Suspected ransomware payments totaling $590 million were made in the first six months of this year, more than the $416 million reported for all of 2020, U.S. authorities said on Friday, as Washington put the cryptocurrency industry on alert about its role in combating ransomware attacks.
The U.S. Treasury Department said the average amount of reported ransomware transactions per month in 2021 was $102.3 million, with REvil/Sodinokibi, Conti, DarkSide, Avaddon, and Phobos the most prevalent ransomware strains reported.
President Joe Biden has made the government’s cybersecurity response a top priority for the most senior levels of his administration following a series of attacks this year that threatened to destabilize U.S. energy and food supplies.
Avoiding U.S. sanctions
Seeking to stop the use of cryptocurrencies in the payment of ransomware demands, Treasury told members of the crypto community they are responsible for making sure they do not directly or indirectly help facilitate deals prohibited by U.S. sanctions.
Its new guidance said the industry plays an increasingly critical role in preventing those blacklisted from exploiting cryptocurrencies to evade sanctions.
“Treasury is helping to stop ransomware attacks by making it difficult for criminals to profit from their crimes, but we need partners in the private sector to help prevent this illicit activity,” Deputy Treasury Secretary Wally Adeyemo said in a statement.
The new guidance also advised cryptocurrency exchanges to use geolocation tools to block access from countries under U.S. sanctions.
Hackers use ransomware to take down systems that control everything from hospital billing to manufacturing. They stop only after receiving hefty payments, typically in cryptocurrency.
Large scale hacks
This year, gangs have hit numerous U.S. companies in large scale hacks. One such attack on pipeline operator Colonial Pipeline led to temporary fuel supply shortages on the U.S. East Coast. Hackers also targeted an Iowa-based agricultural company, sparking fears of disruptions to grain harvesting in the Midwest.
The Biden administration last month unveiled sanctions against cryptocurrency exchange Suex OTC, S.R.O. over its alleged role in enabling illegal payments from ransomware attacks, officials said, in the Treasury’s first such move against a cyptocurrency exchange over ransomware activity.
Facebook was used to spread disinformation about the Rohingya, the Muslim ethnic minority in Myanmar, and in 2018 the company began to delete posts, accounts and other content it determined were part of a campaign to incite violence.
That deleted but stored data is at issue in a case in the United States over whether Facebook should release the information as part of a claim in international court.
Facebook this week objected to part of a U.S. magistrate judge’s order that could have an impact on how much data internet companies must turn over to investigators examining the role social media played in a variety of international incidents, from the 2017 Rohingya genocide in Myanmar to the 2021 Capitol riot in Washington.
The judge ruled last month that Facebook had to give information about these deleted accounts to Gambia, the West African nation, which is pursuing a case in the International Court of Justice against Myanmar, seeking to hold the Asian nation responsible for the crime of genocide against the Rohingya.
But in its filing Wednesday, Facebook said the judge’s order “creates grave human rights concerns of its own, leaving internet users’ private content unprotected and thereby susceptible to disclosure — at a provider’s whim — to private litigants, foreign governments, law enforcement, or anyone else.”
The company said it was not challenging the order when it comes to public information from the accounts, groups and pages it has preserved. It objects to providing “non-public information.” If the order is allowed to stand, it would “impair critical privacy and freedom of expression rights for internet users — not just Facebook users — worldwide, including Americans,” the company said.
Facebook has argued that providing the deleted posts is in violation of U.S. privacy, citing the Stored Communications Act, the 35-year-old law that established privacy protections in electronic communication.
Deleted content protected?
In his September decision, U.S. Magistrate Judge Zia M. Faruqui said that once content is deleted from an online service, it is no longer protected.
Paul Reichler, a lawyer for Gambia, told VOA that Facebook’s concern about privacy is misplaced.
“Would Hitler have privacy rights that should be protected?” Reichler said in an interview with VOA. “The generals in Myanmar ordered the destruction of a race of people. Should Facebook’s business interests in holding itself out as protecting the privacy rights of these Hitlers prevail over the pursuit of justice?”
But Orin Kerr, a law professor at the University of California at Berkeley, said on Twitter that the judge’s ruling erred and that the implication of the ruling is that “if a provider moderates contents, all private messages and emails deleted can be freely disclosed and are no longer private.”
The 2017 military crackdown on the Rohingya resulted in more than 700,000 people fleeing their homes to escape mass killings and rapes, a crisis that the United States has called “ethnic cleansing.”
‘Coordinated inauthentic behavior’
Human rights advocates say Facebook had been used for years by Myanmar officials to set the stage for the crimes against the Rohingya.
Frances Haugen, the former Facebook employee who testified about the company in Congress last week, said Facebook’s focus on keeping users engaged on its site contributed to “literally fanning ethnic violence” in countries.
In 2018, Facebook deleted and banned accounts of key individuals, including the commander in chief of Myanmar’s armed forces and the military’s television network, as well as 438 pages, 17 groups and 160 Facebook and Instagram accounts — what the company called “coordinated inauthentic behavior.” The company estimated 12 million people in Myanmar, a nation of 54 million, followed these accounts.
