All posts by MTechnology

Popularity of Electric Scooters Creates Jobs for ‘Juicers’

You see them everywhere in U.S. cities — young and old riding rented electric-powered scooters. When they are done, they can leave the scooters anywhere. 

Someone has to find and charge the scooters, then return them to designated hot spots where customers can use them the next day. And that has given rise to a new line of work — scooter juicers. 

Shivali Sharma is a stay-at-home mom in San Jose, California, and a Marine staff sergeant on medical leave. She works as a juicer to earn money while her boys sleep. 

“The hunt is fun,” she said.

It’s a new kind of piece work, made possible by GPS and phone apps. 

Sharma and her family noticed the scooters being left on their streets. It intrigued them.

“We were like, ‘What is this scooter doing? Who does it belong to?’” she said.

Then they heard about juicing and signed up. The company sent them charging stations. 

For the past several months, Sharma’s routine is set. Each night, this single mom leaves her twins with her parents and checks her phone app for Lime scooters scattered around the city, sending out GPS locator signals, all needing to be charged. She earns $6 per scooter, more if the scooter is harder to reach.

Charging scooters at home

For the scooter companies, juicers solve two problems — finding the scooters and then using their own electricity to charge them before putting them back on the streets. 

The competition among the juicers is part of the appeal, something Lime, one of the scooter companies, didn’t expect.

“The fact that juicers compare it to Pokemon Go is a happy accident,” said Will Lee, project manager at Lime, a San Francisco-based electric bike and scooter company. “Now that we’ve hit on this motivation, this gamification motivation among the juicers, we have done things to maybe amplify it or try to feed into folks’ natural desire to play the game.”

Gamification of work

To increase juicers’ engagement as the night progresses, Lime raises the dollar amount a juicer can get per scooter. A scooter in the middle of a homeless encampment may go for $10. The company plans to create levels of juicers, like a video game. 

Sharma, who has harvested more than 1,000 scooters, may be considered a super juicer. She can get 29 scooters in her truck. The work can be tiring. Each scooter weighs 15 kilos. Dealing with the competition is part of the gig. 

“There’s been many instances where I’ve been standing right next to a scooter just waiting for my app to kick in so I can collect the scooter,” she said. “Somebody’s come up from behind me just taking it, like, don’t you see me standing here?”

Sharma’s nightly hunt takes a lot of stamina. She works six nights a week, and wakes up at 3:30 a.m. to put all the scooters around the city before 7 a.m. She gets paid by 7:30 a.m. each day. 

As the gig economy grows, and more jobs like juicers are created, people like Sharma, who are willing to hustle, are finding new kinds of work. 

Popularity of Electric Scooters Creates Jobs for ‘Juicers’

You see them everywhere in U.S. cities — young and old riding rented electric-powered scooters. When they are done, they can leave the scooters anywhere. 

Someone has to find and charge the scooters, then return them to designated hot spots where customers can use them the next day. And that has given rise to a new line of work — scooter juicers. 

Shivali Sharma is a stay-at-home mom in San Jose, California, and a Marine staff sergeant on medical leave. She works as a juicer to earn money while her boys sleep. 

“The hunt is fun,” she said.

It’s a new kind of piece work, made possible by GPS and phone apps. 

Sharma and her family noticed the scooters being left on their streets. It intrigued them.

“We were like, ‘What is this scooter doing? Who does it belong to?’” she said.

Then they heard about juicing and signed up. The company sent them charging stations. 

For the past several months, Sharma’s routine is set. Each night, this single mom leaves her twins with her parents and checks her phone app for Lime scooters scattered around the city, sending out GPS locator signals, all needing to be charged. She earns $6 per scooter, more if the scooter is harder to reach.

Charging scooters at home

For the scooter companies, juicers solve two problems — finding the scooters and then using their own electricity to charge them before putting them back on the streets. 

The competition among the juicers is part of the appeal, something Lime, one of the scooter companies, didn’t expect.

“The fact that juicers compare it to Pokemon Go is a happy accident,” said Will Lee, project manager at Lime, a San Francisco-based electric bike and scooter company. “Now that we’ve hit on this motivation, this gamification motivation among the juicers, we have done things to maybe amplify it or try to feed into folks’ natural desire to play the game.”

Gamification of work

To increase juicers’ engagement as the night progresses, Lime raises the dollar amount a juicer can get per scooter. A scooter in the middle of a homeless encampment may go for $10. The company plans to create levels of juicers, like a video game. 

Sharma, who has harvested more than 1,000 scooters, may be considered a super juicer. She can get 29 scooters in her truck. The work can be tiring. Each scooter weighs 15 kilos. Dealing with the competition is part of the gig. 

“There’s been many instances where I’ve been standing right next to a scooter just waiting for my app to kick in so I can collect the scooter,” she said. “Somebody’s come up from behind me just taking it, like, don’t you see me standing here?”

Sharma’s nightly hunt takes a lot of stamina. She works six nights a week, and wakes up at 3:30 a.m. to put all the scooters around the city before 7 a.m. She gets paid by 7:30 a.m. each day. 

As the gig economy grows, and more jobs like juicers are created, people like Sharma, who are willing to hustle, are finding new kinds of work. 

WSJ: Google Hid Protracted Data Leak to Avoid Consequences

Google exposed the personal data of about 500,000 Google+ users to potential misuse by outside developers for years through a bug, then concealed the error to avoid consequences, according to an investigation published by The Wall Street Journal Monday.

Parent company Alphabet Inc responded by announcing it would shut down Google+, a largely defunct social network launched in 2011 to compete with Facebook. Shares of Alphabet Inc fell by about 1 percent in response to the story.  

“Our Privacy & Data Protection Office reviewed this issue, looking at the type of data involved, whether we could accurately identify the users to inform, whether there was any evidence of misuse, and whether there were any actions a developer or user could take in response,” Google said of the error in a statement to VOA News. “None of these thresholds were met in this instance.”

The report alleges that the bug became active in 2015, only being discovered by Google and shut down in March of this year. Google confirmed that it had discovered the bug in March, but would not say when it became active.

The Wall Street Journal says it reviewed an internal memo circulated among Google’s legal staff and senior executives that warned of “immediate regulatory interest” and public comparisons to Facebook’s user information leak to Cambridge Analytica should the mistake become public.

According to the paper, the memo said that while Google could not find evidence that the exposed data had been misused, it also could not prove that misuse did not happen.

