All posts by MTechnology

Reagan Back on Campaign Trail — as Hologram

A characteristic twinkle in his eye, Ronald Reagan waves to a crowd from aboard a rail car in a hologram revealed Wednesday at the late president’s namesake library in Southern California.

“We think we made a good beginning, but you ain’t seen nothin’ yet!” the digital resurrection of the nation’s 40th president says in his steady voice as a flurry of balloons falls in front of him.

Reagan, who died in 2004 at age 93, was speaking about the nation’s future during a 1984 campaign stop but easily could have been referencing the technology that brought him back to life in 2018. The audio used is edited from his real remarks.

​’A stunning experience’

“We wanted to make President Reagan as lifelike as possible,” said John Heubusch, executive director of the Reagan Foundation. “It’s a stunning experience.”

In two other holograms, Reagan appears in a suit and tie inside the Oval Office and in horseback riding pants, carrying a lasso alongside his dog, Victory, at his beloved ranch. All three holograms will be on display to visitors of the Ronald Reagan Presidential Library, west of Los Angeles, starting Thursday.

They will be shown in a specially designed room that will be the first stop for guests. Seats are set up in front of a stage, and a curtain opens up to thunderous applause at Reagan’s campaign stop more than three decades ago.

How it was done

The computer-generated imagery for the holograms was created starting with a silicone cast of Reagan’s head that was photographed from various angles with 300 cameras. His head was then digitally “placed” on the body of an actor portraying the president with full costumes and backdrops for the three scenarios.

Reagan’s face comes to life via specific movements of the mouth, nose, eyes, cheeks and hairline, all manipulated by computers.

The library worked with the same special-effects technicians who helped bring singers like Michael Jackson, Billie Holiday and Roy Orbison back to life on stage.

The Hollywood firm Hologram USA helped create the holograms and the stage on which they’re projected.

A lover of technology

As a radio host, television star and movie actor, Reagan understood and appreciated new technologies, company senior vice president David Nussbaum said.

“He always thought many steps ahead,” he said. “If he was looking down right now on this project, I think he would give us his seal of approval. I think he would totally get this and support it.”

Seeing her former boss “almost in the flesh” was “a little eerie, but at the same time, very comforting,” said Joanne Drake, who served as Reagan’s chief of staff after the Republican left office following his two terms from 1981 to 1989.

“It’s fun to think that he’s standing in front of us,” said Drake, who’s now chief administration officer for the foundation. “Intellectually, you know it’s not him standing there, but you see his facial movements and his arm movements and his body and that twinkle in his eye and that little grin that he always got, and it makes you remember really what he brought to the office.”

Drake said future plans could include bringing the holograms on the road.

“I do think we’re going to see Ronald Reagan back in Washington, D.C.,” she said.

Bezos’ Blue Origin, Others Get $2.3 Billion in US Rocket Contracts

The U.S. Air Force on Wednesday said that it had awarded a total of $2.3 billion in contracts to develop rocket launch systems for national security missions.

The awards go to Amazon.com billionaire Jeff Bezos’ Blue Origin; United Launch Services, part of the United Launch Alliance (ULA) joint venture between Boeing Co and Lockheed Martin Corp; and Northrop Grumman Innovation Systems.

The three contracts are part of a Department of Defense initiative to assure constant military access to space and curb reliance on foreign-made rocket engines, like ULA’s flagship Atlas V rocket that uses Russian-made RD-180 boosters. The contracts are to develop rockets and carry defense payloads into space.

Centennial, Colorado-based United Launch Services received $967 million to develop its Vulcan rocket; Kent, Washington-based Blue Origin was awarded $500 million to build its New Glenn booster, and Northrop Grumman of Arizona received $791.6 million for its OmegA rocket.

Blue Origin’s and Northrop’s prototype vehicles for military launches are expected to be ready to fly by late 2024 and ULA’s Vulcan rocket development should be completed by March 2025.

Blue Origin said in a statement following Wednesday’s announcement that it will build a launch site at the Vandenberg Air Force Base in California, although it did not say what rockets would launch from the site. ULA announced in September that its Vulcan rocket will be powered by Blue’s BE-4 liquid rocket engines.

Google’s Waze Expands Carpooling Service Throughout US

Google will begin offering its pay-to-carpool service throughout the U.S., an effort to reduce the commute-time congestion that its popular Waze navigation app is designed to avoid.

The expansion announced Wednesday builds upon a carpooling system that Waze began testing two years ago in northern California and Israel before gradually extending it into Brazil and parts of 12 other states.

Now it will be available to anyone in the U.S.

Drivers willing to give someone a ride for a small fee to cover some of their costs for gas and other expenses need only Waze’s app on their phone. Anyone willing to pay a few bucks to hitch a ride will need to install a different Waze app focused on carpooling.

About 1.3 million drivers and passengers have signed up for Waze’s carpooling service, the company says. About 30 million people in the U.S. currently rely on the Waze app for directions; it has 110 million users worldwide.

Waze’s carpooling effort has been viewed as a potential first step for Google to mount a challenge to the two top ride-hailing services, Uber and Lyft.

But Waze founder and CEO Noam Bardin rejected that notion in an interview with The Associated Press, insisting that the carpooling service is purely an attempt to ease traffic congestion.

“We don’t want to be a professional driving network,” Bardin said. “We see ride sharing as something that needs to become part of the daily commute. If we can’t get people out of their cars, it won’t be solving anything.”

Gartner analyst Mike Ramsey also sees Waze’s service as a bigger threat to other carpooling apps such as Scoop and Carpool Buddy than to Uber and Lyft. “Carpooling is a much different animal,” he said.

It’s a form of transportation that Bardin said Waze had difficulty figuring out. Early on, Waze tried to get more drivers to sign up by emphasizing the economic benefits of having someone help cover gas costs for a trip that they were going to make anyway.

