US Plans Half Million EV Charging Stations Along Highways

Several senior members of President Joe Biden’s administration led the charge Thursday for a significant practical expansion of the nationwide use of electric vehicles.

The federal government is “teaming up with states and the private sector to build a nationwide network of EV chargers by 2030 to help create jobs, fight the climate change crisis, and ensure that this game-changing technology is affordable and accessible for every American,” said Transportation Secretary Pete Buttigieg outside the headquarters of the U.S. Department of Transportation.

In the largest investment of its kind, the Biden administration is to distribute $5 billion to begin building up to a half million roadside rapid charging stations across the country for electric cars and trucks.

To rid EV drivers of “range anxiety,” there will be a “seamless network” of charging stations along the nation’s highways, said Energy Secretary Jennifer Granholm.

“Most of them will have more than one [charging] port associated with them,” Granholm added.

“The future is electric, and this administration is moving toward it at lightning speed,” she said.

“Soon we’ll be rolling out an additional two and a half billion [dollars] for a new grant program with even more funding for chargers at the community level across the country,” Buttigieg announced.

Most EVs are hampered from driving long distances by the gap between charging stations and the time it takes to recharge their batteries, which have limited range. Most new electric cars can travel about 500 kilometers or less between charging stops, although some models with ranges beyond 800 kilometers are set to come on the market in the next several years.

The federal money being distributed will “help states create a network of EV charging stations along designated Alternative Fuel Corridors, particularly along the Interstate Highway System,” according to the Transportation Department.

It is estimated that nearly $40 billion will need to be spent to build public charging stations to reach the goal of 100% EV sales in the United States by 2035.

Some analysts see a bumpy road toward Biden’s clean energy destination.

“EVs do not necessarily generate lower carbon emissions than gasoline-powered vehicles,” said Jeff Miron, vice president of research at the Cato Institute, a public policy think tank. “The energy needed to charge batteries comes from somewhere, and in some parts of the country, that source tends to be coal, which generates even more carbon than gasoline,” he told VOA.

“Building charging stations will lower the cost of using EVs, which might encourage more driving,” added Miron, who is also a senior lecturer in economics at Harvard University. “More generally, unless an anti-carbon policy raises the price of using carbon-based fuels, it is unlikely to be the most efficient way to reduce carbon emissions.”

To tap the funds, the 50 states must submit an EV Infrastructure Deployment Plan by August 1, with approvals from the federal government to come by the end of the following month.

The federal guidance requests that states explain how they will deliver projects with at least 40% of the benefits going to disadvantaged communities.

The Biden White House has an initiative named “Justice40,” which calls for a minimum of 40% of the federal funds for climate mitigation and clean energy to go to disadvantaged areas.

The initial $5 billion in funds for the public charging stations comes from the $1 trillion infrastructure law. The investment is seen as a significant contribution toward the president’s stated goal of cutting carbon emissions caused by transportation and ensuring half of new cars are electric by 2030.

“We will have to expand both the transmission grid as well as the sources of clean energy that we add to it in order to get to the president’s goal,” acknowledged Granholm.

Satellite Losses Show Threat Solar Storms Pose to Tech

As if we didn’t have enough to worry about: Some scientists are warning about the inevitable catastrophic effects on modern life from a super-sized solar storm.

These outbursts from the sun, which eject energy in the form of magnetic fields and billions of tons of plasma gas known as “flares,” are unpredictable and difficult to anticipate.

The Earth suffers a devastating direct hit every century or two, according to recent analysis of scientific data and historic accounts. In the past, these were mainly celestial events with spectacular aurora light shows but scant impact on humanity. Modern technology, however, is vulnerable to the shocks from extreme solar storms.

“It’s not as rare as an asteroid or a comet hitting the Earth, but it’s something that really needs to be dealt with by policymakers,” said Daniel Baker, distinguished professor of planetary and space physics at the University of Colorado. “Certainly, in the longer term, it’s not a question of if but when.”

Astrophysicists estimate the likelihood of a solar storm capable of causing catastrophe to be as high as 12% in a decade.

“It’s just a matter of time,” according to professor Raimund Muscheler, chair of quaternary sciences in the geology department of Lund University in Sweden. “One has to be aware of it and one has to calculate the risks and be prepared as much as possible.”

A new study of ancient ice samples conducted by the Swedish scientist concludes that a previously unknown, huge solar storm about 9,200 years ago would have crippled communications if it had hit Earth in modern times.

“A failure in one kind of sector can propagate through the system and affect a lot of other things, and I think that’s probably the thing that worries me most about storms is that they can be widespread and can have consequences in all kinds of systems that that we might not otherwise think about,” Baker said.

A relatively minor solar storm, that caused a disturbance in the Earth’s magnetic field, is blamed for the loss of as many as 40 of the 49 Starlink internet-access satellites launched February 3 from the Kennedy Space Center in Florida.

Phases of disturbance

When the sun shoots out energy, it affects Earth in phases. The first occurs here eight minutes after the solar event 150 million kilometers away, the time it takes light to travel from the sun.

The initial trouble occurs on the daylight side of the planet from the early arriving X-rays, which dramatically disrupt the ionosphere — where the Earth’s atmosphere meets space — and radio communications. They also create additional drag on some satellites, degrading their orbits, which is what happened to the Starlink satellites.

In subsequent minutes and hours, highly charged particles unleash a radioactive storm, posing a danger to astronauts in orbit.

The third phase, known as the coronal mass ejection — gas and magnetic field explosions on the surface of the sun — disturbs the planet’s magnetosphere, lighting up the sky and inducing electrical currents on the surface, which can overload power grids and speed corrosion of pipelines.

“The geomagnetic storm can actually cause transformers to burn through if they are not adequately protected,” said Muscheler of Lund University.

The power industry in North America has taken steps in recent years to harden its infrastructure to protect from the dangerous surges. U.S. government agencies have a program to deploy emergency transformers to replace those that would fail.

“Although the U.S. government has estimated the cost of a severe space weather event to be in the billions, this worst-case scenario is typically not considered by most policy planners,” said Sangeetha Abdu Jyothi, assistant professor in the computer science department at the University of California, Irvine. “In short, the risk is well-known, but not always considered during design and planning in most cases.”

Long-distance fiber-optic and submarine telecommunications cables at higher latitudes, where the Earth is more exposed, can also suffer serious damage.

“The U.S. is highly susceptible to disconnection from Europe,” Jyothi wrote in a recent research paper. “Europe is in a vulnerable location but is more resilient due to the presence of a larger number of shorter cables. Asia has relatively high resilience with Singapore acting as a hub with connections to several countries.”

The sun frequently hurls big flares at Earth, but most are not large enough to wreak havoc or don’t strike the planet directly. But, as SpaceX experienced this week, even some of the less severe flares can neutralize satellites.

“The timing is unfortunate for SpaceX,” said Bill Murtagh, program coordinator for the Space Weather Prediction Center of the National Oceanic and Atmospheric Administration. He added that the 1,500 SpaceX satellites already in orbit were not affected.

Any major solar storm poses a threat to Global Positioning System satellites, which provide accurate time signals and precise navigation, technology critical in modern life from agriculture to aviation.

A big storm can also trigger ozone depletion, meaning there are possible effects on the terrestrial climate, according to atmospheric scientists.

Previous disruptions

The societal reactions to the solar outbursts of past centuries now seem quaint, although they were sensational events at the time.

When an intense geomagnetic storm hit the Earth in September 1859, known as the Carrington Event, telegraph systems across North America and Europe failed and some operators reported receiving electrical shocks.

A solar storm in March 1989 caused power failures in Quebec, Canada.

The Halloween Storms of 2003 affected more than half of the orbiting satellites, and disrupted aviation for more than a day because planes could not be accurately tracked. Electrical service was also knocked out in parts of Europe for several hours, and transformers in South Africa were permanently damaged.

Since the Carrington Event, state-of-the-art communication has gone from the telegraph to the internet.

“Are we ready for a Carrington class event? No, we still have work to do,” Murtagh of NOAA told VOA.

“While the frequency of climate disasters is increasing gradually, we will be caught by surprise by an extreme solar event that causes significant disruptions. Most people alive today have never experienced an extreme space weather event that has a global impact during our lifetime,” Jyothi of University of California-Irvine told VOA.

She also warned that solar superstorms could cause large-scale internet outages covering the entire globe and lasting several months.

The geomagnetic storms tend to happen more frequently when there are more sunspots (each such freckle on the sun being about the size of Earth). The sun is heading into a new cycle, meaning there is an increasing likelihood of disruptive events as this cycle ramps up to its predicted peak in July 2025.

“We’re going to see more sunspots, more solar flares, more eruptions and consequently more effects on technology here on Earth,” Murtagh said.

Intensity levels

One bit of good news: Solar scientists predict this cycle will be less intense than the most active cycles of past centuries.

Society in the 21st century, however, seems unprepared for the consequences of cascading inter-connected technological failings likely to be caused by future major storms.

“The sun is the giver of life, but it can be cruel too — especially on the technology we rely on for so much of what we do today,” Murtagh said.

Congress passed a bill in 2020 directing the National Science Foundation, NASA and the Defense Department to continue supporting basic research related to space weather.

Some other governments seem less focused on the issue.

Baker recalls a letter he received from a concerned woman in France who contacted officials there for advice on how to prepare for a major geo-magnetic storm.

“We suggest you buy a chocolate cake, eat it and wait for the end of the world,” she was told, according to Baker.

China Suspected of Cyberattacks Targeting US Organizations

Media giant News Corp is investigating a cyberattack that has accessed the email and documents of some of its employees and journalists.

On Friday, New York-based News Corp, whose entities include The Wall Street Journal and the New York Post, sent an internal email to staff, stating that it had been the target of “persistent nation-state attack activity.”

“On January 20th, News Corp discovered attack activity on a system used by several of our business units,” David Kline, News Corp chief technology officer, wrote in the email.

News Corp said that as soon as it discovered the attack, it notified law enforcement and launched an investigation with the help of Mandiant, a cybersecurity firm.

The cyberattack affected a “limited number of business email accounts and documents” from News Corp headquarters as well as its News Technology Services, Dow Jones, News UK and New York Post businesses.

“Our preliminary analysis indicates that foreign government involvement may be associated with this activity, and that some data was taken,” Kline wrote. “We will not tolerate attacks on our journalism, nor will we be deterred from our reporting.”

“Mandiant assesses that those behind this activity have a China nexus, and we believe they are likely involved in espionage activities to collect intelligence to benefit China’s interests,” Dave Wong, Mandiant vice president and incident responder, said in an email to VOA.

Wong’s suspicion echoed that of human rights groups, which have also faced an increase in cyberattacks thought to originate from a “foreign government” they also believe is China.

Liu Pengyu, spokesperson for the Chinese Embassy in the U.S., told VOA in an email Friday that rather than making allegations based on speculations, he hoped there could be “a professional, responsible and evidence-based approach” to identifying cyberattacks.

“China is a staunch defender of cybersecurity and has long been a main victim of cyberthefts and attacks,” Liu said. “China firmly opposes and combats cyberattacks and cybertheft in all forms.”

Rights groups targeted

Cyberattacks might be used to intimidate those who are critical of the Chinese government, according to Peter Irwin, senior program officer for advocacy and communications at Uyghur Human Rights Project (UHRP) in Washington.

“They might want journalists to think twice before they continue to do critical work uncovering issues in the country,” Irwin told VOA, adding that his organization had also seen a major spike in cyberattacks believed to be from China in recent weeks, targeting its website and staff email.

Uyghur rights groups such as UHRP have been calling for a boycott of the Beijing Winter Olympics on social media, using the hashtag #GenocideGames and citing allegations of human rights abuses of Uyghurs and other Turkic ethnic groups in Xinjiang, where China has been accused of arbitrarily detaining more than 1 million people in internment camps.

On Tuesday, The Wall Street Journal reported that pro-China accounts had flooded Twitter messages with the #GenocideGames hashtag. Hashtag flooding is the act of hijacking a hashtag on social media platforms to dilute or change its meaning.