CEO Sundar Pichai was reportedly informed of the decision to not tell users after it had already been made by an internal committee.

The data exposed included full names, email addresses, birth dates, gender, profile pictures, places lived, occupations and relationship status. It did not include phone numbers, the content of emails or messages, or other kinds of communication data.

Google also said it would begin restricting the data it provides to outside developers. Hours after the story broke, “Google+” was a top trending term on Twitter.

WSJ: Google Hid Protracted Data Leak to Avoid Consequences

Google exposed the personal data of about 500,000 Google+ users to potential misuse by outside developers for years through a bug, then concealed the error to avoid consequences, according to an investigation published by The Wall Street Journal Monday.

Parent company Alphabet Inc responded by announcing it would shut down Google+, a largely defunct social network launched in 2011 to compete with Facebook. Shares of Alphabet Inc fell by about 1 percent in response to the story.  

“Our Privacy & Data Protection Office reviewed this issue, looking at the type of data involved, whether we could accurately identify the users to inform, whether there was any evidence of misuse, and whether there were any actions a developer or user could take in response,” Google said of the error in a statement to VOA News. “None of these thresholds were met in this instance.”

The report alleges that the bug became active in 2015, only being discovered by Google and shut down in March of this year. Google confirmed that it had discovered the bug in March, but would not say when it became active.

The Wall Street Journal says it reviewed an internal memo circulated among Google’s legal staff and senior executives that warned of “immediate regulatory interest” and public comparisons to Facebook’s user information leak to Cambridge Analytica should the mistake become public.

According to the paper, the memo said that while Google could not find evidence that the exposed data had been misused, it also could not prove that misuse did not happen.

CEO Sundar Pichai was reportedly informed of the decision to not tell users after it had already been made by an internal committee.

The data exposed included full names, email addresses, birth dates, gender, profile pictures, places lived, occupations and relationship status. It did not include phone numbers, the content of emails or messages, or other kinds of communication data.

Google also said it would begin restricting the data it provides to outside developers. Hours after the story broke, “Google+” was a top trending term on Twitter.

Twitter Says it Will Crack Down on Abusers in Letter to Advisers

Twitter will strengthen rules rules to prevent sexual harassment and abuse on its platform, the social media company said Monday in an email to the collection of safety advocates, researchers and academics it uses help set its policies. There will also be harsher penalties for misconduct.

The new guidelines include immediately and permanently suspending the accounts of anyone who posts or is the source of non-consensual nudity. Twitter’s definition of non-consensual nudity will be expanded to include photos that are taken covertly.

Third parties will now be able to report unwanted sexual advances from one user to another. Previously, only those directly involved in the matter could do so.

Twitter also promised to publish new rules adding hate symbols and imagery to its definition of sensitive media.

The changes come on the heels of a series of tweets from CEO Jack Dorsey Friday pledging to limit the number of bullies and harassers using Twitter.

The micro-blogging platform faced intense criticism last year after it temporarily banned actress Rose McGowan last year for a tweeting out contact information for person she said was connected with Harvey Weinstein, who has faced accusations of sexual assault from McGowan and others.

Twitter Says it Will Crack Down on Abusers in Letter to Advisers

Twitter will strengthen rules rules to prevent sexual harassment and abuse on its platform, the social media company said Monday in an email to the collection of safety advocates, researchers and academics it uses help set its policies. There will also be harsher penalties for misconduct.

The new guidelines include immediately and permanently suspending the accounts of anyone who posts or is the source of non-consensual nudity. Twitter’s definition of non-consensual nudity will be expanded to include photos that are taken covertly.

Third parties will now be able to report unwanted sexual advances from one user to another. Previously, only those directly involved in the matter could do so.

Twitter also promised to publish new rules adding hate symbols and imagery to its definition of sensitive media.

The changes come on the heels of a series of tweets from CEO Jack Dorsey Friday pledging to limit the number of bullies and harassers using Twitter.

The micro-blogging platform faced intense criticism last year after it temporarily banned actress Rose McGowan last year for a tweeting out contact information for person she said was connected with Harvey Weinstein, who has faced accusations of sexual assault from McGowan and others.

Facebook Wants People to Invite Its Cameras into Their Homes

Facebook is launching the first electronic device to bear its brand, a screen and camera-equipped gadget intended to make video calls easier and more intuitive.

But it’s unclear if people will open their homes to an internet-connected camera sold by a company with a shoddy track record on protecting user privacy.

Facebook is marketing the device, called Portal, as a way for its more than 2 billion users to chat with one another without having to fuss with positioning and other controls. The device features a camera that uses artificial intelligence to automatically pan and zoom as people move around during calls.

The Portal will feature two different screen sizes. It will go on sale in early November for roughly $200 to $350.

Facebook Wants People to Invite Its Cameras into Their Homes

Facebook is launching the first electronic device to bear its brand, a screen and camera-equipped gadget intended to make video calls easier and more intuitive.

But it’s unclear if people will open their homes to an internet-connected camera sold by a company with a shoddy track record on protecting user privacy.

Facebook is marketing the device, called Portal, as a way for its more than 2 billion users to chat with one another without having to fuss with positioning and other controls. The device features a camera that uses artificial intelligence to automatically pan and zoom as people move around during calls.

The Portal will feature two different screen sizes. It will go on sale in early November for roughly $200 to $350.

Internet of Things Could Revolutionize City Planning

The massive breach of Facebook and the exposure of the information of an estimated 50 million users last week has highlighted one of the problems with all the data we are putting out into the world. City planners share those concerns, but they’re looking also looking at how “Big Data” may be a big boost in helping their own cities develop. VOA’s Kevin Enochs reports.

DHS: No Reason to Doubt Firms’ Denials of China Hack

The U.S. Department of Homeland Security said Saturday it currently had no reason to doubt statements from companies that have denied a Bloomberg report that their supply chains were compromised by malicious computer chips inserted by Chinese intelligence services.

“The Department of Homeland Security is aware of the media reports of a technology supply chain compromise,” DHS said in a statement.

“Like our partners in the UK, the National Cyber Security Centre, at this time we have no reason to doubt the statements from the companies named in the story,” it said.

Bloomberg Businessweek on Thursday cited 17 unidentified intelligence and company sources as saying that Chinese spies had placed computer chips inside equipment used by around 30 companies, as well as multiple U.S. government agencies, which would give Beijing secret access to internal networks.

