Page 1,337«..1020..1,3361,3371,3381,339..1,3501,360..»

Cardano: Crypto Community on Twitter Tells Binance.US That … – CryptoGlobe

The cryptocurrency community has voted on the smart contract platform Cardano ($ADA) seeing its logo on Twitters pages in a new poll headed by the U.S. arm of leading cryptocurrency exchange Binance.

In a poll that received over 26,000 votes from the cryptocurrency community, Binance.US asked its followers and the wider public which cryptocurrency the microblogging platform should change its logo to next, with the majority of respondents that chose one asset pointing to Cardano.

Most votes, 39.2%, went to the other category, and led to a diverse set of responses pointing to multiple digital assets. The single cryptocurrency with the most votes was Cardano at 34.6%, followed by Bitcoin at 21.6%, and Ethereum at 4.7%.

The poll comes shortly after Twitter changed its icon to the symbol of the popular meme-inspired cryptocurrency Dogecoin (DOGE) in a move that had been teased by its current CEO Elon Musk years ago. The price of DOGE has increased sharply as a result.

The icon change was platform-wide and is currently still visible to the social media giants estimated 360 million monthly active users, as well as other users visiting the platform. Shortly after making the change, Musk tweeted a meme implying the change isnt going to be brief.

As CryptoGlobe reported, the cryptocurrency community is expecting the price ofCardano to drop during the month of April, even as its adoption keeps on growing and whales accumulate the networks native token.

According to respondents on CoinMarketCaps cryptocurrency price estimates, on average, predictions pointed to ADA finishing the month of April trading at $0.37 per token, down around 7% from the tokens current price of around $0.3969.

The negative outlook comes even at a time in which Cardano is seeing asurge in buying activity from large investors, colloquially referred to as whales. These large token holders have added a total of 150 million tokens over the past month.

According to data shared by crypto analyst Ali Martinez from IntoTheBlock, a blockchain analytics platform, Cardano whales holding between 1 million and 10 million ADA have been on a buying spree, collecting over $57 million worth of the smart contract platforms native token in a few weeks.

Featured Image viaUnsplash

Go here to see the original:

Cardano: Crypto Community on Twitter Tells Binance.US That ... - CryptoGlobe

Read More..

Half Billion Dogecoin Moved by Binance in Wake of Positive DOGE News – U.Today

Yuri Molchan

Binance has shoveled several hundred billion DOGE after coin's trading volume surged 671%

Read U.TODAY on

Google News

According to a few recent tweets posted by the @DogeWhaleAlert, over the past 24 hours, the biggest crypto exchange by trading volume, Binance, has transferred more than 400 million DOGE among its internal wallets.

The two enormous transactions carried 301,667,311 DOGE and 100,906,386 DOGE evaluated at $29,677,728 and $9,927,069.

This was likely to do with redistributing funds between local wallets of the exchange. Overall, after yesterday's news about Elon Musk, Twitter and Dogecoin, the price of the latter surged by 30% within one hour and is now trading at the $0.01009 level, according to CoinMarketCap.

As the price surged, the meme coin's market cap increased by nearly 29%, hitting $13,972,987,874, and the trading volume of DOGE went up by 671%, reaching $5,125,163,854 in the last 24 hours.

Aside from Dogecoin itself, CoinGecko reports that all Doge-related meme coins are on the rise today, too.

As reported by U.Today earlier, on April 3, Twitters usual logo depicting a blue bird was changed for a Dogecoin logo. This pushed the price of the meme coin way up, adding more than 30% overall.

Still, the meme coin is now trading more than 86% below the all-time high of $0.7376 reached in May 2021 after Elon Musk shilled DOGE during his debut on Saturday Night Live.

Still, it seems that after the price surge, many whales began to sell, moving profits off the table. Today Whale Alert spotted transfers of 650 million and 300 million Dogecoin. The first one was made by the fifth largest DOGE holder as he likely moved his meme coins to be sold.

Prominent economist and trader Alex Kruger has tweeted that after the surge of Dogecoin, he believes things on the market are making way for "a massive dog run" that may happen later this year.

He suggested looking back at May 2021 (when Dogecoin hit its historic peak), and November 2021, a little after SHIB surged to an all-time high. His bets among meme tokens are SHIB and SOV.

Continued here:

Half Billion Dogecoin Moved by Binance in Wake of Positive DOGE News - U.Today

Read More..

