What Is the Digital Currency Bitcoin?

It’s worth more than an ounce of gold right now, it’s completely digital and it’s the currency of choice for the cyberattackers who crippled computer networks around the world in recent days.

When the attackers’ “ransomware” sprang into action, it held victims hostage by encrypting their data and demanding they send payments in bitcoins to regain access to their computers. Bitcoin has a fuzzy history, but it’s a type of currency that allows people to buy goods and services and exchange money without involving banks, credit card issuers or other third parties.

Here’s a brief look at bitcoin:

How bitcoins work

Bitcoin is a digital currency that is not tied to a bank or government and allows users to spend money anonymously. The coins are created by users who “mine” them by lending computing power to verify other users’ transactions. They receive bitcoins in exchange. The coins also can be bought and sold on exchanges with U.S. dollars and other currencies.

How much is it worth?

One bitcoin recently traded for $1,734.65, according to Coinbase, a company that helps users exchange bitcoins. That makes it more valuable than an ounce of gold, which trades at less than $1,230.

The value of bitcoins can swing sharply, though. A year ago, one was worth $457.04, which means that it’s nearly quadrupled in the last 12 months. But its price doesn’t always go up. A bitcoin’s value plunged by 23 percent against the dollar in just a week this past January. It fell by the same amount again in 10 days during March.

Why bitcoins are popular

Bitcoins are basically lines of computer code that are digitally signed each time they travel from one owner to the next. Transactions can be made anonymously, making the currency popular with libertarians as well as tech enthusiasts, speculators — and criminals.

Who’s using bitcoin?

Some businesses have jumped on the bitcoin bandwagon amid a flurry of media coverage. Overstock.com accepts payments in bitcoin, for example.

The currency has become popular enough that more than 300,000 daily transactions have been occurring recently, according to bitcoin wallet site blockchain.info. A year ago, activity was closer to 230,000 transactions per day.

Still, its popularity is low compared with cash and cards, and many individuals and businesses won’t accept bitcoins for payments.

How bitcoins are kept secure

The bitcoin network works by harnessing individuals’ greed for the collective good. A network of tech-savvy users called miners keep the system honest by pouring their computing power into a blockchain, a global running tally of every bitcoin transaction. The blockchain prevents rogues from spending the same bitcoin twice, and the miners are rewarded for their efforts by being gifted with the occasional bitcoin. As long as miners keep the blockchain secure, counterfeiting shouldn’t be an issue.

How bitcoin came to be

It’s a mystery. Bitcoin was launched in 2009 by a person or group of people operating under the name Satoshi Nakamoto. Bitcoin was then adopted by a small clutch of enthusiasts. Nakamoto dropped off the map as bitcoin began to attract widespread attention. But proponents say that doesn’t matter: The currency obeys its own internal logic.

An Australian entrepreneur last year stepped forward and claimed to be the founder of bitcoin, only to say days later that he did not “have the courage” to publish proof that he is.

your ad here

Global Cyberattack in Brief: Ransomware Attack, How Does It Work, How to Prevent It

In what is believed to be the largest attack of its kind ever recorded, a cyberextortion attack struck in dozens of countries Friday, locking up computers and holding users’ files for ransom at dozens of hospitals, companies and government agencies.

Massive Cyberattack Hits Organizations Around Globe — An aggressive wave of cyberattacks has hit companies and public institutions around the globe, causing international havoc and bringing many services to a standstill. The cyberextortion attempt appeared to use stolen software developed by a U.S. spy agency.

What You Need to Know About Ransomware — What is ransomware? How does it infect your computer? How is the U.S. government’s National Security Agency involved? How to keep your computer safe.

Global Cyberattack Fuels Concern About US Vulnerability Disclosures — A global cyberattack on Friday renewed concerns about whether the U.S. National Security Agency and other countries’ intelligence services too often horde software vulnerabilities for offensive purposes, rather than quickly alerting technology companies to such flaws.

Companies Affected by Global Cyber Attack — A global cyber attack on Friday affected British hospitals, government agencies and companies, such as FedEx Corp., Telefonica SA, Portugal Telecom and Telefonica Argentina, in 99 countries, with Russia, Ukraine and Taiwan the top targets.

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm? — What is so special about WannaCry?

your ad here

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm?

Malicious software called “ransomware” has forced British hospitals to turn away patients and affected Spanish companies such as Telefonica as part of a global outbreak that has affected tens of thousands of computers.

How does it work?

WannaCry — also known as WanaCrypt0r 2.0, WannaCry and WCry — is a form of “ransomware” that locks up the files on your computer and encrypts them in a way that you cannot access them anymore.

How does it spread?

Ransomware is a program that gets into your computer, either by clicking on the wrong thing or downloading the wrong thing, and then it holds something you need to ransom.

In the case of WannaCry, the program encrypts your files and demands payment in bitcoin in order to regain access.

Security experts warn there is no guarantee that access will be granted after payment. Some ransomware that encrypts files ups the stakes after a few days, demanding more money and threatening to delete files altogether.

There are different variants of what happens: Other forms of ransomware execute programs that can lock your computer entirely, only showing a message to make payment in order to log in again. There are some that create pop-ups that are difficult or impossible to close, rendering the machine difficult or impossible to use.

Where has it spread?

British-based cyber researcher Chris Doman of AlienVault said the ransomware “looks to be targeting a wide range of countries,” with initial evidence of infections in at least two dozen nations, according to experts from three security firms.

The broad-based ransomware attack has appeared in at least eight Asian nations, a dozen countries in Europe, Turkey and the United Arab Emirates and Argentina, and appears to be sweeping around the globe, researchers said.

What is so special about WannaCry?

WannaCry is not just a ransomware program, it is also a worm.

