×
The Internet

White House Debuts New Maps Showing Broadband Vacuum (axios.com) 7

The Biden administration Thursday unveiled a new mapping tool that shows much greater gaps in use of high-speed internet service across the U.S. than the government's previous maps reported. From a report: The White House is pushing for big spending to provide more, better broadband service to underserved areas after the pandemic made Americans more dependent than ever on their internet connections. The new, zoomable map draws on a wider pool of data than existing maps by the Federal Communications Commission, which relied exclusively on industry-provided data that overstated broadband penetration.

The map raises questions about the gap between internet availability and actual usage, with usage reports indicating wide swaths of the country are not making a home broadband connection. The new "Indicators of Broadband Need" map, developed by the White House and the telecommunications branch of the Commerce Department, pulls together different data sets from Ookla, M-Lab, Microsoft, the Federal Communications Commission and the Census Bureau. The overlapping data points are meant to paint a picture of the areas that need more, better broadband. The map also includes data on places that reported a lack of connection by computer, smartphone or tablet and information on broadband usage in high-poverty communities.

Security

Police Bust Ransomware Gang in Ukraine (nbcnews.com) 20

Police in Ukraine said this week they arrested members of a major ransomware gang. From a report: The arrests mark the first time a law enforcement agency has announced a mass arrest of a prolific hacker group that had extorted Americans by either encrypting an organization's files or threatening to leak them to the public. The gang, known as Cl0p, has hacked a number of American targets, including the University of Miami, Florida, Stanford University, University of Maryland, and University of Colorado, demanding a payment to either keep their systems functional or to not publish material they were able to steal. The bust comes as ransomware has gone from a quietly pervasive cybersecurity problem to a broadly discussed national security issue, thanks to a series of high-profile attacks that have threatened to cripple some U.S. supply chains.

Ukraine's announcement coincided with President Joe Biden's meeting with Russian President Vladimir Putin in Geneva. Biden is expected to press Putin to take action against ransomware hackers who operate with impunity within Russia's borders. Ransomware has become a significant problem in the United States. Recent ransomware attacks briefly hobbled the Colonial Pipeline, shutting down the country's largest fuel pipeline for five days, and JBS, one of the country's largest meat suppliers. The majority of the most prolific ransomware gangs are believed to operate in Eastern Europe, and Russia in particular. Ukraine's cyber police announced they had arrested six people involved with Cl0p, and seized a number of computers, cars and about 5 million Ukrainian hryvnia ($185,000) in cash.

Television

Nielsen Now Knows When You Are Streaming (nytimes.com) 26

Nielsen on Thursday announced that it had moved a step closer toward cracking one of the great questions of the modern entertainment world: How big, exactly, is streaming? From a report: Nielsen, the 98-year-old research firm that for decades has had an effective monopoly on measuring TV ratings in the United States, has a new metric that it says allows it to make an apples-to-apples comparison, on a percentage basis, of how many people are streaming shows and films on their TVs versus how many are watching traditional cable and broadcast channels. For the time being, Nielsen reports, people are spending more time watching TV the old-fashioned way -- but streaming is gaining fast.

On Thursday, the firm reported that 64 percent of the time American viewers used their television sets in May 2021 was spent watching network and cable TV, while they watched streaming services about 26 percent of the time. Another 9 percent of the time, they were using their TV screens for things like video games or watching programs or films they had saved on DVR. The streaming share is increasing rapidly. It stood at about 20 percent last year, Nielsen said; in 2019, it was about 14 percent. A Nielsen spokesman said that the firm anticipates the streaming share could go up to about 33 percent by the end of the year. Netflix and YouTube are the streaming leaders, the research firm said, with each capturing 6 percent of total TV time. They are trailed by Hulu (3 percent), Amazon (2 percent) and Disney+ (1 percent). Nielsen calls its new metric The Gauge. It comes in addition to its previous method of measuring how many people are watching streaming platforms, which relies on audio-recognition software included in Nielsen devices that are now in 38,000 households across the country. Both metrics measure only what is viewed on television screens and do not count what is watched on phones or laptops.

