Category Archives: Technology

silicon valley & technology news

US Snatches Back Ransom from Colonial Pipeline Hackers

U.S. law enforcement officials say they have hit back at the Russian-based criminal network that caused gas pipelines to shut down across parts of the country last month, seizing much of the multimillion-dollar ransom payment before it could be used.The Justice Department announced Monday it recovered $2.3 million of the approximately $5 million Colonial Pipeline paid to the DarkSide Network following the ransomware attack, which resulted in fuel shortages along the U.S. East Coast.“We turned the tables on DarkSide,” said Deputy Attorney General Lisa Monaco, describing the seizure as a “significant development.”“Ransomware attacks are always unacceptable, but when they target critical infrastructure, we will spare no effort in our response,” she added.Tanker trucks are parked near the entrance of Colonial Pipeline Company, May 12, 2021, in Charlotte, N.C.Colonial Pipeline, the target of DarkSide’s May 7 attack, is the top fuel pipeline operator in the U.S., responsible for about half of the fuel supply for the East Coast.Following the attack, the company made the decision to meet DarkSide’s demands, paying out about $5 million in Bitcoin cryptocurrency. But U.S. government officials said Colonial also worked closely with law enforcement agencies, who were able to track the payment to a virtual wallet.Specifically, officials said they were able to obtain a virtual key that unlocked the contents of the wallet.As a result, the Justice Department said it was able to recover about 80% of the cryptocurrency, which has dropped in value in recent weeks, before DarkSide could access it.“We deprived a cybercriminal enterprise of the object of their activity,” said FBI Deputy Director Paul Abbate. “For financially motivated cybercriminals, especially those presumably located overseas, cutting off access to revenue is one of the most impactful consequences we can impose.”Officials said this is not the first time they have been able to recover ransom payment made to groups like DarkSide, and encouraged other companies to cooperate with the government if they are targeted.“The message we are sending today is that if you come forward and work with law enforcement, we may be able to take the type of action that we took today to deprive the criminal actors of what they’re going after,” Monaco said.But she added that this type of operation is a “significant undertaking” and “we cannot guarantee, and we may not be able to do this, in every instance.”The FBI has been investigating DarkSide since last October, blaming the network for attacks against 90 victims across critical sectors such as manufacturing, health care and energy.DarkSide and its affiliates have also been connected to ransomware attacks in at least 14 other countries. Last month, The Wall Street Journal reported the group made almost $60 million in seven months, including $46 million in the first three months of this year.In a statement late Monday, Colonial Pipeline President Joseph Blount said the company was grateful for the help from both the Justice Department and the FBI, calling them “instrumental in helping us to understand the threat actor and their tactics.”“Holding cyber criminals accountable and disrupting the ecosystem that allows them to operate is the best way to deter and defend against future attacks of this nature,” Blount added. “As our investigation into this event continues, Colonial will continue its transparency in sharing intelligence and learnings with the FBI and other federal agencies.”The Justice Department announcement also earned praise from some private cybersecurity firms, with one calling the seizure of the ransom payment a “welcome development.”“In addition to the immediate benefits of this approach, a stronger focus on disruption may disincentivize this behavior, which is growing in a vicious cycle,” John Hultquist, vice president of analysis at Mandiant, said in a statement. “Law enforcement agencies need to broaden their approach beyond building cases against criminals who may be beyond the grasp of the law.”U.S. President Joe Biden is expected to raise the issue of the DarkSide ransomware attack when he meets with Russian President Vladimir Putin in Geneva, Switzerland, next week.Biden has previously said Moscow bears “some responsibility” to deal with the attack.“The president’s message will be that responsible states do not harbor ransomware criminals, and responsible countries take decisive action against these ransomware networks,” White House press secretary Jen Psaki told reporters last week.National Security Adviser Jake Sullivan said Monday that Biden will also use meetings next week with G-7 leaders to discuss “increasing the robustness and resilience of our defense against ransomware attacks.”Sullivan said the U.S. also hopes to discuss ways to better share information about ransomware attacks.Information from Reuters was used in this report.

Possible First Use of AI-Armed Drones Triggers Alarm Bells

Western military experts are assessing whether an autonomous drone operated by artificial intelligence, or AI, killed people — in Libya last year — for the first time without a human controller directing it remotely to do so.
 
A report by a United Nations panel of experts issued last week that concluded an advanced drone deployed in Libya “hunted down and remotely engaged” soldiers fighting for Libyan general Khalifa Haftar has prompted a frenetic debate among Western security officials and analysts.  
 
Governments at the United Nations have been debating for months whether a global pact should be agreed on the use of armed drones, autonomous and otherwise, and what restrictions should be placed on them. The U.N.’s Libya report is adding urgency to the debate. Drone advances have “a lot of implications regionally and globally,” says Ziya Meral of the Britain’s Royal United Services Institute, a defense think tank.
 
“It is time to assess where things are with Turkish drones and advanced warfare technology and what this means for the region and what it means for NATO,” he said at a RUSI-hosted event in London.  
 
According to the U.N. report, Turkish-made Kargu-2 lethal autonomous aircraft launched so-called swarm attacks, likely on behalf of Libya’s Government of National Accord, against the warlord Haftar’s militias in March last year, marking the first time AI-equipped drones accomplished a successful attack. Remnants of a Kargu-2 were recovered later.  
 
The use of autonomous drones that do not require human operators to guide them remotely once they have been programmed is opposed by many human rights organizations. There were rumors that Turkish-supplied AI drones, alongside remote-guided ones, were used last year by Azerbaijani forces in their clashes with Armenia in the disputed region of Nagorno-Karabakh and its surrounding territories.
 Myriad of dilemmas
If AI drones did launch lethal swarm attacks it would mark a “new chapter in autonomous weapons,” worries the Bulletin of the Atomic Scientists. Critics of AI drones, which can use facial-recognition technology, say they raise a number of moral, ethical and legal dilemmas.  
 
“These types of weapons operate on software-based algorithms ‘taught’ through large training datasets to, for example, classify various objects. Computer vision programs can be trained to identify school buses, tractors, and tanks. But the datasets they train on may not be sufficiently complex or robust, and an artificial intelligence (AI) may ‘learn’ the wrong lesson,” the non-profit Bulletin warns.  
 
The manufacturer of the Kargu-2, Defense Technologies and Trade (STM), told Turkish media last year that their drones are equipped with facial-recognition technology, allowing individual targets to be identified and neutralized without having to deploy ground forces. And company executives say Kargu-2 drones can swarm together overwhelming defenses.
 
