Technology

California Ready to Open Its Roads to Driverless Cars 

Cars with no steering wheel, no pedals and nobody at all inside could be driving themselves on California roads by the end of the year, under proposed new state rules that would give a powerful boost to the fast-developing technology.

For the past several years, tech companies and automakers have been testing self-driving cars on the open road in California. But regulators insisted that those vehicles have steering wheels, foot controls and human backup drivers who could take over in an emergency.

On Friday, the state Department of Motor Vehicles proposed regulations that would open the way for truly driverless cars.

Under the rules, road-testing of such vehicles could begin by the end of 2017, and a limited number could become available to customers as early as 2018, provided the federal government gives the necessary permission.

Other states allow tests

Currently, federal automobile standards require steering wheels, though Washington has shown a desire to encourage self-driving technology.

While a few other states have permitted such testing, this is a major step forward for the industry, given California’s size as the most populous state, its clout as the nation’s biggest car market and its longtime role as a cultural trendsetter.

The proposed regulations also amount to the most detailed regulatory framework of any state.

“California has taken a big step. This is exciting,” said Bryant Walker Smith, a law professor at the University of South Carolina who tracks government policy on self-driving cars.​

Rules maybe ready by year’s end

The rules are subject to a public hearing and a comment period and could change. Regulators hope to put them in effect by December.

The proposal is more than two years overdue, reflecting complex questions of safety and highly advanced technology.

“We don’t want to race to meet a deadline,” said Bernard Soriano, a leader of the motor vehicle agency’s self-driving program. “We want to get this right.”

In one important change from prior drafts, once a manufacturer declares its technology is road-ready, it can put its cars on the market. That self-certification approach mirrors how federal officials regulate standard cars, and represents a big victory for such major players as Waymo, Google’s self-driving car project.

Also under the proposed regulations, any driverless car still must be remotely monitored and able to pull itself over safely in an emergency.

Consumer Watchdog objects

A Waymo spokesman had no immediate comment. The chief skeptic of the technology, California-based Consumer Watchdog, said the proposal does not protect the public.

“The new rules are too industry-friendly,” Consumer Watchdog’s John Simpson said in a statement.

The technology is developing quickly. More than a year ago, a Waymo prototype with no steering wheel or pedals drove a blind man on city streets in Texas.

Are they safer?

Supporters say the cars may one day be far safer than those with humans at the wheel, since the machinery won’t drive distracted, drunk or drowsy.

During road-testing in California, self-driving cars with human backup drivers are believed to have caused a few collisions.

A year ago, Waymo reported that during the 424,331 miles its cars had driven themselves, a human driver intervened 11 times to avoid a collision. In an update earlier this year, Waymo said its fleet had driven 636,868 miles in autonomous mode; it did not say how many crashes were avoided.

In all, 27 companies have Department of Motor Vehicles permits to test on California roads.

Waymo was able to legally put its prototype on the road in Texas because state law there does not prohibit a fully driverless car. Other states have explicitly invited the technology onto its roads, including Michigan, whose governor signed a bill in December that allows the public testing of cars with no driver.

In the meantime, the industry has been lobbying the U.S. Transportation Department and Congress for rule changes that could speed the introduction of truly driverless cars.

Nude Photo-sharing Scandal Rocks US Marine Corps

A Facebook group consisting of thousands of U.S. Marines and Marine veterans has shared nude photographs of women, including fellow Marines, through social media, prompting the U.S. military to launch an investigation into the incident.

The commandant of the Marine Corps, General Robert Neller, told reporters Friday at the Pentagon that when female Marines are subjected to cyberbullying, presumably by other Marines, it “undermines everything” the military branch stands for, as it protects and serves the country.

“There is no honor in denigrating a fellow Marine in any way, shape or form,” Neller said.

The general said fewer than 10 victims have come forward, but evidence provided by a reporter suggested that around 30 women have been victimized by the cyberbullying scandal.

Marine officials say they were informed about the Facebook site that is sharing the nude photos, known as the “Marines United” community page, on January 30. On February 1, the Marine Corps had the site taken down, but learned later about a link to Google Drive files that contained the nude photos. Some of the photos shared were taken without the women’s knowledge.

Neller said an investigation into the incident by the Naval Criminal Investigative Service (NCIS) is under way. In addition, Neller said the Marine Corps is setting up a task force to see what actions can be taken, and to come up with practices that both prevent this violation in the future and prevent the “subculture that gave rise to this.”

Secretary of Defense Jim Mattis released a statement Friday calling the “lack of respect for the dignity and humanity” of fellow military members “unacceptable and counter to unit cohesion.”

“We will not excuse or tolerate such behavior if we are to uphold our values and maintain our ability to defeat the enemy on the battlefield,” added Mattis, a former Marine general.

Neller told reporters he will testify on Capitol Hill about the incident next week. He also has planned to visit Camp Lejeune, in eastern North Carolina, one of the largest Marine bases on the U.S. East Coast.

Marine officials said they are working to ensure the victims’ privacy is protected as the investigation continues. There are reports that some Marines have continued to share the nude photos, despite the ongoing investigation.

Tech and Hollywood Head to Texas SXSW Festival

Movie stars, tech moguls and music artists are among those converging in Austin, Texas, starting this week, as part of South by Southwest Conference and Festivals.

Known by its shorthand SXSW, the nine-day event, now in its 31st year, mixes music, film, comedy and digital entertainment, as well as technology and politics.

The event in the Texas capital, normally a low-key tech hub, has become an important nexus where the already successful mix with the aspiring. New movies premiere, music acts perform and startups pitch their wares. Twitter gained traction at SXSW in 2007, putting up flat-panel screens in the hallways.

But not every new tech or its CEO can call SXSW experience a success. Facebook CEO Mark Zuckerberg struggled through his keynote interview in 2008. Meerkat, a video streaming app that took off in SXSW 2015, quickly faded.

