Category Archives: Technology

silicon valley & technology news

Tracking Fires from the Earth, Air and Space

Wildfires are often discovered by aircraft pilots, drivers or spotters in observation towers but also increasingly by remote sensors, which alert authorities to fire outbreaks. Mike O’Sullivan reports from Los Angeles that a new ground-based camera system and satellites in space are helping firefighters to monitor wildfires.

Tracking Fires from the Earth, Air and Space

Wildfires are often discovered by aircraft pilots, drivers or spotters in observation towers but also increasingly by remote sensors, which alert authorities to fire outbreaks. Mike O’Sullivan reports from Los Angeles that a new ground-based camera system and satellites in space are helping firefighters to monitor wildfires.

Huawei Offers to Sign ‘No-Spy’ Agreements

As anticipation builds for the next-generation mobile communications or 5G, security has become a heated topic. The U.S. government has launched an unprecedented campaign urging countries to ban one of the key makers of equipment for the new network, China-based telecom titan Huawei. But Huawei is vowing to refuse to assist any country in spying and even claims it would rather go out of business. VOA’s Bill Ide recently visited the company’s headquarters in China’s southern city of Shenzhen.

Tech Startups Move Forward in Africa 

The Afrobytes and Viva Tech conferences in Paris this week have provided an opportunity to look at the progress that high-tech startups have made in Africa, where fundraising is booming.

According to Partech Africa, a venture capital firm, 146 startups in 19 African countries raised $1.16 billion for African digital entrepreneurs in 2018. Kenya, Nigeria and South Africa received 78% of the total funding, with Egypt close behind. 

In French-speaking Africa, Senegal is the leading hub with $22 million raised in four deals. Compared with their Anglophone peers, Africa’s Francophone countries operate in smaller markets, and lack capital and mentors.  

A key: Seeking advice

 

Marieme Diop, a venture capital investor at Orange Digital Ventures, said that “unfortunately in Francophone Africa, it is not in our DNA. People who succeed in business or in electing positions do not necessarily reach back to help their peers to show them how to be successful. In the Anglophone world, it is a must for anyone who wants to start something: seeking advice. So the gap is not only financial” between the regions. 

 

Africa is seen by many as the next frontier for venture capital, with its booming population and mobile-first economy. That’s why Google, Facebook and PayPal participated in Paris in Afrobytes 2019.  

 

“We do not want people globally to see African high-tech as an exotic stuff,” said Afrobytes CEO Ammin Youssouf. “We want to be heard and talk about AI, blockchain, what is happening in Silicon Valley, because it has an impact on us. We already have brilliant minds in Africa, especially in tech, to have those conversations.”

Unlike the global trend, where men dominate the high-tech industry, women are leading the movement in Africa.

“Actually, what we see in the statistics is that women’s involvement and participation on in the African continent is much higher than what you would find in New York, for example, or San Francisco,” said Ben White, chief executive officer of venture capital platform VC4Africa, who has been supporting startups on the continent for more than 10 years. “I think it is an advantage. It also means having women investors who are very sensitive to gender-related questions and can also ensure that the system we are building is inclusive.”

Governments’ role

 

Governments in Africa are trying to regulate the activity and even support the sector. Forty Senegalese startups last November secured a total of $2 million in government funding. But some experts say governments lack the skills needed to pick good investments.

Kenza Lahlou, co-founder and managing partner at Outlierz Ventures, said the public sector “should not invest [in startups]. States should build funds of funds. We have that in Morocco in partnership with the World Bank. The government started Innov Invest, to invest in local venture capitalist funds, to lower the risk for local funds.”

 

With a population expected to reach 1.4 billion people by 2021, and a continent that will put about 1 billion smartphones into use within two years, Africa is a promising area for the world’s leading high-tech and telecom companies.

NTSB: Autopilot Was in Use Before Tesla Hit Semitrailer

A Tesla Model S involved in a fatal crash with a semitrailer in Florida March 1 was operating on the company’s semi-autonomous Autopilot system, federal investigators have determined.

The car drove beneath the trailer, killing the driver, in a crash that is strikingly similar to one that happened on the other side of Florida in 2016 that also involved use of Autopilot.

In both cases, neither the driver nor the Autopilot system stopped for the trailers, and the roofs of the cars were sheared off.

The crash, which remains under investigation by the National Transportation Safety Board and the National Highway Traffic Safety Administration, raises questions about the effectiveness of Autopilot, which uses cameras, long-range radar and computers to detect objects in front of the cars to avoid collisions. The system also can keep a car in its lane, change lanes and navigate freeway interchanges.

Tesla has maintained that the system is designed only to assist drivers, who must pay attention at all times and be ready to intervene.

In a preliminary report on the March 1 crash, the NTSB said that preliminary data and video from the Tesla show that the driver turned on Autopilot about 10 seconds before the crash on a divided highway with turn lanes in the median. From less than eight seconds until the time of the crash, the driver’s hands were not detected on the steering wheel, the NTSB report stated.

“Neither the preliminary data nor the videos indicate that the driver or the ADAS (Advanced Driver Assist System) executed evasive maneuvers,” the report stated.

The Model 3 was going 68 miles per hour when it hit the trailer on U.S. 441, the report said. Jeremy Beren Banner, 50, was killed.

Tesla said in a statement Thursday that Banner did not use Autopilot at any other time during the drive before the crash. Vehicle logs show that he took his hands off the steering wheel immediately after activating Autopilot, the statement said.

Tesla also said it’s saddened by the crash and that drivers have traveled more than 1 billion miles while using Autopilot. “When used properly by an attentive driver who is prepared to take control at all times, drivers supported by Autopilot are safer than those operating without assistance,” the company said.

NTSB: Autopilot Was in Use Before Tesla Hit Semitrailer

A Tesla Model S involved in a fatal crash with a semitrailer in Florida March 1 was operating on the company’s semi-autonomous Autopilot system, federal investigators have determined.

The car drove beneath the trailer, killing the driver, in a crash that is strikingly similar to one that happened on the other side of Florida in 2016 that also involved use of Autopilot.

In both cases, neither the driver nor the Autopilot system stopped for the trailers, and the roofs of the cars were sheared off.