Apple and Amazon

Britain’s national cyber security agency said Friday it had no reason to doubt the assessments made by Apple Inc and Amazon.com Inc challenging the report.

Apple contested the Bloomberg report Thursday, saying its own internal investigations found no evidence to support the story’s claims and that neither the company, nor its contacts in law enforcement, were aware of any investigation by the FBI on the matter.

Apple’s recently retired general counsel, Bruce Sewell, told Reuters he called the FBI’s then-general counsel, James Baker, last year after being told by Bloomberg of an open investigation of Super Micro Computer Inc, a hardware maker whose products Bloomberg said were implanted with malicious Chinese chips.

“I got on the phone with him personally and said, ‘Do you know anything about this?” Sewell said of his conversation with Baker. “He said, ‘I’ve never heard of this, but give me 24 hours to make sure.’ He called me back 24 hours later and said ‘Nobody here knows what this story is about.” Baker and the FBI declined to comment Friday.

DHS: No Reason to Doubt Firms’ Denials of China Hack

The U.S. Department of Homeland Security said Saturday it currently had no reason to doubt statements from companies that have denied a Bloomberg report that their supply chains were compromised by malicious computer chips inserted by Chinese intelligence services.

“The Department of Homeland Security is aware of the media reports of a technology supply chain compromise,” DHS said in a statement.

“Like our partners in the UK, the National Cyber Security Centre, at this time we have no reason to doubt the statements from the companies named in the story,” it said.

Bloomberg Businessweek on Thursday cited 17 unidentified intelligence and company sources as saying that Chinese spies had placed computer chips inside equipment used by around 30 companies, as well as multiple U.S. government agencies, which would give Beijing secret access to internal networks.

Apple and Amazon

Britain’s national cyber security agency said Friday it had no reason to doubt the assessments made by Apple Inc and Amazon.com Inc challenging the report.

Apple contested the Bloomberg report Thursday, saying its own internal investigations found no evidence to support the story’s claims and that neither the company, nor its contacts in law enforcement, were aware of any investigation by the FBI on the matter.

Apple’s recently retired general counsel, Bruce Sewell, told Reuters he called the FBI’s then-general counsel, James Baker, last year after being told by Bloomberg of an open investigation of Super Micro Computer Inc, a hardware maker whose products Bloomberg said were implanted with malicious Chinese chips.

“I got on the phone with him personally and said, ‘Do you know anything about this?” Sewell said of his conversation with Baker. “He said, ‘I’ve never heard of this, but give me 24 hours to make sure.’ He called me back 24 hours later and said ‘Nobody here knows what this story is about.” Baker and the FBI declined to comment Friday.

Robotic Farm Promises Cheap Local Produce

The U.S. farm-to-table trend is definitely one of the latest. Americans are hungry for fresh, organic produce in their homes, and in many cases they are willing to pay more for it. But in an urban setting, residents don’t have a farm next door. The company Iron Ox is looking to change that, with the help of robust robotics. VOA’s Kevin Enochs has the story.

Robotic Farm Promises Cheap Local Produce

The U.S. farm-to-table trend is definitely one of the latest. Americans are hungry for fresh, organic produce in their homes, and in many cases they are willing to pay more for it. But in an urban setting, residents don’t have a farm next door. The company Iron Ox is looking to change that, with the help of robust robotics. VOA’s Kevin Enochs has the story.

US Plans to Rewrite Rules that Impede Self-driving Cars

The Trump administration is moving ahead with plans to revise safety rules that bar fully self-driving cars from the roads without equipment such as steering wheels, pedals and mirrors, according to a document made public on Thursday.

The National Highway Traffic Safety Administration (NHTSA) “intends to reconsider the necessity and appropriateness of its current safety standards” as applied to automated vehicles, the U.S. Department of Transportation said in an 80-page update of its principles dubbed “Automated Vehicles 3.0.”

The department, as reported by Reuters earlier on Thursday, disclosed that the NHTSA wants comment “on proposed changes to particular safety standards to accommodate automated vehicle technologies and the possibility of setting exceptions to certain standards that are relevant only when human drivers are present.”

U.S. Transportation Secretary Elaine Chao released the document at a department event. In the report, Chao said that self-driving cars have the potential to dramatically reduce traffic crashes and road deaths. But she added the “public has legitimate concerns about the safety, security, and privacy of automated technology.”

Automakers must currently meet nearly 75 auto safety standards, many of which were written with the assumption that a licensed driver will be in control of the vehicle.

General Motors Co in January filed a petition seeking an exemption for the current rules to use vehicles without steering wheels and other human controls as part of a ride-sharing fleet it plans to deploy in 2019.

NHTSA has not declared the GM petition complete, a step necessary before it can rule on the merits. NHTSA said it plans to propose modernizing procedures to follow when reviewing exemption petitions.

Alphabet Inc’s Waymo unit plans to launch an autonomous ride-hailing service for the general public with no human driver behind the steering wheel in Arizona later this year. But unlike GM, Waymo’s vehicles will have human controls for the time being.

In March, a self-driving Uber Technologies Inc vehicle struck and killed a pedestrian, while the backup safety driver was watching a video, police said. Uber suspended testing in the aftermath and some safety advocates said the crash showed the system was not safe enough to be tested on public roads.

NHTSA has stepped up its self-driving car focus as legislation in Congress on self-driving cars, which passed the U.S. House of Representatives in 2017, has stalled. It has only a slender chance of being approved in 2018, congressional aides said.

The report said “NHTSA’s current statutory authority to establish motor vehicle safety standards is sufficiently flexible to accommodate the design and performance of different” automated vehicles.

The Center for Auto Safety said NHTSA should require companies to “submit evidence” that their self-driving technology is safe “before involuntarily involving human beings in their testing.”

GM said in a statement on Thursday that “legislation is still urgently needed” to allow “the full deployment of self-driving vehicles.”

Automakers have warned it could take too long for NHTSA to rewrite the rules to allow for the widespread of adoption of self-driving cars without human controls.

The department also said it “no longer recognizes the designations of ten automated vehicle proving grounds” announced in January 2017.

The sites, including a Michigan center that U.S. President Donald Trump visited last year, were named by Congress to be eligible for $60 million in grants “to fund demonstration projects that test the feasibility and safety” of self-driving vehicles.

The Transportation Department also announced it will start studying the workforce impacts of automated vehicles with the Labor, Commerce, and the Health and Human Services departments. 

