Category Archives: Technology

silicon valley & technology news

US Regulator Orders Halt to Self-Driving School Bus Test in Florida

The National Highway Traffic Safety Administration on Monday said it had ordered Transdev North America to immediately stop transporting schoolchildren in Florida in a driverless shuttle as the testing could be putting them at “inappropriate” risk.

The auto safety agency known as NHTSA said in an order issued late Friday that Transdev’s use of its EZ10 Generation II driverless shuttle in the Babcock Ranch community in southwest Florida was “unlawful and in violation of the company’s temporary importation authorization.”

“Innovation must not come at the risk of public safety,” said Deputy NHTSA Administrator Heidi King in a statement.

“Using a non-compliant test vehicle to transport children is irresponsible, inappropriate, and in direct violation of the terms of Transdev’s approved test project.”

In March, NHTSA granted Transdev permission to temporarily import the driverless shuttle for testing and demonstration purposes, but not as a school bus.

The agency said the company had agreed to halt the tests. A spokeswoman for Transdev did not respond to several requests for comment Monday.

Transdev North America is a unit of Transdev, which is controlled by France state-owned investment fund Caisse des Depots et Consignations.

The company in August issued a news release saying it would “operate school shuttle service starting this fall with an autonomous vehicle, the first in the world.”

Transdev said the 12-person shuttle bus would operate from a designated pickup area with a safety attendant on board, would travel at a top speed of 8 miles per hour (13 kph), with the potential to reach speeds of 30 mph (48 kph) once additional infrastructure was completed.

There are numerous low-speed self-driving shuttles being tested in cities around the United States with many others planned.

NHTSA previously said it was moving ahead with plans to revise safety rules that bar fully self-driving cars from the roads without equipment such as steering wheels, pedals and mirrors as the agency works to advance driverless vehicles. The agency has said it opposes proposals to require ‘pre-approving’ self-driving technologies before they are tested.

NHTSA told Transdev that failure to take appropriate action could result in fines, the voiding of the temporary importation authorization or the exportation of the vehicle.

Earlier this month, French utility Veolia agreed to sell its 30 percent stake in Transdev to Germany’s Rethmann Group.

Individual Cooling Units Could Save Lives

The World Health Organization is closely watching the Ebola outbreak in Congo where the number of cases has risen to 185 since the outbreak started in August. One of the challenges for health workers fighting highly infectious diseases like Ebola is spending time in HazMat suits. They can be unwieldy and incredibly hot, but new technology could solve one of those problems. VOA’s Kevin Enochs reports.

Individual Cooling Units Could Save Lives

The World Health Organization is closely watching the Ebola outbreak in Congo where the number of cases has risen to 185 since the outbreak started in August. One of the challenges for health workers fighting highly infectious diseases like Ebola is spending time in HazMat suits. They can be unwieldy and incredibly hot, but new technology could solve one of those problems. VOA’s Kevin Enochs reports.

Using Tech to Save World’s Most Endangered Species in Tanzania

In Tanzania, protecting endangered animals has become easier thanks to Earth Ranger. Earth Ranger is not a superhero, it’s a technology platform, developed by Vulcan Inc., a company co-founded by U.S. philanthropist and Microsoft co-founder Paul Allen. The system helps rangers remotely monitor elephants and other animals to stay ahead of poachers. Faiza Elmasry has the story. VOA’s Faith Lapidus narrates.

Financial Watchdog: Regulate Cryptocurrencies Now, Or Else

A global financial body says governments worldwide must establish rules for virtual currencies like bitcoin to stop criminals from using them to launder money or finance terrorism.

The Financial Action Task Force said Friday that from next year it will start assessing whether countries are doing enough to fight criminal use of virtual currencies.

Countries that don’t could risk being effectively put on a “gray list” by the FATF, which can scare away investors.

Marshall Billingslea, an assistant U.S. Treasury secretary who holds the FATF’s rotating leadership, said, “We’ve made clear today that every jurisdiction must establish” virtual currency rules. “It’s no longer optional.”

The FATF described how the Islamic State group and al-Qaida have used virtual currencies.

Financial regulators worldwide have struggled to deal with the rise of electronic alternatives to traditional money.

Financial Watchdog: Regulate Cryptocurrencies Now, Or Else

A global financial body says governments worldwide must establish rules for virtual currencies like bitcoin to stop criminals from using them to launder money or finance terrorism.

