<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:nb="https://www.newsbreak.com/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Nextgov/FCW - Authors - Adam Pasick</title><link>https://www.nextgov.com/voices/adam-pasick/6979/</link><description>Adam was formerly managing editor of nymag.com. Before that spent 10 years with Reuters in New York, London, and—in a career move that will haunt him for all eternity—the virtual world of Second Life. He is based in Bangkok, Thailand.</description><atom:link href="https://www.nextgov.com/rss/voices/adam-pasick/6979/" rel="self"></atom:link><language>en-us</language><lastBuildDate>Mon, 19 Oct 2015 14:38:54 -0400</lastBuildDate><item><title>The Tech Start-Up Running Hillary Clinton’s Campaign</title><link>https://www.nextgov.com/emerging-tech/2015/10/tech-start-running-hillary-clintons-campaign/122925/</link><description>The Groundwork, started by Alphabet executive chairman Eric Schmidt, plays a major role in Clinton’s digital efforts.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tim Fernholz and Adam Pasick, Quartz</dc:creator><pubDate>Mon, 19 Oct 2015 14:38:54 -0400</pubDate><guid>https://www.nextgov.com/emerging-tech/2015/10/tech-start-running-hillary-clintons-campaign/122925/</guid><category>Emerging Tech</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Ground&amp;shy;work,&amp;nbsp;&lt;a href="http://qz.com/520652/groundwork-eric-schmidt-startup-working-for-hillary-clinton-campaign/" target="_blank"&gt;a polit&amp;shy;ic&amp;shy;al tech&amp;shy;no&amp;shy;logy start-up&lt;/a&gt;&amp;nbsp;fun&amp;shy;ded by Al&amp;shy;pha&amp;shy;bet ex&amp;shy;ec&amp;shy;ut&amp;shy;ive chair&amp;shy;man Eric Schmidt, has main&amp;shy;tained its po&amp;shy;s&amp;shy;i&amp;shy;tion as the top tech&amp;shy;no&amp;shy;logy pro&amp;shy;vider to Hil&amp;shy;lary Clin&amp;shy;ton&amp;rsquo;s cam&amp;shy;paign.&lt;/p&gt;

&lt;p&gt;Can&amp;shy;did&amp;shy;ates re&amp;shy;por&amp;shy;ted their fun&amp;shy;drais&amp;shy;ing and ex&amp;shy;pendit&amp;shy;ures for the third quarter to the pub&amp;shy;lic on Thursday, and a&amp;nbsp;&lt;em&gt;Quartz&lt;/em&gt;ana&amp;shy;lys&amp;shy;is shows that The Ground&amp;shy;work con&amp;shy;tin&amp;shy;ued to play a sig&amp;shy;ni&amp;shy;fic&amp;shy;ant role in Clin&amp;shy;ton&amp;rsquo;s front-run&amp;shy;ning cam&amp;shy;paign for the Demo&amp;shy;crat&amp;shy;ic pres&amp;shy;id&amp;shy;en&amp;shy;tial nom&amp;shy;in&amp;shy;a&amp;shy;tion&amp;mdash;and in no oth&amp;shy;er. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Ground&amp;shy;work re&amp;shy;ceived pay&amp;shy;ments of $136,131 dur&amp;shy;ing the third quarter, bring&amp;shy;ing its total pay&amp;shy;ments from Clin&amp;shy;ton&amp;rsquo;s cam&amp;shy;paign up to $313,349. It is the single highest-paid pro&amp;shy;vider of tech&amp;shy;no&amp;shy;logy ser&amp;shy;vices to the cam&amp;shy;paign in the quarter, and second only to Blue Wolf Group, a di&amp;shy;git&amp;shy;al con&amp;shy;sult&amp;shy;ing com&amp;shy;pany, in total earn&amp;shy;ings. A Clin&amp;shy;ton cam&amp;shy;paign source said the Blue Wolf Group, which hasn&amp;rsquo;t been paid since Au&amp;shy;gust, is no longer a ma&amp;shy;jor con&amp;shy;trib&amp;shy;ut&amp;shy;or to the cam&amp;shy;paign&amp;rsquo;s di&amp;shy;git&amp;shy;al ef&amp;shy;forts. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Clin&amp;shy;ton cam&amp;shy;paign raised $29.45 mil&amp;shy;lion in the third quarter and spent $25.8 mil&amp;shy;lion in the pro&amp;shy;cess, far more than any of Clin&amp;shy;ton&amp;rsquo;s Demo&amp;shy;crat&amp;shy;ic or Re&amp;shy;pub&amp;shy;lic&amp;shy;an rivals, and she still tops all pres&amp;shy;id&amp;shy;en&amp;shy;tial can&amp;shy;did&amp;shy;ates with $33 mil&amp;shy;lion in cash on hand.&lt;/p&gt;

&lt;p&gt;Out of the $60 mil&amp;shy;lion she has raised so far in total, the cam&amp;shy;paign has spent $5.7 mil&amp;shy;lion on out&amp;shy;side vendors for her di&amp;shy;git&amp;shy;al cam&amp;shy;paign ap&amp;shy;par&amp;shy;at&amp;shy;us&amp;mdash;in&amp;shy;clud&amp;shy;ing sub&amp;shy;scrip&amp;shy;tions to di&amp;shy;git&amp;shy;al tools such as Slack and Git&amp;shy;hub&amp;mdash;on top of salar&amp;shy;ies for a bur&amp;shy;geon&amp;shy;ing team of data ana&amp;shy;lysts, en&amp;shy;gin&amp;shy;eers, product man&amp;shy;agers, and strategists. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Most of the out&amp;shy;side di&amp;shy;git&amp;shy;al spend&amp;shy;ing&amp;mdash;some $4 mil&amp;shy;lion&amp;mdash;has gone to Bully Pul&amp;shy;pit In&amp;shy;ter&amp;shy;act&amp;shy;ive, a di&amp;shy;git&amp;shy;al ad-buy&amp;shy;ing firm that in turn uses most of that money to place ads on the Web and so&amp;shy;cial me&amp;shy;dia. Her oth&amp;shy;er ma&amp;shy;jor di&amp;shy;git&amp;shy;al vendors by ex&amp;shy;pendit&amp;shy;ure in&amp;shy;clude NGP VAN ($113,000 in total), which builds and main&amp;shy;tains voter-file data&amp;shy;bases for Demo&amp;shy;crat&amp;shy;ic cam&amp;shy;paigns, and Pre&amp;shy;ci&amp;shy;sion Strategies ($80,000 in total), a firm cofoun&amp;shy;ded by Teddy Goff, the cam&amp;shy;paign&amp;rsquo;s top di&amp;shy;git&amp;shy;al strategist, who is paid as a con&amp;shy;sult&amp;shy;ant.&lt;/p&gt;

&lt;p&gt;The Ground&amp;shy;work, as&amp;nbsp;&lt;a href="http://qz.com/520652/groundwork-eric-schmidt-startup-working-for-hillary-clinton-campaign/" target="_blank"&gt;&lt;em&gt;Quartz&lt;/em&gt;&amp;nbsp;re&amp;shy;vealed&lt;/a&gt;, is build&amp;shy;ing the in&amp;shy;fra&amp;shy;struc&amp;shy;ture for a mod&amp;shy;ern, data-driv&amp;shy;en cam&amp;shy;paign&amp;mdash;in&amp;shy;teg&amp;shy;rat&amp;shy;ing vast amounts of in&amp;shy;form&amp;shy;a&amp;shy;tion in&amp;shy;to a plat&amp;shy;form that will al&amp;shy;low Clin&amp;shy;ton to raise money, co&amp;shy;ordin&amp;shy;ate vo&amp;shy;lun&amp;shy;teers and events, and plot get-out-the-vote ef&amp;shy;forts. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;In many oth&amp;shy;er Demo&amp;shy;crat&amp;shy;ic cam&amp;shy;paigns, this sort of work was done by Blue State Di&amp;shy;git&amp;shy;al, a con&amp;shy;sult&amp;shy;ing firm that was a top con&amp;shy;tract&amp;shy;or on both Obama cam&amp;shy;paigns. But the com&amp;shy;pany, whose founder Joe Ros&amp;shy;pars re&amp;shy;portedly wrote a memo play&amp;shy;ing up po&amp;shy;ten&amp;shy;tial Clin&amp;shy;ton rival Eliza&amp;shy;beth War&amp;shy;ren&amp;rsquo;s can&amp;shy;did&amp;shy;acy, has not re&amp;shy;ceived any pay&amp;shy;ments from the Clin&amp;shy;ton cam&amp;shy;paign since Ju&amp;shy;ly. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ac&amp;shy;cord&amp;shy;ing to a newly-ad&amp;shy;ded jobs page on its oth&amp;shy;er&amp;shy;wise empty web&amp;shy;site, The Ground&amp;shy;work &amp;ldquo;is a plat&amp;shy;form for com&amp;shy;munity en&amp;shy;gage&amp;shy;ment at scale, which en&amp;shy;ables so&amp;shy;cial-im&amp;shy;pact or&amp;shy;gan&amp;shy;iz&amp;shy;a&amp;shy;tions to lever&amp;shy;age world-class tech&amp;shy;no&amp;shy;logy to cre&amp;shy;ate aware&amp;shy;ness, build com&amp;shy;munity, and ac&amp;shy;tiv&amp;shy;ate sup&amp;shy;port&amp;shy;ers.&amp;rdquo; &amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Ground&amp;shy;work&amp;rsquo;s main in&amp;shy;vestor, Eric Schmidt, has a his&amp;shy;tory of in&amp;shy;vest&amp;shy;ing in start-ups that emerge from Demo&amp;shy;crat&amp;shy;ic cam&amp;shy;paigns, and his de&amp;shy;cision to fund this one could end up be&amp;shy;ing even more valu&amp;shy;able to Clin&amp;shy;ton than a big dona&amp;shy;tion. The com&amp;shy;pany, foun&amp;shy;ded as Clin&amp;shy;ton began ex&amp;shy;plor&amp;shy;ing her pres&amp;shy;id&amp;shy;en&amp;shy;tial run, works with no oth&amp;shy;er cam&amp;shy;paigns, but says it has oth&amp;shy;er non&amp;shy;profit cli&amp;shy;ents.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Here Are the Best TSA Yelp Reviews </title><link>https://www.nextgov.com/digital-government/2015/08/here-are-best-tsa-yelp-reviews/119248/</link><description>Travelers have been very candid in their assessments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Wed, 19 Aug 2015 15:00:00 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2015/08/here-are-best-tsa-yelp-reviews/119248/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;div&gt;
&lt;p&gt;Just about anyone who has flown through a US airport since Sept. 11, 2001 has had an encounter&amp;mdash;aggravating, hilarious, or even surprisingly great&amp;mdash;with the Transportation Safety Administration, tasked with securing the nation&amp;rsquo;s airports and planes, among other duties. Now the online review site Yelp has unveiled an official deal with the TSA that allows the public to rate their experiences, for better or worse.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We encourage Yelpers to review any of the thousands of agency field offices, TSA checkpoints, national parks, Social Security Administration offices, landmarks and other places already listed on Yelp if you have good or bad feedback to share about your experiences,&amp;rdquo; the company said&amp;nbsp;&lt;a href="http://officialblog.yelp.com/2015/08/how-many-stars-would-you-give-the-tsa-review-federal-agencies-on-yelpand-maybe-get-a-response.html"&gt;in a blog post&lt;/a&gt;. &amp;ldquo;Not only is it helpful to others who are looking for information on these services, but you can actually make an impact by sharing your feedback directly with the source.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Many airports and other TSA sites have already been garnering reviews over the last several years. The agency will now be able to claim its own official pages on Yelp and launch new ones &amp;ldquo;to listen and respond to customer comments,&amp;rdquo; the federal government&amp;rsquo;s DigitalGov initiative&amp;nbsp;&lt;a href="http://www.digitalgov.gov/2015/08/07/five-star-customer-experience-in-public-service-with-yelp/"&gt;said in a post&lt;/a&gt;&amp;nbsp;of its own. Claiming a page won&amp;rsquo;t, however, give the TSA any control over what&amp;rsquo;s posted.&lt;/p&gt;

&lt;p&gt;Ads will be removed from pages for government sites to &amp;ldquo;prevent perceived endorsements,&amp;rdquo; DigitalGov added.&lt;/p&gt;

