Somewhat more than 1,000 people are friends on the Hebrew-language Facebook page Nikmat Hayeudim (“Revenge of the Jews”). They receive daily photo updates on attacks against Palestinian property and people and on leftists. “What a picture, a real pleasure,” one of them wrote under a photo showing a person severely beaten around the head, blood running down his face, lying on a hospital bed. “That’s what should be done to all the Arabs,” another post added, and then continued with a coarse stream of invective including cursing Mohammad.
Another Facebook page, called “We’re all for death to terrorists,” has more than 60,000 followers. Next to a photo at a demonstration at the West Bank village of Nabi Saleh is the caption: “Female terrorist leftists clash with IDF and Border Police forces.” One post, which can be said to be typical, says: “May their name and memory be wiped out. Let them die, those leftists…kill them. They’re worse than Arabs!” Under the report of a rape in Tel Aviv, one member of the group wrote: “I swear an oath that tomorrow I’m going to go through the central bus station, call an Eritrean over to the car, close the window on his head and drag him all through south Tel Aviv.”
Journalist Barrett Brown Wins a Victory in His Case as Government Dismisses Charges Related to Link-Sharing
Journalist Barrett Brown has won a huge victory. The government has moved to dismiss all of the counts related to his sharing of a link to a file from the private intelligence firm, Stratfor, that was already publicly available to others.
The government dismissed one count of trafficking in “stolen authentication features” count and ten counts of “aggravated identity theft” for transferring and possessing without lawful authority the means of identification for multiple individuals. It had claimed that by sharing the link Card Verification Values (CVVs) of credit cards, the card holders’ names, their user names for online account access and address, phone numbers and email address information had been exposed.
From the government’s dismissal motion:
…The United States Attorney for the Northern District of Texas, by and through the undersigned Assistant United States Attorney, files this Motion to Dismiss Count One and Counts Three through Twelve in the original Indictment and in the Superseding Indictment in the above entitled and numbered cause…
Facebook, in a deal first reported by TechCrunch and CNBC, is buying drone maker Titan Aerospace for $60 million. It may not be anywhere close to the $19 billion Mark Zuckerberg spent on messaging service WhatsApp, but it could be another important piece in Facebook’s mission to bring the Internet (and therefore Facebook) to the developing world.
Facebook follows Amazon and Google into the robotics fray with this purchase. Amazon, who bought Kiva Systems for $775 million in 2012 to put robots in its distribution centers, debuted its “Prime Air” service to deliver products by drone last December. Google bought robotics firm Boston Dynamics around the same time and has been refining its self-driving car technology.
Labour wants new powers for police and security services to crack down on cyber crimes like child pornography and terrorism. However, shadow Home Secretary Yvette Cooper is warning technological developments have sparked a wave of new types of crime and a 30% hike in recorded online fraud is just the “tip of the iceberg”.
But fears about abuse of information in the wake of leaks by ex-US security contractor Edward Snowden, which revealed widespread spying by government listening post GCHQ, means new safeguards are needed to protect privacy. Controversial plans by Home Secretary Theresa May to enable the police and security services to track emails and other online communications under a “snooper’s charter” were blocked by the Liberal Democrats.
Corporations and governments are using information about us in a new—and newly insidious—way. Employing massive data files, much of the information taken from the Internet, they profile us, predict our good or bad character, credit worthiness, behavior, tastes, and spending habits—and take actions accordingly. As a result, millions of Americans are now virtually incarcerated in algorithmic prisons.
Some can no longer get loans or cash checks. Others are being offered only usurious credit-card interest rates. Many have trouble finding employment because of their Internet profiles. Others may have trouble purchasing property, life, and automobile insurance because of algorithmic predictions. Algorithms may select some people for government audits, while leaving others to find themselves undergoing gratuitous and degrading airport screening.
An estimated 500 Americans have their names on no-fly lists. Thousands more are targeted for enhanced screening by the Automated Targeting System algorithm used by the Transportation Security Administration. By using data including “tax identification number, past travel itineraries, property records, physical characteristics, and law enforcement or intelligence information” the algorithm is expected to predict how likely a passenger is to be dangerous.
Algorithms also constrain our lives in virtual space. They determine what products we will be exposed to. They analyze our interests and play an active role in selecting the things we see when we go to a particular website.. Eli Pariser, argues in The Filter Bubble, “You click on a link, which signals your interest in something, which means you are more likely to see articles about that topic” and then “you become trapped in a loop.” The danger being that you emerge with a very distorted view of the world.