This means that it gets into your computer and looks for other computers to try and spread itself as far and wide as possible.

Ransomware has a habit of mutating, so it changes over time in order to find different ways to access computers or to get around patches (operating system updates that often include security updates). Many security firms are already aware of WannaCry in past forms and most are looking at this one right now to see how it might be stopped.

Several cybersecurity firms said WannaCry exploits a vulnerability in Microsoft and that Microsoft patched this in March. People don’t always install updates and patches on their computers, and so this means vulnerabilities can remain open a lot longer and make things easier for hackers to get in.

It exploited a vulnerability in the Windows operating system believed to have been developed by the National Security Agency, which became public last month. It was among a large number of hacking tools and other files that a group known as the Shadow Brokers released on the internet. Shadow Brokers said that they obtained it from a secret NSA server.

The identity of Shadow Brokers is unknown, though many security experts believe the group that surfaced in 2016 is linked to the Russian government.

The NSA and Microsoft did not immediately respond to requests for comment.

your ad here

Is Human Behavior Impeding Self-Driving Cars?

Most technology experts agree that self-driving cars will soon finish the testing phase and enter the commercial market, probably as taxis and delivery vehicles. But some of them wonder if the cars’ artificial brains will be able to cope with the human propensity to bend the traffic rules. VOA’s George Putic reports.

your ad here

What You Need to Know About Ransomware

An aggressive wave of cyberattacks hit companies and public institutions around the globe Friday, causing international havoc and bringing many services to a standstill. Computers were locked up and users’ files held for ransom when dozens of countries were hit in a cyberextortion attack that targeted hospitals, companies and government agencies.

What is ransomware?

Ransomware is a type of malware that attempts to extort a computer user for money. In some cases, the ransomware encrypts certain files and holds them hostage. In other cases, as happened Friday, it locks a user out of their entire computer system until a ransom is paid. Some ransomware that encrypts files increases the stakes after a few days, demanding more money and threatening to delete files altogether.

Steps of ransomware infection

A ransomware infection usually takes these five steps.

1. The user downloads malware from an infected website or email.

2. The initial malware hijacks the user’s browser and redirects it to a malicious site.

3. Part of the malware, called an exploit kit, looks for vulnerabilities in the user’s system.

4. Once a vulnerability is found, a malicious payload is downloaded onto the victim’s computer.

5. Then the malware calls home with sensitive data from the user’s computer. In the case of ransomware, the malware attempts to extort the user for money.

The ransomware program that spread Friday is not just malware, it is also a worm. This means that the malware gets into a computer and looks for other computers to try and spread itself as far as possible.

Do ransomware attacks generate money for the hackers?

Yes, they can. A hospital system in Los Angeles paid about $17,000 earlier this year following an attack that blocked hospital employees from using email and other forms of electronic communication by using encryption to lock them out of the system. The hackers even set up a help line to answer questions about paying the ransom.

Security industry experts say such attacks are becoming more prevalent, but are rarely made public.

How is the NSA involved?

The hackers appear to have used a technique that was discovered by the National Security Agency and was leaked online in April by a group calling itself the Shadow Brokers.

The malware is exploiting a flaw in Microsoft software. Microsoft created a patch to fix the flaw earlier this year, but not all businesses have updated their operating systems.

Who carried out the attack?

Investigators are pursuing information, but have not said if they have any strong leads. Officials say they believe the attack is the work of criminals and not a foreign government. The original hacking tool was apparently stolen from the NSA and leaked online by the Shadow Brokers, but officials do not know who that group is or whether they carried out this attack.

How to keep your computer safe

Microsoft released a patch in March that fixes the specific vulnerability exploited in this attack. The U.S. Department of Homeland Security is urging people to take three steps.

1. Update your systems to include the latest patches.

2. Do not click on or download unfamiliar links or files in emails.

3. Back up your data to prevent possible loss.

your ad here

Companies Affected by Global Cyber Attack

A global cyber attack on Friday affected British hospitals, government agencies and companies in 99 countries, with Russia, Ukraine and Taiwan the top targets, security software maker Avast said.

Hacking tools widely believed by researchers to have been developed by the U.S. National Security Agency that were leaked online last month appear to have been leveraged to launch the attacks.

Around 1,000 computers at the Russian Interior Ministry were affected by the cyber attack, a spokeswoman for the ministry told Interfax.

Some of the companies affected:

FedEx Corp

Telefonica SA

Portugal Telecom

Telefonica Argentina

your ad here

Dutch Inventor Years Ahead in Plan to Clean Up Massive Plastic Patch in Pacific

A Dutch entrepreneur has come up with an invention he says will allow him to start cleaning up a massive floating garbage patch in the Pacific two years ahead of schedule.

“To catch the plastic, act like plastic,” Boyan Slat said Thursday in Utrecht.

Slat’s Ocean Cleanup foundation plans to scoop up most of the Great Pacific Garbage Patch — a gargantuan floating island of plastic between the U.S. states of Hawaii and California.

When he discovered that his original plan of attaching large barriers to the sea floor to trap the plastic would not work, Stal devised a different plan.

The barriers will instead be weighed down by floating anchors and travel in the same sea currents as the garbage, trapping it.

Slat says the new plan will allow him to start collecting the trash within a year — two years ahead of schedule.

The young entrepreneur’s system is making waves among America’s super-rich philanthropists. Last month, his foundation announced it had raised $21.7 million in donations since November, clearing the way for large-scale trials at sea. Among donors were Salesforce.com CEO Marc Benioff and PayPal co-founder Peter Thiel.

 

Nancy Wallace, director of the Marine Debris Program at the U.S. National Oceanic and Atmospheric Administration, said much of the garbage in the world’s oceans is found throughout the water column — at different depths. That would likely put some of it out of reach of Slat’s barriers.

