Tech Startups Add Automation, Drones to Aid Construction Industry

Having robots to do the dirty, tedious parts of the job is a dream come true in the construction business. Automation technology developers say robotics are transforming the industry, making it safer, and helping companies take on more projects and finish them faster. Faiza Elmasry has the story. Faith Lapidus narrates.

Facebook Faces Calls for Change

The fallout continues for Facebook over how it handles user data and privacy. U.S. and European lawmakers are calling for Facebook CEO Mark Zuckerberg to testify, and regulators have opened investigations. Michelle Quinn reports on how the social media giant is facing a tipping point when it comes to dealing with user privacy.

With Paper, Phones, Atlanta Struggles to Recover From Cyberattack

Atlanta’s top officials holed up in their offices on Saturday as they worked to restore critical systems knocked out by a nine-day-old cyberattack that

plunged the Southeastern U.S. metropolis into technological chaos and forced some city workers to revert to paper.

On an Easter and Passover holiday weekend, city officials labored in preparation for the workweek to come.

Police and other public servants have spent the past week trying to piece together their digital work lives, re-creating audit spreadsheets and conducting business on mobile phones in response to one of the most devastating “ransomware” virus attacks to hit an American city.

Three city council staffers have been sharing a single clunky personal laptop brought in after cyber extortionists attacked Atlanta’s computer network with a virus that scrambled data and still prevents access to critical systems.

“It’s extraordinarily frustrating,” said Councilman Howard Shook, whose office lost 16 years of digital records.

One compromised city computer seen by Reuters showed multiple corrupted documents with “weapologize” and “imsorry” added to file names.

Ransomware attacks have surged in recent years as cyberextortionists  moved from attacking individual computers to large organizations, including businesses, health care organizations and government agencies. Previous high-profile attacks have shut down factories, prompted hospitals to turn away patients and forced local emergency dispatch systems to move to manual operations.

Not theft, usually

Ransomware typically corrupts data and does not steal it. The city of Atlanta has said it does not believe private residents’ information is in the hands of hackers, but they do not know for sure.

City officials have declined to discuss the extent of damage beyond disclosed outages that have shut down some services at municipal offices, including courts and the water department.

Nearly 6 million people live in the Atlanta metropolitan area. The Georgia city itself is home to more than 450,000 people, according to the latest data from the U.S. Census Bureau.

City officials told Reuters that police files and financial documents were rendered inaccessible by unknown hackers who demanded $51,000 worth of bitcoin to provide digital keys to unlock scrambled files.

“Everything on my hard drive is gone,” City Auditor Amanda Noble said in her office housed in Atlanta City Hall. 

City officials have not disclosed the extent to which servers for backing up information on PCs were corrupted or what kind of information they think is unrecoverable without paying the ransom.

Noble discovered the disarray on March 22 when she turned on her computer to discover that files could not be opened after being encrypted by a powerful computer virus known as SamSam that renamed them with gibberish.

City officials then quickly entered her office and told her to shut down the computer before warning the rest of the building.

Noble is working on a personal laptop and using her smartphone to search for details of current projects mentioned in emails stored on that device.

Not all computers were compromised. Ten of 18 machines in the auditing office were not affected, Noble said.

Old-school analog

Atlanta police returned to taking written case notes and have lost access to some investigative databases, department spokesman Carlos Campos told Reuters. He declined to discuss the contents of the affected files.

“Our data management teams are working diligently to restore normal operations and functionalities to these systems and hope to be back online in the very near future,” he said. By the weekend, he added, officers were returning to digital police reports.

Meanwhile, some city employees complained they have been left in the dark, unsure when it is safe to turn on their computers.

“We don’t know anything,” said one frustrated employee as she left for a lunch break on Friday. 

Like City Hall, whose 1930 neo-Gothic structure is attached to a massive modern wing, the city’s computer system is a combination of old and new.

“One of the reasons why municipalities are vulnerable is we just have so many different systems,” Noble said.

The city published results from a recent cybersecurity audit in January, and had started implementing its recommendations before the ransomware virus hit. The audit called for better record-keeping and hiring more technology

workers.

Councilman Shook said he was worried about how much the recovery would cost the city, but that he supported funding a cybersecurity overhaul to counter future attacks.

For now his staff members are temporarily sharing one aging laptop.