Last month, Turkish President Recep Tayyip Erdogan lauded the success of Turkish unmanned aerial vehicles (UAV), saying the results they had produced “require war strategies to be rewritten.” Turkey has deployed them in military operations in northern Syria, Turkish officials have acknowledged.  
 
Speaking at a parliamentary meeting of his ruling Justice and Development Party (AKP) in Ankara, Erdogan said Turkey plans to go further and is aiming to be among the first countries to develop an AI-managed warplane. Recently the chief technology officer of Baykar, a major Turkish drone manufacturer, announced the company had slated 2023 for the maiden flight of its prototype unmanned fighter jet.
 ‘A significant player’
Sanctions and embargoes on Turkey in recent years have been a major driving force behind Ankara pressing ahead to develop a new generation of unconventional weapons, says Ulrike Franke of the European Council for Foreign Relations. “Turkey has become a significant player in the global drone market,” she said at the RUSI event. When it comes to armed drones, she noted, there are four states dominating drone development — the U.S., Israel, China and Turkey. The latter pair, the “new kids on the block,” are driving drone proliferation because unlike the U.S. they are not reticent about export sales, she said.  
 
“Turkey has shown that a mid-sized power, when it puts its mind and money behind it, can develop very sophisticated armed drones,” says Franke.
 
Last October when the disputed enclave of Nagorno-Karabakh saw the worst fighting there since 1994, Turkish drones were assessed as having given Azerbaijan a key edge over the Armenians. Turkish drones sliced through Armenia’s air defenses and pummeled its Russian-made tanks.  
 
Analysts calculate around 90 countries have military drones for reconnaissance and intelligence missions and at least a dozen states have armed drones. Britain is believed to have ten; Turkey around 140. The U.S. air force has around 300 Reaper drones alone. The deployment of armed drones to conduct targeted killings outside formal war zones has been highly contentious. But AI drone development is adding to global alarm.
 
“With more and more countries acquiring armed drones, there is a risk that the controversies surrounding how drones are used and the challenges these pose to international legal frameworks, as well as to democratic values such as transparency, accountability and the rule of law, could also increase,” Britain’s Chatham House noted in a research paper published in April.  
 
“This is accentuated further, given that the use of drones continues to expand and to evolve in new ways, and in the absence of a distinct legal framework to regulate such use,” say the paper’s authors Jessica Dorsey and Nilza Amaral.   

China Blocks Several Cryptocurrency-related Social Media Accounts Amid Crackdown

A slew of crypto-related accounts in China’s Twitter-like Weibo platform were blocked over the weekend, as Beijing stepped up a crackdown on bitcoin trading and mining. More actions are expected, including linking illegal crypto activities in China more directly with the country’s criminal law, according to analysts and a financial regulator. Last month, China’s State Council, or cabinet, vowed to crack down on bitcoin mining and trading, escalating a campaign against cryptocurrencies days after three industry bodies banned crypto-related financial and payment services. Over the weekend, access to several of widely followed crypto-related Weibo accounts was denied, with a message saying each account “violates laws and rules.” “It’s a Judgment Day for crypto KOL,” wrote a Weibo bitcoin commentator, or key opinion leader (KOL), who calls herself “Woman Dr. bitcoin mini.” Her main account was also blocked on Saturday. “The government makes it clear that no Chinese version of Elon Musk can exist in the Chinese crypto market,” said NYU Law School adjunct professor Winston Ma, referring to the Tesla founder and cryptocurrency enthusiast. Ma, author of the book “The Digital War,” also expects China’s supreme court to publish a judicial interpretation soon that may link crypto mining and trading businesses with China’s body of criminal law. The view was echoed by a financial regulator, who said that such an interpretation would address the legal ambiguity that has failed to clearly identify bitcoin trading businesses as “illegal operations.” All the rules against cryptocurrencies so far in China have been published by administrative bodies. The Weibo freeze comes as Chinese media have stepped up reporting against crypto trading. The official Xinhua News Agency has published articles that exposed a series of crypto-related scams. State broadcaster CCTV has said cryptocurrency is a lightly regulated asset often used in black market trade, money laundering, arms smuggling, gambling and drug dealings. The stepped-up crackdown also comes as China’s central bank is accelerating testing of its own digital currency. 

Microsoft Says ‘Tank Man’ Image Blocking Due to Human Error

Microsoft Corp. blamed “accidental human error” for its Bing search engine briefly not showing image results for the search term “tank man” on the anniversary of the bloody military crackdown in Beijing’s Tiananmen Square in 1989.Users in different parts of the world, including the U.S., said Friday that no image results were returned when they searched for the term “tank man.””Tank man” refers to the iconic image of a standoff between an unidentified civilian and a line of military tanks leaving Beijing’s Tiananmen Square after a brutal crackdown on pro-democracy protesters. The photo has become a symbol of defiance around the world.After being alerted by reporters, Microsoft said in a statement that the issue was “due to an accidental human error and has been resolved.” Hours later, images of “tank man” photographs were returned by the search engine.The company did not elaborate on what the human error was or how it had happened. Nor did it say how much of its Bing development team is China-based. The company’s  largest research and development center outside the United States is in China, and it posted a job in January for a China-based senior software engineer to lead a team that develops the technology powering Bing image search.Chinese authorities require search engines, websites and social media platforms operating within the country to censor keywords and results deemed politically sensitive or critical of the Chinese government.References to the Tiananmen Square crackdown in 1989 are blocked in China, as are images relating to the event, such as “tank man.”Microsoft’s Bing is one of the few international search engines that operate in China, where it abides by local censorship laws and competes with larger Chinese search engines such as Baidu and Sogou.Bing has a 2.5% market share in China, according to data site Statcounter.Rival Google exited the Chinese market in 2010 after four years of operation, following disputes over censorship and a major hacking attack that Google believes originated in China.