The crash, which remains under investigation by the National Transportation Safety Board and the National Highway Traffic Safety Administration, raises questions about the effectiveness of Autopilot, which uses cameras, long-range radar and computers to detect objects in front of the cars to avoid collisions. The system also can keep a car in its lane, change lanes and navigate freeway interchanges.

Tesla has maintained that the system is designed only to assist drivers, who must pay attention at all times and be ready to intervene.

In a preliminary report on the March 1 crash, the NTSB said that preliminary data and video from the Tesla show that the driver turned on Autopilot about 10 seconds before the crash on a divided highway with turn lanes in the median. From less than eight seconds until the time of the crash, the driver’s hands were not detected on the steering wheel, the NTSB report stated.

“Neither the preliminary data nor the videos indicate that the driver or the ADAS (Advanced Driver Assist System) executed evasive maneuvers,” the report stated.

The Model 3 was going 68 miles per hour when it hit the trailer on U.S. 441, the report said. Jeremy Beren Banner, 50, was killed.

Tesla said in a statement Thursday that Banner did not use Autopilot at any other time during the drive before the crash. Vehicle logs show that he took his hands off the steering wheel immediately after activating Autopilot, the statement said.

Tesla also said it’s saddened by the crash and that drivers have traveled more than 1 billion miles while using Autopilot. “When used properly by an attentive driver who is prepared to take control at all times, drivers supported by Autopilot are safer than those operating without assistance,” the company said.

Huawei Warns US Over Ban on Rollout of 5G Technology

Joyce Huang contributed to this report.

SHENZHEN, CHINA — One day after the United States effectively banned Chinese telecom titan Huawei from building next-generation “5G” mobile networks in the United States, the company warned the move would harm American workers.

“It will do significant harm to the American companies with which Huawei does business,” the company said, and “affect tens of thousands of American jobs.”

The company added it would quickly “find a resolution” to the ban and work to “mitigate” its impact.

On Wednesday, U.S. President Donald Trump signed an executive order that bars American companies from using telecommunications equipment made by companies that pose a national security risk.

The order, which declares a national emergency, is the first step toward formalizing a ban on doing business with Huawei. The United States also warned other countries about Huawei’s national security risks.

Huawei has been making extraordinary pledges to win over its critics and dispel allegations that it is a security threat. The company has said it will quit its business if forced to spy on its customers and its company chairman Liang Hua has offered to sign “no spy” agreements as well.

Speaking through an interpreter during a visit to London, Liang said Huawei is willing “to commit ourselves to making our equipment meet the no-spy, no-backdoors standard.”

It is unclear what Liang means by “no-spy, no-backdoors” since Huawei, like all technology companies, requires users to sign agreements acknowledging that the company may share their personal information if required by local authorities.

Most technology companies, such as Google and Facebook, disclose these government information requests in regular public reports. The companies explain when they comply with the government requests and when they challenge them in court.

Sharing data with Beijing?

There is no information about what data Huawei hands over to Beijing authorities. If Chinese officials determine a matter involves “state secrets” or a criminal investigation, officials can legally justify intercepting any communication. Critics say Beijing defines “state secrets” so loosely that it can cover virtually anything.

In his comments to reporters, Liang says Huawei does not act on behalf of China’s government in any international market.

According to Reuters, he also denies that China’s laws require companies to “collect foreign intelligence for the government or plant back doors for the government.” Liang added that Huawei is also committed to following the laws and regulations of every country where it does business.

​Independent business or state organ?

Huawei says it has signed 40 contracts to build 5G networks, more than 20 of which are in Europe. It has already shipped 70,000 base stations for installation, all to locations outside of China. Base stations are a key component of the infrastructure needed to build the new network.

Huawei spokesperson Joe Kelly that maintaining the trust of its customers is key to the company’s continued success.

“Today, with 4 billion people around the world [using our products], at the scale at which we operate, if we were installing back doors and taking data, our carriers would be aware, they would see it for themselves and then they would stop doing business with us,” he said.

In the 5G debate, Huawei has voiced its willingness to stake the company’s continued success on its commitment to security.

U.S. officials have suggested that if countries choose to trust Huawei for their 5G network, Washington may reassess sharing information with them.

 

The executive order that was signed by President Trump on Wednesday not only paves the way for a formal ban on Huawei from building networks in the United States.

According to the Commerce Department, Huawei and 70 other affiliates will be added to what is called an “Entity List,” which will make it more difficult for the company and other entities to buy parts and components from U.S. businesses.

Huawei Warns US Over Ban on Rollout of 5G Technology

Joyce Huang contributed to this report.

SHENZHEN, CHINA — One day after the United States effectively banned Chinese telecom titan Huawei from building next-generation “5G” mobile networks in the United States, the company warned the move would harm American workers.

“It will do significant harm to the American companies with which Huawei does business,” the company said, and “affect tens of thousands of American jobs.”

The company added it would quickly “find a resolution” to the ban and work to “mitigate” its impact.

On Wednesday, U.S. President Donald Trump signed an executive order that bars American companies from using telecommunications equipment made by companies that pose a national security risk.

The order, which declares a national emergency, is the first step toward formalizing a ban on doing business with Huawei. The United States also warned other countries about Huawei’s national security risks.

Huawei has been making extraordinary pledges to win over its critics and dispel allegations that it is a security threat. The company has said it will quit its business if forced to spy on its customers and its company chairman Liang Hua has offered to sign “no spy” agreements as well.

Speaking through an interpreter during a visit to London, Liang said Huawei is willing “to commit ourselves to making our equipment meet the no-spy, no-backdoors standard.”

It is unclear what Liang means by “no-spy, no-backdoors” since Huawei, like all technology companies, requires users to sign agreements acknowledging that the company may share their personal information if required by local authorities.

Most technology companies, such as Google and Facebook, disclose these government information requests in regular public reports. The companies explain when they comply with the government requests and when they challenge them in court.

Sharing data with Beijing?

There is no information about what data Huawei hands over to Beijing authorities. If Chinese officials determine a matter involves “state secrets” or a criminal investigation, officials can legally justify intercepting any communication. Critics say Beijing defines “state secrets” so loosely that it can cover virtually anything.