 

However she applauded The Ocean Cleanup for bringing the issue to a broad public.

 

“The more people are aware of it, the more they will be concerned about it,” Wallace said. “My hope is that the next step is to say `what can I do to stop it?’ and that’s where prevention comes in.”

The Great Pacific Garbage Patch is not just an ugly reminder of a throwaway human society — it is also a danger to sea life and humans. Tiny bits of plastic can find their way into the food chain.

Ocean Cleanup says 8 million tons of plastic wind up in the seas every year. One piece of plastic can take decades to break down.

Slat on Thursday brought out an intact plastic crate fished from the Pacific last year. The date 1977 was stamped on it.

Some information for this report from AP.

your ad here

Sinister Text Messages Reveal High-tech Front in Ukraine War

Television journalist Julia Kirienko was sheltering with Ukrainian soldiers and medics two miles (three kilometers) from the front when their cellphones began buzzing over the noise of the shelling. Everyone got the same text message at the same time.

“Ukrainian soldiers,” it warned, “they’ll find your bodies when the snow melts.”

Text messages like the one Kirienko received have been sent periodically to Ukrainian forces fighting pro-Russian separatists in the eastern part of the country. The threats and disinformation represent a new form of information warfare, the 21st-century equivalent of dropping leaflets on the battlefield.

“This is pinpoint propaganda,” said Nancy Snow, a professor of public diplomacy at the Kyoto University of Foreign Studies.

The Associated Press has found that the messages are almost certainly being sent through cell site simulators, surveillance tools long used by U.S. law enforcement to track suspects’ cellphones. Photos, video, leaked documents and other clues gathered by Ukrainian journalists suggest the equipment may have been supplied by the Kremlin.

The texts have been arriving since 2014, shortly after the fighting erupted. The AP documented nearly four dozen of them, including the one that Kirienko received on Jan. 31 in Avdiivka, a battle-scarred town outside the principal rebel-held city of Donetsk.

The messages typically say things such as “Leave and you will live” or “Nobody needs your kids to become orphans.” Many are disguised to look as if they are coming from fellow soldiers.

Fake towers

In 2015, Ukrainian soldiers defending the railroad town of Debaltseve were sent texts appearing to come from comrades claiming their unit’s commander had deserted. Another set of messages warned that Ukrainian forces were being decimated. “We should run away,” they said.

“They were mostly threatening and demoralizing, saying that our commanders had betrayed us and we were just cannon fodder,” said Roman Chashurin, who served as a tank gunner in Debaltseve.

Ukrainian military and intelligence services had no comment on the phenomenon, but government and telecommunications officials are well aware of what’s going on.

A 2014 investigation by a major Ukrainian cellphone company concluded that cell site simulators were to blame for the rogue messages, according to an information security specialist who worked on the inquiry. He spoke on the condition that neither he nor his former firm be identified, citing a nondisclosure agreement.

Col. Serhiy Demydiuk, the head of Ukraine’s national cyberpolice unit, said in an interview that the country’s intelligence services knew the devices were being used as well.

“Avdiivka showed that the Russian side was using fake towers,” he said. “They are using them constantly.”

Cell site simulators work by impersonating cellphone towers, allowing them to intercept or even fake data. Heath Hardman, a former U.S. Marines signals analyst who operated the devices in Iraq and Afghanistan, said they were routinely used by American military intelligence officers to hunt insurgents.

Sending mass text messages in wartime isn’t entirely new. The Islamic militant group Hamas sent threatening messages to random Israelis during the 2009 conflict over Gaza, for example, though it is not clear how that was done.

Effectiveness of texts

Cell site simulators significantly sharpen the ability of propagandists to tailor their messages to a specific place or situation, according to Snow, the academic.

“There’s just something about viewing a message on your phone that just makes people more susceptible or vulnerable to its impact,” she said.

The type of hardware involved remains a matter of speculation. But last year, the Ukrainian investigative website InformNapalm published a video and photographs appearing to show a LEER-3, a Russian truck-mounted electronic warfare system, in the Donetsk area. InformNapalm also disclosed what it described as leaked Russian military documents discussing the LEER-3’s deployment to the Luhansk area of eastern Ukraine.

A 2015 article in Russia’s Military Review magazine said the LEER-3 has a cell site simulator built into a drone that is capable of acting over a 6-kilometer-wide area and hijacking up to 2,000 cellphone connections at once. That makes it a “pretty plausible” source for the rogue texts in Ukraine, said Hardman, the former signals analyst.

Russia’s Defense Ministry did not return a request for comment. Moscow has long denied any direct role in the fighting in Ukraine, despite a wealth of evidence to the contrary.

The effectiveness of the propaganda texts is an open question. Soldiers say they typically shrug them off.

“I can’t say that it had any influence on us,” said Chashurin, the former tank gunner. “We were even joking that they must be so afraid of us the only thing they can do is to spam us with these texts.”

But Svetlana Andreychuk, a volunteer who has made frequent trips to the front line to distribute food and supplies, said the threats and mockery sometimes hit a nerve in a grinding conflict that has claimed more than 9,900 lives.

“Some people are psychologically influenced,” she said. “It’s coming regularly. People are so tired. You see people dying. And then you face this.”

your ad here

What’s Holding Back Self-driving Cars? Human Drivers

In just a few years, well-mannered self-driving robotaxis will share the roads with reckless, law-breaking human drivers. The prospect is causing migraines for the people developing the robotaxis.

A self-driving car would be programmed to drive at the speed limit. Humans routinely exceed it by 10 to 15 mph (16 to 24 kph) — just try entering the New Jersey Turnpike at normal speed. Self-driving cars wouldn’t dare cross a double yellow line; humans do it all the time. And then there are those odd local traffic customs to which humans quickly adapt.