Millions of Nigerian Twitter Users Blocked as Ban Takes Hold 

Millions of Nigerians struggled Saturday to access Twitter, a day after authorities suspended the service in response to the company’s deletion of a tweet by President Muhammadu Buhari for violating its terms of service.The Twitter ban took effect Saturday morning. Millions of users in Lagos and Abuja said they were unable to access their accounts.Authorities said Friday that they had banned Twitter because it was persistently being used “for activities that are capable of undermining Nigeria’s corporate existence.”Twitter responded to the ban, saying it was “deeply concerning.”‘Reverse the unlawful suspension’Many citizens and rights groups objected to the ban. Amnesty International said it was a threat to free speech and must be reversed without delay. “Amnesty International condemns the Nigerian government’s suspension of Twitter in Nigeria,” said Seun Bakare, a spokesperson for the organization. Bakare said Amnesty had called on Nigerian authorities “to immediately reverse the unlawful suspension and other plans to gag the media, to repress the civic space and to undermine human rights of the people. The Nigerian government has an obligation to protect and promote International human rights laws and standards.”FILE – Nigerian President Muhammadu Buhari attends a press briefing in Pretoria, South Africa, Oct. 3, 2019.The ban mostly affected the country’s largest network providers, MTN and Airtel.Some users Saturday were able to access Twitter using Wi-Fi connections. Others were avoiding the shutdown by using virtual private networks that make them appear to be using Twitter from another country.VPN providers have since Friday seen a surge in usage. Abuja resident Basil Akpakavir was among Twitter users getting around the government ban.”They are relentless in their intolerant attitude toward people that have contrary opinion to theirs,” Akpakavir said. “But the truth is that we’re equal to the task, as well. Whichever way they want it, we’re going to give it to them. We want a Nigeria that is prosperous, that is built on the tenets of true democracy.”Separatist group singled outBuhari had threatened earlier in the week to crack down on separatist group Indigenous People of Biafra (IPOB), in a manner similar to the civil war waged in 1967 when 3 million Biafrans were estimated to have died in battle against the Nigerian government.The president’s tweet was criticized as a war threat to separatist groups, and Twitter deleted it.Amnesty’s Bakare said the government must be held accountable for comments capable of instigating division and violence.”It is important that government platforms, and in this particular instance the president, do not invite violence or division,” Bakare said. “The government must be alive to the increased tensions in the country, given the spate of insecurity.”The Nigerian government has often attempted to regulate the use of social media to reduce criticism.Late last year, the government proposed a social media regulation bill after the End SARS protests against police brutality, when social media were used by young Nigerians to mobilize and challenge what they said was bad governance.

Global War on Ransomware? Hurdles Hinder US Response

Foreign keyboard criminals with scant fear of repercussions have paralyzed U.S. schools and hospitals, leaked highly sensitive police files, triggered fuel shortages and, most recently, threatened global food supply chains.Escalating havoc caused by ransomware gangs raises an obvious question: Why has the United States, believed to have the world’s greatest cyber capabilities, looked so powerless to protect its citizens from these kind of criminals operating with near impunity out of Russia and allied countries?The answer is that there are numerous technological, legal and diplomatic hurdles to going after ransomware gangs. Until recently, it just hasn’t been a high priority for the U.S. government.That has changed as the problem has grown well beyond an economic nuisance. President Joe Biden intends to confront Russia’s leader, Vladimir Putin, about Moscow’s harboring of ransomware criminals when the two men meet in Europe later this month. The Biden administration has also promised to boost defenses against attacks, improve efforts to prosecute those responsible and build diplomatic alliances to pressure countries that harbor ransomware gangs.Calls are growing for the administration to direct U.S. intelligence agencies and the military to attack ransomware gangs’ technical infrastructure used for hacking, posting sensitive victim data on the dark web and storing digital currency payouts.Fighting ransomware requires the nonlethal equivalent of the “global war on terrorism” launched after the Sept. 11 attacks, said John Riggi, a former FBI agent and senior adviser for cybersecurity and risk for the America Hospital Association. Its members have been hard hit by ransomware gangs during the coronavirus pandemic.”It should include a combination of diplomatic, financial, law enforcement, intelligence operations, of course, and military operations,” Riggi said.A public-private task force including Microsoft and Amazon made similar suggestions in an 81-page report that called for intelligence agencies and the Pentagon’s U.S. Cyber Command to work with other agencies to “prioritize ransomware disruption operations.””Take their infrastructure away, go after their wallets, their ability to cash out,” said Philip Reiner, a lead author of the report. He worked at the National Security Council during the Obama presidency and is now CEO at The Institute for Security and Technology.A JBS Processing Plant stands dormant after halting operations on June 1, 2021, in Greeley, Colorado. JBS facilities around the globe were impacted by a ransomware attack, forcing many of its facilities to shut down.But the difficulties of taking down ransomware gangs and other cybercriminals have long been clear. The FBI’s list of most-wanted cyber fugitives has grown at a rapid clip and now has more than 100 entries, many of whom are not exactly hiding. Evgeniy Bogachev, indicted nearly a decade ago for what prosecutors say was a wave of cyber bank thefts, lives in a Russian resort town and “is known to enjoy boating” on the Black Sea, according to the FBI’s wanted listing.Ransomware gangs can move around, do not need much infrastructure to operate and can shield their identities. They also operate in a decentralized network. For instance, DarkSide, the group responsible for the Colonial Pipeline attack that led to fuel shortages in the South, rents out its ransomware software to partners to carry out attacks.Katie Nickels, director of intelligence at the cybersecurity firm Red Canary, said identifying and disrupting ransomware criminals takes time and serious effort.”A lot of people misunderstand that the government can’t just willy-nilly go out and press a button and say, well, nuke that computer,” she said. “Trying to attribute to a person in cyberspace is not an easy task, even for intelligence communities.”Reiner said those limits do not mean the United States cannot still make progress against defeating ransomware, comparing it with America’s ability to degrade the terrorist group al-Qaida while not capturing its leader, Ayman al-Zawahiri, who took over after U.S. troops killed Osama bin Laden.”We can fairly easily make the argument that al-Qaida no longer poses a threat to the homeland,” Reiner said. “So, short of getting al-Zawahiri, you destroy his ability to actually operate. That’s what you can do to these [ransomware] guys.”The White House has been vague about whether it plans to use offensive cyber measures against ransomware gangs. Press secretary Jen Psaki said Wednesday that “we’re not going to take options off the table,” but she did not elaborate. Her comments followed a ransomware attack by a Russian gang that caused outages at Brazil’s JBS SA, the second-largest producer of beef, pork and chicken in the United States.FILE – Tanker trucks are parked near the entrance of Colonial Pipeline Company, May 12, 2021, in Charlotte, N.C. The operator of the nation’s largest fuel pipeline paid $4.4 million to a gang of hackers who broke into its computer systems.Gen. Paul Nakasone, who leads U.S. Cyber Command and the National Security Agency, said at a recent symposium that he believes the U.S. will be “bringing the weight of our nation,” including the Defense Department, “to take down this [ransomware] infrastructure outside the United States.”Sen. Angus King, an independent from Maine who is a legislative leader on cybersecurity issues, said the debate in Congress over how aggressive the U.S. needs to be against ransomware gangs, as well as state adversaries, will be “front and center of the next month or two.””To be honest, it’s complicated because you’re talking about using government agencies, government capabilities to go after private citizens in another country,” he said.The U.S. is widely believed to have the best offensive cyber capabilities in the world, though details about such highly classified activities are scant. Documents leaked by former NSA contractor Edward Snowden show the U.S. conducted 231 offensive cyber operations in 2011. More than a decade ago a virus called Stuxnet attacked control units for centrifuges in an underground site in Iran, causing the sensitive devices to spin out of control and destroy themselves. The cyberattack was attributed to America and Israel.U.S. policy called “persistent engagement” already authorizes cyberwarriors to engage hostile hackers in cyberspace and disrupt their operations with code. U.S. Cyber Command has launched offensive operations related to election security, including against Russian misinformation officials during U.S. midterm elections in 2018.After the Colonial Pipeline attack, Biden promised that his administration was committed to bringing foreign cybercriminals to justice. Yet even as he was speaking from the White House, a different Russian-linked ransomware gang was leaking thousands of highly sensitive internal files — including deeply personal background checks — belonging to the police department in the nation’s capital. Experts believe it’s the worst ransomware attack against a U.S.-based law enforcement agency.”We are not afraid of anyone,” the hackers wrote in a follow-up post. 

