Coral Farms Revive the Reefs

Coral reefs cover less than one percent of the world’s ocean beds, yet they are home to a quarter of all marine life on the planet. But they are facing serious challenges that threaten their survival. As Faiza Elmasry tells us, beneath the waters of the Indian Ocean island nation of the Seychelles, conservationists are coming up with new ways to save the reefs. VOA’s Faith Lapidus narrates.

With Paper, Phones, Atlanta Struggles to Recover From Cyberattack

Atlanta’s top officials holed up in their offices on Saturday as they worked to restore critical systems knocked out by a nine-day-old cyberattack that

plunged the Southeastern U.S. metropolis into technological chaos and forced some city workers to revert to paper.

On an Easter and Passover holiday weekend, city officials labored in preparation for the workweek to come.

Police and other public servants have spent the past week trying to piece together their digital work lives, re-creating audit spreadsheets and conducting business on mobile phones in response to one of the most devastating “ransomware” virus attacks to hit an American city.

Three city council staffers have been sharing a single clunky personal laptop brought in after cyber extortionists attacked Atlanta’s computer network with a virus that scrambled data and still prevents access to critical systems.

“It’s extraordinarily frustrating,” said Councilman Howard Shook, whose office lost 16 years of digital records.

One compromised city computer seen by Reuters showed multiple corrupted documents with “weapologize” and “imsorry” added to file names.

Ransomware attacks have surged in recent years as cyberextortionists  moved from attacking individual computers to large organizations, including businesses, health care organizations and government agencies. Previous high-profile attacks have shut down factories, prompted hospitals to turn away patients and forced local emergency dispatch systems to move to manual operations.

Not theft, usually

Ransomware typically corrupts data and does not steal it. The city of Atlanta has said it does not believe private residents’ information is in the hands of hackers, but they do not know for sure.

City officials have declined to discuss the extent of damage beyond disclosed outages that have shut down some services at municipal offices, including courts and the water department.

Nearly 6 million people live in the Atlanta metropolitan area. The Georgia city itself is home to more than 450,000 people, according to the latest data from the U.S. Census Bureau.

City officials told Reuters that police files and financial documents were rendered inaccessible by unknown hackers who demanded $51,000 worth of bitcoin to provide digital keys to unlock scrambled files.

“Everything on my hard drive is gone,” City Auditor Amanda Noble said in her office housed in Atlanta City Hall. 

City officials have not disclosed the extent to which servers for backing up information on PCs were corrupted or what kind of information they think is unrecoverable without paying the ransom.

Noble discovered the disarray on March 22 when she turned on her computer to discover that files could not be opened after being encrypted by a powerful computer virus known as SamSam that renamed them with gibberish.

City officials then quickly entered her office and told her to shut down the computer before warning the rest of the building.

Noble is working on a personal laptop and using her smartphone to search for details of current projects mentioned in emails stored on that device.

Not all computers were compromised. Ten of 18 machines in the auditing office were not affected, Noble said.

Old-school analog

Atlanta police returned to taking written case notes and have lost access to some investigative databases, department spokesman Carlos Campos told Reuters. He declined to discuss the contents of the affected files.

“Our data management teams are working diligently to restore normal operations and functionalities to these systems and hope to be back online in the very near future,” he said. By the weekend, he added, officers were returning to digital police reports.

Meanwhile, some city employees complained they have been left in the dark, unsure when it is safe to turn on their computers.

“We don’t know anything,” said one frustrated employee as she left for a lunch break on Friday. 

Like City Hall, whose 1930 neo-Gothic structure is attached to a massive modern wing, the city’s computer system is a combination of old and new.

“One of the reasons why municipalities are vulnerable is we just have so many different systems,” Noble said.

The city published results from a recent cybersecurity audit in January, and had started implementing its recommendations before the ransomware virus hit. The audit called for better record-keeping and hiring more technology

workers.

Councilman Shook said he was worried about how much the recovery would cost the city, but that he supported funding a cybersecurity overhaul to counter future attacks.

For now his staff members are temporarily sharing one aging laptop.

“Things are very slow,” he said. “It was a very surreal experience to be shut down like that.”

No word on payment

Mayor Keisha Lance Bottoms, who took office in January, has declined to say whether the city paid the ransom ahead of a March 28 deadline mentioned in an extortion note, whose image was released by a local television station.

Shook, who chairs the city council’s finance subcommittee, said he did not know whether the city was negotiating with the hackers, but that it appeared no ransom had been paid to date.

The Federal Bureau of Investigation, which is helping Atlanta respond, typically discourages ransomware victims from paying up.

FBI officials could not immediately be reached for comment. A Department of Homeland Security spokesman confirmed the agency was helping Atlanta respond to the attack, but declined to comment further.

Hackers typically walk away when ransoms are not paid, said Mark Weatherford, a former senior DHS cyberofficial.

Weatherford, who previously served as California’s chief information security officer, said the situation might have been resolved with little pain if the city had quickly made that payment.

“The longer it goes, the worse it gets,” he said. “This could turn out to be really bad if they never get their data back.”

Tesla Says Vehicle in Deadly Crash Was on Autopilot 

A vehicle in a fatal crash last week in California was operating on Autopilot, making it the latest accident to involve a self-driving vehicle, Tesla has confirmed.

The electric car maker said the driver, who was killed in the accident, did not have his hands on the steering wheel for six seconds before the crash, despite several warnings from the vehicle. Tesla Inc. tells drivers that its Autopilot system, which can maintain speed, change lanes and self-park, requires drivers to keep their eyes on the road and hands on the wheel in order to take control of the vehicle to avoid accidents. 