 

In Los Angeles and other places, for instance, there’s the “California Stop,” where drivers roll through stop signs if no traffic is crossing. In Southwestern Pennsylvania, courteous drivers practice the “Pittsburgh Left,” where it’s customary to let one oncoming car turn left in front of them when a traffic light turns green. The same thing happens in Boston. During rush hours near Ann Arbor, Michigan, drivers regularly cross a double-yellow line to queue up for a left-turn onto a freeway.

 

“There’s an endless list of these cases where we as humans know the context, we know when to bend the rules and when to break the rules,” said Raj Rajkumar, a computer engineering professor at Carnegie Mellon University who leads the school’s autonomous car research.

 

Although autonomous cars are likely to carry passengers or cargo in limited areas during the next three to five years, experts say it will take many years before robotaxis can coexist with human-piloted vehicles on most side streets, boulevards and freeways. That’s because programmers have to figure out human behavior and local traffic idiosyncrasies. And teaching a car to use that knowledge will require massive amounts of data and big computing power that is prohibitively expensive at the moment.

 

“Driverless cars are very rule-based, and they don’t understand social graces,” said Missy Cummings, director of Duke University’s Humans and Autonomy Lab.

 

Driving customs and road conditions are dramatically different across the globe, with narrow, congested lanes in European cities, and anarchy in Beijing’s giant traffic jams. In India’s capital, New Delhi, luxury cars share poorly marked and congested lanes with bicycles, scooters, trucks, and even an occasional cow or elephant.

 

Then there is the problem of aggressive humans who make dangerous moves such as cutting cars off on freeways or turning left in front of oncoming traffic. In India, for example, even when lanes are marked, drivers swing from lane to lane without hesitation.

 

Already there have been isolated cases of human drivers pulling into the path of cars such as Teslas, knowing they will stop because they’re equipped with automatic emergency braking.

 

“It’s hard to program in human stupidity or someone who really tries to game the technology,” says John Hanson, spokesman for Toyota’s autonomous car unit.

 

Kathy Winter, vice president of automated driving solutions for Intel, is optimistic that the cars will be able to see and think like humans before 2030.

 

Cars with sensors for driver-assist systems already are gathering data about road signs, lane lines and human driver behavior. Winter hopes auto and tech companies developing autonomous systems and cars will contribute this information to a giant database.

 

Artificial intelligence developed by Intel and other companies eventually could access the data and make quick decisions similar to humans, Winter says.

 

Programmers are optimistic that someday the cars will be able to handle even Beijing’s traffic. But the cost could be high, and it might be a decade or more before Chinese regulators deem self-driving cars reliable enough for widespread public use, said John Zeng of LMC Automotive Consulting.

 

Intel’s Winter expects fully autonomous cars to collect, process and analyze four terabytes of data in 1 { hours of driving, which is the average amount a person spends in a car each day. That’s equal to storing over 1.2 million photos or 2,000 hours of movies. Such computing power now costs over $100,000 per vehicle, Zeng said. But that cost could fall as more cars are built.

 

Someday autonomous cars will have common sense programmed in so they will cross a double-yellow line when warranted or to speed up and find a gap to enter a freeway. Carnegie Mellon has taught its cars to handle the “Pittsburgh Left” by waiting a full second or longer for an intersection to clear before proceeding at a green light. Sensors also track crossing traffic and can figure out if a driver is going to stop for a sign or red light. Eventually there will be vehicle-to-vehicle communication to avoid crashes.

 

Still, some skeptics say computerized cars will never be able to think exactly like humans.

 

“You’ll never be able to make up a person’s ability to perceive what’s the right move at the time, I don’t think,” said New Jersey State Police Sgt. Ed Long, who works in the traffic and public safety office.

your ad here

China Simulates Extended Moon Stays Amid Space Drive

China is testing the ability for future astronauts to stay on the moon for extended periods, as Beijing accelerates its space program and looks to put people on the surface of the moon within the next two decades.

The official Xinhua news agency said volunteers would live in a “simulated space cabin” for between 60-200 days over the next year helping scientists understand what will be needed for humans to “remain on the moon in the medium and long terms”.

Chinese President Xi Jinping has called for China to become a global power in space exploration, with plans to send a probe to the dark side of the moon by 2018, the first ever such trip, and to put astronauts on the moon by 2036.

“While it remains unclear exactly how long China’s first lunar explorers will spend on the surface, the country is already planning for longer stays,” Xinhua said.

Two groups of four volunteers will live in the simulated cabin “Yuegong-1” to test how a life-support system works in a moon-like environment. A similar 105-day trial was carried out successfully in 2014.

The system, called the Bioregenerative Life Support System (BLSS), allows water and food to be recycled and is key to any Chinese probes to the moon or beyond.

“The latest test is vital to the future of China’s moon and Mars missions and must be relied upon to guarantee the safety and health of our astronauts,” Liu Zhiheng of the Chinese Academy of Sciences told the news agency.

The Yuegong-1 cabin has a central living space the size of a “very small urban apartment” and two “greenhouses” for plants.

In March, China announced plans to launch a space probe to bring back samples from the moon this year, while the country’s first cargo space craft docked with an orbiting space lab in April, a major step as Beijing looks to establish a permanently manned space station by 2022.

Despite the advances in China’s space program for military, commercial and scientific purposes, China still lags behind the United States and Russia.

your ad here

Tesla Selling Solar Tiles, Says They Look Like Traditional Roof

Electric carmaker Tesla has added another product to its lineup: Solar roof tiles.

As of Wednesday, customers worldwide could order a solar roof on Tesla’s website. Installations will begin next month in the U.S., starting with California. Installations outside the U.S. will begin next year, the company said.

