Sci-Tech


Australia’s Re-Entry Into Space Race Could End Gaps In Satellite Coverage

23rd April 2017

Australia’s return to the space race could provide valuable data on upper atmospheric weather and help close gaps in satellite coverage, an expert says.

The three satellites, made Down Under, blasted into orbit this week. It was the first time in 15 years that Aussie-made satellites have been sent into space.

They are the work of 50 University of Adelaide students and staff.

Since the launch, the Australian research satellites have reportedly been successfully transferred to the international space station where they are awaiting a catapult out of a canon and into orbit.

Dr Brad Tucker, an astronomer at Canberra’s Mt Stromlo Observatory, said the satellites were part of a network being built to provide “continuing monitoring of the upper atmosphere”.

 

“When we talk about gaps in satellite coverage, by having tons of them (satellites) we actually end the problem of having gaps in satellite coverage,” he told the Seven Network on Saturday.

The satellites would collect data from the thermosphere on things like solar flares, upper atmosphere winds and storm systems.

“It’s really (about) predicting better monitoring and space weather monitoring,” he added.

It’s only the third time that Aussie-constructed satellites have been sent into space, with the first orbital device launched back in 1967, followed by one in 2002.

The latest Australian satellites, known as “cubesats”, join a total of 28 satellites recently launched into space on a rocket from an air force base in the US.

The small satellites weigh just 1.3kg each, but researchers say they could provide groundbreaking data on weather and communication systems.

 

source: http://www.huffingtonpost.com.au/2017/04/21/australias-re-entry-into-space-race-could-end-gaps-in-satellite_a_22050122/?utm_hp_ref=au-homepage

Feds to Deploy Facial Recognition Tech at Border Checkpoints

20th April 2016

U.S. Customs and Border Protection is planning to unveil a facial recognition program that will track visa holders at U.S. airports while using the same technology on drones to patrol the southern border.

The system, called Biometric Exit, is currently being tested on a one-way flight from Atlanta to Tokyo and is expected to be rolled out to more airports this summer after being expedited by the Trump Administration, according to a report from The Verge.

The current practice used by Customs and Border Protection agents is to take photos and fingerprints of every visa holder who enters the U.S., but there is no system in place to verify that a visa holder has left before their visa expires. This is where Biometric Exit comes in.

Passengers will have their photos taken at the airport before boarding flights, that photo will cross-reference with “passport-style photos provided with the visa application.” If there is no match, then that will raise flags about whether the visitor entered the United States illegally.

U.S. Customs and Border Protection’s (CBP) Larry Panetta, who is leading the airport segment of the project, said, “We currently have everyone’s photo, so we don’t need to do any sort of enrollment. We have access to the Department of State records so we have photos of US Citizens, we have visa photos, we have photos of people when they cross into the US and their biometrics are captured into [DHS biometric database] IDENT.”

President Trump expedited the implementation of Biometric Exit when he signed the executive order, “Protecting the Nation from Foreign Terrorist Entry Into The United States,” the same document that called for the temporary halt of immigrants from seven Middle Eastern countries.

“Sec. 7.  Expedited Completion of the Biometric Entry-Exit Tracking System.  (a)  The Secretary of Homeland Security shall expedite the completion and implementation of a biometric entry-exit tracking system for all travelers to the United States, as recommended by the National Commission on Terrorist Attacks Upon the United States,” the executive order states.

The CBP is also looking to use facial recognition at the border to help identify any person that is in relevant law enforcement databases.

Officials with the CBP solicited proposals from companies for small unmanned aerial systems (sUAS), like consumer drones, for deployment by Border Patrol agents along the southern border.

The agency is specifically looking for a drone that is small enough that it can fit into a truck, weighs under 55 pounds, and is deployable by a single agent in less than 5 minutes. Officials also want a drone fitted with state-of-the-art sensor technology which reportedly may include, “infrared cameras and facial-recognition capabilities.”

A document included with the solicitation, Small Unmanned Aircraft Systems (sUAS) Capabilities, said the agency is looking for a drone that can, “distinguish between natural and artificial features, and between animals, humans, and vehicles at long range.”

The same document also states that the agency is looking for a drone that, “would have facial recognition capabilities that allow it cross-reference any persons identified with relevant law enforcement databases.”