Tesla said its vehicle logs show the driver took no action to stop the Model X SUV from crashing into a concrete lane divider. Photographs of the SUV show that the front of the vehicle was demolished, its hood was ripped off  and its front wheels were scattered on the freeway.

The vehicle also caught fire, though Tesla said no one was in the vehicle when that happened. The company said the crash was made worse by a missing or damaged safety shield on the end of the freeway barrier that is supposed to reduce the impact into the concrete lane divider.

The crash happened in Mountain View, in California’s Silicon Valley. The driver was Walter Huang, 38, a software engineer for Apple.

“None of this changes how devastating an event like this is or how much we feel for our customer’s family and friends,” Tesla said on its website late Friday.

Earlier this month, a self-driving Volvo SUV being tested by ride-hailing service Uber struck and killed a pedestrian in Arizona.

Tesla Inc. defended its Autopilot feature, saying that while it doesn’t prevent all accidents, it makes them less likely to occur than is the case for vehicles without it.

Federal investigators are looking into last week’s crash, as well a separate crash in January of a Tesla Model S that may have been operating under the Autopilot system.

Could Enemies Target Undersea Cables That Link the World?

Russian ships are skulking around underwater communications cables, causing the U.S. and its allies to worry the Kremlin might be taking information warfare to new depths.

Is Moscow interested in cutting or tapping the cables? Does it want the West to worry it might? Is there a more innocent explanation? Unsurprisingly, Russia isn’t saying.

But whatever Moscow’s intentions, U.S. and Western officials are increasingly troubled by their rival’s interest in the 400 fiber-optic cables that carry most of world’s calls, emails and texts, as well as $10 trillion worth of daily financial transactions.

“We’ve seen activity in the Russian navy, and particularly undersea in their submarine activity, that we haven’t seen since the ’80s,” General Curtis Scaparrotti, commander of the U.S. European Command, told Congress this month.

Without undersea cables, a bank in Asian countries couldn’t send money to Saudi Arabia to pay for oil. U.S. military leaders would struggle to communicate with troops fighting extremists in Afghanistan and the Middle East. A student in Europe wouldn’t be able to Skype his parents in the United States.

Small passageways

All this information is transmitted along tiny glass fibers encased in undersea cables that, in some cases, are little bigger than a garden hose. All told, there are 620,000 miles of fiber-optic cable running under the sea, enough to loop around Earth nearly 25 times.

Most lines are owned by private telecommunications companies, including giants like Google and Microsoft. Their locations are easily identified on public maps, with swirling lines that look like spaghetti. While cutting one cable might have limited impact, severing several simultaneously or at choke points could cause a major outage.

The Russians “are doing their homework and, in the event of a crisis or conflict with them, they might do rotten things to us,” said Michael Kofman, a Russian military expert at nonprofit research group CNA Corp.

It’s not Moscow’s warships and submarines that are making NATO and U.S. officials uneasy. It’s Russia’s Main Directorate of Deep Sea Research, whose specialized surface ships, submarines, underwater drones and minisubs conduct reconnaissance, underwater salvage and other work.

One ship run by the directorate is the Yantar. It’s a modest, 354-foot oceanographic vessel that holds a crew of about 60. It most recently was off South America’s coast helping Argentina search for a lost submarine.

Parlamentskaya Gazeta, the Russian parliament’s publication, last October said the Yantar has equipment “designed for deep-sea tracking” and “connecting to top-secret communication cables.” The publication said that in September 2015, the Yantar was near Kings Bay, Georgia, home to a U.S. submarine base, “collecting information about the equipment on American submarines, including underwater sensors and the unified [U.S. military] information network.” Rossiya, a Russian state TV network, has said the Yantar not only can connect to top-secret cables but also can cut them and “jam underwater sensors with a special system.”

Russia’s Defense Ministry did not respond to a request for comment.

Preparing for sabotage

There is no hard evidence that the ship is engaged in nefarious activity, said Steffan Watkins, an information technology security consultant in Canada tracking the ship. But he wonders what the ship is doing when it’s stopped over critical cables or when its Automatic Identification System tracking transponder isn’t on.

Of the Yantar’s crew, he said: “I don’t think these are the actual guys who are doing any sabotage. I think they’re laying the groundwork for future operations.”

Members of Congress are wondering, too. 

Representative Joe Courtney, a Connecticut Democrat on a House subcommittee on sea power, said of the Russians, “The mere fact that they are clearly tracking the cables and prowling around the cables shows that they are doing something.”

Democratic Senator Gary Peters of Michigan, an Armed Services Committee member, said Moscow’s goal appears to be to “disrupt the normal channels of communication and create an environment of misinformation and distrust.”

The Yantar’s movements have previously raised eyebrows.

On October 18, 2016, a Syrian telecom company ordered emergency maintenance to repair a cable in the Mediterranean that provides internet connectivity to several countries, including Syria, Libya and Lebanon. The Yantar arrived in the area the day before the four-day maintenance began. It left two days before the maintenance ended. It’s unknown what work it did while there.

Watkins described another episode on November 5, 2016, when a submarine cable linking Persian Gulf nations experienced outages in Iran. Hours later, the Yantar left Oman and headed to an area about 60 miles west of the Iranian port city of Bushehr, where the cable runs ashore. Connectivity was restored just hours before the Yantar arrived on November 9. The boat stayed stationary over the site for several more days.

Undersea cables have been targets before.

At the beginning of World War I, Britain cut a handful of German underwater communications cables and tapped the rerouted traffic for intelligence. In the Cold War, the U.S. Navy sent American divers deep into the Sea of Okhotsk off the Russian coast to install a device to record Soviet communications, hoping to learn more about the U.S.S.R.’s submarine-launched nuclear capability.

Eavesdropping by spies

More recently, British and American intelligence agencies have eavesdropped on fiber-optic cables, according to documents released by Edward Snowden, a former National Security Agency contractor.

In 2007, Vietnamese authorities confiscated ships carrying miles of fiber-optic cable that thieves salvaged from the sea for profit. The heist disrupted service for several months. And in 2013, Egyptian officials arrested three scuba divers off Alexandria for attempting to cut a cable stretching from France to Singapore. Five years on, questions remain about the attack on a cable responsible for about a third of all internet traffic between Egypt and Europe.

Despite the relatively few publicly known incidents of sabotage, most outages are due to accidents.

Two hundred or so cable-related outages take place each year. Most occur when ship anchors snap cables or commercial fishing equipment snags the lines. Others break during tsunamis, earthquakes and other natural disasters.

But even accidental cuts can harm U.S. military operations. 

In 2008 in Iraq, unmanned U.S. surveillance flights nearly screeched to a halt one day at Balad Air Base, not because of enemy mortar attacks or dusty winds. An anchor had snagged a cable hundreds of miles away from the base, situated in the “Sunni Triangle” northwest of Baghdad.

The severed cable had linked controllers based in the United States with unmanned aircraft flying intelligence, surveillance and reconnaissance missions for coalition forces in the skies over Iraq, said retired Air Force Colonel Dave Lujan of Hampton, Virginia.

“Say you’re operating a remote-controlled car and all of a sudden you can’t control it,” said Lujan, who was deputy commander of the 332nd Expeditionary Operations Group at the base when the little-publicized outage lasted for two to three days. “That’s a big impact,” he said, describing how U.S. pilots had to fly the missions instead.

Facebook ‘Ugly Truth’ Memo Triggers New Firestorm Over Ethics

Was a leaked internal Facebook memo aimed at justifying the social network’s growth-at-any-cost strategy? Or simply a way to open debate on difficult questions over new technologies?

The extraordinarily blunt memo by a high-ranking executive — leaked this week and quickly repudiated by the author and by Facebook — warned that the social network’s goal of connecting the world might have negative consequences, but that these were outweighed by the positives.

“Maybe it costs a life by exposing someone to bullies,” the 2016 memo by top executive Andrew “Boz” Bosworth said. “Maybe someone dies in a terrorist attack coordinated on our tools.”

While Bosworth and Facebook chief Mark Zuckerberg said the memo was only a way to provoke debate, it created a new firestorm for the social network mired in controversy over the hijacking of personal data by a political consulting firm linked to Donald Trump.

David Carroll, a professor of media design at the New School Parsons, tweeted that the memo highlighted a “reckless hubristic attitude” by the world’s biggest social network.

“What is so striking is that an executive chose to have this conversation on a Facebook wall,” said Jennifer Grygiel, a Syracuse University professor who studies social networks. “He showed poor judgment and poor business communication skills. It speaks to Facebook’s culture.”

Grygiel said these kinds of issues require “thoughtful discussion” and should take place within a context of protecting users. “When these companies build new products and services, their job is to evaluate the risks, and not just know about them, but ensure public safety.”

Bosworth, considered part of chief executive Zuckerberg’s inner circle, wrote: “The ugly truth is that we believe in connecting people so deeply that anything that allows us to connect more people more often is ‘de facto’ good.”

On Thursday, he said he merely wanted to open a discussion and added that “I don’t agree with the post today and I didn’t agree with it even when I wrote it.”

Zuckerberg responded that he and many others at Facebook “strongly disagreed” with the points raised.

‘Offloading’ ethical questions

Jim Malazita, a professor of science and technology studies at Rensselaer Polytechnic Institute, said it was not surprising to see the memo in an industry whose work culture is highly compartmentalized.

Malazita said the memo frames the discussion with the assumption that technology and connecting people is always positive.

“By the assumptions built into that framework they are already shutting down a whole bunch of conversations,” he said.

Malazita added that most people who learn computer science are taught to make these technologies work as well as possible, while “offloading” the question of moral responsibility.

“It’s not that they don’t care, but even when they care about the social impact, there’s a limit to how much they practice that care.”

Joshua Benton, director of Harvard University’s Nieman Journalism Lab, said it may be too easy to blame Facebook for misuse of the platform.

“I’m rarely in a position to defend Facebook,” he said, but the view that a technology is worth spreading even though some people will use it for terrible ends “is something you could have believed about the telegraph, the telephone, email, SMS, the iPhone, etc,” Benton tweeted.

Doing the right thing

Patrick Lin, director of the ethics and emerging sciences group at California Polytechnic State University, said he sees “no evidence that Facebook’s culture is unethical, though just one senior executive in the right place can poison the well.”

“I’d guess that most Facebook employees want to do the right thing and are increasingly uncomfortable with how the proverbial sausage is made,” Lin added.

Copies of internal responses at Facebook published by The Verge website showed many employees were angry or upset over the Bosworth memo but that some defended the executive.

Others said the leaks may suggest Facebook is being targeted by spies or “bad actors” trying to embarrass the company.

Rivers and Tides Can Provide Affordable Power

While wind turbines and solar cells generate power only when there is wind and sun, most rivers always flow and most ocean shores always experience tidal currents. At a recent energy summit organized by the U.S. Energy Department, a company from Maine displayed an innovative submersible generator that effectively harvests power from shallow rivers and tidal currents. VOA’s George Putic has more.

Despite Setbacks, Automakers Move Forward with Electric and Self-Driving Cars

A recent fatality involving one of Uber’s self-driving cars may have created uncertainty and doubt regarding the future of autonomous vehicles, but it’s not stopping automakers who say autonomous and self-driving vehicles are here to stay. At the New York International Auto Show this week, autonomous vehicles and electric cars were increasingly front and center as VOA’s Tina Trinh reports.

Under Armour: 150 Million Fitness App Accounts Breached

Under Armour Inc. said Thursday that data from 150 million MyFitnessPal diet and fitness app accounts were compromised in February, in one of the biggest hacks in history, sending shares of the athletic apparel maker down 3 percent in after-hours trade.

The stolen data include account user names, email addresses and scrambled passwords for the popular MyFitnessPal mobile app and website, Under Armour said in a statement. Social Security numbers, driver license numbers and payment card data were not compromised, it said.

It is the largest data breach this year and one of the top five to date, based on the number of records compromised, according to SecurityScorecard, a cybersecurity rating and remediation company.

Larger hacks include 3 billion Yahoo accounts compromised in a 2013 incident and credentials for more than 412 million users of adult websites run by California-based FriendFinder Networks Inc. in 2016, according to breach notification website LeakedSource.com.

Under Armour said it was working with data security firms and law enforcement, but it did not provide details of how the hackers got into its network or pulled out the data without getting caught.

While the breach did not include financial data, large troves of stolen email addresses can be valuable to cybercriminals.

Email addresses retrieved in a 2014 attack that compromised data on 83 million JPMorgan Chase customers were later used in schemes to boost stock prices, according to U.S. federal indictments in the case in 2015.

Under Armor said in an alert on its website that it would require MyFitnessPal users to change their passwords, and it urged users to do so immediately.

“We continue to monitor for suspicious activity and to coordinate with law enforcement authorities,” the company said, adding that it was bolstering systems that detect and prevent unauthorized access to user information.

Under Armour said it started notifying users of the breach Thursday, four days after it learned of the incident.

Under Armour bought MyFitnessPal in 2015 for $475 million.

It is part of the company’s connected fitness division, whose revenue last year accounted for 1.8 percent of Under Armour’s $5 billion in total sales. 

Facebook’s Zuckerberg Disavows Memo Saying All User Growth Is Good

A Facebook Inc. executive said in an internal memo in 2016 that the social media company needed to pursue adding users above all else, BuzzFeed

News reported Thursday, prompting disavowals from the executive and Facebook Chief Executive Officer Mark Zuckerberg.

The memo from Andrew Bosworth, a Facebook vice president, had not been previously reported as Facebook faces inquiries over how it handles personal information and the tactics the social media company has used to grow to 2.1 billion users.

Zuckerberg stood by Bosworth, who goes by the nickname “Boz,” while distancing himself from the memo’s contents.

Bosworth confirmed the memo’s authenticity but in a statement he disavowed its message, saying its goal had been to encourage debate.

Facebook users, advertisers and investors have been in an uproar for months over a series of scandals, most recently privacy practices that allowed political consultancy Cambridge Analytica to obtain personal information on 50 million Facebook members. Zuckerberg is expected to testify at a hearing with U.S. lawmakers as soon as April.

​’Provocative’ statements

“Boz is a talented leader who says many provocative things. This was one that most people at Facebook including myself disagreed with strongly. We’ve never believed the ends justify the means,” Zuckerberg said in a statement.

Bosworth wrote in the June 2016 memo that some “questionable” practices were all right if the result was connecting people.

“That’s why all the work we do in growth is justified. All the questionable contact importing practices. All the subtle language that helps people stay searchable by friends,” he wrote in the memo, which BuzzFeed published on its website.

He also urged fellow employees not to let potential negatives slow them down.

“Maybe it costs a life by exposing someone to bullies. Maybe someone dies in a terrorist attack coordinated on our tools. And still we connect people,” he wrote.

Bosworth said Thursday that he did not agree with the post today “and I didn’t agree with it even when I wrote it.

“Having a debate around hard topics like these is a critical part of our process and to do that effectively we have to be able to consider even bad ideas, if only to eliminate them,” Bosworth’s statement said.

Entrepreneur: ‘Anyone Can Play a Role’ in African Innovation

While working for a big consulting firm in Lagos, Nigeria, Afua Osei repeatedly encountered women who wanted to advance professionally but didn’t know how. They needed guidance and mentoring.

So, Osei and her colleague Yasmin Belo-Osagie started She Leads Africa, a digital media company offering advice, information, training and networking opportunities to help “young African women achieve their professional dreams,” according to the website.

Launched in 2014, it now has an online community of over 300,000 in at least 35 countries in Africa and throughout the diaspora.

“I didn’t plan to be an entrepreneur,” Osei said this month at South by Southwest (SXSW), an annual festival of music, film and tech innovation. 

Anyone can be an innovator, Osei said in an interview, after co-hosting a meetup on starting and investing in African businesses. “You don’t have to look a certain way. It’s not just for one type of person. Anybody can play a role, and there is so much work to be done.”

​Opportunities in Africa

The Ghana-born entrepreneur — who grew up in metropolitan Washington, D.C., and once worked for first lady Michelle Obama — has lived in Nigeria for roughly five years. From there, she sees “so many opportunities and potentials in Africa to innovate and help improve people’s lives.”

The continent has some fast-growing economies — including Nigeria, Ghana and Ethiopia — and the world’s fastest-growing population. With more than 1.2 billion people, it’s projected to top 2.2 billion by 2050. At least 26 African countries are likely to double their current populations by then, the United Nations reports. 

Africa also holds challenges for entrepreneurs, from finding funding to untangling bureaucratic red tape, Osei acknowledged. “Dealing with polices and governments can be hard. Also, distributions: How can I get a product that I made in Lagos out here to Austin?”

But, Osei insisted, “Every single challenge and opportunity also presents a space for an innovator and entrepreneur to solve that problem.”

Accelerator gives edge

She Leads Africa deals with problem-solving. In its first year, the company started the SLA Accelerator, a three-month development program to assist female-led startups in Nigeria. It gives entrepreneurs business training and opportunities to meet potential investors.

Entrepreneur Cherae Robinson won a spot in the accelerator program’s first year — and $10,000 in seed money to start a specialty travel company. Now called Tastemakers Africa, it has a mobile app to help users “find and buy hip experiences on the continent.”  

The mentorship “provided a wealth of knowledge I did not have,” said Robinson, a 33-year-old New York native living in Johannesburg, South Africa. “I was a few months into developing the model. She Leads Africa helped us not only refine the model, but it continues to be a source I can tap into. They continue to support the entrepreneurs in their network.”

She Leads Africa recently began working with a New York-based Ghanaian-German designer and fashion blogger who goes by the single name Kukua. She started africaboutik, an online store of modern African designs.

“At Africa-themed events in NYC [New York City], I see a lot of so-called ‘Made in Africa’ items that are 100 percent made in Beijing,” Kukua wrote in an Instagram post. With SLA’s help, she’s identifying new textiles and designers in Africa to change the fashion narrative.

​Navigating rules, regulations

At several SXSW Africa-focused events, Osei was asked how entrepreneurs could navigate complicated government regulations and licensing requirements. She suggested finding key government personnel who understand technology and want to help new businesses.  

“It is important for technology leaders to take the lead and be innovative in the way we communicate to government, because they [government staff] are learning as much as we are,” Osei told VOA.

Osei and Belo-Osagie are learning through She Leads Africa, and their efforts have drawn recognition. Forbes magazine named them among “the 20 Youngest Power Women in Africa” in 2014. 

They don’t plan to slow down, Osei said, noting their goal is at least 1 million subscribers for their website. As the site says, it’s for “the ladies who want to build million-dollar companies, lead corporate organizations and crush it as leaders.”

Adobe New Service Aims to Follow Users Across Multiple Devices

Visiting Subway’s website on a personal computer might not seem to have anything to do with checking the NFL’s app on a phone. But these discrete activities are the foundation for a new service to help marketers follow you around.

Adobe, a company better known for Photoshop and PDF files, says the new initiative announced Wednesday will help companies offer more personalized experiences and make ads less annoying by filtering out products and services you have already bought or will never buy.

But it comes amid heightened privacy sensitivities after reports that Facebook allowed a political consulting firm to harvest data on millions of Facebook users to influence elections.

And Adobe’s initiative underscores the role data plays in helping companies make money. Many of the initial uses are for better ad targeting.

Adobe says no personal data is being exchanged among the 60 or so companies that have joined its Device Co-op initiative already. These include such well-known brands as Allstate, Lenovo, Intel, Barnes & Noble, Subaru, Subway, Sprint, the NFL and the Food Network. Adobe says the program links about 300 million consumers across nearly 2 billion devices in the U.S. and Canada.

Under the initiative, Adobe can tell you’re the same person on a home PC, a work laptop, a phone and a tablet by analyzing past sign-ins with member companies. With that knowledge, Sprint would know Bob is already a customer when he visits from a new device. Bob wouldn’t get a promotion to switch from another carrier, but might get instead a phone upgrade offer. Or if Mary has declared herself a Giants fan on the NFL’s app, she might see ads with Giants banners when visiting NFL.com from a laptop for the first time.

All this might feel creepy, but such cross-device tracking is already commonly done by matching attributes such as devices that from the same internet location, or IP address. Consumers typically have little control over it.

Adobe says it will give consumers a chance to opt out of such tracking. And it’s breaking industry practices in a few ways. Adobe says it will honor opt-out requests for all participating companies and for all devices at once. It’s more typical for such setups to require people do so one by one. All companies in the initiative are listed on Adobe’s website, a break from some companies’ practice of referring only to unspecified partners.

“We’re doing everything we can not letting brands hide themselves,” Adobe executive Amit Ahuja said.

But in taking an opt-out approach, which is common in the industry, Adobe assumes that users consent. And it places the burden on consumers to learn about this initiative and to figure out how they can opt out of it.

3 Facebook Messenger App Users File Lawsuit Over Privacy

Three Facebook Messenger app users have filed a lawsuit claiming the social network violated their privacy by collecting logs of their phone calls and text messages.

The suit, filed Tuesday in federal court in northern California, comes as Facebook faces scrutiny over privacy concerns.

Facebook acknowledged on Sunday that it began uploading call and text logs from phones running Google’s Android system in 2015. Facebook added that only users who gave appropriate permission were affected, that it didn’t collect the contents of messages or calls, and that users can opt out of the data collection and have the stored logs deleted by changing their app settings.

The suit seeks class-action status.