In early December, the U.S. announced a diplomatic boycott of the Beijing Winter Olympics, citing China’s “ongoing genocide and crimes against humanity in Xinjiang and other human rights abuses.”

Beijing denies accusations of mass detention and says that all ethnic groups in Xinjiang “live in together in harmony” and experience “healthy and balanced development.”

Tahir Imin, a Uyghur activist and founder of the Washington-based Uyghur Times, says his news organization has long been the target of cyberattacks he believes are coming from China.

Volexity, a Washington-based cybersecurity firm, stated in a September 2019 blog post that “cyberspace has become a battleground for the Uyghur people. The level of surveillance occurring in China against Uyghurs extends well beyond their borders and has fully entered the digital realm.”

“Recently, especially starting from January 10, 2022, we have seen more cyberattacks by unknown hackers aimed at the main index of English and Chinese websites of Uyghur Times,” Imin told VOA, adding that his organization’s email server had also been the target of similar attacks.

 

FBI assessment

In a speech at the Ronald Reagan Presidential Library and Museum in California, FBI Director Christopher Wray said that in the U.S., Beijing had unleashed “a massive, sophisticated hacking program that is bigger than those of every other major nation combined.”

“They’re not just hacking on a huge scale but causing indiscriminate damage to get to what they want,” Wray said. “Like in the recent Microsoft Exchange hack, which compromised the networks of more than 10,000 American companies in a single campaign alone.”

According to Salih Hudayar, president and founder of the East Turkistan National Awakening Movement, a Washington-based Uyghur independence advocacy group, his group’s website has seen a “severe increase” in cyberattacks in recent weeks, especially since the beginning of the Beijing Winter Games.

“It seems, on average, in the past 24 hours (per hour), we had over 15 million attacks against our website,” Hudayar told VOA, adding that most of the attacks were originating from Singapore.

He said he believed Singapore was being used “to mask the true location” of the origin of the attacks. “We definitely think China is behind this attack,” Hudayar said.

Use of Technology at Beijing Olympics Adds Precautions, Raises Concerns

At the 2022 Beijing Winter Olympics, China is using technology to keep athletes and visitors safe as part of its pandemic precautions. But for visitors, the use of technology can come with security and privacy concerns. Michelle Quinn reports. Carolyn Presutti contributed.

US Taking the Fight Against Terrorism to the App Store

More than a decade ago, technology giant Apple began telling its smartphone customers that if something was worth doing, “There’s an app for that.”

Starting now, the same can be said of fighting terrorism.

The U.S. National Counterterrorism Center (NCTC) Monday launched its aCTknowledge mobile app, ready for download from the Apple app store and from the NCTC website.

“The app is a one stop shop to get unclassified counterterrorism information,” a NCTC official said, speaking on the condition of anonymity in order to discuss the center’s foray into mobile apps.

Officials said a version should also be available in the coming months from Google Play, and that the information will also be available in a desktop version. 

But while the app is public, access to the full suite of features is limited to counterterrorism professionals.

NCTC officials say the initial rollout is limited to officials with the U.S. federal government and in the U.S. military.  State and local counterterrorism officials will also be getting access in the near future.

“This is a tremendous evolution of our information sharing efforts,” a NCTC expert who helped develop the aCTknowledge app told reporters.

“We’re moving from a weekly, regularized information sharing effort (via email) to a daily, near real time effort,” the expert said. “Our ability to send push notifications to partners using the app is really going to change the community, in general, because we’ll be able to immediately level-set everyone’s understanding of a counterterrorism event as it occurs.”

Like other apps, NCTC’s aCTknowledge will enable users to get notifications, search for information and follow for updates on specific terms or topics.

NCTC says the nature of the new mobile app will also allow it to see what type of information its various government partners are looking for, and make sure that data or training is made available.

Although the information being shared on the app is unclassified, officials are taking precautions to protect the systems from hackers and others who might try to misuse it.

“You’re required to use your official government email address to register,” a second NCTC expert said, speaking like the other on the condition of anonymity. “And then we have an established vetting criteria to make sure that applicants have a validated need to know.”

Officials say many of the app’s features were designed with the help of state and local first responders, including police and fire departments from across the United States.

“With the release of aCTknowledge, NCTC is delivering on our mission to innovate how we share intelligence products with our partners,” NCTC Director Christy Abizaid said in a statement late Monday. “The app empowers its users with the information they need to protect their communities from potential threats.” 

News Corp Suspects China Behind Cyberattack on Its System

News Corp disclosed on Friday it was the target of a cyberattack that accessed data of some employees, with its internet security adviser saying the hack was likely aimed at gathering “intelligence to benefit China’s interests.”

The publisher of the Wall Street Journal said the breach, discovered in late January, accessed emails and documents of a limited number of employees, including journalists, but added that cybersecurity firm Mandiant had contained the attack.

“Mandiant assesses that those behind this activity have a China nexus, and we believe they are likely involved in espionage activities to collect intelligence to benefit China’s interests,” David Wong, vice president of consulting at Mandiant, told Reuters.

The Chinese Embassy in the United States did not immediately respond to a request for comment.

“Although we are in the early stages of our investigation, we believe the activity affected a limited number of business email accounts and documents from News Corp headquarters, News Technology Services, Dow Jones, News UK, and New York Post,” company executives wrote in a letter to employees, seen by Reuters.

“Our preliminary analysis indicates that foreign government involvement may be associated with this activity, and that some data was taken.”

The company added that its other business units, including HarperCollins Publishers, Move, News Corp Australia, Foxtel, REA, and Storyful, were not targeted in the attack.

The Wall Street Journal, which reported the news first, competes with Reuters, the news division of Thomson Reuters Corp , in supplying news to media outlets.

 

Facebook Share Price Plummets, Leading Broad Rout of US Tech Stocks 

The same technology companies that helped drag the U.S. stock market back from the depths of the pandemic recession in 2021 led the market into a sharp plunge on Thursday after Meta Platforms, the company that owns Facebook, revealed that user growth on its marquee product has hit a plateau, and revenue from advertising has fallen off sharply.

Meta was not the only U.S. tech company to suffer on Thursday. Snap Inc., the owner of Snapchat; Pinterest, Twitter, PayPal, Spotify and Amazon all suffered sharp sell-offs during trading.

U.S. tech stocks are facing a variety of major challenges right now, including a possible economic slowdown, changes to privacy rules, increased regulatory pressure and competitive challenges that have pushed users — especially young people — to new platforms such as TikTok.

Every major U.S. stock index was down significantly on Thursday, with the Dow Jones Industrial Average falling by 1.45%, the S&P 500 down 2.44%, and the tech-heavy Nasdaq down 3.74%.

Meta’s Facebook struggles

Although the pain was spread broadly across the tech sector Thursday, it was the travails of Facebook that captured much of the public’s attention. The company’s shares, which were trading at $323 when the markets closed Wednesday, opened on Thursday at $242.48 and never recovered, closing at $237.76.

The 27% decline in the company’s share value translated into a loss of more than $230 billion in market value, an utterly unprecedented one-day loss for a single firm.

The share price began its tumble after the company announced for the first time ever that its total number of monthly users had not risen in the fourth quarter of 2021. Additionally, in its key North American market, Facebook saw monthly users decline slightly.

The stagnant user figures raised concerns about the company’s ability to grow even as more bad news poured in from its advertising business, which generates the overwhelming majority of the company’s profits.

Last year, Apple changed the privacy setting on its iPhones and other devices, requiring apps, including Facebook, to get each user’s explicit permission to track their activity on the internet. Prior to that change, Facebook had made extensive use of tracking software to deliver targeted advertising to its users — something its advertising clients were willing to pay a significant premium for.

Since Apple instituted the change, the majority of users have declined to allow Facebook to track their browsing, greatly diminishing the company’s ability to target advertisements. On Thursday, Meta Chief Financial Officer David Wehner told investors the company expects the changes to cost it $10 billion in advertising revenue in 2022.

Trouble with young users

Facebook has long struggled to attract younger users to its platform, and on Thursday, company officials admitted that the firm is finding it difficult to compete with TikTok, an app created by the Chinese firm ByteDance, which allows users to share brief videos.

In a call with investors, Meta CEO Mark Zuckerberg said the company’s answer to TikTok, a service called Reels, is still being developed.

“Over time, we think that there is potential for a tremendous amount of overall engagement growth” he said. “We think it’s definitely the right thing to lean into this and push as hard to grow Reels as quickly as possible and not hold on the brakes at all, even though it may create some near-term slower growth than we would have wanted.”

Zuckerberg, who holds 55% of the voting shares of Meta, giving him de facto control of the company, saw his personal wealth fall by an estimated $24 billion as a result of Thursday’s market rout.

Economic headwinds

Over the past year, investors have consistently pushed the share prices of U.S. tech firms higher. Now, though, with the Federal Reserve preparing a series of interest rate increases meant to cool the U.S. economy and slow price inflation, investors appear to be reconsidering the prices they are willing to pay.

Investors typically judge the value of a stock based on its price-to-earnings (P/E) ratio, which is determined by dividing the share price by the fraction of the company’s earnings represented by an individual share of stock.

When a company’s shares trade at a high P/E ratio that is usually because investors expect the underlying business to continue growing. However, that growth can be hampered by a slowdown in the broader economy, something many investors expect to see in the coming m

Political challenges

In addition to concerns about economic headwinds, the tech sector is facing a distinctly unfriendly regulatory environment in the U.S. Lawmakers in both parties have expressed their concern that big technology companies enjoy too much influence over areas like popular culture and political discourse but face too little accountability.

Facebook and its subsidiary, Instagram, were subjected to hostile congressional hearings last year, after a whistleblower revealed internal documents that showed the companies understood that their products could be harmful to some users but took little action to address the issue.

During the hearings, high-profile lawmakers, including Democratic Senator Elizabeth Warren, called for Facebook to be broken up into multiple, smaller companies.

 

US Lightning Bolt Leaps Into Record Books at 768 Kilometers Long

A single lightning bolt that leapt across three U.S. states has been identified as the longest ever, the U.N. weather agency said Tuesday. Dubbed a megaflash, the rare low-rate horizontal discharge covered 768 kilometers (477 miles) between clouds in Texas and Mississippi in April 2020.

It was detected by scientists using satellite technology and its distance – beating the previous record by 60 kilometer – confirmed by a World Meteorological Organization committee.

“That trip by air[plane] would take a couple of hours and in this case the distance was covered in a matter of seconds,” WMO spokesperson Clare Nullis said.

Another megaflash that occurred above Uruguay and Argentina in June 2020 also set a record, as the longest-lasting at 17.1 seconds, the WMO said.

While these two newly cataloged megaflashes never touched the ground, they serve as a reminder of the dangers of a weather phenomenon that kill hundreds of people a year.

“We reiterate our message: when thunder roars, when you see lightning — go indoors. Don’t seek shelter in a beach hut, don’t stand under a tree,” Nullis said. 

Cyberattacks Increasingly Hobble Pandemic-Weary US Schools

For teachers at a middle school in New Mexico’s largest city, the first inkling of a widespread tech problem came during an early morning staff call.

On the video, there were shout-outs for a new custodian for his hard work, and the typical announcements from administrators and the union rep. But in the chat, there were hints of a looming crisis. Nobody could open attendance records, and everyone was locked out of class rosters and grades.

Albuquerque administrators later confirmed the outage that blocked access to the district’s student database — which also includes emergency contacts and lists of which adults are authorized to pick up which children — was due to a ransomware attack.

“I didn’t realize how important it was until I couldn’t use it,” said Sarah Hager, a Cleveland Middle School art teacher.

Cyberattacks like the one that canceled classes for two days in Albuquerque’s biggest school district have become a growing threat to U.S. schools, with several high-profile incidents reported since last year. And the coronavirus pandemic has compounded their effects: More money has been demanded, and more schools have had to shut down as they scramble to recover data or even manually wipe all laptops.