Nigeria Suspends Twitter Over President’s Deleted Tweet

Nigeria’s government said Friday it was suspending Twitter indefinitely in Africa’s most populous nation, a day after the company deleted a controversial tweet President Muhammadu Buhari made about a secessionist movement.It was not immediately clear when the suspension would go into effect as users could still access Twitter late Friday, and many said they would simply use VPNs to maintain access to the platform.Others mocked the government for using the platform to announce the action.”You’re using Twitter to suspend Twitter? Are you not mad?” one user tweeted in response.Information Minister Lai Mohammed said Friday that government officials took the step because the platform was being used “for activities that are capable of undermining Nigeria’s corporate existence.”Mohammed criticized Twitter for deleting the post. “The mission of Twitter in Nigeria is very suspicious,” he said, adding that Twitter had in the past ignored “inciting” tweets against the Nigerian government.Twitter deleted Buhari’s post on Wednesday, calling it abusive, after the president threatened suspected separatist militants in the southeast.More than 1 million people died during the 1967-70 civil war that erupted when secessionists sought to create an independent Biafra for the ethnic Igbo people. Buhari, an ethnic Fulani, was on the opposing side in the war against the Igbos.In recent months, pro-Biafra separatists have been accused of attacking police and government buildings, and Buhari vowed to retaliate and “treat them in the language they understand.”

US Law Enforcement Eager to Dig Into Your Car Data

Do you know how much data your car is collecting? VOA’s Veronica Balderas Iglesias reports on how law enforcement agencies in the U.S. are among those eager to dig into the automobile data gold mines.
Camera: Veronica Balderas Iglesias      Producer: Veronica Balderas Iglesias

Facebook Suspends Trump for at Least Two Years

Facebook said Friday it would suspend Donald Trump’s accounts for at least two years, retaining a ban on the former U.S. president that it imposed after determining he incited the deadly January 6 insurrection at the U.S. Capitol. “At the end of this period, we will look to experts to assess whether the risk to public safety has receded,” Facebook Vice President Nick Clegg wrote in a blog post Friday.  The social media giant’s independent oversight board upheld its block on Trump, which was enacted after the riot because the company said his posts were inciting violence. On January 6, Trump implored thousands of supporters who had come to Washington for a “Save America March” to “fight like hell” to overturn his defeat, just before the riot aimed at preventing the certification of Joe Biden’s presidential victory. Five people died, including a federal police officer. The ban expires on January 7, 2023, two years after Facebook first blocked the former president. The timing of Facebook’s decision will reduce Trump’s ability to influence midterm congressional elections in November 2022, but his account could be restored well before voters go to polls in 2024 should Trump decide to seek the presidency again that year. In response to Facebook’s decision, Trump said in a statement it is “an insult to the record-setting 75M people, plus many others, who voted for us in the 2020 Rigged Presidential Election. They shouldn’t be allowed to get away with this censoring and silencing and ultimately, we will win.” FILE – The founder and CEO of Facebook Mark Zuckerberg speaks during the 56th Munich Security Conference in Munich, Germany, Feb. 15, 2020.In a separate statement he added, “Next time I’m in the White House there will be no more dinners, at his request, with Mark Zuckerberg and his wife. It will be all business!” Zuckerberg is the co-founder and chief executive officer of Facebook. At the White House briefing Friday, press secretary Jen Psaki said the ban was the company’s decision. “Our view continues to be, though, that every platform, whether it’s Facebook, Twitter, any other platform that is disseminating information to millions of Americans, has a responsibility to crack down on disinformation, to crack down on false information whether it’s about the election or even about the vaccine, as we are trying to keep the American public safe.” 
 

Reports: Facebook to End Rule Exemptions for Politicians

Facebook plans to end a contentious policy championed by CEO Mark Zuckerberg that exempted politicians from certain moderation rules on its site, according to several news reports.The company’s rationale for that policy held that the speech of political leaders is inherently newsworthy and in the public interest even if it is offensive, bullying or otherwise controversial. The social media giant is currently mulling over what to do with the account of former President Donald Trump, which it “indefinitely” suspended Jan. 6, leaving it in Facebook limbo with its owners unable to post.The change in policy was first reported by the tech site The Verge and later confirmed by The New York Times and The Washington Post.Facebook has had a general “newsworthiness exemption” since 2016. But it garnered attention in 2019 when Nick Clegg, vice president of global affairs and communications, announced that speech from politicians will be treated as “newsworthy content that should, as a general rule, be seen and heard.”The newsworthiness exemption, he explained in a blog post at the time, meant that if “someone makes a statement or shares a post which breaks our community standards we will still allow it on our platform if we believe the public interest in seeing it outweighs the risk of harm.”This hasn’t given politicians unlimited license, however. When Facebook suspended Trump in January, it cited “the risk of further incitement of violence” following the deadly insurrection at the U.S. Capitol as the reason. The company says it has never used the newsworthiness exemption for any of Trump’s posts.Facebook declined to comment.