A message seeking comment from Facebook on Wednesday was not immediately returned.

Robots Pose Big Threat to Jobs in Africa, Researchers Warn

It could soon be cheaper to operate a factory of robots in the United States than employing manual labor in Africa. That’s the stark conclusion of a report from a London-based research institute, which warns that automation could have a devastating effect on developing economies unless governments invest urgently in digitalization and skills training.

The rhythmic sounds of the factory floor. At this textile plant in Rwanda, hundreds of workers sit side-by-side at sewing machines, churning out clothes that will be sold in stores across the world.

Outsourcing production by using cheap labor in the developing world has been a hallmark of the global economy for decades. But technology could be about to turn that on its head.

Research from the Overseas Development Institute focused on the example of furniture manufacturing in Africa. Karishma Banga co-authored the report.

“In the next 15 to 20 years, robots in the U.S. are actually going to become much cheaper than Kenyan labor. Particularly in the furniture manufacturing industry. So this means that around 2033, American companies will find it much more profitable to reshore production back. Which means essentially get all the jobs and production back from the developing countries to the U.S. And that obviously can have very significantly negative effects for jobs in Africa.”

As robots are getting cheaper, she says, people are getting more expensive.

“So the cost of a robot or the cost of a 3D printer, they’re declining at similar levels, around 6 percent annually. So that’s a significant decline. Whereas wages in developing countries are rising.”

There’s no doubting the challenges posed by automation to manual labor in developing countries – but some are fighting back.

The Funkidz furniture factory in Kenya breaks with the traditional mold of production. Automated saws cut perfect templates using computer-aided designs, overseen by skilled programmers and operators.

The investment is paying off, with rapid growth and expansion into Uganda and Rwanda. But Kenyan CEO Ciiru Waweru Waithaka says she can’t find the right employees.

“We have machines that sit idle because we don’t have skilled people. There are many people who need jobs, yes, we agree, but if they have no skills… I would love to employ you, but you need a skill, otherwise you cannot operate our machines. So we are urging all institutions, government, please let us take this skills gap as a crisis.”

That call is echoed by the ODI report authors – who urge African governments to use the current window of opportunity to build industrial capabilities and digital skills – before the jobs crunch hits.

Techno Teachers: Finnish School Tests Robot Educators

Elias, the new language teacher at a Finnish primary school, has endless patience for repetition, never makes a pupil feel embarrassed for asking a question, and can even do the “Gangnam Style” dance.

Elias is also a robot.

The language-teaching machine comprises a humanoid robot and mobile application, one of four robots in a pilot program at primary schools in the southern city of Tampere.

The robot is able to understand and speak 23 languages and is equipped with software that allows it to understand students’ requirements and helps it to encourage learning. In this trial, however, it communicates in English, Finnish and German only.

The robot recognizes the pupil’s skill levels and adjusts its questions accordingly. It also gives feedback to teachers about a student’s possible problems.

Some of the human teachers who have worked with the technology see it as a new way to engage children in learning.

“I think in the new curriculum, the main idea is to get the kids involved and get them motivated and make them active. I see Elias as one of the tools to get different kinds of practice and different kinds of activities into the classroom,” language teacher Riika Kolunsarka told Reuters.

“In that sense, I think robots and coding the robots and working with them is definitely something that is according to the new curriculum and something that we teachers need to be open-minded about.”

Elias the language robot, which stands around a foot tall, is based on SoftBank’s NAO humanoid interactive companion robot, with software developed by Utelias, a developer of educational software for social robots.

The mathematics robot — dubbed OVObot —is a small, blue machine around 25 cm (10 inches) high and resembles an owl. It was developed by Finnish AI Robots.

The purpose of the pilot project is to see if these robots can improve the quality of teaching, with one of the Elias robots and three of the OVObots deployed in schools. The OVObots will be tested for one year, while the school has bought the Elias robot, so its use can continue longer.

Using robots in classrooms is not new — teaching robots have been used in the Middle East, Asia and the United States in recent years — but modern technologies such as cloud services and 3-D printing are allowing smaller startup companies to enter the sector.

“Well, it is fun, interesting and exciting and I’m a bit shocked,” pupil Abisha Jinia told Reuters, giving her verdict on Elias the language robot.

Despite their skills in language and mathematics however, the robots’ inability to maintain discipline amongst a class of primary school children means that, for the time being at least, the human teachers’ jobs are safe.

Watchdog: FBI Could Have Tried Harder to Hack iPhone

FBI officials could have tried harder to unlock an iPhone as part of a terrorism investigation before launching an extraordinary court fight with Apple Inc. in an effort to force it to break open the device, the Justice Department’s watchdog said Tuesday.

The department’s inspector general said it found no evidence the FBI was able to access data on the phone belonging to one of the gunmen in a 2015 mass shooting in San Bernardino, California, as then-FBI Director James Comey told Congress more than once. But communications failures among FBI officials delayed the search for a solution. The FBI unit tasked with breaking into mobile devices only sought outside help to unlock the phone the day before the Justice Department filed a court brief demanding Apple’s help, the inspector general found.

The finding could hurt future Justice Department efforts to force technology companies to help the government break into encrypted phones and computers.

The intense public debate surrounding the FBI’s legal fight with Apple largely faded after federal authorities announced they were able to access the phone in the San Bernardino attack without the help of the technology giant. But Trump administration officials have indicated a renewed interest in legislation that would address the problem, with Deputy Attorney General Rod Rosenstein and FBI Director Christopher Wray publicly discussing their frequent frustration with encrypted devices. Congress could be less inclined to act on the problem — known as “going dark” — if there is an indication it may not be necessary.