Price Predictions For Helium (HNT) and Binance (BNB) Is Reasonable, While Collateral Network (COLT) 3500% – Bitcoinist

While most cryptocurrencies are trying to convince investors, Helium (HNT), Binance (BNB) and Collateral Network (COLT) have taken the center stage. But investors are more convinced with the Collateral Network (COLT) presale growth projection of 3500% than any other cryptocurrency.

>>BUY COLT TOKENS NOW<<

Helium (HNT) has been one of the most talked-about cryptos in 2023. Helium (HNT) recently announced that it would fully migrate to Solana (SOL) by March 27th. Helium (HNT) was launched to build hotspots for connecting IoT devices. The Helium (HNT) hotspots help users connect to a larger internet network. Since the number of Internet of Things (IoT) gadgets has increased in recent times, the demand for Helium (HNT) is also expected to increase.

However, the price of Helium (HNT) has declined by 19% in the last week. On the monthly chart, Helium (HNT) has plummeted by 18%. Currently, Helium (HNT) is being traded at $1.35, which is 97.55% below its all-time high of $55.22.

>>BUY COLT TOKENS NOW<<

The Binance (BNB) arm, Binance.US, has received the courts approval to buy bankrupt crypto lender, Voyager. However, US Justice Dept. has appealed the decision that favors the Binance (BNB) expansion in the country.

Recently, a report by CryptoCompare revealed that the Binance (BNB) market share has continuously been increasing since the collapse of the FTX Exchange. At present, Binance (BNB) is ranked 4th by market capitalization. However, the price movement of Binance (BNB) has been downward for the past many weeks.

Consequently, the price of Binance (BNB) has fallen by 11% in the last 30 days. Currently, Binance (BNB) trades at $316.85, which is 54.14% below its all-time high of $690.93.

Collateral Network (COLT) is a decentralized crowdlending platform where real-world art and other tangible assets can be used as collateral to obtain a loan. This cross-chain network follows a hybrid infrastructure model that bridges the gap created by traditional financial institutions, including pawnbrokers.

Banks do not provide loans against non-traditional assets like artwork, wines, vintage cars and others. Although pawnbrokers provide funds in lieu of such assets, they have an outdated business structure and a bad reputation. Moreover, negotiating the value of your physical assets with pawnbrokers is embarrassing.

Collateral Network (COLT) brings the professionalism of banks and flexibility of pawnbrokers under one roof. Collateral Network (COLT) grants anyone loans by minting fractionalised NFTs against real-world physical assets once they have been authenticated. The network makes these NFTs available to lenders for a small amount at a fixed interest rate and time scale. These NFTs enable lenders to assist in raising funds for loans for borrowers at the required amount, with the intention of the loan being paid back by the borrowers once raised fully. The success of this will result in the asset being returned to the borrower and the NFT being burned, or if unsuccessful, the asset will be sold at auction which will be open to all COLT holders at a lower market price.

The more Collateral Network (COLT) tokens borrowers hold, the lesser their EMIs for loans will be. So, if you join Collateral Network (COLT) in the early phase, you can gain more benefits. The presale value of COLT tokens is $0.01. A 50% bonus offer is also available in the Beta stage. The market value of Collateral Network (COLT) is expected to surge to $0.35 in the upcoming months. Only presale COLT holders will get access to the VIP members club, and a discount on transaction fees.

Find out more about the Collateral Network presale here:

Website: https://www.collateralnetwork.io/Presale: https://app.collateralnetwork.io/registerTelegram: https://t.me/collateralnwkTwitter: https://twitter.com/Collateralnwk

Disclaimer:This is a paid release. The statements, views and opinions expressed in this column are solely those of the content provider and do not necessarily represent those of Bitcoinist. Bitcoinist does not guarantee the accuracy or timeliness of information available in such content. Do your research and invest at your own risk.

Go here to read the rest:

Price Predictions For Helium (HNT) and Binance (BNB) Is Reasonable, While Collateral Network (COLT) 3500% - Bitcoinist

Read More..

Japan targets Binance, 4 other crypto exchanges as Bittrex bows out … – Kitco NEWS

(Kitco News)-The global crypto clampdown continues to unfold as Japan has become the latest country to take action against its growing cryptocurrency industry by issuing warning letters to several foreign crypto exchanges informing them that they have been operating in the country without the proper registration.