Encryption

Report Finds Phone Network Encryption Was Deliberately Weakened (vice.com) 35

A weakness in the algorithm used to encrypt cellphone data in the 1990s and 2000s allowed hackers to spy on some internet traffic, according to a new research paper. Motherboard: The paper has sent shockwaves through the encryption community because of what it implies: The researchers believe that the mathematical probability of the weakness being introduced on accident is extremely low. Thus, they speculate that a weakness was intentionally put into the algorithm. After the paper was published, the group that designed the algorithm confirmed this was the case. Researchers from several universities in Europe found that the encryption algorithm GEA-1, which was used in cellphones when the industry adopted GPRS standards in 2G networks, was intentionally designed to include a weakness that at least one cryptography expert sees as a backdoor. The researchers said they obtained two encryption algorithms, GEA-1 and GEA-2, which are proprietary and thus not public, "from a source." They then analyzed them and realized they were vulnerable to attacks that allowed for decryption of all traffic.

When trying to reverse-engineer the algorithm, the researchers wrote that (to simplify), they tried to design a similar encryption algorithm using a random number generator often used in cryptography and never came close to creating an encryption scheme as weak as the one actually used: "In a million tries we never even got close to such a weak instance," they wrote. "This implies that the weakness in GEA-1 is unlikely to occur by chance, indicating that the security level of 40 bits is due to export regulations." Researchers dubbed the attack "divide-and-conquer," and said it was "rather straightforward." In short, the attack allows someone who can intercept cellphone data traffic to recover the key used to encrypt the data and then decrypt all traffic. The weakness in GEA-1, the oldest algorithm developed in 1998, is that it provides only 40-bit security. That's what allows an attacker to get the key and decrypt all traffic, according to the researchers.

The Internet

Major Australian Banks, US Airlines Briefly Hit By Widespread Internet Outages (reuters.com) 14

Websites of dozens of financial institutions and airlines in Australia and the United States were briefly down on Thursday, in the second major blackout in just over a week caused by a glitch in an important piece of internet infrastructure. From a report: Server-related glitches at content delivery network provider Akamai had hampered services at Australian banks, while many U.S. airlines, including American Airlines and Southwest Airlines, also reported an hour-long outage. The disruption linked to technical issues at Akamai follows an outage at rival Fastly that affected a number of popular websites last week. The impacted platform is now up and running, an Akamai spokesperson said, adding that the company was "continuing to validate services." The outage was caused by a bug in Akamai's software that has since been fixed, and was not caused by a cyber-attack or vulnerability, the spokesperson added.
Google

Google Backs Linux Project To Make Android, Chrome OS Harder To Hack (cnet.com) 48

Google said Thursday it's funding a project to increase Linux security by writing parts of the operating system's core in the Rust programming language, a modernization effort that could bolster the security of the internet and smartphones. From a report: If the project succeeds, it'll be possible to add new elements written in Rust into the heart of Linux, called the kernel. Such a change would mark a major technological and cultural shift for an open-source software project that's become foundational to Google's Android and Chrome operating systems as well as vast swaths of the internet.

Miguel Ojeda, who's written software used by the Large Hadron Collider particle accelerator and worked on programming language security, is being contracted to write software in Rust for the Linux kernel. Google is paying for the contract, which is being extended through the Internet Security Research Group, a nonprofit that's also made it easier to secure website communications through the Let's Encrypt effort. Adding Rust modules to the Linux kernel would improve security by closing some avenues for hackers can use to attack phones, computers or servers. Since it was launched in 1991, Linux has been written solely in the powerful but old C programming language. The language was developed in 1972 and is more vulnerable to hacks than contemporary programming languages.

Businesses

Blade, the Uber for Helicopters and Chartered Jets, Had a Fake Spokesperson for Three Years (businessinsider.com) 120

For three years until his departure this January, Simon McLaren served as the director of communications for Blade, the urban aviation startup that went public earlier this year at a valuation of more than $800 million. His work in that time was largely what you'd expect of a company spokesperson -- except for the fact that Simon McLaren doesn't actually exist. Business Insider reports: After Insider sought to verify McLaren's identity, Blade CEO Rob Wiesenthal admitted in an interview that McLaren was a made-up persona invented by him and his colleagues, and that Wiesenthal masqueraded as McLaren in telephone conversations with news outlets. The ruse lasted for years, duped numerous journalists, and included a puzzling public drama around McLaren's purported departure from Blade. None of it was real. Numerous news outlets quoted Simon McLaren as though he were a real spokesperson.