Even after an outside vendor demonstrated it could successfully hack the phone, FBI officials disagreed over whether it should be used, in part because it would make the legal battle with Apple unnecessary. Some FBI officials thought they had found the precedent-setting case to convince Americans there should be no encryption that can’t be defeated or accessed with a warrant.

Amy Hess, who then oversaw the FBI’s science and technology division, told the inspector general’s office she was concerned that other officials did not seem to want to find a technical solution, or perhaps even knew of one, but remained silent in order to beat Apple in court.

The inspector general found no one withheld knowledge of an existing FBI capability, but failed to pursue all avenues in search for a solution. An FBI unit chief knew that an outside vendor had almost 90 percent completed a technique that would have allowed it to break into the phone, the report said, even as the Justice Department insisted that forcing Apple’s help was the only option.

  Apple fought back, triggering a courtroom showdown that revived the debate over the balance of digital privacy rights and national security. Apple had argued that helping the FBI hack the iPhone would set a dangerous precedent, making all iPhone users vulnerable, and argued that Congress should take up the issue.

Apple declined to comment Tuesday. The FBI did not immediately return calls, but said in a letter to the inspector general that it agreed it with the findings and recommendations for improved communication. The report says the FBI is adding a new section to address the “going dark” problem and boost coordination among units that work on computers and mobile devices.

Law enforcement officials have long warned that encryption and other data-protection measures are making it more difficult for investigators to track criminals and dangerous extremists. Wray said late last year that agents have been unable to retrieve data from half the mobile devices — nearly 7,000 phones, computers and tablets — that they tried to access in less than a year.

Yet Congress has shown little appetite for legislation that would force tech companies to give law enforcement easier access.

The issue also troubled Wray’s predecessor, Comey, who frequently spoke about the bureau’s inability to access digital devices. But the Obama White House never publicly supported legislation that would have forced technology companies to give the FBI a back door to encrypted information, leaving Comey’s hands tied to propose a specific legislative fix.

Expert Says Brexit Campaign Used Data Mined From Facebook

The computer expert who sparked a global debate over electronic privacy said Tuesday that the official campaign backing Britain’s exit from the European Union had access to data that was inappropriately collected from millions of Facebook users.

Christopher Wylie previously alleged that political consultancy Cambridge Analytica used data harvested from more than 50 million Facebook users to help U.S. President Donald Trump’s 2016 election campaign. Wylie worked on Cambridge Analytica’s “information operations” in 2014 and 2015.

Wylie on Tuesday told the media committee of the British parliament that he “absolutely” believed Canadian consultant AggregateIQ drew on Cambridge Analytica’s databases for its work on the official Vote Leave campaign. The data could have been used to micro-target voters in the closely fought referendum in which 51.9 percent of voters ultimately backed Brexit.

“I think it is incredibly reasonable to say that AIQ played a very significant role in Leave winning,” he said.

Because of the links between the two companies, Vote Leave got the “the next best thing” to Cambridge Analytica when it hired AggregateIQ, “a company that can do virtually everything that [Cambridge Analytica] can do but with a different billing name,” Wylie said.

The testimony comes a day after Wylie and two other former insiders presented 50 pages of documents that they said proved Vote Leave violated election finance rules during the referendum campaign.

They allege that Vote Leave circumvented spending limits by donating 625,000 pounds ($888,000) to the pro-Brexit student group BeLeave, then sending the money directly to AggregateIQ.

Campaign finance rules limited Vote Leave’s spending on the Brexit referendum to 7 million pounds. When Vote Leave got close to that limit in the final weeks of the campaign, it made the donation to BeLeave, said Shahmir Sanni, a volunteer who helped run the grassroots student group.

Wylie told Britain’s Observer newspaper that he was instrumental in founding AggregateIQ when he was the research director of SCL, the parent company of Cambridge Anayltica. He said they shared underlying technology and worked so closely together that Cambridge Analytica staff often referred to the Canadian firm as a “department.”

AggregateIQ, based in Victoria, British Columbia, issued a statement saying it has never been part of Cambridge Analytica and has never signed a contract with the company. The company also said it was 100-percent Canadian owned and operated and was never part of Cambridge Analytica or SCL.

“AggregateIQ works in full compliance within all legal and regulatory requirements in all jurisdictions where it operates,” the company said in a statement. “It has never knowingly been involved in any illegal activity. All work AggregateIQ does for each client is kept separate from every other client.”

 

Affordable Chip Pinpoints Methane Leaks

One of today’s most affordable sources of fossil-based energy is natural gas, which consists primarily of methane. Found in remote, deep underground reservoirs, the gas must be transported through long pipelines with thousands of connections, valves and pumping stations, which are inevitably prone to leaks. Scientists at IBM are testing a small, affordable gas detector that could be placed literally anywhere. VOA’s George Putic reports.

What Facebook’s Privacy Policy Allows May Surprise You

To get an idea of the data Facebook collects about you, just ask for it. You’ll get a file with every photo and comment you’ve posted, all the ads you’ve clicked on, stuff you’ve liked and searched for and everyone you’ve friended — and unfriended — over the years.

 

Now, the company is under fire for collecting data on people’s phone calls and text messages if they used Android devices. While Facebook insists users had to specifically agree, or opt in, to have such data collected, at least some users appeared surprised.

 

Facebook’s trove of data is used to decide which ads to show you. It also makes using Facebook more seamless and enjoyable — say, by determining which posts to emphasize in your feed, or reminding you of friends’ birthdays.