The Financial Action Task Force said Friday that from next year it will start assessing whether countries are doing enough to fight criminal use of virtual currencies.

Countries that don’t could risk being effectively put on a “gray list” by the FATF, which can scare away investors.

Marshall Billingslea, an assistant U.S. Treasury secretary who holds the FATF’s rotating leadership, said, “We’ve made clear today that every jurisdiction must establish” virtual currency rules. “It’s no longer optional.”

The FATF described how the Islamic State group and al-Qaida have used virtual currencies.

Financial regulators worldwide have struggled to deal with the rise of electronic alternatives to traditional money.

Former Deputy UK Leader Nick Clegg Takes Post with Facebook

Facebook has hired former U.K. deputy prime minister Nick Clegg to head its global policy and communications teams, enlisting a veteran of European Union politics to help it with increased regulatory scrutiny in the region.

Clegg, 51, will become a vice president of the social media giant, and report to Chief Operating Officer Sheryl Sandberg.

Clegg will be called upon to help Facebook and other Silicon Valley stalwarts grapple with a changing regulatory landscape globally. European Union regulators are interested in reining in mostly American tech giants who they blame for avoiding tax, stifling competition and encroaching on privacy rights.

Clegg led the Liberal Democrats from 2007 to 2015, including five years in the coalition government with the Conservatives. He lost his Sheffield Hallam seat at last year’s general election.

Former Deputy UK Leader Nick Clegg Takes Post with Facebook

Facebook has hired former U.K. deputy prime minister Nick Clegg to head its global policy and communications teams, enlisting a veteran of European Union politics to help it with increased regulatory scrutiny in the region.

Clegg, 51, will become a vice president of the social media giant, and report to Chief Operating Officer Sheryl Sandberg.

Clegg will be called upon to help Facebook and other Silicon Valley stalwarts grapple with a changing regulatory landscape globally. European Union regulators are interested in reining in mostly American tech giants who they blame for avoiding tax, stifling competition and encroaching on privacy rights.

Clegg led the Liberal Democrats from 2007 to 2015, including five years in the coalition government with the Conservatives. He lost his Sheffield Hallam seat at last year’s general election.

French Startup Offers Visions of Damaged Middle Eastern Cities

The Syrian government says the ancient city of Palmyra, gravely damaged by IS militants, could reopen to the public next spring. But, while restoration continues on the ground, one French startup is showing people how Palmyra and other cities affected by war once looked, how they look now, and how they might look after restoration. Kevin Enochs explains.

French Startup Offers Visions of Damaged Middle Eastern Cities

The Syrian government says the ancient city of Palmyra, gravely damaged by IS militants, could reopen to the public next spring. But, while restoration continues on the ground, one French startup is showing people how Palmyra and other cities affected by war once looked, how they look now, and how they might look after restoration. Kevin Enochs explains.

Twitter Releases Tweets Showing Russian, Iranian Attempts to Influence US Politics

On Wednesday, Twitter released a collection of more than 10 million tweets related to thousands of accounts affiliated with Russia’s Internet Research Agency propaganda organization, as well as hundreds more troll accounts, including many based in Iran.

The data, analyzed and released in a report by The Atlantic Council’s Digital Forensic Research Lab, are made up of 3,841 accounts affiliated with the Russia-based Internet Research Agency, 770 other accounts potentially based in Iran as well as 10 million tweets and more than 2 million images, videos and other media.

Russian trolls targeting U.S. politics took on personas from both the left and the right. Their primary goal appears to have been to sow discord, rather than promote any particular side, presumably with a goal of weakening the United States, the report said.

DFRlab says the Russian trolls were often effective, drawing tens of thousands of retweets on certain posts including from celebrity commentators like conservative Ann Coulter.

​Some of the tweets posted:

“Judgement Day is here. Please vote #TrumpPence16 to save our great nation from destruction! #draintheswamp #TrumpForPresident,” said a fake Election Day tweet in 2016.

“Daily reminder: Trump still hasn’t imposed sanctions on Russia that were passed 4,193 in the House and 982 in the Senate. Shouldn’t that be grounds for impeachment?” said another tweet in March of this year.

Multiple goals

The Russian operation had multiple goals, including interfering in the U.S. presidential election, polarizing online communities, and weakening trust in American institutions, according to the DFRLab.

“The thing to understand is that the Russians were equal opportunity partisans,” Graham Brookie, one of the researchers behind the analysis, told VOA News. “There was a very specific focus on specific ideological communities and specific demographics.”