On Friday, Japans financial regulator, the Financial Service Agency (FSA), sent letters to multiple exchanges including Binance, MEXC Global, Bybit, Bitforex and Bitget warning them that their operations are violating the nations fund settlement regulations by facilitating the exchange of crypto assets without first completing the registration process.

The regulator also said the five exchanges are not the only firms that are non-compliant, and their action does not necessarily indicate the current state of unregistered business.

The regulations in question were first introduced in 2020 and require all cryptocurrency exchanges to register with the agency and obtain a license in order to operate in Japan.

Thus far, Japan has not been as heavy-handed as some other countries when it comes to regulating its crypto industry, but that appears to be changing amid a global push by governments around the world to limit illicit cryptocurrency use and establish a clear regulatory framework for individuals and companies.

For example, the FSA issued its first formal warning letter to Binance and Bybit for operating without the necessary permissions back in 2021, but the exchanges have yet to see any serious consequences for continuing to operate.

The warning from Japan is just the latest in a growing list of Binances woes after authorities in the U.S. sued the exchange and its founder Changpeng CZ Zhao for violating U.S. securities laws.

All exchanges that do not comply with the FSAs regulations and continue to operate without the proper registrations face fines and legal action. This warning highlights the steadily increasing regulator scrutiny that crypto exchanges and companies face in Japan and around the world.

Concerns of illegal activities such as money laundering, fraud, tax evasion and market manipulation have risen amid a growing global banking crisis, and regulators are working to plug any capital outflow loopholes and put a halt to other illicit activities.

While many exchanges have chosen to work with regulators in an effort to continue providing services in certain jurisdictions, others have opted to close up shop and focus on more welcoming governments. Both Coinbase and Kraken, two of the largest exchanges in the U.S., have closed their operations in Japan due to challenging market conditions and the need to cut expenses and refocus their efforts.

On Friday, the cryptocurrency exchange Bittrex announced that it would be exiting the U.S. market after nine years of operation as its just not economically viable for [them] to continue to operate in the current U.S. regulatory and economic environment.

After discussing the nine-year journey, Richie Lai, the CEO and co-founder of Bittrex, said Regulatory requirements are often unclear and enforced without appropriate discussion or input, resulting in an uneven competitive landscape Operating in the U.S. is no longer feasible and Bill, Rami and I will focus on helping Bittrex Global succeed outside the U.S.

The withdrawal of Bittrex from the U.S. market follows the countrys crackdown on crypto banking providers in the wake of the collapse of Silvergate Bank, Silicon Valley Bank and Signature Bank.

Disclaimer: The views expressed in this article are those of the author and may not reflect those of Kitco Metals Inc. The author has made every effort to ensure accuracy of information provided; however, neither Kitco Metals Inc. nor the author can guarantee such accuracy. This article is strictly for informational purposes only. It is not a solicitation to make any exchange in commodities, securities or other financial instruments. Kitco Metals Inc. and the author of this article do not accept culpability for losses and/ or damages arising from the use of this publication.

Read the rest here:

Japan targets Binance, 4 other crypto exchanges as Bittrex bows out ... - Kitco NEWS

Read More..

Binance Collaborates With Showmax To Incentivize Crypto Adoption … – Peace FM Online

Binance, the worlds leading blockchain ecosystem and cryptocurrency infrastructure provider, has announced its collaboration with Showmax, Africa's original video streaming service to further promote crypto adoption on the continent, by offering the first 500 new enrollees a one-month subscription on the SVOD platform for Easter.

To qualify for this offer, users must sign up, complete their KYC verification and make a transaction worth at least US$10 or its equivalent on either Binance P2P or Binance Fiat. Users are then to confirm their participation by filling out this form.

Speaking on the campaign, the Marketing Lead, Binance West Africa, Emmanuel Ebanehita, expressed immense satisfaction, citing that the collaboration could not have come at a better time, He said:

"We're thrilled to be collaborating with Showmax to provide an incredible opportunity for our new users to be active participants in Web3. This promotion comes at a time when many Africans are eagerly embracing the underlying technology behind crypto. It is also a testament to our commitment to providing accessible and convenient platforms for individuals to engage in the digital economy.

The promotion is available to users in Nigeria and winners will be announced within seven days after the promotion ends on Binance Africas Twitter, as well as the Binance Nigeria and the Binance West Africa Telegram groups. This will be followed by an email outreach to the winners within two weeks after the campaign ends.

