BBC exposes flaws in ‘world’s most secure’ email service

Screengrab of Nomx homepage

A BBC Click investigation has thrown doubt on claims that the small, personal email server Nomx can provide “absolute security”.

Created by entrepreneur Will Donaldson, Nomx says it uses the “world’s most secure communications protocol” to protect email messages.

But security analysts cracked the device’s simple passwords and hacked its hardware and software.

Defending itself, Nomx disputed the way the tests were done on its gadget.

Hardware exposed

The Nomx personal email server costs from $199 – $399 (£155 – £310) and its publicity material claims it is designed to handle email communications for consumers.

It says that using a dedicated personal server, users can help to stop messages being copied and hacked as they travel to their destination across the net.

BBC Click asked security researcher Scott Helme and computer security expert Prof Alan Woodward, from the University of Surrey, to scrutinise Nomx. They were asked to assess whether it did let people send messages in a way that was secure against hacking and interception.

The investigation started by taking the device apart to find that it was built around a £30 Raspberry Pi computer. As the operating system for the Pi sits on a removable memory card, Mr Helme was able to download the device’s core code so he could examine it closely.

Image copyright

Image caption

Nomx has made strong claims for the protections its devices give to customers

This allowed Mr Helme to run it as if he were the administrator for the device. He discovered that the software packages it used to handle mail were not proprietary and many were very old versions, five years old in one case, harbouring unpatched security bugs. Default passwords found in the code included “password” and “death”.

Mr Helme also found many problems with the web interface Nomx uses to administer the secure email service. This was vulnerable to several widely known and easy to execute attacks that, if exploited, would give attackers control over a target’s Nomx system.

He also found a way to create a hidden administrator’s account on the Nomx box that would allow any attacker to fully compromise the gadget.

In addition, Mr Helme found more than 10 other issues with the Nomx box that left him “horrified” by its approach to security.

The analysis was reviewed by Paul Moore – an experienced tester of secure hardware.

Mr Moore said the Nomx was an “overpriced and outdated mail server” and used one of the “most insecure PHP applications” he had ever encountered.

Update cycle

In an emailed response to Click, Mr Donaldson thanked Mr Helme and Prof Woodward for finding and sharing information about Nomx’s vulnerabilities.

Addressing the issue of old software, he said Nomx planned to let users choose which updates should be applied to their device.

Image copyright
Scott Helme

Image caption

Mr Helme was surprised to find the Nomx uses a Raspberry Pi computer

“We will selectively allow users to pick and choose when that becomes available but today we’re not forcing any types of updates,” he said, adding that updates can introduce vulnerabilities.

“Updates actually cause a cascading effect and now you’re patching patches and that is not a good place to be in,” he told Click.

The default names and passwords found by Mr Helme were used to make it easy for customers to set up their device and they were encouraged to change it afterwards, he said.

Mr Helme said the set-up process for the Nomx was far from easy and at no point was he told to pick a new password.

Late on 27 April, Nomx published a strong defence of its product and disputed the way in which Mr Helme tested the device. Mr Donaldson said Mr Helme’s tests were unrealistic, as they involved actions no typical user would undertake.

Nomx said the threat posed by the attack detailed by Mr Helme was “non-existent for our users”.

Following weeks of correspondence with Mr Helme and the BBC Click Team, he said the firm no longer shipped versions that used the Raspberry Pi.

Instead, he said, future devices would be built around different chips that would also be able to encrypt messages as they travelled.

“The large cloud providers and email providers, like AOL, Yahoo, Gmail, Hotmail – they’ve already been proven that they are under attack millions of times daily,” he said. “Why we invented Nomx was for the security of keeping your data off those large cloud providers.

“To date, no Nomx accounts have been compromised.”

The BBC Click show dedicated to this investigation will air on 29 April on the BBC News Channel and iPlayer, where it will also be available afterwards.

TalkTalk hack attack: Friends admit cyber crime charges

TalkTalk logo - generic imageImage copyright
Getty Images

Image caption

Two Staffordshire men admitted charges after an attack on the TalkTalk website

Two friends have admitted their part in a £42m hack attack on the TalkTalk website.

Matthew Hanley, 22, and Connor Allsopp, 20, admitted charges relating to the massive data breach in October 2015.

The Old Bailey heard Hanley hacked into the telecom giant’s website and shared a customer’s personal and financial details with Allsopp.

The pair, of Tamworth, Staffordshire, were told they would be sentenced in May.

Read more news for Staffordshire

Hanley supplied data for hacking to another man and gave Allsopp the personal and financial details of a TalkTalk customer for the use in fraud.

Allsopp admitted supplying a customer’s details for fraud and as well as files for hacking.

Hanley, of Devonshire Drive, denied other charges of hacking into Nasa, the National Climatic Data Centre and another 23 websites including Spotify, Telstra, the RAC and The Eton Collection which were ordered to lie on file.

Allsopp, of Coronation Street, pleaded guilty at an earlier hearing.

Judge Michael Topolski QC ordered reports for both defendants and adjourned sentencing until 31 May.

Thai man kills baby on Facebook Live then takes own life

The deaths took place at a deserted hotel in PhuketImage copyright

Image caption

The deaths took place at a deserted hotel in Phuket

A Thai man filmed himself killing his baby daughter on Facebook Live, before taking his own life, Thai police say.

The 21-year-old hanged his daughter, and then himself, at a deserted hotel in Phuket on Monday, reportedly after an argument with his wife.

Facebook sent condolences to the family for the “appalling” incident and said that the content had now been removed.

The company pledged a review of its processes after footage of a US killing stayed online for hours this month.

The footage of the Thai killing had also been available on video sharing website YouTube, but the company took it down after the BBC alerted it to its presence.

Social media anger

Relatives of the Thai man, Wuttisan Wongtalay, saw the distressing footage and alerted the police – but the authorities arrived too late to save him and his daughter.

In a statement, a Facebook spokesperson said: “This is an appalling incident and our hearts go out to the family of the victim. There is absolutely no place for content of this kind on Facebook and it has now been removed.”

Read more:

Reuters said two videos were posted, at 16:50 (09:50 GMT) and 16:57 on Monday, and were taken down at about 17:00 on Tuesday, roughly 24 hours later. Facebook has yet to confirm the times to the BBC.

Thailand’s ministry of digital economy said it had contacted Facebook on Tuesday afternoon about removing the videos.

Ministry spokesman Somsak Khaosuwan told Reuters: “We will not be able to press charges against Facebook, because Facebook is the service provider and they acted according to their protocol when we sent our request. They co-operated very well.”

YouTube said it had taken down the video within 15 minutes of being told of its presence by the BBC.

Its statement read: “YouTube has clear policies that outline what’s acceptable to post and we quickly remove videos that break our rules when they’re flagged.”

Shortly before the BBC alerted YouTube, the video was showing 2,351 views.

Media playback is unsupported on your device

Media captionUS ‘Facebook killer’ manhunt – what happened?

Thai social media users reacted with anger to the footage, while offering condolences to the family of the girl, BBC Thai editor Nopporn Wong-Anan says.

Devastated relatives of the child, including the mother, picked up the body of the girl and her father from hospital on Tuesday.

Following the US killing, Facebook said it was “constantly exploring ways that new technologies can help us make sure Facebook is a safe environment”.

“We prioritise reports with serious safety implications for our community, and are working on making that review process go even faster,” blogged one of its executives last week.

Analysis: Leo Kelion, BBC technology desk editor

This latest atrocity comes less than a fortnight after a US man bragged on Facebook Live about his murder of a 74-year-old man in Cleveland, having also posted a video of the killing to the social network.

The platform’s chief, Mark Zuckerberg, subsequently acknowledged he had “a lot of work” to do after it emerged the murder clip had remained online for more than two hours despite Facebook having received complaints in the meantime.