The glass tiles were unveiled by Tesla last fall just before the company merged with solar panel maker SolarCity Corp. They’re designed to look like a traditional roof, with options that replicate slate or terracotta tiles. The solar tiles contain photovoltaic cells that are invisible from the street.

Guaranteed for life of home

Tesla CEO Elon Musk said one of the drawbacks to home solar installations has been the solar panels themselves: They’re often awkward, shiny and ugly. Buyers will want Tesla’s roof, he said, because it looks as good or better than a normal roof.

“When you have this installed on your house, you’ll have the best roof in the neighborhood. The aesthetics are that good,” Musk said in a conference call with media.

The roof is guaranteed for the life of the home, which is longer than the 20-year lifespan for a typical, nonsolar roof, Musk said. It has gone through the same hail, fire and wind testing that normal roofs endure.

Tesla’s website includes a calculator where potential buyers can estimate the cost of a solar roof based on the size of their home, the amount of sunlight their neighborhood receives and federal tax credits. They can also put down a refundable $1,000 deposit to reserve a place in line.

$42 per square foot

Tesla said the solar tiles cost $42 per square foot to install, making them far more costly than slate, which costs around $17 per square foot, or asphalt, which costs around $5. But homes would only need between 30 and 40 percent of their roof tiles to be solar; the rest would be Tesla’s cheaper nonsolar tiles, which would blend in with the solar ones.

It would cost $69,100 to install a solar roof with 40-percent solar tiles on a 2,600-square-foot roof in suburban Detroit, according to Tesla’s website. That includes a $7,000 Tesla Powerwall, a battery unit that stores the energy from the solar panels and powers the home. The roof would be eligible for a $15,500 federal tax credit and would generate an estimated $62,100 in electricity over 30 years. Over that time period, Tesla estimates, the homeowner would save $8,500.

Tesla said the typical homeowner can expect to pay $21.85 per square foot for a Tesla solar roof. The cost can be rolled into the homeowner’s mortgage payments and paid for over time, the company said.

Sales to be slow at first

Musk wouldn’t say how many orders the company expects to get this year. He expects the initial ramp-up to be slow.

“It will be very difficult and it will take a long time, and there will be some stumbles along the way. But it’s the only sensible vision of the future,” Musk said.

Palo Alto, California-based Tesla Inc. is making the solar tiles at its Fremont, California, factory initially. But eventually all production will move to a joint Tesla and Panasonic Corp. factory in Buffalo, New York. Panasonic makes the photovoltaic cells used in the solar tiles.

Tesla said it would be installing equipment in the Buffalo factory over the next few months.

your ad here

Amazon Trounces Rivals in Battle of the Shopping ‘Bots’

Earlier this year, engineers at Wal-Mart Stores Inc. who track rivals’ prices online got a rude surprise: the technology they were using to check Amazon.com several million times a day suddenly stopped working.

Losing access to Amazon.com Inc.’s data was no small matter. Like most big retailers, Wal-Mart relies on computer programs that scan prices on competitors’ websites so it can adjust its listings accordingly. A difference of even 50 cents can mean losing a sale.

But a new tactic by Amazon to block these programs — known commonly as robots or bots — thwarted the Bentonville, Arkansas-based retailer.

Its technology unit, @WalmartLabs, was unable to work around the blockade for weeks, forcing it to retrieve Amazon’s data through a secondary source, according to a person familiar with the matter who was not authorized to speak publicly.

The previously unreported incident offers a case study in how Amazon’s technological prowess is helping it dominate the retail competition.

Now the largest online retailer in the world, Amazon is best known by consumers for its fast delivery, huge product catalog and ambitious moves into areas like original TV programming. But its mastery of the complex, behind-the-scenes technologies that power modern e-commerce is just as important to its success.

Dexterity with bots allows Amazon not only to see what its rivals are doing, but increasingly to keep them in the dark when it undercuts them on price or is quietly charging more.

“Benchmarking against Amazon is going to become hard,” said Guru Hariharan, a former Amazon manager who now sells pricing software to retailers as chief executive of Mountain View, California-based Boomerang Commerce.

A Wal-Mart spokesman declined to discuss the January episode but said the company improves its technology regularly and has multiple tools for tracking items. He said the company offers value not only through pricing but from discounts for in-store pickup and other benefits.

A spokeswoman for Amazon said the company is aware of competitors using bots to check its listings and denied any “campaign” to stop them. “Nothing has changed recently in how we manage bots on our site,” she said. Still, she said, “we prioritize humans over bots as needed.”

Bots can slow down a website, a big motivator for retailers to block them.

Reuters interviewed 21 people familiar with bots and how they are deployed, including current and former Wal-Mart employees, former Amazon employees and outside specialists. Many spoke only on condition of anonymity because they were not authorized to discuss the issues publicly.

Most pointed to Amazon’s leadership in the burgeoning bot wars.

The company’s technological edge has been good for its profit margin, and it’s proving a winning formula for investors.

Shares of the internet powerhouse have risen about 15-fold since the market’s bottom in March 2009, while the S&P 500 has more than tripled in value. Amazon hit $100 billion in annual sales in 2015 — faster than any company in history, it said.

Brave new world

Bot-driven pricing has represented a massive change for the retail industry since Amazon helped pioneer the practice more than a decade ago.

Traditionally, brick-and-mortar stores changed prices no more than weekly because of the time and expense needed to swap labels by hand.

In the world of e-commerce, though, retailers update prices with ease, sometimes multiple times a day, helped by algorithms that consider inventory levels, sales forecasts and rivals’ pricing data.

To stay in the game, companies such as online wholesaler Boxed, based in New York, depend on a variety of methods including bots to ensure they do not lag others’ price moves for even 20 minutes.