Also speaking about the alliance, General Manager, Showmax Nigeria, Opeoluwa Filani said: "We are excited about our partnership with Binance which will see more people have access to the world-class entertainment content on the Showmax service. This partnership demonstrates our commitment to make premium content more readily available and accessible.

Binance Africa is dedicated to fostering meaningful connections with its target audiences by implementing innovative measures that prioritize crypto education and adoption initiatives. The partnership with Showmax is an exciting example of how the company is achieving this goal, leveraging creative and forward-thinking solutions to engage with users in new and exciting ways.

.

Source: Peacefmonline.com

Featured Video

Originally posted here:

Binance Collaborates With Showmax To Incentivize Crypto Adoption ... - Peace FM Online

Read More..

US regulator takes action to ensure internet security in connected … – Innovation Origins

The FDA introduced a new cybersecurity policy for medical devices on 29th March 2023, as part of the Federal Food, Drug, and Cosmetic Act. Medical devices defined as cyber devices must now comply with specific cybersecurity requirements, including post-market monitoring, addressing vulnerabilities, and providing updates and patches. The Refuse to Accept policy empowers the FDA to reject submissions that fail to meet these standards. The policy comes in response to the rising number of cyberattacks targeting medical devices and aims to ensure patient safety, device performance, and cybersecurity from the initial stages of development. It does not apply retroactively for currently deployed insecure devices and legacy technologies.

Medical devices are increasingly connected to the internet, hospital networks, and other devices to improve healthcare and enable healthcare providers to treat patients more effectively. However, these features also increase potential cybersecurity risks. Medical devices, like other computer systems, can be vulnerable to security breaches, which could impact the safety and effectiveness of the device. The healthcare environment is complex, and manufacturers, hospitals, and facilities must work together to manage cybersecurity risks.

Manufacturers must design and release updates, patches, provide a software bill of materials, and submit a plan for identifying and addressing post-market cybersecurity vulnerabilities. These rules affect devices with software and internet connections, such as insulin pumps, blood sugar monitors, and certain pacemakers. The new focus on device manufacturers aligns with the governments focus on accountability for software makers and industry for product defects.

Tiffany Gallagher, PwC Health Industries Risk & Regulatory Leader, said to The Record, As innovations in healthcare technology continue to grow, these regulations will help ensure that cybersecurity is baked into devices from the very beginning and continues to be a top-of-mind priority beyond the initial implementation.

The medical industry has been increasingly targeted by cyberattacks, with a significant spike in 2022. The FBI warned in September 2022 of vulnerabilities in medical devices, with over 50% of connected devices having critical vulnerabilities. The new regulations aim to address these vulnerabilities and protect patients safety and privacy.

Chris Warner, Operational Technology Cybersecurity Expert at GuidePoint Security, said, We are seeing a Shift Left strategy to push the responsibilities from the operators of the device to the manufacturers of IoMT [Internet of Medical Things] equipment and devices. The FDAs new policy is a crucial step towards a more secure healthcare ecosystem, benefiting patients, healthcare providers, and manufacturers alike.

While the new policy marks a significant milestone in medical device cybersecurity, it is essential to continue monitoring and addressing cybersecurity risks in the healthcare industry. Collaboration between manufacturers, healthcare providers, and regulators will be crucial to ensure the safety and effectiveness of medical devices in an increasingly connected world.

Read the original here:
US regulator takes action to ensure internet security in connected ... - Innovation Origins

Read More..

FDA Protects Medical Devices Against Cyber-Threats With New … – Infosecurity Magazine

The US Food and Drug Administration (FDA) staff has published new guidelines to strengthen the cybersecurity levels of internet-connected products used by hospitals and healthcare providers.

According to a guidance document published earlier today, applicants seeking approval for new medical devices must submit a plan designed to monitor, identify and address possible cybersecurity issues associated with them.

Further, applicants will also need to outline a process to provide reasonable assurance that the device in question is protected with regular security updates and patches, including for critical situations.

Finally, they will be expected to provide the FDA with a software bill of materials, which should include commercial, open-source and off-the-shelf software components.

The FDA guidelinesprovide information regarding the definition of cyber device, intended as a device that includes software validated, installedor authorized by the sponsor as a device or in a device, that can be connected to the internet and contains technological characteristics that could be vulnerable to cybersecurity threats.

