Tag: electronic

  • Sowing Stakes: How Laws Safeguard Your Data Rights

    Sowing Stakes: How Laws Safeguard Your Data Rights

    Data is the oil of the digital economy – whether it’s personal data or other sorts of data.

    Guarding Your Data – The New Frontier in a Digital-First World

    Since the General Data Protection Regulation (GDPR) rolled out last May, everyone’s woke up to the fact that their personal data isn’t just a back‑office issue but a battlefield of rights. Businesses, in turn, have started treating data protection as a non‑negotiable priority—no more treating it like a low‑budget backup system.

    Why Data Is Worth More Than It Looks

    The Internet of Things is exploding: connected cars, smart fridges, and buzzing sensors everywhere. Add the next‑gen 5G networks, and the amount of data streaming in will be staggering. But remember: most of this data isn’t personal. Still, legal experts are wrestling with a hot question—do we have ownership over data, whether it’s a passport number or a packet of sensor readings? That’s a huge economic puzzle.

    How the Law Deals with Information

    Under English law, the truth is that you can’t own information itself. Think of a database: the data inside is not “property” in the traditional sense, but the physical hard‑drive it lives on is.

    • Physical medium – tangible property you can own outright.
    • Intellectual property rights – copyright, database rights, and confidences that can still shield the information.
    • No general “owner” of data – everything hinges on how you package, store, or handle it.

    The EU has toyed with a “data producer’s right” but that’s still miles away. In the meantime, contracts become the safety net, filling gaps that the law hasn’t carved out yet.

    Case Study: The Horse‑Racing Data Drama

    Yesterday’s ruling (May, 2024) put a spotlight on whether specific race‑track data could be protected. The plaintiffs tried three angles:

    • Copyright – only works that are original literary creations qualify.
    • Database rights – a real investment in building and maintaining a protected database is required.
    • Confidence – treating the data as trade secrets, protecting it under the law of confidentiality.

    The court let the confidence argument win: the pre‑race data had commercial value, and restricting its spread off the track was justified. They dismissed copyright because the data was algorithmically auto‑generated and lacked the creative flair needed for protection. Database rights were ruled non‑infringing as the data use didn’t cross the thresholds necessary.

    This case shows that protecting data is a tricky, fact‑driven art. No single legal approach guarantees success; often it’s a patchwork of policies, contracts, and good old‑fashioned safeguards.

    Practical Steps for Protecting Your Data

    Want to keep your data from becoming a free‑for‑all catalog? Prioritize these areas:

    • Trade Secret Policy – Identify the data you’re keen on guarding. Document it, keep it private, and enforce confidentiality clauses in employment and NDA agreements.
    • Lock It Down – Hard‑wow! Use robust physical and digital security measures. Deploy role‑based access controls and encryption.
    • IP Rights Check – Maintain meticulous records showing how data or databases were created and maintained. Scrutinize contracts with developers to confirm your ownership of copyright and database rights.
    • Contractual Safeguards – When you share data with partners or vendors, ensure those agreements spell out the rights you retain and the responsibilities they uphold.

    Remember, the law may lag, but you can build a solid defense with thoughtful policy, vigilant security, and strong contracts.

    — with a dash of humor, authority, and a keen sense of the evolving data landscape. (Photo by Glenn Carstens‑Peters on Unsplash)

  • Government Accidentally Reveals Someone Inside Twitter Fabricated 'Gotcha' Accounts To Frame Conservative Firebrand

    Government Accidentally Reveals Someone Inside Twitter Fabricated 'Gotcha' Accounts To Frame Conservative Firebrand

    Authored by ‘sundance’ via The Last Refuge,

    The Truth Has No Agenda

    Everything that preceded the 2020 federal election was a complex system of control by a network of ideologues, federal agencies, allies in the private sector, financial stakeholders and corrupt interests all working toward a common goal.

    There’s no need to go through the background of how the election was manipulated and how the government and private sector, specifically social media, worked to influence the 2020 outcome because you have all seen it.

    Whether it was local election officials working to control outcomes, federal agencies working to support them (CISA, FBI, DHS), financial interests working to fund them (Zuckerberg et al), or social media platforms controlling the visible content and discussion (Twitter Files, Google, Facebook etc.), the objective was all the same.  It was a massive one-sided operation against the freewill of the American voter.

    In the aftermath of the 2020 election, those same system operators, govt officials, corporate media, private sector groups and social media platforms then circled the wagons to scatter the evidence of their conduct.  If you questioned anything you were a threat.  That’s the context to the dynamic that unfolded.