“That’s like a lifetime during Christmas,” said Chief Executive Chieh Huang, whose company sells bulk staples like toilet paper and pet food. “If we’re not decently priced, we’ll see it almost immediately” in sales declines.

  

Disguised as humans

Using bots to view massive amounts of data on public websites — a process known as crawling or scraping — has many purposes. Alphabet Inc.’s Google, for example, constantly crawls the Web to gather information for its search engine results and to sell ads.

In e-commerce, though, the use of bots has developed into a cat-and-mouse game. Companies try to thwart the practice on their own websites while aiming to penetrate their competitors’ defenses. Third-party services abound to help less-savvy retailers.

To protect data from rivals, some retail websites use what’s known as a “CAPTCHA” — typically a distorted string of letters and numbers that humans can read but most bots can’t. Amazon shies away from the practice because it annoys some customers.

For merchants seeking to evade such defenses, disguising their computer programs as real shoppers is key. Some pricing technology experts have programmed computer cursors to meander through a Web page in the way a person might, instead of going directly to the prized data. Another technique is to use multiple computer addresses so that retailers cannot track a barrage of clicks to a single source.

“It is an arms race,” said Keith Anderson, a senior vice president at e-commerce analytics firm Profitero, based in Ireland. “Every week or every month, there’s some new approach from both sides.”

Amazon’s maneuver that halted Wal-Mart in January took aim at a specialized Web browser called PhantomJS. Unlike, say, Internet Explorer, this browser is designed specifically for programmers — a telltale clue that its users are not typical shoppers. Amazon put up a digital curtain to hide its listings from PhantomJS users, according to three people familiar with the situation.

It was unclear how the move, which was not aimed at Wal-Mart in particular, affected other companies.

Tests conducted in recent weeks for Reuters show that among major U.S. retail chains, Amazon had by far the most sophisticated bot detection in place, both for its home page and for two popular items selected by Reuters because they change price frequently — a De’Longhi coffee maker and a Logitech webcam.

The tests were run by San Francisco-based Distil Networks, which sells anti-bot tools. In one of the tests, Distil programmed bots to hit each retailer’s website 3,000 times, but slowly enough to mimic a person clicking through listings. This tricked most retail behemoths, but not Amazon.

Blocked bots would not have seen, for instance, that Amazon’s price for the De’Longhi espresso machine changed four times in a single 24-hour period starting on the morning of April 25, according to price tracking website camelcamelcamel.com. During that time, the price swung by more than 10 percent, from a low of $80.06 to $88.16.

Swarming with bots

Despite Amazon’s capabilities, the sheer volume of crawling on its site is staggering. At times, as many as 80 percent of the clicks on Amazon product listings have been from bots, people familiar with the matter say, compared with just a third or more of the traffic on other large sites.

In addition to rivals seeking price data, that traffic includes bots from university researchers studying competition, search engines, advertising services and even fraudsters trying to break into Amazon accounts.

For Wal-Mart, a small group in Silicon Valley directs its automated pricing strategy while dozens of engineers in India and around the world handle the code, current and former Wal-Mart employees said.

Amazon had about 40 engineers who would covertly extract and organize rivals’ data with bots as of several years ago, one of the people interviewed said. Amazon did not discuss the size or structure of its teams working with bots.

According to one U.S. patent application, Amazon is working on encryption technology that would force bots, but not humans, to solve a complicated algorithm to gain access to its Web pages.

“Amazon has both the competency to detect bot traffic and the wherewithal to do something about it,” said Scott Jacobson, a former Amazon manager and now managing director of Madrona Venture Group. That “isn’t the case for most retailers.”

 

your ad here

Microsoft Adds Tools to Flag Bad Content in Amazon, Google Faceoff

Microsoft Corp. on Wednesday turned up the heat on other technology giants by launching new image and video recognition products which could help it court businesses worried about running ads next to offensive content.

The Redmond, Washington-based company said its new Video Indexer can identify faces, voices and emotions in moving pictures. Separately, its Custom Vision Search lets companies build apps that recognize images with just a few lines of code.

For brands, knowing what’s in the videos that they sponsor has become a hot-button issue since major companies began canceling ad deals with Alphabet Inc’s Google this year over hate speech playing on its subsidiary YouTube.

Microsoft’s Video Indexer has similarities to a tool Google launched in March; Amazon.com Inc also said last month it could flag insulting images via a cloud-based service.

Microsoft’s latest moves underscore how its focus has evolved from its staple Windows software to the cloud, where it is competing with Amazon to sell data storage and computing power. Extra analytics such as image recognition may prove key to luring Web developers.

“It’s hard to understand what’s in the video” the longer it is, said Irving Kwong, a senior product director at Microsoft, in an interview ahead of the company’s developer conference Build. He said Video Indexer, which analyzes videos far faster than humans can, could help a user “harness and get more out of the video content that you have.”

The tools launched in preview by the Microsoft Cognitive Services unit on Wednesday, including a decision recommendation service, have one aim apart from winning business: data.

Microsoft views the tools as a way to put powerful computing into people’s hands and improve the tools at the same time, because processing more data is key to reaching artificial intelligence. Others including Amazon are pursuing this strategy, with the prize being a new revenue stream.

Research firm International Data Corporation has forecast the market for such tools will balloon to over $47 billion in sales in 2020 from $8 billion in 2016.

Microsoft pulled back the curtain on experiments that are further afield, too. It announced a new Cognitive Labs unit and the so-called Project Prague: technology to allow people to control computers simply with hand gestures.

your ad here

Facebook to Play Down Links to Websites With Deceptive Ads

Facebook is planning to intensify its crackdown on so-called clickbait websites, saying it will begin giving lower prominence to links that lead to pages full of deceptive or annoying advertisements.