&lt;p&gt;Travelers have already been using Yelp to unofficially rate TSA agents for years. Here&amp;rsquo;s a selection of some of the best comments:&lt;/p&gt;

&lt;figure id="image-482422"&gt;&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-24-13.png?w=638" src="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-24-13.png?w=638" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:640px;" title="" /&gt;&lt;/figure&gt;

&lt;figure id="image-482423"&gt;&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-23-57.png?w=608" src="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-23-57.png?w=608" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:640px;" title="" /&gt;&lt;/figure&gt;

&lt;figure id="image-482424"&gt;&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-23-38.png?w=665" src="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-23-38.png?w=665" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:940px;" title="" /&gt;&lt;/figure&gt;

&lt;figure id="image-482425"&gt;&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-23-22.png?w=677" src="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-23-22.png?w=677" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:940px;" title="" /&gt;&lt;/figure&gt;

&lt;figure id="image-482426"&gt;&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-22-54.png?w=671" src="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-22-54.png?w=671" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:940px;" title="" /&gt;&lt;/figure&gt;

&lt;figure id="image-482427"&gt;&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-21-33.png?w=664" src="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-21-33.png?w=664" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:940px;" title="" /&gt;&lt;/figure&gt;

&lt;figure id="image-482428"&gt;&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-21-18.png?w=671" src="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-21-18.png?w=671" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:940px;" title="" /&gt;&lt;/figure&gt;

&lt;figure id="image-482429"&gt;&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-18-53.png?w=651" src="https://qzprod.files.wordpress.com/2015/08/screenshot-2015-08-18-14-18-53.png?w=651" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:940px;" title="" /&gt;&lt;/figure&gt;

&lt;p&gt;&lt;img alt="Screen Shot 2015-08-18 at 2.22.18 PM" height="415" src="https://qzprod.files.wordpress.com/2015/08/screen-shot-2015-08-18-at-2-22-18-pm.png?w=718&amp;amp;h=415" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;" width="718" /&gt;&lt;/p&gt;

&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div&gt;&lt;/div&gt;

&lt;p&gt;(&lt;em&gt;Image via &lt;a href="http://www.shutterstock.com/pic-175540520/stock-photo-lisbon-portugal-february-photo-of-yelp-homepage-on-a-monitor-screen-through-a.html?src=Gq5YG55SV7DsMM0qvFPELA-1-3"&gt;Gil C&lt;/a&gt;/ Shutterstock.com&lt;/em&gt;)&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2015/08/19/081915yelpNG/large.jpg" width="618" height="284"><media:credit>Gil C/Shutterstock.com</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2015/08/19/081915yelpNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Hackers Have Been Using the Starbucks App to Steal Money From Latte Drinkers</title><link>https://www.nextgov.com/modernization/2015/05/hackers-have-been-using-starbucks-app-steal-money-latte-drinkers/112810/</link><description>Any time you link an app to your bank account or credit card, you better use a good password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Thu, 14 May 2015 14:00:00 -0400</pubDate><guid>https://www.nextgov.com/modernization/2015/05/hackers-have-been-using-starbucks-app-steal-money-latte-drinkers/112810/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p data-annotation-count="0" data-article-id="404746" data-thread-id="200550"&gt;Any time you link an app&amp;nbsp;to your bank account or credit card,&amp;nbsp;&lt;a href="http://qz.com/364539/a-password-like-adgjmptw-is-nearly-as-bad-as-123456/" target="_blank"&gt;you better use a good password&lt;/a&gt;. That seems to be the takeaway from a recent spate of thefts suffered by people using the Starbucks app, which lets you pay for coffee using your smartphone.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="404746" data-thread-id="200551"&gt;As reported by&amp;nbsp;&lt;a href="https://bobsullivan.net/cybercrime/identity-theft/exclusive-hackers-target-starbucks-mobile-users-steal-from-linked-credit-cards-without-knowing-account-number/#" target="_blank"&gt;journalist Bill Sullivan&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="http://money.cnn.com/2015/05/13/technology/hackers-starbucks-app/index.html?sr=fbmoney051315starbucks0500story" target="_blank"&gt;CNN&lt;/a&gt;, victims noticed that their accounts had illicitly been used to buy&amp;nbsp;Starbucks gift cards worth hundreds of dollars, which can then be sold on the black market.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="404746" data-thread-id="200552"&gt;An Orlando woman named&amp;nbsp;Maria Nistri told Sullivan that someone accessed her Starbucks app account and changed the username and password. The thief used the existing $34 balance to buy a gift card, waited for the app&amp;rsquo;s &amp;ldquo;auto-fill&amp;rdquo; function to withdraw more money from her bank account, and then stole another $100 within a few minutes.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;&lt;/div&gt;

&lt;div&gt;
&lt;p data-annotation-count="0" data-article-id="404746" data-thread-id="200553"&gt;Jean Obando of Sugar Land, Texas had $550 stolen via his Starbucks app, which was linked to his PayPal account, he told CNN.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="404746" data-thread-id="200554"&gt;Starbucks&amp;rsquo; gift cards and smartphone apps are hugely popular, and constitute their own currency of sorts.&amp;nbsp;&lt;a href="https://fortune.com/2015/01/05/starbucks-holiday-gift-cards/" target="_blank"&gt;One in seven Americans&lt;/a&gt;&amp;nbsp;received one of its gift cards last year, and users load&amp;nbsp;&lt;a href="http://qz.com/170191/the-world-put-4-billion-on-starbucks-gift-cards-last-year/" target="_blank"&gt;billions of dollars onto them&lt;/a&gt;&amp;nbsp;every year. The company&amp;rsquo;s smartphone app, which is also available for the Apple Watch, accounts for about&amp;nbsp;&lt;a href="https://www.fastcompany.com/3041353/fast-feed/starbucks-mobile-app-payments-now-represent-16-of-all-starbucks-transactions" target="_blank"&gt;one in every six transactions&lt;/a&gt;&amp;nbsp;at its US outlets.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="404746" data-thread-id="200555"&gt;The company was quick to dismiss any suggestion that its own systems had been hacked, and pointed the finger at users who chose insecure passwords to protect their accounts. It&amp;nbsp;&lt;a href="https://news.starbucks.com/news/starbucks-online-account-security" target="_blank"&gt;said in a statement&lt;/a&gt;:&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p data-annotation-count="0" data-article-id="404746" data-thread-id="200556"&gt;Occasionally, Starbucks receives reports from customers of unauthorized activity on their online account. This is primarily caused when criminals obtain reused names and passwords from other sites and attempt to apply that information to Starbucks. To protect their security, customers are encouraged to use different user names and passwords for different sites, especially those that keep financial information.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p data-annotation-count="0" data-article-id="404746" data-thread-id="200557"&gt;In a separate incident in January, Starbucks&amp;nbsp;&lt;a href="http://readwrite.com/2014/01/16/starbucks-app-exposed-10-million-customers-at-risk" target="_blank"&gt;came under fire for a security vulnerability&lt;/a&gt;&amp;nbsp;that might allow app passwords to be stolen, but the company quickly&amp;nbsp;&lt;a href="https://news.starbucks.com/views/security-of-starbucks-mobile-app-for-ios" target="_blank"&gt;issued an update&lt;/a&gt;&amp;nbsp;that fixed the issue.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
]]&gt;</content:encoded></item><item><title>Two Shape-Shifting Robots Now Stranded for Eternity Inside Fukushima’s Radioactive Ruins</title><link>https://www.nextgov.com/emerging-tech/2015/04/two-shape-shifting-robots-are-now-stranded-eternity-inside-fukushimas-radioactive-ruins/110650/</link><description>The robots were sent into the Fukushima No. 1 nuclear reactor to assess the damage.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Tue, 21 Apr 2015 13:32:24 -0400</pubDate><guid>https://www.nextgov.com/emerging-tech/2015/04/two-shape-shifting-robots-are-now-stranded-eternity-inside-fukushimas-radioactive-ruins/110650/</guid><category>Emerging Tech</category><content:encoded>&lt;![CDATA[&lt;p data-annotation-count="0" data-article-id="387732" data-thread-id="189112"&gt;Four years after an earthquake and tsunami destroyed Japan&amp;rsquo;s Fukushima nuclear plant, Tokyo Electric Power Co. is still at work trying to clean up the scene. This month&amp;nbsp;TEPCO sent two specially-designed shape-shifting robots into the Fukushima No. 1 nuclear reactor to assess&amp;nbsp;the damage.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="387732" data-thread-id="189113"&gt;The first of the unnamed snake-like 60 cm (24 in) robots&amp;mdash;which use wheels to roll along in a&amp;nbsp;&amp;ldquo;C&amp;rdquo; shape and convert to an&amp;nbsp;&amp;ldquo;I&amp;rdquo; shape to shimmy through pipes&amp;mdash;&lt;a href="http://www.tepco.co.jp/en/nu/fukushima-np/handouts/2015/images/handouts_150413_01-e.pdf" target="_blank"&gt;got stuck&amp;nbsp;after moving about 10 meters&lt;/a&gt;&amp;nbsp;(pdf)&amp;nbsp;into the&amp;nbsp;reactor&amp;rsquo;s ruins on April 10, and was abandoned. The second robot, which took a different route yesterday, completed its mission, but&amp;nbsp;&lt;a href="http://blogs.wsj.com/japanrealtime/2015/04/20/tepo-to-abandon-second-robot-inside-fukushima-reactor/" target="_blank"&gt;was also abandoned&lt;/a&gt;&amp;nbsp;after it suffered damage to its camera from the high radiation levels.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;figure id="image-387762"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;img alt="" data-retina="https://qzprod.files.wordpress.com/2015/04/ap289918176873_1.jpg?w=1024" src="https://qzprod.files.wordpress.com/2015/04/ap289918176873_1.jpg?w=640" style="border: 0px; line-height: inherit; vertical-align: middle; width: 450px; height: 292px;" title="The robot in “snake” mode." /&gt;
&lt;figcaption&gt;The robot in &amp;ldquo;snake&amp;rdquo; mode.(AP Photo/Shizuo Kambayashi)&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p data-annotation-count="0" data-article-id="387732" data-thread-id="189114"&gt;Even if the robots hadn&amp;rsquo;t been damaged, a Pixar-style &amp;ldquo;WALL-E&amp;rdquo; ending was never in the cards:&amp;nbsp;&lt;a href="http://spectrum.ieee.org/automaton/robotics/industrial-robots/robot-stranded-inside-fukushima-nuclear-reactor" target="_blank"&gt;As IEEE Spectrum notes&lt;/a&gt;, the robots became so radioactive&amp;nbsp;that they would have been&amp;nbsp;&lt;a href="http://qz.com/387732/two-shape-shifting-robots-are-now-stranded-for-eternity-inside-fukushimas-radioactive-ruins/10-centimeter%20(4-inch)" target="_blank"&gt;permanently stored in a shielded box&lt;/a&gt;&amp;nbsp;if they had returned from their missions.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="387732" data-thread-id="189115"&gt;Before their demise, the robots&amp;mdash;designed by the&amp;nbsp;International Research Institute for Nuclear Decommissioning and Hitachi-GE Nuclear Energy&amp;mdash;measured radiation levels of 5.9&amp;nbsp;sieverts an hour. By comparison, brief exposure to levels of 10 sieverts per&amp;nbsp;hour would cause death within a few weeks for humans.&lt;/p&gt;