This year, among the actors, musicians and tech celebrities, Buzz Aldrin, the former astronaut who walked on the moon in 1969, will speak about human space exploration.

U.S. government officials and American politicians also come to mingle with the celebrities and tech executives. At last year’s SXSW, President Barack Obama and first lady Michelle Obama spoke to the festival-goers.

FBI Director James Comey was expected to speak at this year’s event, but he canceled. In his place, James Baker, the FBI’s general counsel, is scheduled to discuss the “intersection of national security, technology and First Amendment rights.”

On Sunday, Joe Biden, the former U.S. vice president, will speak about his work on cancer research as part of the Biden Cancer Initiative.

The intersection of politics and technology is one major theme this year, with SXSW organizers creating a “Tech Under Trump” series of discussions. Topics include immigration, self-driving cars and the effects that artificial intelligence may have on jobs. One panel, “Startup investing in the Trump years,” will look at how the Trump administration could affect the investment landscape.

Some panels tout how technology can be used to achieve goals such as helping people seeking faith. Yasmin Green, head of research and development at Jigsaw — a technology incubator that is part of Alphabet, Google’s parent company — will discuss how technology can be used to fight extremism.

Other sessions focus on bleaker possibilities, like how technology can potentially hurt people, such as robots taking jobs.

Ultimately, SXSW this year, as in the past, is a giant party with thousands of people looking for the next big thing.

Facebook Founder, Wife Expecting 2nd Child

Facebook founder and CEO Mark Zuckerberg and his wife are expecting their second child.

 

In a Facebook post, Zuckerberg says his wife Priscilla Chan is pregnant with a girl. The couple already has a 1-year-old daughter.

 

In his post, Zuckerberg writes that he’s happy his first daughter, Max, will have a sister. Zuckerberg says he grew up with three sisters and they taught him to learn from smart, strong women. He also says his wife grew up with two sisters.

 

Zuckerberg says he and his wife can’t wait to welcome the baby and do their best to raise another strong woman.

 

What the CIA WikiLeaks Dump Tells Us: Encryption Works

If the tech industry is drawing one lesson from the latest WikiLeaks disclosures, it’s that data-scrambling encryption works, and the industry should use more of it.

 

Documents purportedly outlining a massive CIA surveillance program suggest that CIA agents must go to great lengths to circumvent encryption they can’t break. In many cases, physical presence is required to carry off these targeted attacks.

 

“We are in a world where if the U.S. government wants to get your data, they can’t hope to break the encryption,” said Nicholas Weaver, who teaches networking and security at the University of California, Berkeley. “They have to resort to targeted attacks, and that is costly, risky and the kind of thing you do only on targets you care about. Seeing the CIA have to do stuff like this should reassure civil libertarians that the situation is better now than it was four years ago.”

 

More encryption

 

Four years ago is when former NSA contractor Edward Snowden revealed details of huge and secret U.S. eavesdropping programs. To help thwart spies and snoops, the tech industry began to protectively encrypt email and messaging apps, a process that turns their contents into indecipherable gibberish without the coded “keys” that can unscramble them.

 

The NSA revelations shattered earlier assumptions that internet data was nearly impossible to intercept for meaningful surveillance, said Joseph Lorenzo Hall, chief technologist at the Washington-based civil-liberties group Center for Democracy & Technology. That was because any given internet message gets split into a multitude of tiny “packets,” each of which traces its own unpredictable route across the network to its destination.

 

The realization that spy agencies had figured out that problem spurred efforts to better shield data as it transits the internet. A few services such as Facebook’s WhatsApp followed the earlier example of Apple’s iMessage and took the extra step of encrypting data in ways even the companies couldn’t unscramble, a method called end-to-end encryption.

 

Challenges for authorities

 

In the past, spy agencies like the CIA could have hacked servers at WhatsApp or similar services to see what people were saying. End-to-end encryption, though, makes that prohibitively difficult. So the CIA has to resort to tapping individual phones and intercepting data before it is encrypted or after it’s decoded.

 

It’s much like the old days when “they would have broken into a house to plant a microphone,” said Steven Bellovin, a Columbia University professor who has long studied cybersecurity issues.

 

Cindy Cohn, executive director for Electronic Frontier Foundation, a group focused on online privacy, likened the CIA’s approach to ” fishing with a line and pole rather than fishing with a driftnet.”

 

Encryption has grown so strong that even the FBI had to seek Apple’s help last year in cracking the locked iPhone used by one of the San Bernardino attackers. Apple resisted what it considered an intrusive request, and the FBI ultimately broke into the phone by turning to an unidentified party for a hacking tool – presumably one similar to those the CIA allegedly had at its disposal.

 

On Wednesday, FBI Director James Comey acknowledged the challenges posed by encryption. He said there should be a balance between privacy and the FBI’s ability to lawfully access information. He also said the FBI needs to recruit talented computer personnel who might otherwise go to work for Apple or Google.

 

Government officials have long wanted to force tech companies to build “back doors” into encrypted devices, so that the companies can help law enforcement descramble messages with a warrant. But security experts warn that doing so would undermine security and privacy for everyone. As Apple CEO Tim Cook pointed out last year, a back door for good guys can also be a back door for bad guys. So far, efforts to pass such a mandate have stalled.

 

Still a patchwork

 

At the moment, though, end-to-end encrypted services such as iMessage and WhatsApp are still the exception. While encryption is far more widely used than it was in 2013, many messaging companies encode user data in ways that let them read or scan it. Authorities can force these companies to divulge message contents with warrants or other legal orders. With end-to-end encryption, the companies wouldn’t even have the keys to do so.

 

Further expanding the use of end-to-end encryption presents some challenges. That’s partly because encryption will make it more difficult to perform popular tasks such as searching years of emails for mentions of a specific keyword. Google announced in mid-2014 that it was working on end-to-end encryption for email, but the tools have yet to materialize beyond research environments.