The downgrade of the links was expected to take effect beginning on Wednesday on News Feed, the home page of Facebook where people go to see posts from friends and family.

Facebook said it wanted to downplay links that people post to websites that have a disproportionate volume of ads relative to content, or that have deceptive or sexually suggestive ads along the lines of “5 Tips to be Amazing in Bed” or “1 Crazy Tip to Lose Weight Overnight!”

Links to websites with pop-up ads or full-screen ads also would be downplayed, it said.

People scrolling through their News Feed are often disappointed when they click on such links and do not find valuable information, Andrew Bosworth, Facebook’s vice president of ads and business platform, said in an interview.

“People don’t want to see this stuff,” he said. “We’re just trying to figure out how to find it and rank it further down News Feed when possible.”

Facebook uses a computer algorithm to determine which posts people see first from friends and family, and it frequently refines the algorithm to keep up with spam or other concerns.

The company said in August it was adjusting the algorithm to downplay news stories with clickbait-style headlines, a style of headline that intentionally withholds information or misleads people to get them to click on them.

In December, facing criticism that hoaxes and fake news stories spread too easily on Facebook in the run-up to the U.S. presidential election on November 8, the company made it easier for people to report those kinds of posts.

Facebook, the world’s largest social media network with 1.9 billion monthly users, has enormous power with its algorithms to potentially drive traffic to media publishers or stymie it.

The company said it reviewed hundreds of thousands of websites linked to from Facebook to identify those with little substance but lots of disruptive or shocking ads.

Bosworth declined to name any websites Facebook wants to target. He said only publishers of spam needed to worry about seeing less traffic, and other publishers could see their traffic go up.

“This is a small number of the worst of the worst,” he said.

your ad here

Therapists Use VR to Treat Balance Problems

New York University researchers have developed a system combining virtual reality with a pressure sensing mat they say could help people with vestibular dysfunction, which affects parts of the inner ear and brain and results in problems with balance, or those suffering from vertigo or dizziness as a result of a brain injury. Faith Lapidus reports.

your ad here

AeroVironment Unveils Palm-sized Surveillance Drone for US Military

Drone-maker AeroVironment Inc. unveiled a small four-rotor surveillance helicopter on Tuesday that can be carried in a small pouch and launched from the palm of a hand.

The smaller size and simplicity of operation means it can used by ordinary soldiers, offering squads and other small military units the kind of surveillance capacity previously reserved for larger military units, where drones are operated by specialists.

AeroVironment said it delivered 20 of the 5-ounce (140-gram) Snipe unmanned aircraft to its first U.S. government client in April. The company declined to identify the government agency that purchased the drones, but Aviation Week reported last year that AeroVironment was developing prototypes for the U.S. Army.

Designed to worn as part of uniform

AeroVironment said the drone benefited from advances in technology achieved in the development of its Nano Hummingbird drone for DARPA, the Defense Advanced Research Projects Agency, which has been responsible for many technological and scientific breakthroughs used by the military.

Kirk Flittie, AeroVironment’s vice president in charge of unmanned aircraft systems, said in a statement the Snipe copter drone is “designed to be worn by its operator so it can be deployed in less than a minute.”

Battery life is 15 minutes

The aircraft, which is intended for intelligence and reconnaissance missions, can relay high-resolution images and record video both day and night. It can fly at speeds of 20 mph (35 kph), has a range of more than a kilometer (half-mile), and can fly for about 15 minutes on batteries, the statement said.

AeroVironment’s hand-launched Raven unmanned aircraft, which weighs 4.2 pounds (2 kg) and has a wingspan of 4.5 feet (1.4 meters), is one of the most widely used military surveillance drones, with more than 19,000 built.

Shares of AeroVironment dropped 0.2 percent to $29.13 within its 52-week range of $22.16 to $32.44.

your ad here

As Droughts Worsen, Phones and Radios Lead Way to Water for Niger’s Herders

When Moumouni Abdoulaye and his fellow herders in western Niger used to set off on scouting missions in search of water, they feared for their livestock – and for their own lives.

Unable to rely anymore on their traditional methods of predicting the weather amid increasingly erratic droughts and floods, and lacking modern climate information, they struggled to predict where, and when, they might find water in the vast arid region.

“We were living in limbo. Without knowledge, we constantly risked our lives,” said Abdoulaye, seeking shade under a tree from the fierce midday sun in Niger’s Tillabery region.

But a project to involve the region’s semi-nomadic people in the production of locally-specific, real-time weather forecasts – and provide them with radios and mobile phones to receive and share the information – is transforming the lives of tens of thousands of Nigeriens like Abdoulaye.

“Now we receive daily updates about rainfall, can call other communities to ask if they have had rain, and plan our movements accordingly,” Abdoulaye told the Thomson Reuters Foundation.

In Niger, as across much of Africa’s Sahel region, frequent droughts have impoverished many people and made it much harder to make a living from agriculture. That is happening in a West African country already consistently ranked at the bottom of the U.N. Human Development Index.

With climate change now exacerbating pressures, experts say there is a growing and urgent need for better climate information, to ensure farmers and pastoralists are equipped to cope with unpredictable rainfall and climate shocks.

Across Africa, only limited climate data is collected and made available, and information services are often not well understood, user-friendly, or followed up to help people put the information to use in adapting to climate threats, experts say.

Ensuring that communities play a role – alongside state and aid agencies – in generating and sharing weather information is the best way to get them to use it and to build their resilience to the growing pressures, said Blane Harvey of the Overseas Development Institute (ODI).

“Co-participation is very powerful because people will buy into a service if they’ve had a hand in producing it,” he said.

“Crucially, they bring in their local knowledge, which helps to downscale and triangulate more regionalized forecasts,” added Harvey, a research associate at the London-based think tank.