Facebook commissioned an independent human rights study of its role that concluded that prior to 2018, it indeed failed to prevent its service “from being used to foment division and incite offline violence.”
Facebook kept the data on what it deleted for its own forensic analysis, the company told the court.
The case comes at a time when law enforcement and governments worldwide increasingly seek information from technology companies about the vast amount of data they collect on users.
Companies have long cited privacy concerns to protect themselves, said Ari Waldman, a professor of law and computer science at Northeastern University. What’s new is the vast quantity of data that companies now collect, a treasure trove for investigators, law enforcement and government.
“Private companies have untold amounts of data based on the commodification of what we do,” Waldman said.
Privacy rights should always be balanced with other laws and concerns, such as the pursuit of justice, he added.
Facebook working with the IIMM
In August 2020, Facebook confirmed that it was working with the Independent Investigative Mechanism for Myanmar (IIMM), a United Nations-backed group that is investigating Myanmar. The U.N. Human Rights Council established the IIMM, or “Myanmar Mechanism,” in September 2018 to collect evidence of the country’s most serious international crimes.
Recently, IIMM told VOA it has been meeting regularly with Facebook employees to gain access to information on the social media network related to its ongoing investigations in the country.
A spokesperson for IIMM told VOA’s Burmese Service that Facebook “has agreed to voluntarily provide some, but not all, of the material the Mechanism has requested.”
IIMM head Nicholas Koumjian wrote to VOA that the group is seeking material from Facebook “that we believe is relevant to proving criminal responsibility for serious international crimes committed in Myanmar that fall within our mandate.”
Facebook told VOA in an email it is cooperating with the U.N. Myanmar investigators.
“We’ve committed to disclose relevant information to authorities, and over the past year we’ve made voluntary, lawful disclosures to the IIMM and will continue to do so as the case against Myanmar proceeds,” the spokesperson wrote. The company has made what it calls “12 lawful data disclosures” to the IIMM but didn’t provide details.
Human rights activists are frustrated that Facebook is not doing more to crack down on bad actors who are spreading hate and disinformation on the site.
“Look, I think there are many people at Facebook who want to do the right thing here, and they are working pretty hard,” said Phil Robertson, who covers Asia for Human Rights Watch. “But the reality is, they still need to escalate their efforts. I think that Facebook is more aware of the problems, but it’s also in part because so many people are telling them that they need to do better.”
Matthew Smith of the human rights organization Fortify Rights, which closely tracked the ethnic cleansing campaign in Myanmar, said the company’s business success indicates it could do a better job of identifying harmful content.
“Given the company’s own business model of having this massive capacity to deal with massive amounts of data in a coherent and productive way, it stands to reason that the company would absolutely be able to understand and sift through the data points that could be actionable,” Smith said.
Gambia has until later this month to respond to Facebook’s objections.
U.S. authorities said on Thursday that four ransomware attacks had penetrated water and wastewater facilities in the past year, and they warned similar plants to check for signs of intrusions and take other precautions.
The alert from the Cybersecurity and Infrastructure Security Agency (CISA) cited a series of apparently unrelated hacking incidents from September 2020 to August 2021 that used at least three different strains of ransomware, which encrypts computer files and demands payment for them to be restored.
Attacks at an unnamed Maine wastewater facility three months ago and one in California in August moved past desktop computers and paralyzed the specialized supervisory control and data acquisition (SCADA) devices that issue mechanical commands to the equipment.
The Maine system had to turn to manual controls, according to the alert co-signed by the FBI, National Security Agency and Environmental Protection Agency.
A March hack in Nevada also reached SCADA devices that provided operational visibility but could not issue commands.
CISA said it is seeing increasing attacks on many forms of critical infrastructure, in line with those on the water plants.
In some cases, the water facilities are handicapped by low municipal spending on technology cybersecurity.
The Department of Homeland Security agency’s recommendations include access log audits and strict use of additional factors for authentication beyond passwords.
Microsoft will close LinkedIn in China later this year, the company announced Thursday.
The professional networking site, which started operating in China in 2014, faces a “significantly more challenging operating environment and greater compliance requirements” in the country, it said in a blog post.
“We recognized that operating a localized version of LinkedIn in China would mean adherence to requirements of the Chinese government on Internet platforms,” the company said. “While we strongly support freedom of expression, we took this approach in order to create value for our members in China and around the world.”
However, it seems China’s regulatory burdens have become too much.
Chinese regulators told the company it had to better police content earlier this year, The Wall Street Journal reported. The company began blocking some content and profiles Chinese regulators prohibited, including profiles of journalists.
“While we’ve found success in helping Chinese members find jobs and economic opportunity, we have not found that same level of success in the more social aspects of sharing and staying informed,” LinkedIn said.
LinkedIn is not completely leaving the Chinese market. It will now offer something called InJobs, which will not have a social feed and will not allow users to share content, Reuters reported.
LinkedIn was the only U.S.-based social networking site still available to Chinese users.