In his comments to reporters, Liang says Huawei does not act on behalf of China’s government in any international market.

According to Reuters, he also denies that China’s laws require companies to “collect foreign intelligence for the government or plant back doors for the government.” Liang added that Huawei is also committed to following the laws and regulations of every country where it does business.

​Independent business or state organ?

Huawei says it has signed 40 contracts to build 5G networks, more than 20 of which are in Europe. It has already shipped 70,000 base stations for installation, all to locations outside of China. Base stations are a key component of the infrastructure needed to build the new network.

Huawei spokesperson Joe Kelly that maintaining the trust of its customers is key to the company’s continued success.

“Today, with 4 billion people around the world [using our products], at the scale at which we operate, if we were installing back doors and taking data, our carriers would be aware, they would see it for themselves and then they would stop doing business with us,” he said.

In the 5G debate, Huawei has voiced its willingness to stake the company’s continued success on its commitment to security.

U.S. officials have suggested that if countries choose to trust Huawei for their 5G network, Washington may reassess sharing information with them.

 

The executive order that was signed by President Trump on Wednesday not only paves the way for a formal ban on Huawei from building networks in the United States.

According to the Commerce Department, Huawei and 70 other affiliates will be added to what is called an “Entity List,” which will make it more difficult for the company and other entities to buy parts and components from U.S. businesses.

Lawmakers Seek Probe on US Hacking Services Sold Globally

U.S. lawmakers are pushing legislation that would force the State Department to report what it is doing to control the spread of U.S. hacking tools around the world.

A bill passed in a House of Representatives’ appropriations subcommittee on Tuesday said Congress is “concerned” about the State Department’s ability to supervise U.S. companies that sell offensive cybersecurity products and know-how to other countries.

The proposed legislation, released on Wednesday, would direct the State Department to report to Congress how it decides whether to approve the sale of cyber capabilities abroad and to disclose any action it has taken to punish companies for violating its policies in the past year.

National security experts have grown increasingly concerned about the proliferation of U.S. hacking tools and technology.

The legislation follows a Reuters report in January which showed a U.S. defense contractor provided staff to a United Arab Emirates hacking unit called Project Raven. The UAE program utilized former U.S. intelligence operatives to target militants, human rights activists and journalists.

State Department officials granted permission to the U.S. contractor, Maryland-based CyberPoint International, to assist an Emirate intelligence agency in surveillance operations, but it is unclear how much they knew about its activities in the UAE.

Under U.S. law, companies selling cyber offensive products or services to foreign governments must first obtain permission from the State Department.The new measure was added to a State Department spending bill by Dutch Ruppersberger, a Democrat from Maryland and member of the House Appropriations Committee.

Ruppersberger said in an emailed statement he had been “particularly troubled by recent media reports” about the State Department’s approval process for the sale of cyberweapons and services.

CyberPoint’s Chief Executive Officer Karl Gumtow did not respond to a request for comment. He previously told Reuters that to his knowledge, CyberPoint employees never conducted hacking operations and always complied with U.S. laws.

The State Department has declined to comment on CyberPoint, but said in an emailed statement on Wednesday that it is “firmly committed to the robust and smart regulation of defense articles and services export” and before granting export licenses it weighs “political, military, economic, human rights, and arms control considerations.”

Robert Chesney, a national security law professor at the University of Texas, said the Reuters report raised an alarm over how Washington supervises the export of U.S. cyber capabilities.

“The Project Raven (story) perfectly well documents that there is reason to be concerned and it is Congress’ job to get to the bottom of it,” he said.

The bill is expected to be voted on by the full appropriations committee in the coming weeks before going onto the full House.

Lawmakers Seek Probe on US Hacking Services Sold Globally

U.S. lawmakers are pushing legislation that would force the State Department to report what it is doing to control the spread of U.S. hacking tools around the world.

A bill passed in a House of Representatives’ appropriations subcommittee on Tuesday said Congress is “concerned” about the State Department’s ability to supervise U.S. companies that sell offensive cybersecurity products and know-how to other countries.

The proposed legislation, released on Wednesday, would direct the State Department to report to Congress how it decides whether to approve the sale of cyber capabilities abroad and to disclose any action it has taken to punish companies for violating its policies in the past year.

National security experts have grown increasingly concerned about the proliferation of U.S. hacking tools and technology.

The legislation follows a Reuters report in January which showed a U.S. defense contractor provided staff to a United Arab Emirates hacking unit called Project Raven. The UAE program utilized former U.S. intelligence operatives to target militants, human rights activists and journalists.

State Department officials granted permission to the U.S. contractor, Maryland-based CyberPoint International, to assist an Emirate intelligence agency in surveillance operations, but it is unclear how much they knew about its activities in the UAE.

Under U.S. law, companies selling cyber offensive products or services to foreign governments must first obtain permission from the State Department.The new measure was added to a State Department spending bill by Dutch Ruppersberger, a Democrat from Maryland and member of the House Appropriations Committee.

Ruppersberger said in an emailed statement he had been “particularly troubled by recent media reports” about the State Department’s approval process for the sale of cyberweapons and services.

CyberPoint’s Chief Executive Officer Karl Gumtow did not respond to a request for comment. He previously told Reuters that to his knowledge, CyberPoint employees never conducted hacking operations and always complied with U.S. laws.

The State Department has declined to comment on CyberPoint, but said in an emailed statement on Wednesday that it is “firmly committed to the robust and smart regulation of defense articles and services export” and before granting export licenses it weighs “political, military, economic, human rights, and arms control considerations.”

Robert Chesney, a national security law professor at the University of Texas, said the Reuters report raised an alarm over how Washington supervises the export of U.S. cyber capabilities.

“The Project Raven (story) perfectly well documents that there is reason to be concerned and it is Congress’ job to get to the bottom of it,” he said.

The bill is expected to be voted on by the full appropriations committee in the coming weeks before going onto the full House.

China Fully Blocks All Versions of Wikipedia

Beijing has broadened its block of online encyclopedia Wikipedia to include all language editions, an internet censorship research group reported just weeks ahead of China’s most politically explosive anniversary.