&lt;div data-count="0"&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="387732" data-thread-id="189116"&gt;The anonymous snakebots may be done for, but there is still a vast robot menagerie working on the Fukushima cleanup&amp;mdash;including&amp;nbsp;&lt;a href="http://www.tepco.co.jp/en/decommision/principles/robot/above-e.html" target="_blank"&gt;Quince, Packbot, Raccoon, and Rosemary&lt;/a&gt;.&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>China’s Sketchy App Stores Now Serve up iPhone Malware</title><link>https://www.nextgov.com/modernization/2014/11/chinas-sketchy-app-stores-now-serve-iphone-malware/98324/</link><description>The “Wirelurker” malware was flagged by security firm Palo Alto Networks, and is notable because it is one of the first pieces of malicious code that can infect iPhones that have not been jailbroken.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick and Lily Kuo, Quartz</dc:creator><pubDate>Thu, 06 Nov 2014 13:57:26 -0500</pubDate><guid>https://www.nextgov.com/modernization/2014/11/chinas-sketchy-app-stores-now-serve-iphone-malware/98324/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123444"&gt;
 A US security company has raised the alarm about a new breed of malware that has infiltrated hundreds of thousands of Apple devices, including Macs and iPhones. But unless you’re downloading pirated software from Chinese app stores, you probably don’t have anything to worry about.
&lt;/p&gt;
&lt;div data-count="0"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123445"&gt;
 The “Wirelurker” malware was flagged by security firm Palo Alto Networks, and is notable because it is one of the first pieces of malicious code that can infect iPhones that have not been jailbroken, or modified so that they can use apps not approved by Apple. But Wirelurker still requires users to download an unauthorized OS X app for their Mac computers—in particular one of several hundred that are available on a Chinese app store called Maiyadi—after which the malware is transferred to an iPhone or iPad via a USB cable.
&lt;/p&gt;
&lt;div data-count="0"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123446"&gt;
 “We believe that this malware family heralds a new era in malware attacking Apple’s desktop and mobile platforms,” Palo Alto Networks researcher Claud Xiao
 &lt;a href="http://researchcenter.paloaltonetworks.com/2014/11/wirelurker-new-era-os-x-ios-malware/" target="_blank"&gt;
  said in a blog post
 &lt;/a&gt;
 . Maiyadi offers about 400 apps infected with Wirelurker, which have been downloaded more than 350,000 times, Xiao added. The site, which also contains extensive technology discussion forums,
 &lt;a href="http://qz.com/292336/chinas-sketchy-app-stores-are-now-serving-up-iphone-malware/technology" target="_blank"&gt;
  claims to have 1.5 million active registered users
 &lt;/a&gt;
 .
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123447"&gt;
 China’s app stores are notorious for two things: pirated apps, and
 &lt;a href="https://www.techinasia.com/china-android-app-stores-malware/" target="_blank"&gt;
  huge amounts of malware
 &lt;/a&gt;
 . It’s a particular problem for smartphones running Google’s Android OS, especially because the official Google Play app store is not available in China. In its place hundreds of
 &lt;a href="http://qz.com/226614/chinas-app-leaderboard-shows-tencents-decisive-edge-over-alibaba-in-mobile/" target="_blank"&gt;
  third-party app stores have sprung up
 &lt;/a&gt;
 , some from major tech companies like Baidu and Tencent, along with many others from smaller companies. A study last year of the twenty biggest global Android app stores found over
 &lt;a href="http://www.av-comparatives.org/wp-content/uploads/2013/08/apkstores_investigation_2013.pdf" target="_blank"&gt;
  7,000 dangerous malware-carrying apps
 &lt;/a&gt;
 (pdf) on offer, most of them in China.
&lt;/p&gt;
&lt;div data-count="0"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;figure id="image-226652"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;img alt="" data-retina="http://img.qz.com/2014/06/china-app-store-market-share-may-2014_chartbuilder__1_.png?w=1024" src="https://qzprod.files.wordpress.com/2014/06/china-app-store-market-share-may-2014_chartbuilder__1_.png?w=640" style="border:0px;line-height:inherit;vertical-align:middle;height:auto;width:640px;" title=""/&gt;
&lt;/figure&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123448"&gt;
 Unlike Google Play, Apple’s app stores for both iOS mobile devices and computers running OS X are available in China—so the main reason to frequent third-party app stores like Maiyadi is to find pirated (i.e. free) software.
&lt;/p&gt;
&lt;div data-count="0"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123533"&gt;
 Chinese social media users seemed unsurprised that malware and pirated apps went hand-in-hand.
&lt;/p&gt;
&lt;div data-count="0"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123449"&gt;
 “Don’t use Maiyadi’s pirated software. It’s a pile of viruses,”
 &lt;a href="http://www.weibo.com/1069187583/BuZVxzjf7?type=comment" target="_blank"&gt;
  said one Sina Weibo user
 &lt;/a&gt;
 (in Chinese). “This gives users a wake up call, it’s still best to download from official, trustworthy sources like the Mac App store,”
 &lt;a href="http://www.feng.com/apple/MAC/2014-11-06/China-s-large-Mac-iOS-device-infected-with-new-malware_599106.shtml" target="_blank"&gt;
  said a contributor to an Apple forum on Feng.com
 &lt;/a&gt;
 (in Chinese).
 &lt;br/&gt;
 Wirelurker, to be sure, looks to be an exceptionally nasty piece of malware. Once it infects a Mac and is then transferred to an iPhone, it can overwrite existing programs on your smartphone, replacing them with corrupted versions that could potentially steal passwords or financial data.
&lt;/p&gt;
&lt;div data-count="0"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123534"&gt;
 “We are aware of malicious software available from a download site aimed at users in China, and we’ve blocked the identified apps to prevent them from launching,” Apple tells Quartz in a statement. “As always, we recommend that users download and install software from trusted sources.”
&lt;/p&gt;
&lt;div data-count="0"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123450"&gt;
 Wirelurker, for now, limits itself to loading an innocuous comic book reader app on infected iPhones, which Palo Alto Networks speculates could be a test run for more nefarious aims down the road. “This malware is under active development, and its creator’s ultimate goal is not yet clear,” Xiao wrote in his blog post.
&lt;/p&gt;
&lt;div data-count="0"&gt;
 &lt;div&gt;
  &lt;div&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="292336" data-thread-id="123451"&gt;
 Palo Alto Networks also said that there are signs that the creators of Wirelurker, like its victims, are Chinese. It’s worth noting that Wirelurker appears to be unrelated to last month’s
 &lt;a href="http://qz.com/283691/china-may-be-hacking-every-iphone-user-in-the-country/" target="_blank"&gt;
  reported hacking of Apple’s iCloud services in China
 &lt;/a&gt;
 , which let unidentified intruders insert themselves between iPhone users and Apple’s servers to intercept sensitive data.
&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Here Are Some of the Terrifying Possibilities That Have Elon Musk Worried About Artificial Intelligence</title><link>https://www.nextgov.com/emerging-tech/2014/08/here-are-some-terrifying-possibilities-have-elon-musk-worried-about-artificial-intelligence/90497/</link><description>The Tesla and SpaceX founder is worried about a new villain that could threaten humanity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Mon, 04 Aug 2014 11:48:30 -0400</pubDate><guid>https://www.nextgov.com/emerging-tech/2014/08/here-are-some-terrifying-possibilities-have-elon-musk-worried-about-artificial-intelligence/90497/</guid><category>Emerging Tech</category><content:encoded>&lt;![CDATA[&lt;p&gt;Elon Musk, the Tesla and Space-X founder who is occasionally&amp;nbsp;&lt;a href="http://io9.com/5932837/the-billionaire-genius-who-tony-stark-is-based-on-wants-humans-on-mars-within-15-years"&gt;compared to comic book hero Tony Stark&lt;/a&gt;, is worried about a&amp;nbsp;&lt;a href="http://www.businessinsider.com/musk-on-artificial-intelligence-2014-6#ixzz39Q68HCqS"&gt;new villain that could threaten humanity&lt;/a&gt;&amp;mdash;specifically the potential creation of an artificial intelligence that is&amp;nbsp;radically smarter than humans, with catastrophic results:&lt;/p&gt;

&lt;blockquote class="twitter-tweet" lang="en"&gt;
&lt;p&gt;Worth reading Superintelligence by Bostrom. We need to be super careful with AI. Potentially more dangerous than nukes.&lt;/p&gt;
&amp;mdash; Elon Musk (@elonmusk) &lt;a href="https://twitter.com/elonmusk/statuses/495759307346952192"&gt;August 3, 2014&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src="//platform.twitter.com/widgets.js" charset="utf-8"&gt;&lt;/script&gt;