The guidance document is part of the $1.7 trillion federal omnibus spending bill President Joe Biden signed in December 2022. The legislation also requires the FDA to update its medical device cybersecurity guidance at least every two years.

Read more on Bidens cybersecurity efforts here: White House Launches National Cybersecurity Strategy

The new FDA guidelines come a couple of months after security experts at Sonar found three vulnerabilities in OpenEMR, an open-source software for electronic health records and medical practice management.

More recently, the infamous Russia-affiliated hacktivist group known as KillNet was observed targeting healthcare applications hosted using the Microsoft Azure infrastructure.

Given the considerable efforts threat actors put into targeting the healthcare industry, the FDAs new requirements could save lives. This is particularly true when considering a September 2022 report by Proofpoints Ponemon Institute that linked increased mortality rates to cyber-attacks targeting healthcare organizations.

Continue reading here:
FDA Protects Medical Devices Against Cyber-Threats With New ... - Infosecurity Magazine

Read More..

Government shines a light on UK cyber operations – POLITICO Europe

Conrad Prince is a Distinguished Fellow and senior cyber adviser at RUSI. He is the former director general for operations and deputy head of the U.K. governments signals intelligence and cyber security agency, GCHQ.

The last decade has seen a notable increase in openness and engagement from the United Kingdoms intelligence and security agencies especially in contrast to the days, not all that long ago, when the government didnt even officially admit to their existence. But today, we have speeches and media appearances from agency heads, extensive websites and even a presence on social media.

Now, that process has taken a significant step further with a publication by one of the newest additions to this secret world the National Cyber Force (NCF). The NCF has released a document setting out the operating principles behind the U.K.s use of what is sometimes called offensive cyber. That is, operations in cyberspace to disrupt an adversarys ability to use the Internet and digital technology to further their ends.

The guide is the first of its kind, giving us unprecedented insight into the U.K.s thinking on cyber operations.

The NCF was created in 2020 from elements of the Government Communications Headquarters its cyber intelligence and security agency the Ministry of Defence and the Secret Intelligence Service. And although its creation represents a significant increase in focus on this area, the U.K. isnt new to the world of offensive cyber operations by the governments own account, its been carrying them out for over 20 years. But up until now, very little has been said in public about the U.K.s approach to this capability.

Public understanding of cyber operations is sometimes hampered by some of the overblown language used to describe it. Terms like cyber 9/11 or cyber-Pearl Harbor reinforce the seriously misleading notion that a cyberattack is something analogous to a nuclear one, and is mainly about widespread and catastrophic destruction to swathes of critical infrastructure.

But nuclear is about the worst possible analogy for cyber. Cyber operations are much closer to covert action, to clandestine operations below the threshold of a shooting war, designed to achieve a particular effect in a targeted way.

The NCFs new guide acknowledges that cyber operations are unlikely to be strategically decisive on their own. They can, however, achieve a valuable targeted effect such as preventing a terrorist group communicating at a critical moment, or disrupting an adversarys access to situational awareness information which can be particularly effective when combined with other actions in the physical world.

As our adversaries whether terrorists, criminals or hostile states increasingly depend on digital technology to achieve their ends, having an ability to disrupt this dependency is important. And, according to the guide, the NCF is carrying out such operations on a daily basis.

Among the details revealed, perhaps most striking are those into the thought process behind the U.K.s cyber operations, in particular, what is termed the doctrine of cognitive effect. This approach focuses on how cyber operations that limit or affect the information available to an adversary, and undermine their confidence in their technology and the information it provides, can weaken their ability to plan and conduct activities with confidence. It shows an intent to use cyber operations for a more subtle and pervasive effect, beyond simple tactical short-term disruption of technology.

This reveals some innovative thinking but evidencing the impact of these operations remains difficult. The NCF is clear we shouldnt expect to see details of specific operations, and there are clearly difficult security issues involved in being more open maintaining ambiguity about operations is also a core part of the U.K. approach. But in the spirit of transparency, it would be good if the NCF could find some ways to give the public a sense of its effectiveness.

Theres also a question as to whether publishing this statement will contribute to deterrence. Much has been written on cyber deterrence, and much of it suffers from false analogies to the nuclear environment. But in practice, theres little evidence that knowledge of a countrys cyber capabilities plays a material part in deterring action, whether in the virtual or physical world.

A critical part of the guide is about making the case that it is possible to carry out cyber operations in a responsible and ethical way.