But earlier this year, Waze realized it needed a better formula for connecting strangers willing to ride together in a car. Many women, for instance, only want to ride with other women, Bardin said, while other people enjoy commuting with others who work for the same employer or live in the same neighborhood.

“Carpooling is a more social experience,” Bardin said. “A lot of time those of us working in the digital world forget that social connections are often the most important thing in the real world.”

Waze’s app still sets a price for each carpooling trip and transfers payments without charging a commission. That’s something Waze can afford to do because Google makes so much money from selling digital ads on Waze and its many other services.

The carpooling fees are supposed to be similar to what it would cost to take a train or type of public transportation to work, Bardin said. Drivers and riders can agree to adjust the price upward or downward, but the fees can never exceed the rate the Internal Revenue Service allows for business-related mileage — currently 54.5 cents per mile.

Even though Waze’s carpooling service doesn’t appear to be driven by profit motive, Ramsey isn’t convinced that will always be the case. “I do think Google is realizing that it can’t just keep making all its money from selling ads,” he said.

‘War’ on Food Waste Can Save Money and Boost Profits, Tech Firm Says

Wasteless, an Israeli firm seeking to reduce food waste and save consumers money, won $2 million in funding Tuesday, as more businesses seek to cut food losses amid rising global hunger.

The two-year-old firm sells software to supermarkets so that they can manage their stocks and reduce food prices as shelf life dwindles, reducing waste and boosting profits.

“We inspire customers to be better citizens of the world and to take part in the war against food waste, while at the same time enjoying better prices,” Ben Biron, one of the founders of Wasteless, said in a statement.

Food waste is increasingly viewed as unethical, as well as environmentally destructive, dumped in landfills where it rots, releasing greenhouse gases, while fuel, water and energy needed to grow, store and carry it is wasted.

A growing number of impact investors — who aim to bring social or environmental change as well as making a profit — are putting their money into businesses responding to political and consumer pressures to address climate change and waste.

Globally, one third of all food produced — worth $1 trillion — is binned every year, according to the United Nations’ Food and Agriculture Organization, and researchers fear annual food waste could rise by a third to 2.1 billion tons by 2030.

World leaders pledged to halve food waste by then under the sustainable development goals set by the United Nations in 2015.

Wasteless said it will use the investment from Slingshot Ventures, a Dutch venture capital firm, to focus on West European food retailers.

In a trial with a Spanish food retailer earlier this year, Wasteless said its algorithm, which allows customers to choose between older or fresher food at different prices, cut food waste by a third and increased revenue by 6 percent.

Many experts say changing business practices and consumer behavior, rather than giving away excess food, is key to reducing waste.

“There isn’t any more land or any more water. One of the things that has to happen is the food that is grown has to get eaten,” Oliver Wyncoll, a partner at Bridges Fund Management, a U.K.-based impact investor, told Reuters.

“In the next few years, you will see an increasing level of investment in food waste. … The difficulty of the philanthropic charity type model is it’s not scalable unless you have a bottomless pit of donations.”

YouTube Driving Global Consumption of Music

If you are listening to music, chances are you’re on YouTube.

A music consumer report by the industry’s global body IFPI published Tuesday found that 86 percent of us listen to music through on-demand streaming.

And nearly half that time, 47 percent is spent on YouTube.

Video as a whole accounted for 52 percent of the time we spent streaming music, posing challenges to such subscription services as Spotify and SoundCloud.

But while Spotify’s estimated annual revenue per user was $20 (17.5 euros), YouTube’s was less than a dollar.

The London-based IFPI issued a broader overview in April that found digital sales for the first time making up the majority of global revenues thanks to streaming.

The report published Tuesday looked into where and when we listen to music.

It found that three in four people globally use smartphones, with the rate among 16- to 24-year-olds reaching 94 percent.

The highest levels were recorded in India, where 96 percent of consumers used smartphones for music, including 99 percent of young adults.

But music does not end when we put away our phones, with 86 percent globally also listening to the radio.

Copyright infringement was still a big issue, with unlicensed music accounting for 38 percent of what was consumed around the world.

“This report also shows the challenges the music community continues to face — both in the form of the evolving threat of digital copyright infringement as well as in the failure to achieve fair compensation from some user-upload services,” said IFPI chief Frances Moore.

The report noted that “96% of consumers in China and 96% in India listen to licensed music.”

It did not, however, say how many of those consumers also listened to music that infringed copyrights.

Overall, the average consumer spent 2.5 hours a day listening to music, with the largest share of it consumed while driving, the industry report said.

Popularity of Electric Scooters Creates Jobs for ‘Juicers’

You see them everywhere in U.S. cities — young and old riding rented electric-powered scooters. When they are done, they can leave the scooters anywhere. 

Someone has to find and charge the scooters, then return them to designated hot spots where customers can use them the next day. And that has given rise to a new line of work — scooter juicers. 

Shivali Sharma is a stay-at-home mom in San Jose, California, and a Marine staff sergeant on medical leave. She works as a juicer to earn money while her boys sleep. 

“The hunt is fun,” she said.

It’s a new kind of piece work, made possible by GPS and phone apps. 

Sharma and her family noticed the scooters being left on their streets. It intrigued them.

“We were like, ‘What is this scooter doing? Who does it belong to?’” she said.

Then they heard about juicing and signed up. The company sent them charging stations. 

For the past several months, Sharma’s routine is set. Each night, this single mom leaves her twins with her parents and checks her phone app for Lime scooters scattered around the city, sending out GPS locator signals, all needing to be charged. She earns $6 per scooter, more if the scooter is harder to reach.

Charging scooters at home

For the scooter companies, juicers solve two problems — finding the scooters and then using their own electricity to charge them before putting them back on the streets. 

The competition among the juicers is part of the appeal, something Lime, one of the scooter companies, didn’t expect.