The report also said the Trump administration will not support calls to end human driving. The department “embraces the freedom of the open road, which includes the freedom for Americans to drive their own vehicles.”

US Plans to Rewrite Rules that Impede Self-driving Cars

The Trump administration is moving ahead with plans to revise safety rules that bar fully self-driving cars from the roads without equipment such as steering wheels, pedals and mirrors, according to a document made public on Thursday.

The National Highway Traffic Safety Administration (NHTSA) “intends to reconsider the necessity and appropriateness of its current safety standards” as applied to automated vehicles, the U.S. Department of Transportation said in an 80-page update of its principles dubbed “Automated Vehicles 3.0.”

The department, as reported by Reuters earlier on Thursday, disclosed that the NHTSA wants comment “on proposed changes to particular safety standards to accommodate automated vehicle technologies and the possibility of setting exceptions to certain standards that are relevant only when human drivers are present.”

U.S. Transportation Secretary Elaine Chao released the document at a department event. In the report, Chao said that self-driving cars have the potential to dramatically reduce traffic crashes and road deaths. But she added the “public has legitimate concerns about the safety, security, and privacy of automated technology.”

Automakers must currently meet nearly 75 auto safety standards, many of which were written with the assumption that a licensed driver will be in control of the vehicle.

General Motors Co in January filed a petition seeking an exemption for the current rules to use vehicles without steering wheels and other human controls as part of a ride-sharing fleet it plans to deploy in 2019.

NHTSA has not declared the GM petition complete, a step necessary before it can rule on the merits. NHTSA said it plans to propose modernizing procedures to follow when reviewing exemption petitions.

Alphabet Inc’s Waymo unit plans to launch an autonomous ride-hailing service for the general public with no human driver behind the steering wheel in Arizona later this year. But unlike GM, Waymo’s vehicles will have human controls for the time being.

In March, a self-driving Uber Technologies Inc vehicle struck and killed a pedestrian, while the backup safety driver was watching a video, police said. Uber suspended testing in the aftermath and some safety advocates said the crash showed the system was not safe enough to be tested on public roads.

NHTSA has stepped up its self-driving car focus as legislation in Congress on self-driving cars, which passed the U.S. House of Representatives in 2017, has stalled. It has only a slender chance of being approved in 2018, congressional aides said.

The report said “NHTSA’s current statutory authority to establish motor vehicle safety standards is sufficiently flexible to accommodate the design and performance of different” automated vehicles.

The Center for Auto Safety said NHTSA should require companies to “submit evidence” that their self-driving technology is safe “before involuntarily involving human beings in their testing.”

GM said in a statement on Thursday that “legislation is still urgently needed” to allow “the full deployment of self-driving vehicles.”

Automakers have warned it could take too long for NHTSA to rewrite the rules to allow for the widespread of adoption of self-driving cars without human controls.

The department also said it “no longer recognizes the designations of ten automated vehicle proving grounds” announced in January 2017.

The sites, including a Michigan center that U.S. President Donald Trump visited last year, were named by Congress to be eligible for $60 million in grants “to fund demonstration projects that test the feasibility and safety” of self-driving vehicles.

The Transportation Department also announced it will start studying the workforce impacts of automated vehicles with the Labor, Commerce, and the Health and Human Services departments. 

The report also said the Trump administration will not support calls to end human driving. The department “embraces the freedom of the open road, which includes the freedom for Americans to drive their own vehicles.”

US Warns of New Hacking From China-Linked Group

The U.S. government warned Wednesday that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients.

The Department of Homeland issued a technical alert for cloudhopper, which it said was engaged in cyber espionage and theft of intellectual property, after experts with two prominent U.S. cybersecurity companies warned earlier this week that Chinese hacking activity has surged amid the escalating trade war between Washington and Beijing.

Chinese authorities have repeatedly denied claims by Western cybersecurity firms that it supports hacking.

Homeland Security

Homeland Security released the information to support U.S. companies in responding to attacks by the group, which is targeting information technology, energy, health care, communications and manufacturing firms.

“These cyber threat actors are still active and we strongly encourage our partners in government and industry to work together to defend against this threat,” DHS official Christopher Krebs said in a statement.

The reported increase in Chinese hacking follows what cybersecurity firms have described as a lull in such attacks prompted by a 2015 agreement between Chinese President Xi Jinping and former U.S. President Barrack Obama to curb cyber-enabled economic theft.

“I can tell you now unfortunately the Chinese are back,” Dmitri Alperovitch, chief technology officer of U.S. cybersecurity firm CrowdStrike, said Tuesday at a security conference in Washington.

“We’ve seen a huge pickup in activity over the past year and a half. Nowadays they are the most predominant threat actors we see threatening institutions all over this country and Western Europe,” he said.

Analysts with FireEye, another U.S. cybersecurity firm, said that some of the Chinese hacking groups it tracks have become more active in recent months.

Advice to US firms

Wednesday’s alert provided advice on how U.S. firms can prevent, identify and remediate attacks by cloudhopper, which is also known as Red Leaves and APT10.

The hacking group has largely targeted firms known as managed service providers, which supply telecommunications, technology and other services to business around the globe.

Managed service providers, or MSPs, are attractive targets because their networks provide routes for hackers to access sensitive systems of their many clients, said Ben Read, a senior intelligence manager with FireEye.

“We’ve seen this group route malware through an MSP network to other targets,” Read said.

US Warns of New Hacking From China-Linked Group

The U.S. government warned Wednesday that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients.

The Department of Homeland issued a technical alert for cloudhopper, which it said was engaged in cyber espionage and theft of intellectual property, after experts with two prominent U.S. cybersecurity companies warned earlier this week that Chinese hacking activity has surged amid the escalating trade war between Washington and Beijing.

Chinese authorities have repeatedly denied claims by Western cybersecurity firms that it supports hacking.

Homeland Security

Homeland Security released the information to support U.S. companies in responding to attacks by the group, which is targeting information technology, energy, health care, communications and manufacturing firms.

“These cyber threat actors are still active and we strongly encourage our partners in government and industry to work together to defend against this threat,” DHS official Christopher Krebs said in a statement.

The reported increase in Chinese hacking follows what cybersecurity firms have described as a lull in such attacks prompted by a 2015 agreement between Chinese President Xi Jinping and former U.S. President Barrack Obama to curb cyber-enabled economic theft.

