Search This Blog

Thursday, February 5, 2015

Uber Will Add Panic Button And Location/Journey Sharing In India

As reported by TechCrunch: Late last year, Uber announced plans for tighter safety measures in India following the rape of a passenger using its service in December. Now it has confirmed that two major features — an in-app panic button and journey/location sharing — will roll out to users in India on February 11.

The company went public with the launch date after Times Of India reported that the Mumbai transportation department was considering a ban on its service over its apparent approach to safety. Authorities are reportedly “not happy with Uber representatives’ responses during various meetings held to consider measures for passengers’ safety.”

Uber cleared the air on its plans to settle “some misconceptions” around its safety policy — which already includes more stringent background checks and a dedicated emergency response team. That will be boosted when the in-app panic button, which alerts local police when triggered, and a ‘safety net’ feature, which goes beyond Uber’s existing ‘share my ETA’ feature to let customers share details of their location and trip with up to five other people, go live in India next week.

The company previously said that these features will be rolled out worldwide at a later date, but India is the first priority in response to heightened concerns about safety following the rape incident.

Times Of India also reported that Uber has irked Mumbai authorities with its reluctance to install physical panic buttons in its drivers’ cars, something that new regulations have made mandatory in the city. Notes from the transportation department reportedly read that Uber “appears [to] want to put the onus of passenger safety on a cab’s owner and driver.”
Uber argued, however, that requiring physical panic buttons would be confusing because many drivers use multiple taxi app services. Since each one button is connected to a single taxi app service, that would necessitate multiple physical panic buttons in many cars, it argued.

“In a situation of distress the rider would have to pick the correct operator’s panic button to be able to get help on time. [In a car that works with India’s four top taxi app services] that’s 25 percent chance of success; and a decision that has to be made and executed in a split-second, if at all,” Uber said in a blog post.

Uber did propose a single panic button — installed by the driver and connected directly to the local police — as a better option. However, it then hit out at officials in Mumbai, adding that “forward looking regulatory authorities in India are already embracing this position and requiring technology platforms to have in-app safety features.”

The Uber returned to the road in New Delhi last month, six weeks after it was banned following the rape. The U.S. company applied for a mandatory radio license and revealed that it has adopted a non-profit model in the city until it is granted.


Bellingcat Launches Crowdsourced Ukraine Conflict Vehicle Tracking Project

From Bellingcat: Over the past few months, the Bellingcat team has been working on something slightly different from our previously published work. Now, we’re pleased to launch a crowdsourced effort to track the movements of military vehicles both inside and in the vicinity of Ukraine, primarily to determine if equipment has been transferred across the border from Russia to Ukraine.

To kick-start the effort, we have used Daniel Romein’s original research of last summer’s military movements to build an initial data set for launch, supplemented with additional interesting sightings collected by the Bellingcat team through social media. The data is made available through Silk, a beautiful data publishing and visualization platform.

You can access the Bellingcat Ukraine conflict vehicle tracking Silk here: http://bellingcat-vehicles.silk.co/

overview-map Why are we doing this? We do not want to simply report a list of cases when we think Russian vehicles have crossed the border to Ukraine, but want to provide the active community of social media investigators a platform to do their own research, as well as allow the community to contribute to the data set with their findings through Checkdesk. The Bellingcat team will maintain the data in Silk, and continuously make updates based on the verified submissions. As we consider the current data set ‘Beta quality’, we also welcome corrections to the initial data set via Checkdesk, should you find any errors.

Our hope is to build a large data set that can be mined to make entirely new discoveries. Some sightings of vehicles may not be so interesting on their own, but in a sequence raise new questions. As an example, a group of vehicles was seen travelling towards Russia’s Donetsk on June 21st, and similar vehicles were seen travelling through Ukraine’s Krasnodon later on the same day. Could these be the same vehicles after crossing the border?
In Silk, there are three collections of data:
  • Sightings, which provide links to whatever media is available of the event, as well as additional details like data, location, a breakdown of types of equipment seen. In some cases, a sighting can be elaborated down to the uniquely identifiable vehicles. Sightings can also be grouped, so if for instance the same convoy is seen in multiple YouTube videos, these sightings can be grouped together. Link to a filterable list of all sightings.
  • Equipment Categories, which are basically ‘buckets’ for categorizing the various types of equipment seen in the video. The category list also doubles as a handy reference to different vehicle types. Link to equipment category list.
  • Unique Units, listing individually identifiable units, e.g. based on the license plate or other identifiers. Link to list of uniquely identifiable units.
The data can be visualized and explored in many different ways, so we encourage you do dig in and experiment with e.g. the different mapping options the tool provides!