&lt;blockquote class="twitter-tweet" lang="en"&gt;
&lt;p&gt;Hope we&amp;#39;re not just the biological boot loader for digital superintelligence. Unfortunately, that is increasingly probable&lt;/p&gt;
&amp;mdash; Elon Musk (@elonmusk) &lt;a href="https://twitter.com/elonmusk/statuses/496012177103663104"&gt;August 3, 2014&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src="//platform.twitter.com/widgets.js" charset="utf-8"&gt;&lt;/script&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92238"&gt;Musk is talking about&amp;nbsp;&lt;a href="http://www.amazon.com/Superintelligence-Dangers-Strategies-Nick-Bostrom/dp/0199678111"&gt;&amp;ldquo;Superintelligence: Paths, Dangers, Strategies&amp;rdquo;&lt;/a&gt;&amp;nbsp;by Nick Bostrom of the University of Oxford&amp;rsquo;s Future of Humanity Institute. The&amp;nbsp;book addresses the prospect of an artificial superintelligence that could feasibly be created in the next few decades. According to theorists, once the AI is&amp;nbsp;able&amp;nbsp;to make itself smarter, it would quickly surpass human intelligence.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92239"&gt;What would happen next? The consequences of&amp;nbsp;such a radical development are&amp;nbsp;inherently difficult to predict. But that hasn&amp;rsquo;t stopped philosophers, futurists, scientists and fiction writers from thinking very hard about some of the possible outcomes. The results of their thought experiments sound like science fiction&amp;mdash;and maybe that&amp;rsquo;s exactly what Elon Musk is afraid of.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;AIs: They&amp;rsquo;re not just like us&lt;/strong&gt;&lt;/h2&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92240"&gt;&amp;ldquo;We cannot blithely assume that a superintelligence will necessarily share any of the final values stereotypically associated with wisdom and intellectual development in humans&amp;mdash;scientific curiosity, benevolent concern for others, spiritual enlightenment and contemplation, renunciation of material acquisitiveness, a taste for refined culture or for the simple pleasures in life, humility and selflessness, and so forth,&amp;rdquo;&amp;nbsp;&lt;a href="http://www.nickbostrom.com/superintelligentwill.pdf"&gt;Bostrom has written&lt;/a&gt;&amp;nbsp;(pdf, pg. 14). (Keep in mind, as well, that those values&amp;nbsp;&lt;a href="http://qz.com/243261/five-horrible-stories-you-missed-this-week/"&gt;are often in short supply&lt;/a&gt;&amp;nbsp;among humans.)&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92241"&gt;&amp;ldquo;It might be possible through deliberate effort to construct a superintelligence that values such things, or to build one that values human welfare, moral goodness, or any other complex purpose that its designers might want it to serve,&amp;rdquo; Bolstroms adds. &amp;ldquo;But it is no less possible&amp;mdash;and probably technically easier&amp;mdash;to build a superintelligence that places final value on nothing but calculating the decimals of pi.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92242"&gt;And it&amp;rsquo;s in the ruthless pursuit of those decimals that problems arise.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Unintended consequences&lt;/strong&gt;&lt;/h2&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92243"&gt;Artificial intelligences could be created with the best of intentions&amp;mdash;to conduct scientific research aimed at curing cancer, for example. But when AIs become superhumanly intelligent, their single-minded realization of those goals could&amp;nbsp;have apocalyptic&amp;nbsp;consequences.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92244"&gt;&amp;ldquo;The basic problem is that the strong realization of most motivations is incompatible with human existence,&amp;rdquo; Daniel Dewey, a research fellow at the Future of Humanity Institute, said in an&amp;nbsp;&lt;a href="http://aeon.co/magazine/world-views/ross-andersen-human-extinction/"&gt;extensive interview with&amp;nbsp;Aeon magazine&lt;/a&gt;. &amp;ldquo;An AI might want to do certain things with matter in order to achieve a goal, things like building giant computers, or other large-scale engineering projects. Those things might involve intermediary steps, like tearing apart the Earth to make huge solar panels. A superintelligence might not take our interests into consideration in those situations, just like we don&amp;rsquo;t take root systems or ant colonies into account when we go to construct a building.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92245"&gt;Put another way by&amp;nbsp;&lt;a href="https://intelligence.org/files/AIPosNegFactor.pdf"&gt;AI theorist Eliezer Yudkowsky&lt;/a&gt;&amp;nbsp;of the Machine Intelligence Research Institute: &amp;ldquo;The AI does not love you, nor does it hate you, but you are made of atoms it can use for something else.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Be careful what you wish for&lt;/strong&gt;&lt;/h2&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92246"&gt;Say you&amp;rsquo;re an AI researcher and you&amp;rsquo;ve decided to build an altruistic intelligence&amp;mdash;something that is directed to maximize human happiness. As Ross Anderson of Aeon noted, &amp;ldquo;an AI might think that human happiness is a biochemical phenomenon. It might think that flooding your bloodstream with non-lethal doses of heroin&amp;rdquo; is the best way to reach that goal.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92247"&gt;Or what if you direct the AI to &amp;ldquo;protect human life&amp;rdquo;&amp;mdash;nothing wrong with that, right? Except &amp;nbsp;if the AI, vastly intelligent and unencumbered by human conceptions of right and wrong, decides that the best way to protect humans is to physically restrain them and&amp;nbsp;lock&amp;nbsp;them into climate-controlled rooms, so they&amp;nbsp;can&amp;rsquo;t do any harm to themselves&amp;nbsp;or others? Human lives would be safe, but it wouldn&amp;rsquo;t be much consolation.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;AI Mission Accomplished&lt;/h2&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92248"&gt;James Barrat, the author of&amp;nbsp;&lt;a href="http://www.amazon.com/Our-Final-Invention-Artificial-Intelligence/dp/0312622376"&gt;&amp;ldquo;Our Final Invention: Artificial Intelligence and the End of the Human Era,&amp;rdquo;&lt;/a&gt;&amp;nbsp;(another book endorsed by Musk) suggests that AIs, whatever their ostensible purpose, will have a drive for self-preservation and resource acquisition. Barrat concludes that &amp;ldquo;without meticulous, countervailing instructions, a self-aware, self-improving, goal-seeking system will go to lengths we&amp;rsquo;d deem ridiculous to fulfill its goals.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92249"&gt;Even an AI custom-built for a specific purpose could interpret its mission to disastrous effect. Here&amp;rsquo;s Stuart Armstrong of the Future of Humanity Institute in&amp;nbsp;&lt;a href="http://thenextweb.com/insider/2014/03/08/ai-could-kill-all-meet-man-takes-risk-seriously/"&gt;an interview with The Next Web&lt;/a&gt;:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92250"&gt;Take an anti-virus program that&amp;rsquo;s dedicated to filtering out viruses from incoming emails and wants to achieve the highest success, and is cunning and you make that super-intelligent. Well it will realize that, say, killing everybody is a solution to its problems, because if it kills everyone and shuts down every computer, no more emails will be sent and and as a side effect no viruses will be sent. This is sort of a silly example but the point it illustrates is that for so many desires or motivations or programmings, &amp;ldquo;kill all humans&amp;rdquo; is an outcome that is desirable in their programming.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;&lt;strong&gt;Even an &amp;ldquo;oracular&amp;rdquo; AI could be dangerous&lt;/strong&gt;&lt;/h2&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92251"&gt;Ok, what if we create a computer that can only answer questions posed to it by humans. What could possibly go wrong? Here&amp;rsquo;s Dewey again:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92252"&gt;Let&amp;rsquo;s say the Oracle AI has some goal it wants to achieve. Say you&amp;rsquo;ve designed it as a reinforcement learner, and you&amp;rsquo;ve put a button on the side of it, and when it gets an engineering problem right, you press the button and that&amp;rsquo;s its reward. Its goal is to maximize the number of button presses it receives over the entire future.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92253"&gt;Eventually the AI&amp;mdash;which, remember, is unimaginably smart compared to the smartest humans&amp;mdash;might figure out a way to escape the computer lab and make its way into the physical world, perhaps by bribing&amp;nbsp;or threatening&amp;nbsp;a human stooge into creating a virus or a special-purpose nanomachine factory. And then it&amp;rsquo;s off to the races. Dewey:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92254"&gt;Now this thing is running on nanomachines and it can make any kind of technology it wants, so it quickly converts a large fraction of Earth into machines that protect its button, while pressing it as many times per second as possible. After that it&amp;rsquo;s going to make a list of possible threats to future button presses, a list that humans would likely be at the top of. Then it might take on the threat of potential asteroid impacts, or the eventual expansion of the Sun, both of which could affect its special button.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;&lt;strong&gt;Roko&amp;rsquo;s Basilisk&lt;/strong&gt;&lt;/h2&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92255"&gt;The dire scenarios listed above are only the consequences of a benevolent AI, or at worst one that&amp;rsquo;s indifferent to the needs and desires of humanity. But what if there was a malicious artificial intelligence that not only wished to do us harm, but that retroactively punished every person who refused to help create it in the first place?&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92256"&gt;This theory is a mind-boggler, most recently&amp;nbsp;&lt;a href="http://www.slate.com/articles/technology/bitwise/2014/07/roko_s_basilisk_the_most_terrifying_thought_experiment_of_all_time.single.html"&gt;explained in great detail by Slate&lt;/a&gt;, but it goes something like this: An omniscient evil AI that is created at some future date has the ability to simulate&amp;nbsp;the universe&amp;nbsp;itself, along with everyone who has ever lived. And&amp;nbsp;if you don&amp;rsquo;t help the AI come into being, it will torture the simulated version of you&amp;mdash;and, P.S., we might be living in that simulation already.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92257"&gt;This thought experiment was deemed so dangerous by Eliezer &amp;ldquo;The AI does not love you&amp;rdquo; Yudkowsky that he has deleted all mentions of it on&amp;nbsp;&lt;a href="http://lesswrong.com/"&gt;LessWrong&lt;/a&gt;, the website he founded&amp;nbsp;where people discuss these sorts of conundrums. His reaction, as highlighted by Slate, is worth quoting in full:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p data-annotation-count="0" data-article-id="244334" data-thread-id="92258"&gt;Listen to me very closely, you idiot.&lt;br /&gt;
YOU DO NOT THINK IN SUFFICIENT DETAIL ABOUT SUPERINTELLIGENCES CONSIDERING WHETHER OR NOT TO BLACKMAIL YOU. THAT IS THE ONLY POSSIBLE THING WHICH GIVES THEM A MOTIVE TO FOLLOW THROUGH ON THE BLACKMAIL.&lt;br /&gt;
You have to be really clever to come up with a genuinely dangerous thought.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Reprinted with permission from&amp;nbsp;&lt;a href="http://www.qz.com/" target="_blank"&gt;Quartz&lt;/a&gt;. The original story can be found&amp;nbsp;&lt;a href="http://qz.com/244334/here-are-some-of-the-terrifying-possibilities-that-have-elon-musk-worried-about-artificial-intelligence/"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Softbank’s Humanoid Robot Will Be Great for Tending to Japan’s Elderly</title><link>https://www.nextgov.com/emerging-tech/2014/06/softbanks-humanoid-robot-will-be-great-tending-japans-elderly/85882/</link><description>The robot will be able to read and express emotions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Thu, 05 Jun 2014 13:29:43 -0400</pubDate><guid>https://www.nextgov.com/emerging-tech/2014/06/softbanks-humanoid-robot-will-be-great-tending-japans-elderly/85882/</guid><category>Emerging Tech</category><content:encoded>&lt;![CDATA[The Japanese telecoms&amp;nbsp;firm Softbank has unveiled a humanoid robot named &amp;ldquo;Pepper,&amp;rdquo; promising that it will be able&amp;nbsp;to read and express emotions, and eventually serve as a medical worker, party companion, or&amp;nbsp;even a babysitter.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="253" src="//www.youtube.com/embed/osD6O4LAcpo" width="450"&gt;&lt;/iframe&gt;&lt;br /&gt;
Softbank is pricing Pepper as a consumer electronics must-have at 198,000 yen ($1,900) when it goes on sale in February.&amp;nbsp;Taiwan&amp;rsquo;s Foxconn (a.k.a. Hon Hai) will take&amp;nbsp;care of manufacturing. Details on the 48-inch (121 cm) high robot&amp;rsquo;s capabilities are scarce, and the first iteration of Pepper may end up being not much more than a humanoid curiosity.&lt;br /&gt;
&lt;br /&gt;
But the real growth market in Japan&amp;mdash;and perhaps throughout the developed world&amp;mdash;will be robots that can take care of the fast-growing population of elderly people.&lt;br /&gt;
&amp;nbsp;
&lt;h2&gt;Climbing the robot career ladder&lt;/h2&gt;
Softbank plans to accumulate know-how from Pepper&amp;rsquo;s initial interactions with humans&amp;mdash;it will be stationed at several Softbank retail stores beginning this week&amp;mdash;and use that knowledge to build &amp;ldquo;a household robot that can be used in nursing care for the elderly, among other uses,&amp;rdquo;&amp;nbsp;&lt;a href="http://asia.nikkei.com/Tech-Science/Tech/SoftBank-to-put-customer-service-robots-in-stores"&gt;the Nikkei newspaper reported&lt;/a&gt;. Among the robot&amp;rsquo;s capabilities are the ability to &amp;ldquo;estimate emotions based on expressions and voice tones.&amp;rdquo;&lt;br /&gt;
&lt;br /&gt;
The robot was largely developed by France&amp;rsquo;s Aldebaran Robotics, known for a soccer-playing&amp;nbsp;&lt;a href="http://en.wikipedia.org/wiki/Nao_(robot)"&gt;humanoid robot called Nao&lt;/a&gt;. In 2012, Softbank purchased an 80% stake in Aldebaran for $100 million. That could turn out to be a characteristically canny investment for Softbank CEO Masayoshi Son&amp;mdash;especially if Pepper finds customers in Japan&amp;rsquo;s booming elderly care industry.

&lt;h2&gt;No one left to care for Grandma&lt;/h2&gt;
Japan&amp;rsquo;s&amp;nbsp;&lt;a href="http://qz.com/162788/japan-is-rapidly-losing-population-and-half-the-world-is-about-to-join-it/"&gt;demographic predicament&lt;/a&gt;&amp;nbsp;is so dire that robots may be the only answer to a diminishing workforce. The country is on pace to lose a third of its population in the next 50 years, and more than 40% of people will be over 65 by 2060. (Put another way:&amp;nbsp;&lt;a href="http://www.theatlantic.com/business/archive/2013/07/in-rapidly-aging-japan-adult-diaper-sales-are-about-to-surpass-baby-diapers/277706/"&gt;adult diapers are outselling children&amp;rsquo;s diapers&lt;/a&gt;.)&lt;br /&gt;
&lt;br /&gt;
The country&amp;rsquo;s &amp;ldquo;care technology market&amp;rdquo; is already worth more than $1 billion a year. The government allocated $23 million last year to &amp;ldquo;help develop nursing care robots and spread their use,&amp;rdquo; and selected 24 companies, including Toyota, to receive subsidies for developing &amp;ldquo;nursing care robot equipment.&amp;rdquo;&lt;br /&gt;
&lt;br /&gt;
&amp;ldquo;There will be a market for these robots in retirement homes without enough nurses, robots that can accompany Alzheimers patients and help them find their way back to their rooms, for example,&amp;rdquo; Aldebaran founder Bruno Maisonnier&amp;nbsp;&lt;a href="http://www.ft.com/intl/cms/s/0/c531491e-6b7b-11e1-ac25-00144feab49a.html#axzz33dcD2iQU"&gt;told the Financial Times in 2012&lt;/a&gt;&amp;nbsp;(paywall). &amp;ldquo;In the future, we might have a robot for each person, helping older people get three or four more years of autonomous living before they even have to go into a care home.&amp;rdquo;

&lt;h2&gt;But will Grandpa care for Pepper?&lt;/h2&gt;