Microsoft bought the company in 2016, and the site now boasts 774 million users.
Some information in this report comes from Reuters.
The White House is holding a two-day international conference starting Wednesday to combat ransomware computer attacks on business operations across the globe that cost companies, schools and health services an estimated $74 billion in damages last year.
U.S. officials are meeting on Zoom calls with their counterparts from at least 30 countries to discuss ways to combat the clandestine attacks. Russia, a key launchpad for many of the attacks, was left off the invitation list as Washington and Moscow officials engage directly on attacks coming from Russia.
This year has seen an epidemic of ransomware attacks in which hackers from distant lands remotely lock victims’ computers and demand large extortion payments to allow normal operations to resume.
Ransomware payments topped $400 million globally in 2020, the United States says, and totaled more than $81 million in the first quarter of 2021.
Two U.S. businesses, the Colonial Pipeline Company that delivers fuel to much of the eastern part of the country and the JBS global beef producer, were targeted in major ransomware attacks in May.
Colonial paid $4.4 million in ransom demands, although U.S. government officials were soon able to surreptitiously recover $2.3 million of the payment. JBS said it paid an $11 million demand.
Other U.S. companies were also attacked, including CNA Financial, one of the country’s biggest insurance carriers; Applus Technologies, which provides testing equipment to state vehicle inspection stations; ExaGrid, a backup storage vendor that helps businesses recover after ransomware attacks; and the school system in the city of Buffalo, New York.
Attackers have also targeted victims in other countries, including Ireland’s health care system, the Taiwan-based computer manufacturer Acer and the Asia division of the AXA France cyber insurer.
A senior White House official, briefing reporters ahead of the ransomware conference, said the U.S. views the meetings “as the first of many conversations” on ways to combat the attacks.
At a summit in Geneva in June, U.S. President Joe Biden and Russian President Vladimir Putin created a working group of experts to deal with ransomware attacks.
“We do look to the Russian government to address ransomware criminal activity coming from actors within Russia,” the White House official said. “I can report that we’ve had, in the experts group, frank and professional exchanges in which we’ve communicated those expectations. We’ve also shared information with Russia regarding criminal ransomware activity being conducted from its territory.”
“We’ve seen some steps by the Russian government and are looking to see follow-up actions,” the official said, without elaborating.
While U.S. officials say they know the identity of some of the attackers in Russia, Moscow does not extradite its citizens for criminal prosecutions.
One of the major topics at the conference, the Biden official said, will be how countries can cooperate to trace and disrupt criminal use of cryptocurrencies like Bitcoin.
The countries scheduled to join the U.S. at the ransomware conference are Australia, Brazil, Bulgaria, Canada, the Czech Republic, the Dominican Republic, Estonia, France, Germany, India, Ireland, Israel, Italy, Japan, Kenya, Lithuania, Mexico, the Netherlands, New Zealand, Nigeria, Poland, the Republic of Korea, Romania, Singapore, South Africa, Sweden, Switzerland, Ukraine, the United Arab Emirates and the United Kingdom. The European Union will also be represented.
The senior White House official said, “I think that list of countries highlights just how pernicious and transnational and global the ransomware threat has been.”
Aside from government action, the Biden administration has called on private businesses, which most often are blindsided by the ransomware attacks, to modernize their cyber defenses to meet the threat.
Social media giants were urged to act Wednesday to stem online antisemitism during an international conference in Sweden focused on the growing amount of hatred published on many platforms.
The Swedish government invited social media giants TikTok, Google and Facebook along with representatives from 40 countries, the United Nations and Jewish organizations to the event designed to tackle the rising global scourge of antisemitism.
Sweden hosted the event in the southern city of Malmo, which was a hotbed of antisemitic sentiment in the early 2000s but which during World War II welcomed Danish Jews fleeing the Nazis and inmates rescued from concentration camps in 1945.
“What they see today in social media is hatred,” World Jewish Congress head Ronald Lauder told the conference.
Google told the event, officially called the International Forum on Holocaust Remembrance and Combating Anti-Semitism, that it was earmarking 5 million euros ($5.78 million) to combat antisemitism online.
“We want to stop hate speech online and ensure we have a safe digital environment for our citizens,” French President Emmanuel Macron said in a prerecorded statement.
European organizations accused tech companies of “completely failing to address the issue,” saying antisemitism was being repackaged and disseminated to a younger generation through platforms like Instagram and TikTok.
Antisemitic tropes are “rife across every social media platform,” according to a study linked to the conference that was carried out by three nongovernmental organizations.
Hate speech remains more prolific and extreme on sites such as Parler and 4chan but is being introduced to young users on mainstream platforms, the study said.
On Instagram, where almost 70% of global users are aged 13 to 34, there are millions of results for hashtags relating to antisemitism, the research found.
On TikTok, where 69% of users are aged 16 to 24, it said a collection of three hashtags linked to antisemitism were viewed more than 25 million times in six months.
In response to the report, a Facebook spokesperson said antisemitism was “completely unacceptable” and that its policies on hate speech and Holocaust denial had been tightened.
