep DOGE records secret (Politico). Seems like it’d be more “efficient” to comply with basic transparency requests than waste government resources to keep your work secret.
Judge orders U.S. to keep custody of migrants amid claims they were sent to South Sudan (The New York Times). The Trump administration says “that’s classified” any time it doesn’t want to answer difficult questions to the courts or to the public.
Disclose the Trump crypto dinner guests (The Wall Street Journal). So much for the “most transparent administration in history.”
FCC Chairman Carr seeks to designate NBC equal time issue for hearing (The Desk). Another week, another sham investigation by Brendan Carr in the news.
Indiana hides executions. Firing squads would be more honest. (IndyStar). “Indiana killed Ritchie under a veil of secrecy, with no media present . ... We don't know if Ritchie suffered."
New Montana law blocks the state from buying private data to skirt the Fourth Amendment (Reason). Montana is leading the way. Other states and the federal government should follow.
Gazzetta del Cadavere reshared this.
La Quadrature du Net
in reply to La Quadrature du Net • • •Retrouvez le programme complet sur le visuel et sur cette page : laquadrature.net/10ans-urgence…
On vous attend en nombre !
État d'urgence, 10 ans après
La Quadrature du Net