As for the ready made views, below is a screen shot of the filterable equipment sighting list. Through this view, it’s possible to for instance look up all Pantsir-S1 sightings in the data set, or all sightings from a given month.
equipment-filter
Another powerful tool is the search. This is very useful for e.g. looking up if certain military license plates are recorded in the database.

search Findings to date
So, what can be found in the data set already today? Let’s have a look.
Around Luhansk, there have been several sightings of Dozor-N armoured vehicles, which are unique to Russia.
dozor-n
East of Donetsk, Pantsir-S1 sightings were reported in late January. This is also a weapon system used only by Russia. Interestingly, there were also several reports through social media of Pantsir-S1 sightings near the Ukranian border not long before this.

pantsirs1
Msta-S self-propelled howitzers were filmed travelling on trailers through Rostov in July. In early September, an Msta-S was filmed driving through the town of Novoazovsk, and the unit’s unique markings seem to match exactly to one of the units that were seen passing through Rostov. Again, seems that the units crossed the border from Russia to Ukraine.

mstas
Finally, a picture of a Kamaz truck’s trailer in Boguchar was noted on social media, as it was linked to transporting tanks to the Ukranian border. However, cross-referencing the license plate to other trailers in our data set reveals something very interesting: this same trailer was in June transporting the Buk TELAR unit which is linked with the downing of MH17.

buktrailer
So, starting with these kinds of findings, we can’t wait to see what the community can do with this data and platform.

Submitting data through Checkdesk
Checkdesk is a platform that allows users to collaborate on the verification of reports, videos, photographs, and other information. Bellingcat hopes that Checkdesk will be used to bring together a lot of the information already shared and discussed on Russian vehicles in Ukraine, and enable the information to be reviewed and verified openly. We also hope that by making the process as open as possible we encourage our readers to participate in the discovery and verification process, giving them the opportunity to learn about verification and giving those who already have experience verifying content chance to share their knowledge.

Using Checkdesk couldn’t be simpler. A Checkdesk story (example here) is made up of updates, and each update is generally based around verifying individual elements of a story, be it an image or a claim made about the story. Anyone can add verification footnotes to an update, and once “journalists” (site moderators) decide the update is verified or not they can update the status to False, Verified, Undetermined, In Progress, or Not Applicable (example here).

It’s also possible to embed updates into web pages with a simple script:
As part of the current project we ask users to submit all sightings and reports of vehicles in Ukraine to the following updates, and the Bellingcat team will then review and organise the submissions for verification and adding to the database.
The Bellingcat team also encourages the preservation of content, especially as material is frequently deleted on social media sites once its discovery has been made public. Videos can be downloaded by a variety of websites, and Archive.org allows many pages to archived.
The following are guides and other resources on verification:

Tools
Google Earth Pro – Now free.
Clip Converter – Video saving site.
Keepvid – Video saving site.
Tube Offline – Video saving site for videos from VK.com.
Archive.org – Site for archiving web pages.
VLC Media Player – A free and light weight media player with various useful tools and options.
Paint.Net – Free digital photo editing software.

Guides
A Beginner’s Guide to Geolocating Videos
Verification and Geolocation Tricks and Tips with Google Earth
Geolocation Techniques – Mapping Landmarks
Open Source Information in Conflict Zones
War and Pieces – Social Media Investigations
The Verification Handbook


The Dark Future of Transportation: "Beyond Traffic" a USDOT Report

As reported by The Verge: The US Department of Transportation (USDOT) just released "Beyond Traffic," a study best described as a dire warning about how the country's arterial lines will clog and implode over the next several decades. As far as USDOT secretary Anthony Foxx is concerned, pretty much everything is in bad shape and getting worse: roadways, railways, waterways, the whole nine yards.

The problems are endless: ancient infrastructure is crumbling without the money to repair or replace it. Renewable energy strategies aren't materializing quickly enough. Rapidly growing urban centers are buckling under the weight of the commuting residents that occupy them. And all the while, the specter of global warming threatens to quite literally sink everything.

In a perfect world, the DOT would be coming to the table with a slate of solutions — not problems — but it's not. Instead, it's calling Beyond Traffic "an invitation to a conversation" about how to fix things. "Everyone uses our transportation system, which means anyone can help build its future," a slide deck highlighting the study reads.

