French luxury giant Dior has taken down a controversial photograph that had been criticized in China for “smearing Asian women” by pandering to Western stereotypes while “distorting Chinese culture.”

The photo, which was part of the brand’s ‘Lady Dior’ exhibition in Shanghai, depicts an Asian model wearing a traditional dress and clutching a Dior handbag. It came under fire this week from Chinese media outlets for featuring “spooky eyes, [a] gloomy face and Qing Dynasty-styled nail armor.”

Read more

A screenshot from D&G's apology video © YouTube / Dolce & Gabbana
Dolce & Gabbana beg for forgiveness after ‘racist’ ad triggers backlash in China

Although Dior has not released a statement regarding the controversy, it confirmed to fashion trade publication Business of Fashion that the photo had been removed from the exhibition. The brand has also reportedly taken the photo off Chinese social media platform Weibo.

The image, which was shot by Chinese photographer Chen Man, had drawn both media ire and public outrage. However, there were apparently no calls for a boycott of the brand.

In an editorial on Monday titled “Is This the Asian Woman in Dior’s Eyes?”, the Beijing Daily paper had noted that the image makes Chinese consumers uncomfortable. The publication criticized Man for “playing up to the brands, or the aesthetic tastes of the Western world.”

For years, Asian women have always appeared with small eyes and freckles from the Western perspective, but the Chinese way to appreciate art and beauty can’t be distorted by that.

Warning that both the brand and the photographer had “gone too far,” the China Women’s News paper ran an editorial on Wednesday that claimed it “indicated their intention of uglifying Chinese women and distorting Chinese culture.”

Read more

RT
‘Deeply sorry’: Versace in hot water as China accuses fashion brand of questioning its sovereignty

“Again, from… Dior’s ghost-style picture, which makes the public feel uncomfortable, it’s easy to see some Western brands’ ‘pride and prejudice’ in their aesthetics and culture,” said the newspaper, which is run by the All-China Women’s Federation.

Meanwhile, the Global Times noted that the “lingering controversy could pose a delicate situation” for Dior and other global brands – for whom China’s “massive” luxury market was one of the biggest sources of revenue. The paper said that the Chinese public had become “increasingly sensitive” toward the depiction and treatment of Chinese people and culture by foreign companies.

While pointing out that Chinese social media users had demanded the company and photographer explain their intention, a number of media outlets also highlighted how some netizens had praised the photo as a departure from typical standards of beauty in the country, often characterized by “fair skin and large eyes.”

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Rotterdam Mayor Ahmed Aboutaleb has described an anti-lockdown protest in his city as an “orgy of violence.” The Dutch demonstration devolved into a violent riot that saw police open fire on protesters.

Aboutaleb described the events of Friday night as an “orgy of violence,” after protesters packed Rotterdam’s central Coolsingel shopping street to voice their opposition to an ongoing partial lockdown, a ban on New Year’s Eve fireworks displays, and the possibility of a two-tiered system of freedom in the Netherlands, one of liberty for the vaccinated and restrictions for those without the jab.

Read more

A police squad car is seen engulfed in flames during a protest in Rotterdam, Netherlands, November 19, 2021.
2 wounded after shots fired at Covid protest in Netherlands

The protest soon got out of hand, and police said on Saturday that 57 people were arrested. Protesters were seen torching police vehicles and launching fireworks at police, who shot at them in response.

Aboutaleb said that the cops had been “forced” to use their weapons. “On a number of occasions the police felt it necessary to draw their weapons to defend themselves,” he told reporters. “They shot at protesters, people were injured.”

Police say at least seven people were injured. Two of these injuries were caused by police bullets, and the victims are still in hospital. One officer was hospitalized, while several others were treated at the scene for minor injuries.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall.  But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.

Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure.  And the president knows, says Inglis, that means the government needs to get its own cyber house in order. 

But like any real startup, Inglis’ resources are scarce.  More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission.  That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle.  Why does it matter?

“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”

While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later.  Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others.  The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.   

“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”

Optimistic he is.  And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.

“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”

While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away. 

First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks.  He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.

“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.

The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.

He admits there is still a level of education needed within government to get there.

That is usually the case in both the government and the private sector,” he said.  “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”

Inglis says that unity of effort must start at home.  “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said.  “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”

He is arguing for the government to also put ‘valuable material’ on the table.  “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”

Inglis likes to point to the example of CISA and the Joint Cyber Collaborative.  “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”

Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.  