“Pretty much any way that you cut it, incidents have both been growing more frequent and more significant,” said Doug Levin, director of the K12 Security Information Exchange, a Virginia-based nonprofit that helps schools defend against cybersecurity risk.

Precise data is hard to come by since most schools are not required to publicly report cyberattacks. But experts say public school systems — which often have limited budgets for cybersecurity expertise — have become an inviting target for ransomware gangs.

The pandemic also has forced schools to turn increasingly toward virtual learning, making them more dependent on technology and more vulnerable to cyber-extortion. School systems that have had instruction disrupted include those in Baltimore County and Miami-Dade County, along with districts in New Jersey, Wisconsin and elsewhere.

Levin’s group has tracked well over 1,200 cyber security incidents since 2016 at public school districts across the country. They included 209 ransomware attacks, when hackers lock data up and charge to unlock it; 53 “denial of service” attacks, where attackers sabotage or slow a network by faking server requests; 156 “Zoombombing” incidents, where an unauthorized person intrudes on a video call; and more than 110 phishing attacks, where a deceptive message tricks a user to let a hacker into their network.

Recent attacks also come as schools grapple with multiple other challenges related to the pandemic. Teachers get sick, and there aren’t substitutes to cover them. Where there are strict virus testing protocols, there aren’t always tests or people to give them.

In New York City, an attack this month on third-party software vendor Illuminate Education didn’t result in canceled classes, but teachers across the city couldn’t access grades. Local media reported the outage added to stress for educators already juggling instruction with enforcing COVID-19 protocols and covering for colleagues who were sick or in quarantine.

Albuquerque Superintendent Scott Elder said getting all students and staff online during the pandemic created additional avenues for hackers to access the district’s system. He cited that as a factor in the Jan. 12 ransomware attack that canceled classes for some 75,000 students.

The cancellations — which Elder called “cyber snow days” — gave technicians a five-day window to reset the databases over a holiday weekend.

Elder said there’s no evidence student information was obtained by hackers. He declined to say whether the district paid a ransom but noted there would be a “public process” if it did.

Hager, the art teacher, said the cyberattack increased stress on campus in ways that parents didn’t see.

Fire drills were canceled because fire alarms didn’t work. Intercoms stopped working.

Nurses couldn’t find which kids were where as positive test results came in, Hager said. “So potentially there were students on campus that probably were sick.” It also appears the hack permanently wiped out a few days worth of attendance records and grades.

Edupoint, the vendor for Albuquerque’s student information database, called Synergy, declined to comment.

Many schools choose to keep attacks under wraps or release minimal information to prevent revealing additional weaknesses in their security systems.

“It’s very difficult for the school districts to learn from each other, because they’re really not supposed to talk to each other about it because you might share vulnerabilities,” Elder said.

Last year, the FBI issued a warning about a group called PYSA, or “Protect Your System, Amigo,” saying it was seeing an increase in attacks by the group on schools, colleges and seminaries. Other ransomware gangs include Conti, which last year demanded $40 million from Broward County Public Schools, one of the nation’s largest.

Most are Russian-speaking groups that are based in Eastern Europe and enjoy safe harbor from tolerant governments. Some will post files on the dark web, including highly sensitive information, if they don’t get paid.

While attacks on larger districts garner more headlines, ransomware gangs tended to target smaller school districts in 2021 than in 2020, according to Brett Callow, a threat analyst at the firm Emsisoft. He said that could indicate bigger districts are increasing their spending on cybersecurity while smaller districts, which have less money, remain more vulnerable.

A few days after Christmas, the 1,285-student district of Truth or Consequences, south of Albuquerque, also had its Synergy student information system shut down by a ransomware attack. Officials there compared it to having their house robbed.

“It’s just that feeling of helplessness, of confusion as to why somebody would do something like this because at the end of the day, it’s taking away from our kids. And to me that’s just a disgusting way to try to, to get money,” Superintendent Channell Segura said.

The school didn’t have to cancel classes because the attack happened on break, but the network remains down, including keyless entry locks on school building doors. Teachers are still carrying around the physical keys they had to track down at the start of the year, Segura said.

In October, President Joe Biden signed the K-12 Cybersecurity Act, which calls for the federal cyber security agency to make recommendations about how to help school systems better protect themselves.

New Mexico lawmakers have been slow to expand internet usage in the state, let alone support schools on cyber security. Last week, state representatives introduced a bill that would allocate $45 million to the state education department to build a cybersecurity program by 2027.

Ideas on how to prevent future hacks and recover from existing ones usually require more work from teachers.

In the days following the Albuquerque attack, parents argued on Facebook over why schools couldn’t simply switch to pen and paper for things like attendance and grades.

Hager said she even heard the criticism from her mother, a retired school teacher.

“I said, ‘Mom, you can only take attendance on paper if you have printed out your roster to begin with,'” Hager said.

Teachers could also keep duplicate paper copies of all records — but that would double the clerical work that already bogs them down.

In an era where administrators increasingly require teachers to record everything digitally, Hager says, “these systems should work.”

Myanmar Cybersecurity Law ‘Days’ Away as Coup Anniversary Nears

Myanmar’s military government is set to pass a new cybersecurity law that will ban the use of internet services, a move that has been condemned by digital rights activists and business groups.

The Southeast Asian country has been in turmoil since a coup by the military last February. A widespread grassroots movement has seen thousands refuse to accept military rule, with anti-coup communications and demonstrations now largely mobilized online.

But a draft bill released by the junta, if passed, would criminalize the use of virtual private networks and online gambling, carrying a punishment of one to three years’ imprisonment and fines of up to $2,800.

The first draft of the bill was released last year, but progress on the legislation slowed after substantial public outcry and industrywide criticism. The legislation is expected to become law next week.

“We are speculating the bill will actually be official within just a few days, it might come before the first of February,” Ma Htike, a digital rights activist, told VOA.

People living in Myanmar rely heavily on internet access, especially social media platforms such as Facebook, for news, and many have struggled to get online since the junta took control of the country’s telecommunication regulators after the Feb. 1, 2021, coup. Major Norwegian telecommunication operator Telenor recently quit its operations inside the country because of the political situation.

The military regularly shuts down the internet, routinely blocks social media platforms and censors what information can be found online, all in the name of ensuring national “stability.”

But political analyst Aung Thu Nyein describes the latest draft legislation as unusually severe.

“The leaked new communication law is the most draconian law restricting many freedoms and privacy of a person,” he told VOA. “This law could be a major roadblock to technological development as well, such as prohibiting the use of digital coins and blockchain technology, etc.

“It is definitely for the purpose of oppression of freedom of speech and a tool for control,” he said.

Junta-enforced regional internet blackouts make VPNs vital to accessing independent news online via private networks outside of the country.

According to Top10VPN, Myanmar went without internet access for 72 consecutive days from February to April of last year, driving demand for VPNs up by 7,200%. The report also says the shutdowns came at a cost, with Myanmar suffering nearly $3 billion in lost revenue, according to the indicators from the World Bank, The International Telecommunication Union, Eurostat and the U.S. Census.

Htike says most of Myanmar’s citizens continue to struggle with the blackouts.

“There are still various locations that the mobile internet has not been available,” she told VOA, adding that junta-backed regulators have scheduled price increases for internet subscriptions, which is likely to pose “a big obstacle” for most citizens in a country with typically low per capita incomes.

“[The] internet plays a pivot role to send information to all parts of the country, from cities to remote corners,” said Aung Htun, a journalist for Burma VJ, an informal network of professional and citizen video journalists who pool footage. “That’s why the military tried to raise the data fees higher than previously.”

In its attempts to control the flow of information, the Myanmar military has also cracked down on the country’s media. According to Reporting ASEAN, a monitoring group in Southeast Asia, 120 journalists have been arrested with 49 still detained and 16 convicted. The licenses of at least five media outlets have been revoked.

Aung Htun also says the looming internet restrictions under the new law will put people at increased risk of arrest in public, where the military sometimes randomly searches phones.

“It’s getting more difficult to hide data in your phone. It’s better to use simple ways; don’t keep any important data in your phone,” he said, adding that journalists must “stay low, and try to be in touch with your colleagues [only] by secure network.”

Freedom House, a nonprofit research institute that ranks internet freedom by country on a scale in which 100 is “most free,” placed Myanmar at 17 in 2021.

Ten foreign businesses and industry groups in Myanmar said in a joint letter they are “deeply concerned” over the latest draft of the cybersecurity law.

“If enforced, the current draft disrupts the free flow of information and directly impacts businesses’ abilities to operate legally and effectively in Myanmar,” the statement read.

Htike said the new law could force customers to break the law in order to use basic business services.

“Myanmar’s economy really declined after the coup, but still small businesses have used social media and networks, but with this kind of [restriction] it’s going to be very difficult,” she added.

Feb. 1 marks one year since the Myanmar military removed the country’s democratically elected government. To mark the anniversary, anti-coup activists have called for a silent strike, which leaves the streets of towns and cities across Myanmar deserted.

“Silent strikes are a good strategy for people to get involved,” said Htike, who also warned that risks remain whether you’re demonstrating in the streets or online.

Myanmar’s military routinely stops and searches people to check phones for evidence of VPN activity, such as whether the phone has Facebook access, which is impossible without a VPN.

They also surveil the web for digital anti-junta activity.

In a silent protest, Htike added, “it might be difficult for [the military] to do search and seizure [on empty streets], but [even] if people are active [only] online, they can [still] be targeted there.”

Myanmar, formerly known as Burma, gained independence from Britain in 1948, but most of its modern history has been under military rule.

After a brief period of civilian rule, the military in November 2020 began making unsubstantiated claims of electoral fraud. On Feb. 1 of 2021, the military removed the democratically elected government and arrested leader Aung San Suu Kyi and President Win Myint, both of whom have since been sentenced to several jail terms.

Widespread opposition to military rule has resulted in thousands of arrests and at least 1,499 killings, according to the Thai-based Assistance Association for Political Prisoners.

Innovative Electric Vehicles on Display at Washington Auto Show

Electric vehicles are in high demand as gas prices and concerns about carbon emissions and global warming climb. From the 2022 Washington Auto Show, VOA’s Saqib Ul Islam examines where consumers and car manufacturers think all-electric vehicles are heading in the future.

Camera: Saqib Ul Islam Produced by: Saqib Ul Islam

FAA, Telecom Companies to Turn On More 5G Towers

The U.S. Federal Aviation Administration announced Friday U.S.-based telecommunications companies AT&T and Verizon can activate more of their fifth-generation, or 5G, transmitters after consultation with the agency. 

Earlier this month, the telecommunication companies agreed they would delay launching the new wireless service near key airports after weeks of legal wrangling with the nation’s largest airlines and U.S. government regulators that feared the 5G service would interfere with aircraft technology and cause massive flight disruptions. 

But in its release Friday, the FAA said both companies provided additional data about the exact location of wireless transmitters and supported more thorough analysis of how 5G C-band signals interact with aircraft instruments. 

The agency said it used that data to precisely map the size and shape of the areas around airports where 5G signals might interfere with aircraft, allowing the regulators to shrink the areas where wireless operators had to delay their antenna activations. 

The FAA said that will allow wireless providers to safely turn on more towers as they deploy new 5G service in major markets across the country. The agency expressed its appreciation for the “collaborative approach” AT&T and Verizon took in providing the data. 

The FAA says it is continuing to work with helicopter operators and others in the aviation community to ensure they can safely operate in areas of current and planned 5G deployment. 

Some information for this report came from Reuters. 

 

Toyota Heading to Moon with Cruiser, Robotic Arms, Dreams

Toyota is working with Japan’s space agency on a vehicle to explore the lunar surface, with ambitions to help people live on the moon by 2040 and then go live on Mars, company officials said Friday.

The vehicle being developed with the Japan Aerospace Exploration Agency is called Lunar Cruiser, whose name pays homage to the Toyota Land Cruiser sport utility vehicle. Its launch is set for the late 2020’s.