A TikTok spokesperson said the platform “condemns antisemitism” and would “keep strengthening our tools for fighting antisemitic content.”
According to the EU’s Fundamental Rights Agency, 9 out of 10 Jews in the EU say antisemitism has risen in their country and 38% have considered emigrating because they no longer feel safe.
“Antisemitism takes the shape of extreme hatred on social networks,” said Ann Katina, the head of the Jewish Community of Malmo organization that runs two synagogues.
“It hasn’t just moved there, it has grown bigger there,” she told AFP.
Swedish Prime Minister Stefan Lofven has made the fight against antisemitism one of his last big initiatives before leaving office next month and has vowed better protection for Sweden’s 15,000-20,000 Jews.
Reports of antisemitic crimes in the Scandinavian country rose by more than 50% between 2016 and 2018, from 182 to 278, according to the latest statistics available from the Swedish National Council for Crime Prevention.
The Jewish community in Malmo has fluctuated over the years, from more than 2,000 in 1970 to just more than 600 now.
In the early 2000s, antisemitic attacks in Malmo made global headlines. Incidents included verbal insults, assaults and Molotov cocktails thrown at the synagogue.
In response, authorities vowed to boost police resources and increase funding to protect congregations under threat.
Mirjam Katzin, who coordinates antisemitism efforts in Malmo schools, the only such position in Sweden, said there was “general concern” among Jews in the city.
“Some never experience any abuse, while others will hear the word ‘Jew’ used as an insult, jokes about Hitler or the Holocaust or various conspiracy theories,” she said.your ad here
Brain computer interfaces, where computers analyze brain signals and help paralyzed people to write and carry out other actions, is a burgeoning area of research. VOA’s Deana Mitchell has the story of one breakthrough.
A tech body backed by the Australian units of Facebook, Google and Twitter said on Monday it has set up an industry panel to adjudicate complaints over misinformation, a day after the government threatened tougher laws over false and defamatory online posts.
Prime Minister Scott Morrison last week labeled social media “a coward’s palace,” while the government said on Sunday it was looking at measures to make social media companies more responsible, including forcing legal liability onto the platforms for the content published on them.
The issue of damaging online posts has emerged as a second battlefront between Big Tech and Australia, which last year passed a law to make platforms pay license fees for content, sparking a temporary Facebook blackout in February.
The Digital Industry Group Inc. (DIGI), which represents the Australian units of Facebook Inc., Alphabet’s Google and Twitter Inc., said its new misinformation oversight subcommittee showed the industry was willing to self-regulate against damaging posts.
The tech giants had already agreed a code of conduct against misinformation, “and we wanted to further strengthen it with independent oversight from experts, and public accountability,” DIGI Managing Director Sunita Bose said in a statement.
A three-person “independent complaints sub-committee” would seek to resolve complaints about possible breaches of the code conduct via a public website, DIGI said, but would not take complaints about individual posts.
The industry’s code of conduct includes items such as taking action against misinformation affecting public health, which would include the novel coronavirus.
DIGI, which also represents Apple Inc. and TikTok, said it could issue a public statement if a company was found to have violated the code of conduct or revoke its signatory status with the group.
Reset Australia, an advocate group focused on the influence of technology on democracy, said the oversight panel was “laughable” as it involved no penalties and the code of conduct was optional.
“DIGI’s code is not much more than a PR stunt given the negative PR surrounding Facebook in recent weeks,” said Reset Australia Director of tech policy Dhakshayini Sooriyakumaran in a statement, urging regulation for the industry.
Facebook, in the aftermath of damning testimony that its platforms harm children, will be introducing several features including prompting teens to take a break using its photo sharing app Instagram, and “nudging” teens if they are repeatedly looking at the same content that’s not conducive to their well-being.
The Menlo Park, California-based Facebook is also planning to introduce new controls on an optional basis so that parents or guardians can supervise what their teens are doing online. These initiatives come after Facebook announced late last month that it was pausing work on its Instagram for Kids project. But critics say the plan lacks details, and they are skeptical that the new features would be effective.
The new controls were outlined on Sunday by Nick Clegg, Facebook’s vice president for global affairs, who made the rounds on various Sunday news shows including CNN’s “State of the Union” and ABC’s “This Week with George Stephanopoulos” where he was grilled about Facebook’s use of algorithms as well as its role in spreading harmful misinformation ahead of the Jan. 6 Capitol riots.
“We are constantly iterating in order to improve our products,” Clegg told Dana Bash on “State of the Union” Sunday. “We cannot, with a wave of the wand, make everyone’s life perfect. What we can do is improve our products, so that our products are as safe and as enjoyable to use.”
Clegg said that Facebook has invested $13 billion over the past few years in making sure to keep the platform safe and that the company has 40,000 people working on these issues. And while Clegg said that Facebook has done its best to keep harmful content out of its platforms, he says he was open for more regulation and oversight.