Media playback is unsupported on your device

Media captionMark Zuckerberg commented on the Cleveland killing at a conference last week

Prior to that, Facebook Live broadcast the death of a Chicago man who was shot in the neck and head last June, and then in July a woman streamed the death of her boyfriend after he was shot by police in Minneapolis.

There have also been reports of sexual assaults, animal abuse and teenage suicide having been shown.

For its part, Facebook is trying to find ways for its review team – which employs thousands of people – to react to such content more quickly.

In addition, the firm has developed software to prevent such footage being reshared in full on its service at a later point.

And it is also exploring the use of artificial intelligence to automatically flag videos and photos that need to be reviewed rather than waiting for other users to report them.

What it hasn’t discussed is the idea of scrapping Facebook Live altogether.

With Twitter and YouTube, among others, offering rival live-streaming products, doing so could put it at a disadvantage.

But as a result, there will inevitably be further outrages and criticism because Facebook Live’s popularity makes it all but impossible for the firm to keep a human eye over each broadcast.

YouTube restores ‘wrongly blocked’ LGBT videos

YouTube logo

YouTube has modified its content filter after complaints it had blocked political and lesbian, gay, bisexual and transgender (LGBT) videos.

Restricted mode is an optional filter designed to hide content that may be judged unsuitable for children.

But many prominent LGBT video-makers said their videos had been targeted.

YouTube said it had fixed an error and made more than 12 million “unintentionally filtered” videos available again.

The platform was criticised in March after several video-makers noticed a drop in advertising revenue and realised their content was being blocked in restricted mode.

The wide-reaching filters appeared to block videos referring to sexuality and gender identity, even if the content was not explicit.

“YouTube’s restricted mode has blocked a poem I wrote for a gay friend,” tweeted musician Bry O’Reilly.

Author Tyler Oakley added: “One of my recent videos ‘Eight Black LGBTQ+ Trailblazers Who Inspire Me’ is blocked because of this, I’m perplexed.”

YouTube said it had identified that its systems “were not working as intended”.

“We want to clarify that restricted mode should not filter out content belonging to individuals or groups based on certain attributes like gender, gender identity, political viewpoints, race, religion or sexual orientation,” it said in a blog post.

The company also said it would let people report videos they believed had been unfairly restricted and said it would offer more transparency about the types of content that would be filtered.

It said it would continue to restrict:

  • Discussion of alcohol or drugs, or videos showing alcohol consumption
  • Detailed conversations about sex
  • Music videos with adult themes including sex and drugs
  • Graphic depictions of violence, even in news videos
  • “Mature subjects” such as terrorism, war, crime, and political conflicts
  • “Mature language”

“Though Restricted Mode will never be perfect, we hope to build on our progress so far to continue making our systems more accurate and the overall Restricted Mode experience better over time,” it said.

Three apologises after network problems

Three logoImage copyright

Mobile phone company Three has apologised after some of its customers were unable to make calls or texts.

The company said it had a “temporary network issue” which affected calls and texts during Saturday afternoon and evening.

It said calls had since been restored and that it is working to restore full service.

But some users on Twitter complained of their texts being sent to random numbers instead of their contacts.

A spokeswoman said the company was “currently investigating the cause of the service disruption” and that it apologised for any inconvenience.

It also said that some “customers and non-customers” may have received a message from an unknown sender on Saturday.

In a statement on its website, the company said its advice “is to ignore all text messages that you deem incorrect”.

Three, which has about nine million customers, experienced a data breach last year which saw personal details, including names and addresses, accessed unlawfully.

Sign-up to get news from the BBC in your inbox, each weekday morning

Brain Tumour Charity cautious about Italy mobile phone ruling

man at office window on mobile phoneImage copyright
Getty Images

The Brain Tumour Charity has said there is insufficient scientific evidence linking mobile phone use with brain tumours, following a court ruling.

The Italian court, in Ivrea, agreed that a man’s brain tumour was linked to his mobile phone use.

It awarded Robert Romero 500 euros (£418/$535) a month in compensation.

He had claimed that using his business mobile phone for three or four hours a day, over a period of 15 years, led to the growth of the benign tumour.

The money will be paid by a body established to compensate people for work-based injuries.

There could yet be an appeal against the ruling, and the legal reasoning behind the judge’s decision is not due to be released for at least a few days.

“We know that many people are concerned about a possible connection between mobile phone use and the development of brain tumours,” said Dr David Jenkinson, chief scientific officer for the Brain Tumour Charity.

“However, the global research projects that have been conducted so far, involving hundreds of thousands of people, have found insufficient evidence that using a mobile phone increases the risk of developing a brain tumour.”

The decision of the court did not change the evidence, he added.

“Of course, it is right that researchers continue to explore whether any such link exists,” said Dr Jenkinson.

Mr Romero, whose profession was not reported, said he wanted people to be more aware about mobile phone use but did not want to “demonise” the devices.

His lawyer, Stefano Bertone from the law firm Ambrosio and Commodo, told the BBC his client currently has no plans to sue any of the handset manufacturers or the mobile phone industry itself.

He added that the firm has other cases in other parts of Italy.

“We have also been approached by an interesting number of people in the last 24 hours saying they have experienced the same kind of thing. And they can show they have accumulative use of mobile phones that’s exceeding 1,000 hours,” he said.

“No-one can pretend with definitive certainty to assess a legal case. Most opponents say there is no scientific certainty so therefore it is not true. That is not the case.”

Mr Bertone highlighted a continuing o study by the National Toxicology Program in the US.

Preliminary findings released in 2016 suggested a “low incidence” of brain and heart tumours in male rats exposed to doses of radiofrequency radiation totalling up to nine hours a day over a two-year period.

However, as it is not finished, the study has not yet been scrutinised by other scientists, a process known as peer reviewing, which is generally considered an essential stage of evaluating research.

Computer pioneer Harry Huskey dies aged 101

Pilot Ace computerImage copyright
Courtesy of NPL

Image caption

Designed by Alan Turing, the Ace computer was built with the help of Harry Huskey

Engineer Harry Huskey, who helped build many of the first ever computers, has died aged 101.

Dr Huskey was a key member of the team that built the Electronic Numerical Integrator and Computer (Eniac) which first ran in February 1946.

Eniac is widely considered to be one of the first electronic, general purpose, programmable computers.

Dr Huskey also helped complete work on the Ace – the Automatic Computing Engine – designed by Alan Turing.

Founding father

The Eniac was built at the University of Pennsylvania in the 1940s and, once complete, was more than 100ft (30m) long, weighed 30 tonnes, used 18,000 valves and 1,500 relays. Programming the massive machine to do different computational tasks involved rewiring its various units. Eniac was built to calculate the trajectory of shells for the US army.

Dr Huskey became involved with the development effort to create Eniac soon after joining Pennsylvania to teach mathematics to Naval recruits. His task was to make the punched card reader for the machine work and to write technical manuals describing how to operate it.

After the war, Dr Huskey travelled to the UK to help Alan Turing refine and complete the Ace. This was built at the National Physical Laboratory and in 1950, when it ran its first program, it was the fastest computer in the world.

He also helped design and build two other machines – the Swac (Standards Western Automatic Computer) and the G-15 which, despite weighing almost a tonne. was known as a personal computer because it could be operated by one person.

Dr Huskey spent his entire academic career involved with computing teaching at the University of California, Berkeley and was one of the founders of the computer science faculty at UC Santa Cruz.

“Harry basically lived through and participated in the entire span of the history of electronic computing,” Dag Spicer, a curator at the Computer History Museum, told the New York Times.

Internet pioneer Robert Taylor dies

Bob TaylorImage copyright
Gardner Campbell/Wikipedia

Image caption

Robert Taylor helped bring about the creation of the internet

One of the founding fathers of the internet, Robert Taylor, has died.