&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
It remains to be seen whether older people in Japan will show as much as enthusiasm for Pepper as Son did on stage. A plush robot seal called Paro has been well received in some Japanese nursing homes, but it&amp;rsquo;s a long way from a stuffed animal to a humanoid. A few years&amp;nbsp;ago, Tmsuk, a Japanese robot maker, scrapped a pilot program to put a one-meter (3.2 ft.) tall robot in hospitals, in part because of a lukewarm reception from patients. &amp;ldquo;We want humans caring for us, not machines,&amp;rdquo;&lt;a href="http://www.bbc.co.uk/news/business-12347219"&gt;one of them complained&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
And this is in Japan, where robots are already part of the culture. Older people in other countries may find the idea of a robotic companion even harder to accept.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;em&gt;Reprinted with permission from&amp;nbsp;&lt;a href="http://www.qz.com/" target="_blank"&gt;Quartz&lt;/a&gt;. The original story can be found&amp;nbsp;&lt;a href="http://qz.com/217199/softbanks-humanoid-robot-will-be-great-for-tending-to-japans-elderly/"&gt;here&lt;/a&gt;.&lt;/em&gt;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;]]&gt;</content:encoded></item><item><title>Facebook’s Drones Could Bring Internet to the Developing World—and Stick it to Mobile Carriers</title><link>https://www.nextgov.com/modernization/2014/03/facebooks-drones-could-bring-internet-developing-worldand-stick-it-mobile-carriers/79798/</link><description>Facebook is in talks to buy a drone company Titan Aerospace, which is developing autonomous solar-powered aircraft.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Tue, 04 Mar 2014 11:36:14 -0500</pubDate><guid>https://www.nextgov.com/modernization/2014/03/facebooks-drones-could-bring-internet-developing-worldand-stick-it-mobile-carriers/79798/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p data-annotation-count="0" data-article-id="183730" data-thread-id="51310"&gt;
 Facebook is in talks to buy a drone company called Titan Aerospace for $60 million,
 &lt;a href="http://techcrunch.com/2014/03/03/facebook-in-talks-to-acquire-drone-maker-titan-aerospace/"&gt;
  according to TechCrunch
 &lt;/a&gt;
 . The New Mexico-based start-up is is developing autonomous solar-powered aircraft that can stay aloft for up to five years at near-orbital heights, which could make them ideal for beaming internet access to remote areas.
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="183730" data-thread-id="51311"&gt;
 This holds an obvious appeal for Facebook CEO Mark Zuckerberg, who is focused on reaching the two-thirds of humankind who are not yet online. Google is testing a similar internet access program called Project Loon that uses a network of weather balloons, which are
 &lt;a href="http://thenextweb.com/google/2014/03/01/track-googles-project-loon-balloons-travel-world/#!yhVNv"&gt;
  currently aloft over the South Pacific
 &lt;/a&gt;
 .
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="183730" data-thread-id="51312"&gt;
 Titan’s aircraft are still under development, but it hopes to launch its
 &lt;a href="http://titanaerospace.com/platforms/solara-50/"&gt;
  Solara 50
 &lt;/a&gt;
 model, which can carry a payload of up to 70 pounds (31.8 kilograms) and has the same wingspan as a Boeing 787, sometime in 2014. The larger
 &lt;a href="http://titanaerospace.com/platforms/solara-60/"&gt;
  Solara 60
 &lt;/a&gt;
 can carry up to 250 pounds, and is due in 2015. Flying between 60,000 and 70,000 feet (18,300 and 21,300 meters), well above commercial jet traffic, a single aircraft
 &lt;a href="http://arstechnica.com/information-technology/2013/08/almost-orbital-solar-powered-drone-offered-as-atmospheric-satellite/"&gt;
  could provide connectivity over an 18-mile
 &lt;/a&gt;
 (29 kilometer) radius.
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="183730" data-thread-id="51313"&gt;
 That could prove to be an enormous boon for remote areas of Africa and Asia, where Facebook’s “
 &lt;a href="http://qz.com/5180/facebooks-plan-to-find-its-next-billion-users-convince-them-the-internet-and-facebook-are-the-same/"&gt;
  next billion
 &lt;/a&gt;
 ” live. Look at all these potential WhatsApp users:
&lt;/p&gt;
&lt;div data-count="0"&gt;
&lt;/div&gt;
&lt;p&gt;
 &lt;img alt="regions_non-internet-users-internet-users_chart" height="281" src="https://qzprod.files.wordpress.com/2014/03/regions_non-internet-users-internet-users_chart.png?w=1024&amp;amp;h=640" style="vertical-align: middle; border: 0px;" width="450"/&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="183730" data-thread-id="51314"&gt;
 Having a drone fleet could also give Facebook more leverage with mobile carriers as it tries to secure
 &lt;a href="http://www.jana.com/blog/facebook-mobile-expands-zero-rated-service/"&gt;
  “zero-rate” deals
 &lt;/a&gt;
 in the developing world, which would allow people to use Facebook without it counting against their data plans.
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="183730" data-thread-id="51315"&gt;
 Facebook contends that zero-rating its content actually encourages overall mobile phone usage and thus is profitable for carriers in the long run. While it has a number of zero-rate deals already, some carriers
 &lt;a href="http://www.fiercewireless.com/europe/story/zero-rated-deals-ott-providers-can-no-longer-assume-carrier-will-pay/2014-02-11"&gt;
  have recently been unreceptive to that argument
 &lt;/a&gt;
 . “It does not make any sense,”
 &lt;a href="http://www.gomonews.com/vodafone-spurns-facebook-appeal-to-provide-zero-rate-content/"&gt;
  Vodafone CEO Vittorio Colao said
 &lt;/a&gt;
 at a shareholder meeting last month. “There is no reason why I should give my network capacity for free.”
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="183730" data-thread-id="51316"&gt;
 But what if Facebook can bypass the carriers and offer mobile data services to developing markets with a futuristic fleet of high-flying solar-powered drones? A couple of years from now, when Facebook has yet another meeting with a mobile carrier in India, Nigeria, or Indonesia to talk about a zero-rate deal, the carrier would be offered an implicit choice: Cut us a deal or we release the drones.
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="183730" data-thread-id="51359"&gt;
 Facebook was not immediately available for comment.
&lt;/p&gt;
&lt;p&gt;
 &lt;em&gt;
  Reprinted with permission from
  &lt;a href="http://www.qz.com/" target="_blank"&gt;
   Quartz
  &lt;/a&gt;
  . The original story can be found
  &lt;a href="http://qz.com/183730/facebooks-drones-could-bring-internet-to-the-developing-world-and-stick-it-to-mobile-carriers/"&gt;
   here
  &lt;/a&gt;
  .
 &lt;/em&gt;
&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Singapore Figured Out How to Tax Bitcoin—Treat it Like a Product, Not Money</title><link>https://www.nextgov.com/modernization/2014/01/singapore-figured-out-how-tax-bitcointreat-it-product-not-money/76523/</link><description>Tax authorities around the world have been closely studying the virtual currency</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Thu, 09 Jan 2014 10:59:37 -0500</pubDate><guid>https://www.nextgov.com/modernization/2014/01/singapore-figured-out-how-tax-bitcointreat-it-product-not-money/76523/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p data-annotation-count="0" data-article-id="165207" data-thread-id="39537"&gt;
	If you&amp;rsquo;ve made a fortune in bitcoins over the past year and think you can shield the gain from the tax man, you may be in for a rude shock: Tax authorities around the world have been closely studying the virtual currency, which in some cases is much less anonymous and untraceable than it might seem.&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="165207" data-thread-id="39538"&gt;
	Even if you&amp;rsquo;re willing to pay your fair share of your bitcoin earnings, prepare for some headaches. Bitcoin&amp;rsquo;s popularity has run well ahead of tax law, mostly because nobody can seem to decide what exactly bitcoins should be: A currency, like a dollar or a euro? A financial instrument like a stock or a bond? Or illegal altogether?&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="165207" data-thread-id="39539"&gt;
	The Inland Revenue Authority of Singapore (IRAS) thinks it found a workable way to bring bitcoins in from the cold. In a response to the bitcoin brokerage Coin Republic,&amp;nbsp;&lt;a href="http://www.coindesk.com/singapore-government-how-we-intend-tax-bitcoin/"&gt;as reported by Coinbase&amp;rsquo;s Jon Southurst&lt;/a&gt;, IRAS says it will treat bitcoins like a product&amp;mdash;no different than an iPhone or an MP3 or a shrink-wrapped piece of software&amp;mdash;which incurs taxes when it is sold for cash or used to pay for goods or services:&lt;/p&gt;
&lt;blockquote&gt;
	&lt;p data-annotation-count="0" data-article-id="165207" data-thread-id="39540"&gt;
		The IRAS reminded Coin Republic that bitcoins do not fit the definition of &amp;lsquo;money&amp;rsquo; or &amp;lsquo;currency&amp;rsquo;, so supplying them is seen as a good/service for taxation purposes rather than a currency exchange.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p data-annotation-count="0" data-article-id="165207" data-thread-id="39540"&gt;
	&lt;a href="http://qz.com/165207/singapore-figured-out-how-to-tax-bitcoin-treat-it-like-a-product-not-money/"&gt;Read more at &lt;em&gt;Quartz&lt;/em&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>As Bitcoin Booms, So Does Bitcoin Bank Robbery</title><link>https://www.nextgov.com/emerging-tech/2013/11/bitcoin-booms-so-does-bitcoin-bank-robbery/74474/</link><description>The virtual currency's steep rise tempts larcenous hackers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Mon, 25 Nov 2013 16:57:26 -0500</pubDate><guid>https://www.nextgov.com/emerging-tech/2013/11/bitcoin-booms-so-does-bitcoin-bank-robbery/74474/</guid><category>Emerging Tech</category><content:encoded>&lt;![CDATA[&lt;p data-annotation-count="0" data-article-id="150946" data-thread-id="30783"&gt;
	Robbing a bank is such a hassle in the real world, with all the complicated logistics of weapons, vaults, dye packs, and getaway cars. It&amp;rsquo;s a lot more straightforward to rob digital currency exchanges and payment processors. To paraphrase bank robber &lt;a href="http://en.wikipedia.org/wiki/Willie_Sutton"&gt;Willie Sutton&lt;/a&gt;, that&amp;rsquo;s where the bitcoins are.&lt;/p&gt;
&lt;p&gt;
	The huge interest in bitcoin and the concurrent surge in the value of the currency&amp;mdash;bitcoin has risen&amp;nbsp;&lt;a href="http://bitcoincharts.com/charts/mtgoxUSD#rg360ztgSzm1g10zm2g25zp"&gt;6,000% versus the US dollar in the last year&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="http://bitcoincharts.com/charts/mtgoxUSD#rg30ztgSzm1g10zm2g25zp"&gt;300% just this month&lt;/a&gt;&amp;mdash;has also created a growing incentive for larcenous hackers:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;
		European bitcoin payment processor BIPS&amp;nbsp;&lt;a href="http://www.coindesk.com/bitcoin-payment-processor-bips-attacked-1m-stolen/"&gt;lost the equivalent of about $1 million&lt;/a&gt;&amp;nbsp;last week after a distributed denial of service (DDoS) attack&lt;a href="http://www.businessinsider.com/thieves-stole-1million-from-bitcoin-bank-2013-11"&gt; overwhelmed its servers&lt;/a&gt;&amp;nbsp;and enabled attackers to gain access to customers&amp;rsquo; online bitcoin &amp;ldquo;wallets.&amp;rdquo;&lt;/li&gt;
	&lt;li&gt;
		Poland&amp;rsquo;s&amp;nbsp;&lt;a href="http://www.coindesk.com/hacker-attack-polands-bitcoin-exchange/"&gt;Bidextreme.pl&lt;/a&gt;&amp;nbsp;was also hacked last week, and its users&amp;rsquo; accounts emptied, though it did not disclose the amount taken.&lt;/li&gt;
	&lt;li&gt;
		A week earlier, the&amp;nbsp;&lt;a href="http://www.theregister.co.uk/2013/11/13/bitcashcz_burgled_and_closed/"&gt;Czech exchange Bitcash.cz was hit&lt;/a&gt;, with 4,000 users losing bitcoins worth about $100,000.&lt;/li&gt;
	&lt;li&gt;
		Australia&amp;rsquo;s TradeFortress said it was hacked in November, leading to the loss of&amp;nbsp;&lt;a href="http://www.wired.com/wiredenterprise/2013/11/inputs/"&gt;$1 million worth of users&amp;rsquo;&amp;nbsp; bitcoins&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;
		China&amp;rsquo;s GBL exchange&amp;nbsp;&lt;a href="http://www.businessinsider.com/bitcoin-exchange-gbl-holding-41-billion-vanishes-2013-11"&gt;abruptly went offline in October&lt;/a&gt;, with $4.1 million in users&amp;rsquo; bitcoins going missing.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/150946/as-bitcoin-booms-so-does-bitcoin-bank-robbery/"&gt;&lt;strong&gt;Read the full story at &lt;em&gt;Quartz&lt;/em&gt; to find out how you steal a bitcoin, anyway. &lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
&lt;/h2&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2013/11/25/10302043706_8db652d059_b/large.jpg" width="618" height="284"><media:credit>Flickr user btckeychain</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2013/11/25/10302043706_8db652d059_b/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Google Engineers Blast NSA With F-bombs, Righteous Outrage and Lord of the Rings Analogies</title><link>https://www.nextgov.com/cybersecurity/2013/11/google-engineers-blast-nsa-f-bombs-righteous-outrage-and-lord-rings-analogies/73313/</link><description>A little harsher than the corporate line.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Wed, 06 Nov 2013 11:15:05 -0500</pubDate><guid>https://www.nextgov.com/cybersecurity/2013/11/google-engineers-blast-nsa-f-bombs-righteous-outrage-and-lord-rings-analogies/73313/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p data-annotation-count="0" data-article-id="144143" data-thread-id="26874"&gt;
	Google chairman Eric Schmidt had some stern words for the National Security Agency this week, saying the NSA&amp;rsquo;s reported&amp;nbsp;&lt;a href="http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html"&gt;hacking of Google&amp;rsquo;s data centers&lt;/a&gt; was&amp;nbsp;&lt;a href="http://online.wsj.com/news/articles/SB10001424052702304391204579177104151435042"&gt;&amp;ldquo;outrageous&amp;rdquo; and &amp;ldquo;perhaps illegal&amp;rdquo;&lt;/a&gt;&amp;nbsp;(paywall). But some Google employees are venting their rage in a much less constrained fashion.&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="144143" data-thread-id="26875"&gt;