McLaren has no substantial online presence outside of a Blade email address, a Twitter account created last December, and a Medium profile created last November. His personal website, created this January, was registered through a proxy, and he uses a 1966 photo of British racing driver Graham Hill across his accounts in place of a profile picture. Still, McLaren has been treated as a real human by a variety of news outlets since his apparent debut in the pages of Vanity Fair in 2018. Serving as the institutional voice of Blade in stories about the company's compliance with federal regulations, medical supply shuttles, and negotiations with the town of East Hampton, McLaren has been quoted by the New York Times, the New York Post, Curbed, the Washington Post, Fox Business, and CNN.

Privacy

Hackers Are Selling Data Stolen From Audi and Volkswagen (vice.com) 18

On Friday, Volkswagen disclosed a data breach that it said affected 3.3 million customers and interested buyers. On Monday, hackers put the data stolen from the car maker on sale on a notorious hacking forum. From a report: In the sales listing reviewed by Motherboard, a hacker that goes by 000 wrote that the data included email addresses and Vehicle Identification Numbers (VIN). The hacker also posted two samples of the data, which included full names, email addresses, mailing addresses, and phone numbers. The type of data seems to align with what Volkwagen admitted was stolen. In a website set up by a cybersecurity vendor on behalf of the car maker, Volkswagen said that "the majority" of affected data included: "first and last name, personal or business mailing address, email address, or phone number. In some instances, the data also included information about a vehicle purchased, leased, or inquired about, such as the Vehicle Identification Number (VIN), make, model, year, color and trim packages."

But for 90,000 victims, the data also included "more sensitive information relating to eligibility for a purchase, loan, or lease. Nearly all of the more sensitive data (over 95%) consists of driver's license numbers," according to the company, which added that the majority of data pertains to Audi customers and interested buyers in the US and Canada only. The company also said it believes the data was left unsecured by a vendor. (Audi is owned by the Volkswagen Group.) "There were also a very small number of dates of birth, Social Security or social insurance numbers, account or loan numbers, and tax identification numbers," the website read.

AI

Google's Next AI Move: Teaching Foreign Languages (theinformation.com) 17

An anonymous reader shares a report: Google CEO Sundar Pichai last month previewed an artificial intelligence model that he said would enable people to have open-ended conversations with technology. But current and former employees who have worked with the language model say enabling coherent, free-flowing and accurate dialogue between humans and technology remains a tall order. As a result, Google is taking a more incremental step in conversational AI by preparing to teach foreign languages through Google Search [Editor's note: the link may be paywalled; alternative source], according to people involved in the work. The project, referred to internally as Tivoli, grew out of its Google Research unit and is likely to be rolled out later this year. It will initially work over text, and the exact look and feel of the instruction couldn't be learned.

Googlers are also discussing ways to eventually add the functionality to its voice assistant and YouTube product lines. In YouTube, for example, it could generate language quizzes where viewers record themselves after watching a video and the AI provides an assessment of how they performed. A Google spokesperson did not have a comment. Teaching foreign languages allows Google to move more fluid, conversational AI beyond silly exchanges to a practical-use but low-stakes case, the people said. Using the wrong tense or phrase would be unlikely to cause serious harm to users. AI researchers have for decades worked to foster dialogue between computers and humans that feels real, picks up the nuance of how people communicate and simplifies tasks. Such aspirational technology has been featured in movies like "Her" in which a man communicates with -- and falls in love with -- a virtual assistant.

EU

US, EU Forge Closer Ties on Emerging Technologies To Counter Russia and China (wsj.com) 25

The U.S. and European Union plan to cooperate more on technology regulation, industrial development and bilateral trade following President Biden's visit, in a bid to help Western allies better compete with China and Russia on developing and protecting critical and emerging technologies. From a report: Central to the increased coordination will be a new high-level Trade and Technology Council the two sides unveiled Tuesday. The aim of the TTC is to boost innovation and investment within and between the two allied economies, strengthen supply chains and avert unnecessary obstacles to trade, among other tasks. "You see the possibility for alignment," said European Commission Executive Vice President Margrethe Vestager in an interview.