Following an initial push to prevent Hillary Clinton from being elected in 2016, the analysis identified a “second wave” of fake accounts, many of which were focused on infiltrating anti-Trump groups, especially those identified with the “Resistance” movement, exploiting sensitive issues such as race relations and gun violence. These often achieved greater impact than their conservative counterparts.

“Don’t ever tell me kneeling for the flag is disrespectful to our troops when Trump calls a sitting Senator “Pocahontas” in front of Native American war heroes,” tweeted an account posing as an African-American woman named “Luisa Haynes” under the handle @wokeluisa in November 2017. The tweet garnered more than 32,000 retweets and over 89,000 likes.

“They tried to inflame everybody, regardless of race, creed, politics or sexual orientation,” the Lab noted in its analysis. “On many occasions, they pushed both sides of divisive issues.”

Iran trolling

Iran’s trolling was primarily focused on promoting its own interests, including attacking regional rivals like Israel and Saudi Arabia.

However, Iran’s trolling was less effective than the Russian posts, with most tweets getting limited responses.

This was partially because of posting styles that were less inflammatory, according to the report.

“Few of the accounts showed distinctive personalities: They largely shared online articles,” according to the report. “As such, they were a poor fit for Twitter, where personal comment tends to resonate more strongly than website shares.” Generally, many troll posts were ineffective, and “their operations were washed away in the firehose of Twitter.”

All of the accounts linked to the massive trove of tweets released by Twitter have been suspended or deleted, and the analysis notes that overall activity from suspected Russian trolls fell this year after Twitter clampdowns in September and June 2017.

But, that does not mean political trolls do not still pose a threat.

“Identifying future foreign influence operations, and reducing their impact, will demand awareness and resilience from the activist communities targeted, not just the platforms and the open source community,” according to the report.

Twitter Releases Tweets Showing Russian, Iranian Attempts to Influence US Politics

On Wednesday, Twitter released a collection of more than 10 million tweets related to thousands of accounts affiliated with Russia’s Internet Research Agency propaganda organization, as well as hundreds more troll accounts, including many based in Iran.

The data, analyzed and released in a report by The Atlantic Council’s Digital Forensic Research Lab, are made up of 3,841 accounts affiliated with the Russia-based Internet Research Agency, 770 other accounts potentially based in Iran as well as 10 million tweets and more than 2 million images, videos and other media.

Russian trolls targeting U.S. politics took on personas from both the left and the right. Their primary goal appears to have been to sow discord, rather than promote any particular side, presumably with a goal of weakening the United States, the report said.

DFRlab says the Russian trolls were often effective, drawing tens of thousands of retweets on certain posts including from celebrity commentators like conservative Ann Coulter.

​Some of the tweets posted:

“Judgement Day is here. Please vote #TrumpPence16 to save our great nation from destruction! #draintheswamp #TrumpForPresident,” said a fake Election Day tweet in 2016.

“Daily reminder: Trump still hasn’t imposed sanctions on Russia that were passed 4,193 in the House and 982 in the Senate. Shouldn’t that be grounds for impeachment?” said another tweet in March of this year.

Multiple goals

The Russian operation had multiple goals, including interfering in the U.S. presidential election, polarizing online communities, and weakening trust in American institutions, according to the DFRLab.

“The thing to understand is that the Russians were equal opportunity partisans,” Graham Brookie, one of the researchers behind the analysis, told VOA News. “There was a very specific focus on specific ideological communities and specific demographics.”

Following an initial push to prevent Hillary Clinton from being elected in 2016, the analysis identified a “second wave” of fake accounts, many of which were focused on infiltrating anti-Trump groups, especially those identified with the “Resistance” movement, exploiting sensitive issues such as race relations and gun violence. These often achieved greater impact than their conservative counterparts.

“Don’t ever tell me kneeling for the flag is disrespectful to our troops when Trump calls a sitting Senator “Pocahontas” in front of Native American war heroes,” tweeted an account posing as an African-American woman named “Luisa Haynes” under the handle @wokeluisa in November 2017. The tweet garnered more than 32,000 retweets and over 89,000 likes.

“They tried to inflame everybody, regardless of race, creed, politics or sexual orientation,” the Lab noted in its analysis. “On many occasions, they pushed both sides of divisive issues.”

Iran trolling

Iran’s trolling was primarily focused on promoting its own interests, including attacking regional rivals like Israel and Saudi Arabia.