Peeping Webcam? With NSA Help, British Spy Agency Intercepted Millions of Yahoo Chat Images: Interview with James Ball
‘The latest top-secret documents leaked by Edward Snowden reveal the National Security Agency and its British counterpart, the the Government Communications Headquarters (GCHQ) may have peered into the lives of millions of internet users who were not suspected of wrongdoing. The surveillance program codenamed “Optic Nerve” compiled still images of Yahoo webcam chats in bulk and stored them in the GCHQ’s databases with help from the NSA. In one six-month period in 2008 alone, the agency reportedly amassed webcam images from more than 1.8 million Yahoo user accounts worldwide. According to the documents, between 3 and 11 percent of the Yahoo webcam images contained what the GCHQ called “undesirable nudity.” The program was reportedly also used for experiments in “automated facial recognition” as well as to monitor terrorism suspects.’ (Democracy Now!)
Giving evidence to MPs before Christmas, Sir Iain Lobban, the director of GCHQ, used the analogy favoured by the security agencies to explain what they do. He likened the gathering of intelligence to building a haystack and said he was “very well aware that within that haystack there is going to be plenty of innocent communications from innocent people”. The latest revelations from the Edward Snowden files show this haystack also includes webcam images of millions of internet users, some of whom are involved in deeply adult forms of in flagrante ”communication”.
Surveillance of this kind puts a new spin on William Hague’s defence of GCHQ‘s snooping programmes: “If you have nothing to hide, you have nothing to fear.” In some ways, the Guardian story about GCHQ’s Optic Nerve operation brilliantly illustrates the tangle that ministers and the intelligence services have got themselves into. And it poses a big question mark over the repeated assertion that mass surveillance is proportionate and necessary. [...] GCHQ insists the activity is legal. And doubtless it is, if you believe that the Regulation of Investigatory Powers Act, which was passed in 2000, was drafted with this kind of surveillance in mind.
There are new LED lights greeting passengers at Newark Liberty International Airport’s Terminal B but they do more than illuminate; they also are part of a security system that is watching you before you even get to the security checkpoint. The lights are fitted with computer chips, cameras, sensors and wi-fi antennas. They collect data that can help detect suspicious activity or aid in police investigations.
Currently, the lights are only near the ticketing counters of the one terminal but the Port Authority of New York and New Jersey, which operates the airport, is considering expanding the pilot program to other terminals. Advocates say the lighting systems can be used for a variety of useful applications. But others say the collection of more and more data raises privacy concerns.
- Forget WiFi, It’s LiFi: Internet Through Lightbulbs
- LVX System: Ceiling Lights Send Coded Internet Data
- Intellistreets: Streetlights That Watch and Listen
- Google Files ‘Ambient Background’ Spy Tech Patent
- Google Android Baked Into Rice Cookers in Move Past Phone
- CIA Chief: We’ll Spy on You Through Your Dishwasher
- X-Ray Scanning Vans Hit Streets, Raising Privacy Concerns
- Could X-ray scanners work on the street?
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.
Britain’s surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.
In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of “a whole new level of violation of our users’ privacy”.
Last Spring, wireless carriers and the government jointly announced that they’d be collaborating on building a new nationwide database to track stolen phones (specifically the IMEI number). The goal was to reduce the time that stolen phones remain useful, thereby drying up the market for stolen phones and reducing the ability of criminals to use the devices to dodge surveillance. The move came after AT&T was sued for not doing enough to thwart cellphone theft, the lawsuit alleging AT&T was intentionally lax on anti-theft practices because stolen phone re-activations were too profitable. After regulator pressure, AT&T launched new stolen device blocking tools and re-vamped their website with security tips.
Law enforcement has complained that none of these efforts have done much to stop cell theft and resale, in large part because phones stolen here are simply taken overseas and used there. This in turn prompted a push for new “kill switch” legislation in both New York and most recently San Francisco, in addition to a new bill proposed by Senator Amy Klobuchar we discussed last month. While perhaps well-intentioned, all of the bills have one thing in common: they forget that if you can kill your phone remotely, so then can governments, hackers, and anybody else.
“All governments lie, but disaster lies in wait for countries whose officials smoke the same hashish they give out.” ~ I.F. Stone
As Comcast pushes regulators to approve its just-announced deal to buy out Time Warner Cable, it’ll make one essential point: the acquisition won’t visibly change the competitive landscape for TV and internet customers. Nice try. Regulators and competition authorities are supposed to consider the public interest when looking at such deals. In no way does the public interest benefit from this one.
We’re talking immense scale with this deal. Comcast – which completed its takeover of NBC Universal a year ago in a deal that never should have been allowed in the first place – is the nation’s biggest cable company, with about 21m subscribers. Time Warner Cable, the second largest, has 11m. According to the Wall Street Journal, the combined company will sell off what amounts to 3m of those subscribers in order to keep its overall market share slightly below a mythical threshold that raises worries about too much market power.