 

Facebook claims to protect all this information, and it lays out its terms in a privacy policy that’s relatively clear and concise. But few users bother to read it. You might be surprised at what Facebook’s privacy policy allows — and what’s left unsaid.

 

Facebook’s privacy practices have come under fire after a Trump-affiliated political consulting firm, Cambridge Analytica, got data inappropriately from millions of Facebook users. While past privacy debacles have centered on what marketers gather on users, the stakes are higher this time because the firm is alleged to have created psychological profiles to influence how people vote or even think about politics and society.

 

Facebook defends its data collection and sharing activities by noting that it’s adhering to a privacy policy it shares with users. Thanks largely to years of privacy scandals and pressure from users and regulators, Facebook also offers a complex set of controls that let users limit how their information is used — to a point.

 

You can turn off ad targeting and see generic ads instead, the way you would on television or in a newspaper. In the ad settings, you’d need to uncheck all your interests, interactions with companies and websites and other personal information you don’t want to use in targeting. Of course, if you click on a new interest after this, you’ll have to go back and uncheck it in your ad preferences to prevent targeting. It’s a tedious task.

 

As Facebook explains, it puts you in target categories based on your activity. So, if you are 35, live in Seattle and have liked an outdoor adventure page, Facebook may show you an ad for a mountain bike shop in your area.

 

But activity isn’t limited to pages or posts you like, comments you make and your use of outside apps and websites.

 

“If you start typing something and change your mind and delete it, Facebook keeps those and analyzes them too,” Zeynep Tufekci, a prominent techno-sociologist, said in a 2017 TED talk.

 

And, increasingly, Facebook tries to match what it knows about you with your offline data, purchased from data brokers or gathered in other ways. The more information it has, the fuller the picture of you it can offer to advertisers. It can infer things about you that you had no intention of sharing — anything from your ethnicity to personality traits, happiness and use of addictive substances, Tufekci said.

 

These types of data collection aren’t necessarily explicit in privacy policies or settings.

 

What Facebook does say is that advertisers don’t get the raw data. They just tell Facebook what kind of people they want their ads to reach, then Facebook makes the matches and shows the ads.

 

Apps can also collect a lot of data about you, as revealed in the Cambridge Analytica scandal. The firm got the data from a researcher who paid 270,000 Facebook users to complete a psychological profile quiz back in 2014. But the quiz gathered information on their friends as well, bringing the total number of people affected to about 50 million.

 

Facebook says Cambridge Analytica got the data inappropriately — but only because the app said it collected data for research rather than political profiling. Gathering data on friends was permitted at the time, even if they had never installed the app or given explicit consent.

 

Ian Bogost, a Georgia Tech communications professor who built a tongue-in-cheek game called “Cow Clicker” in 2010, wrote in The Atlantic recently that abusing the Facebook platform for “deliberately nefarious ends” was easy to do then. What’s worse, he said, it was hard to avoid extracting private data.

 

If “you played Cow Clicker, even just once, I got enough of your personal data that, for years, I could have assembled a reasonably sophisticated profile of your interests and behavior,” he wrote. “I might still be able to; all the data is still there, stored on my private server, where Cow Clicker is still running, allowing players to keep clicking where a cow once stood.”

 

Facebook has since restricted the amount of types of data apps can access. But other types of data collection are still permitted. For this reason, it’s a good idea to check all the apps you’ve given permissions to over the years. You can also do this in your settings.

Cisco Systems Gives $50M to Combat California Homelessness

Internet gear maker Cisco Systems Inc. announced Monday that it will donate $50 million over five years to address the growing problem of homelessness in California’s Santa Clara County and is encouraging other Silicon Valley companies to make similar efforts.

 

In a blog post, Chief Executive Chuck Robbins said people in the San Francisco Bay Area know homelessness has reached a crisis level, costing the county where many tech companies are based $520 million per year.

 

“Though homelessness seems intractable, I believe that it is a solvable issue,” Robbins wrote. “I also feel very strongly that we have an opportunity — and a responsibility — to do something about it.”

Northern California’s booming economy has been fueled by the tech sector. But the influx of workers coupled with decades of under-building has led to a historic shortage of affordable housing throughout the San Francisco Bay Area. Homelessness is now pervasive throughout Silicon Valley.

 

The median rent in the San Jose metro area is $3,500 a month, but the median wage is $12 an hour in food service and $19 an hour in health care support, an amount that won’t even cover housing costs. The minimum annual salary needed to live comfortably in San Jose is $87,000, according to a study by personal finance website GoBankingRates.

 

Cisco’s donation will go to Destination: Home, a public-private partnership that focuses on getting housing for the homeless as the first step in addressing other problems related to health, addiction, family estrangement and joblessness. In addition to financing housing, the funding will also help improve data collection about homelessness services so money is spent more efficiently.

 

Ray Bramson, chief impact officer for Destination: Home, said the leadership shown by Cisco and its CEO is what the community needs to see from the major technology companies that call Silicon Valley home.

“We’ve always known that tech could be a good partner,” Bramson said. “We’re hoping that by Cisco really stepping up and giving us this support we’re going to see other great organizations in our valley step up. … No one agency, no one organization can really do it alone.”

 

Cisco’s donation is believed to be among the largest of its kind in the region.

 

The tech company last year pledged $10 million to Housing Trust Silicon Valley’s TECH fund, on the condition that it would be matched by others. LinkedIn matched $10 million.