“I can tell you now unfortunately the Chinese are back,” Dmitri Alperovitch, chief technology officer of U.S. cybersecurity firm CrowdStrike, said Tuesday at a security conference in Washington.

“We’ve seen a huge pickup in activity over the past year and a half. Nowadays they are the most predominant threat actors we see threatening institutions all over this country and Western Europe,” he said.

Analysts with FireEye, another U.S. cybersecurity firm, said that some of the Chinese hacking groups it tracks have become more active in recent months.

Advice to US firms

Wednesday’s alert provided advice on how U.S. firms can prevent, identify and remediate attacks by cloudhopper, which is also known as Red Leaves and APT10.

The hacking group has largely targeted firms known as managed service providers, which supply telecommunications, technology and other services to business around the globe.

Managed service providers, or MSPs, are attractive targets because their networks provide routes for hackers to access sensitive systems of their many clients, said Ben Read, a senior intelligence manager with FireEye.

“We’ve seen this group route malware through an MSP network to other targets,” Read said.

North Korea Said to Have Stolen a Fortune in Online Bank Heists

North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government in Pyongyang may be gathering steam.

U.S. security firm FireEye raised the alarm Wednesday over a North Korean group that it says has stolen hundreds of millions of dollars by infiltrating the computer systems of banks around the world since 2014 through highly sophisticated and destructive attacks that have spanned at least 11 countries. It says the group is still operating and poses “an active global threat.”

It is part of a wider pattern of malicious state-backed cyber activity that has led the Trump administration to identify North Korea — along with Russia, Iran and China — as one of the main online threats facing the United States. Last month, the Justice Department charged a North Korean hacker said to have conspired in devastating cyberattacks, including an $81 million heist of Bangladesh’s central bank and the WannaCry virus that crippled parts of Britain’s National Health Service.

DHS offers warning

On Tuesday, the U.S. Department of Homeland Security warned of the use of malware by Hidden Cobra, the U.S. government’s byword for North Korea hackers, in fraudulent ATM cash withdrawals from banks in Asia and Africa. It said that Hidden Cobra was behind the theft of tens of millions of dollars from teller machines in the past two years. In one incident this year, cash had been simultaneously withdrawn from ATMs in 23 different countries, it said.

North Korea, which prohibits access to the world wide web for virtually all of its people, has previously denied involvement in cyberattacks, and attribution for such attacks is rarely made with absolute certainty. It is typically based on technical indicators such as the Internet Protocol, or IP, addresses that identify computers and characteristics of the coding used in malware, which is the software a hacker may use to damage or disable computers.

But other cybersecurity experts tell The Associated Press that they also see continued signs that North Korea’s authoritarian government, which has a long track record of criminality to raise cash, is conducting malign activity online. That activity includes targeting of financial institutions and crypto-currency-related organizations, as well as spying on its adversaries, despite the easing of tensions between Pyongyang and Washington.

“The reality is they are starved for cash and are continuing to try and generate revenue, at least until sanctions are diminished,” said Adam Meyers, vice president of intelligence at CrowdStrike. “At the same time, they won’t abate in intelligence collection operations, as they continue to negotiate and test the international community’s resolve and test what the boundaries are.”

North Korea attacks continue

CrowdStrike says it has detected continuing North Korean cyber intrusions in the past two months, including the use of a known malware against a potentially broad set of targets in South Korea, and a new variant of malware against users of mobile devices that use a Linux-based operating system.

This activity has been taking place against the backdrop of a dramatic diplomatic shift as Kim Jong Un has opened up to the world. He has held summits with South Korean President Moon Jae-in and with President Donald Trump, who hopes to persuade Kim to relinquish the nuclear weapons that pose a potential threat to the U.S. homeland. Tensions on the divided Korean Peninsula have dropped and fears of war with the U.S. have ebbed. Trump this weekend will dispatch his top diplomat, Mike Pompeo, to Pyongyang for the fourth time this year to make progress on denuclearization.

But North Korea has yet to take concrete steps to give up its nuclear arsenal, so there’s been no let-up in sanctions that have been imposed to deprive it of fuel and revenue for its weapons programs, and to block it from bulk cash transfers and accessing to the international banking system.

FireEye says APT38, the name it gives to the hacking group dedicated to bank theft, has emerged and stepped up its operations since February 2014 as the economic vise on North Korea has tightened in response to its nuclear and missile tests. Initial operations targeted financial institutions in Southeast Asia, where North Korea had experience in money laundering, but then expanded into other regions such as Latin America and Africa, and then extended to Europe and North America.

In all, FireEye says APT38 has attempted to steal $1.1 billion, and based on the data it can confirm, has gotten away with hundreds of millions in dollars. It has used malware to insert fraudulent transactions in the Society for Worldwide Interbank Financial Telecommunication or SWIFT system that is used to transfer money between banks. Its biggest heist to date was $81 million stolen from the central bank of Bangladesh in February 2016. The funds were wired to bank accounts established with fake identities in the Philippines. After the funds were withdrawn they were suspected to have been laundered in casinos.

Cyber attacks an alternative 

The Foundation for Defense of Democracies, a Washington think tank, said in a report Wednesday that North Korea’s cyber capabilities provide an alternative means for challenging its adversaries. While Kim’s hereditary regime appears to prioritize currency generation, attacks using the SWIFT system raise concerns that North Korean hackers “may become more proficient at manipulating the data and systems that undergird the global financial system,” it says.

Sandra Joyce, FireEye’s head of global intelligence, said that while APT38 is a criminal operation, it leverages the skills and technology of a state-backed espionage campaign, allowing it to infiltrate multiple banks at once and figure how to extract funds. On average, it dwells in a bank’s computer network for 155 days to learn about its systems before it tries to steal anything. And when it finally pounces, it uses aggressive malware to wreak havoc and cover its tracks.

“We see this as a consistent effort, before, during and after any diplomatic efforts by the United States and the international community,” said Joyce, describing North Korea as being “undeterred” and urging the U.S. government to provide more specific threat information to financial institutions about APT38’s modus operandi. APT stands for Advanced Persistent Threat.

Large Chile bank hacked

The Silicon Valley-based company says it is aware of continuing, suspected APT38 operations against other banks. The most recent attack it is publicly attributing to APT38 was against of Chile’s biggest commercial banks, Banco de Chile, in May this year. The bank has said a hacking operation robbed it of $10 million.