The vehicle is based on the idea that people eat, work, sleep and communicate with others safely in cars, and the same can be done in outer space, said Takao Sato, who heads the Lunar Cruiser project at Toyota Motor Corp.

“We see space as an area for our once-in-a-century transformation. By going to space, we may be able to develop telecommunications and other technology that will prove valuable to human life,” Sato told The Associated Press.

Gitai Japan Inc., a venture contracted with Toyota, has developed a robotic arm for the Lunar Cruiser, designed to perform tasks such as inspection and maintenance. Its “grapple fixture” allows the arm’s end to be changed so it can work like different tools, scooping, lifting and sweeping.

Gitai Chief Executive Sho Nakanose said he felt the challenge of blasting off into space has basically been met but working in space entails big costs and hazards for astronauts. That’s where robots would come in handy, he said.

Since its founding in the 1930s, Toyota has fretted about losing a core business because of changing times. It has ventured into housing, boats, jets and robots. Its net-connected sustainable living quarters near Mount Fuji, called Woven City, where construction is starting this year.

Japanese fascination with the moon has been growing.

A private Japanese venture called ispace Inc. is working on lunar rovers, landing and orbiting, and is scheduled for a moon landing later this year. Businessman Yusaku Maezawa, who recently took videos of himself floating around in the International Space Station, has booked an orbit around the moon aboard Tesla CEO Elon Musk’s Starship.

Toyota engineer Shinichiro Noda said he is excited about the lunar project, an extension of the automaker’s longtime mission to serve customers and the moon may provide valuable resources for life on Earth.

“Sending our cars to the moon is our mission,” he said. Toyota has vehicles almost everywhere. “But this is about taking our cars to somewhere we have never been.” 

Nigerian Language Advocates Seek Inclusion of African Languages in Tech Devices

Voice-activated virtual assistant technologies, such as Siri and Alexa, are becoming increasingly common around the world, but in Africa, with its many languages, most people are at a digital disadvantage. To address the problem, some African researchers are creating translation tools to recognize and promote indigenous languages, such as Yoruba. 

Yoruba language teacher Oluwafemi Awosanya resumes a day’s classes with his students. He has been teaching the language for 10 years, but says he often struggles to migrate his class modules to an online students’ blogsite he created because there is no speech recognition technology for Yoruba.  

“Yoruba language is a language that has to do with signs at the top, so I need to go (the) extra mile. When typing my notes, I have to first type on Microsoft Word and even when I type on Microsoft Word it gives me best highlighting, like your words are not correct,” Awosanya said.

Awosanya spends several hours manually editing and correcting his notes before uploading them to his blog. 

He says despite technological advances in Africa, languages like Yoruba, one of the most commonly spoken in Nigeria, remain neglected, affecting his students.  

“It limits knowledge. There are things you wish you want to educate the children on, things you want to exhibit in the classes…” Awosanya said.

More than 2,000 distinct languages are spoken in Africa. Researchers say two-thirds of the native speakers miss out on emerging technologies due to language limitations in the tech world. 

Nigerian writer and language advocate Kola Tubosun says the issue threatens Africa’s technological future. He has since been trying to promote inclusivity for his native Yoruba tongue. 

He created an online Yoruba dictionary as well as a text-to-speech machine that translates English to Yoruba. He said the initiative was partly inspired by his grandfather, who could not read or write in English. 

“If a language doesn’t exist in the technology space, it is almost as if it doesn’t exist at all. That is the way the world is structured today and in that you spend all your time online every day and the only language you encounter is English, Spanish or Mandarin or whatever else, then it tends to define the way you interact with the world. And over time you tend to lose either the interest in your own language or your competence [competency in that language],” Tubosun said. 

Tubosun, who advocates for including African languages in technology, says the tech giants are starting to pay attention even though the gap remains very wide.    

“There are lots of obstacles. Some languages are not written down at all; some don’t have scripts. Some have scripts but don’t have so many people using the languages or writing them in education or using them in daily conversations,” Tubosun said. 

Language experts say it will take a long time before African languages are widely adopted in voice-driven technology.    

In the meantime, researchers like Tubosun and Awosanya will be working to adapt the Yoruba language for technology users.  

California Hotels Use Robots to Do Service Jobs

The current difficulty in filling many service jobs in the U.S. is leaving hotels scrambling to provide room service. But with a bit of ingenuity and a little high-tech help some American hotels are finding a way. Angelina Bagdasaryan has the story, narrated by Anna Rice.

Nigerian Language Advocates Call for Including African Languages in High Tech Devices

Voice activated virtual assistant technologies, such as Siri and Alexa, are becoming increasingly common around the world but in Africa, with its many languages, most people are at a digital disadvantage.  To address the problem, some African researchers are creating translation tools to recognize and promote indigenous languages, such as Yoruba. Timothy Obiezu in Abuja has details.

Camera: Emeka Gibson  

Delay in Creating New US Cybersecurity Board Prompts Concern

It’s a key part of President Joe Biden’s plans to fight major ransomware attacks and digital espionage campaigns: creating a board of experts that would investigate major incidents to see what went wrong and try to prevent the problems from happening again — much like a transportation safety board does with plane crashes.

But eight months after Biden signed an executive order creating the Cyber Safety Review Board it still hasn’t been set up. That means critical tasks haven’t been completed, including an investigation of the massive SolarWinds espionage campaign first discovered more than a year ago. Russian hackers stole data from several federal agencies and private companies.

Some supporters of the new board say the delay could hurt national security and comes amid growing concerns of a potential conflict with Russia over Ukraine that could involve nation-state cyberattacks. The FBI and other federal agencies recently released an advisory — aimed particularly at critical infrastructure like utilities — on Russian state hackers’ methods and techniques.

“We will never get ahead of these threats if it takes us nearly a year to simply organize a group to investigate major breaches like SolarWinds,” said Sen. Mark Warner, a Virginia Democrat who leads the Senate Intelligence Committee. “Such a delay is detrimental to our national security and I urge the administration to expedite its process.”

Biden’s order, signed in May, gives the board 90 days to investigate the SolarWinds hack once it’s established. But there’s no timeline for creating the board itself, a job designated to Department of Homeland Security Secretary Alejandro Mayorkas.

In response to questions from The Associated Press, DHS said in a statement it was far along in setting it up and anticipated a “near-term announcement,” but did not address why the process has taken so long.

Scott Shackelford, the cybersecurity program chair at Indiana University and an advocate for creating a cyber review board, said having a rigorous study about what happened in a past hack like SolarWinds is a way of helping prevent similar attacks.

“It sure is taking, my goodness, quite a while to get it going,” Shackelford said. “It’s certainly past time where we could see some positive benefits from having it stood up.”

The Biden administration has made improving cybersecurity a top priority and taken steps to bolster defenses, but this is not the first time lawmakers have been unhappy with the pace of progress. Last year several lawmakers complained it took the administration too long to name a national cyber director, a new position created by Congress.

The SolarWinds hack exploited vulnerabilities in the software supply-chain system and went undetected for most of 2020 despite compromises at a broad swath of federal agencies and dozens of companies, primarily telecommunications and information technology providers. The hacking campaign is named SolarWinds after the U.S. software company whose product was exploited in the first-stage infection of that effort.

The hack highlighted the Russians’ skill at getting to high-level targets. The AP previously reported that SolarWinds hackers had gained access to emails belonging to the then-acting Homeland Security Secretary Chad Wolf.

The Biden administration has kept many of the details about the cyberespionage campaign hidden.

 

The Justice Department, for instance, said in July that 27 U.S. attorney offices around the country had at least one employee’s email account compromised during the hacking campaign. It did not provide details about what kind of information was taken and what impact such a hack may have had on ongoing cases.

The New York-based staff of the DOJ Antitrust Division also had files stolen by the SolarWinds hackers, according to one former senior official briefed on the hack who was not authorized to speak about it publicly and requested anonymity. That breach has not previously been reported. The Antitrust Division investigates private companies and has access to highly sensitive corporate data.

The federal government has undertaken reviews of the SolarWinds hack. The Government Accountability Office issued a report this month on the SolarWinds hack and another major hacking incident that found there was sometimes a slow and difficult process for sharing information between government agencies and the private sector, The National Security Council also conducted a review of the SolarWinds hack last year, according to the GAO report.

But having the new board conduct an independent, thorough examination of the SolarWinds hack could identify inconspicuous security gaps and issues that others may have missed, said Christopher Hart, a former National Transportation Safety Board chairman who has advocated for the creation of a cyber review board.

“Most of the crashes that the NTSB really goes after … are ones that are a surprise even to the security experts,” Hart said. “They weren’t really obvious things, they were things that really took some deep digging to figure out what went wrong.”

California Nursing Homes Use Robotic Pets to Help the Elderly

In a California senior care community, very special pets are helping residents keep their spirits up, fight anxiety and feel loved. Officials say these animals are therapeutic, low-maintenance and never get moody. Angelina Bagdasaryan has the story, narrated by Anna Rice.

Camera: Vazgen Varzhabetian             

UAE Bans Flying of Recreational Drones After Fatal Attack

The United Arab Emirates has banned the flying of drones in the country for recreation after Yemen’s Houthi rebels claimed a fatal drone attack on an oil facility and major airport in the country.

As of Saturday, drone hobbyists and other operators of light electric sports aircraft face “legal liabilities” if caught flying the objects, the Interior Ministry said, adding it may grant exemptions to businesses seeking to film.

A rare drone and missile strike on the capital of Abu Dhabi blew up several fuel tankers and killed three people last week.

The Houthis, who hold Yemen’s capital and have fought a bloody, yearslong war with a Saudi-led military coalition that includes the UAE, claimed the assault. While the UAE has largely withdrawn troops from the stalemated conflict, the country continues to be a major player and support local militias on the ground.

The UAE said the Houthis targeted the country with bomb-laden drones and cruise and ballistic missiles, adding the country had intercepted some of the projectiles. In response to the strike, the Saudi-led coalition has escalated attacks on the rebel-held parts of Yemen in the last week.

Government regulations in the UAE already restrict flying drones in residential areas as well as near, around and over airports. Drone users typically must obtain a certificate from the civil aviation authorities. 

 

Facebook Removes Kurdish Pages Linked to Misinformation on Belarus Migrant Crisis

Meta, the parent company of Facebook, has removed two popular Kurdish Facebook pages accused of spreading misinformation that helped convince thousands of Kurds to mass along the border of Belarus and Poland late last year.

The two accounts, one from a Kurdish lawmaker with 143,000 followers and another belonging to a Kurdish journalist with nearly 270,000 followers, were spreading misinformation that falsely claimed Kurds who went to the Belarus-Poland border would be allowed into the European Union.

There was no such immigration plan. Instead, frustrated crowds clashed with border guards and thousands were later deported. 

The false posts were among many seen by Kurds who traveled to the border area and were interviewed by VOA.

“We followed the crowd towards the Polish borders after rumors on Facebook. It resulted in nothing more than adversity for this destitute people,” said Hersh Saeed Ahmad, a Kurdish migrant in Belarus.

But the accounts on Facebook continued to publish widely read posts until earlier this month when VOA contacted Meta asking if the pages were violating the company’s policies. 

“Meta has decided both pages violated our policies for misinformation under Violence & Incitement Community Standards, and both have been taken down,” a spokesperson from the company told VOA in an email.

The episode illustrates how the social media network continues to struggle to police even well-known spreaders of misinformation who are involved in high-profile news events, especially when misinformation is being published in languages other than English.

Spreading misinformation 

The Belarus-EU border crisis began last July and worsened by November, when thousands of migrants from the Middle East, North Africa and Iraqi Kurdistan, attempted to cross into the EU from Belarus.

In mid-November, violence broke out at the Polish border when security forces used tear gas and water cannons to prevent migrants from breaking the border fencing. Polish police at the time reported several injuries in their ranks from migrants throwing stones at them.

At the time, Facebook told news outlets that it was working to shut down information about human trafficking in the region.

But two prominent Kurdish Facebook pages continued to traffic in misinformation about the situation at the border until earlier this month.