According to a report by the Open Observatory of Network Interference (OONI), China started blocking all language editions of Wikipedia last month.

Previously, most editions of Wikipedia — besides the Chinese language version, which was reportedly blocked in 2015 — were available, OONI said in their report.

AFP could not open any of Wikipedia’s versions in China on Wednesday.

“At the end of the day, the content that really matters is Chinese-language content,” said Charlie Smith, the pseudonym of one of the co-founders of Greatfire.org, which tracks online censorship in China.

“Blocking access to all language versions of Wikipedia for internet users in China is just symbolic,” he told AFP. “It symbolises the fear that the Chinese authorities have of the truth.”

Wikimedia Foundation, the non-profit organisation that operates Wikipedia, said it had not received any notices explaining the latest block.

According to the organisation, Wikipedia has been blocked intermittently in China since 2004.

“With the expansion of this block, millions of readers and volunteer editors, writers, academics, and researchers within China cannot access this resource or share their knowledge and achievements with the world,” Samantha Lien, communications manager at Wikimedia Foundation, told AFP over email.

“When one country, region, or culture cannot join the global conversation on Wikipedia, the entire world is poorer,” she said.

China’s online censorship apparatus — dubbed the “Great Firewall” — blocks a large number of foreign sites in the country, such as Google, Facebook, VOA, and The New York Times.

Topics that are deemed too “sensitive” are also scrubbed, such as the 1989 crackdown on Tiananmen pro-democracy protesters which will mark its 30th anniversary on June 4.

The expanded block of Wikipedia comes as Chinese authorities under Chinese President Xi Jinping ramp up online controls and crack down on Great Firewall circumvention tools, such as virtual private network (VPN) software.

In November, China’s cyberspace authority said it had “cleaned up” 9,800 accounts on Chinese social media platforms like messaging app WeChat and the Twitter-like Weibo that it accused of spreading “politically harmful” information and rumours.

Chinese Twitter users have also told AFP that they have experienced intimidation from local authorities — and even detention — for their tweets.

The latest move to block all versions of Wikipedia could be linked to online translation tools, which make it easy for Chinese users to read anything on Wikipedia, Smith said.

Images can also be considered taboo, he said.

“A picture is worth a thousand words, and there is no dearth of Tiananmen-related imagery on the Wikipedia website,” Smith added.

China Fully Blocks All Versions of Wikipedia

Beijing has broadened its block of online encyclopedia Wikipedia to include all language editions, an internet censorship research group reported just weeks ahead of China’s most politically explosive anniversary.

According to a report by the Open Observatory of Network Interference (OONI), China started blocking all language editions of Wikipedia last month.

Previously, most editions of Wikipedia — besides the Chinese language version, which was reportedly blocked in 2015 — were available, OONI said in their report.

AFP could not open any of Wikipedia’s versions in China on Wednesday.

“At the end of the day, the content that really matters is Chinese-language content,” said Charlie Smith, the pseudonym of one of the co-founders of Greatfire.org, which tracks online censorship in China.

“Blocking access to all language versions of Wikipedia for internet users in China is just symbolic,” he told AFP. “It symbolises the fear that the Chinese authorities have of the truth.”

Wikimedia Foundation, the non-profit organisation that operates Wikipedia, said it had not received any notices explaining the latest block.

According to the organisation, Wikipedia has been blocked intermittently in China since 2004.

“With the expansion of this block, millions of readers and volunteer editors, writers, academics, and researchers within China cannot access this resource or share their knowledge and achievements with the world,” Samantha Lien, communications manager at Wikimedia Foundation, told AFP over email.

“When one country, region, or culture cannot join the global conversation on Wikipedia, the entire world is poorer,” she said.

China’s online censorship apparatus — dubbed the “Great Firewall” — blocks a large number of foreign sites in the country, such as Google, Facebook, VOA, and The New York Times.

Topics that are deemed too “sensitive” are also scrubbed, such as the 1989 crackdown on Tiananmen pro-democracy protesters which will mark its 30th anniversary on June 4.

The expanded block of Wikipedia comes as Chinese authorities under Chinese President Xi Jinping ramp up online controls and crack down on Great Firewall circumvention tools, such as virtual private network (VPN) software.

In November, China’s cyberspace authority said it had “cleaned up” 9,800 accounts on Chinese social media platforms like messaging app WeChat and the Twitter-like Weibo that it accused of spreading “politically harmful” information and rumours.

Chinese Twitter users have also told AFP that they have experienced intimidation from local authorities — and even detention — for their tweets.

The latest move to block all versions of Wikipedia could be linked to online translation tools, which make it easy for Chinese users to read anything on Wikipedia, Smith said.

Images can also be considered taboo, he said.

“A picture is worth a thousand words, and there is no dearth of Tiananmen-related imagery on the Wikipedia website,” Smith added.

Facebook Limits Livestreaming Ahead of Tech Summit in Paris

Facebook toughened its livestreaming policies Wednesday as it prepared to huddle with world leaders and other tech CEOs in Paris to find ways to keep social media from being used to spread hate, organize extremist groups and broadcast terror attacks.

Facebook’s move came hours before its executives would face the prime minister of New Zealand, where an attacker killed 51 people in March — and livestreamed parts of it on Facebook.

 

The CEOs and world leaders will try to agree on guidelines they will call the “Christchurch Call,” named after the New Zealand city where the attack on a mosque took place.

 

Facebook said it’s tightening up the rules for its livestreaming service with a “one strike” policy applied to a broader range of offenses. Any activity on the social network that violates its policies, such as sharing a terrorist group’s statement without providing context, will result in the user immediately being temporarily blocked. The most serious offenses will result in a permanent ban.

 

Previously, the company took down posts that breached its community standards but only blocked users after repeated offenses.

 

The tougher restrictions will be gradually extended to other areas of the platform, starting with preventing users from creating Facebook ads.

 

Facebook said it’s also investing $7.5 million in new research partnerships to improve image and video analysis technology aimed at finding content manipulated through editing to avoid detection by its automated systems — a problem the company encountered following the Christchurch shooting.

 

“Tackling these threats also requires technical innovation to stay ahead of the type of adversarial media manipulation we saw after Christchurch,” Facebook’s vice president of integrity, Guy Rosen, said in a blog post.

 

New Zealand Prime Minister Jacinda Ardern welcomed Facebook’s pledge. She said she herself inadvertently saw the Christchurch attacker’s video when it played automatically in her Facebook feed.

 

“There is a lot more work to do, but I am pleased Facebook has taken additional steps today… and look forward to a long-term collaboration to make social media safer,” she said in a statement.

 

Ardern is playing a central role in the Paris meetings, which she called a significant “starting point” for changes in government and tech industry policy.

 

Twitter, Google, Microsoft and several other companies are also taking part, along with the leaders of Britain, France, Canada, Ireland, Senegal, Indonesia, Jordan and the European Union.

 

Officials at Facebook said they support the idea of the Christchurch appeal, but that details need to be worked out that are acceptable for all parties. Free speech advocates and some in the tech industry bristle at new restrictions and argue that violent extremism is a societal problem that the tech world can’t solve.

 

Ardern and the host, French President Emmanuel Macron, insist that it must involve joint efforts between governments and tech giants. France has been hit by repeated Islamic extremist attacks by groups who recruited and shared violent images on social networks.

 

Speaking to reporters ahead of the meetings, Ardern said, “There will be of course those who will be pushing to make sure that they maintain the commercial sensitivity. We don’t need to know their trade secrets, but we do need to know what the impacts might be on our societies around algorithm use.”

 

She stressed the importance of tackling “coded language” that extremists use to avoid detection.

 

Before the Christchurch attack, she said, governments took a “traditional approach to terrorism that would not necessarily have picked up the form of terrorism that New Zealand experienced on the 15th of March, and that was white supremacy.”

 

 

 

Facebook Limits Livestreaming Ahead of Tech Summit in Paris

Facebook toughened its livestreaming policies Wednesday as it prepared to huddle with world leaders and other tech CEOs in Paris to find ways to keep social media from being used to spread hate, organize extremist groups and broadcast terror attacks.

Facebook’s move came hours before its executives would face the prime minister of New Zealand, where an attacker killed 51 people in March — and livestreamed parts of it on Facebook.

 

The CEOs and world leaders will try to agree on guidelines they will call the “Christchurch Call,” named after the New Zealand city where the attack on a mosque took place.

 

Facebook said it’s tightening up the rules for its livestreaming service with a “one strike” policy applied to a broader range of offenses. Any activity on the social network that violates its policies, such as sharing a terrorist group’s statement without providing context, will result in the user immediately being temporarily blocked. The most serious offenses will result in a permanent ban.

 

Previously, the company took down posts that breached its community standards but only blocked users after repeated offenses.

 

The tougher restrictions will be gradually extended to other areas of the platform, starting with preventing users from creating Facebook ads.

 

Facebook said it’s also investing $7.5 million in new research partnerships to improve image and video analysis technology aimed at finding content manipulated through editing to avoid detection by its automated systems — a problem the company encountered following the Christchurch shooting.

 

“Tackling these threats also requires technical innovation to stay ahead of the type of adversarial media manipulation we saw after Christchurch,” Facebook’s vice president of integrity, Guy Rosen, said in a blog post.

 

New Zealand Prime Minister Jacinda Ardern welcomed Facebook’s pledge. She said she herself inadvertently saw the Christchurch attacker’s video when it played automatically in her Facebook feed.

 

“There is a lot more work to do, but I am pleased Facebook has taken additional steps today… and look forward to a long-term collaboration to make social media safer,” she said in a statement.

 

Ardern is playing a central role in the Paris meetings, which she called a significant “starting point” for changes in government and tech industry policy.

 

Twitter, Google, Microsoft and several other companies are also taking part, along with the leaders of Britain, France, Canada, Ireland, Senegal, Indonesia, Jordan and the European Union.

 

Officials at Facebook said they support the idea of the Christchurch appeal, but that details need to be worked out that are acceptable for all parties. Free speech advocates and some in the tech industry bristle at new restrictions and argue that violent extremism is a societal problem that the tech world can’t solve.

 

Ardern and the host, French President Emmanuel Macron, insist that it must involve joint efforts between governments and tech giants. France has been hit by repeated Islamic extremist attacks by groups who recruited and shared violent images on social networks.

 

Speaking to reporters ahead of the meetings, Ardern said, “There will be of course those who will be pushing to make sure that they maintain the commercial sensitivity. We don’t need to know their trade secrets, but we do need to know what the impacts might be on our societies around algorithm use.”

 

She stressed the importance of tackling “coded language” that extremists use to avoid detection.

 

Before the Christchurch attack, she said, governments took a “traditional approach to terrorism that would not necessarily have picked up the form of terrorism that New Zealand experienced on the 15th of March, and that was white supremacy.”

 

 

 

San Francisco Bans Police Use of Face Recognition Technology

San Francisco supervisors voted Tuesday to ban the use of facial recognition software by police and other city departments, becoming the first U.S. city to outlaw a rapidly developing technology that has alarmed privacy and civil liberties advocates. 

The ban is part of broader legislation that requires city departments to establish use policies and obtain board approval for surveillance technology they want to purchase or are using at present. Several other local governments require departments to disclose and seek approval for surveillance technology. 

“This is really about saying: ‘We can have security without being a security state. We can have good policing without being a police state.’ And part of that is building trust with the community based on good community information, not on Big Brother technology,” said Supervisor Aaron Peskin, who championed the legislation. 

The ban applies to San Francisco police and other municipal departments. It does not affect use of the technology by the federal government at airports and ports, nor does it limit personal or business use. 

The San Francisco board did not spend time Tuesday debating the outright ban on facial recognition technology, focusing instead on the possible burdens placed on police, the transit system and other city agencies that need to maintain public safety. 

“I worry about politicizing these decisions,” said Supervisor Catherine Stefani, a former prosecutor who was the sole no vote. 

The Information Technology and Innovation Foundation, a nonprofit think tank based in Washington, D.C., issued a statement chiding San Francisco for considering the facial recognition ban. It said advanced technology makes it cheaper and faster for police to find suspects and identify missing people. 

Critics were silly to compare surveillance usage in the United States with China, given that one country has strong constitutional protections and the other does not, said Daniel Castro, the foundation’s vice president. 

“In reality, San Francisco is more at risk of becoming Cuba than China — a ban on facial recognition will make it frozen in time with outdated technology,” he said. 

It’s unclear how many San Francisco departments are using surveillance and for what purposes, said Peskin. There are valid reasons for license-plate readers, body cameras, and security cameras, he said, but the public should know how the tools are being used or if they are being abused. 

San Francisco’s police department stopped testing face ID technology in 2017. A representative at Tuesday’s board meeting said the department would need two to four additional employees to comply with the legislation. 

Privacy advocates have squared off with public safety proponents at several heated hearings in San Francisco, a city teeming with tech innovation and the home of Twitter, Airbnb and Uber. 

Those who support the ban say the technology is flawed and a serious threat to civil liberties, especially in a city that cherishes public protest and privacy. They worry people will one day not be able to go to a mall, the park or a school without being identified and tracked. 

But critics say police need all the help they can get, especially in a city with high-profile events and high rates of property crime. That people expect privacy in public space is unreasonable given the proliferation of cellphones and surveillance cameras, said Meredith Serra, a member of a resident public safety group Stop Crime SF. 

“To me, the ordinance seems to be a costly additional layer of bureaucracy that really does nothing to improve the safety of our citizens,” she said at a hearing.

San Francisco Bans Police Use of Face Recognition Technology

San Francisco supervisors voted Tuesday to ban the use of facial recognition software by police and other city departments, becoming the first U.S. city to outlaw a rapidly developing technology that has alarmed privacy and civil liberties advocates. 

The ban is part of broader legislation that requires city departments to establish use policies and obtain board approval for surveillance technology they want to purchase or are using at present. Several other local governments require departments to disclose and seek approval for surveillance technology. 

“This is really about saying: ‘We can have security without being a security state. We can have good policing without being a police state.’ And part of that is building trust with the community based on good community information, not on Big Brother technology,” said Supervisor Aaron Peskin, who championed the legislation. 

The ban applies to San Francisco police and other municipal departments. It does not affect use of the technology by the federal government at airports and ports, nor does it limit personal or business use. 

The San Francisco board did not spend time Tuesday debating the outright ban on facial recognition technology, focusing instead on the possible burdens placed on police, the transit system and other city agencies that need to maintain public safety. 

“I worry about politicizing these decisions,” said Supervisor Catherine Stefani, a former prosecutor who was the sole no vote. 

The Information Technology and Innovation Foundation, a nonprofit think tank based in Washington, D.C., issued a statement chiding San Francisco for considering the facial recognition ban. It said advanced technology makes it cheaper and faster for police to find suspects and identify missing people. 

Critics were silly to compare surveillance usage in the United States with China, given that one country has strong constitutional protections and the other does not, said Daniel Castro, the foundation’s vice president. 

“In reality, San Francisco is more at risk of becoming Cuba than China — a ban on facial recognition will make it frozen in time with outdated technology,” he said. 

It’s unclear how many San Francisco departments are using surveillance and for what purposes, said Peskin. There are valid reasons for license-plate readers, body cameras, and security cameras, he said, but the public should know how the tools are being used or if they are being abused. 

San Francisco’s police department stopped testing face ID technology in 2017. A representative at Tuesday’s board meeting said the department would need two to four additional employees to comply with the legislation. 

Privacy advocates have squared off with public safety proponents at several heated hearings in San Francisco, a city teeming with tech innovation and the home of Twitter, Airbnb and Uber. 

Those who support the ban say the technology is flawed and a serious threat to civil liberties, especially in a city that cherishes public protest and privacy. They worry people will one day not be able to go to a mall, the park or a school without being identified and tracked. 

But critics say police need all the help they can get, especially in a city with high-profile events and high rates of property crime. That people expect privacy in public space is unreasonable given the proliferation of cellphones and surveillance cameras, said Meredith Serra, a member of a resident public safety group Stop Crime SF. 

“To me, the ordinance seems to be a costly additional layer of bureaucracy that really does nothing to improve the safety of our citizens,” she said at a hearing.

5G Technology Excites, Worries US Lawmakers

If you’re fuzzy on next-generation 5G wireless connectivity, you aren’t alone.

Powerful U.S. lawmakers who help shape the legal framework for America’s technological advances on Tuesday admitted ignorance and confusion about the highly-anticipated broadband system already being deployed in parts of the world.

“I actually know very little about 5G,” said Dianne Feinstein of California, the top Democrat on the Senate Judiciary Committee.

“Today, we’re going to talk about something that I’m by no means an expert on,” the panel’s chairman, South Carolina Republican Sen. Lindsey Graham, said at a hearing where America’s top cybersecurity officials testified on 5G’s promise and looming perils.

“It’s really hard for people to get their heads around what we’re talking about here,” Republican Sen. Ben Sasse of Nebraska said. “First of all, what is it?”

Witnesses said the fifth generation of wireless technology, or 5G, will bring eye-popping data transmission capacity and spur a new age of digital device connectivity that will revolutionize many people’s daily lives, as well as America’s economic output.

“5G is going to be about machine-to-machine communication, the internet of things,” said Deputy Assistant Secretary of State for Cyber and International Communications Robert Strayer.

“Advances in 5G will support greater bandwidth, capacity for billions of sensors and smart devices, and ultra-low latency [minimal data delays] necessary for highly-reliable critical communications,” said the director of the Cybersecurity and Infrastructure Security Agency at the Department of Homeland Security, Christopher Krebs. “Autonomous vehicles, critical manufacturing, medical doctors performing remote surgery, and a smart electric grid represent a small fraction of the technologies and economic activity that 5G will support.”

Added Strayer: “The massive amounts of data transmitted by Internet of things devices on 5G networks will also advance artificial intelligence.”

Lawmakers signaled they are coming to grips with the anticipated impact.

“I’m told 5G is expected to provide not only 20 times faster network performance, but also generate 12.3 trillion [dollars] in global sales activity by 2035,” Feinstein said. “I’m told it’s going to create millions of new jobs and launch entirely new industries.”

With such an impact, including a new era of ultra-connectivity, will come a need to protect the network from foreign interference or manipulation and to guard against espionage and data theft, according to U.S. officials.

“With all the critical services relying on 5G networks, the stakes for safeguarding them could not be higher. A disruption to that underlying 5G network will disrupt all of those critical services. That’s why this is so fundamentally different and so much more important that we get the security right,” Strayer said.

“When we talk about [interruptions to] 5G, we’re talking about autonomous vehicles not being able to operate,” Krebs said, adding that such a scenario constitutes “a life-safety issue where things won’t work as designed.”

Lawmakers focused on China, which has emerged as an early global leader in producing 5G infrastructure.

“The Chinese government has invested more than $400 billion in development. It has supported Chinese industry efforts in international standard-setting bodies,” Feinstein said.

She added that Chinese law requires companies like telecommunications giant Huawei to assist and cooperate with state security entities.

“Fundamentally, the private sector in China is an extension of the government, and so if our allies decide to trust Huawei, they are deciding to trust the Chinese government with their big data,” Sasse said.

Witnesses echoed the apprehensions.

“We are concerned that China could compel actions by [5G] network vendors to act against the interests of our citizens or citizens of other countries around the world,” Strayer said. “They [vendors] could be ordered to undermine network security, steal personal information or intellectual property, conduct espionage, disrupt critical services or conduct cyberattacks.”

The United States bans Chinese companies from critical telecommunications infrastructure and has warned allies against Huawei’s participation in building their 5G networks.

“We must protect our critical telecom infrastructure, and the United States is calling on all our security partners to be vigilant and to reject any enterprise that would compromise the integrity of our communications technology or national security systems,” Vice President Mike Pence said earlier this year.

“Our success will depend on engagement with international allies,” Krebs said at the hearing. “Ultimately, our goal, our vision is to enable that broader collective defense against cybersecurity threats, where the government and industry understand the risks we face and are prepared to defend against them.”

“The United States will be a leader in 5G deployment, and we will do so using trusted vendors to build our networks,” Strayer said. “Through our engagements, many other countries are now acknowledging the supply-chain risks and beginning to strengthen their security alongside the United States.”

A few U.S. carriers have activated initial 5G systems in several U.S. cities. Coverage and carrier participation are expected to grow exponentially in coming years.

Google Opens German Center to Improve Data Privacy

Google opened a privacy focused engineering center in Munich, Germany, on Tuesday, its latest move to beef up its data protection credentials as tech companies’ face growing scrutiny of their data collection practices.

CEO Sundar Pichai said the Silicon Valley tech giant is expanding its operations in the southern German city, including doubling the number of data privacy engineers there to more than 200 by the end of 2019.

The new Google Safety Engineering Center will make Munich a global hub for the company’s “cross-product privacy engineering efforts,” Pichai said in a blog post.

Staff will work with Google privacy specialists in other cities to build products for use around the world, Pichai said, adding that Munich engineers built the Google Account control panel as well as privacy and security features for the Chrome browser.

Data privacy and security at Google and its tech rivals including Facebook are increasingly in the spotlight. Both companies dedicated much of their annual developer conferences last week to privacy, with Google unveiling new tools giving people more control over how they’re being tracked while Facebook outlined plans to connect people though more private channels.

Google Opens German Center to Improve Data Privacy

Google opened a privacy focused engineering center in Munich, Germany, on Tuesday, its latest move to beef up its data protection credentials as tech companies’ face growing scrutiny of their data collection practices.

CEO Sundar Pichai said the Silicon Valley tech giant is expanding its operations in the southern German city, including doubling the number of data privacy engineers there to more than 200 by the end of 2019.

The new Google Safety Engineering Center will make Munich a global hub for the company’s “cross-product privacy engineering efforts,” Pichai said in a blog post.

Staff will work with Google privacy specialists in other cities to build products for use around the world, Pichai said, adding that Munich engineers built the Google Account control panel as well as privacy and security features for the Chrome browser.

Data privacy and security at Google and its tech rivals including Facebook are increasingly in the spotlight. Both companies dedicated much of their annual developer conferences last week to privacy, with Google unveiling new tools giving people more control over how they’re being tracked while Facebook outlined plans to connect people though more private channels.

WhatsApp Infected With Spyware Implicated In Khashoggi Killing

Spyware crafted by a sophisticated group of hackers-for-hire took advantage of a flaw in the popular WhatsApp communications program to remotely hijack dozens of phones, the company said late Monday. 

The Financial Times identified the actor as Israel’s NSO Group, and WhatsApp all but confirmed the identification, describing hackers as “a private company that has been known to work with governments to deliver spyware.” A spokesman for the Facebook subsidiary later said: “We’re certainly not refuting any of the coverage you’ve seen.”

NSO’s spyware has repeatedly been found deployed to hack journalists, lawyers, human rights defenders and dissidents.

Most notably, the spyware was implicated in the gruesome killing of Saudi journalist Jamal Khashoggi, who was dismembered in the Saudi consulate in Istanbul last year and whose body has never been found.

The malware was able to penetrate phones through missed calls alone via the app’s voice calling function, the spokesman said. An unknown number of people – an amount in the dozens at least would not be inaccurate – were infected with the malware, which the company discovered in early May, said the spokesman, who was not authorized to be quoted by name. 

John Scott-Railton, a researcher with the internet watchdog Citizen Lab, called the hack “a very scary vulnerability.” 

“There’s nothing a user could have done here, short of not having the app,” he said.

The spokesman said the flaw was discovered while “our team was putting some additional security enhancements to our voice calls” and that engineers found that people targeted for infection “might get one or two calls from a number that is not familiar to them. In the process of calling, this code gets shipped.”

WhatsApp, which has more than 1.5 billion users, immediately contacted Citizen Lab and human rights groups, quickly fixed the issue and pushed out a patch. He said WhatsApp also provided information to U.S. law enforcement officials to assist in their investigations.

“We are deeply concerned about the abuse of such capabilities,” WhatsApp said in a statement.

NSO said in a statement that its technology is used by law enforcement and intelligence agencies to fight “crime and terror.” 