However, Iran’s trolling was less effective than the Russian posts, with most tweets getting limited responses.

This was partially because of posting styles that were less inflammatory, according to the report.

“Few of the accounts showed distinctive personalities: They largely shared online articles,” according to the report. “As such, they were a poor fit for Twitter, where personal comment tends to resonate more strongly than website shares.” Generally, many troll posts were ineffective, and “their operations were washed away in the firehose of Twitter.”

All of the accounts linked to the massive trove of tweets released by Twitter have been suspended or deleted, and the analysis notes that overall activity from suspected Russian trolls fell this year after Twitter clampdowns in September and June 2017.

But, that does not mean political trolls do not still pose a threat.

“Identifying future foreign influence operations, and reducing their impact, will demand awareness and resilience from the activist communities targeted, not just the platforms and the open source community,” according to the report.

Twitter Releases Tweets Showing Foreign Attempts to Influence US Politics

Twitter has released a collection of more than 10 million tweets it says are related to foreign efforts to influence U.S. elections going back a decade, including many tied to Russia’s digital efforts to sow chaos and sway the 2016 election in favor of Donald Trump.

Twitter says it made the cache, which includes tweets from Iran and Russia’s state-sponsored troll farm, Internet Research Agency, available so researchers around the world could conduct their own analyses.

The non-partisan Atlantic Council’s Digital Forensic Research Lab has been looking through the collection since last week.  In a preliminary analysis posted on Medium, the online publishing platform, the Lab noted operators from Iran and Russia appeared to have targeted politically polarized groups in order to maximize divisiveness in the United States’ political scene.  

“The Russian trolls were non-partisan: they tried to inflame everybody, regardless of race, creed, politics, or sexual orientation,” the Lab noted, “On many occasions, they pushed both sides of divisive issues.”

Sifting through the collection is no small task.  The entire set, available for public download on Twitter’s news blog, encompasses spreadsheets and archived tweets from 3,841 Russian-linked accounts and 770 Iran-linked accounts.  The downloads add up to more than 450 gigabytes of data.

The micro-blogging company said in its post, “They include more than 10 million tweets and more than two million images, GIFs, videos, and Periscope broadcasts, including the earliest Twitter activity from accounts connected with these campaigns, dating back to 2009….”

Twitter has taken increasing steps to generate public goodwill over its perceived connection to Russian attempts to sway the 2016 election and its role in the spread of fake news.  In January, the company notified about 1.4 million users that they had interacted with Russia-linked accounts during the election or had followed those accounts at the time they were suspended.

 

Twitter Releases Tweets Showing Foreign Attempts to Influence US Politics

Twitter has released a collection of more than 10 million tweets it says are related to foreign efforts to influence U.S. elections going back a decade, including many tied to Russia’s digital efforts to sow chaos and sway the 2016 election in favor of Donald Trump.

Twitter says it made the cache, which includes tweets from Iran and Russia’s state-sponsored troll farm, Internet Research Agency, available so researchers around the world could conduct their own analyses.

The non-partisan Atlantic Council’s Digital Forensic Research Lab has been looking through the collection since last week.  In a preliminary analysis posted on Medium, the online publishing platform, the Lab noted operators from Iran and Russia appeared to have targeted politically polarized groups in order to maximize divisiveness in the United States’ political scene.  

“The Russian trolls were non-partisan: they tried to inflame everybody, regardless of race, creed, politics, or sexual orientation,” the Lab noted, “On many occasions, they pushed both sides of divisive issues.”

Sifting through the collection is no small task.  The entire set, available for public download on Twitter’s news blog, encompasses spreadsheets and archived tweets from 3,841 Russian-linked accounts and 770 Iran-linked accounts.  The downloads add up to more than 450 gigabytes of data.

The micro-blogging company said in its post, “They include more than 10 million tweets and more than two million images, GIFs, videos, and Periscope broadcasts, including the earliest Twitter activity from accounts connected with these campaigns, dating back to 2009….”

Twitter has taken increasing steps to generate public goodwill over its perceived connection to Russian attempts to sway the 2016 election and its role in the spread of fake news.  In January, the company notified about 1.4 million users that they had interacted with Russia-linked accounts during the election or had followed those accounts at the time they were suspended.

 

Hackers Accused of Ties to Russia Hit 3 E. European Companies: Cybersecurity Firm

Hackers have infected three energy and transport companies in Ukraine and Poland with sophisticated new malware and may be planning destructive cyber attacks, a software security firm said on Wednesday.