While working at the Pentagon in the 1960s, he instigated the creation of Arpanet – a computer network that initially linked together four US research centres, and later evolved into the internet.

At Xerox, he later oversaw the first computer with desktop-inspired icons and a word processor that formed the basis of Microsoft Word.

Mr Taylor died at home aged 85.

His family told the Los Angeles Times that he had suffered from Parkinson’s disease among other ailments.

Image copyright

Image caption

Despite the groundbreaking nature of the Alto computer, only about 2,000 were built

Mr Taylor studied psychology at university, but worked as an engineer at several aircraft companies and Nasa before joining the US Department of Defense’s Advanced Research Project Agency (Arpa) in 1965.

At the time, Arpa funded most of the country’s computer systems research.

In his role as the director of the organisation’s Information Processing Techniques Office, Mr Taylor wanted to address the fact different institutions were duplicating research on the limited number of computer mainframes available.

In particular, he wanted to make “timesharing” more efficient – the simultaneous use of each computer by multiple scientists using different terminals, who could share files and send messages to each other.

Image caption

Arpanet went on to connect dozens of research sites after Mr Taylor left the Pentagon

Mr Taylor was frustrated that the Pentagon could only communicate with three research institutions, whose timeshared computers it helped fund, by using three incompatible systems.

So, he proposed a scheme to connect all of Arpa’s sponsored bases together via a single network.

“I just decided that we were going to build a network that would connect these interactive communities into a larger community in such a way that a user of one community could connect to a distant community as though that user were on his local system,” he later recalled in an interview with the Charles Babbage Institute.

“Most of the people I talked to were not initially enamoured with the idea. I think some of the people saw it initially as an opportunity for someone else to come in and use their [computing cycles].”

Nevertheless, he was given $1m (£796,000) to pursue the project.

And in 1968, a year before Arpanet was established, he co-authored a prescient paper with a colleague.

“In a few years, men will be able to communicate more effectively through a machine than face to face,” it predicted.

“The programmed digital computer… can change the nature and value of communication even more profoundly than did the printing press and the picture tube, for, as we shall show, a well-programmed computer can provide direct access both to informational resources and to the processes for making use of the resources.”

Sugar supplies

Mr Taylor’s time at Arpa was also spent trying to see whether his country could make use of computer technology to solve logistics problems during the Vietnam war.

The White House had complained that it was getting conflicting reports about the number of enemies killed, bullets available and other details.

“The Army had one reporting system; the Navy had another; the Marine Corp had another,” Mr Taylor later recalled.

“It was clear that not all of these reports could be true.

“I think one specific example was that if the amount of sugar reported captured were true we would have cornered two-thirds of the world’s sugar supply, or something like that. It was ridiculous.”

His efforts led to a uniform method of data collection and the use of a computer centre at an air force base to collate it.

“After that the White House got a single report rather than several,” Mr Taylor said.

“That pleased them; whether the data was any more correct or not, I don’t know, but at least it was more consistent.”

Apple and Microsoft

Once Arpanet was up and running in 1969, Mr Taylor left the Pentagon and the following year he founded the Computer Science Laboratory of the Xerox Palo Alto Research Center (Xerox Parc).

Image copyright

Image caption

The Xerox Alto featured the first desktop-inspired graphical interface

There his team built Alto – a personal computer that claims several firsts. It was networked, controlled by a ball-driven mouse and used a graphical user interface (Gui).

Steve Jobs and others from Apple were given an early look, and it went on to inspire them to create the Apple Lisa and later the Apple Mac.

Its software included Bravo – a what-you-see-is-what-you-get word processor. Its primary developer, Charles Simonyi, later joined Microsoft where he created Word.

Despite their achievements, Mr Taylor became frustrated with Xerox’s failure to capitalise on his team’s work and quit in 1983.

“Xerox continued to ignore our work,” he told an interviewer in 2000.

“I got fed up and left, and about 15 people came and joined me at DEC [Digital Equipment Corporation].”

There he helped create AltaVista, an early internet search engine, and a computer language that later evolved into Java.

Mr Taylor continued to dream of new technologies – predicting that the public would one day wear a device that would record everything they saw or heard.

Image copyright

Image caption

Mr Taylor’s team at DEC developed one of the first search engines

But he also reflected that his greatest legacy – the internet – had taken longer to catch on than anticipated.

“My timing was awful,” he conceded, adding “I didn’t anticipate [its use for] pornography and crime.”

Google takes Android search blow in Russia

AndroidImage copyright
Getty Images

Image caption

Google has struck a deal in Russia but is still fighting its case in the EU

Google has promised to allow rivals’ search engines and apps to be pre-installed on phones running its versions of Android in Russia.

The concession follows an out-of-court deal with the country’s competition watchdog.

In addition, Google has promised to develop a tool to make it easy for users to change their device’s default search engine.

Shares in Google’s local Russian rival, Yandex, rose more than 7% on the news.

It brings to an end a long-running battle between the US firm and Russia’s competition regulator, the Federal Antimonopoly Service (FAS).

Google had argued the regulator had no case because manufacturers could develop their own versions of Android or pre-install other apps of their choice.

But the FAS had argued that, despite its denials, Google was indeed “prohibiting” rival software to its own YouTube, Maps and Photos apps to be pre-installed alongside its own dominant version of Android.

The agency became involved after Yandex filed a complaint in February 2015.

Despite the nature of the settlement, Google will still have to pay a 438m rouble ($7.8; £6.2m) fine imposed after it failed to appeal the case last August.

“We are happy to have reached a commercial agreement with Yandex and a settlement with Russia’s competition regulator, the Federal Antimonopoly Service (FAS), resolving the competition case over the distribution of Google apps on Android,” a spokeswoman for Google told the BBC.

Yandex’s chief executive Arkady Volozh declared the settlement “an important day for Russian consumers”.

“I am thankful to the Federal Antimonopoly Service for applying the law in a manner that effectively and efficiently restores competition to the market for the benefit of Russian users, as competition always breeds innovation,” he added.

The EU continues to pursue similar claims against Google, saying the firm is “requiring and incentivising” Android hardware manufacturers to exclusively use its services.

Netflix says opportunity ‘gigantic’ despite slowing growth

Cast of Stranger ThingsImage copyright
Getty Images

Image caption

Netflix’ science fiction-horror series Stranger Things, featuring Winona Ryder (centre) and Millie Bobby Brown (second from right), has been a hit

Netflix has grown slower than it expected in the first three months of the year, but insists that the opportunity for growth is “gigantic”.

The streaming firm added 4.95 million new subscribers in the quarter, fewer than the 5.2 million it had forecast.

In the US, the firm added a third fewer new members than the same period a year ago, while overseas members fell 22%.

Netflix blamed the drop partly on shifting some of its popular shows to the second quarter of the year.

The firm said its House of Cards series, which last year debuted in the first quarter but for this year has been pushed into the second quarter, was the main reason for the lower-than-expected subscriber growth.

Netflix said it still expected to add 8.15 million new members in total for the first half of the year, just below the 8.42 it added in the first half of last year.

By this weekend, the firm said it expected to reach 100 million subscribers globally.

“It’s a good start,” said chief executive Reed Hastings.

Image copyright
Getty Images

Image caption

House of Cards, starring Kevin Spacey, has been pushed into the second quarter this year

He said that the growth of the global internet meant the opportunity for the firm was still “gigantic”, and said the firm planned to continue investing in films and shows aimed at increasing its membership.

“We have come to see these quarterly variances as mostly noise in the long-term growth trend and adoption of internet TV,” he added.

Analysis by Dave Lee, BBC North America technology reporter, San Francisco

As ever, Wall Street is obsessed with user growth above almost any other metric a technology company can offer.