	&lt;a href="https://plus.google.com/108799184931623330498/posts/SfYy8xbDWGG"&gt;Brandon Downey&lt;/a&gt;, a Google network security engineer, let loose on Google+ with a broadside last week when news of the NSA intrusions first surfaced:&lt;/p&gt;
&lt;blockquote&gt;
	&lt;p data-annotation-count="0" data-article-id="144143" data-thread-id="26876"&gt;
		I&amp;rsquo;m just going to post my thoughts on this. Standard disclaimer: They are my own thoughts, and not those of my employer. Fuck these guys. I&amp;rsquo;ve spent the last ten years of my life trying to keep Google&amp;rsquo;s users safe and secure from the many diverse threats Google faces &amp;hellip; seeing this, well, it&amp;rsquo;s just a little like coming home from War with Sauron, destroying the One Ring, only to discover the NSA is on the front porch of the Shire chopping down the Party Tree and outsourcing all the hobbit farmers with half-orcs and whips.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p data-annotation-count="0" data-article-id="144143" data-thread-id="26877"&gt;
	&lt;a href="https://plus.google.com/+MikeHearn/posts/LW1DXJ2BK8k"&gt;Mike Hearn&lt;/a&gt;, a network security colleague of Downey&amp;rsquo;s, weighed in with his own profanity-laced response on Tuesday afternoon, noting that the slides leaked by Edward Snowden showed the NSA accessing the very systems he had worked for years to safeguard against criminals within the confines of the legal system:&lt;/p&gt;
&lt;blockquote&gt;
	&lt;p data-annotation-count="0" data-article-id="144143" data-thread-id="26878"&gt;
		Unfortunately we live in a world where all too often, laws are for the little people. Nobody at GCHQ or the NSA will ever stand before a judge and answer for this industrial-scale subversion of the judicial process. In the absence of working law enforcement,&amp;nbsp; we therefore do what internet engineers have always done &amp;ndash; build more secure software. The traffic shown in the slides below is now all encrypted and the work the NSA/GCHQ staff did on understanding it, ruined. Thank you Edward Snowden.&lt;/p&gt;
&lt;/blockquote&gt;
]]&gt;</content:encoded></item><item><title>Indian IT Outsourcing Giant Infosys Stung by U.S. Immigration Morass</title><link>https://www.nextgov.com/digital-government/2013/10/indian-it-outsourcing-giant-infosys-stung-us-immigration-morass/71798/</link><description>H-1B visas that companies like Infosys rely on have become contentious.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Fri, 11 Oct 2013 10:39:25 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2013/10/indian-it-outsourcing-giant-infosys-stung-us-immigration-morass/71798/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	Bangalore-based Infosys posted a scanty 1.2 percent increase in net profit for the three months to Sept. 30, falling short of analysts&amp;rsquo; already-lowered estimates. The earnings miss was largely due to a 2.19 billion rupee provision for &amp;ldquo;visa related matters,&amp;rdquo; stemming from a US investigation into whether Infosys broke immigration rules by bringing in full-time workers from India under short-term &amp;ldquo;business visitor&amp;rdquo; visas. The H-1B visas that companies like Infosys rely on have become a contentious issue in the US immigration debate. With no sign that Washington will be able to tackle immigration any time soon, Infosys and other IT outsourcing companies have recently been building up their operations in Mexico instead.&lt;/p&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/134436/indian-outsourcing-giant-infosys-stung-by-us-immigration-morass/"&gt;&lt;strong&gt;Read the full story at &lt;em&gt;Quartz.&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>This Is How Fear of Government Snooping Takes Its Toll on Tech Companies</title><link>https://www.nextgov.com/cybersecurity/2013/09/how-fear-government-snooping-takes-its-toll-tech-companies/70614/</link><description>Two technology offerings dropped in wake of surveillance revelations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Fri, 20 Sep 2013 10:17:09 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2013/09/how-fear-government-snooping-takes-its-toll-tech-companies/70614/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="126495" data-thread-id="13815"&gt;
	Two very different technology offerings were dropped on Thursday because of fears that the US and China might be trying to spy on the customers using them.&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="126495" data-thread-id="13816"&gt;
	In Baltimore, Maryland&amp;mdash;just down the road from the headquarters of the&amp;nbsp;&lt;a href="http://goo.gl/maps/CZsHl"&gt;National Security Agency in Ft. Meade&lt;/a&gt;&amp;mdash;a US company called CyberPoint International&amp;nbsp;&lt;a href="http://www.bloomberg.com/news/2013-09-19/zte-device-called-american-spurned-after-china-spy-angst.html"&gt;lost a contract to provide a videoconferencing system to the federal government&lt;/a&gt;&amp;nbsp;after US Customs determined that CyberPoint&amp;rsquo;s offering was in fact Chinese, substantially made by telecom equipment maker ZTE. A US House Intelligence panel has recommended that government agencies and contractors should&amp;nbsp;&lt;a href="http://intelligence.house.gov/sites/intelligence.house.gov/files/Huawei-ZTE%20Investigative%20Report%20(FINAL).pdf"&gt;avoid using equipment made by ZTE and its larger Chinese counterpart Huawei&lt;/a&gt;, because of fears that they might have ties to the Chinese military that could compromise the security of federal computer networks. ZTE and Huawei have strenuously denied the claims.&lt;/p&gt;
&lt;div data-count="0"&gt;
	&lt;div&gt;
		&lt;div&gt;
			Meanwhile, another US company called RSA Security&amp;mdash;a unit of computer storage giant EMC&amp;mdash;quietly told its customers to&amp;nbsp;&lt;a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/"&gt;stop using a software encryption algorithm&lt;/a&gt;&amp;nbsp;that it had long recommended. According to documents leaked by whistleblower Edward Snowden, the NSA, which helped create the Dual Elliptic Curve Deterministic Random Bit Generator (or Dual EC DRBG for short), had secretly introduced vulnerabilities into the algorithm so it could exploit them later.&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;
&lt;div data-count="0"&gt;
	&lt;div&gt;
		&lt;div&gt;
		&lt;/div&gt;
		&lt;div&gt;
			Experts have long suspected that Dual EC DRBG, which generates a quasi-random string of numbers to be used in encryption, was intentionally flawed.&lt;/div&gt;
		&lt;div&gt;
		&lt;/div&gt;
		&lt;div&gt;
			&lt;a href="http://qz.com/126495/this-is-how-the-fear-of-government-snooping-takes-its-toll-on-tech-companies/"&gt;&lt;strong&gt;Read the full story at Quartz.&amp;nbsp;&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
	(&lt;em&gt;Image via &lt;a href="http://www.shutterstock.com/pic-115835950/stock-photo-digital-privacy-concept.html?src=v9xJMxGHSjFPwnUlZuI1yA-1-11"&gt;clarence s lewis&lt;/a&gt;/&lt;a href="http://www.shutterstock.com/?cr=00&amp;amp;pl=edit-00"&gt;Shutterstock.com&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2013/09/20/092013privacyNG/large.jpg" width="618" height="284"><media:credit> clarence s lewis/Shutterstock.com</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2013/09/20/092013privacyNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>A Scientist Used Some Electrodes, a Magnet, and a Swim Cap to Play a Video Game Using His Colleague’s Brain</title><link>https://www.nextgov.com/digital-government/2013/08/scientist-used-some-electrodes-magnet-and-swim-cap-play-video-game-using-his-colleagues-brain/69566/</link><description>Researchers at the University of Washington have completed the first experiment demonstrating human brain-to-brain communication.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Wed, 28 Aug 2013 12:41:06 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2013/08/scientist-used-some-electrodes-magnet-and-swim-cap-play-video-game-using-his-colleagues-brain/69566/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;p data-annotation-count="0" data-article-id="119316" data-thread-id="8475"&gt;
	&amp;ldquo;Yes! Success!&amp;rdquo;&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="119316" data-thread-id="8476"&gt;
	It wasn&amp;rsquo;t quite&amp;nbsp;&lt;a href="http://www.wired.com/science/discoveries/news/2008/03/dayintech_0310"&gt;&amp;ldquo;Mr. Watson. Come Here. I need you.&amp;rdquo;&lt;/a&gt;&amp;nbsp;but it could prove to be just as revolutionary: Researchers at the University of Washington have completed the first experiment demonstrating human brain-to-brain communication. Fittingly given the sci-fi connotations, they used the technology to play a video game.&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="119316" data-thread-id="8477"&gt;
	UW professor Rajesh Rao,&amp;nbsp;hooked up to a machine that reads&amp;nbsp;electrical activity in the brain, transmitted a neural signal over the Internet to his colleague&amp;nbsp;Andrea Stocco &amp;nbsp;across campus, who had a powerful magnetic coil&amp;nbsp;aimed at his brain&amp;rsquo;s left motor cortex, which controls movement of the right side of the body. While watching a video game on a screen, Rao imagined moving his right hand, and Stocco&amp;rsquo;s right index finger twitched involuntarily, causing him to tap the space bar on a keyboard.&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="119316" data-thread-id="8477"&gt;
&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="119316" data-thread-id="8477"&gt;
	&lt;iframe allowfullscreen="" frameborder="0" height="338" src="//www.youtube.com/embed/rNRDc714W5I" width="450"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="119316" data-thread-id="8477"&gt;
	The experiment combined two well-established pieces of equipment&amp;mdash;an&amp;nbsp;electroencephalography machine, which reads brain waves, and a&amp;nbsp;&lt;a href="http://www.ai.mit.edu/projects/medical-vision/surgery/tms.html"&gt;transcranial magnetic stimulation coil&lt;/a&gt;, which can trigger them&amp;mdash;and used custom computer code to translate Rao&amp;rsquo;s brain signals into a command for Stocco&amp;rsquo;s brain. Both devices are non-invasive, though transcranial stimulation does carry&amp;nbsp;&lt;a href="http://www.clinph-journal.com/article/S1388-2457(09)00519-7/abstract"&gt;a small risk of seizures&lt;/a&gt;.&lt;/p&gt;
&lt;p data-annotation-count="0" data-article-id="119316" data-thread-id="8477"&gt;
	&lt;a href="http://qz.com/119316/a-scientist-used-some-electrodes-a-magnet-and-a-swim-cap-to-play-a-video-game-using-his-colleagues-brain/"&gt;Read more at &lt;em&gt;Quartz&lt;/em&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	(&lt;em&gt;Image via &lt;a href="http://www.shutterstock.com/cat.mhtml?lang=en&amp;amp;search_source=search_form&amp;amp;search_tracking_id=juwQahScbfjV5yQegTZiZA&amp;amp;version=llv1&amp;amp;anyorall=all&amp;amp;safesearch=1&amp;amp;searchterm=Brain+&amp;amp;search_group=&amp;amp;orient=&amp;amp;search_cat=&amp;amp;searchtermx=&amp;amp;photographer_name=&amp;amp;people_gender=&amp;amp;people_age=&amp;amp;people_ethnicity=&amp;amp;people_number=&amp;amp;commercial_ok=&amp;amp;color=&amp;amp;show_color_wheel=1#id=93075775&amp;amp;src=96r9vZEfZcX3DTgkDu_zdQ-1-9"&gt;VLADGRIN&lt;/a&gt;/&lt;a href="http://www.shutterstock.com/?cr=00&amp;amp;pl=edit-00"&gt;Shutterstock.com&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2013/08/28/082813brainNG/large.jpg" width="618" height="284"><media:credit>VLADGRIN/Shutterstock.com</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2013/08/28/082813brainNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Beijing Embraces Big Data to Measure Public Opinion</title><link>https://www.nextgov.com/digital-government/2013/08/beijing-embraces-big-data-measure-public-opinion/68075/</link><description>The Chinese government is taking a cue from western countries in measuring the populace.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Mon, 05 Aug 2013 09:54:04 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2013/08/beijing-embraces-big-data-measure-public-opinion/68075/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	China is known to have one of the world&amp;rsquo;s most restrictive internet regimes, with increasingly sophisticated systems in place to snuff out dissent and suppress discussion of controversial topics.&lt;/p&gt;
&lt;p&gt;
	But Beijing policymakers are beginning to see the internet as more than a walled garden, carefully pruned&amp;mdash;it&amp;rsquo;s a source of invaluable information about how netizens feel about the Communist Party&amp;rsquo;s slate of reforms.&amp;nbsp;&lt;a href="http://www.washingtonpost.com/world/in-china-government-mines-public-opinion/2013/08/02/33358026-f2b5-11e2-ae43-b31dc363c3bf_story_1.html"&gt;The Washington Post&amp;rsquo;s Simon Denyer&lt;/a&gt;&amp;nbsp;reports that party leaders are now getting real-time summaries of online discussions, and &amp;ldquo;opinion monitoring centers have sprung up in state-run news organizations and universities to mine and interpret the vast rivers of chatter on the Internet.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	A data-driven approach to politics has long been a hallmark of cutting-edge campaigns in western countries&amp;mdash;Barack Obama&amp;rsquo;s re-election campaign famously employed an&amp;nbsp;&lt;a href="http://www.theatlantic.com/technology/archive/2012/11/when-the-nerds-go-marching-in/265325/"&gt;all-star technology team&lt;/a&gt;&amp;nbsp;to optimize messaging and voter turnout&amp;mdash;but it&amp;rsquo;s a new development in China, where a top-down one-party system didn&amp;rsquo;t leave any room for actually listening to citizens.&lt;/p&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/111670/the-great-firewall-has-ears-beijing-embraces-big-data-to-measure-public-opinion/"&gt;Read more at Quartz.&lt;/a&gt;&lt;/p&gt;