FireEye, which is staffed with a roster of former military and law-enforcement cyberexperts, conducted malware analysis for a criminal indictment by the Justice Department last month against Park Jin Hyok, the first time a hacker said to be from North Korea has faced U.S. criminal charges. He’s accused of conspiring in a number of devastating cyberattacks: the Bangladesh heist and other attempts to steal more than $1 billion from financial institutions around the world; the 2014 breach of Sony Pictures Entertainment; and the WannaCry ransomware virus that in 2017 infected computers in 150 countries. 

North Korea Said to Have Stolen a Fortune in Online Bank Heists

North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government in Pyongyang may be gathering steam.

U.S. security firm FireEye raised the alarm Wednesday over a North Korean group that it says has stolen hundreds of millions of dollars by infiltrating the computer systems of banks around the world since 2014 through highly sophisticated and destructive attacks that have spanned at least 11 countries. It says the group is still operating and poses “an active global threat.”

It is part of a wider pattern of malicious state-backed cyber activity that has led the Trump administration to identify North Korea — along with Russia, Iran and China — as one of the main online threats facing the United States. Last month, the Justice Department charged a North Korean hacker said to have conspired in devastating cyberattacks, including an $81 million heist of Bangladesh’s central bank and the WannaCry virus that crippled parts of Britain’s National Health Service.

DHS offers warning

On Tuesday, the U.S. Department of Homeland Security warned of the use of malware by Hidden Cobra, the U.S. government’s byword for North Korea hackers, in fraudulent ATM cash withdrawals from banks in Asia and Africa. It said that Hidden Cobra was behind the theft of tens of millions of dollars from teller machines in the past two years. In one incident this year, cash had been simultaneously withdrawn from ATMs in 23 different countries, it said.

North Korea, which prohibits access to the world wide web for virtually all of its people, has previously denied involvement in cyberattacks, and attribution for such attacks is rarely made with absolute certainty. It is typically based on technical indicators such as the Internet Protocol, or IP, addresses that identify computers and characteristics of the coding used in malware, which is the software a hacker may use to damage or disable computers.

But other cybersecurity experts tell The Associated Press that they also see continued signs that North Korea’s authoritarian government, which has a long track record of criminality to raise cash, is conducting malign activity online. That activity includes targeting of financial institutions and crypto-currency-related organizations, as well as spying on its adversaries, despite the easing of tensions between Pyongyang and Washington.

“The reality is they are starved for cash and are continuing to try and generate revenue, at least until sanctions are diminished,” said Adam Meyers, vice president of intelligence at CrowdStrike. “At the same time, they won’t abate in intelligence collection operations, as they continue to negotiate and test the international community’s resolve and test what the boundaries are.”

North Korea attacks continue

CrowdStrike says it has detected continuing North Korean cyber intrusions in the past two months, including the use of a known malware against a potentially broad set of targets in South Korea, and a new variant of malware against users of mobile devices that use a Linux-based operating system.

This activity has been taking place against the backdrop of a dramatic diplomatic shift as Kim Jong Un has opened up to the world. He has held summits with South Korean President Moon Jae-in and with President Donald Trump, who hopes to persuade Kim to relinquish the nuclear weapons that pose a potential threat to the U.S. homeland. Tensions on the divided Korean Peninsula have dropped and fears of war with the U.S. have ebbed. Trump this weekend will dispatch his top diplomat, Mike Pompeo, to Pyongyang for the fourth time this year to make progress on denuclearization.

But North Korea has yet to take concrete steps to give up its nuclear arsenal, so there’s been no let-up in sanctions that have been imposed to deprive it of fuel and revenue for its weapons programs, and to block it from bulk cash transfers and accessing to the international banking system.

FireEye says APT38, the name it gives to the hacking group dedicated to bank theft, has emerged and stepped up its operations since February 2014 as the economic vise on North Korea has tightened in response to its nuclear and missile tests. Initial operations targeted financial institutions in Southeast Asia, where North Korea had experience in money laundering, but then expanded into other regions such as Latin America and Africa, and then extended to Europe and North America.

In all, FireEye says APT38 has attempted to steal $1.1 billion, and based on the data it can confirm, has gotten away with hundreds of millions in dollars. It has used malware to insert fraudulent transactions in the Society for Worldwide Interbank Financial Telecommunication or SWIFT system that is used to transfer money between banks. Its biggest heist to date was $81 million stolen from the central bank of Bangladesh in February 2016. The funds were wired to bank accounts established with fake identities in the Philippines. After the funds were withdrawn they were suspected to have been laundered in casinos.

Cyber attacks an alternative 

The Foundation for Defense of Democracies, a Washington think tank, said in a report Wednesday that North Korea’s cyber capabilities provide an alternative means for challenging its adversaries. While Kim’s hereditary regime appears to prioritize currency generation, attacks using the SWIFT system raise concerns that North Korean hackers “may become more proficient at manipulating the data and systems that undergird the global financial system,” it says.

Sandra Joyce, FireEye’s head of global intelligence, said that while APT38 is a criminal operation, it leverages the skills and technology of a state-backed espionage campaign, allowing it to infiltrate multiple banks at once and figure how to extract funds. On average, it dwells in a bank’s computer network for 155 days to learn about its systems before it tries to steal anything. And when it finally pounces, it uses aggressive malware to wreak havoc and cover its tracks.

“We see this as a consistent effort, before, during and after any diplomatic efforts by the United States and the international community,” said Joyce, describing North Korea as being “undeterred” and urging the U.S. government to provide more specific threat information to financial institutions about APT38’s modus operandi. APT stands for Advanced Persistent Threat.

Large Chile bank hacked

The Silicon Valley-based company says it is aware of continuing, suspected APT38 operations against other banks. The most recent attack it is publicly attributing to APT38 was against of Chile’s biggest commercial banks, Banco de Chile, in May this year. The bank has said a hacking operation robbed it of $10 million.

FireEye, which is staffed with a roster of former military and law-enforcement cyberexperts, conducted malware analysis for a criminal indictment by the Justice Department last month against Park Jin Hyok, the first time a hacker said to be from North Korea has faced U.S. criminal charges. He’s accused of conspiring in a number of devastating cyberattacks: the Bangladesh heist and other attempts to steal more than $1 billion from financial institutions around the world; the 2014 breach of Sony Pictures Entertainment; and the WannaCry ransomware virus that in 2017 infected computers in 150 countries. 