The goal will be to cross-reference the facial scans against multiple government databases that collect biometric information, including the FBI. “The bureau can draw from over 411 million photos spread across state and federal databases, including more than 173 million driver’s license photos, as part of the new biometric effort,” according to a government document that was analyzed by The Verge.

Ari Schuler, co-lead of CBP’s Silicon Valley office, which is managing the project, said that a drone that has these capabilities would allow Border Patrol Agents to identify traffickers who have violent criminal backgrounds, allowing the Agent the call backup.

Since large portions of the border lack cellular service, the biggest challenge for contractors is figuring out how to stream data from the drones. The CBP is also looking for a drone that is secure, not vulnerable to hacking.

The move to go from large military-style drones to small consumer ones comes from the disappointment the CBP has had with the Predator. A report from 2014 shows that the cost to operate 10 Predators over the course of a year exceeded $60 million. The drones failed to lower the cost of border surveillance and were vulnerable to GPS jamming and other attacks.

 

 

source:http://www.breitbart.com/texas/2017/04/19/feds-deploy-facial-recognition-tech-border-checkpoints/

Battle intensifies between Trump’s CIA, WikiLeaks

15th april 2017

The battle between the CIA and WikiLeaks is intensifying.

CIA Director Mike Pompeo used his first major public remarks on Thursday to skewer WikiLeaks as a “non-state hostile intelligence service” willing to work with Russia and other foreign actors to promote their interests.

He blasted Julian Assange as a “fraud” interested in his own fame, seeking to undermine efforts by the WikiLeaks founder to be viewed as a legitimate ally of civil libertarians.

“It is time to call out WikiLeaks for what it really is, a non-state hostile intelligence service often abetted by state actors like Russia,” Pompeo said.“Assange is a narcissist who has created nothing of value,” the former Republican congressman charged. “He relies on the dirty work of others to make himself famous. He is a fraud—a coward hiding behind a screen.”

WikiLeaks was quick to respond, sending out a series of messages on Twitter claiming that Pompeo vowed to “silence” the organization over its purported disclosures of CIA hacking tools and using his remarks to promote an op-ed written by Assange in the Washington Post.

In the op-ed, Assange wrote that WikiLeaks had the same mission as news outlets such as the Post and The New York Times.

The organization also mocked Pompeo by sending out a since-deleted tweet he wrote last July, when the former Kansas lawmaker cited stolen Democratic National Committee emails released by WikiLeaks as proof that the presidential nomination had been “fixed” for Hillary Clinton.

Pompeo’s speech was a wide departure from President Trump’s praise of WikiLeaks on the campaign trail. Trump and his administration have taken a much more hostile approach to WikiLeaks since taking office.

U.S. national security experts welcomed Pompeo’s comments as a signal that the new director was taking a hard line on an organization that has leaked information damaging to American interests.

“I think what [Pompeo] did was putting him on notice, which I think is exactly the right thing to do,” James Carafano, a national security expert at the conservative Heritage Foundation, said. “I think he’s throwing down the gauntlet.”

But the speech was not warmly embraced by all. Journalist Glenn Greenwald, who published documents leaked by Edward Snowden, slammed Pompeo for his remarks, accusing him of “explicitly” threatening free speech and press freedoms.

“WikiLeaks now has few friends in Washington,” Greenwald wrote in The Intercept. “But the level of affection for WikiLeaks should have no bearing on how one responds to these press freedom threats from Donald Trump’s CIA Director. Criminalizing the publication of classified documents is wrong in itself, and has the obvious potential to spread far beyond their initial target.”

WikiLeaks for weeks has needled the CIA by releasing troves of leaked documents allegedly revealing the agency’s hacking programs.

The releases, called “Vault 7,” contain documents describing hacking techniques used by the CIA, such as tools to breach mobile devices and hack into smart televisions, as well as other internal communications.

Hours after Pompeo’s speech, WikiLeaks leaked yet another trove of documents that claimed to reveal information about a top-secret CIA hacking program called Hive.

Experts have largely described the contents of the periodic document releases as unsurprising, and evidence that the CIA is doing its job. Nevertheless, they have renewed the debate around privacy and intelligence community spying and also raised questions about the source of the leaks.

“Obviously, this hurts when other people know where you have been, what you have been thinking,” said former CIA Director Michael Hayden, who said that the documents show no abuse of the agency’s powers.