Sirwan Baban, a member of the Kurdistan Regional Parliament, and Ranj Pshdary, a Kurdish journalist based in Greece, used their pages on Facebook to tell their followers in early November that the EU and Germany had decided to open their borders to let in migrants stranded on a Belarus-Poland border point.

 

It was a claim denied by EU officials at the time, but thousands of migrants, mostly Kurds, still stormed the Polish border fence and clashed with police.

VOA interviews with officials in the Kurdistan Region of Iraq and Kurdish migrants in Belarus confirmed that misinformation on Facebook, including from Baban and Pshdary, helped to lure thousands of people towards the Polish border.

Hersh Saeed Ahmad, a 36-year-old Kurd from Sulaimani province, is among those migrants who, after reading posts on social media, took his wife and 4-year-old child to the Polish border in November.

“Our situation after the storming turned from bad to worse,” he said. “Our admission by Germany was nothing more than lies and rumors on Facebook.”

Another migrant, Bahadin Muhsin Qadir, said they were told the Polish security at the border had announced through loudspeakers that they will be transferred through buses to Germany.

The standoff at the border during extreme weather conditions left more than a dozen people dead, according to human rights activists, who say the total number is likely higher but hard to confirm due to restricted access to the area.

Ari Jalal, the head of Kurdish foundation Lutka for Refugees and Migrants, told VOA that his group registered two deaths among the Kurds at the border. He said about 4,000 migrants have since returned to the Kurdistan Region of Iraq, with about 1,100 people remaining in Belarus camps.

“In addition to bodily and material damage, the Kurdish migrants are also psychologically broken down completely,” said Jalal, while expressing his frustration at “how gullible Kurdish youth can be manipulated by livestream videos on social media.” 

Facebook’s efforts 

Working with independent experts, Meta says it works to detect and remove harmful false claims that could contribute to the risk of imminent violence or physical harm ­— such as claims in Arabic and Kurdish that either the Polish border is open to migrants or Germany is sending buses for the migrants to the border. 

In November, The New York Times reported that an account belonging to a Kurdish-German influencer widely known online as Karwan Rawanduzy was disabled on Facebook for frequently promoting bogus stories that fueled the crisis.

In early December, Meta released a threat report saying it removed 38 Facebook accounts, five groups and four Instagram accounts linked to the Belarusian KGB that were inflaming the migrant crisis. It also reported taking down 31 Facebook accounts, four groups, two Facebook events and four Instagram accounts that originated in Poland and targeted Belarus and Iraq.

Despite those high-profile takedowns, the social media giant missed other far-reaching pages that were still being used to mislead migrants.

False claim of open border 

In the case of Sirwan Baban, a lawmaker, and Ranj Pshdary, who calls himself a journalist, both with thousands of followers, Facebook for months served as their main medium to encourage migrants to amass at the Polish border.

Pshdary, 32, from Iraqi Kurdistan’s Qaladza town, has gained recognition in Kurdish media for his role in covering the Belarus crisis. On November 13, he went live on Facebook to tell migrants “the great news” that the EU was going to open its doors to let them in. In the video, viewed and shared by thousands, people claiming to be migrants in Belarus or their relatives, joined Pshdary’s call in encouraging the migrants to prepare to cross into Poland “in the next couple of days.”

“The Polish border will be opened to migrant on November 15 and the migrants will be sent to Germany via buses,” Pshdary said.

Three days later, thousands of migrants, mostly Kurds, headed from a Belarus forest to the Polish border, anticipating a crossing into Poland. They clashed with the Polish police, but no migrants crossed over.

Pshdary, in another live Facebook video titled “I confess that we failed,” admitted he had intentionally misled people.

“I don’t want to conceal from you that I was the organizer of the crowd. On Friday, [Nov. 12, 2021], I met with the representatives of the migrants… Seeing that the Belarus police were torturing a lot of young migrants, there was no option but to encourage those people to cut the barbed wire fence so that those young people can be seen as perpetrators and violated against [by the Polish security].”

Pshdary said in his Facebook Live he believed that falsely saying the border was open would have created a spectacle with women, children and older migrants out in the cold, thus embarrassing EU politicians and forcing them to open their doors on a humanitarian basis.

When reached by VOA, Pshdary insisted that his plan was “good intentioned” and aimed at helping the migrants who desperately reached out to him for a way out.

Lawmaker resigns from diaspora committee

Lawmaker Sirwan Baban, who served as a member of the Kurdistan Regional Parliament’s diaspora committee at the time of the crisis, gave similar false hopes to migrants on Facebook and on TV.

On November 8, he appeared in a live interview with the Kurdish media network Rudaw, which was streamed live on Facebook with 755,000 views, claiming he had access to a “proclamation” from the EU: “It says the migrant situation in Belarus has escalated and become tragedy and a global issue. Therefore, the European Union has met tonight, telling Poland, ‘Let Belarus continue its dictatorship. You open your borders and allow the migrants in. Once in Poland, we will distribute them among other European countries.'” 

In an interview with VOA, Baban denied coordinating his false information about border openings with Pshdary, claiming that he had received reliable information that the EU’s refugee committee and some German officials had made a “recommendation” to let in the migrants. However, he declined to share the source of his information with VOA.

“This issue is portrayed this way in Kurdistan only to implicate me,” he added. 

In addition to using his Facebook page, Baban also went live on several Facebook groups and other social media pages to promote the story which — at the time — was also denied by Kurdish Foreign Relations officer Safin Dizayee in an interview with VOA Kurdish Service.

Among videos Baban posted of alleged migrants celebrating and thanking him for his efforts to influence EU officials is a young girl introducing herself as Saya and saying, “Mr. Sirwan Baban, the parliamentarian, thank you very much for such a great news … I will see you in Germany.”

The Kurdistan Regional Parliament’s diaspora committee in an urgent statement on November 11 accused Baban of spreading misinformation “that pushes the youth into harm’s way.”

The head of the committee, Rebwar Babkai, told VOA that Baban has since been forced to resign from the committee due to his role in spreading the misinformation.

“I hope this is a lesson to all of us holding a public position to feel the responsibility of our jobs,” Babkai said, adding it was unclear if his region’s government was going to take further action against Baban.

Limits of Facebook’s enforcement? 

Some social media observers say Facebook’s failure to detect those pages after months of misinformation shows “a gap” that needs to be filled particularly in non-English content.

“I think Facebook needs to do more when it comes to content in local languages,” said Dlshad Othman, a Kurdish cybersecurity expert based in Washington.

Othman said the social media company has improved over the years in moderating content in major Middle Eastern languages such as Arabic, often at the expense of languages for smaller populations like the Kurds. A Facebook representative declined to answer VOA questions about how many Kurdish-literate moderators the company employs. 

Moustafa Ayad is the executive director for Africa, Middle East and Asia at the UK-based Institute for Strategic Dialogue, a research group that monitors online extremism and disinformation. He told VOA that while Facebook’s technical advances such as the development of artificial intelligence have been helpful in countering disinformation, the company needs to do more.

“I believe all of these issues can be fixed with effective moderation in those languages,” he said. “It is not only just language skills but also an understanding of what is happening in those countries in a geopolitical and social level.” 

Facebook says it works with law enforcement, academics, non-profit organizations and others to detect and remove harmful false claims, ads, posts, pages and groups about people smuggling over international borders, and did so during the crisis in Belarus. It uses technology, human review and “reports from our users and trusted partners to detect and remove such content,” said a Meta spokesperson in an email to VOA.

“We remove this content as soon as we become aware of it regardless of who posts the content,” the spokesperson said.

 

While their pages were removed, the journalist and lawmaker still have a presence on Facebook.

As of January 19, Pshdary, the journalist, has a personal account with 3,600 followers. 

The lawmaker Baban’s personal account has over 15,000 followers. On a recent post, he invites viewers to like his new page created on January 22.

 

Biden Pushes Expansion of Domestic Semiconductor Manufacturing

U.S. President Joe Biden touted a $20 billion investment by American technology company Intel to build a semiconductor factory in Ohio to address a global shortage that has been exacerbated by the COVID-19 pandemic and the U.S.-China trade war.

In a speech from the White House on Friday, Biden said the Intel factory, part of the administration’s effort to work with the private sector, would create thousands of jobs. He urged Congress to pass legislation to further expand domestic chip manufacturing, framing it in the context of strategic competition with China.

“Today 75% of the production takes place in East Asia; 90% of the most advanced chips are made in Taiwan,” Biden said. “China is doing everything it can to take over the global market so they can try to outcompete the rest of us.”

Semiconductor chips function as the brains of cars, medical equipment, household appliances and electronic devices.

The $20 billion factory is an initial investment, said Patrick Gelsinger, chief executive officer of Intel, at the White House event.

“This site alone could grow to as much as $100 billion of total investment over the decade,” he said.

The White House pointed to other investments in semiconductor manufacturing in the United States earlier this year by Samsung, Texas Instruments and Micron.

“Congress can accelerate this progress by passing the U.S. Investment and Competition Act, also known as USICA, which the president has long championed and which he called for action on today,” said White House press secretary Jen Psaki, referring to legislation that aims to strengthen research, development and manufacturing for critical supply chains to address semiconductor shortages.

Driven by Washington’s desire to retain an edge over China’s technological ambitions, USICA was passed with rare bipartisan Senate support in June but still needs to be passed by the House of Representatives. It includes full funding for the CHIPS for America Act, which provides $52 billion to catalyze more private sector investments in the semiconductor industry.

“The Chinese have been really clear. They want an indigenous chip industry. They want to be globally dominant, and that means displacing the U.S. and others,” James Lewis, director of the technology and public policy program at the Center for Strategic and International Studies, told VOA.

The U.S. share of global semiconductor production has fallen from 37% to 12% over the past 30 years, according to government data.

Pandemic impact

The COVID-19 pandemic and extreme changes in consumer demand during lockdowns have exacerbated fragility in the global semiconductor supply chain.

“Consumer demand increased rapidly for items such as home computers, while supply could not keep up and many Chinese manufacturers were locked down,” Nada Sanders, professor of supply chain management at the D’Amore-McKim School of Business at Northeastern University, told VOA.

Meanwhile, the U.S.-China tariff war that began under the Trump administration and geopolitical conflicts between the two global rivals have made the environment even less conducive for cooperation, Sanders said.

The Intel factory will not be operational until 2025, but analysts say the initiative will still be effective to secure the supply of chips in the long run.

“You cannot underestimate demand for this stuff. It grows at about 10% a year,” Lewis said.

As the U.S. expands its domestic chip manufacturing capacity, analysts say a key component is working with international partners, including South Korea, Taiwan and Japan, to fill in the supply gap.

Earlier Friday, Biden discussed semiconductor supply chain resilience in his virtual summit with Japanese Prime Minister Fumio Kishida.

“The leaders did discuss the importance of cooperation on supply chain security, including semiconductors, and the president described what we are doing at home and underscored the importance of working together on it,” a National Security Council spokesperson told VOA.

The spokesperson added that the two countries have been working closely in this area bilaterally through the Quad, a security dialogue forum involving the U.S., Australia, India and Japan.

“The new ministerial-level Economic Policy Consultative Committee (the Economic ‘2+2’) established by the leaders today will also cover this important issue,” the spokesperson said.

Taiwan, home to the Taiwan Semiconductor Manufacturing Company (TSMC) and the leading producer of advanced chips in the world, is another key partner.

“If China was to take over Taiwan, and use TSMC as a leverage point, that would be hugely disruptive,” Lewis said. “Taiwan and its proximity to China and China’s hostility drives a lot of the concern.”

The global chip shortage has pushed up inflation rates and hamstrung the administration’s economic recovery efforts. It contributed to the sharp increases in the price of new and used automobiles, which account for one-third of the annual price increases in the consumer price index.

Biden’s approval in the polls has been lagging recently, partly driven by inflation. Consumer prices jumped 7% in December compared with a year earlier, the highest inflation rate in 40 years. It has dampened economic recovery in a year that the administration says has shown the biggest job growth in American history.