“The fact that juicers compare it to Pokemon Go is a happy accident,” said Will Lee, project manager at Lime, a San Francisco-based electric bike and scooter company. “Now that we’ve hit on this motivation, this gamification motivation among the juicers, we have done things to maybe amplify it or try to feed into folks’ natural desire to play the game.”

Gamification of work

To increase juicers’ engagement as the night progresses, Lime raises the dollar amount a juicer can get per scooter. A scooter in the middle of a homeless encampment may go for $10. The company plans to create levels of juicers, like a video game. 

Sharma, who has harvested more than 1,000 scooters, may be considered a super juicer. She can get 29 scooters in her truck. The work can be tiring. Each scooter weighs 15 kilos. Dealing with the competition is part of the gig. 

“There’s been many instances where I’ve been standing right next to a scooter just waiting for my app to kick in so I can collect the scooter,” she said. “Somebody’s come up from behind me just taking it, like, don’t you see me standing here?”

Sharma’s nightly hunt takes a lot of stamina. She works six nights a week, and wakes up at 3:30 a.m. to put all the scooters around the city before 7 a.m. She gets paid by 7:30 a.m. each day. 

As the gig economy grows, and more jobs like juicers are created, people like Sharma, who are willing to hustle, are finding new kinds of work. 

WSJ: Google Hid Protracted Data Leak to Avoid Consequences

Google exposed the personal data of about 500,000 Google+ users to potential misuse by outside developers for years through a bug, then concealed the error to avoid consequences, according to an investigation published by The Wall Street Journal Monday.

Parent company Alphabet Inc responded by announcing it would shut down Google+, a largely defunct social network launched in 2011 to compete with Facebook. Shares of Alphabet Inc fell by about 1 percent in response to the story.  

“Our Privacy & Data Protection Office reviewed this issue, looking at the type of data involved, whether we could accurately identify the users to inform, whether there was any evidence of misuse, and whether there were any actions a developer or user could take in response,” Google said of the error in a statement to VOA News. “None of these thresholds were met in this instance.”

The report alleges that the bug became active in 2015, only being discovered by Google and shut down in March of this year. Google confirmed that it had discovered the bug in March, but would not say when it became active.

The Wall Street Journal says it reviewed an internal memo circulated among Google’s legal staff and senior executives that warned of “immediate regulatory interest” and public comparisons to Facebook’s user information leak to Cambridge Analytica should the mistake become public.

According to the paper, the memo said that while Google could not find evidence that the exposed data had been misused, it also could not prove that misuse did not happen.

CEO Sundar Pichai was reportedly informed of the decision to not tell users after it had already been made by an internal committee.

The data exposed included full names, email addresses, birth dates, gender, profile pictures, places lived, occupations and relationship status. It did not include phone numbers, the content of emails or messages, or other kinds of communication data.

Google also said it would begin restricting the data it provides to outside developers. Hours after the story broke, “Google+” was a top trending term on Twitter.

Twitter Says it Will Crack Down on Abusers in Letter to Advisers

Twitter will strengthen rules rules to prevent sexual harassment and abuse on its platform, the social media company said Monday in an email to the collection of safety advocates, researchers and academics it uses help set its policies. There will also be harsher penalties for misconduct.

The new guidelines include immediately and permanently suspending the accounts of anyone who posts or is the source of non-consensual nudity. Twitter’s definition of non-consensual nudity will be expanded to include photos that are taken covertly.

Third parties will now be able to report unwanted sexual advances from one user to another. Previously, only those directly involved in the matter could do so.

Twitter also promised to publish new rules adding hate symbols and imagery to its definition of sensitive media.

The changes come on the heels of a series of tweets from CEO Jack Dorsey Friday pledging to limit the number of bullies and harassers using Twitter.

The micro-blogging platform faced intense criticism last year after it temporarily banned actress Rose McGowan last year for a tweeting out contact information for person she said was connected with Harvey Weinstein, who has faced accusations of sexual assault from McGowan and others.

Facebook Wants People to Invite Its Cameras into Their Homes

Facebook is launching the first electronic device to bear its brand, a screen and camera-equipped gadget intended to make video calls easier and more intuitive.

But it’s unclear if people will open their homes to an internet-connected camera sold by a company with a shoddy track record on protecting user privacy.

Facebook is marketing the device, called Portal, as a way for its more than 2 billion users to chat with one another without having to fuss with positioning and other controls. The device features a camera that uses artificial intelligence to automatically pan and zoom as people move around during calls.

The Portal will feature two different screen sizes. It will go on sale in early November for roughly $200 to $350.

Internet of Things Could Revolutionize City Planning

The massive breach of Facebook and the exposure of the information of an estimated 50 million users last week has highlighted one of the problems with all the data we are putting out into the world. City planners share those concerns, but they’re looking also looking at how “Big Data” may be a big boost in helping their own cities develop. VOA’s Kevin Enochs reports.

DHS: No Reason to Doubt Firms’ Denials of China Hack

The U.S. Department of Homeland Security said Saturday it currently had no reason to doubt statements from companies that have denied a Bloomberg report that their supply chains were compromised by malicious computer chips inserted by Chinese intelligence services.

“The Department of Homeland Security is aware of the media reports of a technology supply chain compromise,” DHS said in a statement.

“Like our partners in the UK, the National Cyber Security Centre, at this time we have no reason to doubt the statements from the companies named in the story,” it said.

Bloomberg Businessweek on Thursday cited 17 unidentified intelligence and company sources as saying that Chinese spies had placed computer chips inside equipment used by around 30 companies, as well as multiple U.S. government agencies, which would give Beijing secret access to internal networks.

Apple and Amazon

Britain’s national cyber security agency said Friday it had no reason to doubt the assessments made by Apple Inc and Amazon.com Inc challenging the report.

Apple contested the Bloomberg report Thursday, saying its own internal investigations found no evidence to support the story’s claims and that neither the company, nor its contacts in law enforcement, were aware of any investigation by the FBI on the matter.