Twitter Announces New Premium Services 

Twitter announced a new premium service for users in Canada and Australia that allows paying users to adjust tweets, among other features.Called Twitter Blue, the service allows users to preview and modify a tweet up to 30 seconds before publishing it. Users can also bookmark and organize tweets, making them easier to find.Twitter Blue will also format threads, or series of tweets, into a more readable format.”We’ve heard from the people that use Twitter a lot, and we mean a lot, that we don’t always build power features that meet their needs,” two Twitter product managers, Sara Beykpour and Smita Mittal Gupta, wrote in a blog post about the new service.Twitter Blue will cost $4.49 a month in Australian dollars and $3.49 in Canadian dollars.Twitter says that more features are forthcoming and that users in other parts of the world will have access to Twitter Blue in the “near future.” 

White House Urges US Companies to Protect Against Ransomware

The White House on Thursday urged American businesses to take new precautions to combat disruptive ransomware attacks that have increasingly hobbled companies throughout Western economies.Jen Psaki, President Joe Biden’s press secretary, urged private industry to harden access to their computer systems, saying the government “can’t do it alone.”Anne Neuberger, a White House cybersecurity official, said in a statement that the “most important takeaway” from the recent attacks, including those affecting a key gasoline pipeline and a meat production company in the U.S., is that “companies that view ransomware as a threat to their core business operations rather than a simple risk of data theft will react and recover more effectively.”“Many ransomware criminals are aggressive and sophisticated and will find the equivalent of unlocked doors,” Neuberger said. “The threats are serious, and they are increasing.”She urged businesses to “back up your data, system images, and configurations, regularly test them, and keep the backups offline.”Neuberger said companies should “ensure that backups are regularly tested and that they are not connected to the business network, as many ransomware variants try to find and encrypt or delete accessible backups.”The deputy national security adviser for cyber and emerging tech also said U.S. businesses should “test your incident response plan” because “there’s nothing that shows the gaps in plans more than testing them.”Neuberger said companies should use third parties to test their own security work, segment corporate business functions from manufacturing and production operations and regularly test contingency plans “so that safety critical functions can be maintained during a cyber incident.” 

EU Introduces ‘Digital Wallet’ to Store Official Documents

The European Union (EU) Thursday unveiled its plans for a digital ID wallet that would hold all official documents residents would need to allow them access to the information at home or anywhere across the 27-nation bloc.
 
At a news briefing on the proposal in Brussels, European Commission Vice President Margrethe Vestager said the European Digital Identity Wallet would be a smartphone app that would let users store electronic forms of identification and other official documents, such as driver’s licenses, prescriptions and school diplomas.
 
Vestager said the plan would enable the bloc’s 450 million residents to do anything they would at home — rent an apartment, open a bank account — in any EU member state. She was quick to add that the plan would not be mandatory and that citizens could put as much or as little data in the app as they felt comfortable with.  
 
She said technical work was already underway to ensure the app had the latest encryption technology available and could not be hacked.  
 
As many as 14 EU countries already have their own national digital ID systems, and EU officials say the app is being developed for compatibility with those systems. The commission plans to discuss the digital wallet with the EU’s 27 member countries and aims to get them to agree on technical details by fall so pilot projects can begin.
 
The proposal is part of a wider plan by the EU to go more digital and is a key part of its post-COVID-19 recovery package. The bloc has set a target of having all public services in the EU available online by 2030 and ensuring that every EU citizen has a digital medical record.

ASMR Videos Are New Way to Fight Stress

YouTube videos that cause an autonomous sensory meridian response, or ASMR, are likely something school-age kids know all about. Their parents? Not so much. Karina Bafradzhian looks at a new trend that some people say helps them deal with pandemic-induced stress. Camera: David Gogokhia     
 

South Korea Adopts Smart Technology on Public Transportation for Visually Impaired

Cities around the world are installing new technology that connects to the personal devices of pedestrians, drivers, and riders on public transportation. Some cities are using these systems to make transportation easier for people with disabilities, such as those who are blind. For VOA, Jason Strother has the story from Busan, South Korea.

Busan Adopts Smart Technology on Public Transportation for Visually Impaired South Koreans

Cities around the world are installing new technology that connects to the personal devices of pedestrians, drivers, and riders on public transportation. Some cities are using these systems to make transportation easier for people with disabilities, such as those who are blind. For VOA, Jason Strother has the story from Busan, South Korea.

New Smart Tech Helps Visually Impaired South Koreans Increase Mobility

South Korea’s second largest city is using new, inclusive technology to bring down barriers to mobility for people who are blind.Park Hyoung-bae glides his long, white cane along a strip of raised yellow blocks that form a trail through an underground metro station. The tactile paving leads blind commuters from the street all the way to the train platform.But Park, who is walking arm in arm with his mother, says the tiles still don’t make him feel comfortable enough to travel far from his home on his own.Information boards, maps and other signage direct travelers to exits, restrooms and other station amenities, but all of these visual indicators are inaccessible for the 32-year-old.Without help from a family member or a hired guide, he explains Busan’s metro system can be overwhelming.“I’ve gotten lost in subway stations and asked people where I am, but sometimes they ignore me and I have no idea if they’ve walked away or not and that makes me feel isolated,” he said. “It’s hard to ask for help as someone who’s blind.”Cities across the globe are installing new ICT, or information and communications technology, that connect public infrastructure with the electronic devices of pedestrians, drivers and commuters. And some governments are using these systems to make public spaces more accessible for people with disabilities.In Busan, a new smart city initiative could help people with a vision impairment travel more independently.How it works
In March, Busan launched a mobility service called Dagachi Naranhi, or Side By Side, that uses GPS technology to provide localized directional information inside one of its metro stations via a smartphone app. Users select a destination within the facility, like the subway platform, elevator, or a way out, and the software sends meter by meter instructions that update in real-time as the traveler moves.Park is trying-out the app for the first time and uses his iPhone’s Voice-Over utility to turn the directions into speech that is read out loud. He picks one of two accessible kiosks and is told to walk straight for 98-meters.After getting used to the app’s interface, Park arrives at the machine, which receives data from Bluetooth beacons placed around the station and displays maps and other information on a large touchscreen or by voice in multiple languages.Park, who participated in some of the pre-launch testing of this device, says what he likes most about the kiosk is its Braille touchpad, which can transform into a tactile map.“When I select a destination, the Braille display lets me feel the layout of the station and then I can memorize where I need to go,” he said.Plans for expansion
City officials say they hope to eventually expand Dagachi Naranhi throughout the four-line, 114-station subway network.The Busan Transportation Corporation’s Jeon Byeong-jun explains that while the smart system could improve visually impaired metro riders’ independence, the app and kiosk can also benefit an even larger swath of the city’s nearly three and a half million residents.“It’s not just for people with disabilities, it can be convenient for pregnant women and the elderly, or even foreign visitors can use it,” he told VOA. “It’s for everyone.”As cities adopt these new systems, there’s concern that smart technology could in fact raise barriers for people with physical, sensory, or intellectual impairments. Some disability advocates say that is why it is essential to create electronic devices or apps with universal design principles — so they really can be used by everyone.Disabled people input
Go Mi-sook is a technology trainer and handles customer support for Dot, the Seoul-based firm that partnered with Busan to implement the Dagachi Naranhi program and created the accessible kiosks.She says ever since losing her vision as a teenager, assistive technology, such as screen-reading software on her computer or phone has “empowered” her. But not every company ensures that differently abled consumers can use their products.Roughly 250,000 South Koreans have a visual disability, according to the country’s Blind Union — a relatively small demographic in a nation of about 52 million.One way to ensure that the needs of this minority group is considered is to bring more designers with a vision impairment to the table, Go says.“There’s a difference in how people without a disability think about making products that can be used by someone who is blind,” said the 34-year-old. “It’s important that visually impaired people be part of the planning and design process.”Inside the Busan metro station, Park Hyoung-bae and his mother await the train back to their neighborhood. He says if Dagachi Naranhi were installed in more places, he would feel greater confidence about venturing-out without assistance.Park adds this inclusive technology does not just improve mobility. It could also reduce social barriers.“Non-disabled people don’t often see people with a disability using the subway,” Park said. “If this technology makes it easier for us to use public transportation, I think the overall all perception of people with disabilities will improve.”
 