“There is the danger that even though these things might reflect appropriate activities that Americans don’t object to, the fact that you can’t keep the tools secret, the fact that you can’t keep the data you collect from other prying eyes, that creates a real big, strong argument for, ‘then I don’t want you doing it in the first place,’” Hayden said.

Some note that the leaks underscore the persisting problem of insider threats, which has been a major cause for concern since the leaks by former NSA contractor Edward Snowden and former soldier Chelsea Manning.

Pompeo acknowledged Thursday that the agency needs to strengthen its own systems to prevent leaks.

Adam Klein, a senior fellow at the Center for a New American Security, said that a major concern about WikiLeaks is that the organization provides an “outlet” for insider threats and encourages them.

“Insider threats are our intelligence agencies’ biggest security threat,” Klein told The Hill.

WikiLeaks has appeared to target CIA interns as potential sources of information. “CIA advertises internships. Whistleblowing opportunity?” the organized wrote on Twitter in mid-March.

“To the extent that there’s any news here, it’s that we have not gotten a handle on insider threats,” Klein said of the latest releases, noting that Congress should be concerned about the CIA leaks.

“I think it’s good news, frankly, that the CIA us thinking creatively about collecting information from foreign intelligence targets in the digital age,” Klein said.

The CIA has not confirmed the authenticity of any of the documents released, which Pompeo mentioned briefly on Thursday.

“As a policy, we at CIA do not comment on the accuracy of purported intelligence documents posted online,” Pompeo said. “In keeping with that policy, I will not specifically comment on the authenticity or provenance of recent disclosures.”

“But the false narratives that increasingly define our public discourse cannot be ignored,” he said.

 

source: http://thehill.com/policy/cybersecurity/328918-battle-intensifies-between-trumps-cia-wikileaks

Hackers post code in Trump protest: ‘Don’t forget about your base’

9th April 2017

An individual or group known for leaking complete computer code for apparently authentic, stolen NSA hacking tools released a new batch of computer code Saturday.

The leaker, dubbed “TheShadowBrokers,” claimed that the newest leak was a “form of protest” against President Trump not continuing the isolationist brand of populism that he campaigned on. Earlier leaks from the group were typically political in nature.

TheShadowBrokers claimed to be releasing samples from the NSA source code to draw attention to its auction. The latest leaks accompany a post titled “Don’t Forget About Your Base.”

In the group’s trademark broken English, the post reads, “TheShadowBrokers voted for you. TheShadowBrokers supports you. TheShadowBrokers is losing faith in you. Mr. Trump helping theshadowbrokers, helping you. Is appearing you are abandoning ‘your base’, ‘the movement’, and the peoples who getting you elected.”

The post goes on to cite “good evidence” of Trump shunning his base, pointing to the GOP’s death on healthcare reform last month, removing White House chief strategist Steve Bannon from the National Security Council principals committee and appointing Cabinet members from Goldman Sachs and the “Military Industrial Intelligence Complex.”

TheShadowBrokers debuted in August, leaking a large package of source code it claimed was from the toolkit of the Equation Group, a vaunted hacking operation long believed to be affiliated with the NSA. Between then and January, the group dumped two more packages of source code.

Though always in the context of advertising the sale of their wares, the Brokers have mentioned politics in prior posts, including a racist sketch about the Clinton campaign. In the group’s last message to the public in January, it claimed any prior mention of politics was meant for publicity.

Past releases by TheShadowBrokers appears to be authentic. The Intercept, the publication headed by the fount of Edward Snowden leaks, Glenn Greenwald, published that a tracking ID code that appeared in the Brokers’ files matched a previously unreleased code in the Snowden files.

Earlier files from the group, while years old, contained working computer code to exploit many previously unknown security flaws in popular cybersecurity hardware from Cisco and other manufacturers.

Those flaws sent cybersecurity companies into a frantic race to repair their products before hackers took advantage. Researchers ultimately did find malware in the wild, which used these product vulnerabilities.

It is unclear how TheShadowBrokers obtained the files.

 

source;http://thehill.com/policy/cybersecurity/327971-shadowbrokers-post-new-nsa-cyberweapons-in-pro-conservative-protest-of

Disney seeks new patent for soft robots playing characters

8th April 2017

Soft-body robots could someday be roaming Disney theme parks, playing animated, humanoid movie characters and interacting with visitors.

A new patent application by the entertainment giant doesn’t name specific characters, but it describes “designing a robot that will move and physically interact like an animated character.”