Apple’s recently retired general counsel, Bruce Sewell, told Reuters he called the FBI’s then-general counsel, James Baker, last year after being told by Bloomberg of an open investigation of Super Micro Computer Inc, a hardware maker whose products Bloomberg said were implanted with malicious Chinese chips.

“I got on the phone with him personally and said, ‘Do you know anything about this?” Sewell said of his conversation with Baker. “He said, ‘I’ve never heard of this, but give me 24 hours to make sure.’ He called me back 24 hours later and said ‘Nobody here knows what this story is about.” Baker and the FBI declined to comment Friday.

Robotic Farm Promises Cheap Local Produce

The U.S. farm-to-table trend is definitely one of the latest. Americans are hungry for fresh, organic produce in their homes, and in many cases they are willing to pay more for it. But in an urban setting, residents don’t have a farm next door. The company Iron Ox is looking to change that, with the help of robust robotics. VOA’s Kevin Enochs has the story.

US Plans to Rewrite Rules that Impede Self-driving Cars

The Trump administration is moving ahead with plans to revise safety rules that bar fully self-driving cars from the roads without equipment such as steering wheels, pedals and mirrors, according to a document made public on Thursday.

The National Highway Traffic Safety Administration (NHTSA) “intends to reconsider the necessity and appropriateness of its current safety standards” as applied to automated vehicles, the U.S. Department of Transportation said in an 80-page update of its principles dubbed “Automated Vehicles 3.0.”

The department, as reported by Reuters earlier on Thursday, disclosed that the NHTSA wants comment “on proposed changes to particular safety standards to accommodate automated vehicle technologies and the possibility of setting exceptions to certain standards that are relevant only when human drivers are present.”

U.S. Transportation Secretary Elaine Chao released the document at a department event. In the report, Chao said that self-driving cars have the potential to dramatically reduce traffic crashes and road deaths. But she added the “public has legitimate concerns about the safety, security, and privacy of automated technology.”

Automakers must currently meet nearly 75 auto safety standards, many of which were written with the assumption that a licensed driver will be in control of the vehicle.

General Motors Co in January filed a petition seeking an exemption for the current rules to use vehicles without steering wheels and other human controls as part of a ride-sharing fleet it plans to deploy in 2019.

NHTSA has not declared the GM petition complete, a step necessary before it can rule on the merits. NHTSA said it plans to propose modernizing procedures to follow when reviewing exemption petitions.

Alphabet Inc’s Waymo unit plans to launch an autonomous ride-hailing service for the general public with no human driver behind the steering wheel in Arizona later this year. But unlike GM, Waymo’s vehicles will have human controls for the time being.

In March, a self-driving Uber Technologies Inc vehicle struck and killed a pedestrian, while the backup safety driver was watching a video, police said. Uber suspended testing in the aftermath and some safety advocates said the crash showed the system was not safe enough to be tested on public roads.

NHTSA has stepped up its self-driving car focus as legislation in Congress on self-driving cars, which passed the U.S. House of Representatives in 2017, has stalled. It has only a slender chance of being approved in 2018, congressional aides said.

The report said “NHTSA’s current statutory authority to establish motor vehicle safety standards is sufficiently flexible to accommodate the design and performance of different” automated vehicles.

The Center for Auto Safety said NHTSA should require companies to “submit evidence” that their self-driving technology is safe “before involuntarily involving human beings in their testing.”

GM said in a statement on Thursday that “legislation is still urgently needed” to allow “the full deployment of self-driving vehicles.”

Automakers have warned it could take too long for NHTSA to rewrite the rules to allow for the widespread of adoption of self-driving cars without human controls.

The department also said it “no longer recognizes the designations of ten automated vehicle proving grounds” announced in January 2017.

The sites, including a Michigan center that U.S. President Donald Trump visited last year, were named by Congress to be eligible for $60 million in grants “to fund demonstration projects that test the feasibility and safety” of self-driving vehicles.

The Transportation Department also announced it will start studying the workforce impacts of automated vehicles with the Labor, Commerce, and the Health and Human Services departments. 

The report also said the Trump administration will not support calls to end human driving. The department “embraces the freedom of the open road, which includes the freedom for Americans to drive their own vehicles.”

US Warns of New Hacking From China-Linked Group

The U.S. government warned Wednesday that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients.

The Department of Homeland issued a technical alert for cloudhopper, which it said was engaged in cyber espionage and theft of intellectual property, after experts with two prominent U.S. cybersecurity companies warned earlier this week that Chinese hacking activity has surged amid the escalating trade war between Washington and Beijing.

Chinese authorities have repeatedly denied claims by Western cybersecurity firms that it supports hacking.

Homeland Security

Homeland Security released the information to support U.S. companies in responding to attacks by the group, which is targeting information technology, energy, health care, communications and manufacturing firms.

“These cyber threat actors are still active and we strongly encourage our partners in government and industry to work together to defend against this threat,” DHS official Christopher Krebs said in a statement.

The reported increase in Chinese hacking follows what cybersecurity firms have described as a lull in such attacks prompted by a 2015 agreement between Chinese President Xi Jinping and former U.S. President Barrack Obama to curb cyber-enabled economic theft.

“I can tell you now unfortunately the Chinese are back,” Dmitri Alperovitch, chief technology officer of U.S. cybersecurity firm CrowdStrike, said Tuesday at a security conference in Washington.

“We’ve seen a huge pickup in activity over the past year and a half. Nowadays they are the most predominant threat actors we see threatening institutions all over this country and Western Europe,” he said.

Analysts with FireEye, another U.S. cybersecurity firm, said that some of the Chinese hacking groups it tracks have become more active in recent months.

Advice to US firms

Wednesday’s alert provided advice on how U.S. firms can prevent, identify and remediate attacks by cloudhopper, which is also known as Red Leaves and APT10.