Meet Farmers of  Future: Robot

Brandon Alexander would like to introduce you to Angus, the farmer of the future. He’s heavyset, weighing in at nearly 1,000 pounds, not to mention a bit slow. But he’s strong enough to hoist 800-pound pallets of maturing vegetables and can move them from place to place on his own.

Sure, Angus is a robot. But don’t hold that against him, even if he looks more like a large tanning bed than C-3PO.

To Alexander, Angus and other robots are key to a new wave of local agriculture that aims to raise lettuce, basil and other produce in metropolitan areas while conserving water and sidestepping the high costs of human labor. It’s a big challenge, and some earlier efforts have flopped. Even Google’s “moonshot” laboratory, known as X, couldn’t figure out how to make the economics work.

After raising $6 million and tinkering with autonomous robots for two years, Alexander’s startup Iron Ox says it’s ready to start delivering crops of its robotically grown vegetables to people’s salad bowls. “And they are going to be the best salads you ever tasted,” says the 33-year-old Alexander, a one-time Oklahoma farmboy turned Google engineer turned startup CEO.

Iron Ox planted its first robot farm in an 8,000-square-foot warehouse in San Carlos, California, a suburb located 25 miles south of San Francisco. Although no deals have been struck yet, Alexander says Iron Ox has been talking to San Francisco Bay area restaurants interested in buying its leafy vegetables and expects to begin selling to supermarkets next year.

The San Carlos warehouse is only a proving ground for Iron Ox’s long-term goals. It plans to set up robot farms in greenhouses that will rely mostly on natural sunlight instead of high-powered indoor lighting that sucks up expensive electricity. Initially, though, the company will sell its produce at a loss in order to remain competitive.

During the next few years, Iron Ox wants to open robot farms near metropolitan areas across the U.S. to serve up fresher produce to restaurants and supermarkets. Most of the vegetables and fruit consumed in the U.S. is grown in California, Arizona, Mexico and other nations. That means many people in U.S. cities are eating lettuce that’s nearly a week old by the time it’s delivered.

There are bigger stakes as well. The world’s population is expected to swell to 10 billion by 2050 from about 7.5 billion now, making it important to find ways to feed more people without further environmental impact, according to a report from the World Resources Institute.

Iron Ox, Alexander reasons, can be part of the solution if its system can make the leap from its small, laboratory-like setting to much larger greenhouses.

The startup relies on a hydroponic system that conserves water and automation in place of humans who seem increasingly less interested in U.S. farming jobs that pay an average of $13.32 per hour, according to the U.S. Department of Agriculture. Nearly half of U.S. farmworkers planting and picking crops aren’t in the U.S. legally, based on a survey by the U.S. Department of Labor.

The heavy lifting on Iron Ox’s indoor farm is done by Angus, which rolls about the indoor farm on omnidirectional wheels. Its main job is to shuttle maturing produce to another, as-yet unnamed robot, which transfers plants from smaller growing pods to larger ones, using a mechanical arm whose joints are lubricated with “food-safe” grease.

It’s a tedious process to gently pick up each of the roughly 250 plants on each pallet and transfer them to their bigger pods, but the robot doesn’t seem to mind the work. Iron Ox still relies on people to clip its vegetables when they are ready for harvest, but Alexander says it is working on another robot that will eventually handle that job too.

Alexander formerly worked on robotics at Google X, but worked on drones, not indoor farms. While there, he met Jon Binney, Iron Ox’s co-founder and chief technology offer. The two men became friends and began to brainstorm about ways they might be able to use their engineering skills for the greater good.

“If we can feed people using robots, what could be more impactful than that?” Alexander says.

 

                 

Meet Farmers of  Future: Robot

Brandon Alexander would like to introduce you to Angus, the farmer of the future. He’s heavyset, weighing in at nearly 1,000 pounds, not to mention a bit slow. But he’s strong enough to hoist 800-pound pallets of maturing vegetables and can move them from place to place on his own.

Sure, Angus is a robot. But don’t hold that against him, even if he looks more like a large tanning bed than C-3PO.

To Alexander, Angus and other robots are key to a new wave of local agriculture that aims to raise lettuce, basil and other produce in metropolitan areas while conserving water and sidestepping the high costs of human labor. It’s a big challenge, and some earlier efforts have flopped. Even Google’s “moonshot” laboratory, known as X, couldn’t figure out how to make the economics work.

After raising $6 million and tinkering with autonomous robots for two years, Alexander’s startup Iron Ox says it’s ready to start delivering crops of its robotically grown vegetables to people’s salad bowls. “And they are going to be the best salads you ever tasted,” says the 33-year-old Alexander, a one-time Oklahoma farmboy turned Google engineer turned startup CEO.

Iron Ox planted its first robot farm in an 8,000-square-foot warehouse in San Carlos, California, a suburb located 25 miles south of San Francisco. Although no deals have been struck yet, Alexander says Iron Ox has been talking to San Francisco Bay area restaurants interested in buying its leafy vegetables and expects to begin selling to supermarkets next year.

The San Carlos warehouse is only a proving ground for Iron Ox’s long-term goals. It plans to set up robot farms in greenhouses that will rely mostly on natural sunlight instead of high-powered indoor lighting that sucks up expensive electricity. Initially, though, the company will sell its produce at a loss in order to remain competitive.

During the next few years, Iron Ox wants to open robot farms near metropolitan areas across the U.S. to serve up fresher produce to restaurants and supermarkets. Most of the vegetables and fruit consumed in the U.S. is grown in California, Arizona, Mexico and other nations. That means many people in U.S. cities are eating lettuce that’s nearly a week old by the time it’s delivered.

There are bigger stakes as well. The world’s population is expected to swell to 10 billion by 2050 from about 7.5 billion now, making it important to find ways to feed more people without further environmental impact, according to a report from the World Resources Institute.

Iron Ox, Alexander reasons, can be part of the solution if its system can make the leap from its small, laboratory-like setting to much larger greenhouses.

The startup relies on a hydroponic system that conserves water and automation in place of humans who seem increasingly less interested in U.S. farming jobs that pay an average of $13.32 per hour, according to the U.S. Department of Agriculture. Nearly half of U.S. farmworkers planting and picking crops aren’t in the U.S. legally, based on a survey by the U.S. Department of Labor.

The heavy lifting on Iron Ox’s indoor farm is done by Angus, which rolls about the indoor farm on omnidirectional wheels. Its main job is to shuttle maturing produce to another, as-yet unnamed robot, which transfers plants from smaller growing pods to larger ones, using a mechanical arm whose joints are lubricated with “food-safe” grease.