    Lawfare operatives joined forces with Democrat staffers, and allies in social media platforms all worked in concert to target the voices of anyone who would rise in opposition to the corruption that was stunningly clear in the outcome of the election process.  Corporate media then labeled, isolated, ridiculed and marginalized anyone who dared to point out the obvious.

    When AG Merrick Garland says this of January 6, 2021:

    […] “the Justice Department has conducted one of the largest, most complex, and most resource-intensive investigations in our history. We have worked to analyze massive amounts of physical and digital data. We have recovered devices, decrypted electronic messages, triangulated phones, and pored through tens of thousands of hours of video. We have also benefited from tens of thousands of tips we received from the public. Following these digital and physical footprints, we were able to identify hundreds of people.” {link} The targeting operation needs context.

    Do you remember on April 27, 2024, when DOJ Inspector General Michael Horowitz said,

    more than 3.4 million search queries into the NSA database took place between Dec. 1st, 2020 and Nov. 30th, 2021, by government officials and/or contractors working on behalf of the federal government.”  The result was “more than 1 million searches of private documents and communication of Americans that were illegal and non-compliant,” and over “10,000 federal employees have access to that database.” {OIG Testimony}.

    Put the statement from Garland together with the statement from Horowitz, and you get an understanding of what was done.

    Hundreds of stakeholders in the Lawfare network joined forces with hundreds of people who became staff researchers for a weaponized Congress.  Hundreds more social media background agents then poured thousands of hours into feeding private information to the DOJ, FBI, J6 Committee and all of their hired staff working on the project.

    How do I know?…

    …I was one of their targets.

    Before telling the rest of the story, some background is needed.

    I am well versed in the ways of the administrative state and the corrupt systems, institutions and silos that make up our weaponized government. I can (a) see them; (b) predict their activity; and (c) know where their traps and operations are located.

    Traveling the deep investigative weeds of the administrative state eventually gives you a set of skills.  When people ask how the outlines on this website can seem so far ahead of the sunlight that eventually falls upon the outlined corruption, this is essentially why.  When you take these skills on the road, you learn to be a free-range scout, and after a long while you learn how to track the activity.

    When I was outlining how the Fourth Branch of Government works and/or Jack’s Magic Coffee Shop and the DHS system operating inside it, I wasn’t shooting from the hip. However, people will always seek to dismiss the uncomfortable truth.

    Sometimes you just have to wait for the evidence you know exists to surface, or for a situation to unfold that is driven by a self-fulfilling prophecy. The often uncomfy CTH predictions turn out to be the truth of the issue because they are based on the factual evidence of the issue.

    That level of how the system works came in very handy when I received this subpoena from Chairman Bennie Thompson and the J6 Committee.  [Warning, things could get uncomfortable if you don’t accept the scale of corruption that exists.]

    Pay attention to the red box on the page shown.

    This is essentially the probable cause that justifies the subpoena itself. 

    I have redacted a name in the box for reasons you will see that follow.

    I was never in Washington DC on January 6, 2021, nor did I work with or communicate with anyone who was involved in any of the activities that were subject to the J6 committee investigative authority.

    I’m going to skip a lot of background noise, irrelevant legal stuff, jurisdictional issues, discoveries from discussions with lawyers and the experience gained in association with this ridiculous subpoena.  Instead, I am going to focus on the biggest story within it.

    Sticking to the information in the Red Box above, notice how the J6 committee has evidence, “public-source information and documents on file”, showing my participation, communication, and contact with people and technology that are material interests to the committee.

    Here’s the kicker…. I had no clue what the hell they were talking about.

    There’s not a single aspect of their outline that I had any knowledge or connection of.

    I had no idea what Zello was. I had no idea who 1% watchdog might be. I had never heard of “Stop the Steal J6” or associated “channel.”  I had never heard of the person redacted, and I had never communicated with any Oath Keeper, any communication system, or platform, or anyone or anything – nothing – that is outlined in that subpoena.

    Those points of evidence outlined in the subpoena had no connection to me at all.

    The subpoena might as well have been asking me to appear in Michigan because my Red Ferrari was involved in a hit and run accident, during my trip to Detroit.

    I don’t own a Ferrari; I have never been to Michigan; I certainly never had an accident; I wasn’t on a trip and have never visited Detroit.

    The entire construct of their probable cause for the subpoena was silly. Complete and utter nonsense.

    That said, how could there be “public records” and “documentary” evidence of something that never happened?