Cyberattack Forces World’s Largest Meat Supplier to Shut Down Operations

JBS Foods, the world’s largest meat supplier, has been forced to shut down operations in Australia and North America Monday, as the company has been a target of a cyberattack over the weekend, according to officials at its headquarters in Brazil. Authorities said they are working to resolve the impact. A U.S. subsidiary, JBS USA, issued a statement following the attack saying they are taking “immediate action, suspending all affected systems, notifying authorities, and activating the company’s global network of IT [Information Technology] professionals and third-party experts,” to address the issue, Reuters reported. Some transactions with customer and suppliers might be delayed due to the cyberattack, the company statement added.  There is no evidence, so far, that the personal data of customers and suppliers or employees had been compromised, the statement said. The company’s backup IT system was not hit by what the company said was an “organized cybersecurity attack.” The largest global meatpacker has operations in Canada, Britain, Europe, New Zealand and Mexico.  

World’s Largest Meat Supplier a Target Cyberattack

JBS Foods, the world’s largest meat supplier, has been forced to shut down operations in Australia and North America Monday, as the company has been a target of a cyberattack over the weekend, according to officials at its headquarters in Brazil. Authorities said they are working to resolve the impact. A U.S. subsidiary, JBS USA, issued a statement following the attack saying they are taking “immediate action, suspending all affected systems, notifying authorities, and activating the company’s global network of IT [Information Technology] professionals and third-party experts,” to address the issue, Reuters reported. Some transactions with customer and suppliers might be delayed due to the cyberattack, the company statement added.  There is no evidence, so far, that the personal data of customers and suppliers or employees had been compromised, the statement said. The company’s backup IT system was not hit by what the company said was an “organized cybersecurity attack.” The largest global meatpacker has operations in Canada, Britain, Europe, New Zealand and Mexico.  

Studies Reveal China’s Dominant Position in High-Tech Minerals

New clean energy technologies like solar power and electric vehicles are expected to remake the global energy industry. Trillions of dollars used to drill and ship oil and gas will instead be spent finding and processing the specialized minerals used to make high-tech gear including advanced electric generators and powerful, compact batteries.Energy analysts say this will challenge the United States, which will likely need to import vastly more minerals like cobalt, lithium and aluminum, at the same time that China has increased its control over the supply of some key resources.People cool off in the beach near the mining pipeline “Puerto Coloso” of the “Escondida” cooper mine in Antofagasta, Chile, Feb. 16, 2017.A VOA examination of U.S. government data shows how China has become the main supplier for some of the most important raw materials that Western countries import, giving Beijing leverage over the materials that go into everything from advanced fighter jets to solar panels.Not only has Beijing bought up some of the world’s biggest mines for these minerals, the country also has invested heavily in the processing facilities that refine the raw materials into industrially-useful products, strengthening Beijing’s position in global supply chains.Beijing has already given the world reason to worry about its reliability as a global supplier. In 2011, it used its position as the top global supplier of rare earth metals to cut exports, driving up prices. China’s critics say Beijing’s dominant position in so-called “critical minerals” gives them similar leverage.Aerial view of evaporation pools of the new state-owned lithium extraction complex, in the southern zone of the Uyuni Salt Flat, Bolivia, on July 10, 2019.35 critical mineralsThe United States has designated A man watches a conveyor belt loaded with chunks of raw cobalt after a first transformation at a plant in Lubumbashi, Congo, on Feb. 16, 2018, before being exported, mainly to China, to be refined.Chinese dominance in U.S. allies’ supply chainsOther Western countries have different lists of minerals considered critical to their economies. Among the lists of Australia, U.K. and Canada, rare earth minerals account for only one of the 24, 41 and 31 critical minerals, respectively.  The European Union classifies light and heavy rare earths as two separate critical elements on its 30 Critical Raw Materials (CRM) list.A study published last year by the European Commission’s Joint Research Center, a science and technology service agency, found that the production of a Rafale fighter aircraft requires a total of 16 CRMs, of which only three are rare earth elements. Although each country makes up its own list of “critical minerals” based on its strategic needs, China is a dominant supplier in all of the lists.In the EU’s list, China is the largest source of imports for 10 minerals. Among the 24 critical minerals identified by the Australian government in its Critical Minerals Prospectus 2020 report, China is listed as the largest producer of 11 of them.   In the U.K.’s Risk List, China is the leading producer of 23 minerals.Similar findings were reported by Chinese researchers as well.  A study published by China Geological Survey stated that “after combing through the list of Critical Minerals in the United States, the European Union, the United Kingdom and other countries, it can be seen that half or more of the country’s main producing countries and main sources of imports are our country.”The 2019 report said that of the 35 key minerals in the U.S., the largest supplier of 13 CMs is China, and China is also the largest producer of 19 CMs.This story originated in VOA’s Mandarin Service. 