In a sign of both sides' aspirations for the council, it will be co-chaired on the U.S. side by Secretary of State Antony Blinken, Commerce Secretary Gina Raimondo and U.S. Trade Representative Katherine Tai. The EU side will be co-chaired the Ms. Vestager, the bloc's top competition and digital-policy official, and fellow Executive Vice President Valdis Dombrovskis, who handles trade. As the EU's top antitrust enforcer, Ms. Vestager has gained prominence for her cases against U.S. tech giants including Apple, Google parent Alphabet and Facebook. Former presidents Barack Obama and Donald Trump both said her policies unfairly targeted American companies. Ms. Vestager has said her work doesn't single out any nationality. The TTC, which is slated to hold its first meeting in the fall and oversee many working groups, will allow the EU and U.S. to focus on cooperation, she said. Both sides stressed they would maintain regulatory autonomy within their respective legal systems.

Math

When Graphs Are a Matter of Life and Death (newyorker.com) 106

Pie charts and scatter plots seem like ordinary tools, but they revolutionized the way we solve problems. From a report: John Carter has only an hour to decide. The most important auto race of the season is looming; it will be broadcast live on national television and could bring major prize money. If his team wins, it will get a sponsorship deal and a chance to start making some real profits for a change. There's just one problem. In seven of the past twenty-four races, the engine in the Carter Racing car has blown out. An engine failure live on TV will jeopardize sponsorships -- and the driver's life. But withdrawing has consequences, too. The wasted entry fee means finishing the season in debt, and the team won't be happy about the missed opportunity for glory. As Burns's First Law of Racing says, "Nobody ever won a race sitting in the pits."

One of the engine mechanics has a hunch about what's causing the blowouts. He thinks that the engine's head gasket might be breaking in cooler weather. To help Carter decide what to do, a graph is devised that shows the conditions during each of the blowouts: the outdoor temperature at the time of the race plotted against the number of breaks in the head gasket. The dots are scattered into a sort of crooked smile across a range of temperatures from about fifty-five degrees to seventy-five degrees. The upcoming race is forecast to be especially cold, just forty degrees, well below anything the cars have experienced before. So: race or withdraw?

This case study, based on real data, and devised by a pair of clever business professors, has been shown to students around the world for more than three decades. Most groups presented with the Carter Racing story look at the scattered dots on the graph and decide that the relationship between temperature and engine failure is inconclusive. Almost everyone chooses to race. Almost no one looks at that chart and asks to see the seventeen missing data points -- the data from those races which did not end in engine failure.

Businesses

The Global Chip Shortage is Creating a New Problem: More Fake Components (zdnet.com) 62

Industry analysts believe that the global chip shortage is creating the perfect environment for counterfeit semiconductors to enter the market. From a report: With demand looking unlikely to calm down, analyst firm Gartner estimates that the semiconductor shortage will last well into 2022, and has warned equipment manufacturers that wafer orders could come with up to 12 months of lead time in the coming months. For some companies, this will mean finding an alternative way of stocking up on chips or shutting down production lines. In other words, the current times are opening up a golden opportunity for electronic component counterfeiters and fraudsters to step in. "If next week, you need to get 5,000 parts or your line will shut down, you will be in a situation of distress purchase and you will put your guard down," Diganta Das, a researcher in counterfeit electronics at the Center for Advanced Life Cycle Engineering (CALCE), tells ZDNet. "You won't keep to your rules of verifying the vendor or going through test processes. This is likely to become a big problem."

As part of his research, Das regularly monitors counterfeit reporting databases like ERAI, and although it is too early to notice a surge, he is confident that the number of reports will start growing in the next six months as companies realize they have been sold illegal parts. The problem, of course, is unlikely to affect tech giants whose reliance on semiconductors is such that they have implemented robust supply chains, and will typically only purchase components directly from chip manufacturers. Those at risk rather include low-volume manufacturers whose supply chain for semiconductors is less established -- but it could include companies in sectors that are as critical as defense, healthcare and even automotive.