A report by researchers at Slovakia-based ESET did not attribute the hacking activity, recorded between 2015 and mid-2018, to any specific country but blamed it on a group that has been accused by Britain of having links to Russian military intelligence.

The report is the latest to raise suspicions in the West about Russia’s GRU spy agency, accused by London of conducting a “reckless campaign” of global cyber attacks and trying to kill a former Russian spy in England. Moscow denies the charges.

Investigators at ESET said the group responsible for a series of earlier attacks against the Ukrainian energy sector, which used malicious software known as BlackEnergy, had now developed and used a new malware suite called GreyEnergy.

ESET has helped investigate a series of high-profile cyber attacks on Ukraine in recent years, including those on the Ukrainian energy grid which led to power outages in late 2015.

Kiev has accused Moscow of orchestrating those attacks, while U.S. cybersecurity firm FireEye says a group known as Sandworm is thought to be responsible. Britain’s GCHQ spy agency said this month that BlackEnergy Actors and Sandworm are both names associated with the GRU.

“The important thing is that they are still active,” ESET researcher Robert Lipovsky told Reuters. “This shows that this very dangerous and persistent ‘threat actor’ is still active.”

Kremlin spokesman Dmitry Peskov said there was no evidence to support the allegations against the GRU and that Russia does not use cyber attacks against other countries.

“These are just more accusations. We are tired of denying them, because no one is listening,” he said.

After infection via emails laced with malicious weblinks or documents – a tactic known as “spear phishing” – or by compromising servers exposed to the internet, GreyEnergy allowed the attackers to map out their victim’s networks and gather confidential information such as passwords and login credentials, ESET said.

Lipovsky said his team then saw the hackers seek out critical parts of the companies’ systems, including computers which ran industrial control processes.

“It is my understanding that this was the reconnaissance and espionage phase, potentially leading up to cyber sabotage,” he said.

Global hacking campaign

The ESET report did not name the three companies infected in Ukraine and Poland, and Reuters was unable to identify them.

Ukraine’s Cyber Police confirmed the attacks on two Ukrainian companies but declined to give any further details. Polish authorities did not respond to requests for comment.

Ben Read, a senior manager on FireEye’s espionage analysis team, said his own work corroborated ESET’s report and that the Sandworm group was probably responsible.

The activity “is similar to the group we track as Sandworm,” he said. “And activity that we attribute to Sandworm has been named by the U.S. Department of Justice as being the GRU.”

Western countries including Britain and the United States issued a coordinated denunciation of Russia as a “pariah state” this month for what they described as a global hacking campaign run by the GRU.

GRU hackers have targeted institutions ranging from sports anti-doping bodies to a nuclear power company and the world chemical weapons watchdog, they said, as well as releasing the devastating “NotPetya” cyber worm which caused billions of dollars of damage worldwide in 2017.

The GRU, now formally known in Russia by a shorter acronym GU, is also accused by Britain of carrying out a nerve agent attack in England on former GRU officer Sergei Skripal. Moscow’s relations with the West have hit a post-Cold War low over Russia’s role in the conflicts in Ukraine and Syria.

Lipovsky and fellow ESET researcher Anton Cherepanov said the BlackEnergy attackers’ decision to upgrade to the new GreyEnergy malware may have been motivated by a need to cover their tracks and deflect attention from their activities.

The power outages triggered by the BlackEnergy attacks in Ukraine in December 2015 drew international attention and are recognised as the first blackout caused by a cyber attack.

“Threat actors need to switch up their arsenal from time to time,” Lipovsky said.

 

 

Hackers Accused of Ties to Russia Hit 3 E. European Companies: Cybersecurity Firm

Hackers have infected three energy and transport companies in Ukraine and Poland with sophisticated new malware and may be planning destructive cyber attacks, a software security firm said on Wednesday.

A report by researchers at Slovakia-based ESET did not attribute the hacking activity, recorded between 2015 and mid-2018, to any specific country but blamed it on a group that has been accused by Britain of having links to Russian military intelligence.

The report is the latest to raise suspicions in the West about Russia’s GRU spy agency, accused by London of conducting a “reckless campaign” of global cyber attacks and trying to kill a former Russian spy in England. Moscow denies the charges.

Investigators at ESET said the group responsible for a series of earlier attacks against the Ukrainian energy sector, which used malicious software known as BlackEnergy, had now developed and used a new malware suite called GreyEnergy.