“Things are very slow,” he said. “It was a very surreal experience to be shut down like that.”

No word on payment

Mayor Keisha Lance Bottoms, who took office in January, has declined to say whether the city paid the ransom ahead of a March 28 deadline mentioned in an extortion note, whose image was released by a local television station.

Shook, who chairs the city council’s finance subcommittee, said he did not know whether the city was negotiating with the hackers, but that it appeared no ransom had been paid to date.

The Federal Bureau of Investigation, which is helping Atlanta respond, typically discourages ransomware victims from paying up.

FBI officials could not immediately be reached for comment. A Department of Homeland Security spokesman confirmed the agency was helping Atlanta respond to the attack, but declined to comment further.

Hackers typically walk away when ransoms are not paid, said Mark Weatherford, a former senior DHS cyberofficial.

Weatherford, who previously served as California’s chief information security officer, said the situation might have been resolved with little pain if the city had quickly made that payment.

“The longer it goes, the worse it gets,” he said. “This could turn out to be really bad if they never get their data back.”

Tesla Says Vehicle in Deadly Crash Was on Autopilot 

A vehicle in a fatal crash last week in California was operating on Autopilot, making it the latest accident to involve a self-driving vehicle, Tesla has confirmed.

The electric car maker said the driver, who was killed in the accident, did not have his hands on the steering wheel for six seconds before the crash, despite several warnings from the vehicle. Tesla Inc. tells drivers that its Autopilot system, which can maintain speed, change lanes and self-park, requires drivers to keep their eyes on the road and hands on the wheel in order to take control of the vehicle to avoid accidents. 

Tesla said its vehicle logs show the driver took no action to stop the Model X SUV from crashing into a concrete lane divider. Photographs of the SUV show that the front of the vehicle was demolished, its hood was ripped off  and its front wheels were scattered on the freeway.

The vehicle also caught fire, though Tesla said no one was in the vehicle when that happened. The company said the crash was made worse by a missing or damaged safety shield on the end of the freeway barrier that is supposed to reduce the impact into the concrete lane divider.

The crash happened in Mountain View, in California’s Silicon Valley. The driver was Walter Huang, 38, a software engineer for Apple.

“None of this changes how devastating an event like this is or how much we feel for our customer’s family and friends,” Tesla said on its website late Friday.

Earlier this month, a self-driving Volvo SUV being tested by ride-hailing service Uber struck and killed a pedestrian in Arizona.

Tesla Inc. defended its Autopilot feature, saying that while it doesn’t prevent all accidents, it makes them less likely to occur than is the case for vehicles without it.

Federal investigators are looking into last week’s crash, as well a separate crash in January of a Tesla Model S that may have been operating under the Autopilot system.

Could Enemies Target Undersea Cables That Link the World?

Russian ships are skulking around underwater communications cables, causing the U.S. and its allies to worry the Kremlin might be taking information warfare to new depths.

Is Moscow interested in cutting or tapping the cables? Does it want the West to worry it might? Is there a more innocent explanation? Unsurprisingly, Russia isn’t saying.

But whatever Moscow’s intentions, U.S. and Western officials are increasingly troubled by their rival’s interest in the 400 fiber-optic cables that carry most of world’s calls, emails and texts, as well as $10 trillion worth of daily financial transactions.

“We’ve seen activity in the Russian navy, and particularly undersea in their submarine activity, that we haven’t seen since the ’80s,” General Curtis Scaparrotti, commander of the U.S. European Command, told Congress this month.

Without undersea cables, a bank in Asian countries couldn’t send money to Saudi Arabia to pay for oil. U.S. military leaders would struggle to communicate with troops fighting extremists in Afghanistan and the Middle East. A student in Europe wouldn’t be able to Skype his parents in the United States.

Small passageways

All this information is transmitted along tiny glass fibers encased in undersea cables that, in some cases, are little bigger than a garden hose. All told, there are 620,000 miles of fiber-optic cable running under the sea, enough to loop around Earth nearly 25 times.

Most lines are owned by private telecommunications companies, including giants like Google and Microsoft. Their locations are easily identified on public maps, with swirling lines that look like spaghetti. While cutting one cable might have limited impact, severing several simultaneously or at choke points could cause a major outage.

The Russians “are doing their homework and, in the event of a crisis or conflict with them, they might do rotten things to us,” said Michael Kofman, a Russian military expert at nonprofit research group CNA Corp.