SolarWinds Hackers Targeted 150 Organizations with Phishing, Microsoft Says

The state-backed Russian cyber spies behind the SolarWinds hacking campaign launched a targeted spear-phishing assault on U.S. and foreign government agencies and think tanks this week using an email marketing account of the U.S. Agency for International Development, Microsoft said.
The effort targeted about 3,000 email accounts at more than 150 different organizations, at least a quarter of them involved in international development, humanitarian and human rights work, Microsoft Vice President Tom Burt said in a blog post late Thursday.
It did not say what portion of the attempts may have led to successful intrusions.
The cybersecurity firm Volexity, which also tracked the campaign but has less visibility into email systems than Microsoft , said in a post  that relatively low detection rates of the phishing emails suggest the attacker was “likely having some success in breaching targets.”  
Burt said the campaign appeared to be a continuation of multiple efforts by the Russian hackers to “target government agencies involved in foreign policy as part of intelligence gathering efforts.” He said the targets spanned at least 24 countries.
The hackers gained access to USAID’s account at Constant Contact, an email marketing service, Microsoft said. The authentic-looking phishing emails dated May 25 purport to contain new information on 2020 election fraud claims and include a link to malware that allows the hackers to “achieve persistent access to compromised machines.”
Microsoft said in a  separate blog post that the campaign is ongoing and evolved out of several waves of spear-phishing campaigns it first detected in January that escalated to the mass-mailings of this week.
While the SolarWinds campaign, which infiltrated dozens of private sector companies and think tanks as well as at least nine U.S. government agencies, was supremely stealthy and went on for most of 2020 before being detected in December by the cybersecurity firm FireEye, this campaign is what cybersecurity researchers call noisy. Easy to detect.
Microsoft noted the two mass distribution methods used: the SolarWinds hack exploited the supply chain of a trusted technology provider’s software updates; this campaign piggybacked on a mass email provider.
With both methods, the company said, the hackers undermine trust in the technology ecosystem.

Facebook Won’t Remove Posts Claiming COVID-19 is Human-made

Facebook says it will no longer remove claims that COVID-19 is human-made or manufactured “in light of ongoing investigations into the origin of COVID-19 and in consultation with public health experts.”There is rising pressure worldwide to investigate the origins of the pandemic, including the possibility that it came from a lab. Since the pandemic began, Facebook has been changing what it allows on the topic and what it bans. In February, it announced a host of new claims it would be prohibiting — including that COVID-19 was created in a Chinese lab. Other claims it added at the time included the false notion that vaccines are not effective or that they are toxic.Lisa Fazio, a professor of psychology at Vanderbilt University, said the reversal shows the difficulty of fact-checking in general, particularly with something unprecedented like the coronavirus, when experts can disagree and change their minds with new evidence.“It’s one reason that content moderation shouldn’t be static, scientific consensus changes over time,” Fazio said. “It’s also a reminder to be humble and that for some questions the best current answer is “we don’t know yet” or “it’s possible, but experts think it’s unlikely.”Facebook’s reversal comes as President Joe Biden ordered U.S. intelligence officials to “redouble” their efforts to investigate the origins of the COVID-19 pandemic, including any possibility the trail might lead to a Chinese laboratory. After months of minimizing these claims as a fringe theory, the Biden administration is joining worldwide pressure for China to be more open about the outbreak. It aims to head off GOP complaints that Biden has not been tough enough and to use the opportunity to press China on alleged obstruction.“We’re continuing to work with health experts to keep pace with the evolving nature of the pandemic and regularly update our policies as new facts and trends emerge,” said Guy Rosen, Facebook’s vice president of integrity, in a statement Wednesday.Facebook does not usually ban misinformation outright on its platform, instead adding fact-checks by outside parties, which includes The Associated Press, to debunked claims. The two exceptions have been around elections and COVID-19.

Tanker’s Impossible Voyage Signals New Sanction Evasion Ploy

The Cyprus-flagged oil tanker Berlina was drifting near the Caribbean island of Dominica earlier this year when tracking technology showed it stopping in its tracks and in two minutes turning around 180 degrees.It was an amazingly quick pivot since the 274-meter ship needs roughly 10 times that amount of time to perform such a maneuver.Even more intriguing: Around the same time the Berlina was pinging its location at sea, it was physically spotted loading crude oil in nearby Venezuela despite U.S. sanctions against such trading.Meanwhile, nine other ships, some connected to the same Greece-based owner of the Berlina, were digitally monitored moving nearby at an identical speed and direction with sudden draft changes, indicating they had somehow been loaded full of crude though apparently out at sea.The Berlina’s impossible journey could represent the next frontier of how rogue states and their enablers manipulate GPS-like tracking systems to hide their movements while circumventing sanctions, maritime experts say.Evading detectionIn recent years, as the U.S. has expanded economic sanctions and tracking technology has become more widely used, companies have adopted a number of techniques to evade detection. Most involve a ship going dark, by turning off its mandatory automated identification system or by “spoofing” the identity and registration information of another ship, sometimes a sunken or scrapped vessel.Windward, a maritime intelligence agency whose data is used by the U.S. to investigate sanctions violations, carried out a detailed investigation into the Berlina. It considers the movements of the Berlina and the other ships to be one of the first instances of orchestrated manipulation in which vessels went dark for an extended period while off-ship agents used machines to hide their activities by making it appear they were transmitting their locations normally.Militaries around the world have been using the same electronic warfare technology for decades. But it is only now cropping up in commercial shipping, with serious national security, environmental and maritime safety implications.“We believe this is going to spread really fast because it’s so efficient and easy,” Matan Peled, co-founder of Windward, said in an interview. “And it’s not just a maritime challenge. Imagine what would happen if small planes started adopting this tactic to hide their true locations?”Under a United Nations maritime treaty, ships of over 300 tons have been required since 2004 to use the automated identification system to avoid collisions and assist rescues in the event of a spill or accident at sea. Tampering with its use is a major breach that can lead to consequences for a vessel and its owners.But the maritime safety mechanism has also become a powerful mechanism for tracking ships engaged in rogue activities like illegal fishing or transporting sanctioned crude oil to and from places under U.S. or international sanctions like Venezuela, Iran and North Korea.In the cat-and-mouse game that has ensued, the advent of digital ghosts leaving false tracks could give the bad actors the upper hand, said Russ Dallen, the Miami-based head of Caracas Capital Markets brokerage, who tracks maritime activity near Venezuela.“It’s pretty clear the bad guys will learn from these mistakes and next time will leave a digital trail that more closely resembles the real thing,” Dallen said. “The only way to verify its true movement will be to get a physical view of the ship, which is time consuming and expensive.”Manipulation or malfunction?The Berlina never reported a port call while floating in the Caribbean. Nonetheless, on March 5, the draft indicated by its identification system went from 9 meters to 17 meters, suggesting it had been loaded with oil.Was it manipulation or a malfunction?While the Berlina’s voyage remains something of a mystery, Vortexa, a London-based energy cargo tracker, determined the tanker had loaded at the Venezuelan port of Jose on March 2 and then headed toward Asia. Separately, Windward also confirmed the crude delivery through two sources.Two months later, on May 5, the Berlina discharged its crude in a ship-to-ship transfer to a floating storage vessel, the CS Innovation, according to Vortexa. The CS Innovation remains off the coast of Malaysia where the transfer took place and has undertaken several ship-to-ship transfers in the interim, making it nearly impossible to know where Venezuela’s oil will end up.Adding to suspicions, the Berlina and at least four of the nine other vessels involved in the Caribbean voyage earlier this year are connected to the same Greek company, according to Windward. And all 10 vessels switched flags — another common ploy used to make it harder to keep track of ships — to Cyprus in the four months prior to the manipulation of the fleet’s tracking information.The AP was unable to locate any contact information for the Berlina’s ship manager or owner, both of which are based in the port city of Pireaus, near Athens.Peled said the Berlina’s activities may never have been detected if not for a tip it received from an external source that it wouldn’t identify.But the know-how gained from the investigation has allowed it to identify other recent examples of location tampering, including one in January when a ship it did not identify was spotted loading Iranian crude at Kharg island while broadcasting its location out at sea somewhere else in the Persian Gulf.While the U.S. government has additional resources to ferret out such deceptive practices, doing so will require extra effort.“It suggests the length to which rogue actors are willing to go, to hide their activities,” said Marshall Billingslea, an assistant Treasury secretary for terrorist financing during the Trump administration and former deputy undersecretary of the Navy. “It’s a worrisome trend and given the huge volume of maritime traffic will introduce a lot more noise into the system.”