Inglis has been an active participant in the president’s recent actions in cyber.  He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration.  “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis.  “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”

While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations.  Managing expectations is going to be important.  Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history.  The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.

So, I asked Inglis whether there should be red lines in cyber.

“Red lines are both good and bad,” he answered.  “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”

Inglis said he’s also thinking a lot about present and future resilience.  It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled. 

“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”

Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.

“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”

Congress, are you listening?  Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”

As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis.  “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”

Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief

Read more expert national security insights, perspective and analysis in The Cipher Brief

The post Chris Inglis and the Gathering Cyber Storm appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Controversial agriculture laws that saw farmers across India protesting for over a year are going to be rolled back, Prime Minister Narendra Modi has unexpectedly announced.

“I want to tell the country that we have decided to repeal the three farm laws,” Modi said in a televised address on Friday, which local media described as “stunning.”

The Indian parliament will complete the constitutional process of repealing the agricultural legislation in late November, he added.

However, the PM again defended the divisive legislation, saying that the reform of the sector, which accounts for some 15% of India’s $2.7 trillion economy, was actually aimed at supporting the country’s small farmers.

Whatever I did was for farmers. What I am doing is for the country.

“Maybe something was lacking in our efforts, which is why we couldn’t convince some farmers about the laws,” Modi acknowledged.

Read more

Farmers block railway tracks as part of protests against farm laws during nationwide protests, in Sonipat, northern state of Haryana, India, September 27, 2021. © Reuters / Anushree Fadnavi
Indian farmers return to hold nationwide protests against last year’s agriculture laws

The laws, which were introduced last September, allowed farmers to sell their crops outside of the government-regulated wholesale markets, in which they were guaranteed a minimum price.

The government argued that it would see them earning more, but growers feared that that move would, on the contrary, cause a drop in prices and make them hostages to large corporations.

Thousands of farmers joined the protests against what they called “black laws,” and some rallies turned violent. A year later, many demonstrators remain camped along roads outside the capital New Delhi.

And the farmers aren’t planning on going home just yet, with one of their leaders saying on Twitter: “We will wait for parliament to repeal the laws.”

Modi’s concession to the protesters may have been unexpected, but it comes several months ahead of elections in India’s most populous state of Uttar Pradesh, as well as two other northern states with large rural populations.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Protests against renewed Covid-19 restrictions turned violent in The Hague. The unrest comes a day after several demonstrators in another Dutch city, Rotterdam, were injured amid police gunfire.

Seven people were arrested after fierce clashes broke out between law enforcement and anti-lockdown demonstrators in The Hague, the seat of the International Court of Justice (ICJ), on Saturday.

A video shared on social media shows protesters lighting firecrackers that sparked multiple fires, causing the skies in the city to glow an eerie red.

In another clip, a group of protesters could be seen knocking down a traffic pole fitted with a surveillance camera.

Dutch police reported that five of its officers were injured in the showdown with rioters. One officer was taken to hospital with a knee injury and concussion. Two others “suffered hearing damage,” while another two suffered injuries to their hands.

Read more

A burned electric scooter is seen after an anti-lockdown protest in Rotterdam, Netherlands, November 19, 2021 © AFP / Jeffrey Groeneweg
Lockdown protest described as ‘orgy of violence’

The chaotic scenes in the Netherlands’ third-largest city unfolded a day after a protest against reimposed Covid-19 restrictions in Rotterdam was marred by violence. Over 50 people were arrested in the city and three were injured after police opened fire in a bid to quell the unrest. Police later claimed that officers were “compelled to shoot at targets” to protect themselves. The three injured protesters remain in hospital, and their condition is unknown.

Protests have swept through a number of Dutch cities after the Netherlands became the first country in Western Europe since summer to go into a partial lockdown last week. Tensions soared further after the government banned New Year’s Eve fireworks displays and the Dutch parliament backed the introduction of the so-called 2G system, which would bar the unvaccinated and those who have not recently recovered from the virus from a long list of public places if introduced.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

An official inquiry has found that Germany’s justice system was staffed with former Nazis for decades after the Second World War, At one point, three out of four top officials at the prosecutor’s office were former party members.

Released on Thursday, the 600-page report was compiled by historian Friedrich Kiessling and legal scholar Christoph Safferling, and covers the Cold War period running from the early 1950s until 1974. The work was commissioned by the federal prosecutor’s office. 