 

Instead, Google’s Gmail encrypts messages in transit. But even that isn’t possible unless it’s adopted by the recipient’s mail system as well.

 

And encryption isn’t a panacea, as the WikiLeaks disclosures suggest.

 

According to the purported CIA documents, spies have found ways to exploit holes in phone and computer software to grab messages when they haven’t been encrypted yet. Although Apple, Google and Microsoft say they have fixed many of the vulnerabilities alluded to in the CIA documents, it’s not known how many holes remain open.

 

“There are different levels where attacks take place, said Daniel Castro, vice president with the Information Technology and Innovation Foundation. “We may have secured one level (with encryption), but there are other weaknesses out there we should be focused on as well.”

 

Cohn said people should still use encryption, even with these bypass techniques.

 

“It’s better than nothing,” she said. “The answer to the fact that your front door might be cracked open isn’t to open all your windows and walk around naked, too.”

 

Alleged CIA Hacking Techniques Lay Out Online Vulnerability 

If this week’s WikiLeaks document dump is genuine, it includes a CIA list of the many and varied ways the electronic device in your hand, in your car, and in your home can be used to hack your life.

It’s simply more proof that, “it’s not a matter of if you’ll get hacked, but when you’ll get hacked.” That may be every security expert’s favorite quote, and unfortunately they say it’s true. The WikiLeaks releases include confidential documents the group says exposes “the entire hacking capacity of the CIA.”

The CIA has refused to confirm the authenticity of the documents, which allege the agency has the tools to hack into smartphones and some televisions, allowing it to remotely spy on people through microphones on the devices.

Watch: New Generation of Hackable Internet Devices May Always Be Listening

WikiLeaks also claimed the CIA managed to compromise both Apple and Android smartphones, allowing their officers to bypass the encryption on popular services such as Signal, WhatsApp and Telegram.

For some of the regular tech users, news of the leaks and the hacking techniques just confirms what they already knew. When we’re wired 24-7, we are vulnerable.

“The expectation for privacy has been reduced, I think,” Chris Coletta said, “… in society, with things like WikiLeaks, the Snowden revelations … I don’t know, maybe I’m cynical and just consider it to be inevitable, but that’s really the direction things are going.”

The internet of things

The problem is becoming even more dangerous as new, wired gadgets find their way into our homes, equipped with microphones and cameras that may always be listening and watching.

One of the WikiLeaks documents suggests the microphones in Samsung smart TV’s can be hacked and used to listen in on conversations, even when the TV is turned off.

Security experts say it is important to understand that in many cases, the growing number of wired devices in your home may be listening all the time.

“We have sensors in our phones, in our televisions, in Amazon Echo devices, in our vehicles,” said Clifford Neuman, the director of the Center for Computer Systems Security, at the University of Southern California. “And really almost all of these attacks are things that are modifying the software that has access to those sensors, so that the information is directed to other locations. Security practitioners have known that this is a problem for a long time.”

Neuman says hackers are using the things that make our tech so convenient against us.

“Certain pieces of software and certain pieces of hardware have been criticized because, for example, microphones might be always on,” he said. “But it is the kind of thing that we’re demanding as consumers, and we just need to be more aware that the information that is collected for one purpose can very easily be redirected for others.”

Tools of the espionage trade

The WikiLeaks release is especially damaging because it may have laid bare a number of U.S. surveillance techniques. The New York Times says the documents it examined lay out programs called “Wrecking Crew” for instance, which “explains how to crash a targeted computer, and another tells how to steal passwords using the autocomplete function on Internet Explorer.”

Steve Grobman, chief of the Intel Security Group, says that’s bad not only because it can be done, but also because so-called “bad actors” now know it can be done. Soon enough, he warns, we could find our own espionage tools being used against us.

“We also do need to recognize the precedents we set, so, as offensive cyber capabilities are used … they do give the blueprint for how that attack took place. And bad actors can then learn from that,” he said.

So how can tech-savvy consumers remain safe? Security experts say they can’t, and to remember the “it’s not if, but when” rule of hacking.

The best bet is to always be aware that if you’re online, you’re vulnerable.

US Solar Soared in 2016, But Investors Still Leery

New U.S. solar installations nearly doubled last year, but slowing demand for both residential and large-scale systems, falling panel prices and concerns about looming federal tax reform are still dampening investor appetite for the sector.

Solar installations soared 97 percent to 14.8 gigawatts in 2016, according to a report released Thursday by Wood Mackenzie and the Solar Energy Industries Association. The technology is cheaper than ever, with panel prices dropping 40 percent last year, and many utilities procuring solar on the basis of cost alone.

But the dramatic drop in panel prices has hampered solar manufacturers’ profits and ramped up competition for utility-scale contracts among developers, companies said in recent weeks while reporting fourth-quarter results. Add in a slowdown in the residential market, tax reform pushed by U.S. President Donald Trump, climbing interest rates and falling oil prices, and stock market investors remain skittish about solar.

2017 a transition year

Credit Suisse analyst Andrew Hughes said in a client note on Thursday that the key risk to his “outperform” rating on shares of residential solar player Sunrun was “investor sentiment, which in a rising interest rate and falling oil price market obscured by tax policy uncertainty remains tepid.”

The MAC Global Solar Energy index, which tracks shares of solar power companies, slid 43 percent in 2016. The index has recovered to gain nearly 8 percent so far this year but remains 65 percent below its year-ago level.

U.S. module manufacturers and project developers SunPower and First Solar Inc are both viewing 2017 as a transition year for their businesses, they said after reporting in February losses for the fourth quarter of last year.

SunPower Chief Executive Tom Werner in a conference call predicted “intense competition for the forseeable future in mainstream power plants,” adding that some companies were selling panels at below cash cost.

A slowdown is forecast

Indeed, the solar industry report released Thursday forecasts a slowdown in the market this year after last year’s boom. Utility systems accounted for more than 10.5 GW of the total in 2016, but are not expected to exceed 10 GW again until 2021, the report said.