The public interest is not served when a company that provides one-third of all cable TV service in America replaces two smaller ones (which were plenty big in the first place). It is not served when that company already owns one of the four major broadcast networks, a major movie studio, several cable channels (including CNBC, which will assuredly be boosterish) and other properties.
And the public interest is distinctly not served when what’s already the largest and most important internet service provider becomes vastly more so. The cable companies, with their inherently better bandwidth than phone company DSL lines, are becoming natural monopolies for wired-line internet access except in the few places where other providers have installed fiber lines. As Om Malik, founder of the GigaOm technology news company, put it in a blog post, cable consolidation in this century “is all about broadband”, which has high profit margins and doesn’t have to deal with Hollywood.
The recent anti-NSA, anti-surveillance protests were the latest manifestation of a burgeoning movement for freedom from mass surveillance and the liberation of information. It is this new resistance movement, comprised of myriad individuals and organizations, which is perhaps the greatest measure of the legacy of Aaron Swartz.
By the time of his death a little more than a year ago, Aaron Swartz had already achieved more in his 26 years than most activists achieve in a lifetime. He was a technological innovator, contributing his computer expertise to develop open platforms such as RSS, Creative Commons, and Reddit, while working to liberate information from closed databases like JSTOR (the online digital library of scholarly and scientific research).
However, he also took the fight into the public arena, articulating a language of freedom and social responsibility, tirelessly working to raise public consciousness of the all-encompassing, draconian system of control erected around us all.
A simple examination of Swartz’s Guerilla Open Access Manifesto reveals many of his core beliefs. In it, Swartz wrote, “Information is power. But like all power, there are those who want to keep it for themselves. The world’s entire scientific and cultural heritage, published over centuries in books and journals, is increasingly being digitized and locked up by a handful of private corporations…We need to take information, wherever it is stored, make our copies and share them with the world…With enough of us, around the world, we’ll not just send a strong message opposing the privatization of knowledge — we’ll make it a thing of the past. Will you join us?”
Swartz was articulating the idea that remained at the core of his activism the rest of his life: that corporate monopoly and totalitarianism are not only to be feared, they are to be actively resisted using every possible means. And this point is what made him so dangerous to the political establishment in the United States. He offered not only grievances, but solutions which could fundamentally alter the balance of power in favor of the people.
[...] Just a few years ago, the feminist blogosphere seemed an insouciant, freewheeling place, revivifying women’s liberation for a new generation. “It felt like there was fun and possibility…a momentum or excitement that was building,” says Anna Holmes, who founded Jezebel, Gawker Media’s influential women’s website, in 2007. In 2011, critic Emily Nussbaum celebrated the feminist blogosphere in New York magazine: “Freed from the boundaries of print, writers could blur the lines between formal and casual writing; between a call to arms, a confession, and a stand-up routine—and this new looseness of form in turn emboldened readers to join in, to take risks in the safety of the shared spotlight.”
The Internet also became a crucial place for feminist organizing. When the breast cancer organization Komen for the Cure decided to defund Planned Parenthood in 2012, the overwhelming online backlash led to a reversal of the policy and the departure of the executive who had pushed it. Last year, Women, Action & the Media and the Everyday Sexism Project spearheaded a successful online campaign to get Facebook to ban pro-rape content.
Yet even as online feminism has proved itself a real force for change, many of the most avid digital feminists will tell you that it’s become toxic. Indeed, there’s a nascent genre of essays by people who feel emotionally savaged by their involvement in it—not because of sexist trolls, but because of the slashing righteousness of other feminists. On January 3, for example, Katherine Cross, a Puerto Rican trans woman working on a PhD at the CUNY Graduate Center, wrote about how often she hesitates to publish articles or blog posts out of fear of inadvertently stepping on an ideological land mine and bringing down the wrath of the online enforcers. “I fear being cast suddenly as one of the ‘bad guys’ for being insufficiently radical, too nuanced or too forgiving, or for simply writing something whose offensive dimensions would be unknown to me at the time of publication,” she wrote.
Google has just purchased a startup that hoped to change the way people log in. SlickLogin has been developing a system in which sites would play a uniquely generated and virtually inaudible sound, the BBC reports. An app on users’ phones would pick up the sound, and send back a signal confirming the user’s identity, using everything from GPS locations, WiFi, NFC, and Bluetooth to verify it. For the user it looks like this: Click a button, put your phone next to the computer, and you’re in.