It’s a tedious process to gently pick up each of the roughly 250 plants on each pallet and transfer them to their bigger pods, but the robot doesn’t seem to mind the work. Iron Ox still relies on people to clip its vegetables when they are ready for harvest, but Alexander says it is working on another robot that will eventually handle that job too.

Alexander formerly worked on robotics at Google X, but worked on drones, not indoor farms. While there, he met Jon Binney, Iron Ox’s co-founder and chief technology offer. The two men became friends and began to brainstorm about ways they might be able to use their engineering skills for the greater good.

“If we can feed people using robots, what could be more impactful than that?” Alexander says.

 

                 

Irish Regulator Opens Facebook Data Breach Investigation

Ireland’s data regulator has launched an investigation of Facebook over a recent data breach that allowed hackers access 50 million accounts which could potentially cost Facebook more than $1.6 billion in fines.

The Irish Data Protection Commission said Wednesday that it will look into whether the U.S. social media company complied with European regulations that went into effect earlier this year covering data protection.

It’s the latest headache for Facebook in Europe, where authorities are turning up the heat on dominant tech firms over data protection. Last month, European Union consumer protection chief Vera Jourova said that she was growing impatient with Facebook for being too slow in clarifying the fine print in its terms of service covering what happens to user data and warned that the company could face sanctions.

The commission said in a statement that it would examine whether Facebook put in place “appropriate technical and organizational measures to ensure the security and safeguarding of the personal data it processes.”

The commission said earlier this week the number of EU accounts potentially affected numbered less than 5 million.

Ireland, which is Facebook’s lead privacy regulator for Europe, is moving swiftly to investigate the U.S. tech company since the breach became public on Friday.

Facebook said Friday attackers gained the ability to “seize control” of user accounts by stealing digital keys the company uses to keep users logged in. They could do so by exploiting three distinct bugs in Facebook’s code.

The company said it has fixed the bugs and logged out the 50 million breached users — plus another 40 million who were vulnerable to the attack — in order to reset those digital keys. Facebook said it doesn’t know who was behind the attacks or where they’re based. Neither passwords nor credit card data was stolen. At the time, the company said it alerted the FBI and regulators in the U.S. and Europe.

Facebook on Wednesday didn’t immediately return a request for comment.

Facebook has faced a tumultuous year of security problems and privacy issues . News broke early this year that a data analytics firm once employed by the Trump campaign, Cambridge Analytica, had improperly gained access to personal data from millions of user profiles. Then a congressional investigation found that agents from Russia and other countries have been posting fake political ads since at least 2016. In April, Zuckerberg appeared at a congressional hearing focused on Facebook’s privacy practices.

The European Union implemented stronger data and privacy rules, known as General Data Protection Regulation, in May.

The case could prove to be the first major test of GDPR. Under the new rules, companies could be hit with fines equal to 4 percent of annual global turnover for the most serious violations. In Facebook’s case, that could amount to more than $1.6 billion based on its 2017 revenues.

The new rules also require companies to disclose any breaches within 72 hours. The commission said Facebook informed it that its internal investigation is continuing and that it is taking actions to “mitigate the potential risk to users.”

Irish Regulator Opens Facebook Data Breach Investigation

Ireland’s data regulator has launched an investigation of Facebook over a recent data breach that allowed hackers access 50 million accounts which could potentially cost Facebook more than $1.6 billion in fines.

The Irish Data Protection Commission said Wednesday that it will look into whether the U.S. social media company complied with European regulations that went into effect earlier this year covering data protection.

It’s the latest headache for Facebook in Europe, where authorities are turning up the heat on dominant tech firms over data protection. Last month, European Union consumer protection chief Vera Jourova said that she was growing impatient with Facebook for being too slow in clarifying the fine print in its terms of service covering what happens to user data and warned that the company could face sanctions.

The commission said in a statement that it would examine whether Facebook put in place “appropriate technical and organizational measures to ensure the security and safeguarding of the personal data it processes.”

The commission said earlier this week the number of EU accounts potentially affected numbered less than 5 million.

Ireland, which is Facebook’s lead privacy regulator for Europe, is moving swiftly to investigate the U.S. tech company since the breach became public on Friday.

Facebook said Friday attackers gained the ability to “seize control” of user accounts by stealing digital keys the company uses to keep users logged in. They could do so by exploiting three distinct bugs in Facebook’s code.

The company said it has fixed the bugs and logged out the 50 million breached users — plus another 40 million who were vulnerable to the attack — in order to reset those digital keys. Facebook said it doesn’t know who was behind the attacks or where they’re based. Neither passwords nor credit card data was stolen. At the time, the company said it alerted the FBI and regulators in the U.S. and Europe.

Facebook on Wednesday didn’t immediately return a request for comment.

Facebook has faced a tumultuous year of security problems and privacy issues . News broke early this year that a data analytics firm once employed by the Trump campaign, Cambridge Analytica, had improperly gained access to personal data from millions of user profiles. Then a congressional investigation found that agents from Russia and other countries have been posting fake political ads since at least 2016. In April, Zuckerberg appeared at a congressional hearing focused on Facebook’s privacy practices.

The European Union implemented stronger data and privacy rules, known as General Data Protection Regulation, in May.

The case could prove to be the first major test of GDPR. Under the new rules, companies could be hit with fines equal to 4 percent of annual global turnover for the most serious violations. In Facebook’s case, that could amount to more than $1.6 billion based on its 2017 revenues.

The new rules also require companies to disclose any breaches within 72 hours. The commission said Facebook informed it that its internal investigation is continuing and that it is taking actions to “mitigate the potential risk to users.”

Trump to Meet With Google CEO, Other Tech Heads in October

U.S. President Donald Trump plans to meet with Google CEO Sundar Pichai and other tech executives this month at a social media summit.

White House economic adviser Larry Kudlow said Tuesday that the administration hoped Facebook and Twitter would send representatives to the meeting. Kudlow added the event would most likely happen in mid-October, though no date has been set.

Prominent conservatives, including the president, have accused Facebook, Google and Twitter of silencing right-leaning voices on their platforms, a suspected practice called “shadow banning.”

Kudlow had a meeting with Pichai last Friday, which he described as “great.”

Pichai drew flack from senators last month after failing to send an executive to a hearing, and he has agreed appear at another.