The 2016 boom was largely due to a rush by developers to claim a federal tax credit for solar systems that had been expected to expire at the end of the year. The five-year extension of that credit, however, has allowed projects to be pushed into this year and beyond.

Though Trump has not called for ending tax credits for solar and other renewable energy, he has expressed doubts about the role of clean power sources.

Home installations are growing

On the solar residential side, installations grew 19 percent to 2.6 GW last year, down from 66 percent growth in 2015. Growth has slowed in major markets like California, where many of the households most interested in solar have already put up panels.

Tesla, which acquired residential market leader SolarCity late last year, said last month that it deployed 201 megawatts of solar in the fourth quarter, a more than 20 percent drop from the same period a year earlier.

SolarCity rival Sunrun reported a quarterly profit that topped Wall Street estimates due to cost cuts, but said growth would be substantially slower in 2016. System deployments rose 40 percent in 2016, but are expected to rise just 15 percent this year, Sunrun said.

“While it may be slowing, it is still growing. That is an important piece of the story,” Abigail Ross Hopper, president of the Solar Energy Industries Association, said in an interview. “Some of that resetting is to be expected.”

Apple’s Siri Learns Shanghainese as Voice Assistants Race to Cover Languages

With the broad release of Google Assistant last week, the voice-assistant wars are in full swing, with Apple, Amazon.com, Microsoft and now Alphabet’s Google all offering electronic assistants to take your commands.

Siri is the oldest of the bunch, and researchers including Oren Etzioni, chief executive officer of the Allen Institute for Artificial Intelligence in Seattle, said Apple has squandered its lead when it comes to understanding speech and answering questions.

But there is at least one thing Siri can do that the other assistants cannot: speak 21 languages localized for 36 countries, a very important capability in a smartphone market where most sales are outside the United States.

Microsoft Cortana, by contrast, has eight languages tailored for 13 countries. Google’s Assistant, which began in its Pixel phone but has moved to other Android devices, speaks four languages. Amazon’s Alexa features only English and German. Siri will even soon start to learn Shanghainese, a special dialect of Wu Chinese spoken only around Shanghai.

The language issue shows the type of hurdle that digital assistants still need to clear if they are to become ubiquitous tools for operating smartphones and other devices.

Speaking languages natively is complicated for any assistant. If someone asks for a football score in Britain, for example, even though the language is English, the assistant must know to say “two-nil” instead of “two-nothing.”

At Microsoft, an editorial team of 29 people works to customize Cortana for local markets. In Mexico, for example, a published children’s book author writes Cortana’s lines to stand out from other Spanish-speaking countries.

“They really pride themselves on what’s truly Mexican. [Cortana] has a lot of answers that are clever and funny and have to do with what it means to be Mexican,” said Jonathan Foster, who heads the team of writers at Microsoft.

Google and Amazon said they plan to bring more languages to their assistants but declined to comment further.

At Apple, the company starts working on a new language by bringing in humans to read passages in a range of accents and dialects, which are then transcribed by hand so the computer has an exact representation of the spoken text to learn from, said Alex Acero, head of the speech team at Apple. Apple also captures a range of sounds in a variety of voices. From there,

an acoustic model is built that tries to predict words sequences.

Then Apple deploys “dictation mode,” its text-to-speech translator, in the new language, Acero said. When customers use dictation mode, Apple captures a small percentage of the audio recordings and makes them anonymous. The recordings, complete with background noise and mumbled words, are transcribed by humans, a process that helps cut the speech recognition error

rate in half.

After enough data has been gathered and a voice actor has been recorded to play Siri in a new language, Siri is released with answers to what Apple estimates will be the most common questions, Acero said. Once released, Siri learns more about what real-world users ask and is updated every two weeks with more tweaks.

But script-writing does not scale, said Charles Jolley, creator of an intelligent assistant named Ozlo. “You can’t hire enough writers to come up with the system you’d need in every language. You have to synthesize the answers,” he said. That is years off, he said.

The founders of Viv, a startup founded by Siri’s original creators that Samsung acquired last year, is working on just that.

“Viv was built to specifically address the scaling issue for intelligent assistants,” said Dag Kittlaus, the CEO and co-founder of Viv. “The only way to leapfrog today’s limited functionality versions is to open the system up and let the

world teach them.”

Solar Energy Station to Power Hawaiian Island

One of Hawaii’s islands may soon be powered by solar energy, at least during the night.

In the biggest project since it acquired the solar cell giant SolarCity, the Tesla company will build a 13-megawatt solar farm on the island of Kauai, covering more than 44 acres (18 hectares). The solar cells will charge a 53-megawatt hour battery station able to provide most of the island’s power at night.

The batteries, called Powerpacks, will be built by Tesla’s new Gigafactory.

Right now, Kauai residents are paying very high prices for energy, so the plan is to gradually transition to renewable sources, including wind and biomass.

Kauai plans to generate 70 percent of its power from renewable sources by 2030 and to completely wean itself from fossil-generated electricity by 2045.

Tesla says that once it’s in full production, the Kauai solar energy plant will lower the fossil fuel burn by over 6,000 metric tons a year.

China Seeking International Law for State Control of Internet

China is seeking an international agreement to enhance state control over the internet in order to fight cyberattacks and cyberterrorism. Beijing wants to extend the existing idea of sovereignty over land and sea to cyberspace.

Beijing has released its first white paper discussing how it will persuade different countries to join together in an international partnership. The idea is to enhance the power of individual governments over cyberspace and reduce the role of the private sector.

“Countries in the whole world have increasing concerns [about cyberattacks] in this regard. Cyberspace should not be a space of no laws,” Long Zhou, coordinator of the Cyber Affairs division of the Foreign Ministry said last week while releasing copies of “International Strategy of Cooperation on Cyberspace,” China’s first policy paper on the issue.