The hacking group has largely targeted firms known as managed service providers, which supply telecommunications, technology and other services to business around the globe.

Managed service providers, or MSPs, are attractive targets because their networks provide routes for hackers to access sensitive systems of their many clients, said Ben Read, a senior intelligence manager with FireEye.

“We’ve seen this group route malware through an MSP network to other targets,” Read said.

North Korea Said to Have Stolen a Fortune in Online Bank Heists

North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government in Pyongyang may be gathering steam.

U.S. security firm FireEye raised the alarm Wednesday over a North Korean group that it says has stolen hundreds of millions of dollars by infiltrating the computer systems of banks around the world since 2014 through highly sophisticated and destructive attacks that have spanned at least 11 countries. It says the group is still operating and poses “an active global threat.”

It is part of a wider pattern of malicious state-backed cyber activity that has led the Trump administration to identify North Korea — along with Russia, Iran and China — as one of the main online threats facing the United States. Last month, the Justice Department charged a North Korean hacker said to have conspired in devastating cyberattacks, including an $81 million heist of Bangladesh’s central bank and the WannaCry virus that crippled parts of Britain’s National Health Service.

DHS offers warning

On Tuesday, the U.S. Department of Homeland Security warned of the use of malware by Hidden Cobra, the U.S. government’s byword for North Korea hackers, in fraudulent ATM cash withdrawals from banks in Asia and Africa. It said that Hidden Cobra was behind the theft of tens of millions of dollars from teller machines in the past two years. In one incident this year, cash had been simultaneously withdrawn from ATMs in 23 different countries, it said.

North Korea, which prohibits access to the world wide web for virtually all of its people, has previously denied involvement in cyberattacks, and attribution for such attacks is rarely made with absolute certainty. It is typically based on technical indicators such as the Internet Protocol, or IP, addresses that identify computers and characteristics of the coding used in malware, which is the software a hacker may use to damage or disable computers.

But other cybersecurity experts tell The Associated Press that they also see continued signs that North Korea’s authoritarian government, which has a long track record of criminality to raise cash, is conducting malign activity online. That activity includes targeting of financial institutions and crypto-currency-related organizations, as well as spying on its adversaries, despite the easing of tensions between Pyongyang and Washington.

“The reality is they are starved for cash and are continuing to try and generate revenue, at least until sanctions are diminished,” said Adam Meyers, vice president of intelligence at CrowdStrike. “At the same time, they won’t abate in intelligence collection operations, as they continue to negotiate and test the international community’s resolve and test what the boundaries are.”

North Korea attacks continue

CrowdStrike says it has detected continuing North Korean cyber intrusions in the past two months, including the use of a known malware against a potentially broad set of targets in South Korea, and a new variant of malware against users of mobile devices that use a Linux-based operating system.

This activity has been taking place against the backdrop of a dramatic diplomatic shift as Kim Jong Un has opened up to the world. He has held summits with South Korean President Moon Jae-in and with President Donald Trump, who hopes to persuade Kim to relinquish the nuclear weapons that pose a potential threat to the U.S. homeland. Tensions on the divided Korean Peninsula have dropped and fears of war with the U.S. have ebbed. Trump this weekend will dispatch his top diplomat, Mike Pompeo, to Pyongyang for the fourth time this year to make progress on denuclearization.

But North Korea has yet to take concrete steps to give up its nuclear arsenal, so there’s been no let-up in sanctions that have been imposed to deprive it of fuel and revenue for its weapons programs, and to block it from bulk cash transfers and accessing to the international banking system.

FireEye says APT38, the name it gives to the hacking group dedicated to bank theft, has emerged and stepped up its operations since February 2014 as the economic vise on North Korea has tightened in response to its nuclear and missile tests. Initial operations targeted financial institutions in Southeast Asia, where North Korea had experience in money laundering, but then expanded into other regions such as Latin America and Africa, and then extended to Europe and North America.

In all, FireEye says APT38 has attempted to steal $1.1 billion, and based on the data it can confirm, has gotten away with hundreds of millions in dollars. It has used malware to insert fraudulent transactions in the Society for Worldwide Interbank Financial Telecommunication or SWIFT system that is used to transfer money between banks. Its biggest heist to date was $81 million stolen from the central bank of Bangladesh in February 2016. The funds were wired to bank accounts established with fake identities in the Philippines. After the funds were withdrawn they were suspected to have been laundered in casinos.

Cyber attacks an alternative 

The Foundation for Defense of Democracies, a Washington think tank, said in a report Wednesday that North Korea’s cyber capabilities provide an alternative means for challenging its adversaries. While Kim’s hereditary regime appears to prioritize currency generation, attacks using the SWIFT system raise concerns that North Korean hackers “may become more proficient at manipulating the data and systems that undergird the global financial system,” it says.

Sandra Joyce, FireEye’s head of global intelligence, said that while APT38 is a criminal operation, it leverages the skills and technology of a state-backed espionage campaign, allowing it to infiltrate multiple banks at once and figure how to extract funds. On average, it dwells in a bank’s computer network for 155 days to learn about its systems before it tries to steal anything. And when it finally pounces, it uses aggressive malware to wreak havoc and cover its tracks.

“We see this as a consistent effort, before, during and after any diplomatic efforts by the United States and the international community,” said Joyce, describing North Korea as being “undeterred” and urging the U.S. government to provide more specific threat information to financial institutions about APT38’s modus operandi. APT stands for Advanced Persistent Threat.

Large Chile bank hacked

The Silicon Valley-based company says it is aware of continuing, suspected APT38 operations against other banks. The most recent attack it is publicly attributing to APT38 was against of Chile’s biggest commercial banks, Banco de Chile, in May this year. The bank has said a hacking operation robbed it of $10 million.