Netflix didn’t add as many new users in the last quarter as investors had been expecting, both in the US and internationally.

Aggressive marketing is still a huge part of Netflix’s expenditure – $1bn expected this year – so it shows those new subscribers really aren’t coming easy.

But I think things will probably improve this year with the roll-out of the new seasons of House of Cards and Stranger Things, both blockbuster shows that represent the very best of their “Originals” brand.

The firm increased revenues by over a third to $2.64bn for the quarter compared to the first three months of last year, while net income rose to $178m from $28m.

Its shares fell in after-hours trading, dropping 3% with investors disappointed by the slower-than-expected growth.

Netflix said it would continue to focus on original programming, aiming to “please diverse tastes with a wide breadth of content”.

The company started making its own shows in 2013, with House of Cards one of its first big hits and Stranger Things more recently. Netflix plans to spend more on original content this year and reduce outlays on licensed material such as movies.

How a family’s dogs were saved from a fiery death

Lisbonne and Hawaii, Bernese Mountain DogsImage copyright
Christophe Deschamps

Image caption

Lisbonne and Hawaii were saved from a house fire thanks to home security tech

Christophe Deschamps was watching a basketball game with his wife and three children when he received an alert on his smartphone.

The home security system told him something was wrong, so he quickly accessed the video feed on his phone.

“I could see smoke,” he says. Their home, in the Wallonia region of southern Belgium, was on fire.

The family’s thoughts immediately turned to their two Bernese Mountain dogs – Lisbonne and Hawaii – locked in the garage. A terrible family tragedy was threatening to unfold.

The video images now showed the smoke getting thicker and brightness coming from flames off-camera.

The fire alarm had already alerted the firefighters, so the Deschamps family rushed home as quickly as they could.

“It was more important for us to save the dogs than the house,” says Christophe. “My wife was crying and panicking, thinking the dogs could die.”

Image copyright
Christophe Deschamps

Image caption

The security camera recorded the progress of the fire in the Deschamps’ home

Fortunately, Lisbonne and Hawaii were saved with just 20cm of air left to breathe above the floor of the smoke-filled garage. But the fire damage to the house took six months to repair.

The dogs’ lucky escape was due to the indoor security camera Christophe had installed.

The smart camera, made by Netatmo, sends alerts when it hears an alarm – whether smoke, carbon monoxide or security – and automatically starts recording.

It is also one of the first smart home cameras featuring face recognition technology capable of distinguishing between people it knows and strangers.

Parents working late can receive alerts when their kids arrive home, for example, and will receive an “unknown face seen” alert if someone breaks in.

The French company says evidence collected by its smart cameras has led to the successful prosecution of burglars.

Image copyright

Image caption

Netatmo’s video camera includes facial recognition capability

The connected home security market is expanding fast, with companies such as Withings, Nest, D-Link, Netgear, Philips, Panasonic – not to mention the tech behemoths Apple, Amazon and Samsung – all offering an expanding array of internet-connected smart gadgets, from thermostats to motion-sensitive cameras with infrared and audio capability.

“We put the connected home security market at 95.4 million unit sales in 2016,” says Francesco Radicati, a technology specialist at consultancy Ovum.

“Service providers, such as Qivicon, AT&T Digital Life, and Vivint Smart Home, are selling device multi-packs including multiple sensors, and these are proving very popular.

“We estimate the market will grow to 744 million devices sold in 2021.”

Innovations are coming on to the market thick and fast.

For example, connected light bulb firm LIFX has produced a version that can beam infrared light outdoors, enabling a compatible security camera, such as the Nest Cam Outdoor, to see better in the dark.

The key innovation, however, has been the integration of the smartphone into such connected networks, giving users remote control wherever they have an internet connection.

Image copyright

Image caption

Google-owned Nest is developing a suite of connected home devices

But aren’t all these security cameras intrusive and even a little voyeuristic?

Netatmo has addressed this issue by making its Welcome camera programmable, so you can disable recording for individuals you specify. And most camera systems can be disabled remotely.

It isn’t just our homes that technology is helping keep safe.

Cars are also a common target for thieves. This is why Matej Persolja, 33, founded CarLock, a company based in Nova Gorica, Slovenia, and San Francisco in the US.

CarLock’s system plugs into a vehicle’s onboard diagnostics port and sends an alarm to your phone if your vehicle is moved, the engine starts, it detects unusual vibration, or if the gadget is disconnected.

Mr Persolja started the business after thinking his car had been stolen. It turned out his car had only been moved to make way for construction work taking place in the area.

Image copyright

Image caption

CarLock can track your car’s position

“Before I learned that, I was almost certain my car had been stolen and I still remember that awful feeling,” he says.

The CarLock system enables owners to track the location of their car if it has been stolen and also acts like a telematics box recording driving behaviour and the general health of the engine.

And there are a growing number of remote control apps for cars on the market.

Viper’s SmartStart app – currently only available in the US and Canada – enables you to start your car, lock and unlock it, and track its movements remotely using your smartphone.

Remote starting is useful for de-icing your car in the mornings while you get ready for work and have breakfast. Even if someone sees the car running and a thief smashes a window to steal it, the physical key is still needed to drive the car off.

You can also keep an eye on your kids’ driving habits and receive an alert if they take the car beyond a geographical point that you specify.

Ford is even integrating Amazon’s Alexa voice-activated software into its cars, enabling drivers to remotely start their cars with a voice command and personal identification number.

Of course, the elephant in the room with all these connected security products is the risk of being hacked. The UK’s National Cyber Security Centre recently demonstrated how a connected doll could be hacked and used to open remote control door locks.

And poorly secured security cameras have been hijacked to carry out web attacks.

How to protect your smart home and all its internet-connected devices will be the subject of a future Technology of Business feature.

  • Follow Technology of Business editor Matthew Wall on Twitter and Facebook

Could digital detectives solve an ancient puzzle?

Someone entering data into a phoneImage copyright
Getty Images

For more than two thousand years people have believed that joint pain could be triggered by bad weather, but the link has never been proven.

But now, by harnessing the power of thousands of volunteers, doctors hope to unravel the mystery. And the new technique could offer countless solutions to a whole host of ailments.

“I’m always in pain, 24/7,” says Becky Mason, sitting at home on her sofa in Alsager near Manchester.

Like millions of people around the world she suffers from pains in her muscles and stiffness in her joints.

“I know, if it’s going to be a very damp cold day, it’s likely that my pain is going to be worse.”

She has discussed it with her GP and has always wondered if there really is a link between her pain and the weather.

Becky isn’t alone. The link between joint pain and bad weather has long been suspected by patients and medical professionals alike and the theory dates back at least to Roman times and possible earlier.

“Is it an old wives tale? Am I imagining it?” she asks.

It’s a question she finally hopes to answer, not by visiting a hospital or undergoing tests, but simply by using her smartphone.

Each day she enters information about how she feels into an app on her phone, the phone’s GPS pinpoints her location, pulls the latest weather information from the internet, and fires a package of data to a team of researchers.

On its own Becky’s data is of limited interest, but she isn’t acting alone. More than 13,000 volunteers have signed up for the same study, sending vast quantities of information into a database – more than four million data points so far.

Image copyright

Image caption

Volunteers using the ‘Cloudy with a chance of pain app’, developed by data capture firm umotif

The app, called “Cloudy with a Chance of Pain” is part of a research project being run by Will Dixon. He is a consultant rheumatologist at Salford Royal Hospital and has spent years researching joint pain.

“At almost every clinic I run, one or more patients will tell me that their joint pains are better or worse because of the weather” he says, but until now he has never had the means of collecting enough data to find a conclusive answer.

Which is perhaps a good point to explain Will Dixon’s other job title – Professor of Digital Epidemiology.