Censorship

Analysts see it as a grandiose plan to extend the Chinese idea of censorship across large parts of the world. China has been criticized in developed countries for controlling the internet with a heavy hand and not allowing Google, Facebook, Twitter and many foreign news websites to be seen in China.

The first set of organizations that will be hit, if the Chinese campaign gains momentum, are American companies that play a dominant role in the internet space, analysts said.

“The inventors of cyberspace were idealistically and ideologically convinced that they had created a domain of perfect freedom, where anyone could gain entry and behave as if no laws existed,” Sheila Jasanoff, director of the program on science, technology and society at Harvard University’s Kennedy School told VOA.

“It has been interesting to see how this allegedly wide open and free space has gradually been ‘written over’ with all the markers of national sovereignty and rivalry,” she said.

Russian role in U.S. polls

China is taking advantage of the uproar in the United States over alleged cyberattacks by Russia to interfere in the recent presidential election.

Asked about the alleged Russian interference, Long said, “Especially in recent years, the number of cybersecurity events throughout the world is increasing, posing challenges to all countries’ efforts to maintain political, economic stability and protecting all citizens’ rights and interests.”

Lee Branstetter, an associate professor of economics at the Heinz School of Policy and Management of the Carnegie Mellon University, saw the situation differently. 

“The China solution is a proposal to create huge barriers to the free flow of information across borders. It is hard to see how a global digital economy could function under such a regime,” he said.

Beijing action plan

China is trying to persuade world governments and international agencies, including the United Nations, to accept the principal of “cyber sovereignty” that allows each country to govern the internet in the manner it wants without interference from other governments. Long said the concept of land and sea sovereignty, which is recognized by the U.N., should be extended to the cyber world because the problems and situations are similar.

He said the international community is discussing the need to “produce new international legal instruments to deal with the security situation in cyberspace.” These situations include cyberterror or cross-boundary cybercrimes.

China plans to raise the issue at different international forums including U.N. agencies, the BRICS group — for Brazil, Russia, India and China — and the Shanghai Cooperation Organization. The Chinese endeavor has the support of Russia, which will join in the campaign for making international rules on cyberspace, Long said at a recent news conference.

Jasanoff is skeptical of the Chinese rationale.

“There is good reason to believe that China will do more to limit the freedom of information of its citizens than to ensure its own security with regard to things like critical infrastructure,” she said. “The most effective firewall will likely be against the creation of domestic networks of civilian information exchange and protest.”

Assertions of cybersovereignty from China and elsewhere are happening at a time when national sovereignty is in decline for many reasons, not least because the technological capability for both creating and breaking through security systems is highly dispersed, she said.

“Hackers for hire are distributed throughout the world, and recent experiences at all kinds of major institutions shows that hardly any are free from threats (and even the reality) of cyberattacks,” Jasanoff said.

Nike to Launch High-tech Hijab for Female Muslim Athletes

Nike will launch a hijab for female Muslim athletes early next year, becoming the first major sports apparel maker to offer a traditional Islamic head scarf designed specifically for competition, the company said on Wednesday.

The head covering, marketed under the “Pro Hijab” brand, is designed to allow athletes to observe the traditional Islamic practice of covering the head without compromising performance.

Made from a lightweight, flexible material, the hijab is expected to hit stores shelves in early 2018, Nike said in a statement.

In recent years, the hijab has become the most visible symbol of Islamic culture in the United States and Europe. Many Muslim women cover their heads in public with the hijab as a sign of modesty, but some critics see it as a sign of female oppression.

With sensitivities over immigration and the perceived threat of Muslim extremism running high, the head scarf has led to attacks against Muslim women. At the same time, the hijab has evolved in a symbol of diversity that Nike has embraced.

The Women’s March on Washington, held the day after President Donald Trump’s inauguration, used the face of a woman wearing a hijab in an American flag pattern as its promotional image.

Muslim athletes visiting Nike’s headquarters in Beaverton, Oregon, just outside of Portland, have complained about the difficulties of wearing a hijab while competing, according to the company.

The company consulted with Muslim women athletes from around the world, including Middle Eastern runners and cyclists, in the designing the hijab.

Other companies have also set their sights on hijab sales to Muslim athletes.

Last year, Danish sportswear company Hummel unveiled a soccer jersey with an attached hijab for the Afghanistan national women’s soccer team.

Non-professional women Muslim athletes have used athletic hijabs made by smaller companies.

But Nike’s annual net sales in the billions and its reach in popular culture can do more to bring Muslim athletes into the fold, said Amna Al Haddad, a Nike sponsored weightlifter from the United Arab Emirates who consulted on “Pro Hijab.”

“[It will] encourage a whole new generation to pursue sports without feeling there is a limitation because of modesty or dress-code,” Haddad said.

Tech Companies Respond to Alleged CIA Hacking Tools

Major technology firms say they are moving to fix any vulnerabilities in their operating systems, a day after WikiLeaks released documents pertaining to an alleged CIA hacking arsenal capable of spying on people through microphones in mobile phones and other electronic devices such as smart televisions.

In a statement issued Wednesday, Apple said it had already addressed many of the issues identified in the WikiLeaks documents, but said it would “continue work to rapidly to address any identified vulnerabilities.”

“We always urge customers to download the latest iOS to make sure they have the most recent security updates,” Apple said.

 

Samsung made a similar comment, saying it was aware of the report and “urgently looking into the matter.”

“Protecting consumers’ privacy and the security of our devices is a top priority at Samsung,” the South Korean electronics company said.

Security flaws

According to the WikiLeaks documents, the CIA identified weaknesses within the software used by Apple, Google, Microsoft and other U.S.-based manufacturers; but, instead of informing the companies of the vulnerabilities, the CIA “hoarded” the exploits, leaving people open to potential hacking.

“By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone; at the expense of leaving everyone hackable,” WikiLeaks said in a statement accompanying the release of the documents.

The CIA would neither confirm nor deny the legitimacy of the documents, although WikiLeaks boasts a nearly perfect record on the authenticity of the documents it publishes.