The U.K. government has committed itself to the principle of a free, open, peaceful and secure Internet, and has repeatedly emphasized the need for states to act responsibly in cyberspace. But how does that sit with the government at the same time investing apparently significant resources in an organization dedicated to launching cyberattacks?

The starting point is that our adversaries are using the Internet and digital technology to do us harm, and it seems perverse to deny ourselves the possibility of making that harder for them. So, the key questions are how to do so in a legal, ethical and properly managed way. And the guide sets out a strong case for the U.K. position.

The NCF has set out three principles for its operations that they be accountable, precise and calibrated. It states that the U.K. operates under a robust legal framework of domestic and international law with independent oversight, including from judges and parliament, via its Intelligence and Security Committee. And the guide describes how the NCFs operations are carefully designed to be targeted with precision, using capabilities that are controllable, predictable and subject to extensive clearance procedures.

Some of this must inevitably be taken on trust, of course, and not everyone may be satisfied. But as an approach, its in stark contrast to the behavior exhibited by countries like Russia and Iran, which generally lack legitimacy and are disproportionate and indiscriminate, frequently impacting those who werent the intended target.

As such, this guide is a valuable step toward starting to put some much-needed flesh on the bones of what goes into making responsible cyber operations.

Not so long ago, it would have been unthinkable for the U.K. to have published a document of this sort. That they have done so is to be greatly welcomed as is the NCF explicitly recognizing it needs a license to operate from the public, and that achieving this requires more openness and engagement.

The NCFs guide is a significant step in providing more transparency about U.K. cyber operations. It does, however, need to be the start of a process, not the conclusion of one. There is much to be gained from shining more light on this complex and often misunderstood field.

View post:
Government shines a light on UK cyber operations - POLITICO Europe

Read More..

Five Men Sentenced in Conspiracy to Distribute Child Sexual Abuse … – Department of Justice

MIAMI Anthony Wayne Santiago, 28, of Novi, Mich.; Jacob Dominic VanDyke, 25, of Muskegon, Mich.; Johnathan Scott Fleak, 32, of Pryor, Okla.; Aaron Ray Iuliano, 27, of Ravenna, Ohio; and Michael Paul Gianfrancesco, 39, of Livingston, Tenn., all have pled guilty and been sentenced to conspiracy to distribute child sexual abuse material and distribution of child sexual abuse material (CSAM) of children under the age of 13 years.

From September to October 2021, the five defendants entered and participated in a private chat room within a social networking application. Each had to distribute CSAM of children under the age of 13 to enter the chat room. These defendants all distributed and solicited CSAM and discussed the sexual abuse of children among more than 50 other individuals. The children in the images and videos were as young as 4 years old.

Today, Judge Donald M. Middlebrooks sentenced the last of three defendants charged in the conspiracy. Michael Paul Gianfrancesco, who had previously distributed CSAM through multiple other social networking accounts, was sentenced to 17.5 years in prison. Aaron Ray Iuliano was sentenced to 15 years in prison. Jacob Dominic Vandyke to 13.3 years in prison. Previously, Judge Middlebrooks sentenced Johnathan Scott Fleak, who distributed CSAM through another online message boards, to 15 years in prison. Anthony Wayne Santiago, a registered sex offender who was on a GPS monitor at the time of his arrest, had been sentenced to 30 years in prison.

U.S. Attorney Markenzy Lapointe for the Southern District of Florida, acting Special Agent in Charge Michael E. Buckley of Homeland Security Investigations (HSI), Miami, and Sheriff Ric Bradshaw of the Palm Beach County Sheriffs Office made the announcement.

HSI West Palm Beach Office and the Palm Beach County Sheriffs Office investigated the case as part of a joint effort of the South Florida Internet Crimes Against Children Task Force. Assistant U.S. Attorneys Gregory Schiller and Brian Ralston prosecuted it.

This case was brought as part of Project Safe Childhood (PSC), a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by United States Attorneys Offices and the Criminal Divisions Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend and prosecute individuals, who sexually exploit children, and to identify and rescue victims. For more information about the Project Safe Childhood initiative and for information regarding Internet safety, please visit http://www.justice.gov/psc.

Related court documents and information may be found on the website of the District Court for the Southern District of Florida at http://www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov under case number 22-cr-80127.