It’s not Moscow’s warships and submarines that are making NATO and U.S. officials uneasy. It’s Russia’s Main Directorate of Deep Sea Research, whose specialized surface ships, submarines, underwater drones and minisubs conduct reconnaissance, underwater salvage and other work.

One ship run by the directorate is the Yantar. It’s a modest, 354-foot oceanographic vessel that holds a crew of about 60. It most recently was off South America’s coast helping Argentina search for a lost submarine.

Parlamentskaya Gazeta, the Russian parliament’s publication, last October said the Yantar has equipment “designed for deep-sea tracking” and “connecting to top-secret communication cables.” The publication said that in September 2015, the Yantar was near Kings Bay, Georgia, home to a U.S. submarine base, “collecting information about the equipment on American submarines, including underwater sensors and the unified [U.S. military] information network.” Rossiya, a Russian state TV network, has said the Yantar not only can connect to top-secret cables but also can cut them and “jam underwater sensors with a special system.”

Russia’s Defense Ministry did not respond to a request for comment.

Preparing for sabotage

There is no hard evidence that the ship is engaged in nefarious activity, said Steffan Watkins, an information technology security consultant in Canada tracking the ship. But he wonders what the ship is doing when it’s stopped over critical cables or when its Automatic Identification System tracking transponder isn’t on.

Of the Yantar’s crew, he said: “I don’t think these are the actual guys who are doing any sabotage. I think they’re laying the groundwork for future operations.”

Members of Congress are wondering, too. 

Representative Joe Courtney, a Connecticut Democrat on a House subcommittee on sea power, said of the Russians, “The mere fact that they are clearly tracking the cables and prowling around the cables shows that they are doing something.”

Democratic Senator Gary Peters of Michigan, an Armed Services Committee member, said Moscow’s goal appears to be to “disrupt the normal channels of communication and create an environment of misinformation and distrust.”

The Yantar’s movements have previously raised eyebrows.

On October 18, 2016, a Syrian telecom company ordered emergency maintenance to repair a cable in the Mediterranean that provides internet connectivity to several countries, including Syria, Libya and Lebanon. The Yantar arrived in the area the day before the four-day maintenance began. It left two days before the maintenance ended. It’s unknown what work it did while there.

Watkins described another episode on November 5, 2016, when a submarine cable linking Persian Gulf nations experienced outages in Iran. Hours later, the Yantar left Oman and headed to an area about 60 miles west of the Iranian port city of Bushehr, where the cable runs ashore. Connectivity was restored just hours before the Yantar arrived on November 9. The boat stayed stationary over the site for several more days.

Undersea cables have been targets before.

At the beginning of World War I, Britain cut a handful of German underwater communications cables and tapped the rerouted traffic for intelligence. In the Cold War, the U.S. Navy sent American divers deep into the Sea of Okhotsk off the Russian coast to install a device to record Soviet communications, hoping to learn more about the U.S.S.R.’s submarine-launched nuclear capability.

Eavesdropping by spies

More recently, British and American intelligence agencies have eavesdropped on fiber-optic cables, according to documents released by Edward Snowden, a former National Security Agency contractor.

In 2007, Vietnamese authorities confiscated ships carrying miles of fiber-optic cable that thieves salvaged from the sea for profit. The heist disrupted service for several months. And in 2013, Egyptian officials arrested three scuba divers off Alexandria for attempting to cut a cable stretching from France to Singapore. Five years on, questions remain about the attack on a cable responsible for about a third of all internet traffic between Egypt and Europe.

Despite the relatively few publicly known incidents of sabotage, most outages are due to accidents.

Two hundred or so cable-related outages take place each year. Most occur when ship anchors snap cables or commercial fishing equipment snags the lines. Others break during tsunamis, earthquakes and other natural disasters.

But even accidental cuts can harm U.S. military operations. 

In 2008 in Iraq, unmanned U.S. surveillance flights nearly screeched to a halt one day at Balad Air Base, not because of enemy mortar attacks or dusty winds. An anchor had snagged a cable hundreds of miles away from the base, situated in the “Sunni Triangle” northwest of Baghdad.

The severed cable had linked controllers based in the United States with unmanned aircraft flying intelligence, surveillance and reconnaissance missions for coalition forces in the skies over Iraq, said retired Air Force Colonel Dave Lujan of Hampton, Virginia.