FireEye, which is staffed with a roster of former military and law-enforcement cyberexperts, conducted malware analysis for a criminal indictment by the Justice Department last month against Park Jin Hyok, the first time a hacker said to be from North Korea has faced U.S. criminal charges. He’s accused of conspiring in a number of devastating cyberattacks: the Bangladesh heist and other attempts to steal more than $1 billion from financial institutions around the world; the 2014 breach of Sony Pictures Entertainment; and the WannaCry ransomware virus that in 2017 infected computers in 150 countries. 

Meet Farmers of  Future: Robot

Brandon Alexander would like to introduce you to Angus, the farmer of the future. He’s heavyset, weighing in at nearly 1,000 pounds, not to mention a bit slow. But he’s strong enough to hoist 800-pound pallets of maturing vegetables and can move them from place to place on his own.

Sure, Angus is a robot. But don’t hold that against him, even if he looks more like a large tanning bed than C-3PO.

To Alexander, Angus and other robots are key to a new wave of local agriculture that aims to raise lettuce, basil and other produce in metropolitan areas while conserving water and sidestepping the high costs of human labor. It’s a big challenge, and some earlier efforts have flopped. Even Google’s “moonshot” laboratory, known as X, couldn’t figure out how to make the economics work.

After raising $6 million and tinkering with autonomous robots for two years, Alexander’s startup Iron Ox says it’s ready to start delivering crops of its robotically grown vegetables to people’s salad bowls. “And they are going to be the best salads you ever tasted,” says the 33-year-old Alexander, a one-time Oklahoma farmboy turned Google engineer turned startup CEO.

Iron Ox planted its first robot farm in an 8,000-square-foot warehouse in San Carlos, California, a suburb located 25 miles south of San Francisco. Although no deals have been struck yet, Alexander says Iron Ox has been talking to San Francisco Bay area restaurants interested in buying its leafy vegetables and expects to begin selling to supermarkets next year.

The San Carlos warehouse is only a proving ground for Iron Ox’s long-term goals. It plans to set up robot farms in greenhouses that will rely mostly on natural sunlight instead of high-powered indoor lighting that sucks up expensive electricity. Initially, though, the company will sell its produce at a loss in order to remain competitive.

During the next few years, Iron Ox wants to open robot farms near metropolitan areas across the U.S. to serve up fresher produce to restaurants and supermarkets. Most of the vegetables and fruit consumed in the U.S. is grown in California, Arizona, Mexico and other nations. That means many people in U.S. cities are eating lettuce that’s nearly a week old by the time it’s delivered.

There are bigger stakes as well. The world’s population is expected to swell to 10 billion by 2050 from about 7.5 billion now, making it important to find ways to feed more people without further environmental impact, according to a report from the World Resources Institute.

Iron Ox, Alexander reasons, can be part of the solution if its system can make the leap from its small, laboratory-like setting to much larger greenhouses.

The startup relies on a hydroponic system that conserves water and automation in place of humans who seem increasingly less interested in U.S. farming jobs that pay an average of $13.32 per hour, according to the U.S. Department of Agriculture. Nearly half of U.S. farmworkers planting and picking crops aren’t in the U.S. legally, based on a survey by the U.S. Department of Labor.

The heavy lifting on Iron Ox’s indoor farm is done by Angus, which rolls about the indoor farm on omnidirectional wheels. Its main job is to shuttle maturing produce to another, as-yet unnamed robot, which transfers plants from smaller growing pods to larger ones, using a mechanical arm whose joints are lubricated with “food-safe” grease.

It’s a tedious process to gently pick up each of the roughly 250 plants on each pallet and transfer them to their bigger pods, but the robot doesn’t seem to mind the work. Iron Ox still relies on people to clip its vegetables when they are ready for harvest, but Alexander says it is working on another robot that will eventually handle that job too.

Alexander formerly worked on robotics at Google X, but worked on drones, not indoor farms. While there, he met Jon Binney, Iron Ox’s co-founder and chief technology offer. The two men became friends and began to brainstorm about ways they might be able to use their engineering skills for the greater good.

“If we can feed people using robots, what could be more impactful than that?” Alexander says.

 

                 

Irish Regulator Opens Facebook Data Breach Investigation

Ireland’s data regulator has launched an investigation of Facebook over a recent data breach that allowed hackers access 50 million accounts which could potentially cost Facebook more than $1.6 billion in fines.

The Irish Data Protection Commission said Wednesday that it will look into whether the U.S. social media company complied with European regulations that went into effect earlier this year covering data protection.

It’s the latest headache for Facebook in Europe, where authorities are turning up the heat on dominant tech firms over data protection. Last month, European Union consumer protection chief Vera Jourova said that she was growing impatient with Facebook for being too slow in clarifying the fine print in its terms of service covering what happens to user data and warned that the company could face sanctions.

The commission said in a statement that it would examine whether Facebook put in place “appropriate technical and organizational measures to ensure the security and safeguarding of the personal data it processes.”

The commission said earlier this week the number of EU accounts potentially affected numbered less than 5 million.

Ireland, which is Facebook’s lead privacy regulator for Europe, is moving swiftly to investigate the U.S. tech company since the breach became public on Friday.

Facebook said Friday attackers gained the ability to “seize control” of user accounts by stealing digital keys the company uses to keep users logged in. They could do so by exploiting three distinct bugs in Facebook’s code.

The company said it has fixed the bugs and logged out the 50 million breached users — plus another 40 million who were vulnerable to the attack — in order to reset those digital keys. Facebook said it doesn’t know who was behind the attacks or where they’re based. Neither passwords nor credit card data was stolen. At the time, the company said it alerted the FBI and regulators in the U.S. and Europe.

Facebook on Wednesday didn’t immediately return a request for comment.

Facebook has faced a tumultuous year of security problems and privacy issues . News broke early this year that a data analytics firm once employed by the Trump campaign, Cambridge Analytica, had improperly gained access to personal data from millions of user profiles. Then a congressional investigation found that agents from Russia and other countries have been posting fake political ads since at least 2016. In April, Zuckerberg appeared at a congressional hearing focused on Facebook’s privacy practices.