Traditional epidemiologists study health and disease in particular populations. Usually it means collecting data in person – asking patients to visit you, or heading out into the field. ‘Shoe leather epidemiology’, it is sometimes called.

Image copyright
University of Manchester

Image caption

Professor Will Dixon

But digital epidemiology allows patients to send detailed information over the internet – which means they can do it more regularly, and of course you can get many more people to take part, thousands more; numbers that would be unthinkable using the old methods.

By combing through that data, Professor Dixon hopes it will be possible to find correlations and clues that would have been hidden to doctors just a decade ago. His team will analyse the data over the coming year, and hope to find a definitive answer to the question.

World Hacks is a new BBC team looking at global problems.

We meet the people fixing the world.

The technique isn’t just limited to arthritis research.

Another study underway in the US has recruited more than 20,000 participants using an app that asks them to say “ahhhhhhh” into their phone.

Named mPower, and built using technology developed by British academic Max Little, the project hopes to find out more about the onset and progression of Parkinson’s disease. If the “ahhhhhhh” sound is smooth and unbroken, it has likely come from a healthy patient. But if it breaks and wavers, it could suggest that the patient may have Parkinson’s.

By monitoring the precise pattern and pitch of the noise, it may even be possible to determine how advanced the disease has become, or how strongly its symptoms are being felt at a given moment. Using that information, it could allow patients to take much more specific doses of a drug to help manage the disease. The software is even being used in a clinical trial for a new drug.

And again, it is the accumulation of vast amounts of data, volunteered by thousands of participants, that is making the study possible.

Another app, soon to be launched, will allow users to photograph their plate of food, and use artificial intelligence to work out what’s on the plate. The technology could help people determine the nutritional content of their meal, and allow public health bodies to track how well any particular population is eating.

It is being developed by Marcel Salathe, also a Professor of Digital Epidemiology and founder of what is likely the world’s first lab dedicated to the field of study.

Image copyright

Image caption

Marcel Salathe is a professor of digital epidemiology at the Ecole Polytechnique Federale de Lausanne

He thinks the discipline could have particular benefits in parts of the world where basic medical infrastructure is lacking, but lots of people have smart-phones. Digital epidemiology could become the reporting network through which sickness outbreaks are initially detected, he says.

But vast amounts of data don’t come without their own unique set of difficulties, he warns.

“The data can be extremely noisy,” he explains. “Dealing with very large data sets and finding a needle in the haystack is very challenging from a technical perspective.”

Perhaps the most interesting part of this new technique is the motivation of the people donating their data.

‘Cloudy with a Chance of Pain’ may never reap rewards for Becky herself, yet she seems quite happy to spend her time putting her data into a smartphone app and then sending this off to a remote location.

“When you’re in pain all the time, it’s easy to get low,” she says “I’m at home and I can’t work which makes me feel useless. But [with this app] I can still be helpful, and that’s so powerful in my tiny little world, it helps me in a massive way.”

Listen to BBC World Hacks on the World Service or listen back on the iPlayer.

Like, engage and share on Facebook.

Cyber attacks ‘hit one in five UK firms’

Graphic of hand coming through a laptopImage copyright

Image caption

Firms that don’t adopt the appropriate protections leave themselves open to tough penalties, the BCC says

One in five British firms was hit by a cyber attack last year, research suggests.

Larger firms – defined as those with over 100 staff – were more likely to be attacked than smaller counterparts, said the British Chambers of Commerce (BCC), which surveyed 1,200 companies.

Its report found 42% of larger firms had been the victim of a cyber attack, compared with 18% of smaller ones.

The business group has urged companies to do more to protect themselves.

Just a quarter of the firms the BCC surveyed said they had put in place security measures to protect themselves against hacking.

“Cyber attacks risk companies’ finances, confidence and reputation, with victims reporting not only monetary losses, but costs from disruption to their business and productivity.

“Firms need to be proactive about protecting themselves from cyber attacks,” said BCC director-general Adam Marshall.

Bank breach

Household names including Yahoo, eBay and TalkTalk have all fallen victim to major cyber attacks.

Last year, Tesco Bank reported losing £2.5m in an unprecedented breach at a British bank.

The law requires organisations to have appropriate measures in place to keep people’s personal data secure.

Next year data protection regulation will be extended, increasing businesses’ responsibilities to protect personal data.

“Firms that don’t adopt the appropriate protections leave themselves open to tough penalties,” warned Mr Marshall.

Facebook murder suspect Steve Stephens hunted across US

Media playback is unsupported on your device

Media captionThe suspect said he was looking for victims in a video posted on Facebook

A nationwide manhunt is under way in the US for the suspect who shot dead a grandfather on the street apparently at random and posted the footage.

The suspect, Steve Stephens, said in another video post that he had killed 13 people and would kill more.

He shot dead 74-year-old Robert Godwin in Ohio as the victim walked home from Easter lunch on Sunday afternoon.

Facebook has launched a review of its procedures after criticism that the footage stayed on the site for hours.

Justin Osofsky, Facebook’s vice-president of global operations, said the first complaint made about the video showing the killing came nearly two hours after it was posted.

But he added: “We know we need to do better.”

A ‘monster’ who ‘just snapped’

Facebook to review violent content policies

Police have asked residents of Ohio, Indiana, Michigan, New York and Pennsylvania to be on the alert, saying suspect could be anywhere.

Cleveland police department have issued a photo of Mr Stephens, 37, on its website, describing him as a black male, 6ft 1in (1.86m) and 244lb (110kg).

Image copyright

Image caption

Mr Godwin was a grandfather and father of nine

Cleveland Police Chief Calvin Williams told reporters on Monday that Mr Stephens, who has a licence to carry a concealed firearm, is armed “without a doubt”.

Cleveland officials have also offered a $50,000 (£39,805) reward for information that leads to his location.

His mobile phone signal was last tracked on Sunday afternoon in Erie, Pennsylvania.

Cleveland Police Chief Calvin Williams said in a press conference on Monday morning: “Steve is still out there some place… we’re still asking Steve to turn himself in, but if he doesn’t we’ll find him.”

FBI Special Agent Stephen Anthony said: “Quite frankly, he could be in a lot of places.”

Image copyright

Image caption

Steve Stephens claimed to have killed more than a dozen others

US Marshall Peter Elliot said law enforcement agencies across the US were helping create a dragnet to “make this individual’s world very, very, very small”.

Investigators said Mr Stephens’ boast about other killings was still not verified.

Police say the victim in Sunday’s graphic video appeared to have been selected at random.

The suspect approaches Mr Godwin and asks him to say the name of a woman believed to be the gunman’s former girlfriend, before shooting him in the head.

Image copyright

Image caption

Mr Godwin appears to attempt to shield himself with a plastic bag

“Can you do me a favour?” asks the gunman. “Can you say Joy Lane?”

The victim says: “Joy Lane.”

Image copyright
Cleveland Police

Image caption

Police issued a photo of the suspect

Mr Stephen says: “Yeah, she’s the reason why all this about to happen to you. How old are you?”

The grandfather and father of nine appears to try to shield himself by holding up a plastic bag.

The woman, Joy Lane, confirmed to CBS News that she and Mr Stephen had been in a “relationship for several years”.

“I am sorry that all of this has happened. My heart & prayers goes out to the family members of the victim(s). Steve really is a nice guy… he is generous with everyone he knows.

“He was kind and loving to me and my children,” she wrote in a text message.

Image copyright

Image caption

Police believe the suspect’s car may have been newly purchased

Maggie Green, the suspect’s mother, told CNN that he was “mad with his girlfriend. That’s why he is shooting people and he won’t stop until his mother or girlfriend tell him to stop.”

Mr Stephens is employed by Beech Brook, a children’s behavioural health agency, according to a company spokesman.