A prototype sketch filed with the patent application shows a round body, echoing the shape of the Baymax soft-robot character in Disney’s 2014 movie “Big Hero 6.” The application, and theme park observers, say the big issue for robotic interaction is safety. The document, dated Thursday, shows Disney research scientists in Pittsburgh have worked on prototypes identified only as “soft body 300” or “soft body 1000.”

“It’s hard to know why Disney decides to file for a patent, but they have been looking at soft-body robots since ‘Big Hero,’” said theme park writer Jim Hill. “Disney is still terrified that even with this soft technology, a robot could accidentally harm a child. They do a lot of testing.”

Disney officials declined to comment on the patent application.

The new Disney patent says soft-body robots would be “designed for reducing collision impacts during human interaction.”

“Robots can be found providing interactive guidance or entertainment in stores and amusement parks and in more dynamic settings,” the new patent filing says.

From Aladdin and Ariel to Winnie the Pooh and Woody, keeping track of character appearances at Walt Disney World is practically a full-time job for theme park blogs and websites. There are dozens and dozens of characters listed on multiple sites that track them. On Walt Disney World’s own website, visitors can search locations and times to meet specific characters. Characters roam freely or meet visitors in set-aside areas.

More robotic characters could eliminate some labor costs, although there’s no information about how much they would cost or whether it would reduce the number of costumed characters.

Free-roaming robots aren’t exactly new at Walt Disney World. Previous versions have included Push the Talking Trash Can, which was basically a remote-controlled vehicle, and Lucky the Dinosaur.

But the new patent filing describes problems with previous robot-human interaction: “It has proven difficult to provide wholly safe interactions between humans and robots simply by operating these humanoid and other robots with controlled movements.”

The new application describes pliable chambers making up the body of the robot, filled with fluid or air. The robot would be able to sense pressure on each chamber and adjust the amount of air or water, to respond to a child’s hug, or to an accidental collision.

The outer shape of the robot could be determined by “data obtained from a digital model of an animated (or other) character,” the application says.

It says frame and joint components made with a 3-D printer and outer shapes on the robot would include “a donut shape, a cylinder, and a cylinder with a round end.” It leaves open the possibility for variations on the basic concept.

The inventors are Alexander Alspach, Joohyung Kim and Katsu Yamane, who work at Disney Research Pittsburgh. They’ve been working on a prototype soft robot since at least 2014, according to Disney Research. They posted videos online showing a soft upper body of a robot holding an apple and a small plush toy.

Pittsburgh is also where Carnegie Mellon University developed a soft robotic arm that inspired Disney director Don Hall as he researched concepts for a “huggable robot,” which eventually became “Big Hero 6’s” Baymax.

Jim Hill said Hall actually brought the soft robot research to the attention of Disney’s engineers, the Imagineers, at that time.

Disney in the past has clashed with unions regarding rules for employees who portray characters. In a 2015 dispute, union representatives objected to a rule that such actors can’t publicly talk about which character they portray.

Staffing characters with costumed humans hasn’t proven foolproof, either. A 2011 lawsuit filed by a Philadelphia woman claimed that an Epcot employee dressed as Donald Duck groped her. That lawsuit alleged that Disney attempted “to cover up continuing, long-standing similar prior incidents,” and Disney declined to comment publicly; the suit was settled confidentially.

And in 2007, a Disney employee playing Tigger the tiger was suspended after a New Hampshire family accused him of punching their 14-year-old son during a home-video session at Disney-MGM Studios.

Bob Boyd, a financial analyst who follows Disney closely, said filing for a patent doesn’t mean Disney is close to rolling out new soft-body robots.

But he said it indicates that Disney continues to pursue advanced technology that interacts with guests, similar to its leading role in animatronics in the 1960s and 1970s.

“Meeting the legal and liability threshold is very difficult,” Boyd said. “Most robotics or animatronics are separated from guests by a physical barrier. But it is very difficult to have large numbers of people posing as characters too.”