The European Union implemented stronger data and privacy rules, known as General Data Protection Regulation, in May.

The case could prove to be the first major test of GDPR. Under the new rules, companies could be hit with fines equal to 4 percent of annual global turnover for the most serious violations. In Facebook’s case, that could amount to more than $1.6 billion based on its 2017 revenues.

The new rules also require companies to disclose any breaches within 72 hours. The commission said Facebook informed it that its internal investigation is continuing and that it is taking actions to “mitigate the potential risk to users.”

Trump to Meet With Google CEO, Other Tech Heads in October

U.S. President Donald Trump plans to meet with Google CEO Sundar Pichai and other tech executives this month at a social media summit.

White House economic adviser Larry Kudlow said Tuesday that the administration hoped Facebook and Twitter would send representatives to the meeting. Kudlow added the event would most likely happen in mid-October, though no date has been set.

Prominent conservatives, including the president, have accused Facebook, Google and Twitter of silencing right-leaning voices on their platforms, a suspected practice called “shadow banning.”

Kudlow had a meeting with Pichai last Friday, which he described as “great.”

Pichai drew flack from senators last month after failing to send an executive to a hearing, and he has agreed appear at another.

3D Map of Singapore Helps City Planner Prepare for Future

Imagine seeing an incredibly detailed map of your home city in three dimensions, with every citizen carrying a cell phone showing up as a dot on that map. Well, you can’t because there are security issues galore when it comes to tracking people online. But you should know it’s possible, at least in Singapore, where city planners are considering how the technology may help improve life. VOA’s Kevin Enochs reports.

Can Wireless Challenge Cable for Home Internet Service?

Cellular companies such as Verizon are looking to challenge traditional cable companies with residential internet service that promises to be ultra-fast, affordable and wireless.

Using an emerging wireless technology known as 5G, Verizon’s 5G Home service provides an alternative to cable for connecting laptops, phones, TVs and other devices over Wi-Fi. It launches in four U.S. cities on Monday.

Verizon won’t be matching cable companies on packages that also come with TV channels and home phone service. But fewer people have been subscribing to such bundles anyway, as they embrace streaming services such as Netflix for video and cellphone services instead of landline.

“That’s the trend that cable has been having problems with for several years, and a trend that phone companies can take advantage of,” Gartner analyst Bill Menzes said.

That’s if the wireless companies can offer a service that proves affordable and effective.

T-Mobile and Sprint are also planning a residential 5G service as part of their merger proposal, though few details are known.

Verizon’s broadband-only service will cost $70 a month, with a $20 discount for Verizon cellular customers. According to Leichtman Research Group, the average price for broadband internet is about $60, meaning only some customers will be saving money.

Even so, Verizon can try to win over some customers with promises of reliability.

Verizon says its service will be much faster than cable. That means downloading a two-hour movie in high definition in two minutes rather than 21. The service promises to let families play data-intensive games and watch video on multiple devices at once, with little or no lag.

“The things that really matter to a customer are how fast it is and how reliable it is,” longtime telecom analyst Dave Burstein said. In tests of Verizon’s 5G so far, he said, “reliability is proving out quite nicely.”

Verizon could also capitalize on many people’s frustration with their cable companies. Consumer Reports magazine says customers have long been unhappy with perceived weak customer service, high prices and hidden fees.

The residential 5G service is part of a broader upgrade in wireless technology.

Verizon has spent billions of dollars for rights to previously unused radio waves at the high end of the frequency spectrum. It’s a short-range signal, ideal for city blocks and apartment buildings, but less so for sprawling suburbs or rural communities. That’s why Verizon is pushing residential service first, while AT&T is building a more traditional cellular network for people on the go, using radio waves at the lower end.

AT&T is aiming to launch its 5G mobile network this year in 12 cities, including Atlanta and Charlotte, North Carolina. Dish also has plans for a 5G network, but it’s focused on connecting the so-called “Internet of Things,” everything from laundry machines to parking meters, rather than cellphones or residential broadband.

Sprint tried to introduce residential wireless service before, using a technology called WiMax, but it failed to gain many subscribers as LTE trumped WiMax as the dominant cellular technology. This time, Verizon is using the same 5G technology that will eventually make its way into 5G cellular networks.

The Verizon service will start in parts of Houston, Indianapolis, Los Angeles, and Sacramento, California.

“These are small areas but significant,” said Ronan Dunne, president of Verizon Wireless. “Tens of thousands of homes, not hundreds of thousands of homes.” Eventually, Verizon projects 30 million homes in the U.S. will be eligible, though there’s no timeline.

For now, Verizon isn’t planning to hit markets where it already has its cable-like Fios service. Verizon stopped expanding Fios around 2010, in part because it was expensive to dig up streets and lay fiber-optic lines. Verizon can build 5G more cheaply because it can use the same towers available for cellular service.

That said, Verizon might not recoup its costs if it ends up drawing only customers who stand to save money over cable, said John Horrigan, a broadband expert at the Technology Policy Institute.

And while Verizon says the new network will be able to handle lots of devices at once, anyone who’s tried to use a phone during concerts and conferences will know that the airwaves can get congested quickly.

What Verizon’s service won’t do is extend high-speed internet access to rural America, where many households can’t get broadband at all, let alone competition. Cable and other companies haven’t found it profitable to extend wires to remote parts of the country. But Verizon will face the same problem, given that its short-range signal will require several wireless towers closer together. That’s feasible only in densely populated areas.

That’s not good enough, said Harold Feld, senior vice president of the advocacy group Public Knowledge. He said internet service at reasonable prices is “fundamental” for all Americans — not just those who live in populated areas.