Russia, Iran Leading Disinformation Charge on Facebook

Russia and Iran are leading the way when it comes to pushing bad information on one of the world’s most popular social media platforms, and new analysis finds they are getting savvier at evading detection. Facebook issued a report Wednesday looking at so-called coordinated inauthentic behavior over the past four years, warning that despite ongoing efforts to identify and remove disinformation networks, there is no let-up in attempts to exploit or weaponize conflict and crisis. “Threat actors have adapted their behavior and sought cover in the gray spaces between authentic and inauthentic engagement and political activity,” according to the Facebook report, which looked at the more than 150 networks from more than 50 countries that its security teams took down from 2017 to 2020. “We know they will continue to look for new ways to circumvent our defenses,” the report added, noting disinformation efforts were evenly split between foreign and domestic efforts. “Domestic IO also continues to push the boundaries of acceptable online behavior worldwide” per @Facebook “About half of the influence operations we’ve removed since 2017–including in #Moldova, #Honduras, #Romania, #UK, US, #Brazil & #India–were conducted by locals…” pic.twitter.com/e2pLpgLNaJ— Jeff Seldin (@jseldin) May 26, 2021 Russia, Iran influence efforts Overall, Russia was the biggest purveyor of disinformation, according to the analysis, with 27 identified influence operations during the four-year timeframe. Of those, 15 were connected to the St. Petersburg-based Internet Research Agency (IRA) or other entities linked to Yevgeny Prigozhin, a Russian oligarch with close ties to Russian President Vladimir Putin. US Hits Back at Russian Election Disinformation Ring New sanctions target the ‘inner circle’ of Ukrainian politician Andrii Derkach, previously outed by U.S. officials as a long-time Russian agent Another four Russian networks were traced to the Kremlin’s intelligence services and two more originated with Russian media sites. Iran was second on the list, with 23 inauthentic networks, nine of which were connected to the government or Iranian state broadcasters. Myanmar ranked third, with nine disinformation networks, followed by the United States and Ukraine. NEW: #Russia, #Iran#Myanmar top @Facebook’s list of sources for influence ops/ Coordinated Inauthentic Behavior in new report covering 2017-2020US is 4th, #Ukraine is 5th pic.twitter.com/X2Z45AqUO2— Jeff Seldin (@jseldin) May 26, 2021Facebook said the culprits in the United States and Ukraine included public relations firms, fringe political actors, and in the case of Ukraine, two political parties. China’s ‘strategic communication’ China, accused by U.S. intelligence officials for running multiple, intensive influence operations, did not make Facebook’s list of illicit disinformation networks, but not because Beijing was not active. Outgoing US Intel Chief Warns China Seeking Global Domination Director of National Intelligence John Ratcliffe has repeatedly sounded alarms about Beijing’s efforts, but now says China is prepared for an ‘open-ended period of confrontation’ with US “The China-origin activity on our platform manifested very differently than IO [influence operations] from other foreign actors, and the vast majority of it did not constitute CIB [Coordinated Inauthentic Behavior],” the Facebook report said. “Much of it was strategic communication using overt state-affiliated channels [e.g. state-controlled media, official diplomatic accounts] or large-scale spam activity that included primarily lifestyle or celebrity clickbait and also some news and political content.” #Election2020: “In the year leading up to the US 2020 election, we exposed over a dozen CIB operations targeting US audiences, including an equal number of networks originating from #Russia, #Iran, & the #UnitedStates itself” per @Facebookpic.twitter.com/MISQHnJigc— Jeff Seldin (@jseldin) May 26, 2021The Facebook report warned, however, that catching sophisticated disinformation actors like China and Russia is getting more difficult. “They are showing more discipline to avoid careless mistakes,” the report said. “Some are also getting better at avoiding language discrepancies.” Amplifying, outsourcing disinformation Facebook further warned that countries like Russia and China “are getting better at blurring the lines between foreign and domestic activity by co-opting unwitting [but sympathetic] domestic groups to amplify their narratives.” Another concerning trend identified in the Facebook report: outsourcing. “Over the past four years, we have investigated and removed influence operations conducted by commercial actors—media, marketing and public relations companies, including in Myanmar, the U.S., the Philippines, Ukraine, the UAE [United Arab Emirates] & Egypt,” according to the report. The report said despite a growing number of influence operations and their growing sophistication, many of them are being identified and taken down more quickly than in the past. But Nathaniel Gleicher, the head of Facebook security policy, said the social media platform can only do so much by itself. “Countering IO is a whole-of-society challenge. Defenders are most effective when gov’ts, industry, and civil society work together,” Gleicher wrote on Twitter. “We know threat actors are continuing to innovate, so we can’t take our foot off the gas now,” he added. “We have to keep pressing to stay ahead of adversarial innovation in 2021 and beyond.”