Silicon Valley Offers Muted Reaction to New Travel Restrictions

When the Trump administration issued its executive order in Janurary restricting travelers from certain countries, many tech companies and their employees were quick to express their objections.

But now, with the new executive order out limiting travel to the U.S. for people from six countries, the response from Silicon Valley has been largely muted.

Alphabet, the parent company of Google, Facebook and Microsoft has so far remained quiet.

In reaction to the first travel executive order, the three companies were among 100 U.S. tech firms that filed a legal brief in opposition. At the time, Google said 76 of its employees were affected by the executive order.

Still, some firms, such as Uber, Lyft, Mozilla and Airbnb, were quick to express their objections to Monday’s executive order.

Lyft, the ride-hailing firm, plans to meet with the American Civil Liberties Group this week to discuss how “we can further support their efforts,” Logan Green, Lyft’s CEO, said in a statement. The company gave the civil liberties organization $1 million in January.

“Our sentiment has not changed: President (Donald) Trump’s immigration ban is unjust and wrong,” an Uber spokesperson said. “We will continue to stand up for those in the Uber community affected.”

Salesforce CEO Marc Benioff tweeted a tribute to his grandfather, “Thinking of great grandfather Issac Benioff who came to US from Kiev as Refugee. W/O him no @Salesforce (2M jobs/200B GDP) or@GameOfThrones!” (Benioff’s cousin, David, is the co-creator of the hit TV series.)

Tech lobbying group and trade organizations have largely stayed mum about the limited travel ban.

One exception is TechNet, which represents tech firms such as Facebook and Apple. It put out a statement this week saying that “unfortunately, just like the first order, this new policy singles out individuals based on their country of origin and will adversely impact technology workers who live and work in our nation.”

The industry has been anxiously waiting for the Trump administration’s revamp of the H-1B visa program, which Silicon Valley uses to hire skilled workers. Late last week, the administration jettisoned an aspect of the H-1B visa application process called “premium processing,” which allowed companies to pay extra for their visa applications to be expedited.

That change underscored the uncertainty in the industry over how the Trump administration will ultimately handle both work visas and travel restrictions.

“What’s next?” said Evan Engstrom, executive director of Engine, an advocacy and research group focused on tech startups.

“What everyone is concerned about is what anti-immigration policies are going to be more expansive,” Engstrom said.

It’s a point echoed by a Yahoo executive.

“American businesses like Yahoo need certainty, particularly around the ability to hire and retain top talent. A piecemeal approach leaves question marks for companies and employees,” April Boyd, a Yahoo vice president and head of global public policy, said in a statement. “We encourage the administration to work with Congress on a thoughtful, lasting approach to bring positive change to the current immigration system.”

Each April 1, the U.S. holds a lottery for 65,000 H-1B visas and 20,000 additional visas for foreign students with master’s degrees. Last year, there were requests for more than 200,000, a record figure.

But critics say skilled-worker visa programs have hurt American workers. Companies have used them, they say, to hire foreign workers who are not highly skilled and who are paid lower than market rate wages.

The biggest users of the H-1B program have been outsourcing firms that provide IT consulting.

Latin American Girls Hack Man’s World of Tech, Science

Staying up late into the night, Lilia Lobato Martinez watched endless YouTube videos to teach herself the computer code she used to help build her prize-winning Ool app for volunteers in Guadalajara, Mexico.

In her country, she is usually the only woman in tech competitions, which often hand out men’s T-shirts to the winners.

Now the 18-year-old electrical engineering student is using the $10,000 she won for her app in last year’s international girls-only Technovation competition to further develop Ool, which has so far linked over 1,000 volunteers with 20 non-profit groups in Mexico’s second-biggest city.

“A lot of people were constantly complaining everything’s wrong, but I found that no one was going out to the street to volunteer,” said Lobato. “So I decided to develop an app that’s a compendium of all the non-profit organizations, so we can learn what Mexico is building.”

A male-dominated field

With plans to eventually set up a center to teach children to code, she said many of her female friends shied away from IT development because it was male-dominated. Only four out of 40 students on her degree course are women, she pointed out.

Across Latin America, the participation of girls and women in technology and science has lagged far behind men, experts say.

And while awareness of the need to correct the imbalance is growing, social and economic pressures mean many are still pushed into other areas or expected to start work straight after school rather than going into higher education.

“Boys think it’s easy for them and they expect to be smart in technology … it’s not expected for girls, and that’s reinforced by the education system quite often,” said Gloria Bonder, Buenos Aires-based UNESCO chair on women, science and technology in Latin America.

The portrayal of women in the media, and a lack of role models also contribute to making it a system-wide problem, added Bonder, who is working on a Central American pilot project to incorporate gender equality into science and technology education.

While 44 percent of all science research positions — including social sciences — in the region are held by women, they are under-represented in science, technology, engineering and maths (STEM), according to UNESCO.

For example, in Peru and Colombia, around a third of natural science researchers are women, but they account for just a quarter of engineering and technology researchers.

Now a number of projects are striving to improve access for girls and give them the skills and confidence to compete in those jobs.

Developers’ boot camp

One of these is the Laboratoria coding academy in Lima, which spots talent “where no one else is looking,” said its chief executive, Mariana Costa Checa.

More than 1,000 women applied for 70 places at its intensive boot camp where candidates from low-income backgrounds train as front-end web developers.

The application process involves a series of rigorous tests, alongside interviews with candidates’ families to reduce the drop-out rate for the course, which also runs in Santiago, Mexico City and the Peruvian city of Arequipa, and helps participants land jobs with companies such as IBM.

Along with computer programs like JavaScript, it teaches workplace skills that are crucial for women who have little experience of formal-sector employment, said Costa.

She expects some Laboratoria graduates will go on to develop technical solutions for problems in their communities.

“The first thing we look for is a job, because it gives them economic stability, and for our average student, it triples their income,” said Costa.