“We need greater transparency,” he told CNN’s Bash. He noted that the systems that Facebook has in place should be held to account, if necessary, by regulation so that “people can match what our systems say they’re supposed to do from what actually happens.”
The flurry of interviews came after whistleblower Frances Haugen, a former data scientist with Facebook, went before Congress last week to accuse the social media platform of failing to make changes to Instagram after internal research showed apparent harm to some teens and of being dishonest in its public fight against hate and misinformation. Haugen’s accusations were supported by tens of thousands of pages of internal research documents she secretly copied before leaving her job in the company’s civic integrity unit.
Josh Golin, executive director of Fairplay, a children’s digital advocacy group, said that he doesn’t think introducing controls to help parents supervise teens would be effective since many teens set up secret accounts.
He was also dubious about how effective nudging teens to take a break or move away from harmful content would be. He noted Facebook needs to show exactly how they would implement it and offer research that shows these tools are effective.
“There is tremendous reason to be skeptical,” he said. He added that regulators need to restrict what Facebook does with its algorithms.
He said he also believes that Facebook should cancel its Instagram project for kids.
When Clegg was grilled by both Bash and Stephanopoulos in separate interviews about the use of algorithms in amplifying misinformation ahead of Jan. 6 riots, he responded that if Facebook removed the algorithms people would see more, not less hate speech, and more, not less, misinformation.
Clegg told both hosts that the algorithms serve as “giant spam filters.”
Democratic Sen. Amy Klobuchar of Minnesota, who chairs the Senate Commerce Subcommittee on Competition Policy, Antitrust, and Consumer Rights, told Bash in a separate interview Sunday that it’s time to update children’s privacy laws and offer more transparency in the use of algorithms.
“I appreciate that he is willing to talk about things, but I believe the time for conversation is done,” said Klobuchar, referring to Clegg’s plan. “The time for action is now.”
Congress appears poised to pass a bipartisan, $1 trillion plan that would be the largest federal investment in infrastructure in more than a decade. History shows that investing in infrastructure can transform the United States, changing how Americans move, bolstering economic prosperity, and significantly improving the health and quality of life for many.
“When the transcontinental railroad was completed in 1869, we changed the way we moved forever, opening up the entire country and from the way humans had moved previously for thousands of years by animal to machine,” Greg DiLoreto, past president of the American Society of Civil Engineers (ASCE), told VOA via email. “[And] I think we all would agree that construction of the interstate highway system changed America in ways that greatly contributed to our economic prosperity.”
In 1956, President Dwight D. Eisenhower signed the Federal-Aid Highway Act, which authorized the building of 65,000 kilometers (41,000 miles) of interstate highways — the largest American public works program in history at the time. Another earlier transformation occurred in 1936, when Congress passed the Rural Electrification Act, extending electricity into rural areas for the first time.
And the wave of projects that created modern sewage and water systems in urban areas in the late 19th and early 20th centuries left a lasting mark, providing reliable, clean water in cities and extracting pollution from sewage.
“American cities in the late 19th, early 20th century were incredibly unhealthy places,” says Richard White, professor emeritus of American history at Stanford University in California. “High child death rates, repeated epidemics, and much of that was waterborne disease that came from both ineffective sewage and impure water. And infrastructure projects changed that dramatically. Probably it’s been the most effective public health effort ever in the history of the United States.”
DiLoreto also names the construction of dams across the western United States, which increased America’s ability to farm and feed the world, as infrastructure successes. But he points out that the projects created problems for migrating fish. In fact, many of the so-called successful infrastructure projects, like interstate highways, had dark consequences.
“They increased racial stratification in the cities. They were built in such a way that they went through poorer neighborhoods, very often minority neighborhoods, walling them off from the city as a whole,” White says. “They set them apart and set in motion a set of social changes which we suffer from still. So, they hurt poorer areas, minority areas, even if they helped middle-class areas.”
White, who wrote the book “Railroaded,” about the building of the transcontinental railroads, contends the federal government funded too many railroads into areas without the traffic to sustain them.
“The railroads took government money and then went bankrupt,” White says. “They were very often utterly corrupt. The money was taken off into the private pockets behind some of the great fortunes in American history, and they never really delivered the economic and social benefits that they promised.”
And Native Americans ended up paying the price, White adds.
“Many of these railroads ended up costing Indian peoples huge amounts of land for no particular benefit,” he says. “It’s not like white settlement was particularly successful in the land the Indians lost. So, even though it was intended to raise the standard of living for everybody in the West, it didn’t necessarily do so, and the great cost was paid very often by Indian people.”
The stripped-down bipartisan version of President Joe Biden’s American Jobs Plan (AJP) pours money into transportation, utilities — including high-speed internet for rural communities — and pollution cleanup. What the bill does not appear to contain is a single transformative project.
“From the information I have, funds will be used to help us repair, replace and make our infrastructure more robust to withstand climate change and seismic risks,” DiLoreto says. “One might consider that transformative in the sense that our quality of life and economic prosperity depend on a functioning infrastructure.”