 

source: http://www.orlandosentinel.com/business/brinkmann-on-business/os-bz-disney-soft-robots-20170407-story.html

WikiLeaks Drops the Mother Lode With ‘Vault 7’

wikileaks

8th March 2017

WikiLeaks on Tuesday dumped a trove of documents and files hacked from the Central Intelligence Agency — the largerst ever published from within the U.S. spy agency.
The 8,761 documents code named “VAult 7” contain amazing things, such as the “weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”
“The CIA had created, in effect, its ‘own NSA’ with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified,” WikiLeaks said in its release.
The documents show that “a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads.”
The CIA also runs “a very substantial effort to infect and control Microsoft Windows users with its malware.”
The documents also show that “in addition to its operations in Langley, Virginia, the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
“CIA hackers operating out of the Frankfurt consulate ( ‘Center for Cyber Intelligence Europe’ or CCIE) are given diplomatic (‘black’) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: ‘Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport.’ “
“There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of ‘Year Zero’ goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective,” said WikiLeaks editor Julian Assange.

 

 

source:http://www.dailywire.com/news/14173/wikileaks-drops-mother-lode-vault-7-joseph-curl?

New York Called For Face Recognition Cameras At Bridges, Tunnels

facial

28th Jan 2017

The state of New York has privately asked surveillance companies to pitch a vast camera system that would scan and identify people who drive in and out of New York City, according to a December memo obtained by Vocativ.

The call for private companies to submit plans is part of Governor Andrew Cuomo’s major infrastructure package, which he introduced in October. Though much of the related proposals would be indisputably welcome to most New Yorkers — renovating airports and improving public transportation — a little-noticed detail included installing cameras to “test emerging facial recognition software and equipment.”

“This is a highly advanced system they’re asking for,” said Clare Garvie, an associate at Georgetown University’s Center for Privacy and Technology, and who specializes in police use of face recognition technologies. “This is going to be terabytes — if not petabytes — of data, and multiple cameras running 24 hours a day. In order to be face recognition compliant they probably have to be pretty high definition.”

Cuomo’s office didn’t respond to multiple requests for clarification in the ensuing weeks after his announcement. But a memo from the Metropolitan Transit Authority’s Bridges and Tunnels division, obtained through a Freedom of Information Act request, shows that on December 12, the MTA put out a call to an unknown group of private vendors of surveillance equipment. The proposed system would both scan drivers as they approached or crossed most of the city’s bridges and tunnels at high speeds, and would also capture and pair those photos with the license plates of their cars.

“The biggest risk that comes with a system like this is its ability to track people, by location, by their face,” Garvie said. “So what needs to be put in place is a prohibition on the use of these cameras and the technology as a location tracking tool.”

The proposed system would be massive, the memo reads:

The Authority is interested in implementing a Facial Detection System, in a free-flow highway environment, where vehicle movement is unimpeded at highway speeds as well as bumper-to-bumper traffic, and license plate images are taken and matched to occupants of the vehicles (via license plate number) with Facial Detection and Recognition methods from a gantry-based or road-side monitoring location.

All seven of the MTA’s bridges and both its tunnels are named in the proposal.

New York City is home to more than 2,000 bridges and tunnels, which are owned by various agencies, including the New York City and state’s Departments of Transportation and Amtrak. It’s unclear as of this writing if those “crossing points” are similarly considering surveillance technology, though Vocativ has filed FOIA requests to each of them. Cuomo’s office didn’t respond to multiple inquiries. It’s similarly unclear how many, or even if any, private surveillance companies responded to the MTA’s proposal. A followup memo on Dec. 23 extended the deadline for submissions until Jan. 3, indicating the MTA wasn’t satisfied with the initial round of proposals.

New York City wouldn’t be the first in the U.S. to have a network of facial recognition cameras for law enforcement. In 2013, for instance, the Los Angeles Police Department admitted it had deployed 16 cameras equipped with face recognition software, designed to search for particular suspects. But the most prominent known system is in Moscow, which attempted to pair hundreds of thousands of CCTV cameras with advanced facial recognition software by NTech Labs — the company behind the infamous FaceFind software, which can let Russians stalk people whose picture they snap by using the program to find their social media accounts.

Moscow’s system has been beset with problems, though, especially because CCTV cameras are designed to move with subjects, reducing image quality, and because they’re normally mounted above people’s heads.

“The findings from phase one of the pilot are that it’s remarkably inaccurate,” Garvie said. “This is the most advanced system we’re aware of, but it’s having a very hard time in real-world conditions of people walking.”

That indicates that an effective system like the one the MTA has called for might still be years away.

“The New York crossings project is talking about people driving at highway speeds, so I think we can expect very, very low accuracy rates,” Garvie said.