“Say you’re operating a remote-controlled car and all of a sudden you can’t control it,” said Lujan, who was deputy commander of the 332nd Expeditionary Operations Group at the base when the little-publicized outage lasted for two to three days. “That’s a big impact,” he said, describing how U.S. pilots had to fly the missions instead.

Facebook ‘Ugly Truth’ Memo Triggers New Firestorm Over Ethics

Was a leaked internal Facebook memo aimed at justifying the social network’s growth-at-any-cost strategy? Or simply a way to open debate on difficult questions over new technologies?

The extraordinarily blunt memo by a high-ranking executive — leaked this week and quickly repudiated by the author and by Facebook — warned that the social network’s goal of connecting the world might have negative consequences, but that these were outweighed by the positives.

“Maybe it costs a life by exposing someone to bullies,” the 2016 memo by top executive Andrew “Boz” Bosworth said. “Maybe someone dies in a terrorist attack coordinated on our tools.”

While Bosworth and Facebook chief Mark Zuckerberg said the memo was only a way to provoke debate, it created a new firestorm for the social network mired in controversy over the hijacking of personal data by a political consulting firm linked to Donald Trump.

David Carroll, a professor of media design at the New School Parsons, tweeted that the memo highlighted a “reckless hubristic attitude” by the world’s biggest social network.

“What is so striking is that an executive chose to have this conversation on a Facebook wall,” said Jennifer Grygiel, a Syracuse University professor who studies social networks. “He showed poor judgment and poor business communication skills. It speaks to Facebook’s culture.”

Grygiel said these kinds of issues require “thoughtful discussion” and should take place within a context of protecting users. “When these companies build new products and services, their job is to evaluate the risks, and not just know about them, but ensure public safety.”

Bosworth, considered part of chief executive Zuckerberg’s inner circle, wrote: “The ugly truth is that we believe in connecting people so deeply that anything that allows us to connect more people more often is ‘de facto’ good.”

On Thursday, he said he merely wanted to open a discussion and added that “I don’t agree with the post today and I didn’t agree with it even when I wrote it.”

Zuckerberg responded that he and many others at Facebook “strongly disagreed” with the points raised.

‘Offloading’ ethical questions

Jim Malazita, a professor of science and technology studies at Rensselaer Polytechnic Institute, said it was not surprising to see the memo in an industry whose work culture is highly compartmentalized.

Malazita said the memo frames the discussion with the assumption that technology and connecting people is always positive.

“By the assumptions built into that framework they are already shutting down a whole bunch of conversations,” he said.

Malazita added that most people who learn computer science are taught to make these technologies work as well as possible, while “offloading” the question of moral responsibility.

“It’s not that they don’t care, but even when they care about the social impact, there’s a limit to how much they practice that care.”

Joshua Benton, director of Harvard University’s Nieman Journalism Lab, said it may be too easy to blame Facebook for misuse of the platform.

“I’m rarely in a position to defend Facebook,” he said, but the view that a technology is worth spreading even though some people will use it for terrible ends “is something you could have believed about the telegraph, the telephone, email, SMS, the iPhone, etc,” Benton tweeted.

Doing the right thing

Patrick Lin, director of the ethics and emerging sciences group at California Polytechnic State University, said he sees “no evidence that Facebook’s culture is unethical, though just one senior executive in the right place can poison the well.”

“I’d guess that most Facebook employees want to do the right thing and are increasingly uncomfortable with how the proverbial sausage is made,” Lin added.

Copies of internal responses at Facebook published by The Verge website showed many employees were angry or upset over the Bosworth memo but that some defended the executive.

Others said the leaks may suggest Facebook is being targeted by spies or “bad actors” trying to embarrass the company.

Rivers and Tides Can Provide Affordable Power

While wind turbines and solar cells generate power only when there is wind and sun, most rivers always flow and most ocean shores always experience tidal currents. At a recent energy summit organized by the U.S. Energy Department, a company from Maine displayed an innovative submersible generator that effectively harvests power from shallow rivers and tidal currents. VOA’s George Putic has more.