White views the bill as backward-looking rather than forward-thinking at a time when the United States needs to transform itself to adjust to a changing world, doing things differently in the future than it has in the past.
“We have our first great infrastructure bill, which is mostly intended to protect things we built in the past, which, I think, in the long run, that’s going to be seen as a failing,” White says. “And again, I’m not saying that you should allow bridges to fall into rivers, or that the roads don’t need repair. But it’s not transformative.”
There is one potentially sweeping project that could help revolutionize life in the United States.
“Broadband has had a tremendous impact on our lives,” DiLoreto says. “Without a broadband system, our ability to economically survive COVID would have been difficult.”
The current bipartisan plan provides $65 billion for broadband infrastructure.
“If broadband in this bill works as they intend it … and they bring it into poor areas which now lack broadband, that would be a good thing, that could be transformative,” White says. “That could have the same kind of consequences that rural electrification had in terms of education and lightening people’s workload and allowing them to do the kinds of work they otherwise couldn’t do. … But if they simply make it more effective for those who have it already, it’s not going to be transformative.”
Ten years ago, Steve Jobs died of pancreatic cancer at 56. He played a huge role in making Apple one of the most successful companies in the world. But what does Apple’s future look like? Karina Bafradzhian has the story, narrated by Anna Rice.
Mustang Panda is a Chinese hacking group that is suspected of attempting to infiltrate the Indonesian government last month.
The reported breach, which the Indonesians denied, fits the pattern of China’s recent cyberespionage campaigns. These attacks have been increasing over the past year, experts say, in search of social, economic and political intelligence from Asian countries and other nations across the globe.
“There’s been an upswing,” said Ben Read, director of cyberespionage analysis at Mandiant, a cybersecurity firm, in an interview with VOA. Cyber operations stemming from China are “pretty extensive campaigns that haven’t seemed to be restrained at all,” he said.
‘Large-scale and indiscriminate’
For years, China was considered the United States’ main cyber adversary, having coordinated teams both inside and outside the government conducting cyberespionage campaigns that were “large-scale and indiscriminate,” Josephine Wolff, an associate professor of cybersecurity policy at Tufts University, told VOA.
The 2014-15 hack on the U.S. Office of Personnel Management, in which the personnel records of 22 million federal workers were compromised, was a case in point — a “big grab,” she said.
After a 2015 cybersecurity agreement between then-U.S. President Barack Obama and Chinese President Xi Jinping, attacks from China declined, at least against the West, experts say.
Hacking rising with rhetoric
But as tensions rose between Beijing and Washington during the Trump presidency, Chinese cyberespionage also increased. Over the past year, experts have attributed notable hacks in the U.S., Europe and Asia to China’s Ministry of State Security, the nation’s civilian intelligence agency, which has taken the lead in Beijing’s cyberespionage, consolidating efforts by the People’s Liberation Army.
TAG-28, a Chinese state-sponsored hacking team focused on the Indian subcontinent, reportedly infiltrated targets that included the Indian government agency in charge of a database of biometric and digital identity information for more than 1 billion people, according to The Record, a media site focused on cybersecurity.
A Microsoft report released in October accuses the Chinese hacking group Chromium of targeting universities in Hong Kong and Taiwan and going after other countries’ governments and telecommunication providers.
Hafnium, the name Microsoft gave to a Chinese hacking group, was behind the Microsoft Exchange hack earlier this year, according to the company and the Biden administration. Chinese hacking teams, Microsoft reported, took advantage of a weakness in the software to grab what they could before an emergency patch could be issued.
Scooping up data
A National Public Radio investigation asserted that the Microsoft Exchange hack may have been, in part, an information scoop aimed at acquiring large amounts of data to train China’s artificial intelligence assets.
Hafnium also targets higher education, defense industry firms, think tanks, law firms and nongovernmental organizations, the Microsoft report said. Another group from China, Nickel — also known as APT15 and Vixen Panda — targets governments in Central and South America and Europe, Microsoft said.
“What you are seeing now is this realization that Chinese espionage never disappeared and has become more technologically sophisticated,” Wolff said.
White House response
The Biden administration has stepped up its response to Chinese hacking. Over the summer, the U.S. and its allies, including the European Union, NATO and the United Kingdom, accused China of being behind the Microsoft hack and called on Beijing to cease the activity.
The Biden administration has not indicted anyone related to the Microsoft Exchange hack, nor has it instituted economic or other sanctions against China.
However, the U.S. unsealed in July an indictment against four members of China’s Ministry of State Security in a separate attack conducted by a group that security researchers call Advanced Persistent Threat (APT) 40, Bronze, Mohawk and other names.
A Chinese government spokesman demanded that the U.S. drop the charges and denied the nation was behind the Microsoft Exchange hack.
“The United States ganged up with its allies to make unwarranted accusations against Chinese cybersecurity,” said Zhao Lijian, a Chinese Foreign Ministry spokesperson, in a July statement. “This was made up out of thin air and confused right and wrong. It is purely a smear and suppression with political motives.”