ESET has helped investigate a series of high-profile cyber attacks on Ukraine in recent years, including those on the Ukrainian energy grid which led to power outages in late 2015.

Kiev has accused Moscow of orchestrating those attacks, while U.S. cybersecurity firm FireEye says a group known as Sandworm is thought to be responsible. Britain’s GCHQ spy agency said this month that BlackEnergy Actors and Sandworm are both names associated with the GRU.

“The important thing is that they are still active,” ESET researcher Robert Lipovsky told Reuters. “This shows that this very dangerous and persistent ‘threat actor’ is still active.”

Kremlin spokesman Dmitry Peskov said there was no evidence to support the allegations against the GRU and that Russia does not use cyber attacks against other countries.

“These are just more accusations. We are tired of denying them, because no one is listening,” he said.

After infection via emails laced with malicious weblinks or documents – a tactic known as “spear phishing” – or by compromising servers exposed to the internet, GreyEnergy allowed the attackers to map out their victim’s networks and gather confidential information such as passwords and login credentials, ESET said.

Lipovsky said his team then saw the hackers seek out critical parts of the companies’ systems, including computers which ran industrial control processes.

“It is my understanding that this was the reconnaissance and espionage phase, potentially leading up to cyber sabotage,” he said.

Global hacking campaign

The ESET report did not name the three companies infected in Ukraine and Poland, and Reuters was unable to identify them.

Ukraine’s Cyber Police confirmed the attacks on two Ukrainian companies but declined to give any further details. Polish authorities did not respond to requests for comment.

Ben Read, a senior manager on FireEye’s espionage analysis team, said his own work corroborated ESET’s report and that the Sandworm group was probably responsible.

The activity “is similar to the group we track as Sandworm,” he said. “And activity that we attribute to Sandworm has been named by the U.S. Department of Justice as being the GRU.”

Western countries including Britain and the United States issued a coordinated denunciation of Russia as a “pariah state” this month for what they described as a global hacking campaign run by the GRU.

GRU hackers have targeted institutions ranging from sports anti-doping bodies to a nuclear power company and the world chemical weapons watchdog, they said, as well as releasing the devastating “NotPetya” cyber worm which caused billions of dollars of damage worldwide in 2017.

The GRU, now formally known in Russia by a shorter acronym GU, is also accused by Britain of carrying out a nerve agent attack in England on former GRU officer Sergei Skripal. Moscow’s relations with the West have hit a post-Cold War low over Russia’s role in the conflicts in Ukraine and Syria.

Lipovsky and fellow ESET researcher Anton Cherepanov said the BlackEnergy attackers’ decision to upgrade to the new GreyEnergy malware may have been motivated by a need to cover their tracks and deflect attention from their activities.

The power outages triggered by the BlackEnergy attacks in Ukraine in December 2015 drew international attention and are recognised as the first blackout caused by a cyber attack.

“Threat actors need to switch up their arsenal from time to time,” Lipovsky said.

 

 

Shanghai Airport Automates Check-in with Facial Recognition

It’s now possible to check in automatically at Shanghai’s Hongqiao airport using facial recognition technology, part of an ambitious rollout of facial recognition systems in China that has raised privacy concerns as Beijing pushes to become a global leader in the field. 

Shanghai Hongqiao International Airport unveiled self-service kiosks for flight and baggage check-in, security clearance and boarding powered by facial recognition technology, according to the Civil Aviation Administration of China.

Similar efforts are under way at airports in Beijing and Nanyang city, in central China’s Henan province.

Many airports in China already use facial recognition to help speed security checks, but Shanghai’s system, which debuted Monday, is being billed as the first to be fully automated.

“It is the first time in China to achieve self-service for the whole check-in process,” said Zhang Zheng, general manager of the ground services department for Spring Airlines, the first airline to adopt the system at Hongqiao airport. Currently, only Chinese identity card holders can use the technology.

Spring Airlines said Tuesday that passengers had embraced automated check-in, with 87 percent of 5,017 people who took Spring flights on Monday using the self-service kiosks, which can cut down check-in times to less than a minute and a half.

Across greater China, facial recognition is finding its way into daily life. Mainland police have used facial recognition systems to identify people of interest in crowds and nab jaywalkers, and are working to develop an integrated national system of surveillance camera data.

Chinese media are filled with reports of ever-expanding applications: A KFC outlet in Hangzhou, near Shanghai, where it’s possible to pay using facial recognition technology; a school that uses facial recognition cameras to monitor students’ reactions in class; and hundreds of ATMs in Macau equipped with facial recognition devices to curb money laundering.