News

Why We Are in a Shipping Crisis That's Sparking Shortages (businessinsider.com) 156

An anonymous reader shares a report: By late January 2021, some 55 vessels were crowded around the LA and Long Beach ports, reportedly sitting in the ocean for up to two weeks. FreightWaves noted that it took longer for some of these ships just to get unloaded than it was for them to cross the Pacific. Why is there a delay to unload these ships? The boom in demand is, of course, one leading reason. American ports are also seeing a shortage of labor. There's an ongoing shortage of the longshoremen who who undertake the critical task of getting these containers off the ship and onto trucks or trains. Dozens were quarantined due to the coronavirus at varying points last year.

Above all, when something goes astray with ocean shipping, there's a major butterfly effect. A ship that's unloaded two weeks late in Los Angeles is also going to be two weeks late when it arrives back in, say, Chittagong, Bangladesh to load up on IKEA furniture. The ship before that may have been two weeks late, too, so the carrier might just cancel the ship IKEA was expecting space on, Sundboell said. Then IKEA will have to scramble for another way to move your nightstand -- and potentially every order they had after that, which will now be pushed down the road.

Halfway into 2021, the situation has not improved. There's another shortage giving rise to our shortages: A lack of shipping containers. Or rather, a lack of containers where they need to be.

Software

How Software Is Eating the Car (ieee.org) 246

The trend toward self-driving and electric vehicles will add hundreds of millions of lines of code to cars. Can the auto industry cope? From a report: Ten years ago, only premium cars contained 100 microprocessor-based electronic control units (ECUs) networked throughout the body of a car, executing 100 million lines of code or more. Today, high-end cars like the BMW 7-series with advanced technology like advanced driver-assist systems (ADAS) may contain 150 ECUs or more, while pick-up trucks like Ford's F-150 top 150 million lines of code. Even low-end vehicles are quickly approaching 100 ECUs and 100 million of lines of code as more features that were once considered luxury options, such as adaptive cruise control and automatic emergency braking, are becoming standard.

Vard Antinyan, a software quality expert at Volvo Cars who has written extensively about software and system complexity, explains that as of 2020, "Volvo has a superset of about 120 ECUs from which it selects to create a system architecture present within every Volvo vehicle. Altogether, they comprise a total of 100 million lines of source code." This source code, Antinyan says, "contains 10 million conditional statements as well as 3 million functions, which are invoked some 30 million places in the source code." How much and what types of software resides in each ECU varies greatly, depending on, among other things, the computing capability of the ECU, the functions the ECU controls, the internal and external information and communications required to be processed and whether they are event or time triggered, along with mandated safety and other regulatory requirements. Over the past decade, more ECU software has been dedicated to ensuring operational quality, reliability, safety and security.

"The amount of software written to detect misbehavior to ensure quality and safety is increasing," says Nico Hartmann, Vice President of ZF's Software Solutions & Global Software Center at ZF Friedrichshafen AG, one of the world's largest suppliers of automotive components. Where perhaps a third of an ECU's software was dedicated to ensuring quality operations ten years ago, it is now often more than half or more, especially in safety critical systems, Hartmann states. Which ECUs and associated software end up going into a Volvo like its luxury SUV XC90 model, which has approximately 110 ECUs, depends on several factors. Volvo, like all auto manufacturers, has variants of each model offered for sale aimed at different market segments.

Transportation

Southwest Airlines Delays and Cancels Flights for a Third Day (nytimes.com) 22

Hundreds of Southwest Airlines flights were delayed or canceled again on Wednesday as the company sought to resolve disruptions from earlier in the week amid a pickup in summer travel. From a report: The headaches for Southwest, which is widely credited for pioneering the low-fare airline business model, began on Monday night, when a problem with a weather data supplier prevented the airline from safely flying planes. The issue was resolved within hours, but on Tuesday the airline suffered its own technological problems, resulting in half of its flights that day being delayed and many being canceled, according to FlightAware, a flight tracking service. Spillover from that episode caused Wednesday's problems, the airline said. About 10 percent of Southwest's flights were canceled and another 19 percent were delayed by midafternoon, according to FlightAware.

"While our technology issues from Tuesday have been resolved, we are still experiencing a small number of cancellations and delays across our network as we continue working to resume normal operations," Dan Landson, a Southwest spokesman, said in a statement. Southwest said on Tuesday that it was having problems with "network connectivity." Mr. Landson said that those troubles were unrelated to the weather data problems from Monday and that there was no indication the airline's computer systems had been breached or hacked. The flight disruptions came at a critical time for a company celebrating its 50th year.