The product hasn’t yet launched—the company only formed last August—though in September it told TechCrunch it was working with a “major international bank.” SlickLogin is based in Israel, and its founders honed their security chops in the Israel Defense Forces, Haaretz reports. In a statement on their website, the founders said Google shared their “core beliefs that logging in should be easy instead of frustrating,” pointing out that it was the first company to offer free two-step verification. The terms of the deal haven’t been disclosed.
German Chancellor Angela Merkel said on Saturday she would talk to French President Francois Hollande about building up a European communication network to avoid emails and other data passing through the United States. Merkel, who visits France on Wednesday, has been pushing for greater data protection in Europe following reports last year about mass surveillance in Germany and elsewhere by the U.S. National Security Agency. Even Merkel’s cell phone was reportedly monitored by American spies.
Merkel said in her weekly podcast that she disapproved of companies such as Google and Facebook basing their operations in countries with low levels of data protection while being active in countries such as Germany with high data protection. ”We’ll talk with France about how we can maintain a high level of data protection,” Merkel said.
“Above all, we’ll talk about European providers that offer security for our citizens, so that one shouldn’t have to send emails and other information across the Atlantic. Rather, one could build up a communication network inside Europe.” Hollande’s office confirmed that the governments had been discussing the matter and said Paris agreed with Berlin’s proposals.
In the past few years, the science of Internet trollology has made some strides. Last year, for instance, we learned that by hurling insults and inciting discord in online comment sections, so-called Internet trolls (who are frequently anonymous) have a polarizing effect on audiences, leading to politicization, rather than deeper understanding of scientific topics.
That’s bad, but it’s nothing compared with what a new psychology paper has to say about the personalities of trolls themselves. The research, conducted by Erin Buckels of the University of Manitoba and two colleagues, sought to directly investigate whether people who engage in trolling are characterized by personality traits that fall in the so-called Dark Tetrad: Machiavellianism (willingness to manipulate and deceive others), narcissism (egotism and self-obsession), psychopathy (the lack of remorse and empathy), and sadism (pleasure in the suffering of others).
It is hard to underplay the results: The study found correlations, sometimes quite significant, between these traits and trolling behavior. What’s more, it also found a relationship between all Dark Tetrad traits (except for narcissism) and the overall time that an individual spent, per day, commenting on the Internet.
In the study, trolls were identified in a variety of ways. One was by simply asking survey participants what they “enjoyed doing most” when on online comment sites, offering five options: “debating issues that are important to you,” “chatting with others,” “making new friends,” “trolling others,” and “other.” Here’s how different responses about these Internet commenting preferences matched up with responses to questions designed to identify Dark Tetrad traits:
Four out of five couples who turn to professional help for marriage problems are blaming Facebook as one of the major factors contributing to the breakdown in their relationships. Counsellors have noted a significant surge in the number of couples who have cited a partner’s addiction to popular social media sites and their mobiles as a major reason for breaking up.
Therapists at leading charity Relationships Ireland say as many as 80 per cent of marriages they are trying to save have fallen apart partly because of a growing trend of couples spending more time texting and posting status updates than talking to one another. Therapist Tony Moore said the effect on relationships can be devastating, leaving the innocent party feeling betrayed as his or her partner opts to spend time on their smartphone rather than have sex. He said the victims in a relationship often feel that their ‘guilty’ partners are being unfaithful and are “having an affair with technology”.
The mass surveillance carried out by the US National Security Agency means that governance of the internet has to be made more international and less dominated by America, the European Union‘s executive has declared. Setting out proposals on how the world wide web should function and be regulated, the European commission called for a shift away from the California-based Internet Corporation for Assigned Names and Numbers (Icann), which is subject to US law, is contracted by the US administration and is empowered to supervise how digital traffic operates.
[...] Besides criticising US domination of how the internet and digital traffic are organised, including the allocation and determination of domain names, the Brussels institution also warned against increasing governmental attempts to control the internet, as in China, Russia, Iran and increasingly Turkey, which passed a stringent law last week curbing online freedoms. [...] She spoke out against giving the United Nations the power to organise and supervise the internet or to grant such authority to the International Telecommunications Union, voicing fears that it would confer too much power on governments.
A massive attack that exploited a key vulnerability in the infrastructure of the internet is the “start of ugly things to come”, it has been warned. Online security specialists Cloudflare said it recorded the “biggest” attack of its kind on Monday. Hackers used weaknesses in the Network Time Protocol (NTP), a system used to synchronise computer clocks, to flood servers with huge amounts of data. The technique could potentially be used to force popular services offline.