Sign-up to get news from the BBC in your inbox, each weekday morning

Remote St Kilda islands recreated in Minecraft

St Kilda in MinecraftImage copyright

Image caption

The digital version of St Kilda has been created to help mark World Heritage Day

Scotland’s remote St Kilda archipelago has been digitally recreated in video game Minecraft.

Games company ImmersiveMinds spent more than 125 hours and used more than three million virtual bricks on the 1:1 scale map of the islands.

St Kilda lies about 40 miles (64km) west of North Uist, the nearest inhabited place to the archipelago.

The last islanders left the main island of Hirta in 1930 after life there became unsustainable.

People only now live on Hirta on a temporary basis to work at the military site, or on wildlife conservation projects.

The Minecraft version of St Kilda has been made to help mark Tuesday’s World Heritage Day.

Image copyright

Image caption

Minecraft involves building structures using virtual bricks

The map is available for public download to allow gamers all over the world to explore the archipelago’s history, heritage, stories, people and landscapes.

Nick Smith, heritage manager at Western Isles’ local authority Comhairle nan Eilean Siar, said: “This is a really exciting way to use technology so that people can discover a remote and difficult to access place.”

The team from ImmersiveMinds worked closely with Jonathan Wordsworth, the St Kilda archaeologist with The National Trust for Scotland, to ensure that this digital world is as accurate as possible.

The virtual build features abandoned blackhouses, boats and underground structures called souterrains.

Find My iPhone crowd catches Coachella festival ‘thief’

Recovered iPhonesImage copyright
Indio Police

Image caption

More than 100 iPhones were discovered after the search

More than 100 iPhones have been found in a single backpack after people at the Coachella music festival in California tracked their missing handsets, local police have said.

Revellers had used the Find My iPhone app, which shows the location of a linked phone on laptops or other devices, Indio Police said.

And a suspect had then been “followed” through the site and detained.

Several phones had been returned immediately, the police added.


And the rest had been handed to lost property at the festival site.

Police had already dedicated extra resources to the festival after “chatter on social media” about missing iPhones, Sgt Dan Marshall told tech news site Gizmodo.

But “in this case, the fans came through”.

Festival-goers have been advised to:

  • keep valuables in front rather than back pockets
  • ensure all valuables are not kept together
  • carry a dummy wallet to fool thieves

iRobot sues Hoover and Black & Decker over robo-vacuums

Roomba vacuumImage copyright

Image caption

iRobot says several of the patented technologies used in its Roomba range have been copied without permission

Robotic vacuums specialist iRobot is suing Hoover and Black & Decker among others over claims they used its technologies without permission.

The Massachusetts-based company cites a variety of patents in its legal filings, including misuse of its obstacle-detection system, brush designs and navigation controls.

It is seeking financial compensation and the right to block further use of its tech.

Most of the firms have yet to respond.

iRobot began selling robot vacuums under the Roomba brand in 2002 and says it has sold more than 15 million units to date.

“The filing of this litigation signals our commitment to protecting our investments,” a spokesman said.

“iRobot will not stand by while others offer products that infringe on our intellectual property.”

Hoover launched its first robo-vacuum – the Quest 1000 – last year, while Black & Decker only unveiled its Smartech robot range at the CES trade show in January, and has yet to put them on sale.

Image copyright

Image caption

Hoover is a relatively new player in the robotic vacuum market

Others being sued include:

  • Shenzhen Silver Star Intelligent Technology – a Chinese firm that manufactures the robot vacuums sold by Hoover and Black & Decker
  • Bobsweep – a Canadian robot vacuum-maker
  • Bissell Homecare – a US vacuum cleaner and carpet products firm
  • Suzhou Real power – a Chinese company that makes replacement parts for Hoover

“We find it interesting that in face of falling behind technologically, and losing market share year over year, the last strategy [iRobot] resorted to was steering the competition away from branding, tech innovation, and customer satisfaction, and directing it towards courts, intimidation and litigation,” said Bobsweep in a statement.

“Not only will we defend Bobi and win, but we will continue to take the lead from those who try to compensate for their stagnation with a legal spree.”

This is not the first time iRobot has gone to the courts over an intellectual property dispute.

Image copyright
Black & Decker

Image caption

Black & Decker’s robot vacuums are due to go on sale in June

It sued four German companies over related claims in 2013.

Prior to that it sued Robotic FX over allegations the military robotic specialist had stolen trade secrets, which led the Chicago-based company to dissolve in 2007.

E-sports to become a medal event in 2022 Asian Games

Gamers taking part in esports competitionImage copyright
Yuya Shino/Getty Images

E-sports will be included in the official sporting programme of the 2022 Asian Games in Hangzhou, China.

The Olympic Council of Asia (OCA) said it wanted to reflect “the rapid development and popularity of this new form of sports participation”.

Competitive video gaming will also feature as a demonstration sport in the 2018 Asian Games in Jakarta, Indonesia.

And it will first appear in this year’s Asian Indoor and Martial Arts Games (AIMAG) in Turkmenistan.

Alongside Fifa 2017, gamers at AIMAG can expect to compete in MOBA (multiplayer online battle arena) and RTA (real time attack) games.

The move is the result of a partnership between Alisports, the sports wing of e-commerce giant Alibaba, and the Olympic Council of Asia (OCA).

Prize money

E-sports generated $493m (£400m) in revenue in 2016, with a global audience of about 320 million people.

Revenue is predicted to rise to $696m (£553m) in 2017, with 15% of that coming from China alone, according to e-sport analysts Newzoo.

Tournaments staged in front of live audiences attract tens of thousands of fans, but online they are watched by tens of millions of viewers.

In 2014, more than 40,000 people attended the League of Legends World Championship finals when they were held in Seoul, with about 27 million unique viewers watching online.

By 2016, the tournament attracted a record 43 million unique online viewers. The winning team shared $2.7m (£2.1m) in prize money.

In the same year the International, an e-sports tournament dedicated to the MOBA game Dota 2, had a final prize fund of more than $20m (£15.6m).

The victors, the Wings Gaming team from China, won more than $9.1m (£7.1m).

Mega-constellation satellites will need ‘rapid disposal’

Space debrisImage copyright

Image caption

Artwork: The aim is to avoid certain orbits from becoming unusable in the future

The operators of proposed satellite mega-constellations can greatly mitigate the risk of future collisions by rapidly de-orbiting their spacecraft at the end of service.

On the other hand, doing only the bare minimum required by international “clean space” guidelines could significantly endanger the environment.

This is the take-home from a new study led from Southampton University, UK.

It urges operators to dispose of old satellites within five years.

At the moment, best practice just calls for redundant hardware to come out of the sky within 25 years.

There is increasing concern about the growth in space debris, or junk.

Sixty years of orbital activity have littered the sky with millions of objects, ranging in size from flecks of paint to old rocket stages. These now pose a threat to current and future missions, particularly as the skies are set to get even busier.

‘Better than best’

A number of companies, including OneWeb, Boeing, SpaceX and Samsung, are developing projects to launch thousands of satellites to deliver broadband and other telecoms services across the entire globe.

New high-volume spacecraft manufacturing techniques and lower rocket prices are set to transform this business sector.

Operators are expected to start deploying their constellations from next year, to altitudes just above 1,000km.

In their modelling study, Southampton’s Dr Hugh Lewis and colleagues put a “synthetic”, or representative, 1,000-satellite constellation into the current orbital climate, and then simulated the possible outcomes over the next 200 years.

The study showed that even with high compliance to current “rules”, the number of catastrophic collisions over the period could increase by about 50% if old practices are maintained.

Dr Lewis told BBC News: “What we found was that when you put the constellation satellites on to a disposal orbit, they intersect with objects below them. And if they take 25 years to pass through those lower altitudes, there is a good chance that they will have collisions with objects in the background population on the way down. But by reducing the 25 years to five years, you greatly minimise the chances of those interactions taking place.”

