The Intercept reports: There was a simple aim at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.”
Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ.
The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.[Continue reading…]
Category Archives: internet
The web has become a hall of mirrors, filled only with reflections of our data
By mc schraefel @mcphoo, University of Southampton
The “digital assistant” is proliferating, able to combine intelligent natural language processing, voice-operated control over a smartphone’s functions and access to web services. It can set calendar appointments, launch apps, and run requests. But if that sounds very clever – a computerised talking assistant, like HAL9000 from the film 2001: A Space Odyssey – it’s mostly just running search engine queries and processing the results.
Facebook has now joined Apple, Microsoft, Google and Amazon with the launch of its digital assistant M, part of its Messaging smartphone app. It’s special sauce is that M is powered not just by algorithms but by data serfs: human Facebook employees who are there to ensure that every request that it cannot parse is still fulfilled, and in doing so training M by example. That training works because every interaction with M is recorded – that’s the point, according to David Marcus, Facebook’s vice-president of messaging:
We start capturing all of your intent for the things you want to do. Intent often leads to buying something, or to a transaction, and that’s an opportunity for us to [make money] over time.
Facebook, through M, will capture and facilitate that “intent to buy” and take its cut directly from the subsequent purchase rather than as an ad middleman. It does this by leveraging messaging, which was turned into a separate app of its own so that Facebook could integrate PayPal-style peer-to-peer payments between users. This means Facebook has a log not only of your conversations but also your financial dealings. In an interview with Fortune magazine at the time, Facebook product manager, Steve Davies, said:
People talk about money all the time in Messenger but end up going somewhere else to do the transaction. With this, people can finish the conversation the same place started it.
In a somewhat creepy way, by reading your chats and knowing that you’re “talking about money all the time” – what you’re talking about buying – Facebook can build up a pretty compelling profile of interests and potential purchases. If M can capture our intent it will not be by tracking what sites we visit and targeting relevant ads, as per advert brokers such as Google and Doubleclick. Nor by targeting ads based on the links we share, as Twitter does. Instead it simply reads our messages.
Mapping the situation in Syria
#Syria MAP UPDATE: the situation in Syria as of 18/08/2015, bigger at https://t.co/Lx4PIPYG0G #FSA #SAA #IS #YPG #JN pic.twitter.com/7blUgTsO9d
— Thomas van Linge (@arabthomness) August 20, 2015
Der Spiegel reports: Islamic State fighters have conquered Rahabi in Iraq. They control the Libyan coast near Sirt. In Syria, they just lost Tall Abyad to the Kurds, but are spreading out in the center of Palmyra. Thomas van Linge is keeping an eye on their movements. The 19-year-old wears a hoodie and, although he only just graduated from high school, he already knows better than most people where the Jihadists are heading, which areas they are occupying and where they’ve been beaten back. That’s because van Linge makes some of the world’s best maps of chaotic war zones from the desk of his childhood bedroom in Amsterdam. He has never been to Syria, Iraq or Libya, and he learned Arabic on YouTube.
The young Dutchman isn’t just keeping an eye on Islamic State and its “caliphate,” he also knows what the rebels of the Free Syrian Army, al-Nusra Front and Lebanon’s Hezbollah are doing. In Libya he’s monitoring the Zintan Brigades, in Nigeria he’s watching Boko Haram, in Eastern Ukraine he’s keeping an eye on the separatists. “All places where people are rising up,” he says.
His maps have been used by CNN, the New York Times and even SPIEGEL. The question is: Why is a 19-year-old interested in the situation at Syrian front lines? And how does he manage to depict these conflicts so precisely, with more details than almost any other professional cartographer? [Continue reading…]
Ad blockers and the nuisance at the heart of the web
Farhad Manjoo writes: The great philosopher Homer Simpson once memorably described alcohol as “the cause of and solution to all of life’s problems.” Internet advertising is a bit like that — the funder of and terrible nuisance baked into everything you do online.
Advertising sustains pretty much all the content you enjoy on the web, not least this very newspaper and its handsome, charming technology columnist; as I’ve argued before, many of the world’s most useful technologies may never have come about without online advertising. But at the same time, ads and the vast, hidden, data-sucking machinery that they depend on to track and profile you are routinely the most terrible thing about the Internet.
Now, more and more web users are escaping the daily bombardment of online advertising by installing an ad blocker. This simple, free software lets you roam the web without encountering any ads that shunt themselves between you and the content you want to read or watch. With an ad blocker, your web browser will generally run faster, you’ll waste less bandwidth downloading ads, and you’ll suffer fewer annoyances when navigating the Internet. You’ll wonder why everyone else in the world doesn’t turn to the dark side.
Well, everyone may be catching on. Ad blocking has been around for years, but adoption is now rising steeply, at a pace that some in the ad industry say could prove catastrophic for the economic structure underlying the web. That has spurred a debate about the ethic of ad blocking. Some publishers and advertisers say ad blocking violates the implicit contract that girds the Internet — the idea that in return for free content, we all tolerate a constant barrage of ads.
But in the long run, there could be a hidden benefit to blocking ads for advertisers and publishers: Ad blockers could end up saving the ad industry from its worst excesses. [Continue reading…]
Living and working under the control of invisible digital overlords
Frank Pasquale writes: In a recent podcast series called Instaserfs, a former Uber driver named Mansour gave a chilling description of the new, computer-mediated workplace. First, the company tried to persuade him to take a predatory loan to buy a new car. Apparently a number cruncher deemed him at high risk of defaulting. Second, Uber would never respond in person to him – it just sent text messages and emails. This style of supervision was a series of take-it-or-leave-it ultimatums – a digital boss coded in advance.
Then the company suddenly took a larger cut of revenues from him and other drivers. And finally, what seemed most outrageous to Mansour: his job could be terminated without notice if a few passengers gave him one-star reviews, since that could drag his average below 4.7. According to him, Uber has no real appeal recourse or other due process in play for a rating system that can instantly put a driver out of work – it simply crunches the numbers.
Mansour’s story compresses long-standing trends in credit and employment – and it’s by no means unique. Online retailers live in fear of a ‘Google Death Penalty’ – a sudden, mysterious drop in search-engine rankings if they do something judged fraudulent by Google’s spam detection algorithms. Job applicants at Walmart in the US and other large companies take mysterious ‘personality tests’, which process their responses in undisclosed ways. And white-collar workers face CV-sorting software that may understate, or entirely ignore, their qualifications. One algorithmic CV analyser found all 29,000 people who applied for a ‘reasonably standard engineering position’ unqualified.
The infancy of the internet is over. As online spaces mature, Facebook, Google, Apple, Amazon, and other powerful corporations are setting the rules that govern competition among journalists, writers, coders, and e-commerce firms. Uber and Postmates and other platforms are adding a code layer to occupations like driving and service work. Cyberspace is no longer an escape from the ‘real world’. It is now a force governing it via algorithms: recipe-like sets of instructions to solve problems. From Google search to OkCupid matchmaking, software orders and weights hundreds of variables into clean, simple interfaces, taking us from query to solution. Complex mathematics govern such answers, but it is hidden from plain view, thanks either to secrecy imposed by law, or to complexity outsiders cannot unravel. [Continue reading…]
Google’s search algorithm could steal the presidency
Wired: Imagine an election — a close one. You’re undecided. So you type the name of one of the candidates into your search engine of choice. (Actually, let’s not be coy here. In most of the world, one search engine dominates; in Europe and North America, it’s Google.) And Google coughs up, in fractions of a second, articles and facts about that candidate. Great! Now you are an informed voter, right? But a study published this week says that the order of those results, the ranking of positive or negative stories on the screen, can have an enormous influence on the way you vote. And if the election is close enough, the effect could be profound enough to change the outcome.
In other words: Google’s ranking algorithm for search results could accidentally steal the presidency. “We estimate, based on win margins in national elections around the world,” says Robert Epstein, a psychologist at the American Institute for Behavioral Research and Technology and one of the study’s authors, “that Google could determine the outcome of upwards of 25 percent of all national elections.” [Continue reading…]
Why the fear over ubiquitous data encryption is overblown
Mike McConnell, former director of the National Security Agency and director of national intelligence, Michael Chertoff, former homeland security secretary, and William Lynn, former deputy defense secretary, write: More than three years ago, as former national security officials, we penned an op-ed to raise awareness among the public, the business community and Congress of the serious threat to the nation’s well-being posed by the massive theft of intellectual property, technology and business information by the Chinese government through cyberexploitation. Today, we write again to raise the level of thinking and debate about ubiquitous encryption to protect information from exploitation.
In the wake of global controversy over government surveillance, a number of U.S. technology companies have developed and are offering their users what we call ubiquitous encryption — that is, end-to-end encryption of data with only the sender and intended recipient possessing decryption keys. With this technology, the plain text of messages is inaccessible to the companies offering the products or services as well as to the government, even with lawfully authorized access for public safety or law enforcement purposes.
The FBI director and the Justice Department have raised serious and legitimate concerns that ubiquitous encryption without a second decryption key in the hands of a third party would allow criminals to keep their communications secret, even when law enforcement officials have court-approved authorization to access those communications. There also are concerns about such encryption providing secure communications to national security intelligence targets such as terrorist organizations and nations operating counter to U.S. national security interests.
Several other nations are pursuing access to encrypted communications. In Britain, Parliament is considering requiring technology companies to build decryption capabilities for authorized government access into products and services offered in that country. The Chinese have proposed similar approaches to ensure that the government can monitor the content and activities of their citizens. Pakistan has recently blocked BlackBerry services, which provide ubiquitous encryption by default.
We recognize the importance our officials attach to being able to decrypt a coded communication under a warrant or similar legal authority. But the issue that has not been addressed is the competing priorities that support the companies’ resistance to building in a back door or duplicated key for decryption. We believe that the greater public good is a secure communications infrastructure protected by ubiquitous encryption at the device, server and enterprise level without building in means for government monitoring. [Continue reading…]
Facebook expands in politics, and campaigns find much to like
The New York Times reports: “Facebook is going to be the advertising monster of 2016,” said Zac Moffatt, a co-founder of Targeted Victory, a Republican technology firm that ran Mitt Romney’s 2012 digital effort. “They have the largest audience, a dominant set of tools for advertising, and the most aggressive approach to allowing campaigns to leverage their data to maximize efficiency and minimize waste.”
Campaigns can now include what Facebook describes as a “call to action” at the end of their videos — in most cases, a link that allows users to donate to the campaign or sign a petition.
Video represents a tremendous growth area generally. When Facebook announced its new video capacities in September 2014, it had one billion video views a day. Now, the site gets four times as many.
Another innovation allows a campaign to upload its voter file — a list of those they hope will turn out to vote or can be persuaded to do so — directly to Facebook, where it can target those users. Integrating this deep and rich source of information about voters also allows campaigns to find and reach other Facebook users who resemble, in behavior and interests, those in their existing voter file.
The emphasis on reaching increasingly segmented voters reflects the narrowing of the electorate, in which campaigns are devoting more and more money and effort to finding their supporters and turning them out on Election Day, rather than trying to win over uncommitted voters. [Continue reading…]
MIT report: Giving government special access to data poses major security risks
MIT’s Computer Science and Artificial Intelligence Lab: In recent months, government officials in the United States, the United Kingdom, and other countries have made repeated calls for law-enforcement agencies to be able to access, upon due authorization, encrypted data to help them solve crimes.
Beyond the ethical and political implications of such an approach, though, is a more practical question: If we want to maintain the security of user information, is this sort of access even technically possible?
That was the impetus for a report — titled “Keys under doormats: Mandating insecurity by requiring government access to all data and communications” — just published by security experts from MIT’s Computer Science and Artificial Intelligence Lab (CSAIL), alongside other leading researchers from the U.S. and the U.K.
The report argues that such mechanisms “pose far more grave security risks, imperil innovation on which the world’s economies depend, and raise more thorny policy issues than we could have imagined when the Internet was in its infancy.” [Continue reading…]
On not being there: The data-driven body at work and at play
Rebecca Lemov writes: The protagonist of William Gibson’s 2014 science-fiction novel The Peripheral, Flynne Fisher, works remotely in a way that lends a new and fuller sense to that phrase. The novel features a double future: One set of characters inhabits the near future, ten to fifteen years from the present, while another lives seventy years on, after a breakdown of the climate and multiple other systems that has apocalyptically altered human and technological conditions around the world.
In that “further future,” only 20 percent of the Earth’s human population has survived. Each of these fortunate few is well off and able to live a life transformed by healing nanobots, somaticized e-mail (which delivers messages and calls to the roof of the user’s mouth), quantum computing, and clean energy. For their amusement and profit, certain “hobbyists” in this future have the Borgesian option of cultivating an alternative path in history — it’s called “opening up a stub” — and mining it for information as well as labor.
Flynne, the remote worker, lives on one of those paths. A young woman from the American Southeast, possibly Appalachia or the Ozarks, she favors cutoff jeans and resides in a trailer, eking out a living as a for-hire sub playing video games for wealthy aficionados. Recruited by a mysterious entity that is beta-testing drones that are doing “security” in a murky skyscraper in an unnamed city, she thinks at first that she has been taken on to play a kind of video game in simulated reality. As it turns out, she has been employed to work in the future as an “information flow” — low-wage work, though the pay translates to a very high level of remuneration in the place and time in which she lives.
What is of particular interest is the fate of Flynne’s body. Before she goes to work she must tend to its basic needs (nutrition and elimination), because during her shift it will effectively be “vacant.” Lying on a bed with a special data-transmitting helmet attached to her head, she will be elsewhere, inhabiting an ambulatory robot carapace — a “peripheral” — built out of bio-flesh that can receive her consciousness.
Bodies in this data-driven economic backwater of a future world economy are abandoned for long stretches of time — disposable, cheapened, eerily vacant in the temporary absence of “someone at the helm.” Meanwhile, fleets of built bodies, grown from human DNA, await habitation.
Alex Rivera explores similar territory in his Mexican sci-fi film The Sleep Dealer (2008), set in a future world after a wall erected on the US–Mexican border has successfully blocked migrants from entering the United States. Digital networks allow people to connect to strangers all over the world, fostering fantasies of physical and emotional connection. At the same time, low-income would-be migrant workers in Tijuana and elsewhere can opt to do remote work by controlling robots building a skyscraper in a faraway city, locking their bodies into devices that transmit their labor to the site. In tank-like warehouses, lined up in rows of stalls, they “jack in” by connecting data-transmitting cables to nodes implanted in their arms and backs. Their bodies are in Mexico, but their work is in New York or San Francisco, and while they are plugged in and wearing their remote-viewing spectacles, their limbs move like the appendages of ghostly underwater creatures. Their life force drained by the taxing labor, these “sleep dealers” end up as human discards.
What is surprising about these sci-fi conceits, from “transitioning” in The Peripheral to “jacking in” in The Sleep Dealer, is how familiar they seem, or at least how closely they reflect certain aspects of contemporary reality. Almost daily, we encounter people who are there but not there, flickering in and out of what we think of as presence. A growing body of research explores the question of how users interact with their gadgets and media outlets, and how in turn these interactions transform social relationships. The defining feature of this heavily mediated reality is our presence “elsewhere,” a removal of at least part of our conscious awareness from wherever our bodies happen to be. [Continue reading…]
Hackers warned about internet vulnerabilities but were ignored
The Washington Post reports: The seven young men sitting before some of Capitol Hill’s most powerful lawmakers weren’t graduate students or junior analysts from some think tank. No, Space Rogue, Kingpin, Mudge and the others were hackers who had come from the mysterious environs of cyberspace to deliver a terrifying warning to the world.
Your computers, they told the panel of senators in May 1998, are not safe — not the software, not the hardware, not the networks that link them together. The companies that build these things don’t care, the hackers continued, and they have no reason to care because failure costs them nothing. And the federal government has neither the skill nor the will to do anything about it.
“If you’re looking for computer security, then the Internet is not the place to be,” said Mudge, then 27 and looking like a biblical prophet with long brown hair flowing past his shoulders. The Internet itself, he added, could be taken down “by any of the seven individuals seated before you” with 30 minutes of well-choreographed keystrokes.
The senators — a bipartisan group including John Glenn, Joseph I. Lieberman and Fred D. Thompson — nodded gravely, making clear that they understood the gravity of the situation. “We’re going to have to do something about it,” Thompson said.
What happened instead was a tragedy of missed opportunity, and 17 years later the world is still paying the price in rampant insecurity. [Continue reading…]
Why the modern world is bad for your brain
Daniel J Levitin writes: Our brains are busier than ever before. We’re assaulted with facts, pseudo facts, jibber-jabber, and rumour, all posing as information. Trying to figure out what you need to know and what you can ignore is exhausting. At the same time, we are all doing more. Thirty years ago, travel agents made our airline and rail reservations, salespeople helped us find what we were looking for in shops, and professional typists or secretaries helped busy people with their correspondence. Now we do most of those things ourselves. We are doing the jobs of 10 different people while still trying to keep up with our lives, our children and parents, our friends, our careers, our hobbies, and our favourite TV shows.
Our smartphones have become Swiss army knife–like appliances that include a dictionary, calculator, web browser, email, Game Boy, appointment calendar, voice recorder, guitar tuner, weather forecaster, GPS, texter, tweeter, Facebook updater, and flashlight. They’re more powerful and do more things than the most advanced computer at IBM corporate headquarters 30 years ago. And we use them all the time, part of a 21st-century mania for cramming everything we do into every single spare moment of downtime. We text while we’re walking across the street, catch up on email while standing in a queue – and while having lunch with friends, we surreptitiously check to see what our other friends are doing. At the kitchen counter, cosy and secure in our domicile, we write our shopping lists on smartphones while we are listening to that wonderfully informative podcast on urban beekeeping.
But there’s a fly in the ointment. Although we think we’re doing several things at once, multitasking, this is a powerful and diabolical illusion. Earl Miller, a neuroscientist at MIT and one of the world experts on divided attention, says that our brains are “not wired to multitask well… When people think they’re multitasking, they’re actually just switching from one task to another very rapidly. And every time they do, there’s a cognitive cost in doing so.” So we’re not actually keeping a lot of balls in the air like an expert juggler; we’re more like a bad amateur plate spinner, frantically switching from one task to another, ignoring the one that is not right in front of us but worried it will come crashing down any minute. Even though we think we’re getting a lot done, ironically, multitasking makes us demonstrably less efficient. [Continue reading…]
Even the tech savvy should turn off their phones and listen
Bruno Giussani writes: Nothing exists nowadays unless it is Facebooked, Tweeted or Instagrammed with emphasis on “insta”. So perhaps the event that I hosted on Tuesday at the Royal Institution, TEDGlobal London, didn’t exist. Because we ran a little experiment, banning the use of smartphones, tablets, laptops, cameras – any electronic device – during the conference.
At the end of the event (which over two sessions of 100 minutes each featured scientists, technologists, historians, a photographer, a slam poet, a singer, a racing car driver and a writer) I asked the 350 attendees whether we should apply the same rule next time. It’s a safe guess that at least two-thirds of them use Twitter or FB with some regularity, but pretty much every hand in the theatre shot up, with maybe two exceptions. I have heard nothing but positive feedback since. [Continue reading…]
Pope Francis on the dehumanizing effect of social media and information overload
[W]hen media and the digital world become omnipresent, their influence can stop people from learning how to live wisely, to think deeply and to love generously. In this context, the great sages of the past run the risk of going unheard amid the noise and distractions of an information overload. Efforts need to be made to help these media become sources of new cultural progress for humanity and not a threat to our deepest riches. True wisdom, as the fruit of self-examination, dialogue and generous encounter between persons, is not acquired by a mere accumulation of data which eventually leads to overload and confusion, a sort of mental pollution. Real relationships with others, with all the challenges they entail, now tend to be replaced by a type of internet communication which enables us to choose or eliminate relationships at whim, thus giving rise to a new type of contrived emotion which has more to do with devices and displays than with other people and with nature. Today’s media do enable us to communicate and to share our knowledge and affections. Yet at times they also shield us from direct contact with the pain, the fears and the joys of others and the complexity of their personal experiences. For this reason, we should be concerned that, alongside the exciting possibilities offered by these media, a deep and melancholic dissatisfaction with interpersonal relations, or a harmful sense of isolation, can also arise. [Source: Laudato Si: On the Care of the Common Home]
ISIS is winning the social media war, U.S. concludes
The New York Times reports: An internal State Department assessment paints a dismal picture of the efforts by the Obama administration and its foreign allies to combat the Islamic State’s message machine, portraying a fractured coalition that cannot get its own message straight.
The assessment comes months after the State Department signaled that it was planning to energize its social media campaign against the militant group. It concludes, however, that the Islamic State’s violent narrative — promulgated through thousands of messages each day — has effectively “trumped” the efforts of some of the world’s richest and most technologically advanced nations.
It also casts an unflattering light on internal discussions between American officials and some of their closest allies in the military campaign against the militants. A “messaging working group” of officials from the United States, Britain and the United Arab Emirates, the memo says, “has not really come together.” [Continue reading…]
Welcome to the new Wild West of data collection without regulation
The Nation reports: Nicole Keplinger, 22, had long seen ads on Facebook promising financial relief, but she always ignored them and assumed that they were scams. Keplinger was drowning in student debt after obtaining a worthless degree from the for-profit Everest College, whose parent corporation, Corinthian Colleges Inc., had recently collapsed under accusations of fraud and predatory lending. But when an offer arrived in her e-mail inbox in April — “Cut your student loan payment or even forgive it completely!” — she thought it seemed more legitimate than the rest, so she called the number.
The person on the other end was aggressive. “They wanted my banking information, my Social Security number, my parents’ number and their information. I was like, ‘Wait a minute,’” Keplinger recalled. Even after she said that she lived on a fixed income (on disability due to a kidney transplant), the telemarketer kept up the pressure. “They said I needed to get a credit card. I don’t know if they were going to take money off it or what… but why do I need to get a credit card if I’m trying to reduce my student loans?”
Keplinger lied and said she’d call back, but not everyone gets away. If she disclosed her bank information, her loans most certainly would not have been cut or forgiven. At best, she would have been charged a large fee for something she could do herself: get on government repayment programs such as forbearance or deferment. At worst, she might have had the money debited each month from her bank account without any benefit provided in return, or been ensnared by a “phantom-debt collector” — a distressingly common racket that involves telling people they owe phony debts and scaring them into paying. It’s the perfect ploy to attempt on people who have already been preyed upon by unscrupulous outfits like Corinthian and who, having been misled and overcharged, are understandably confused about how much money they owe. At the same time, the fact that Keplinger was e-mailed in addition to seeing ads on Facebook suggests that her information was in the hands of a “lead generator,” a multibillion-dollar industry devoted to compiling and selling lists of prospective customers online.
Welcome to a new age of digital redlining. The term conjures up the days when banks would draw a red line around areas of the city — typically places where blacks, Latinos, Asians, or other minorities lived — to denote places they would not lend money, at least not at fair rates. “Just as neighborhoods can serve as a proxy for racial or ethnic identity, there are new worries that big data technologies could be used to ‘digitally redline’ unwanted groups, either as customers, employees, tenants, or recipients of credit,” a 2014 White House report on big data warns. [Continue reading…]
Jailed for ‘Twitter terrorism’ supporting ISIS and Al Qaeda
The Daily Beast reports: American and British counter-terror officers have turned their fire on the keyboard warriors waging jihad from their bedrooms in Western capitals.
A teenage boy from the D.C. area and a woman living in South London admitted Thursday in courtrooms 3,000 miles apart that they were “Twitter terrorists”—part of a growing online army that encourages Western citizens to travel to the so-called Islamic State; take up arms; or martyr themselves in the name of jihad.
Such is the perceived threat from these social media recruiting sergeants that judges on both sides of the Atlantic have dispensed with free speech arguments and now characterize Twitter or Instagram propaganda sites for al Qaeda and Islamic State (also known as ISIS and ISIL) as providing “material support” for terrorists. [Continue reading…]
Palestinian men face Israeli prison sentences for Facebook posts
Aziza Nofal reports: The Jerusalemite family of Omar al-Shalabi did not expect the status updates he posted on his Facebook page to lead to his arrest by Israeli authorities. Up until the Jerusalem magistrate’s court announced its verdict, the family also believed he would be released and allowed to return home. On May 12, Shalabi was sentenced to nine months in prison.
Shalabi’s brother Mohammed, who is following up on his sibling’s case with a lawyer, told Al-Monitor that the ruling was unexpected given the apparent trivialness of the acts leading to the charges against him. The family had in addition expected Shalabi to be released on bail awaiting trial. He had been arrested Dec. 14 and charged with incitement based on postings to his Facebook page. The posts followed the kidnapping and murder of a young Palestinian man, Mohammed Abu Khdeir, by extremist settlers. Israeli authorities thus feared possible retaliatory attacks against settlers.
Mohammed Shalabi said his brother’s postings leading up to his arrest were no different from what he had been posting for quite some time. “The occupation authorities retained Omar’s posts as a pretext to arrest him, because he was an activist in the Fatah movement in Jerusalem,” claimed Mohammed Shalabi. [Continue reading…]