Here are some of the major takeaways.
Beyond Traffic 1

We're basically doomed unless we radically change things

"America's transportation system is a fossil in 2045," reads the slide deck. That's not wrong: even today, American bridges are regularly cited as being structurally deficient with no replacements in sight. It warns about the rise of new urban centers — "Omaha is the new LA" in the DOT's dystopian vision of the future — and rail systems so overcrowded that trains never actually stop to pick anyone up. No one can get to work.
Beyond Traffic 6

The USDOT seems to be really excited about millennials and ride-sharing

The study makes reference to several trends unique to younger people — a downturn in driving paired with a huge uptick in the acceptance of technology. "Data enables innovative transportation options, such as car-sharing, ride-sharing, and pop-up bus services, and more rapid delivery of goods," the presentation notes. (Notably, Ford announced at CES this year that it's testing practically all of these things.) This might ultimately be terrible news for car lovers, but great news for the environment, infrastructure budgeting, and just about everything else.
Beyond Traffic 5

Self-driving cars are definitely happening, because the regulatory people are on board

It's widely understood that the biggest hurdle to getting self-driving cars on the roads over the next couple decades won't be a technological one — it's regulatory. Lawmaking is almost always a bureaucratic nightmare, with special interests pulling strings and naysayers gumming up the works. For companies like Google and major automakers pursuing their own self-driving projects, though, this is probably good news: Beyond Traffic makes reference to the advent of driverless tech. "Imagine eliminating 9 out of every 10 car crashes. That's the bright promise driverless technology holds over the next 30 years," the presentation reads. A three-decade time horizon probably isn't what Google has in mind, but at least they've got the Department of Transportation talking about it in a sharply positive light

Wednesday, February 4, 2015

FCC Chairman Tom Wheeler: This Is How We Will Ensure Net Neutrality

As reported by WiredAfter more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question has arrived. This week, I will circulate to the members of the Federal Communications Commission (FCC) proposed new rules to preserve the internet as an open platform for innovation and free expression. This proposal is rooted in long-standing regulatory principles, marketplace experience, and public input received over the last several months.


Broadband network operators have an understandable motivation to manage their network to maximize their business interests. But their actions may not always be optimal for network users. The Congress gave the FCC broad authority to update its rules to reflect changes in technology and marketplace behavior in a way that protects consumers. Over the years, the Commission has used this authority to the public’s great benefit.

The internet wouldn’t have emerged as it did, for instance, if the FCC hadn’t mandated open access for network equipment in the late 1960s. Before then, AT&T prohibited anyone from attaching non-AT&T equipment to the network. The modems that enabled the internet were usable only because the FCC required the network to be open.

Companies such as AOL were able to grow in the early days of home computing because these modems gave them access to the open telephone network.

I personally learned the importance of open networks the hard way. In the mid-1980s I was president of a startup, NABU: The Home Computer Network. My company was using new technology to deliver high-speed data to home computers over cable television lines. Across town Steve Case was starting what became AOL. NABU was delivering service at the then-blazing speed of 1.5 megabits per second—hundreds of times faster than Case’s company. “We used to worry about you a lot,” Case told me years later.

But NABU went broke while AOL became very successful. Why that is highlights the fundamental problem with allowing networks to act as gatekeepers.


While delivering better service, NABU had to depend on cable television operators granting access to their systems. Steve Case was not only a brilliant entrepreneur, but he also had access to an unlimited number of customers nationwide who only had to attach a modem to their phone line to receive his service. The phone network was open whereas the cable networks were closed. End of story.

The phone network’s openness did not happen by accident, but by FCC rule. How we precisely deliver that kind of openness for America’s broadband networks has been the subject of a debate over the last several months.

Originally, I believed that the FCC could assure internet openness through a determination of “commercial reasonableness” under Section 706 of the Telecommunications Act of 1996. While a recent court decision seemed to draw a roadmap for using this approach, I became concerned that this relatively new concept might, down the road, be interpreted to mean what is reasonable for commercial interests, not consumers.


That is why I am proposing that the FCC use its Title II authority to implement and enforce open internet protections.

Using this authority, I am submitting to my colleagues the strongest open internet protections ever proposed by the FCC. These enforceable, bright-line rules will ban paid prioritization, and the blocking and throttling of lawful content and services. I propose to fully apply—for the first time ever—those bright-line rules to mobile broadband. My proposal assures the rights of internet users to go where they want, when they want, and the rights of innovators to introduce new products without asking anyone’s permission.

All of this can be accomplished while encouraging investment in broadband networks. To preserve incentives for broadband operators to invest in their networks, my proposal will modernize Title II, tailoring it for the 21st century, in order to provide returns necessary to construct competitive networks. For example, there will be no rate regulation, no tariffs, no last-mile unbundling. Over the last 21 years, the wireless industry has invested almost $300 billion under similar rules, proving that modernized Title II regulation can encourage investment and competition.

Congress wisely gave the FCC the power to update its rules to keep pace with innovation. Under that authority my proposal includes a general conduct rule that can be used to stop new and novel threats to the internet. This means the action we take will be strong enough and flexible enough not only to deal with the realities of today, but also to establish ground rules for the as yet unimagined.


The internet must be fast, fair and open. That is the message I’ve heard from consumers and innovators across this nation. That is the principle that has enabled the internet to become an unprecedented platform for innovation and human expression. And that is the lesson I learned heading a tech startup at the dawn of the internet age. The proposal I present to the commission will ensure the internet remains open, now and in the future, for all Americans.