Israel Probes Allegations Police Cyber-Spied on Citizens

Israel on Thursday launched an investigation into allegations police used the controversial Pegasus spyware on the country’s citizens.

In a letter sent to police commander Koby Shabtai, Attorney General Avichai Mandelblit asked to receive all wiretapping and computer spying orders from 2020 and 2021 in order to “verify allegations made in the media.”

The Israeli business daily Calcalist reported Thursday that Israeli police used Pegasus software to spy on an Israeli they considered a potential threat and attempt to gather evidence that could be used as leverage in future investigations.

According to the newspaper, which did not cite any sources, the police action represents a “danger to democracy.”

Police commissioner Yaakov Shabtai, reacting to the story, said that “the police have not found any evidence to support this information.”

“The Israeli police are fighting crime with all the legal means at their disposal,” Shabtai added in a statement.

Israeli security forces have wide leeway to conduct surveillance within Israel with judicial approval.

On Wednesday, Israel’s justice ministry pledged a full investigation into allegations that Pegasus spyware was used on Israeli citizens, including people who led protests of former prime minister Benjamin Netanyahu.

Pegasus, a surveillance product made by the Israeli firm NSO that can turn a mobile phone into a pocket spying device, has remained a source of global controversy following revelations last year it was used to spy on journalists and dissidents worldwide.

Once installed in a mobile phone, Pegasus allows access to the user’s messaging and data, as well as remote activation of the device for sound and image capture.

NSO would neither confirm nor deny it sold technologies to Israeli police, stressing that it does “not operate the system once sold to its governmental customers and it is not involved in any way in the system’s operation.”

“NSO sells its products under license and regulation to intelligence and law enforcement agencies to prevent terror and crime under court orders and the local laws of their countries,” it said in a statement sent to AFP.

Israel’s defense ministry, which must approve all exports of Israeli-made defense industry products, has also opened an investigation into sales of Pegasus overseas. 

 

Senate Panel Moves Forward With Bill Targeting Big Tech

Legislation that would bar technology companies from favoring their own products in a way that undermines competitiveness moved forward Thursday after a Senate panel voted to move the bill to the Senate floor. 

The American Innovation and Choice Online Act received bipartisan support in a 16-6 vote in the Senate Judiciary Committee. 

The bill targets Amazon; Alphabet, the parent company of Google; Apple; and Meta, which was formerly called Facebook. 

The companies had worked strenuously to sink the bill, arguing it could disrupt their services. 

Smaller tech companies that supported the bill argued it will benefit consumers through adding competition. 

“This bill is not meant to break up Big Tech or destroy the products and services they offer,” said Senator Chuck Grassley, the top Republican on the judiciary panel. “The goal of the bill is to prevent conduct that stifles competition.” 

Matt Schruers, president of the Computer and Communications Industry Association, was critical of the bill and said he thought it would not pass the full Senate. 

“Antitrust policy should aim to promote consumer welfare — not punish specific companies,” he said in a statement. 

Another bill aimed at Big Tech, which has bipartisan sponsorship, is also working its way through Congress. The Open App Markets Act would prevent the Apple and Google app stores from requiring app makers to use their payment systems. 

The House of Representatives is also considering versions of both bills. 

Some information for this report came from Reuters. 

US Air Travel Safety Questions Linger Amid 5G Rollout

An unresolved disagreement between U.S. wireless communications carriers and commercial airlines over the rollout of new 5G networks continues to generate confusion about whether air travel is safe in the United States. 

On Wednesday, AT&T and Verizon, the two largest providers of mobile voice and internet service in the U.S., began turning on new wireless towers across the United States, making the ultra-fast 5G spectrum available to consumers, primarily in the more densely populated parts of the country.

Up until the last moment, there was a dispute between the carriers and major U.S. airlines over whether or not the new service would be deployed near airports. This caused a handful of international carriers, including British Airways, Lufthansa, All Nippon, Japan Airlines and Emirates, to announce that they would suspend some service to the United States until the issue was resolved.

Emirates President Tim Clark described the situation as “utterly irresponsible,” speaking earlier this week on CNN.

By Thursday morning, most of the concern about international flights had been resolved, but lingering questions remain for the United States’ vast system or regional air travel.

Interference with landing instruments possible

The 5G C-band spectrum signal used for mobile communications – for which mobile carriers paid more than $80 billion in an auction last year – is similar to the signal that commercial airlines use to measure the altitude of planes landing during inclement weather. Airlines and the Federal Aviation Administration have expressed concern that some aircraft devices, called radar altimeters, could experience interference from the new 5G signals, creating dangerous conditions.

On Wednesday, in a deal brokered by the Biden administration, mobile carriers said they would delay activating 5G towers near airport runways, leaving about 10% of the planned rollout inactive. In addition, the FAA specifically cleared several kinds of radar altimeters, including those commonly used in the Boeing 777, saying the data shows that 5G signals do not interfere with their systems.

In a press release Wednesday, the FAA said its new approvals “allow an estimated 62 percent of the U.S. commercial fleet to perform low-visibility landings at airports where wireless companies deployed 5G C-band.”

Regional airports waiting for answers

While the FAA’s steps to clear large passenger planes for continued use following the 5G rollout have helped prevent problems at large airports, the new technology is causing concern about safety at regional airports across the country, which are served by a wide variety of passenger planes, typically smaller than those that fly into major hub airports.

As of Wednesday, the FAA had not updated guidance for many smaller planes. Because there were relatively few severe weather systems in the U.S. on Wednesday, that did not translate into major delays. However, industry representatives said that it was only a matter of time before challenging weather conditions would begin causing problems.

Faye Malarkey Black, the president and CEO of the regional Airline Association, used Twitter to air her concerns about the situation, saying, “Situational update: 0% of the regional airline fleet has been cleared to perform low visibility landings at #5G impacted airports if/when weather drops below minimums. Today’s fair weather is saving rural America from severe air service disruption.”

Not a new problem

The battle between the airlines and mobile carriers is particularly frustrating to many in the U.S., because it is a problem that has been successfully resolved in other countries around the world. China, the U.K., and France, for example, have managed to roll out 5G service without any significant impact on air travel. That was achieved by agreements between the parties that limited the number of cell towers near airports and the power levels at which they operate.

In a warning to its members, the International Federation of Airline Pilots’ Associations noted that, in the U.S., “The power levels and proximities of the 5G signals are at higher power levels than any other deployment currently in use elsewhere in the world.”

The situation in the U.S. was complicated by the fact that the slice of spectrum being used for 5G services is slightly different here than it is in Europe. In the U.S., mobile carriers bought the rights to the band between 3.7 and 3.98 gigahertz, putting their signals somewhat closer to the 4.2 to 4.4 GHz being used by airlines than the European mobile carriers, which are limited to a range of 3.4 to 3.8 GHz.

The issue was raised during a press conference that U.S.President Joe Biden held at the White House on Wednesday afternoon. After being asked whether his administration bore part of the blame for confusion about flight safety, Biden characterized it as a fight between two private entities, over which the federal government exerts limited control.

“The fact is that you had two enterprises — two private enterprises — that had one promoting 5G and the other one are airlines,” Biden said. “They’re private enterprises. They have government regulation, admittedly.”

“And so, what I’ve done is pushed as hard as I can to have 5G folks hold up and abide by what was being requested by the airlines until they could more modernize over the years so that 5G would not interfere with the potential of the landing,” he said. “So, any tower — any 5G tower within a certain number of miles from the airport should not be operative.”

Bureaucratic dysfunction

The confusion resulting from the 5G rollout this week is at least partly attributable to dysfunction within the federal bureaucracy. Analysts say lines of authority between agencies responsible for auctioning off the rights to the wireless spectrum and those charged with managing conflicts are unclear. 

The Federal Communications Commission is responsible for spectrum auctions, but it is the Federal Aviation Administration, a part of the Department of Transportation, which makes decisions about airline safety. Further complicating matters is that the agency in charge of mediating spectrum disputes, which is located within the Commerce Department, was without a director for two-and-a-half-years, until President Biden’s nominee was confirmed last week.

That situation has led to multiple problems in the rollout of new communications technology over the years, including a recent battle during the Trump administration over whether new spectrum auctions would interfere with the satellite-based Global Positioning System

Explainer: How Sweeping EU Rules Would Curb Tech Companies

Online companies would have to ramp up efforts to keep harmful content off their platforms and take other steps to protect users under rules that European Union lawmakers are set to vote on Thursday.

The 27-nation bloc has gained a reputation as a trendsetter in the growing global push to rein in big tech companies as they face withering criticism over misinformation, hate speech and other harmful content on their platforms.

Here’s a look at the proposed EU rules, known as the Digital Services Act, and why they would make an impact:

WHAT IS THE DIGITAL SERVICES ACT?

The legislation is part of a sweeping overhaul of the European Union’s digital rules aimed at ensuring online companies, including tech giants like Google and Facebook parent Meta, protect users on their platforms and treat rivals fairly. It’s an update of the EU’s two-decade-old e-commerce directive.

“The Digital Services Act could now become the new gold standard for digital regulation, not just in Europe but around the world,” the lead EU lawmaker on the bill, Christel Schaldemose, said during a debate Wednesday. “Big tech nations like the U.S. or China are watching closely to see what we’re now going to agree.”

The proposals are one-half of flagship digital regulations drafted by the bloc. EU lawmakers are also working on a separate proposal, the Digital Markets Act, which is aimed at reining in the power of the biggest online “gatekeepers.” Both still face further negotiations with EU bodies before taking effect.

WHAT WILL IT COVER?

The Digital Services Act includes a raft of measures aimed at better protecting internet users and their “fundamental rights online.” Tech companies will be held more responsible for content on their platforms, with requirements to beef up flagging and removal of illegal content like hate speech or dodgy goods and services sold online like counterfeit sneakers or unsafe toys.

But lawmakers have been battling about the details of such takedowns, including whether court orders would be required.

Online platforms will have to be more transparent about their algorithms that recommend the next video to watch, product to buy or news item at the top of people’s social media feeds. So-called recommender systems have been criticized for leading people to more increasingly extreme or polarizing content.

Some amendments to the legislation proposed giving users the option of turning recommendations off or using third-party systems.

There are also measures to ban platforms from using “dark patterns” — deceptive techniques to nudge users into doing things they didn’t intend to — as well as requiring porn sites to register the identities of users uploading material.

ARE THERE ANY CONTROVERSIAL POINTS?

One of the legislation’s biggest battles is over surveillance-based advertising, also known as targeted or behavioral advertising. Such ads would be banned for children, but digital and consumer rights groups say the proposals don’t go far enough and have called for prohibiting them outright. That idea has faced fierce resistance from the digital ad industry dominated by Google and Meta.

Surveillance ads track online behavior, such as the websites visited or products bought online by a user, to serve them more digital ads based on those interests.

Groups such as Amnesty International say ad tracking undermines the rights that the legislation is supposed to protect, because it involves a massive invasion of privacy and indiscriminate data harvesting as part of a system that manipulates users and encourages ad fraud.

WHAT HAPPENS TO OFFENDERS?

The EU’s single market commissioner, Thierry Breton, took to Twitter on Wednesday to portray the proposed rules as the start of a new era for tough online enforcement.

“It’s time to put some order in the digital ‘Wild West,'” he said. “A new sheriff is in town — and it goes by the name #DSA,” he said, posting a mashup of video clips from a Clint Eastwood spaghetti Western film.

Under the Digital Services Act, violations could be punished with hefty fines of up to 6% of a company’s annual revenue. Some amendments have pushed for raising that amount.

Security Scanners Across Europe Tied to China Government, Military

At some of the world’s most sensitive spots, authorities have installed security screening devices made by a single Chinese company with deep ties to China’s military and the highest levels of the ruling Communist Party.

The World Economic Forum in Davos. Europe’s largest ports. Airports from Amsterdam to Athens. NATO’s borders with Russia. All depend on equipment manufactured by Nuctech, which has quickly become the world’s leading company, by revenue, for cargo and vehicle scanners.