While China has stepped up its use of hacking, it has not crossed what some cyber experts say is a bright line in cyberespionage: public, overt hacks, such as the Russian disinformation campaign to influence the 2016 U.S. presidential election and, in May, the Colonial Pipeline ransomware hack, which was attributed to Russian-based cybercriminals.
China’s aims appear to be long term and both economic and strategic, such as shoring up its capabilities “so they are not only well defended but surpass capacities,” Philip Reiner, the CEO of the Institute for Security and Technology, told VOA.
A collective push from world leaders that cyberespionage is unacceptable might resonate with Chinese leaders in Beijing, who want to be accepted on the world stage, he said. Detailing clear consequences for state-sponsored hacks is also critical, he said.
Without a strong push from the U.S. and its allies, experts say, China’s state-sponsored cyberattacks will continue.
Facebook confirmed on Friday that some users were having trouble accessing its apps and services, days after the social media giant suffered a six-hour outage triggered by an error during routine maintenance on its network of data centers.
Some users were unable to load their Instagram feeds, while others were not able to send messages on Facebook Messenger.
“We’re aware that some people are having trouble accessing our apps and products. We’re working to get things back to normal as quickly as possible and we apologize for any inconvenience,” Facebook said in a tweet.
People swiftly took to Twitter to share memes about the second Instagram disruption this week.
Web monitoring group Downdetector showed there were more than 36,000 incidents of people reporting issues with photo-sharing platform Instagram on Friday. There were also more than 800 reported issues with Facebook’s messaging platform.
Downdetector only tracks outages by collating status reports from a series of sources, including user-submitted errors on its platform. The outage might have affected a larger number of users.
The outage on Monday was the largest Downdetector had ever seen and blocked access to apps for billions of users of Facebook, Instagram and WhatsApp.
Nearly all Americans agree that the rampant spread of misinformation is a problem.
Most also think social media companies, and the people that use them, bear a good deal of blame for the situation. But few are very concerned that they themselves might be responsible, according to a new poll from The Pearson Institute and the Associated Press-NORC Center for Public Affairs Research.
Ninety-five percent of Americans identified misinformation as a problem when they’re trying to access important information. About half put a great deal of blame on the U.S. government, and about three-quarters point to social media users and tech companies. Yet only 2 in 10 Americans say they’re very concerned that they have personally spread misinformation.
More — about 6 in 10 — are at least somewhat concerned that their friends or family members have been part of the problem.
For Carmen Speller, a 33-year-old graduate student in Lexington, Kentucky, the divisions are evident when she’s discussing the coronavirus pandemic with close family members. Speller trusts COVID-19 vaccines; her family does not. She believes the misinformation her family has seen on TV or read on questionable news sites has swayed them in their decision to stay unvaccinated against COVID-19.
In fact, some of her family members think she’s crazy for trusting the government for information about COVID-19.
“I do feel like they believe I’m misinformed. I’m the one that’s blindly following what the government is saying, that’s something I hear a lot,” Speller said. “It’s come to the point where it does create a lot of tension with my family and some of my friends as well.”
Speller isn’t the only one who may be having those disagreements with her family.
The survey found that 61% of Republicans say the U.S. government has a lot of responsibility for spreading misinformation, compared to just 38% of Democrats.
There’s more bipartisan agreement, however, about the role that social media companies, including Facebook, Twitter and YouTube, play in the spread of misinformation.
According to the poll, 79% of Republicans and 73% of Democrats said social media companies have a great deal or quite a bit of responsibility for misinformation.
And that type of rare partisan agreement among Americans could spell trouble for tech giants like Facebook, the largest and most profitable of the social media platforms, which is under fire from Republican and Democrat lawmakers alike.
“The AP-NORC poll is bad news for Facebook,” said Konstantin Sonin, a professor of public policy at the University of Chicago who is affiliated with the Pearson Institute. “It makes clear that assaulting Facebook is popular by a large margin — even when Congress is split 50-50, and each side has its own reasons.”
During a congressional hearing Tuesday, senators vowed to hit Facebook with new regulations after a whistleblower testified that the company’s own research shows its algorithms amplify misinformation and content that harms children.
“It has profited off spreading misinformation and disinformation and sowing hate,” Sen. Richard Blumenthal, D-Conn., said during a meeting of the Senate Commerce Subcommittee on Consumer Protection. Democrats and Republicans ended the hearing with acknowledgement that regulations must be introduced to change the way Facebook amplifies its content and targets users.
The poll also revealed that Americans are willing to blame just about everybody but themselves for spreading misinformation, with 53% of them saying they’re not concerned that they’ve spread misinformation.
“We see this a lot of times where people are very worried about misinformation but they think it’s something that happens to other people — other people get fooled by it, other people spread it,” said Lisa Fazio, a Vanderbilt University psychology professor who studies how false claims spread. “Most people don’t recognize their own role in it.”
Younger adults tend to be more concerned that they’ve shared falsehoods, with 25% of those ages 18 to 29 very or extremely worried that they have spread misinformation, compared to just 14% of adults ages 60 and older. Sixty-three percent of older adults are not concerned, compared with roughly half of other Americans.