T-Mobile and Sprint want to jointly create a 5G network that would also offer residential wireless broadband, but not for a few years. In seeking regulatory approval, the companies say 20 percent to 25 percent of subscribers will be in rural areas that have limited access to broadband. But the companies offered no details on how they would do so. T-Mobile and Sprint declined to comment.

 

A Pakistani American Startup Fighting Media Censorship

According to the latest report by the Committee to Protect Journalists in Pakistan, fatal violence against journalists has declined, but fear and self-censorship have grown. In this era, five Pakistani American students at Harvard University have created a startup that challenges censorship using the latest block-chain technology. Their mission is “making journalism truly free.” Saqib Ul Islam visited Harvard’s innovation lab to bring us the story of a new company called “Inkrypt.”

Google CEO to Testify Before US House on Bias Accusations

Google Chief Executive Sundar Pichai has agreed to testify before the U.S. House Judiciary Committee later this year over Republican concerns that the company is biased against conservatives, a senior Republican said Friday.

Republicans want to question Google, the search engine of Alphabet Inc, about whether its search algorithms are influenced by human bias. They also want to probe it on issues such as privacy, classification of news and opinion, and dealing with countries with human rights violations.

Pichai met with senior Republicans on Friday to discuss their concerns, House Majority Leader Kevin McCarthy said.

McCarthy told reporters after the meeting that it was “very productive” and “frank.”

“I think we’ve really shown that there is bias, which is human nature, but you have to have transparency and fairness,” McCarthy said. “As big tech’s business grows, we have not had enough transparency and that has led to an erosion of trust and, perhaps worse, harm to consumers.”

Alphabet Inc’s Google unit has repeatedly denied accusations of bias against conservatives. Pichai left the meeting without comment.

Pichai wrote in an internal email last week that suggestions that Google would interfere in search results for political reasons were “absolutely false. We do not bias our products to favor any political agenda.”

The CEO had been scheduled to be in Asia this week but canceled the trip to be in Washington.

The hearing will take place after the midterm congressional elections in November, McCarthy said.

Google came under fire from members of both parties earlier this month for refusing to send a top executive to a Senate Intelligence Committee hearing that included Facebook Inc and Twitter Inc executives.

Republicans have also raised concerns about Google’s dominance. Earlier this week, the Justice Department met with state attorneys general to focus on the need to protect consumer privacy when big technology companies amass vast troves of data, but came to no immediate conclusions.

Asked if Republicans will push to break up Google, McCarthy said: “I don’t see that.” He said the hearing will look at privacy, bias issues, China and other matters.

Pichai is also meeting with Democratic lawmakers and is due to meet with White House economic adviser Larry Kudlow on Friday, a White House official said Thursday.

Facebook Tightens Security After Announcing Breach

The security breach Facebook announced Friday that affected 50 million users was a setback for the social media giant, which has been working for months to regain customers’ trust over how it handles their data.

In addition to the 50 million users whose log-on information could have been accessed by hackers, the company required as a precaution another 40 million to log on to be able to get on their accounts. Facebook said it reported the breach of the company’s code, which the firm said it fixed, to law enforcement.

The social media company was not sure Friday whether any personal information had been gathered or misused, but it scrambled to address the issue, which was discovered earlier in the week. Facebook users may find they have to relink their Facebook accounts to their Instagram accounts, and possibly to third-party apps, which users often log on to with their Facebook accounts.

In a call Friday with reporters, Guy Rosen, Facebook vice president of product management, said that the breach appeared to be very broad with no specific country targeted. “We’ll update with what we learn,” he said. 

Focus on elections

The breach came just weeks before the U.S. midterm elections, something the company has been keenly focused on.

More than 300 Facebook workers are scouring the platform, looking for false news, fake accounts and disinformation campaigns by foreign state-sponsored operatives that may be trying to sway voters. Facebook executives have said that they did not do enough to address these issues in the run-up to other elections such as the 2016 U.S. presidential race and that they are working to fix them.

In addition, Facebook’s relationship with its 2 billion users took a hit last spring when it was disclosed that an outside researcher who was given access to Facebook data used the information for political campaigns. As a result, the company contacted users whose information might have been seen or used by the outside firm Cambridge Analytica.

“We have a responsibility to protect your data, and if we can’t, then we don’t deserve to serve you,” Facebook CEO Mark Zuckerberg said in a statement posted to his Facebook page in March.

‘View As’ tool

The company said hackers exploited the privacy feature known as “View As,” which lets users see how their own profiles would look to other people. Facebook said hackers were then able to use the security flaw to steal log-in keys, called access tokens, that could allow them to access people’s accounts.

“We’re a big fan of ‘View As’ here at EFF,” said Gennie Gebhart, associate director of research at the Electronic Frontier Foundation, the digital civil liberties group. “It’s one good way to make sure that your privacy settings are the way you want them to be. I can see what my friends see or friends of friends see.”

But by checking what a friend can see, the “View As” tool actually made one’s friend vulnerable to this hack.

A relatively new feature that allowed users to upload “Happy Birthday” videos was part of a combination of three bugs that contributed to the vulnerability, the social media firm said.

“It’s one of those weird things that daisy-chained together,” Gebhart added.

Facebook said it was shutting down “View As” until further notice.

The hackers “used the access tokens to query data, but there are no public reports of abusing the access to post updates to timelines or spread disinformation,” said Travis Smith, principal security researcher at Tripwire, a security firm. “This could be because they were only after data or it could be that their attack was cut off midstream by Facebook before they could reach their ultimate goal.”

Security advice

Affected Facebook users should take some additional steps, said Gary Davis, the chief consumer security evangelist at security firm McAfee, who wrote about the Facebook hack in a blog post.

Among them, users should change their log-in information. “Since this flaw logged users out, it’s vital you change up your log-in information,” he wrote. 

He also stressed users should update their Facebook apps as soon as possible.

“Facebook has already issued a fix to this vulnerability, so make sure you update immediately,” he wrote.