Nuctech has been frozen out of the U.S. for years due to national security concerns, but it has made deep inroads across Europe, installing its devices in 26 of 27 EU member states, according to public procurement, government and corporate records reviewed by The Associated Press.

The complexity of Nuctech’s ownership structure and its expanding global footprint have raised alarms on both sides of the Atlantic.

A growing number of Western security officials and policymakers fear that China could exploit Nuctech equipment to sabotage key transit points or get illicit access to government, industrial or personal data from the items that pass through its devices.

Nuctech’s critics allege the Chinese government has effectively subsidized the company so it can undercut competitors and give Beijing potential sway over critical infrastructure in the West as China seeks to establish itself as a global technology superpower.

“The data being processed by these devices is very sensitive. It’s personal data, military data, cargo data. It might be trade secrets at stake. You want to make sure it’s in right hands,” said Bart Groothuis, director of cybersecurity at the Dutch Ministry of Defense before becoming a member of the European Parliament. “You’re dependent on a foreign actor which is a geopolitical adversary and strategic rival.”

He and others say Europe doesn’t have tools in place to monitor and resist such potential encroachment. Different member states have taken opposing views on Nuctech’s security risks. No one has even been able to make a comprehensive public tally of where and how many Nuctech devices have been installed across the continent.

Nuctech dismisses those concerns, countering that Nuctech’s European operations comply with local laws, including strict security checks and data privacy rules.

“It’s our equipment, but it’s your data. Our customer decides what happens with the data,” said Robert Bos, deputy general manager of Nuctech in the Netherlands, where the company has a research and development center.

He said Nuctech is a victim of unfounded allegations that have cut its market share in Europe nearly in half since 2019.

“It’s quite frustrating to be honest,” Bos told AP. “In the 20 years we delivered this equipment we never had issues of breaches or data leaks. Till today we never had any proof of it.”

‘It’s not really a company’

As security screening becomes increasingly interconnected and data-driven, Nuctech has found itself on the front lines of the U.S.-China battle for technology dominance now playing out across Europe.

In addition to scanning systems for people, baggage and cargo, the company makes explosives detectors and interconnected devices capable of facial recognition, body temperature measurement and ID card or ticket identification.

On its website, Nuctech’s parent company explains that Nuctech does more than just provide hardware, integrating “cloud computing, big data and Internet of Things with safety inspection technologies and products to supply the clients with hi-tech safety inspection solution.”

Critics fear that under China’s national intelligence laws, which require Chinese companies to surrender data requested by state security agencies, Nuctech would be unable to resist calls from Beijing to hand over sensitive data about the cargo, people and devices that pass through its scanners. They say there is a risk Beijing could use Nuctech’s presence across Europe to gather big data about cross-border trade flows, pull information from local networks, like shipping manifests or passenger information, or sabotage trade flows in a conflict.

A July 2020 Canadian government security review of Nuctech found that X-ray security scanners could potentially be used to covertly collect and transmit information, compromise portable electronic devices as they pass through the scanner or alter results to allow transit of “nefarious” devices.

The European Union put measures in place in late 2020 that can be used to vet Chinese foreign direct investment. But policymakers in Brussels say there are currently no EU-wide systems in place to evaluate Chinese procurement, despite growing concerns about unfair state subsidies, lack of reciprocity, national security and human rights.

“This is becoming more and more dangerous. I wouldn’t mind if one or two airports had Nuctech systems, but with dumping prices a lot of regions are taking it,” said Axel Voss, a German member of the European Parliament who works on data protection. “This is becoming more and more a security question. You might think it’s a strategic investment of the Chinese government.”

The U.S. — home to OSI Systems, one of Nuctech’s most important commercial rivals — has come down hard against Nuctech. The U.S. Senate Committee on Foreign Relations, the U.S. National Security Council, the U.S. Transportation Security Administration, and the U.S. Commerce Department’s Bureau of Industry and Security all have raised concerns about Nuctech.

The U.S. Transportation Security Administration told AP in an email that Nuctech was found ineligible to receive sensitive security information. Nuctech products, TSA said, “are not authorized to be used for the screening of passengers, baggage, accessible property or air cargo in the United States.”

In December 2020, the U.S. added Nuctech to the Bureau of Industry and Security Entity List, restricting exports to them on national security grounds.

“It’s not just commercial,” said a U.S. government official who was not authorized to speak on the record. “It’s using state-backed companies, with state subsidies, low-ball bids to get into European critical infrastructure, which is civil airports, passenger screening, seaport and cargo screening.”

 

In Europe, Nuctech’s bids can be 30-50% below their rivals’, according to the company’s competitors, U.S. and European officials and researchers who study China. Sometimes they include other sweeteners like extended maintenance contracts and favorable loans.

In 2009, Nuctech’s main European competitor, Smiths Detection, complained that it was being squeezed out of the market by such practices, and the EU imposed an anti-dumping duty of 36.6% on Nuctech cargo scanners.

“Nuctech comes in with below market bids no one can match. It’s not a normal price, it’s an economic statecraft price,” said Didi Kirsten Tatlow, and co-editor of the book, China’s Quest for Foreign Technology. “It’s not really a company. They are more like a wing of a state development drive.”

Nuctech’s Bos said the company keeps prices low by manufacturing in Europe. “We don’t have to import goods from the U.S. or other countries,” he said. “Our supply chain is very efficient with local suppliers, that’s the main reason we can be very competitive.”

Nuctech’s successes abound. The company, which is opening offices in Brussels, Madrid and Rome, says it has supplied customers in more than 170 countries and regions. Nuctech said in 2019 that it had installed more than 1,000 security check devices in Europe for customs, civil aviation, ports and government organizations.

In November 2020, Norwegian Customs put out a call to buy a new cargo scanner for the Svinesund checkpoint, a complex of squat, grey buildings at the Swedish border. An American rival and two other companies complained that the terms as written gave Nuctech a leg up.

The specifications were rewritten, but Nuctech won the deal anyway. The Chinese company beat its rivals on both price and quality, said Jostein Engen, the customs agency’s director of procurement, and none of Norway’s government ministries raised red flags that would have disqualified Nuctech.

“We in Norwegian Customs must treat Nuctech like everybody else in our competition,” Engen said. “We can’t do anything else following EU rules on public tenders.”

Four of five NATO member states that border Russia — Estonia, Latvia, Lithuania, Poland — have purchased Nuctech equipment for their border crossings with Russia. So has Finland.

Europe’s two largest ports — Rotterdam and Antwerp, which together handled more than a third of goods, by weight, entering and leaving the EU’s main ports in 2020 — use Nuctech devices, according to parliamentary testimony.

Other key states at the edges of the EU, including the U.K., Turkey, Ukraine, Albania, Belarus and Serbia have also purchased Nuctech scanners, some of which were donated or financed with low-interest loans from Chinese state banks, according to public procurement documents and government announcements.

Airports in London, Amsterdam, Brussels, Athens, Florence, Pisa, Venice, Zurich, Geneva and more than a dozen across Spain have all signed deals for Nuctech equipment, procurement and government documents, and corporate announcements show.

Nuctech says it provided security equipment for the Olympics in Brazil in 2016, then President Donald Trump’s visit to China in 2017 and the World Economic Forum in 2020. It has also provided equipment to some U.N. organizations, procurement records show.

Rising concerns

As Nuctech’s market share has grown, so too has skepticism about the company.

Canadian authorities dropped a standing offer from Nuctech to provide X-ray scanning equipment at more than 170 Canadian diplomatic missions around the world after a government assessment found an “elevated threat” of espionage.

Lithuania, which is involved in a diplomatic feud with China over Taiwan, blocked Nuctech from providing airport scanners earlier this year after a national security review found that it wasn’t possible for the equipment to operate in isolation and there was a risk information could leak back to China, according to Margiris Abukevicius, vice minister for international cooperation and cybersecurity at Lithuania’s Ministry of National Defense.

Then, in August, Lithuania approved a deal for a Nuctech scanner on its border with Belarus. There were only two bidders, Nuctech and a Russian company — both of which presented national security concerns — and there wasn’t time to reissue the tender, two Lithuanian officials told AP.

“It’s just an ad hoc decision choosing between bad and worse options,” Abukevicius said. He added that the government is developing a road map to replace all Nuctech scanners currently in use in Lithuania as well as a legal framework to ban purchases of untrusted equipment by government institutions and in critical sectors.

Human rights concerns are also generating headwinds for Nuctech. The company does business with police and other authorities in Western China’s Xinjiang region, where Beijing stands accused of genocide for mass incarceration and abuse of minority Uyghur Muslims.

Despite pressure from U.S. and European policymakers on companies to stop doing business in Xinjiang, European governments have continued to award tens of millions of dollars in contracts — sometimes backed by European Union funds — to Nuctech.

Nuctech says on its Chinese website that China’s western regions, including Xinjiang, are “are important business areas” for the company. It has signed multiple contracts to provide X-ray equipment to Xinjiang’s Department of Transportation and Public Security Department.

It has provided license plate recognition devices for a police checkpoint in Xinjiang, Chinese government records show, and an integrated security system for the subway in Urumqi, the region’s capital city. It regularly showcases its security equipment at trade fairs in Xinjiang.

“Companies like Nuctech directly enable Xinjiang’s high-tech police state and its intrusive ways of suppressing ethnic minorities. This should be taken into account when Western governments and corporations interface with Nuctech,” said Adrian Zenz, a researcher who has documented abuses in Xinjiang and compiled evidence of the company’s activities in the region.

Nuctech’s Bos said he can understand those views, but that the company tries to steer clear of politics. “Our daily goal is to have equipment to secure the world more and better,” he said. “We don’t interfere with politics.”

Complex web of ownership

Nuctech opened a factory in Poland in 2018 with the tagline “Designed in China and manufactured in Europe.” But ultimate responsibility for the company lies far from Warsaw, with the state-owned Assets Supervision and Administration Commission of the State Council in Beijing, China’s top governing body.

Nuctech’s ownership structure is so complex that it can be difficult for outsiders to understand the true lines of influence and accountability.

Scott Kennedy, a Chinese economic policy expert at the Center for Strategic and International Studies in Washington, said that the ambiguous boundaries between the Communist Party, state companies and financial institutions in China — which have only grown murkier under China’s leader, Xi Jinping — can make it difficult to grasp how companies like Nuctech are structured and operate.

“Consider if the roles were reversed. If the Chinese were acquiring this equipment for their airports they’d want a whole variety of assurances,” Kennedy said. “China has launched a high-tech self-sufficiency drive because they don’t feel safe with foreign technology in their supply chain.”

What is clear is that Nuctech, from its very origins, has been tied to Chinese government, academic and military interests.

Nuctech was founded as an offshoot of Tsinghua University, an elite public research university in Beijing. It grew with backing from the Chinese government and for years was run by the son of China’s former leader, Hu Jintao.

Datenna, a Dutch economic intelligence company focused on China, mapped the ownership structure of Nuctech and found a dozen major entities across four layers of shareholding, including four state-owned enterprises and three government entities.

Today the majority shareholder in Nuctech is Tongfang Co., which has a 71% stake. The largest shareholder in Tongfang, in turn, is the investment arm of the China National Nuclear Corp. (CNNC), a state-run energy and defense conglomerate controlled by China’s State Council. The U.S. Defense Department classifies CNNC as a Chinese military company because it shares advanced technologies and expertise with the People’s Liberation Army.

Xi has further blurred the lines between China’s civilian and military activities and deepened the power of the ruling Communist Party within private enterprises. One way: the creation of dozens of government-backed financing vehicles designed to speed the development of technologies that have both military and commercial applications.

In fact, one of those vehicles, the National Military-Civil Fusion Industry Investment Fund, announced in June 2020 that it wanted to take a 4.4% stake in Nuctech’s majority shareholder, along with the right to appoint a director to the Tongfang board. It never happened — “changes in the market environment,” Tongfeng explained in a Chinese stock exchange filing.

But there are other links between Nuctech’s ownership structure and the fusion fund.