Despite Setbacks, Automakers Move Forward with Electric and Self-Driving Cars

A recent fatality involving one of Uber’s self-driving cars may have created uncertainty and doubt regarding the future of autonomous vehicles, but it’s not stopping automakers who say autonomous and self-driving vehicles are here to stay. At the New York International Auto Show this week, autonomous vehicles and electric cars were increasingly front and center as VOA’s Tina Trinh reports.

Tech Giants Tackle Online Wildlife Trafficking

A new coalition of tech giants and conservationists is looking to drastically reduce the amount of wild, and often endangered, animals that are trafficked via online services. As Veronica Balderas Iglesias reports, they hope to cut 80 percent of the illegal trade by the end of the decade.

Under Armour: 150 Million Fitness App Accounts Breached

Under Armour Inc. said Thursday that data from 150 million MyFitnessPal diet and fitness app accounts were compromised in February, in one of the biggest hacks in history, sending shares of the athletic apparel maker down 3 percent in after-hours trade.

The stolen data include account user names, email addresses and scrambled passwords for the popular MyFitnessPal mobile app and website, Under Armour said in a statement. Social Security numbers, driver license numbers and payment card data were not compromised, it said.

It is the largest data breach this year and one of the top five to date, based on the number of records compromised, according to SecurityScorecard, a cybersecurity rating and remediation company.

Larger hacks include 3 billion Yahoo accounts compromised in a 2013 incident and credentials for more than 412 million users of adult websites run by California-based FriendFinder Networks Inc. in 2016, according to breach notification website LeakedSource.com.

Under Armour said it was working with data security firms and law enforcement, but it did not provide details of how the hackers got into its network or pulled out the data without getting caught.

While the breach did not include financial data, large troves of stolen email addresses can be valuable to cybercriminals.

Email addresses retrieved in a 2014 attack that compromised data on 83 million JPMorgan Chase customers were later used in schemes to boost stock prices, according to U.S. federal indictments in the case in 2015.

Under Armor said in an alert on its website that it would require MyFitnessPal users to change their passwords, and it urged users to do so immediately.

“We continue to monitor for suspicious activity and to coordinate with law enforcement authorities,” the company said, adding that it was bolstering systems that detect and prevent unauthorized access to user information.

Under Armour said it started notifying users of the breach Thursday, four days after it learned of the incident.

Under Armour bought MyFitnessPal in 2015 for $475 million.

It is part of the company’s connected fitness division, whose revenue last year accounted for 1.8 percent of Under Armour’s $5 billion in total sales. 

Facebook’s Zuckerberg Disavows Memo Saying All User Growth Is Good

A Facebook Inc. executive said in an internal memo in 2016 that the social media company needed to pursue adding users above all else, BuzzFeed

News reported Thursday, prompting disavowals from the executive and Facebook Chief Executive Officer Mark Zuckerberg.

The memo from Andrew Bosworth, a Facebook vice president, had not been previously reported as Facebook faces inquiries over how it handles personal information and the tactics the social media company has used to grow to 2.1 billion users.

Zuckerberg stood by Bosworth, who goes by the nickname “Boz,” while distancing himself from the memo’s contents.

Bosworth confirmed the memo’s authenticity but in a statement he disavowed its message, saying its goal had been to encourage debate.

Facebook users, advertisers and investors have been in an uproar for months over a series of scandals, most recently privacy practices that allowed political consultancy Cambridge Analytica to obtain personal information on 50 million Facebook members. Zuckerberg is expected to testify at a hearing with U.S. lawmakers as soon as April.

​’Provocative’ statements

“Boz is a talented leader who says many provocative things. This was one that most people at Facebook including myself disagreed with strongly. We’ve never believed the ends justify the means,” Zuckerberg said in a statement.

Bosworth wrote in the June 2016 memo that some “questionable” practices were all right if the result was connecting people.

“That’s why all the work we do in growth is justified. All the questionable contact importing practices. All the subtle language that helps people stay searchable by friends,” he wrote in the memo, which BuzzFeed published on its website.

He also urged fellow employees not to let potential negatives slow them down.

“Maybe it costs a life by exposing someone to bullies. Maybe someone dies in a terrorist attack coordinated on our tools. And still we connect people,” he wrote.

Bosworth said Thursday that he did not agree with the post today “and I didn’t agree with it even when I wrote it.

“Having a debate around hard topics like these is a critical part of our process and to do that effectively we have to be able to consider even bad ideas, if only to eliminate them,” Bosworth’s statement said.