Image copyright

Image caption

Last year, the Sentinel-1a radar satellite was struck by a small object

The likes of OneWeb has promised robust end-of-life clean-up of its spacecraft, adhering to the five-year suggestion, and aiming for no more than two years.

OneWeb goes further by wanting to incorporate more fuel in its satellites for manoeuvring, and a grapple fixture on all platforms to enable forced removal by a servicing vehicle if normal de-orbiting were to fail for some reason.

Airbus Defence and Space, which is making the spacecraft for the OneWeb constellation, was part of the Southampton-led study.

Dr Lewis pointed to additional factors that would benefit the environment.

These included making spacecraft smaller and lighter so that if they are involved in an impact, it will be a lower energy event that produces fewer fragments.

Another key factor would be to ensure high reliability in the spacecraft by designing in multiple redundant systems.

The best outcome calls for at least 95% of satellites to execute their disposal successfully. This will not happen if the satellites are prone to fail in orbit.

“If we have a 95% success rate in post-mission disposal, and the lifetimes of these disposal orbits are very short, then we end up with about 40-45 catastrophic collisions (over 200 years in the general satellite population),” he explained.

“In the ‘reference population’ (ie without a mega constellation), we get 37-38 catastrophic collisions. So, you can see how we can bring things back in terms of the impacts on the environment. But even at 85% compliance with post-mission disposal, we almost double the number of catastrophic collisions, we double the number of objects we see in the environment.”

Runaway situation

The Southampton study was funded by the European Space Agency (Esa) and is being presented this week at the 7th European Conference on Space Debris in Darmstadt, Germany.

Dr Holger Krag, who heads the Space Debris Office at Esa, said the mega-constellation proposals now coming from satellite operators had to improve on the industry’s past performance.

“Spacefarers of today already fail to implement mitigation measures to a sufficient level,” he told the conference. “My office regularly monitors space surveillance data in order to form statistics on how well we behave globally. One example is for post-mission disposal to remove spacecraft (from low-Earth orbit) in order to avoid long-term presence in space after the mission. Forty percent of all missions fail to implement this today.”

In 1978, Dr Don Kessler, then a US space agency (Nasa) scientist, postulated a scenario in which collisions could eventually lead to a cascade of debris that made certain orbits inoperable.

At the Darmstadt conference, he reported on new research that revealed more than 10% of satellites in a sizeable sample had experienced sudden, unexpected momentum changes.

These, Dr Kessler said, were likely caused by the impacts of small particles – of the kind that hit the solar array of Europe’s Sentinel-1A radar satellite last year.

Image copyright

Image caption

Artwork: Technologies are being developed to actively remove failed satellites

and follow me on Twitter: @BBCAmos

Google Earth adds Attenborough world tours

The BBC’s Sir David Attenborough will show people “natural treasures” within the new Google Earth.

Google has refreshed its Earth app and website, adding detailed 3D imagery and new “tours” that give people a guided look at exotic locations.

The search giant said it had spent two years developing the new version of the app, which features video content from the BBC and other partners.

3D modelling helps new V&A Dundee to take shape

Advances in technology are enabling the new V&A Dundee to take shape.

Advances in technology have enabled the new V&A design museum to take shape on Dundee’s waterfront.

The building’s curves mean none of its walls are completely flat.

A 3D model controls every aspect of the project, helping engineers envisage how the structure will twist and turn while supporting itself.

BBC Scotland’s science correspondent Kenneth Macdonald has been taking a closer look at how it works.

‘WhatsApp child sex images’ led to arrests

WhatsApp app iconImage copyright
Getty Images

Image caption

WhatsApp, which is owned by Facebook, has said that child exploitation “has no place” on the app

A network apparently using WhatsApp to distribute images of child sexual exploitation has been disrupted by dozens of arrests, according to police.

A total of 39 suspects were apprehended in Europe and South America, following action by the Spanish National Police, Europol and Interpol.

Spanish investigators discovered dark web sites directing users to private WhatsApp groups last year.

Researchers then verified these groups were used to share illegal images.

House searches conducted during the arrests had led to the seizure of “hundreds of devices containing several terabytes of child sexual exploitation material”, according to Europol.

Spanish police have added that this included more than 360,000 files.

International operation

Operation Tantalio involved co-ordinated action in Germany, Spain and Portugal as well as several South American countries including Argentina, Chile and Ecuador.

Interpol has said that “hundreds” of the images and videos discovered have been entered into its international child sexual exploitation (ICSE) database.

It allows investigators to compare such material and make connections between victims, abusers and locations by “analysing the digital, visual and audio content”.

Efforts are now being made by police to identify any child victims.

“These offenders are pushing the boundaries of modern technologies to try to avoid being caught by law enforcement,” said Rob Wainwright, director of Europol.

“This case is an excellent example of global law enforcement cooperation, led by the Spanish National Police.

“We need to continue to combine our joint resources and skills to tackle this threat to our children and bring these offenders to justice.”

A spokesperson for WhatsApp, which is owned by Facebook, said: “Child exploitation has no place on WhatsApp.

“When we’re made aware of these accounts, we investigate, disable users that violate our terms, and assist with law enforcement as they track down and prosecute criminals.”

Snapchat’s new 3D filters will blow your mind, probably

Snapchat has launched new 3D lenses, allowing users to change the world around them in three dimensions.

The new feature lets you interact with what you see on screen. You can write giant words that float about next to real objects – or plant a virtual rose in the ground.

The update is now live and it’s expected Snapchat will release new “experiences” daily.

It’s the latest in the battle for our attention from the social media giants.

Instagram and Facebook have recently added features similar to Snapchat Stories.

We tried out the new lenses for this exclusive behind-the-scenes tour of the Newsbeat office…

How to do it

When you are snapping with the rear-facing camera, just tap the camera screen to find the new lenses.

Swipe up and down the screen to move an object closer or further away.

Press and hold an object to pick it up and move it somewhere else.

Tap somewhere on screen (other than object) to place object in that new location in a real-world space.

On your first try, there are 3D hand animations that guide you on how to move an object, and how to load a new object.

To keep the experiences fresh, the 3D lenses will change over time, and offer different interactions.

Find us on Instagram at BBCNewsbeat and follow us on Snapchat, search for bbc_newsbeat

Zuckerberg addresses ‘Facebook killing’ – BBC News

Media playback is unsupported on your device

Media captionWATCH: ‘Our hearts go out to the family’

Facebook’s chief has paid his respects to the family of a man whose killing was filmed and posted onto its site.

“Our hearts go out to the family and friends of Robert Godwin Sr,” said Mark Zuckerberg near the start of Facebook’s annual F8 developers conference.

His social network had been criticised over the amount of time it had taken to take the clip offline.

About an hour before the event got underway, police had revealed that the murder suspect had killed himself.

Steve Stephens had been the subject of a national manhunt.

He was believed to have uploaded a video to Facebook showing his killing of 74-year-old Mr Godwin in Cleveland on Sunday and then boasting on subsequent Facebook Live streams that he had killed others.

Facebook subsequently acknowledged it had taken it more than two hours to remove the clips after the first video was posted, despite it having received complaints in the interim.

“We have a lot of work and we will keep doing all we can to prevent tragedies like this from happening,” added Mr Zuckerberg.

What was reported when

11:09AM PDT (19:09 GMT) – first video, of intent to murder, uploaded. Not reported to Facebook.

11:11AM PDT – second video, of shooting, uploaded.

11:22AM PDT – suspect confesses to murder while using Live, is live for 5 minutes.

11:27AM PDT – Live ends, and Live video is first reported shortly after.

12:59PM PDT – video of shooting is first reported.