Bitcoin

El Salvador Seeks World Bank Help For Bitcoin Implementation (reuters.com) 170

El Salvador has sought assistance from the World Bank as it implements its move to use bitcoin as a parallel legal tender alongside the U.S. dollar, Finance Minister Alejandro Zelaya said on Wednesday. From a report: Zelaya said the Central American country has tapped the World Bank for technical assistance on rules and implementation of bitcoin. Zelaya also said ongoing negotiations with the International Monetary Fund have been successful, though the Fund said last week it saw "macroeconomic, financial and legal issues" with the country's adoption of bitcoin. read more Zelaya said on Wednesday the IMF is "not against" the bitcoin implementation. Further reading: El Salvador saw bitcoin-based remittances rise 300% year over year in May.
Facebook

Facebook Will Start Putting Ads in Oculus Quest Apps (theverge.com) 76

Facebook will soon begin testing ads inside its Oculus Quest virtual reality system. In the coming weeks, ads will start appearing inside the Resolution Games title Blaston as well as two other unnamed apps. From a report: Facebook will later expand the system based on user feedback, saying it aims to create a "self-sustaining platform" for VR development. Facebook introduced ads on the Oculus mobile app last month, and it's used limited Oculus data to target Facebook advertising since 2019, but this is its first major foray into putting ads inside the Oculus VR platform itself. "Once we see how this test goes and incorporate feedback from developers and the community, we'll provide more details on when ads may become more broadly available across the Oculus platform and in the Oculus mobile app," the company said in a blog post.
United States

Biden Tells Putin Certain Cyber-Attacks Should Be 'Off-Limits' (reuters.com) 195

U.S. President Joe Biden told Russian President Vladimir Putin on Wednesday that certain critical infrastructure should be "off-limits" to cyber-attacks, while the two leaders agreed in their summit to start cybersecurity talks. From a report: Biden said the list of organizations that should not be attacked includes the 16 sectors designated by the United States as critical infrastructure. The sectors, based on a description published by the U.S. Homeland Security Department, include telecommunications, healthcare, food and energy. "We agreed to task experts in both our countries to work on specific understandings about what is off-limits," Biden said. "We'll find out whether we have a cybersecurity arrangement that begins to bring some order." In a separate press conference, Putin said he agreed to "begin consultations" on cybersecurity issues. He also said that while the United States had requested information from Russia about recent cyber-attacks, Moscow had similarly asked for information about attacks he said were coming from the U.S. side and had not received a response.
Government

Apple Pre-Installed Apps Would Be Banned Under Antitrust Package (bloomberg.com) 169

Apple would be prohibited from pre-installing its own apps on Apple devices under antitrust reform legislation introduced last week, said Democratic Representative David Cicilline, who is leading a push to pass new regulations for U.S. technology companies. From a report: Cicilline told reporters Wednesday that a proposal prohibiting tech platforms from giving an advantage to their own products over those of competitors would mean Apple can't ship devices with pre-installed apps on its iOS operating platform. "It would be equally easy to download the other five apps as the Apple one so they're not using their market dominance to favor their own products and services," the Rhode Island Democrat said. The proposal is part of a package of bipartisan bills that would impose significant new constraints on how tech companies operate, restricting acquisitions and forcing them to exit some businesses. The House Judiciary Committee will mark up the five bills in a hearing next week, Representative Jerrold Nadler of New York, the committee's chairman, said.
Hardware

Amazon Appears To Have Removed RavPower, a Popular Phone Battery and Charger Brand (theverge.com) 92

A month ago, Amazon-first gadget brands Aukey and Mpow suddenly and mysteriously disappeared from the giant online retailer's storefront, with almost all their electronics vanishing from Amazon's shelves. Today, popular battery and charger brand RavPower has completely disappeared as well. From a report: All of the company's product listings have disappeared, leaving blank white spaces in RavPower's Amazon storefront. Searches for "RavPower" don't bring up any listings for products made by the company. Existing links to RavPower products either point to Amazon's "Sorry, we couldn't find that page" cute 404 dogs, or listings that read "Currently unavailable." By and large, this is exactly what happened to Aukey, Mpow, and other lesser-known electronics retailers last month -- except here, whoever did this has been a bit more thorough.

Slashdot Top Deals