“We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system,” the statement said. A spokesman for Stephen Peel, whose private equity firm Novalpina recently announced the purchase of part of NSO, did not return an email seeking comment.

The revelation adds to the questions over the reach of the Israeli company’s powerful spyware, which takes advantage of digital flaws to hijack smartphones, control their cameras and effectively turn them into pocket-sized surveillance devices.

Several alleged targets of the spyware, including a close friend of Khashoggi and several Mexican civil society figures, are currently suing NSO in an Israeli court over the hacking.

Monday, Amnesty International – which said last year that one its staffers was also targeted with the spyware – said it would join in a legal bid to force Israel’s Ministry of Defense to suspend NSO’s export license. 

That makes the discovery of the vulnerability particularly disturbing because one of the targets was a U.K.-based human rights lawyer, the attorney told the AP. 

The lawyer, who spoke on condition of anonymity for professional reasons, said he received several suspicious missed calls over the past few months, the most recent one on Sunday, only hours before WhatsApp issued the update to users fixing the flaw. 

In its statement, NSO said it “would not or could not” use its own technology to target “any person or organization, including this individual.”

WhatsApp Infected With Spyware Implicated In Khashoggi Killing

Spyware crafted by a sophisticated group of hackers-for-hire took advantage of a flaw in the popular WhatsApp communications program to remotely hijack dozens of phones, the company said late Monday. 

The Financial Times identified the actor as Israel’s NSO Group, and WhatsApp all but confirmed the identification, describing hackers as “a private company that has been known to work with governments to deliver spyware.” A spokesman for the Facebook subsidiary later said: “We’re certainly not refuting any of the coverage you’ve seen.”

NSO’s spyware has repeatedly been found deployed to hack journalists, lawyers, human rights defenders and dissidents.

Most notably, the spyware was implicated in the gruesome killing of Saudi journalist Jamal Khashoggi, who was dismembered in the Saudi consulate in Istanbul last year and whose body has never been found.

The malware was able to penetrate phones through missed calls alone via the app’s voice calling function, the spokesman said. An unknown number of people – an amount in the dozens at least would not be inaccurate – were infected with the malware, which the company discovered in early May, said the spokesman, who was not authorized to be quoted by name. 

John Scott-Railton, a researcher with the internet watchdog Citizen Lab, called the hack “a very scary vulnerability.” 

“There’s nothing a user could have done here, short of not having the app,” he said.

The spokesman said the flaw was discovered while “our team was putting some additional security enhancements to our voice calls” and that engineers found that people targeted for infection “might get one or two calls from a number that is not familiar to them. In the process of calling, this code gets shipped.”

WhatsApp, which has more than 1.5 billion users, immediately contacted Citizen Lab and human rights groups, quickly fixed the issue and pushed out a patch. He said WhatsApp also provided information to U.S. law enforcement officials to assist in their investigations.

“We are deeply concerned about the abuse of such capabilities,” WhatsApp said in a statement.

NSO said in a statement that its technology is used by law enforcement and intelligence agencies to fight “crime and terror.” 

“We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system,” the statement said. A spokesman for Stephen Peel, whose private equity firm Novalpina recently announced the purchase of part of NSO, did not return an email seeking comment.

The revelation adds to the questions over the reach of the Israeli company’s powerful spyware, which takes advantage of digital flaws to hijack smartphones, control their cameras and effectively turn them into pocket-sized surveillance devices.

Several alleged targets of the spyware, including a close friend of Khashoggi and several Mexican civil society figures, are currently suing NSO in an Israeli court over the hacking.

Monday, Amnesty International – which said last year that one its staffers was also targeted with the spyware – said it would join in a legal bid to force Israel’s Ministry of Defense to suspend NSO’s export license. 

That makes the discovery of the vulnerability particularly disturbing because one of the targets was a U.K.-based human rights lawyer, the attorney told the AP. 

The lawyer, who spoke on condition of anonymity for professional reasons, said he received several suspicious missed calls over the past few months, the most recent one on Sunday, only hours before WhatsApp issued the update to users fixing the flaw. 

In its statement, NSO said it “would not or could not” use its own technology to target “any person or organization, including this individual.”

US Supreme Court Approves Antitrust Lawsuit Against Apple

The U.S. Supreme Court ruled Monday that an antitrust lawsuit against Apple can proceed.

Consumers are suing the company, alleging Apple overcharges when downloading iPhone applications at the company’s App Store.

Conservative Judge Brett Kavanaugh joined with the four liberal judges in the 5-4 decision, agreeing with the plaintiffs that the 30% commissions Apple charges violate federal antitrust laws. Consumers allege Apple has monopolized the market by requiring apps be sold only through their stores. 

Apple argued it is just a conduit between app developers and customers and that it is the developers who set the prices.

“We’re confident we will prevail when the facts are presented and that the App Store is not a monopoly by any metric,” a company statement said. 

Apple is also under scrutiny by Dutch antitrust authorities over complaints about commissions in European markets.

US Supreme Court Approves Antitrust Lawsuit Against Apple

The U.S. Supreme Court ruled Monday that an antitrust lawsuit against Apple can proceed.

Consumers are suing the company, alleging Apple overcharges when downloading iPhone applications at the company’s App Store.

Conservative Judge Brett Kavanaugh joined with the four liberal judges in the 5-4 decision, agreeing with the plaintiffs that the 30% commissions Apple charges violate federal antitrust laws. Consumers allege Apple has monopolized the market by requiring apps be sold only through their stores. 

Apple argued it is just a conduit between app developers and customers and that it is the developers who set the prices.

“We’re confident we will prevail when the facts are presented and that the App Store is not a monopoly by any metric,” a company statement said. 

Apple is also under scrutiny by Dutch antitrust authorities over complaints about commissions in European markets.

Technology Creates Virtual Wall Around Wildlife Preserve

South Africa, which has the largest population of rhinos in the world, has been the country hit hardest by poaching. Between 2007 and 2015, there was a 9,000% increase in poaching there, reaching a high of 1,215 animals in 2014. While numbers have been declining since then, poaching remains a problem. But as Faith Lapidus reports, technology is helping turn one game reserve into a high-tech fortress.