CNNC, which has a 21% interest in Nuctech, holds a stake of more than 7% in the fund, according to Qichacha, a Chinese corporate information platform. They also share personnel: Chen Shutang, a member of CNNC’s Party Leadership Group and the company’s chief accountant serves as a director of the fund, records show.

“The question here is whether or not we want to allow Nuctech, which is controlled by the Chinese state and linked to the Chinese military, to be involved in crucial parts of our border security and infrastructure,” said Jaap van Etten, a former Dutch diplomat and CEO of Datenna.

Nuctech maintains that its operations are shaped by market forces, not politics, and says CNNC doesn’t control its corporate management or decision-making.

“We are a normal commercial operator here in Europe which has to obey the laws,” said Nuctech’s Bos. “We work here with local staff members, we pay tax, contribute to the social community and have local suppliers.”

But experts say these touchpoints are further evidence of the government and military interests encircling the company and show its strategic interest to Beijing.

“Under Xi Jinping, the national security elements of the state are being fused with the technological and innovation dimensions of the state,” said Tai Ming Cheung, a professor at UC San Diego’s School of Global Policy and Strategy.

“Military-civil fusion is one of the key battlegrounds between the U.S. and China. The Europeans will have to figure out where they stand.” 

 

 

Felony Charges Are a First in Fatal Crash Involving Autopilot

California prosecutors have filed two counts of vehicular manslaughter against the driver of a Tesla on Autopilot who ran a red light, slammed into another car and killed two people in 2019.

The defendant appears to be the first person to be charged with a felony in the United States for a fatal crash involving a motorist who was using a partially automated driving system. Los Angeles County prosecutors filed the charges in October, but they came to light only last week. 

The driver, Kevin George Aziz Riad, 27, has pleaded not guilty. Riad, a limousine service driver, is free on bail while the case is pending. 

The misuse of Autopilot, which can control steering, speed and braking, has occurred on numerous occasions and is the subject of investigations by two federal agencies. The filing of charges in the California crash could serve notice to drivers who use systems like Autopilot that they cannot rely on them to control vehicles.

The criminal charges aren’t the first involving an automated driving system, but they are the first to involve a widely used driver technology. Authorities in Arizona filed a charge of negligent homicide in 2020 against a driver Uber had hired to take part in the testing of a fully autonomous vehicle on public roads. The Uber vehicle, an SUV with the human backup driver on board, struck and killed a pedestrian. 

By contrast, Autopilot and other driver-assist systems are widely used on roads across the world. An estimated 765,000 Tesla vehicles are equipped with it in the United States alone.

In the Tesla crash, police said a Model S was moving at a high speed when it left a freeway and ran a red light in the Los Angeles suburb of Gardena and struck a Honda Civic at an intersection on December 29, 2019. Two people who were in the Civic, Gilberto Alcazar Lopez and Maria Guadalupe Nieves-Lopez, died at the scene. Riad and a woman in the Tesla were hospitalized with non-life-threatening injuries.

Criminal charging documents do not mention Autopilot. But the National Highway Traffic Safety Administration, which sent investigators to the crash, confirmed last week that Autopilot was in use in the Tesla at the time of the crash.

Riad’s defense attorney did not respond to requests for comment last week, and the Los Angeles County District Attorney’s Office declined to discuss the case. Riad’s preliminary hearing is scheduled for February 23. 

‘Automation complacency’

The National Highway Traffic Safety Administration and the National Transportation Safety Board have been reviewing the widespread misuse of Autopilot by drivers, whose overconfidence and inattention have been blamed for multiple crashes, including fatal ones. In one crash report, the NTSB referred to its misuse as “automation complacency.”

The agency said that in a 2018 crash in Culver City, California, in which a Tesla hit a firetruck, the design of the Autopilot system had “permitted the driver to disengage from the driving task.” No one was hurt in that crash. 

Last May, a California man was arrested after officers noticed his Tesla moving down a freeway with the man in the back seat and no one behind the steering wheel.

Teslas that have had Autopilot in use also have hit a highway barrier or tractor-trailers that were crossing roads. NHTSA has sent investigation teams to 26 crashes involving Autopilot since 2016, involving at least 11 deaths.

Messages have been left seeking comment from Tesla, which has disbanded its media relations department. Since the Autopilot crashes began, Tesla has updated the software to try to make it harder for drivers to abuse it. The company also tried to improve Autopilot’s ability to detect emergency vehicles.

Tesla has said that Autopilot and a more sophisticated Full Self-Driving system cannot drive themselves and that drivers must pay attention and be ready to react at any time. Full Self-Driving is being tested by hundreds of Tesla owners on public roads in the U.S. 

Bryant Walker Smith, a law professor at the University of South Carolina who studies automated vehicles, said this is the first U.S. case to his knowledge in which serious criminal charges were filed in a fatal crash involving a partially automated driver-assist system. Tesla, he said, could be “criminally, civilly or morally culpable” if it is found to have put a dangerous technology on the road. 

Donald Slavik, a Colorado lawyer who has served as a consultant in automotive technology lawsuits, including many against Tesla, said he, too, is unaware of any previous felony charges being filed against a U.S. driver who was using partially automated driver technology involved in a fatal crash. 

Lawsuits against Tesla, Riad

The families of Lopez and Nieves-Lopez have sued Tesla and Riad in separate lawsuits. They have alleged negligence by Riad and have accused Tesla of selling defective vehicles that can accelerate suddenly and that lack an effective automatic emergency braking system. A joint trial is scheduled for mid-2023. 

Lopez’s family, in court documents, alleges that the car “suddenly and unintentionally accelerated to an excessive, unsafe and uncontrollable speed.” Nieves-Lopez’s family further asserts that Riad was an unsafe driver, with multiple moving infractions on his record, and couldn’t handle the high-performance Tesla. 

Separately, NHTSA is investigating a dozen crashes in which a Tesla on Autopilot ran into several parked emergency vehicles. In the crashes under investigation, at least 17 people were injured, and one person was killed.

Asked about the manslaughter charges against Riad, the agency issued a statement saying there is no vehicle on sale that can drive itself. And whether or not a car is using a partially automated system, the agency said, “every vehicle requires the human driver to be in control at all times.” 

NHTSA added that all state laws hold human drivers responsible for the operation of their vehicles. Though automated systems can help drivers avoid crashes, the agency said, the technology must be used responsibly.

Rafaela Vasquez, the driver in the Uber autonomous test vehicle, was charged in 2020 with negligent homicide after the SUV fatally struck a pedestrian in suburban Phoenix in 2018. Vasquez has pleaded not guilty. Arizona prosecutors declined to file criminal charges against Uber. 

 

US Telecom Carriers to Limit 5G Rollout Near Airports

Major U.S. telecommunications companies Verizon and AT&T agreed Tuesday to delay their deployment of new 5G mobile services around key airports after airline executives contended that the technology posed safety threats to airliners.

U.S. President Joe Biden said in a statement that the government’s agreement with the telecom companies would “avoid potentially devastating disruptions to passenger travel, cargo operations, and our economic recovery” while allowing them to deploy more than 90% of their wireless towers on Wednesday as they had planned.

“This agreement protects flight safety and allows aviation operations to continue without significant disruption,” Biden said, “and will bring more high-speed internet options to millions of Americans.”

The two telecom firms reached agreement with federal authorities after major U.S. air carriers warned Monday that the country’s commerce would “grind to a halt” if the 5G mobile technology were deployed near major airports. The White House did not say at how many airports the 5G technology is being delayed.

Biden thanked the mobile carriers for the delay and said negotiations would continue.

“My team has been engaging nonstop with the wireless carriers, airlines and aviation equipment manufacturers to chart a path forward for 5G deployment and aviation to safely coexist,” he said. “And, at my direction, they will continue to do so until we close the remaining gap and reach a permanent, workable solution around these key airports.”

The airlines say the new technology will interfere with safe flight operations, while the mobile carriers claim the airlines have known about the problem and failed to upgrade equipment on their aircraft to prevent flight problems.

The new high-speed 5G mobile service uses a segment of the radio spectrum that is close to that used by altimeters — devices in cockpits that measure the height of aircraft above the ground.

AT&T and Verizon argue that their equipment will not interfere with aircraft electronics and that technology is being safely used in many other countries.

In a letter Monday to Transportation Secretary Pete Buttigieg, chief executives at Delta Air Lines, American Airlines, United Airlines and seven other passenger and cargo carriers protested the mobile carriers’ plan to roll out their upgraded service on Wednesday.

While the Federal Aviation Administration previously said it would not object to deployment of the 5G technology because the mobile carriers had pledged to address safety issues, the airline executives said aircraft manufacturers subsequently warned them that the Verizon and AT&T measures were not sufficient to allay those concerns.

The mobile companies said they would reduce power at 5G transmitters near airports, but the airlines have asked that the 5G technology not be activated within 3.2 kilometers of 50 major airports. The details of the telecoms’ pullback around airports were not immediately known.

If the 5G technology is used, the airline executives contended, “multiple modern safety systems on aircraft will be deemed unusable. Airplane manufacturers have informed us that there are huge swaths of the operating fleet that may need to be indefinitely grounded.”

“Immediate intervention is needed to avoid significant operational disruption to air passengers, shippers, supply chain and delivery of needed medical supplies,” the airline industry executives said.

Some information in this report came from The Associated Press.

US Airlines, Telecom Carriers Feuding Over Rollout of 5G Technology

Major U.S. air carriers are warning that the country’s “commerce will grind to a halt” if Verizon and AT&T go ahead with plans to deploy their new 5G mobile internet technology on Wednesday.

The airlines say the new technology will interfere with safe flight operations. 

The dispute between two major segments of the U.S. economy has been waged for months in Washington regulatory agencies, with the airline industry contending that the mobile carriers’ technology upgrade could disrupt global passenger service and cargo shipping, while the mobile carriers claim the airlines failed to upgrade equipment on their aircraft to prevent flight problems.

The new high-speed 5G mobile service uses a segment of the radio spectrum that is close to that used by altimeters — devices in cockpits that measure the height of aircraft above the ground. 

AT&T and Verizon argue that their equipment will not interfere with aircraft electronics and that the technology is being safely used in many other countries. 

In a letter Monday to Transportation Secretary Pete Buttigieg, chief executives at Delta Air Lines, American Airlines, United Airlines and seven other passenger and cargo carriers protested the mobile carriers’ plan to roll out their upgraded service on Wednesday. 

While the Federal Aviation Administration previously said it would not object to deployment of the 5G technology because the mobile carriers said they would address safety concerns, the airline executives said aircraft manufacturers have subsequently warned them that the Verizon and AT&T measures were not sufficient to allay safety concerns.

The mobile companies said they would reduce power at 5G transmitters near airports, but the airlines have asked that the 5G technology not be activated within 3.2 kilometers of 50 major airports. 

The airline executives contended that if the 5G technology is used, “Multiple modern safety systems on aircraft will be deemed unusable. Airplane manufacturers have informed us that there are huge swaths of the operating fleet that may need to be indefinitely grounded.” 

The airline industry executives argued that “immediate intervention is needed to avoid significant operational disruption to air passengers, shippers, supply chain and delivery of needed medical supplies.” 

After the airlines’ latest protests, AT&T said Tuesday it would postpone its new wireless service near some airports but did not say at how many or where. Verizon had no immediate comment. 

In a statement Monday, the FAA said it “will continue to keep the traveling public safe as wireless companies deploy 5G” and “continues to work with the aviation industry and wireless companies to try and limit 5G-related flight delays and cancellations.” 

The White House said Tuesday that the Biden administration is continuing discussions with the airline and telecommunications companies about the dispute.

Some material in this report came from The Associated Press. 

 

CES-2022 Showcases the Latest Tech Innovations

This year’s Consumer Electronics Show in Las Vegas, Nevada, was smaller this year because of COVID, but, as usual, the event drew companies that are dreaming big. Mariia Prus was among the journalists covering CES-2022, which ended Jan. 8, and has this report narrated by Anna Rice.
Camera: Mariia Prus