It also gives them “a new perspective in life,” she added. “It starts changing the way they look at the world — and I think there’s enormous value in then bringing that change to their own communities.”

Many girls are on their own

With many girls from poor families under pressure to start earning as soon as they finish school, Rebeca Vargas, president of the U.S.-Mexico Foundation, said most of those who signed up for the international STEM mentoring program she helped set up in Mexico’s Puebla state did so without telling their parents.

Nearly all are now studying STEM subjects at college or university.

“Some of the girls we worked with last year had to sell bread and food on the street to be able to earn money to eat,” said Vargas, whose foundation developed the program with Mexico’s public education secretariat and the New York Academy of Sciences.

Girls take a different route

Families often expect girls to pay their way at home but not to seek senior positions at corporations or well-paid jobs.

“They’re supposed to work but they’re not supposed to be educated,” Vargas said.

Wendy Arellano Martinez, who won a scholarship to study biotechnology engineering at the prestigious Monterrey Technology Institute after the mentoring program, is now part of a team developing a project to make  spectacle frames from recycled plastic bottles for older people on low incomes.

“We’re going to be looking for funds from organizations or foundations to help us distribute our products to people who need them but don’t have the resources,” said the 18-year-old student from Puebla. “I want to give the same support that I received.”

German Court Rejects Injunction for Facebook in Syrian Selfie Case

A German court rejected a temporary injunction against Facebook on Tuesday in a case brought by a Syrian refugee who sued the social networking site for failing to remove faked posts linking him to crimes and militant attacks.

The Wuerzburg district court said in a preliminary ruling that Facebook is neither a “perpetrator nor a participant” in what it said was “undisputable defamation” by Facebook users, but simply acting as a hosting provider that is not responsible for preemptively blocking offensive content under European law.

The posts in dispute featured a picture showing Anas Modamani, a 19-year-old from Damascus, taking a selfie with Chancellor Angela Merkel in September 2015 at a refugee shelter in the Berlin district of Spandau.

Modamani’s image was subsequently shared on Facebook on anonymous accounts, alongside posts falsely claiming he was responsible for the Brussels airport bombing of March 2016 and setting on fire a homeless man in December last year by six migrants at an underground station in Berlin.

The court rejected the need for a temporary injunction sought by Modamani to require Facebook to go beyond measures the company had taken to block defamatory images of him for Facebook users in Germany using geo-blocking technology.

In a statement following the decision, Facebook expressed concern for Modamani’s predicament but said the court’s ruling showed the company acted quickly to block access to defamatory postings, once they had been reported by Modamani’s lawyer.

The case has been closely watched as Germany, a frequent critic of Facebook, is preparing legislation to force the social networking website to remove “hate speech” from its web pages within 24 hours or face fines.

After the ruling, Modamani’s lawyer in the case, Chan-jo Jun, told a news conference he was disappointed such imagery continued to circulate online and more must be done to force Facebook to delete hate-filled content on its own accord.

“We have to decide whether we want to accept that Facebook can basically do whatever it wants or whether German law, and above all the removal of illegal contents in Germany, will be enforced. If we want that we need new laws,” Jun said.

Modamani’s complaint maintained that defamatory images based on the selfie posted to Facebook were still viewable online outside of Germany, or by users within Germany using a sophisticated Tor browser.

But the court found that the risk of average German users seeing the illegal content was not sufficiently credible and therefore a temporary injunction was unnecessary at this stage.

The ruling said there remained a legitimate issue over whether it was technically feasible for Facebook to do more to block such images, but this would require testimony by experts.

Tuesday’s decision is subject to appeal within one month of the yet-to-be-published written judgment, a court statement said. Jun declined to say whether an appeal was planned, saying the decision remained up to his client.

Facebook Rolls Out ‘Fake News’ Dispute Tool

Facebook has launched a tool it says will help flag so-called fake news.

The tool adds a “disputed news” flag on stories that have been deemed fake by what Facebook says are third parties, including Snopes, Politifact and Factcheck.org.

Facebook announced the disputed news flag in December, but it appears it only has gone live in the past day or so, according to news reports.

If a story is flagged by some of Facebook’s 1.86 billion users, the company will determine which to send to the third parties. If the story is fake, it will still be on Facebook, but will carry a notice that it was disputed along with an explanation about why.

Disputed stories can still be shared, but users will be warned they are sharing fake news.

According to USA Today, one fake news story about how President Trump’s Android phone was the source of White House leaks came from a fake news site called “The Seattle Tribune.” The story now appears with a disputed flag as well as links to third party explanations as to why.

A May 2016 survey from the Nieman Lab said 44 percent of Americans get their news from Facebook.

In a Robot Future, Humans Are Still Stars, Technophiles Say

From lasers that cut denim at a factory, to drones that irrigate crops, it’s not a new story that machines are doing more work than ever. But people have long feared that robots are coming for their jobs, so technology evangelists now are calling on their peers to build a future in which the impact on human is lessened.

Tim O’Reilly, the founder of O’Reilly Media, a technology consulting company, thinks the solution is a “hybrid,” mixing humans and machines. He sees that happening already. O’Reilly says most software, for example, is actually a service that depends on human beings in the background to keep it updated and running.

This could be a paradigm shift for Silicon Valley acolytes. Out with the old: a reputedly cold, relentless push for efficiency through algorithms and automation, no matter the consequences for the working class. In with the new: innovation with a human face.

“It’s so important that we have to think about not using technology to replace people — but to augment them, to do something that was previously impossible,” O’Reilly said last week in Ho Chi Minh City at Apricot, an annual summit organized by the Asia and Pacific Internet Association and APNIC, the regional registry for domain names.

With more skills, people can work alongside robots. Lyft and Uber rely on software that’s intended to make drivers more productive. They’re not completely different from airplanes, which are flown mostly by computers, but there might never be a day when passengers feel comfortable flying without at least one human at the helm.