Read more

The Federal Ministry of Justice in Berlin © De-okin
Over 50% of W. Germany’s senior justice ministry officials in 1950-70s were ex-Nazis – govt report

The researchers found that, at one point during the 1950s, roughly three in four top officials in the federal prosecutor’s office had been members of the Nazi Party. It took until 1972 before former Nazis were no longer in the majority in that office, and until 1992 before the judicial system had been fully purged of ex-members of the fascist party.

“There was no break, let alone a conscious break, with the Nazi past,” the researchers said of the situation. 

Presenting the inquiry’s findings, state secretary at the justice ministry Margaretha Sudhof said the country has “long remained blind” to the presence of ex-Nazis in senior positions after the end of the Second World War.

“On the face of it they were highly competent lawyers… but that came against the backdrop of the death sentences and race laws in which they were involved,” Sudhof commented. 

In a statement about the study’s publication, Justice Minister Christine Lambrecht said she welcomed “the fact that the Federal Prosecutor’s Office is also grappling with its troubled past and is shedding more light on its own Nazi entanglements in the post-war period.”

The federal prosecutor’s office is Germany’s highest prosecutorial authority, responsible for pursuing those who violate international law and commit alleged crimes relating to state security. 

The latest study follows an earlier report published in 2016, which stated that in 1957 – more than a decade after the war had ended – 77% of senior officials in the justice ministry were former Nazis. At the time of that publication, then-Justice Minister Heiko Maas stated that the “Nazi-era lawyers went on to cover up old injustice rather than to uncover it, and thereby created new injustice.”

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Libyan military commander Khalifa Haftar is set to challenge Gaddafi’s son for the top job, announcing his presidential bid. The election will take place on December 24.

Read more

Saif al-Islam al-Gaddafi at the registration centre in Sebha. ©Khaled Al-Zaidy / Handout via REUTERS
Gaddafi heir runs for Libyan presidency despite arrest warrant

I declare my candidacy for the presidential election, not because I am chasing power but because I want to lead our people towards glory, progress and prosperity,” the de facto leader of Eastern Libya said in a televised speech.

Haftar added that the election is the only way out of the severe crisis the country has been plunged into.

The announcement was expected; in September, Haftar announced that he was temporarily stepping down as head of the force known as the Libyan National Army, fulfilling the requirement for presidential hopefuls to suspend public work three months before an election.

Haftar will run against the son of former leader Muammar Gaddafi, Saif al-Islam Gaddafi, who represents the Popular Front for the Liberation of Libya.

Haftar’s presidential bid is likely to anger many who consider him a war criminal responsible for the indiscriminate killing of civilians during his military campaign. A number of civil lawsuits have been filed against him in a US federal court for alleged war crimes. Haftar has both US and Libyan citizenship, and owns property in Virginia.

Following years of civil war and political chaos after the NATO-backed intervention that saw Muammar Gaddafi deposed and brutally murdered, the upcoming election is widely viewed as an opportunity for political settlement and the long-awaited unification of the country, divided now between Haftar’s forces and the Tripoli-based Government of National Accord. However, there is still no consensus on the legal grounds for the election, which could become an obstacle for the peace process.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Australia’s Jewish community has condemned the repeated displays of Nazi references at anti-vaccine and anti-lockdown rallies in Victoria, some of which saw the state premier depicted as Adolf Hitler.

Daniel Aghion, the president of the Jewish Community Council of Victoria, claims that references to the genocidal regime of the Nazis amid the current unrest over pandemic rules is a false equivalence.

“The Nazis had the intention of wiping from the face of the Earth a race or religion simply because of what they were,” Aghion told Guardian Australia. “Nothing in the current proposals is remotely like that, and the comparison to Nazi Germany is therefore shocking, inappropriate and wrong,” he added.

Aghion’s comments come after demonstrators, protesting against pandemic laws, referenced Nazi Germany in an effort to make their point. Some carried placards depicting state premier, Daniel Andrews, as Hitler. 

 Wendy Lovell, a Liberal MP, had also claimed laws proposed to govern future pandemics were similar to Germany’s 1933 Enabling Act – which allowed the Reich government to issue laws without the consent of parliament and preceded atrocities, most notably the Holocaust.

MP Bernie Finn had gone as far as to share a social media post depicting the state premier as Hitler. It was later deleted.Laws proposed by Andrews seek to grant powers to the state leaders in the event of another pandemic. Under the move, the minister “may make any order… that the minister believes is reasonably necessary to protect public health.” 

Opponents claim the legislation, which would see power concentrated with the head of state and health minister, is too broad and far reaching.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !