EFF Helps News Organizations Push Back Against Legal Bullying from Cyber Mercenary Group

For the last several months, there has emerged a campaign of bullying and censorship seeking to wipe out stories about the mercenary hacking campaigns of a less well-known company, Appin Technology, in general, and the company's cofounder, Rajat Khare, in particular.
These efforts follow a familiar pattern: obtain a court order in a friendly international jurisdiction and then misrepresent the force and substance of that order to bully publishers around the world to remove their stories.
We are helping to push back on that effort, which seeks to transform a very limited and preliminary Indian court ruling into a global takedown order.
On their behalf, we challenged the assertions that the Indian court either found the Reuters reporting to be inaccurate or that the order requires any entities other than Reuters and Google to do anything.
On December 4th, an Indian court preliminarily ordered Reuters to take down their story about Appin Technology and Khare while a case filed against them remains pending in the court.
Reuters subsequently complied with the order and took the story offline.
Khare's lawyers also succeeded in getting Swiss courts to issue an injunction against reporting from Swiss public television, forcing them to remove his name from a story about Qatar hiring hackers to spy on FIFA officials in preparation for the World Cup.
It is not clear who is behind The Association of Appin Training Centers, but according to documents surfaced by Reuters, the organization didn't exist until after the lawsuit was filed against Reuters in Indian court.
Response to AOATC. EFF is helping two news organizations stand up to the Association of Appin Training Centers' bullying-Techdirt and Muckrock Foundation.
As you must be aware, Reuters has withdrawn the story, respecting the order of a Delhi court.
It is pertinent to mention here that you extracted a portion of your article from the same defamatory article which itself is a violation of an Indian Court Order, thereby making you also liable under Contempt of Courts Act, 1971.
We pointed out that the Indian court order is only interim and not a final judgment that Reuters' reporting was false, and that it only requires Reuters and Google to do anything.
We represent and write on behalf of Techdirt and MuckRock Foundation, each of which received correspondence from you making certain assertions about the legal significance of an interim court order in the matter of Vinay Pandey v. Raphael Satter & Ors.
The court's order by its very terms is an interim order, that indicates that the defendants' evidence has not yet been considered, and that a final determination of the defamatory character of the article has not been made.
The order does not require any other person or entity to depublish their articles or other pertinent materials.
The order does not address its effect on those outside the jurisdiction of Indian courts.
The order is in no way the global takedown order your correspondence represents it to be.
Thus, even if the court's order could apply beyond the parties named within it, it will be unenforceable in U.S. courts to the extent it and Indian defamation law is inconsistent with the First Amendment to the U.S. Constitution and 47 U.S.C. 230, pursuant to the SPEECH Act, 28 U.S.C. 4102.
Since the First Amendment would not permit an interim depublication order in a defamation case, the Pandey order is unenforceable.
Unless we hear from you otherwise, we will assume that you concede that the order binds only Reuters and Google and that you will cease asserting otherwise to our clients or to anyone else.


This Cyber News was published on www.eff.org. Publication date: Fri, 09 Feb 2024 00:13:04 +0000


Cyber News related to EFF Helps News Organizations Push Back Against Legal Bullying from Cyber Mercenary Group

EFF Helps News Organizations Push Back Against Legal Bullying from Cyber Mercenary Group - For the last several months, there has emerged a campaign of bullying and censorship seeking to wipe out stories about the mercenary hacking campaigns of a less well-known company, Appin Technology, in general, and the company's cofounder, Rajat ...
1 year ago Eff.org
One Day in the Life of EFF's Activism Team - EFF's activism team includes experienced issue experts, master communicators, and grassroots organizers who help to coordinate and orchestrate EFF's activist campaigns that include but go well beyond litigation, technical analyses and solutions, and ...
1 year ago Eff.org
Legal and Compliance Considerations in Cloud Computing - This paradigm change has faced challenges, primarily legal and compliance issues. This can present severe legal issues, particularly regarding data ownership. According to S. Krishnan, the transforming nature of computing has created legal ...
1 year ago Feeds.dzone.com
EFF Membership: 2023 Year In Review - Throughout the many years that EFF has been around, our goal has remained consistent: creating a future where you have your rights when you go online, and one where they are enhanced by new technologies. Our goal isn't the only part of EFF that has ...
1 year ago Eff.org
Fighting For Your Digital Rights Across the Country: Year in Review 2023 - EFF works every year to improve policy in ways that protect your digital rights in states across the country. Thanks to the messages of hundreds of EFF members across the country, we've spoken up for digital rights this year from Sacramento to ...
1 year ago Eff.org
EFF to Court: Strike Down Age Estimation in California But Not Consumer Privacy - The Electronic Frontier Foundation called on the Ninth Circuit to rule that California's Age Appropriate Design Code violates the First Amendment, while not casting doubt on well-written data privacy laws. EFF filed an amicus brief in the case ...
1 year ago Eff.org
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
1 year ago Cyberdefensemagazine.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 year ago Cyberdefensemagazine.com Akira
CVE-2022-50280 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
6 months ago Cybersecuritynews.com
Law Firms and Legal Departments Get Singled Out For Cyberattacks - Cyberattackers are doubling down on their attacks against law firms and corporate legal departments, moving beyond their historical activity of hacking and leaking secrets to targeting the sector with financial attacks, such as ransomware and ...
1 year ago Darkreading.com LockBit
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
EFF Reminds the Supreme Court That Copyright Trolls Are Still a Problem - At EFF, we spend a lot of time calling out the harm caused by copyright trolls and protecting internet users from their abuses. Copyright trolls are serial plaintiffs who use search tools to identify technical, often low-value infringements on the ...
1 year ago Eff.org
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
1 year ago Securelist.com
International Threats to Freedom of Expression: 2023 Year in Review - 2023 has been an unfortunate reminder that the right to free expression is most fragile for groups on the margins, and that it can quickly become a casualty during global conflicts. They surfaced in bills and laws around the world that explicitly ...
1 year ago Eff.org
Cybersecurity and the Law: Taking Proactive Steps Before Needing Legal Action - How the justice system deals with cybercrime is still relatively new and finding its footing. How cybercriminals are leveraging the legal system is relatively new, too. Imagine a world where your organization gets hacked, and then, to add insult to ...
1 year ago Securityboulevard.com
Russia's Wagner Group: What is the mercenary group? - BBC News - The Wagner Group, a Russian private military company, has been at the center of global attention due to its involvement in various conflicts and its controversial operations. This mercenary group is known for its close ties to the Russian government ...
3 weeks ago Bbc.com Wagner Group
Does Pentesting Actually Save You Money On Cyber Insurance Premiums? - Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by ...
1 year ago Securityboulevard.com Rocke
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
2 years ago Bleepingcomputer.com
Apple's Push Notification Data Used to Investigate Capitol Rioters; Apple Sets Higher Legal bar - When it initially came to light that governments globally demanded push notification data from Apple and Google, suspicion mounted that the US government was doing the same. This has now been confirmed, with one use of it being the monitoring the ...
1 year ago Cysecurity.news
The Cybertiger Strikes Again! EFF's 8th Annual Tech Trivia Night - Being well into spring, with the weather getting warmer, we knew it was only a matter of time till the Cybertiger awoke from his slumber. Prepared to quench the Cybertiger's thirst for tech nerds to answer his obscure and fascinating minutiae of ...
1 year ago Eff.org
Celebrating 30 Years of Support for Digital Rights - EFF has been awarded a new $200,000 grant from Craig Newmark Philanthropies to strengthen our cybersecurity work in 2024. We are especially grateful this year, as it marks 30 years of donations from Craig Newmark, who joined as an EFF member just ...
1 year ago Eff.org
Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report - To illuminate the evolving digital threat landscape and help the cyber community understand today's most pressing threats, we released our annual Microsoft Digital Defense Report. This year's report focuses on five key topics: cybercrime, ...
2 years ago Csoonline.com POLONIUM
Meet Your New Cybersecurity Auditor: Your Insurer - As businesses deal with the fallout of massive ransomware waves, from Lapsus$ to Cl0p/MOVEit, an unlikely new entity is joining the regulatory bodies to raise the bar for cybersecurity: the cyber insurer. Their coverage requirements and ...
1 year ago Darkreading.com LAPSUS$

Cyber Trends (last 7 days)