Jonathan Brewer, a trainer at the nonprofit Network Startup Resource Center, believes the next stage of development should improve on the one before it, when the exploding numbers of factories and machines left so many people with undrinkable water and unbreathable air. Now, he said, technophiles must consider how their inventions help people. 

At an Apricot workshop, Brewer described sensors that alert residents an hour before a mudslide will hit, for example, and other “life-saving devices that cost very, very little money.”He says there doesn’t seem much point in having droids to clear tables and dig up copper ore if humans aren’t in a position to use the results of their labor.

O’Reilly illustrated the hybrid approach with the so-called Mechanical Turk. Not Amazon’s tool to outsource small tasks, but the 18th-century machine that seemed to beat humans at chess. In fact, there was a man inside all along, and that is the point. Looking out over an audience of programmers, engineers, and other operators building the internet, O’Reilly compared them to the Mechanical Turk: The world needs workers powered by blood, not just those powered by batteries.

“All of you, in some sense, are inside the internet. You go away, it stops working,” he said. “It’s not like a piece of software in a PC era where if you had a copy of Microsoft Windows running on your personal computer, it would keep running without the original programmers. Almost all of the software we depend on today is a service that depends on the work of people like you.”

There may be some wishful thinking, too, in technologists’ optimism that humans will thrive in the robot future. In 2015, consulting firm McKinsey projected that automation could eliminate 45 percent of today’s occupations. That’s why more people in the technology sector are warming to the idea of a universal basic income, which shares the benefits of innovation by giving each citizen a small monthly check.

But Brewer holds out hope in cooperation between people and machines. Many advancements don’t just make lives easier, such as thermostats that adjust the temperature to a dweller’s liking. He said there is technology, for example, that lets city employees know when street lights go out, or trash cans are full, so they don’t have to drive around checking manually, which many local governments do. But once the notice is sent, a human still needs to respond and ensure services are delivered.

For technology, conference-goers said, early adopters first embraced the inexorable, unsympathetic march of change as an indisputable benefit. But in this next phase, people are rethinking disruption, or at least wondering how to soften the blow on humans.

Self-driving Bus With No Back-Up Driver Nears California

A pair of $250,000 autonomous buses began driving around an empty San Francisco Bay Area parking lot on Monday, preparing to move onto a local public road in California’s first pilot program for a self-driving vehicle without steering wheel or human operator.

California and other states are weighing the opportunities of becoming a hub of testing a technology that is seen as the future of transportation and the risks from giving up active control of a large, potentially dangerous vehicle.

In most tests of self-driving cars there is still a person seated at the steering wheel, ready to take over, although Alphabet Inc’s Waymo tested a car with no steering wheel or pedals in Austin, Texas, as early as 2015.

The bus project in San Ramon, at the Bishop Ranch office park complex, involves two 12-passenger shuttle buses from French private company EasyMile.

The project is backed by a combination of private companies and public transit and air quality authorities, with the intention of turning it into a permanent, expanded operation, said Habib Shamskhou, a program manager who strolled in front of a moving bus to show that the vehicle would notice him and react. It stopped.

In a test for reporters, one bus cruised a block-long circuit so consistently that it created a dirt track on the tarmac.

California legislators late last year passed a law to allow slow-speed testing of fully autonomous vehicles without steering wheels or pedals on public roads, with the Bishop Ranch test in mind.

The shuttle buses will test for a few months in the parking lots before operators apply for Department of Motor Vehicles approval under the new law. The vehicles are expected to swing onto the local street late this year or early in 2018.   

Heavy Social Media Use Could Lead to Isolation in Young Adults

Young adults who spend a lot of time looking for social connections on social media could instead find themselves feeling socially isolated, a new study suggests.

Researchers looked at the social media habits of 1,787 American adults aged 19 to 32, asking them how much they used 11 popular social media sites, including Facebook, YouTube, Instagram, Snapchat, Twitter and LinkedIn, among others.

After controlling for various demographic factors, they found that people who used social media more than two hours per day “had twice the odds for perceived social isolation than their peers who spent less than half an hour on social media each day.”

Those who visited social media sites 58 times a week or more “had about triple the odds of perceived social isolation than those who visited fewer than nine times per week.”

Writing in the American Journal of Preventative Medicine, researchers from the University of Pittsburgh School of Medicine add that increased social isolation has been associated with “an increased risk for mortality.”

“This is an important issue to study because mental health problems and social isolation are at epidemic levels among young adults,” said lead author Dr. Brian A. Primack, director of Pitt’s Center for Research on Media, Technology and Health. “We are inherently social creatures, but modern life tends to compartmentalize us instead of bringing us together. While it may seem that social media presents opportunities to fill that social void, I think this study suggests that it may not be the solution people were hoping for.”

“We do not yet know which came first, the social media use or the perceived social isolation,” said senior author Dr. Elizabeth Miller, professor of pediatrics at Pitt and chief of the Division of Adolescent and Young Adult Medicine at Children’s Hospital of Pittsburgh of UPMC.

“It’s possible that young adults who initially felt socially isolated turned to social media. Or it could be that their increased use of social media somehow led to feeling isolated from the real world. It also could be a combination of both. But even if the social isolation came first, it did not seem to be alleviated by spending time online, even in purportedly social situations.”

Researchers social media may cause feelings of social isolation by replacing “authentic social experiences;” causing feelings of exclusion stemming from seeing photos of friends having fun at events to which they were not invited; or may lead people to think others have happier or more successful lives due to often idealized presentation of one’s life online.

Researchers say more study needs to be done, but they say doctors should ask patients about social media use if they show symptoms of social isolation.

“People interact with each other over social media in many different ways,” said Primack, “In a large population-based study such as this, we report overall tendencies that may or may not apply to each individual. I don’t doubt that some people using certain platforms in specific ways may find comfort and social connectedness via social media relationships. However, the results of this study simply remind us that, on the whole, use of social media tends to be associated with increased social isolation and not decreased social isolation.”