But increased convenience may come at a cost in a country with few rules on how the government can use biometric data.

“Authorities are using biometric and artificial intelligence to record and track people for social control purposes,” said Maya Wang, senior China researcher for Human Rights Watch. “We are concerned about the increasing integration and use of facial recognition technologies throughout the country because it provides more and more data points for the authorities to track people.”

Shanghai Airport Automates Check-in with Facial Recognition

It’s now possible to check in automatically at Shanghai’s Hongqiao airport using facial recognition technology, part of an ambitious rollout of facial recognition systems in China that has raised privacy concerns as Beijing pushes to become a global leader in the field. 

Shanghai Hongqiao International Airport unveiled self-service kiosks for flight and baggage check-in, security clearance and boarding powered by facial recognition technology, according to the Civil Aviation Administration of China.

Similar efforts are under way at airports in Beijing and Nanyang city, in central China’s Henan province.

Many airports in China already use facial recognition to help speed security checks, but Shanghai’s system, which debuted Monday, is being billed as the first to be fully automated.

“It is the first time in China to achieve self-service for the whole check-in process,” said Zhang Zheng, general manager of the ground services department for Spring Airlines, the first airline to adopt the system at Hongqiao airport. Currently, only Chinese identity card holders can use the technology.

Spring Airlines said Tuesday that passengers had embraced automated check-in, with 87 percent of 5,017 people who took Spring flights on Monday using the self-service kiosks, which can cut down check-in times to less than a minute and a half.

Across greater China, facial recognition is finding its way into daily life. Mainland police have used facial recognition systems to identify people of interest in crowds and nab jaywalkers, and are working to develop an integrated national system of surveillance camera data.

Chinese media are filled with reports of ever-expanding applications: A KFC outlet in Hangzhou, near Shanghai, where it’s possible to pay using facial recognition technology; a school that uses facial recognition cameras to monitor students’ reactions in class; and hundreds of ATMs in Macau equipped with facial recognition devices to curb money laundering.

But increased convenience may come at a cost in a country with few rules on how the government can use biometric data.

“Authorities are using biometric and artificial intelligence to record and track people for social control purposes,” said Maya Wang, senior China researcher for Human Rights Watch. “We are concerned about the increasing integration and use of facial recognition technologies throughout the country because it provides more and more data points for the authorities to track people.”

Google to Charge for Apps on Android Phones in Europe

Google says it will start charging smartphone makers to pre-install apps like Gmail, YouTube and Google Maps on Android handsets sold in Europe, in response to a record $5 billion EU antitrust fine.

The U.S. tech company’s announcement Tuesday is a change from its previous business model, in which it let phone makers install its suite of popular mobile apps for free on phones running its Android operating system.

It’s among measures the company is taking to comply with the July ruling by EU authorities that found Google allegedly abused the dominance of Android to stifle competitors, even as it appeals the decision.

The company will also let phone makers install rival versions of Android, the most widely used mobile operating system.

Google to Charge for Apps on Android Phones in Europe

Google says it will start charging smartphone makers to pre-install apps like Gmail, YouTube and Google Maps on Android handsets sold in Europe, in response to a record $5 billion EU antitrust fine.

The U.S. tech company’s announcement Tuesday is a change from its previous business model, in which it let phone makers install its suite of popular mobile apps for free on phones running its Android operating system.

It’s among measures the company is taking to comply with the July ruling by EU authorities that found Google allegedly abused the dominance of Android to stifle competitors, even as it appeals the decision.

The company will also let phone makers install rival versions of Android, the most widely used mobile operating system.

Huawei Launches New flagship Phones in Bid to Keep No. 2 Spot

Huawei unveiled new flagship smartphones with novel smart camera and video features on Tuesday, as it seeks to sustain momentum among price-conscious consumers.

The Chinese company, which overtook Apple this year to become the No. 2 smartphone maker by units – behind South Korea’s Samsung (005930.KS) – introduced its Mate 20 phone series using Leica camera technology.

Huawei’s new premium phone line-up has four models available around the world, expect in the United States where sales are effectively banned over whispered national security concerns.

The new line-up includes the Mate 20, with list prices ranging from 799-849 euros ($925-$983), depending on memory configuration.

The fuller-featured Mate 20 Pro, is priced as low as 799 pounds at some UK retailers and list priced at 849 pounds or 1,049 euros across Europe. A comparable iPhone X Max from Apple costs 1,099 pounds in the UK.

The new phones include a new ultra-wide angle lens, as well as a 3x telephoto lens and a macro that shoots objects as close as 2.5 centimeters (1 inch).

Mate P20 models take advantage of artificial intelligence features built into Huawei’s own Kirin chipsets.

Features available to Mate 20 users include being able to isolate human subjects and desaturate the colors around them in order to highlight people against their backgrounds.

Huawei incorporates bigger light-sensing chips than rival phones to take better pictures in low-light conditions.

Gartner analyst Roberta Cozza said that in a highly commoditized smartphone market of look-alike phones, Huawei is managing to differentiate itself with camera and personalization features.

“With the Mate 20, Huawei is setting the bar for what users can expect from photography using a smartphone,” Cozza said.

The Chinese phone maker managed to surpass Apple to take the No. 2 spot in the second quarter, industry data shows, despite being effectively excluded from the U.S. market.

However, Apple commanded 43 percent of the premium market and a lion’s share of profits, CounterPoint Research estimated.

“Huawei is clearly ticking all the key boxes needed to displace rivals – and not just Android-powered rivals,” said Ben Wood, research chief of mobile industry consulting firm CCS Insight.

Wood said Huawei’s move to match Apple iPhone’s characteristic swipe gestures and face unlock features on its Mate 20 Pro could, in theory, make it easier for committed Apple buyers to switch, although he said that was unlikely near term.

“But it’s clear that Huawei has an eye on the future and is ready to take share from Apple if the time comes that a loyal iPhone owner decides to try something else,” he said.

The new premium phone line-up from the world’s biggest telecom equipment maker includes four models, the Mate 20, Mate 20 Pro, Mate 20 X, with a 7.2 inch display screen, and a Porsche Design limited edition phone.

Huawei Launches New flagship Phones in Bid to Keep No. 2 Spot

Huawei unveiled new flagship smartphones with novel smart camera and video features on Tuesday, as it seeks to sustain momentum among price-conscious consumers.

The Chinese company, which overtook Apple this year to become the No. 2 smartphone maker by units – behind South Korea’s Samsung (005930.KS) – introduced its Mate 20 phone series using Leica camera technology.

Huawei’s new premium phone line-up has four models available around the world, expect in the United States where sales are effectively banned over whispered national security concerns.

The new line-up includes the Mate 20, with list prices ranging from 799-849 euros ($925-$983), depending on memory configuration.

The fuller-featured Mate 20 Pro, is priced as low as 799 pounds at some UK retailers and list priced at 849 pounds or 1,049 euros across Europe. A comparable iPhone X Max from Apple costs 1,099 pounds in the UK.

The new phones include a new ultra-wide angle lens, as well as a 3x telephoto lens and a macro that shoots objects as close as 2.5 centimeters (1 inch).

Mate P20 models take advantage of artificial intelligence features built into Huawei’s own Kirin chipsets.

Features available to Mate 20 users include being able to isolate human subjects and desaturate the colors around them in order to highlight people against their backgrounds.

Huawei incorporates bigger light-sensing chips than rival phones to take better pictures in low-light conditions.

Gartner analyst Roberta Cozza said that in a highly commoditized smartphone market of look-alike phones, Huawei is managing to differentiate itself with camera and personalization features.

“With the Mate 20, Huawei is setting the bar for what users can expect from photography using a smartphone,” Cozza said.

The Chinese phone maker managed to surpass Apple to take the No. 2 spot in the second quarter, industry data shows, despite being effectively excluded from the U.S. market.

However, Apple commanded 43 percent of the premium market and a lion’s share of profits, CounterPoint Research estimated.

“Huawei is clearly ticking all the key boxes needed to displace rivals – and not just Android-powered rivals,” said Ben Wood, research chief of mobile industry consulting firm CCS Insight.

Wood said Huawei’s move to match Apple iPhone’s characteristic swipe gestures and face unlock features on its Mate 20 Pro could, in theory, make it easier for committed Apple buyers to switch, although he said that was unlikely near term.

“But it’s clear that Huawei has an eye on the future and is ready to take share from Apple if the time comes that a loyal iPhone owner decides to try something else,” he said.

The new premium phone line-up from the world’s biggest telecom equipment maker includes four models, the Mate 20, Mate 20 Pro, Mate 20 X, with a 7.2 inch display screen, and a Porsche Design limited edition phone.