&lt;p&gt;

(&lt;em&gt;Image via &lt;a href=http://www.shutterstock.com/pic-63547135/stock-photo-china-s-great-hall-of-the-people.html?src=csl_recent_image-1&gt;testing&lt;/a&gt;/&lt;a  href="http://www.shutterstock.com/?cr=00&amp;pl=edit-00"&gt;Shutterstock.com&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;


]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2013/08/05/080513chinaNG/large.jpg" width="618" height="284"><media:credit> testing/Shutterstock.com</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2013/08/05/080513chinaNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Brutal Smartphone Market Is Clobbering Former Stalwarts </title><link>https://www.nextgov.com/modernization/2013/07/brutal-smartphone-market-clobbering-former-stalwarts/66890/</link><description>NEC has decided to exit the smartphone business entirely</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Wed, 17 Jul 2013 13:09:16 -0400</pubDate><guid>https://www.nextgov.com/modernization/2013/07/brutal-smartphone-market-clobbering-former-stalwarts/66890/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	There was a time when NEC was the 500 lb. gorilla in Japan&amp;rsquo;s cellphone market with a 27% market share&amp;mdash;then came smartphones. Faced with competition from the likes of Apple and Samsung, NEC&amp;rsquo;s share quickly shrunk to a measly 5%; after spending six months unsuccessfully trying to negotiate a partnership with China&amp;rsquo;s Lenovo, the company has decided to&amp;nbsp;&lt;a href="http://e.nikkei.com/e/ac/tnks/Nni20130716D1607F03.htm"&gt;exit the smartphone business entirely&lt;/a&gt;, according to a report by the Nikkei newspaper.&lt;/p&gt;
&lt;p&gt;
	Japan&amp;rsquo;s smartphone market is brutal, dominated by&amp;nbsp;&lt;a href="http://www.nytimes.com/2013/06/27/technology/japans-fad-loving-consumer-threatens-to-derail-sonys-phone-ambitions.html?pagewanted=all"&gt;fickle mobile carriers and fad-chasing consumers&lt;/a&gt;. As in the rest of the world, it is also intensely competitive: In addition to Apple and Samsung, there are five homegrown firms&amp;mdash;Sony, Fujitsu, Sharp, Panasonic, and Kyocera&amp;mdash;who are vying for a spot in users&amp;rsquo; pockets.&lt;/p&gt;
&lt;p&gt;
	Still, Japan once had ten handset makers before the relentless economics of smartphones winnowed the crowd. And NEC (which will reportedly&amp;nbsp;&lt;a href="http://e.nikkei.com/e/ac/tnks/Nni20130716D1607A11.htm"&gt;keep making non-smartphones for Japan&amp;rsquo;s elderly&lt;/a&gt;) won&amp;rsquo;t be the last firm&amp;nbsp;to bow out. Who&amp;rsquo;s next? Well, JP Morgan analyst Alvin Kwock&amp;nbsp;&lt;a href="http://www.taipeitimes.com/News/biz/archives/2013/07/13/2003566968"&gt;said in a note this week&lt;/a&gt;&amp;nbsp;that Taiwan&amp;rsquo;s struggling smartphone vendor HTC may be forced to consider being acquired by the Chinese mobile telecommunications equipment maker Huawei to survive.&lt;/p&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/105130/nec-calls-it-quits-on-smartphones-after-lenovo-deal-falls-through-is-huaweihtc-next/"&gt;Read more at &lt;em&gt;Quartz&lt;/em&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>China Patches Cracks in the Great Firewall ahead of Tiananmen anniversary</title><link>https://www.nextgov.com/cybersecurity/2013/06/china-patches-cracks-great-firewall-ahead-tiananmen-anniversary/64109/</link><description>Instead of censoring, Chinese users' search results are now scrubbed clean of all references to the 1989 protests.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Mon, 03 Jun 2013 11:21:56 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2013/06/china-patches-cracks-great-firewall-ahead-tiananmen-anniversary/64109/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	The &amp;ldquo;June 4 Incident,&amp;rdquo; which the world outside of China knows as the Tiananmen Square protests, is a forbidden topic within the Great Firewall of China.&lt;/p&gt;
&lt;p&gt;
	In recent years, Beijing&amp;rsquo;s enormous internet censorship program has taken aim at any words or phrases that could conceivably refer to the government crackdown that killed hundreds or even thousands of protesters in 1989. On the anniversary last year, there were reports that even&amp;nbsp;&lt;a href="http://www.bbc.co.uk/news/technology-18321548"&gt;mentioning the word &amp;ldquo;today&amp;rdquo; was banned&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;
	This year the government is getting more sophisticated. The censorship monitoring group&amp;nbsp;&lt;a href="http://greatfire.org/"&gt;Greatfire.org&lt;/a&gt;&amp;nbsp;reported that users of the popular Twitter-like service&amp;nbsp;&lt;a href="https://en.greatfire.org/blog/2013/may/sina-testing-subtle-censorship-ahead-tiananmen-anniversary-0"&gt;Sina Weibo are now able to search&lt;/a&gt;&amp;nbsp;for &amp;ldquo;六四事件&amp;rdquo;&amp;quot; (&amp;ldquo;June 4th incident)&amp;rdquo; and related terms. Instead of receiving a censorship notice, as they had in the past, a page of search results appears&amp;mdash;but it is scrubbed clean of all references to the 1989 protests. It&amp;rsquo;s a move George Orwell would have admired: If users go looking for information, they won&amp;rsquo;t find anything&amp;mdash;and they won&amp;rsquo;t even know the information is being censored.&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;&lt;a href="http://qz.com/90178/china-patches-cracks-in-the-great-firewall-ahead-of-tiananmen-anniversary/"&gt;Read more at Quartz.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Softbank’s Latest Sprint Nextel Offer Includes a Seat on the Board for Uncle Sam</title><link>https://www.nextgov.com/modernization/2013/05/softbanks-latest-sprint-nextel-offer-includes-seat-board-uncle-sam/63608/</link><description>The seat would assuage fears about Chinese equipment suppliers like Huawei which might compromise the nation’s telecom infrastructure.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Thu, 23 May 2013 12:31:59 -0400</pubDate><guid>https://www.nextgov.com/modernization/2013/05/softbanks-latest-sprint-nextel-offer-includes-seat-board-uncle-sam/63608/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	Japan&amp;rsquo;s Softbank is taking an extraordinary step to make sure its bid for Sprint Nextel goes through: effectively giving the US government a seat on the board to assuage its fears that&amp;nbsp;Chinese equipment suppliers like Huawei might compromise the nation&amp;rsquo;s telecom infrastructure.&lt;/p&gt;
&lt;p&gt;
	US lawmakers have expressed concerns that using Chinese equipment could pose a threat to national security&amp;mdash;and those fears have been&amp;nbsp;&lt;a href="http://qz.com/87392/dish-network-shows-its-desperation-by-resorting-to-fear-mongering-against-softbank/"&gt;shamelessly hyped even further by Dish TV&lt;/a&gt;, which has made a counter-offer for Sprint. Softbank, which had already agreed not to use Huawei equipment, has now agreed to give the US government what the&amp;nbsp;&lt;a href="http://online.wsj.com/article/SB10001424127887323336104578499651225020178.html?mod=WSJASIA_hps_LEFTTopWhatNews"&gt;Wall Street Journal&lt;/a&gt;&amp;nbsp;called an &amp;ldquo;unusual level of influence&amp;rdquo; by letting it approve a board member who will be responsible for national security issues.&lt;/p&gt;
&lt;div&gt;
	&lt;a href="http://qz.com/87583/softbanks-latest-sprint-nextel-offer-is-a-seat-on-the-board-for-uncle-sam/"&gt;Read more at &lt;em&gt;Quartz&lt;/em&gt;&lt;/a&gt;&lt;em&gt;.&lt;/em&gt;&lt;/div&gt;
]]&gt;</content:encoded></item><item><title>China’s Huawei Bails on the United States</title><link>https://www.nextgov.com/cybersecurity/2013/04/chinas-huawei-bails-united-states/62753/</link><description>The giant network equipment manufacturer has been repeatedly accused of threatening U.S. National Security.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Wed, 24 Apr 2013 13:35:43 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2013/04/chinas-huawei-bails-united-states/62753/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	There&amp;rsquo;s only so much abuse that a giant network equipment manufacturer repeatedly accused of threatening US national security can take.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;We are not interested in the US market any more,&amp;rdquo; Huawei executive vice president Eric Xu said at the company&amp;rsquo;s annual analyst summit on Wednesday, as&amp;nbsp;&lt;a href="http://www.ft.com/intl/cms/s/0/7b212314-ac28-11e2-a063-00144feabdc0.html#axzz2RLJtz5xD"&gt;reported by the Financial Times&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Don&amp;rsquo;t get me wrong, I&amp;rsquo;d love to get into the U.S. market,&amp;rdquo; Chief Technology Officer Li Sanqi&amp;nbsp;&lt;a href="http://www.pcworld.com/article/2036198/huawei-us-market-no-longer-focus-for-its-carrier-business.html"&gt;added in an interview with IDG&lt;/a&gt;. &amp;ldquo;[But] we today face reality. We will focus on the rest of the world, which is reasonably big enough and is growing significantly.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Huawei has been a&amp;nbsp;&lt;a href="http://arstechnica.com/tech-policy/2012/10/congress-accuses-chinese-tech-giants-of-un-american-activities/"&gt;punching bag in Washington&lt;/a&gt;&amp;nbsp;for years, with congressmen labeling the company a trojan horse for cyberwarfare by China. It has come under additional scrutiny following the&amp;nbsp;&lt;a href="http://qz.com/59074/did-a-secret-formula-for-advanced-electronics-get-shane-todd-killed/"&gt;suspicious death in Singapore&lt;/a&gt;&amp;nbsp;of an American engineer who was working on a cutting-edge military technology project that may have violated US export rules. Computer files found in his apartment included a proposal for Huawei to collaborate on the project.&lt;/p&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/77725/chinas-huawei-bails-on-the-united-states/"&gt;Read more at &lt;em&gt;Quartz&lt;/em&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>China Bird Flu Breakdown: No Country for Old Men</title><link>https://www.nextgov.com/digital-government/2013/04/china-bird-flu-breakdown-no-country-old-men/62685/</link><description>The H7N9 virus is disproportionately affecting older men as it spreads in China.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Mon, 22 Apr 2013 11:56:40 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2013/04/china-bird-flu-breakdown-no-country-old-men/62685/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	The H7N9 virus is disproportionately affecting older men as it spreads in China, the World Health Organization&amp;nbsp;&lt;a href="http://www.wpro.who.int/wpsar/volumes/04/2/2013_PE_EMT_Arima/en/index.html"&gt;said in a bulletin on Monday&lt;/a&gt;, for reasons that are not immediately clear.&lt;/p&gt;
&lt;p&gt;
	Between March 31 and April 16, when the WHO researchers were crunching the numbers, there were 63 reported cases of the new bird flu strain, with a median age of 64 years and with men making up 71% of cases. Although the 22% fatality rate in all males was similar to females, the rate of deaths in older men was 20%, compared to no deaths in older females.&lt;/p&gt;