###

Excerpt from:
Five Men Sentenced in Conspiracy to Distribute Child Sexual Abuse ... - Department of Justice

Read More..

Legend of the Chinese ‘Cyber Prometheus’ of China’s Great Firewall – JAPAN Forward

Several days ago, an urgent call for help in a WeChat group in China solved a mystery that has puzzled many Chinese netizens for nearly two years. After the WeChat exchange, we now know what happened to an anonymous blogger who is regarded as the Chinese "Cyber Prometheus."

He is the godfather of many Chinese netizens who learned from him how to "jump over the Great Firewall."

We also finally know the blogger's name.

The urgent WeChat call for help was sent to a neighborhood chat group in China with 37 members. A woman in the chat identified herself as Bei from Unit 701. Her husband is Ruan Xiaohuan, who blogs under the name "Program-think" ().

Ruan Xiaohuan was taken away by the Chinese police on May 10, 2021, and was sentenced on February 10, 2023. Bei is helping Ruan appeal his sentence.

On February 19, Bei was blocked at her neighborhood gate. The police then forced Bei to listen to a "talk" for more than two hours. Obviously, the police didn't want Bei to hire lawyers for her husband. The police "talk" was meant to intimidate Ruan Xiaohuan's wife.

After the police stopped her and berated her, Bei was afraid that she could also be arrested. She asked her neighbors in the chat group to call her parents or her lawyers should something happen to her.

A typical case of Communist brutality, something that happens in the People's Republic of China (PRC) every day.

But Bei added something that makes her case stand out. She told her fellow chat members that her husband was the Chief Engineer of the information security system for the 2008 Beijing Olympics and had contributed a lot to this country. "He is patriotic," she said.

She also posted her lawyers' telephone numbers for her neighbors to call.A picture of Ruan Xiaohuan, "Program-think" taken during an interview. ( via Jennifer Zeng)

When the screenshot of Bei's chats was circulated on the internet, many Chinese people both inside and outside of China were extremely shocked. Bei had, inadvertently perhaps, revealed two big puzzle pieces at the same time: What happened to "Program-think"? And what was his real name?

"Program-think" was arrested and sentenced. His name is Ruan Xiaohuan.

There's more. People were equally shocked that "Program-think" was also the Chief Engineer of the information security system for the 2008 Beijing Olympics!

In 2009, "Program-think" started a blog that eventually became very influential. "Program-think" posted many articles about online safety, and about how to bypass the Chinese Communist Party's (CCP) "Great Firewall" of online censorship. He also published a lot of other articles on "improving thinking ability," "popularizing political knowledge," and "revealing the true face of the Party-state."

He also provided the public with many e-books on politics, psychology, history, economics, management, sociology, literature, philosophy, science popularization, and military affairs.

Via his blog and other platforms, "Program-think" taught Chinese people how to safely jump over the CCP's Great Firewall without being caught. His deep thoughts and marvelous online techniques inspired many people, and many regarded him as a mentor, an enlightener.

For many, he was the ideological mentor of most of the netizens who know how to climb over the Great Firewall today. Some even say he was as dear as a father to them, and a true hero.

"Program-think" was gaining a tremendous following, and great respect, among the Chinese people. But he suddenly stopped updating his blog on May 9, 2021.

"Program-think" had previously said that if he was silent for more than two weeks, then he had either died or been caught by the People's Republic of China (PRC) authorities.

So, people knew something bad must have happened to him after he fell silent. But his online security awareness was so strong, his skills were so good, and he kept teaching others how to go over the Great Firewall without getting caught or discovered. So, it was hard for people to imagine how he could have gotten into trouble.

And yet, the fact was that "Program-think" had disappeared. Nobody knew where he was, what happened to him, or his true identity. But many Chinese netizens still talked about him from time to time. Many people missed him too.

Then, on March 21, 2023, a month or so after her "talk" from the Chinese police, the call for help from his wife Bei suddenly appeared on WeChat.

When people learned that "Program-think" was also the chief engineer of the information security system for the 2008 Beijing Olympics, they thought: "No wonder he knew so much about online safety. No wonder he knew how to jump over the Great Firewall."

The CCP had been thwarted by someone on the inside. "Program-think" was a double agent, an online freedom fighter for the Chinese people.

After some digging, one netizen in China later revealed how "Program-think" got caught.

More than ten years ago, Ruan Xiaohuan had registered an account at a Chinese online database and social networking service called Douban. He used the same name for that as his later blog handle, "Program-think."