Yet it’s older adults who should be more worried about spreading misinformation, given that research shows they’re more likely to share an article from a false news website, Fazio said.
Before she shares things with family or her friends on Facebook, Speller tries her best to make sure the information she’s passing on about important topics like COVID-19 has been peer-reviewed or comes from a credible medical institution. Still, Speller acknowledges there has to have been a time or two that she “liked” or hit “share” on a post that didn’t get all the facts quite right.
“I’m sure it has happened,” Speller said. “I tend to not share things on social media that I didn’t find on verified sites. I’m open to that if someone were to point out, ‘Hey this isn’t right,’ I would think, OK, let me check this.”
The AP-NORC poll of 1,071 adults was conducted Sept. 9-13 using a sample drawn from NORC’s probability-based AmeriSpeak Panel, which is designed to be representative of the U.S. population. The margin of sampling error for all respondents is plus or minus 3.9 percentage points.
Google plans to invest $1 billion in Africa over the next five years to ensure access to fast and cheaper internet and will back startups to support the continent’s digital transformation, it said on Wednesday.
The unit of U.S. tech company Alphabet Inc made the announcement at a virtual event where it launched an Africa Investment Fund, through which it will invest $50 million in startups, providing them with access to its employees, network and technologies.
Nitin Gajria, managing director for Google in Africa told Reuters in a virtual interview that the company would among others, target startups focusing on fintech, e-commerce and local language content.
“We are looking at areas that may have some strategic overlap with Google and where Google could potentially add value in partnering with some of these startups,” Gajria said.
In collaboration with not-for-profit organization Kiva, Google will also provide $10 million in low interest loans to help small businesses and entrepreneurs in Ghana, Kenya, Nigeria and South Africa so they can get through the economic hardship created by COVID-19.
Small businesses in Africa often struggle to get capital because they lack the necessary collateral required by banks in case they default. When credit is available, interest rates are usually too high.
Google said a program pioneered last year in Kenya in partnership with Safaricom that allows customers to pay for 4G-enabled phones in instalments would be expanded across the continent with mobile operators such as MTN, Orange and Vodacom.
Gajria said an undersea cable being built by Google to link Africa and Europe should come into service in the second half of next year and is expected to increase internet speeds by five times and lower data costs by up to 21% in countries like South Africa and Nigeria.
The United States is taking new steps to make sure the country’s air and surface transportation sectors will not be crippled by ransomware or cyberattacks.
Homeland Security Secretary Alejandro Mayorkas announced the measures Tuesday at a virtual cybersecurity conference, warning that recent incidents such as the SolarWinds hack and the Colonial Pipeline ransomware attack showed that “what is at stake is not simply the way we communicate or the way we work, but the way we live.”
The new security directives target what the Department of Homeland Security and the Transportation Security Administration describe as “higher risk” rail companies, “critical” airport operators, and air passenger and air cargo companies.
Mayorkas said that going forward, the rail companies will have to name a cybersecurity coordinator who will report any incidents and create contingency plans in the case of a cyberattack.
The aviation companies will also be required to appoint a cybersecurity coordinator and report incidents to the DHS’s Cybersecurity and Infrastructure Security Agency.
Similar cybersecurity directives are already in place for 2,300 critical maritime companies that, starting this month, will have to submit plans to identify and address cyber vulnerabilities.
The U.S. Coast Guard is also working with the International Maritime Organization to require that passenger and cargo vessels arriving in U.S. ports have plans to deal with cyber emergencies.
“Whether by air, land or sea, our transportation systems are of utmost strategic importance to our national and economic security,” Mayorkas said.
Spike in ransoms paid
Top U.S. officials, including Mayorkas and FBI Director Christopher Wray, have warned that cyberattacks and ransomware attacks, in particular, have become a persistent threat.
“Last year, victims paid an estimated $350 million in ransoms, a 311% increase over the prior year, with the average payment exceeding $300,000,” Mayorkas told U.S. lawmakers at a hearing last month.
“We’re now investigating over 100 different types of ransomware, each with scores of victims,” Wray added.
U.S. officials have blamed Russia for many of the attacks, saying that despite Moscow’s assurances, they have seen few indications the Kremlin is doing anything to address the problem.
Russian officials deny any role in the recent, high-profile ransomware attacks.
Speaking at a separate cybersecurity forum Tuesday, the head of U.S. Cyber Command warned the problem with ransomware is likely to persist.
“Our adversaries are targeting everyone,” General Paul Nakasone told the Mandiant Cyber Defense Summit. “What was once viewed as criminal behavior has become a national security issue.”
To help facilitate the fight against cyberattacks and ransomware attacks, U.S. lawmakers are considering several bills that would require private companies to report intrusions and attacks on the government.
“We’re optimistic the legislation will pass,” Mayorkas said Wednesday at the annual Billington CyberSecurity Summit.
“I think we’re at a point, seeing the arc of cybercrimes and the cyberthreats, that really there’s an urgency to it,” he said.your ad here