Several experts had predicted that the NTP would be used for malicious purposes. The target of this latest onslaught is unknown, but it was directed at servers in Europe, Cloudflare said. Attackers used a well-known method to bring down a system known as Denial of Service (DoS) – in which huge amounts of data are forced on a target, causing it to fall over. Cloudflare chief executive Matthew Prince said his firm had measured the “very big” attack at about 400 gigabits per second (Gbps), 100Gbps larger than an attack on anti-spam service Spamhaus last year.
Tens of thousands of people and organisations were participating in a protest against the NSA’s mass surveillance on Tuesday, bombarding members of Congress with phone calls and emails and holding demonstrations across the globe.
Dubbed “The day we fight back”, the action saw scores of websites, including Reddit, BoingBoing and Mozilla host a widget inviting users to pressure elected officials.
The online demonstration saw more than 18,000 calls placed and 50,000 emails sent to US congressmen and women by midday Tuesday. Physical protests were planned in 15 countries.
“The goal of the day we fight back is to stop mass surveillance by intelligence agencies like the National Security Agency,” said Rainey Reitman, activism director at the non-profit Electronic Frontier Foundation, which helped organise the events.
British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”
Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.
Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda campaigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.
We are in the midst of an era of media transition. The corporate media is facing tremendous financial, employee and audience challenges. At the root of their problem is credibility. In 2004, Gallup reported that “39% currently say they have ‘not very much’ confidence in the media’s accuracy and fairness, while 16% say they have ‘none at all.’” Gallup reported this was the lowest credibility rating in three decades. But, the decline continued and by 2012, Gallup reported that distrust of the media had risen by 5% to 60% having little or no trust in the media – a new record. A 2013 Gallup poll found only 1 in 4 Americans trust television or newspaper news.
At the same time, technology has given rise to a new people-powered media. People can now turn their telephones into a video outlet and their social networks into a newspaper. Repeatedly we have seen someone publish a video from their phone and make national news. Any individual can go onto social networking outlets and reach thousands, if not tens of thousands of people in this new democratized media. Others create blogs that gain mass followings. Cities have groups like the DC Media group, citizen activists from the occupy movement, or the Media Mobilizing Project in Philadelphia building media teams. And, through activist organizations, news that is not covered in the media is shared widely. One reason we created Popular Resistance was to provide coverage of the burgeoning movement for social and economic justice that is building in the United States and around the world but ignored by the mass media. People can even get a daily movement news report in their email every morning.
This people-powered media builds on the long developing independent media. The independent media has built mass readership as the Internet has developed. Outlets like AlterNet, Common Dreams, Truthout, OpEd News and Truthdig reach hundreds of thousands of people. They are joined by movement media outlets like Black Agenda Report, ROAR Magazine, Occupy.com,Labor Notes, In These Times, Jacobin and Tidal among others, that report and analyze the movements actions, theory and issues.
New media projects like the Omidyar-Greenwald “First Look Media” will experiment with a new form of independent media, building on the multi-decade independent media that already exists. Video outlets like The Real News show video from around the world and provide analysis not seen on cable or network news coverage. The Resistance Report provides video coverage of the movement and its actions. And, with Wikileaks, there are new ways for people to anonymously blow the whistle producing more news than all investigative reporting by the corporate media combined. People have a lot of credible alternatives to the corporate media. This is one more reason Pew reports 31% have stopped relying on traditional media.
Turkey‘s parliament has approved internet controls enabling web pages to be blocked within hours in what the opposition decried as part of a government bid to stifle a corruption scandal with methods more suited to “times of coups”. Social media and video sharing sites have been awash with alleged recordings of ministers including Prime Minister Tayyip Erdogan and business allies presented as proof of wrongdoing. Reuters has been unable to verify their authenticity.
Under a bill passed late on Wednesday, telecommunications authorities can block access to material within four hours without a prior court order, tightening restrictions imposed in a widely criticised law adopted by the EU candidate in 2007. ”This is against the constitution. Bans like this exist in times of coups and have not been able to conceal any corruption,” Umut Oran, a deputy from the main opposition CHP, told the general assembly.
Erdogan’s critics say his response to the corruption scandal is further evidence of the authoritarian tendencies of a man long held up by the West as a potential model of democratic leadership in the Muslim world. It has raised concerns about stability in the run-up to local and presidential elections this year, helping drive the already fragile lira to record lows.
- Turkish police use tear gas to disperse protest against new internet controls
- Ninth MP quits over Turkish graft scandal
- Turkey kicks out critical foreign journalist
- Turkish Internet restrictions raise more concerns
- Turkish government fights graft scandal with probe of ‘parallel state’
- Turkish ruling party MP slams government in resignation, police purged
- Minister: Over 40 Turkish Air Force pilots resign