Tuesday, February 3, 2015

SpaceX Targets Sunday Launch; Will Retry Booster Landing

As reported by USA Today: SpaceX is targeting a 6:10 p.m. ET launch on Sunday of the Deep Space Climate Observatory (DSCOVR) mission from Cape Canaveral Air Force Station, NASA confirmed Friday.

The mission is a collaboration between NASA, the Air Force and National Oceanic and Atmospheric Administration.

After launch, SpaceX again will try to land the Falcon 9 rocket booster an ocean platform. The first try last month resulted in the rocket hitting the "autonomous spaceport drone ship" with a fiery crash that did not cause extensive damage.

Though it hasn't landed a booster successfully yet, SpaceX last week released a concept video showing all three boosters from a Falcon Heavy rocket, which has not yet launched, flying back to a landing pads at Cape Canaveral Air Force Station.

SpaceX last week also revealed a picture of the Dragon capsule it will use to test a key system needed for future human missions to the International Space Station, targeted for 2017.


U.S. Air Force Budget Sets Stage for GPS Satellite Competition

As reported by Reuters: The U.S. Air Force's fiscal 2016 budget plan earmarks $7.1 billion for space programs, including a 10th Global Positioning System III satellite by Lockheed Martin Corp, and sets the stage for future competition for such satellites.

Lockheed won the contract to build GPS-III satellites in 2008, beating out Boeing Co, which had built earlier GPS satellites. The program has since run into delays due to technical challenges with a key sensor built by Exelis Inc.

The Air Force had no immediate details on the potential competition, how many satellites it would include, or when the process would begin.

Lockheed said it would review the budget in the coming weeks to understand the specific impact to its business. "We are completely focused on the execution and performance on our existing contract," said spokesman Chip Eschenfelder.

Boeing had no specific comment on the prospect of a GPS competition, but said it remained focused on improving productivity and lowering the cost of weapons systems.

The GPS system provides worldwide, 24-hour position, navigation and timing information for military and civilian users. The Air Force plans to buy a total of 27 GPS III satellites.

The fiscal 2016 budget for the GPS program includes $673 million in research and development funding, and $265 million in procurement funding for a total of $938 million, down from $1.02 billion in fiscal 2015.

If approved by Congress, the 2016 budget request would pay for GPS III satellite 10, and continue work on a next-generation ground control system being built by Raytheon Co. The Raytheon program was restructured last year, doubling its cost.

The program is due to be reviewed by the Pentagon's chief arms buyer this month.

No comment was immediately available from Lockheed or Boeing about the potential competition.

The Air Force space budget also funds five launches under the Evolved Expendable Launch Vehicle program, of which three would be set aside for competition, according to an Air Force spokeswoman.

The United Launch Alliance, a joint venture of Lockheed and Boeing, is the only provider of launches under the EELV program at the moment, but the Air Force has said it expects to certify privately held Space Exploration Technologies, or SpaceX, to compete for EELV contracts by mid-year.

The budget also begins funding for an effort aimed at ending U.S. reliance on a Russian-built engine now used to power the Atlas 5 rocket built by United Launch Alliance.


BMW Patches Wireless Security Flaw Affecting Over 2 Million Vehicles

As reported by The Stack: BMW has fixed a security bug which left 2.2 million cars, including models from Rolls Royce and Mini, exposed to hackers.

The flaw was discovered in vehicles using BMW’s ConnectedDrive software, which runs from an installed on-board SIM card. Via the smartphone app, owners can remotely control a number of functions including door locks, air conditioning and sounding the horn. The software does not operate any of the vehicles’ hardware such as brakes or steering.

Researchers from the German motorist association ADAC identified the flaw which allowed the system to connect to fake mobile phone networks, enabling hackers to remotely control the Sim card. No known hacks have been reported.

BMW has now applied a patch employing HTTPS protocol (HyperText Transfer Protocol Secure) to encrypt the data from the cars.

"On the one hand, data are encrypted with the HTTPS protocol, and on the other hand, the identity of the BMW Group server is checked by the vehicle before data are transmitted over the mobile phone network," BMW released in a statement.

For security experts the use of HTTPS should have been a given practice. "You would probably have hoped that BMW's engineers would have thought about [using HTTPS] in the first place," said security blogger Graham Cluley.

As an increasing number of connected cars are introduced into the market, experts warn of the growing threat of malware and hacking targeted at vehicles.

"I think we are going to see more malicious attacks [on connected cars]. If someone finds a vulnerability in an internet-enabled car you could have the same situation that you have now for browsers...it doesn't take much imagination to think of the abuse this could cause," Mark O’Neill of software organisation Axway, told IBTimes UK.

However, this BMW case has helped to instill confidence that software updates and patches can be distributed swiftly and effortlessly to connected vehicles, with drivers able to manually select updates to ensure they are fully covered.