Ruan later deleted that Douban account. However, Douban didn't delete his account information. They kept it, and this became the final clue for the CCP to track Ruan down.

Although he had been very cautious and had very advanced internet security techniques, Ruan might have forgotten about the old Douban account that he hadn't used much.

However, there are other people who suggest that Ruan was caught because western companies cooperated with the CCP, using big data technology to help the CCP find their quarry. Right now we don't know for sure.

It is now confirmed that Ruan Xiaohuan "Program-think" is currently detained in the Yangpu District Detention Center in Shanghai. He was sentenced to seven years in prison by the Second Intermediate People's Court of Shanghai on Feb 10, 2023.

Ruan's court-appointed "lawyer" did not disclose any details of the case to his family until the trial.

After the first trial, Ruan filed an appeal. His wife, Bei, hired two lawyers in Beijing, Mo Shaoping and Shang Baojun, to defend him.

However, his wife was then forcibly interrogated by the police outside her apartment building that day in February of 2023. She couldn't reach the lawyers she had hired to represent her husband. Also, Ruan's case has been transferred to the Shanghai High People's Court. The court again "appointed" two "official lawyers" for Ruan. This was done so that Ruan could not hire his own counsel.

According to his "criminal judgment," Ruan Xiaohuan, aka "Program-think," was basically charged with "Subversion of State Power."

His judgment states:

From June 2009 to May 2021, the defendant Ruan Xiaohuan, due to his long-standing dissatisfaction with China's political system and social governance model, wrote over a hundred fabricated and defamatory inciting articles using his personal computer at his place of residence. The content involved attacking and smearing China's existing political system, inciting subversion of state power, and attempting to overthrow the socialist system, and was published through overseas online platforms, resulting in a large number of netizens viewing, commenting, forwarding, imitating, and other adverse consequences.

This statement, for me, is no doubt an official confirmation of Ruan's online influence.

The judgment also states that the police seized and confiscated quite a number of computers, cellphones, hard drives, USB drives, and so forth from Ruan. One Chinese netizen commented that he hopes the police keep these items so that they can become exhibits in future Chinese museums after the fall of the CCP.

In the past few days, many Chinese people have been circulating the latest news about Ruan Xiaohuan, "Program-think."

Ruan was well-known among internet-savvy Chinese people and considered a legendary figure. So, it was surprising and saddening to learn that he taught people how to bypass censorship and protect online anonymity, only to be caught due to an oversight in his own account information, or big tech's cooperation with the CCP.

For me, however, Ruan's arrest and legacy should be highlighted for the following three reasons:

First, he was the Chief Engineer of the information security system for the 2008 Beijing Olympics. His situation deserves attention from the international community, from anyone who attended or watched that great event.

Second, even someone like Ruan, who is very knowledgeable about network security technology, can be arrested. This shows how much effort the CCP has put into internet control.

It was said it took the CCP ten years of painstaking effort to catch "Program-think."

Third, the fact that Ruan was once entrusted by the CCP with the important task of ensuring information security for the 2008 Beijing Olympics indicates that he still had the trust of the Party in 2008. If someone like him can become an "enemy" of the CCP just one year later, then Xi Jinping and other high-ranking Communist officials should indeed have nightmares every day.

How many such "enemies" are hidden within the CCP? How long can rule maintained by high pressure last?

According to those who know him, Ruan Xiaohuan actually had the opportunity to go abroad. He could have done so, escaping from the inhuman system he fought against.

However, he chose to stay in China to help more Chinese people learn how to "climb over the Great Firewall" and master safe internet technology while spreading ideas of freedom and democracy.

During an early interview with him by a Chinese media outlet, "Program-think" said he was someone who was passionate about new technology, and only new technology could make him passionate.

He also said later, as the anonymous "Program-think," that:

I believe it is exactly this kind of thinking and sense of responsibility that made him stay in China at the risk of his life to do enlightenment work on cybersecurity. It is a reminder that freedom from China will come from the Chinese people standing up to the Chinese Communist Party.

But the help of those outside of China is also indispensable. Let's hope that more people will know Ruan Xiaohuan's story and call for his release so that he can regain his freedom as soon as possible.

Author: Jennifer Zeng

Read the original here:
Legend of the Chinese 'Cyber Prometheus' of China's Great Firewall - JAPAN Forward

Read More..