 

source: http://www.vocativ.com/396745/memo-new-york-called-for-face-recognition-cameras-at-bridges-tunnels/

Cyber criminals should wear wifi jammers instead of going to prison

cyber-stuff

9th Jan 2017

A senior UK policeman has suggested that people who commit cyber crimes should be forced to wear wifi jammers to prevent them from accessing the internet instead of being sent to prison.

The president of the UK’s Police Superintendents’ Association, Gavin Thomas, argued that preventing those who’ve committed internet crimes from being able to be online would be a far better and more cost effective than sending them to jail.

Cyber crime is soaring in the UK according to 2016 figures from the Cyber Crime Assessment unit of the UK National Crime Agency, which states it had surpassed all other forms of criminal activity. The report found that “cyber enabled fraud” made up 36 percent of all crime reported, and “computer misuse” accounted for 17 percent.

Speaking to The Telegraph, Chief Superintendent Thomas said that sending cyber criminals to prison is expensive and not an appropriate or effective way of tackling the growing problem.

Instead, he has suggested fitting offenders with electronic wifi jammers that would prevent them from accessing the internet. Wifi jammers work by disrupting the frequency on which a signal is transmitted. Thomas suggested that the device could fit around the person’s wrist or ankle, similar to an electronic tag.

“We have got to stop using 19th century punishments to deal with 21st century crimes,” he said. “It costs around £38,000 a year to keep someone in prison but if you look at the statistics around short term sentencing the recidivism rate is extraordinarily high.”

“This could be introduced as part of community sentencing, so that the 16-year-old does not have access to the internet or wifi for a period and then in conjunction they have to do some sort of traditional work in the community,” he suggested.

Thomas said the criminal justice system also needs to find ways of tackling the growing problem of crime committed on social media. “There is a growing phenomenon here and we need to start to think in the future about how we deal with this.”

 

 

source:https://www.rt.com/uk/373005-cyber-criminals-wifi-jammers/

Self-Driving Uber Apparently Runs Red Light In San Francisco

fuck-da

17th Dec 2016

A self-driving Uber car was caught on camera apparently running a red light in San Francisco Wednesday.

Uber launched the fleet of self-driving Volvo SUV’s Wednesday morning, just hours before the incident.

Dashboard video from a Luxor Cab captured the Volvo apparently running the light after the taxi had stopped for the light. Just in front of the SFMOMA building.

 

There was also a second incident reported by Twitter user Annie Gaus Wednesday morning. She initially posted at 9:48 a.m. that she saw “a ‘self-driving’ Uber” that entered the intersection on Van Ness Avenue on a red light and nearly hit the Lyft car she was riding in.

According to Uber, the cars aren’t yet ready to hit the streets without someone monitoring them, meaning someone from the company was likely behind the wheel. A statement issued by Uber Wednesday afternoon attributed the red-light being run in the video to an error by the person monitoring the car.

“This incident was due to human error,” the statement read. “This is why we believe so much in making the roads safer by building self-driving Ubers. This vehicle was not part of the pilot and was not carrying customers. The driver involved has been suspended while we continue to investigate.”

State regulators said Wednesday afternoon that Uber must stop the self-driving car service until it receives a permit from the state.

 

 

 

source;http://sanfrancisco.cbslocal.com/2016/12/14/self-driving-uber-apparently-runs-red-light-in-san-francisco/

Edward Snowden loses Norway safe passage case

edward-snow

27th Nov 2016

Edward Snowden’s bid to guarantee that he would not be extradited to the US if he visited Norway has been rejected by the Norwegian supreme court.

The former National Security Agency contractor filed the lawsuit in April, attempting to secure safe passage to Norway to pick up a free speech award.

It had already been rejected by Oslo District court and an appeals court.

Mr Snowden is a former NSA analyst who leaked secret US surveillance details three years ago.

As a result, he is facing charges in the US which could put him in prison for up to 30 years.

Mr Snowden’s lawyers have previously said if he were extradited to the US, it would be “a foregone conclusion” that he would be convicted and jailed.

Mr Snowden has been living in Russia, out of reach of the US authorities, since the leaks in 2013.

He had hoped to travel to Oslo to receive the Ossietzky Prize, for “outstanding efforts for freedom of expression”.

The award was due to be presented earlier this month.

But the Norwegian Supreme Court said it could not rule on the legality of any move to extradite Mr Snowden as the US had so far made no such request.

 

source:http://www.bbc.com/news/world-europe-38109167