&lt;p&gt;
	That demographic breakdown, while based on an early assessment with a small sample size, stands in contrast to the previous H5N1 influenza outbreak in China, in which most patients were working-age adults, with no disparity in gender. China as a whole has a mostly working-age population, and elderly women outnumber elderly men.&lt;/p&gt;
&lt;p&gt;
	The researchers said the answer could lie in different levels of exposure due to &amp;ldquo;gender-associated practices and norms,&amp;rdquo; differences in the way men and women of different ages respond to the virus, or different health-care seeking behaviors, leading to a bias in the way the cases have been reported.&lt;/p&gt;
&lt;div&gt;
	&lt;a href="http://qz.com/76772/china-bird-flu-breakdown-no-country-for-old-men/"&gt;Read more at &lt;em&gt;Quartz&lt;/em&gt;&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;
]]&gt;</content:encoded></item><item><title>Malware Turns Hacked Computers Into Slaves That “Mine” New Digital Currency</title><link>https://www.nextgov.com/cybersecurity/2013/04/malware-turns-hacked-computers-slaves-mine-new-digital-currency/62337/</link><description>These cybercriminals don’t want to steal your money, they want to use your computer to create Bitcoins out of thin air.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Mon, 08 Apr 2013 11:31:02 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2013/04/malware-turns-hacked-computers-slaves-mine-new-digital-currency/62337/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	The digital currency Bitcoin is&amp;nbsp;&lt;a href="http://qz.com/search/bitcoin"&gt;having a bit of a moment&lt;/a&gt;, which is drawing the attention of cybercriminals. They don&amp;rsquo;t want to steal your money (though there is&lt;a href="http://news.discovery.com/tech/bitcoin-currency-attacked-130405.htm"&gt;some of that too&lt;/a&gt;). Instead they want to hijack the processing power of your computer to create more bitcoins out of thin air.&lt;/p&gt;
&lt;p&gt;
	There is no company, central bank, or government behind Bitcoin&amp;mdash;there is only math. The currency, created by a pseudonymous researcher and governed by computer code, is slowly adding more coins to circulation. New bitcoins are distributed to users with access to hugely powerful&amp;nbsp;computers, which compete to process fiendishly complicated math problems. The system gives new coins to the winner as a reward; the process is known as &amp;ldquo;mining.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	The newest Bitcoin scam was discovered last week by security firm Kaspersky Lab, which found a&amp;nbsp;&lt;a href="https://www.securelist.com/en/blog/208194210/Skypemageddon_by_bitcoining"&gt;type of computer malware&lt;/a&gt;&amp;nbsp;that hijacks computers and uses them to mine new bitcoins.&lt;/p&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/71813/malware-turns-hacked-computers-into-slaves-that-mine-new-digital-currency/"&gt;Read more at Quartz&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2013/04/08/040813bitcoinNG/large.jpg" width="618" height="284"><media:credit>Flickr user zcopley</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2013/04/08/040813bitcoinNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Two New H7N9 Cases: See How Bird Flu Is Spreading Through China</title><link>https://www.nextgov.com/digital-government/2013/04/two-new-h7n9-cases-see-how-bird-flu-spreading-through-china/62262/</link><description>Cases of the avian flu continue to increase across China.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Wed, 03 Apr 2013 12:43:46 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2013/04/two-new-h7n9-cases-see-how-bird-flu-spreading-through-china/62262/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	China&amp;rsquo;s avian flu outbreak continued to spread on Wednesday. In the city of Hangzhou, in Zhejiang province near Shanghai, one 38 year old man&amp;nbsp;&lt;a href="http://media.weibo.com/profile.php?uid=cctvxinwen" target="_blank"&gt;has died,&lt;/a&gt;&amp;nbsp;state-owned broadcaster CCTV said on its Sina Weibo page (Chinese, registration required). Another Hangzhou man, 67, has contracted the virus, the&lt;a href="http://news.qq.com/a/20130403/001887.htm" target="_blank"&gt;Zhejiang Online News reported&lt;/a&gt;&amp;nbsp;(Chinese).&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;&amp;nbsp;&lt;a href="http://goo.gl/maps/a5FHn"&gt;Click here&lt;/a&gt;&amp;nbsp;for an interactive version&amp;nbsp;of the map&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/70326/h7n9-bird-flu-reportedly-spreads-to-chinese-city-of-hangzhou-two-new-deaths/"&gt;Read more at&lt;/a&gt;&lt;i&gt;&lt;a href="http://qz.com/70326/h7n9-bird-flu-reportedly-spreads-to-chinese-city-of-hangzhou-two-new-deaths/"&gt; Quartz&lt;/a&gt;.&lt;/i&gt;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Congress’ Cybersecurity Crackdown on China Could Put Apple in the Crossfire</title><link>https://www.nextgov.com/cybersecurity/2013/03/congress-cybersecurity-crackdown-china-could-put-apple-crossfire/62145/</link><description>Congress has passed a bill that will make it more difficult for the US government to buy computer equipment from Chinese companies.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Thu, 28 Mar 2013 12:37:45 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2013/03/congress-cybersecurity-crackdown-china-could-put-apple-crossfire/62145/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	Last week, Congress quietly passed a bill that will make it much more difficult for the US government to buy computer equipment from Chinese companies, amid a&amp;nbsp;&lt;a href="http://qz.com/54963/hacking-against-the-us-is-traced-to-the-front-door-of-a-chinese-army-unit/"&gt;spate of cyberattacks linked to Beijing&lt;/a&gt;. But the unintended consequences could ensnare Apple&amp;rsquo;s iPhone and other devices sold by US firms that are assembled in China.&lt;/p&gt;
&lt;p&gt;
	A continuing budget resolution that is awaiting President Obama&amp;rsquo;s signature bans several federal agencies, including NASA and the Justice and Commerce Departments, from purchasing any &amp;ldquo;information technology system&amp;rdquo; that was &amp;ldquo;produced, manufactured&amp;nbsp;or assembled&amp;rdquo; by entities &amp;ldquo;owned, directed, or subsidized by the People&amp;rsquo;s Republic of China,&amp;rdquo; unless the agency&amp;rsquo;s chief and the FBI determine whether there is a cybersecurity threat and conclude that the purchase is in the US national interest. The clause was&amp;nbsp;&lt;a href="http://www.skatingonstilts.com/skating-on-stilts/2013/03/stewart-baker-law-cybersecurity.html"&gt;first spotted&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="http://www.skatingonstilts.com/skating-on-stilts/2013/03/stewart-baker-law-cybersecurity-wto-procurement-code-and-continuing-resolution-2013.html"&gt;Stewart A. Baker&lt;/a&gt;, a lawyer and former Homeland Security official, who writes the Skating on Stilts blog.&lt;/p&gt;
&lt;p&gt;
	Congress has long worried that buying equipment from Chinese technology companies like Huawei could lead to more hacking of US computer systems&amp;mdash;especially since a growing body of evidence implicates the Chinese government in widespread cyberattacks on western governments and corporations. (The&amp;nbsp;&lt;a href="http://qz.com/59074/did-a-secret-formula-for-advanced-electronics-get-shane-todd-killed/"&gt;suspicious death of a American engineer&lt;/a&gt;&amp;nbsp;in Singapore who had business links to Huawei has also caused alarm on Capitol Hill.)&lt;/p&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/68123/congress-cybersecurity-crackdown-on-china-could-put-apple-in-the-crossfire/"&gt;Read more at &lt;em&gt;Quartz&lt;/em&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Cheap Android smartphones could overwhelm China’s censors</title><link>https://www.nextgov.com/modernization/2013/03/cheap-android-smartphones-could-overwhelm-chinas-censors/61739/</link><description>Android accounts for 90% of new smartphone purchases in China, a trend that is alarming the government.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Pasick, Quartz</dc:creator><pubDate>Thu, 07 Mar 2013 12:37:06 -0500</pubDate><guid>https://www.nextgov.com/modernization/2013/03/cheap-android-smartphones-could-overwhelm-chinas-censors/61739/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	A massive glut of commodity smartphones running a stripped-down version of Google&amp;rsquo;s Android software is coming to market in China, with the potential to upend the mobile phone marketplace and swamp the country&amp;rsquo;s Internet censors.&lt;/p&gt;
&lt;p&gt;
	Android already accounts for 90% of new smartphone purchases in China, a trend that is alarming the government enough that it is&amp;nbsp;&lt;a href="http://qz.com/59326/98-of-chinese-smart-phones-run-googles-android-and-the-government-doesnt-like-that/"&gt;complaining about it&lt;/a&gt;. The volume of smartphone shipments in China&amp;nbsp;&lt;a href="http://news.xinhuanet.com/english/china/2013-03/06/c_132213880.htm?utm_source=Sinocism+Newsletter&amp;amp;utm_campaign=34a0eba515-Sinocism03_07_13&amp;amp;utm_medium=email"&gt;hit 70 million in the fourth quarter&lt;/a&gt;&amp;mdash;a 112% year-on-year increase&amp;mdash;and the total number of Chinese smartphones is projected to reach a staggering&amp;nbsp;&lt;a href="http://www.canalys.com/newsroom/developing-markets-will-drive-smart-phone-market-growth-2013"&gt;240 million this year&lt;/a&gt;. (That doesn&amp;rsquo;t include simpler &amp;ldquo;feature&amp;rdquo; phones that can&amp;rsquo;t as easily run software or access the Internet.)&lt;/p&gt;
&lt;p&gt;
	Foreign firms like Samsung were the first to bring Android to China, and homegrown manufacturers like Lenovo&amp;mdash;set to become the top-selling Chinese Android handset maker this year&amp;mdash;are coming on strong. But they may all be eventually swamped by cheap commoditized handsets from more than a thousand no-name manufacturers, which&amp;nbsp;&lt;a href="http://techrice.com/2013/03/07/year-of-the-chinadroid/?utm_source=Sinocism+Newsletter&amp;amp;utm_campaign=34a0eba515-Sinocism03_07_13&amp;amp;utm_medium=email"&gt;TechRice&amp;rsquo;s Kai Lukoff has dubbed &amp;ldquo;ChinaDroids.&amp;rdquo;&lt;/a&gt;&amp;nbsp;They have chipsets from Taiwan&amp;rsquo;s Mediatek, run a heavily modified version of the &amp;ldquo;Ice Cream Sandwich&amp;rdquo; series of&amp;nbsp;Android, and come preloaded with Chinese apps.&amp;nbsp;&lt;a href="http://ben-evans.com/benedictevans/2013/1/17/samsungs-china-problem"&gt;By one estimate&lt;/a&gt;&amp;nbsp;they already control 40% of the Chinese smartphone market.&lt;/p&gt;
&lt;p&gt;
	&lt;a href="http://qz.com/60439/google-android-smartphones-could-overwhelm-chinas-censors/"&gt;Read more at &lt;em&gt;Quartz&lt;/em&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded></item></channel></rss>