    At first, I thought this was some silly case of mistaken identity and they just sent a subpoena to the wrong person. 

    However, the investigators were adamant the evidence existed, and the need for testimony was required.

    After taking advice from several smart people, and after discovering the costs associated with just the reply to the committee and/or representation therein; suddenly I realized there might be more value for me in this subpoena than the committee.  After all, how can there be public-records and documents that I own a red Ferrari and went to Michigan when I don’t and never did.

    After several back and forths I discovered, through their admissions of their own research, and through documents they extracted as an outcome of their tasks to prove the merit of their claims, that someone *inside* Twitter had created a fictitious identity of me associated with the networks and communications as the investigators described them.

    Think about what was discovered here.

    Someone inside the Twitter platform, an employee of Twitter or a person who had the ability to access their administrative system (ie. FBI), had made a decision to target me.

    As a result: (a) they had been doing this for a long time with a specific goal in mind; and (b) they created an elaborate trail of background activity and identity that was entirely fabricated.

    Eventually, my assigned investigative unit admitted this. 

    Think about it. 

    How could they clear me, without them having the underlying evidence that proved my innocence?

    Once, the federal investigators realized what took place they wanted to get rid of me -and my snark filled curiosity- with great urgency.  They also had an ‘oh shit’ moment, when they contemplated everything, including what they had revealed to me from the outset of my contact, now several months prior.

    What I discovered in this experience was that DHS, and by extension DOJ/FBI and the January 6 investigators, had direct administrative level backdoors into all social media platforms.

    Overlay the Twitter files now, and then expand your thinking…. Do you remember Elon Musk promising, several times, that he would provide end-to-end encryption on the Twitter Direct Messages?  Remember that?  It never happened, did it.  Why not?

    In their quest to prove that I owned a Red Ferrari, traveled to Michigan and had a hit-and-run accident, these investigators outlined to me how the United States Government, through their DHS authority, has employees, agents and contractors with open portals into all social media platforms.

    Yes, the federal government is inside the mechanics of the systems (Twitter, Facebook, Meta, Instagram, Google, YouTube, WhatsApp, Zello, etc) and they have administrative access in real time to monitor, review, extract and evaluate everything, soup-to-nuts.

    It was only because the investigators and forensic data knuckleheads have these portals, that they were able to locate the source of the fabricated evidence they were originally attributing to me.  This was an investigative process and research discovery being conducted in the data processing systems of Twitter in real time as they questioned me.

    Once they realized what had taken place, and as soon as I started asking how they were making these admissions (now carrying an apologetic certainty), suddenly the investigators wanted no further contact or communication with me.  You’re good, whoopsie daisy, our bad, sorry.

    Now, take some time to fully digest and absorb what I have just shared.

    The U.S. government is worried about TikTok, because U.S. citizen data might be extracted?

    Meanwhile, the U.S. government, at a fully unrestricted administrative level, is inside Twitter, Facebook, Meta, Insta, YouTube etc., running amok and extracting anything – including private messages… and they’re somehow worried about protecting us from TikTok data collection.  Think about it.

    Maybe the thing that worried them is not that administrators within TikTok were datamining; maybe, just maybe, the thing that really worried them is that they’re not the administrators.

    Ears of an elephant, eyes of a mouse.

    Loading recommendations…
  • Global Defense Firms Launch Live Weapon Trials in Ukraine

    Brave1 Unleashes Battlefield Reality Testing

    What’s Going on?

    Brave1 Tech Incubator has rolled out a bold new Test in Ukraine Programme that promises to take tech prototypes from our allies, run them straight into the field, and come back with hard‑to‑ignore data.

    Why It Matters

    • Speed: No more waiting months for lab demos. We’re sending gear out now, in real‑time, on real mess.
    • Truth: Battlegrounds are brutal. Materials and tactics get steered by heat, mud, and chaos. The programme tells engineers exactly what’s working and what’s failing.
    • Transparency: Every test comes with a full report—clear, actionable, and peppered with front‑line anecdotes.

    Who’s Involved?

    The initiative is a patchwork of international partners, from Australia and Germany to Israel and Canada. Each sends a prototype, hops onto a Ukrainian convoy, and then goes back with a report that says, “You’d do better if you made this happen faster.”

    Behind the Scenes

    Picture a friendly convoy with a shiny new drone prototype perched on the back. The crew is gathering data—battery life, signal latency, even the occasional “Who left the cooking pot on?” moment—while navigating a minefield. When they return, they send a snapshot of raw data and a “field‑man’s diary” review:

    • Battery performance: 15% drop during a 30‑minute run.
    • Signal range: Nails hitting 90% of intended distance.
    • Operator feedback: “The drone’s interface was smoother than a freshly learned joke.”