Collaboration crucial

A lack of weather stations across Africa means that forecasts, produced by national meteorological agencies, tend to be too broad to be of much use at a local level.

But a project launched in 2015, funded by the U.K. Department for International Development (DFID) and led by CARE International, is trying to improve the quality of and access to climate data for farmers and pastoralists in western Niger.

CARE’s project under the Building Resilience and Adaptation to Climate Extremes and Disasters (BRACED) program aims to help 450,000 people become better prepared for climate shocks, including through giving them access to better forecasts.

The goal is to help them diversify their farming and find ways of making money which are not so heavily impacted by climate change, in order to better withstand climate pressures.

For farmer Adamou Soumana, improved access to climate information has given his village a better understanding of the weather shocks they are encountering, and the confidence to adopt resilience boosting strategies such as using climate-adapted seeds, finding sustainable ways to harvest forest products, and storing harvests.

“Previously, if it rained in January, we rushed to plant our crops thinking the rainy season starts – when in fact it never comes before May,” he said.

“Now we understand climate shocks, and can plan our activities in advance. We feel more resilient,” he said.

The BRACED project has helped communities by acting as a broker between them and meteorological agencies, and ensuring agency partners are trained to interpret climate data, translate it into local languages and help people to make sense of the forecasts.

The project also connects local people who collect rainfall data, as well as other farming and pastoralist leaders, with community radio stations to share real-time information daily.

Incorporating traditional observations – such as when trees bloom or the way birds behave – and having regular discussions with communities is key to building and maintaining trust in climate information services, said Richard Ewbank of Christian Aid, another charity working on climate resilience issues.

“Having experts and community leaders together and combining local knowledge with scientific forecasts is the best way to agree on a climate scenario, and make key decisions for the coming season,” said the global climate advisor for the charity.

Life or death decisions

In addition to improving the quality of climate information and making it more relevant on a community-by-community basis, the BRACED project in Niger has provided mobile phones and radios to boost the spread of the forecasts.

“Receiving and sharing the information in this way not only helps pastoralists know when and where to move, it also builds relationships and trust between people,” said Amadou Adamou of the Association for the Revitalization of Livestock Breeding.

Good information can not only help pastoralists find water sources but also help them know when to sell their animals, especially if drought is on the way, according to Adamou.

The mobile phones and radios used are powered by solar cells, enabling pastoralists to get forecasts while on the move. They also are given to both male and female community chiefs to ensure women have equal access to the information.

While better climate data has improved resilience for many in Tillabery region, in both settled and nomadic communities, there is still much room for improvement, several experts said.

Residents want to see more meteorological advisers based locally who can help them have regular discussions about the forecasts.

They also want more help to convert the data into action on the ground such as diversifying the crops they grow and better planning the timing and direction of their migration routes in search of water. They also want the information service expanded to cover neighboring countries.

“Getting better forecasts is one thing. But having good, solid advice about what the information means, and discussions on how to use it to become more resilient, is what people in the region really want,” said Harouna Hama Hama of CARE.

For roaming communities like Abdoulaye’s – people who cross into neighboring Benin, Burkina Faso and Togo with their livestock – expanding the climate data effort to produce region-wide forecasts could mean the difference between life and death for many of their members, Abdoulaye said.

“Whenever some of our people head to these countries, they and the animals risk dying of thirst,” he said. “With better forecasts, and for the whole region, we could lose fewer lives.”

your ad here

Amazon Gives Voice-enabled Speaker a Screen, Video Calling

Amazon is giving its voice-enabled Echo speaker a touch screen and video-calling capabilities as it competes with Google’s efforts at bringing “smarts” to the home.

 

The new device, called Echo Show, goes on sale on June 28 for $230.

 

The market for voice-assisted speakers is small but growing. Research firm eMarketer expects usage of the speakers to more than double, with nearly 36 million Americans using such a device at least once a month by year’s end.

 

Amazon’s Echo is expected to continue its dominance, with a share of nearly 71 percent, though eMarketer expects Google’s Home speaker to cut into that share in the coming years.

 

Amazon says it’s also bringing calling and messaging features to its existing Echo and Echo Dot devices and the Alexa app for phones.

your ad here

FCC Website Under Attack

The website for the Federal Communications Commission has come under attack.

Initially, the problems were believed to have been caused by comedian John Oliver, who on Sunday urged his viewers to leave comments on the site about the FCC’s plans to revisit net neutrality rules.

Net neutrality rules were implemented in 2015 and required internet service providers to treat all traffic equally. New FCC chairman Ajit Pai has said he will review the rules, arguing they are “holding back investment, innovation and job creation.”

The FCC, which “regulates interstate and international communications by radio, television, wire, satellite, and cable,” says the website attacks were coordinated, distributed denial of service attacks, not a surge in traffic.

“These actors were not attempting to file comments themselves, rather they made it difficult for legitimate commenters to access and file with the FCC,” chief information officer David Bray said. “While the comment system remained up and running the entire time, these distributed denial of service events tied up the servers and prevented them from responding to people attempting to submit comments.”

On his show, “Last Week Tonight,” Oliver said, “Every internet group needs to come together … gamers, YouTube celebrities, Instagram models, Tom from MySpace if you’re still alive. We need all of you,” he said.

The FCC will vote on net neutrality rules on May 18.

your ad here

ESA Looking For Life on Mars

Exploration of Mars has not proceeded without setbacks, but that did not discourage scientists trying to find the answer to one of the crucial questions – has the red planet ever sustained life? If the answer is positive, it would mean that we are not alone in the universe. Scientists at the European Space Agency ESA have already moved on from last year’s crash of their lander, preparing its orbiting parent spacecraft to start looking for life-related gases. VOA’s George Putic reports.

your ad here