    Why This Is a Game Changer

    This isn’t just testing a gadget, it’s a partnership‑powered overhaul. By marrying real‑world data with the thoughts of front‑line users, innovators can recalibrate their blueprints faster than ever.

    Takeaway

    Brave1’s program is a tailor‑made report card for military technology, turning battlefield trials into engineering gold. The result? Faster improvements, fewer costly setbacks, and a whole lot more laughs along the way.

    Ukraine Unleashes a Battlefield Test Lab for Global Defense Gadgets

    So you’ve been rolling out the latest drones, loitering bombs, or AI‑guided weapons at home, and now the war zone is the ultimate playground? Kyiv’s Brave1 program has just opened its gates. The Ukrainian government, in partnership with foreign allies, has launched a “Test in Ukraine” initiative that lets foreign defense companies fly their prototypes into the real‑world tangle on the front lines.

    What’s on the Menu?

    • Drone swag: pilots, cargo, and those little craft that hover forever.
    • Loitering munitions: the “drop‑and‑screw‑in” kind that can wait for the perfect moment.
    • Naval drones: autonomous sea‑roaches that don’t need a driver.
    • Electronic warfare gear: tools to jam and peek into enemy comms.
    • Pure AI products: gadgets that learn on the fly.

    What’s in it for the Eagles?

    In exchange for handing over their shiny prototypes, Brave1 will send back a battlefield‑grade report that’s more detailed than a weather forecast. The report highlights how the weapon behaved under fire, and offers suggestions to tweak the systems in real time. Think of it as a firmware update delivered by a live demo.

    Co‑Production Booster

    Participants also get matched with a Ukrainian manufacturer working on similar tech. Together they can co‑produce and shoot the product to market faster, turning a lab invention into a frontline tool within weeks.

    Words from the Digital Ministry

    “We’re ready to help companies from partner nations develop, test, and refine technologies that actually work on the battlefield,” Mykhailo Fedorov, Ukraine’s minister of digital transformation, declared in a press release. “This is a chance to gain experience that simply cannot be simulated in a lab.”

    So if you’re looking to see how your tech performs where the sky is less blue and the stakes are higher, Kyiv’s open arms (and front‑line tests) might just be the place to start.

    Ukraine gets involved with EU rearmament efforts

    Brave1 Takes the Stage in a New Wave of EU‑Ukrainian Defence Ventures

    Just when you thought the EU’s defence tech scene couldn’t get any hotter, Brave1 drops a headline that keeps the momentum buzzing.

    Back‑to‑Back Moves on the Defence Front

    • BraveTechEU Partnership: A €100 million pot of cash split between Brave1, the European Defence Fund (EDF), and the EU Defence Innovation Scheme (EUDIS). The plan? Fund hackathons, match investors with innovators, and push research forward.
    • EU “SAFE” Loan: A €150 billion lifeline that lets member states borrow for joint projects. The twist? At least 65% of every weapon’s parts must come from within the EU or Ukraine – a real “buy local” push.
    • Ukrainian Force on Defence Industrial Cooperation: A fresh joint effort that slants Ukraine deeper into the defence‑tech ecosystem rather than just the battlefield.

    Key Deals Inside the Horizon

    Beyond the headline numbers, Ukraine is pulling in allies with concrete steps:

    • Signing a €67 million pact with Denmark for defence companies to build their designs on Danish soil – a first‑of‑its‑kind move.
    • Inviting heavyweight players like Sweden’s SAAB, Norway’s Kongsberg, France‑Germany’s KNDS, Germany’s Rheinmetall, and the US’s Raytheon to expand their footprint in Ukraine. The June press release from Ukraine’s Ministry of Defence confirmed these ground‑level extensions.
    Why Ukraine’s Inclusion Matters

    Experts (including a quick chat with Euronews Next) opine that Ukraine deserves a seat at the EU’s “common planning” table. Their firsthand experience with classic weapons can steer procurement strategies away from blind spots. “Let them in the room – they can point out those tricky little quirks that could cost a lot,” they say.

    So, there you have it. Brave1 isn’t just another name in the room; it’s the spark that keeps the EU‑Ukraine defence tech gryphon of innovation flying higher. And with humor in the mix and a push for a more integrated Europe, the future looks exciting.