1:22PM PDT – suspect’s account disabled; all videos no longer visible to public.

Cleveland’s police chief had referred to Facebook’s role in a separate press conference.

“I think the people on social media kind of know the power and I think they know the harm it can do,” said Calvin Williams.

“We’ve talked before about people not living their lives on social media and being truthful on social media and not harming people via social media.

“And this is a prime example, this is something that should not have been shared around the world. Period.”

Media playback is unsupported on your device

Media captionThe suspect said he was looking for victims in a video posted on Facebook

One analyst attending F8 said it was no surprise Mr Zuckerberg had felt compelled to discuss the matter.

“Obviously this is something they have to get on top of with some urgency, but it’s an extraordinarily difficult problem,” commented Geoff Blaber from the CCS Insight tech consultancy.

“What Facebook has at its disposal is a enormous amount of talent and a very big emphasis on artificial intelligence, and I think that will be how it deals with this in the long-term.

“AI holds the key to shortening the time required to flag and remove offensive and inappropriate material amidst the endless growth of user content.”

Augmented reality future

Mr Zuckerberg went on to introduce new plans to include augmented reality experiences in Facebook apps, such as Messenger.

He suggested that, in the near future, it would be far more common to place digital objects in video and live streams viewed on mobile phones.

Media playback is unsupported on your device

Media captionWATCH: Mark Zuckerberg shows how animated art can be superimposed over real-world views

Animated artworks could be made visible at a particular physical location, for example, via the camera view of an app.

“Augmented reality is going to help us mix the digital and physical in all new ways,” he said.

“That’s going to help us make our physical reality better.”

3D filters that can be placed into real-life scenes, not unlike those unveiled by rival Snapchat, were also demoed.

Image copyright

Image caption

Users will be able to take part in virtual reality calls via their smartphones

“Facebook will need to tread a careful path as it rolls out its new augmented reality capabilities,” commented Mr Blaber.

“When used responsibly they can deliver extremely compelling experiences but it only takes a few creepy use cases to emerge and it could derail the whole project.”

New virtual reality experiences making use of the Oculus Rift headset were also detailed, including:

  • Facebook Spaces – where friends can hang out together in VR
  • avatars that are intelligently customised to suit users, based on their Facebook profile pictures
  • the ability to “call in” to Facebook Spaces with Messenger video calls if users do not have a VR headset

Bot discovery

Facebook also announced improvements to its Messenger platform to encourage the use of bots – a facility first unveiled last year.

The software tools can be deployed by businesses to interact with customers in an automated manner, potentially allowing them to employ fewer call centre staff.

The firm said 100,000 bots had been developed for Messenger to date.

Image copyright

Image caption

Facebook has added a “discover” page to help users find bots for its Messenger program

The changes include:

  • the ability for users to add a business’ bot to a group chat, so several people can interact with it at once
  • support for QR codes, which can be displayed at events and be photographed by phones to activate associated bots that can answer questions about what is on show
  • the introduction of a “discover” tab to Messenger’s home screen, which shows recently used bots and ones that are currently popular with others

Messenger has also added the ability to include Spotify extensions, allowing music to be shared and played within chats, and said Apple Music would also be supported shortly.

Baidu to share self-drive car technology

Baidu has been developing an artificial intelligence system to help its driverless cars navigateImage copyright

Image caption

Baidu has been developing an artificial intelligence system to help its driverless cars navigate

Chinese internet giant Baidu has said it will share much of the technology it has created for its self-driving cars.

The firm predicted that the move would help drive the development of autonomous vehicles.

Called Apollo, the project will make a range of software, hardware and data services available to others, especially carmakers.

Other firms in the sector, such as Tesla and Google, have tended to keep key developments secret.

‘Greater innovation’

Baidu, often described as China’s Google, has been developing self-drive vehicles since 2015.

Making the announcement ahead of the Shanghai Auto Show, it said technologies for use in restricted test environments would be available as soon July.

There will then be a gradual roll-out of other technology, with an aim to offer its full range of developments to support self-driving for highways and city roads by 2020.

In a statement, Baidu’s group president Qi Lu said it wanted to create a “collaborative ecosystem” using its strengths in artificial intelligence (AI) to “encourage greater innovation and opportunities, making better use of our technology to drive the evolution of the entire industry”.

What’s in it for Baidu?

This move could be likened to Google’s decision to release Android, the free operating system for smartphones, says James Chao of IHS Markit.

Even though it was free to use, it became a success for Google because it drives users to the company’s various mobile apps and services.

By becoming the supplier of the “brains” for more cars than just the ones it makes itself, there are clear benefits. One is potential revenue from carmakers in the long term.

And what is also crucial to the development of self-driving vehicles is data. The more cars using its technology, the more data it should be able to harvest.

“It really sounds like they want to treat this like a smartphone platform,” Mr Chao said. “The holy grail for software in cars is to become the Android or iOS that everyone is using, and this is their strategy to do that.”

Who is likely to want to use this tech?

Baidu’s statement alludes to opportunities in the US, but also in its home market.

“China is the world’s largest market for automotive sales and production. It has many car brands and an open environment that is ripe for collaboration,” group president Qi Lu said.

Analyst Mr Chao agrees. “I can think of at least 20 Chinese carmakers who would be perfect candidates,” he told the BBC.

“They don’t have huge research budgets or the resources to figure out how to make self-driving vehicles themselves.

“These are firms that tend to rely on suppliers so they can build a car and so this fits in perfectly for them.”

He said this could mean that Baidu’s technology will be used in millions of cars on China’s roads by 2020.

However, bigger international carmakers who are already working on autonomous vehicles are unlikely to follow suit.

How advanced is Baidu’s driverless car technology?

Motivated by the widespread pollution problems, Beijing has pushed for more electric vehicles and Chinese carmakers have responded significantly.

And in the race for driverless car technology, Chinese companies are taking big strides. Along with Changan and Geely, Baidu is one of the big players, with AI research being done in both China and Silicon Valley.

But it is not clear how the software and hardware Baidu has developed compares with that of its rivals. Some analysts say it has done less testing, and therefore has less data to work with, than Google and Tesla.

Malaysia Airlines to track planes with satellites

A file picture dated 17 July 2016 shows a passenger walking past a Malaysia Airlines aircraft within a viewing gallery of the Kuala Lumpur International Airport (KLIA) in Sepang, outside Kuala Lumpur, Malaysia.Image copyright

Malaysia Airlines has become the first carrier to sign up to a new satellite flight tracking system for its fleet.

It comes three years after its MH370 flight bound for Beijing disappeared with 239 people on board.

Using a soon-to-be-launched satellite network, the airline will be able to monitor its planes in areas where there is currently no surveillance.

They include polar regions and remote areas of oceans not covered by existing systems.

Path change

The airline reached a deal for the service provided by US-based Aireon, FlightAware and SITAONAIR.

The new system can also provide more regular updates on a plane’s location, especially when travelling over oceans and other remote areas, said SITAONAIR’s portfolio director Paul Gibson.

Aircrafts deviating from a flight path could be identified more quickly as a result, he said.

“With access to up-to-the-minute reporting, Malaysia Airlines will know the location, heading, speed and altitude of all aircraft in its fleet, at all times, and be alerted to any exceptions.”

But it is unclear if the additional tracking ability would have had any impact on the MH370 disappearance.

All tracking systems monitor a plane’s location using its on-board transmitter. When the Kuala Lumpur-Beijing flight vanished in March 2014, the transmitter signal was lost, with some suspicions it was done deliberately.

Customer confidence

Most flights currently transmit their position using signals tracked from both the ground and space.

The new service, available in 2018, will add to that coverage, using the Iridium NEXT satellite constellation which was launched earlier this year.

The fate of MH370 remains one of the world’s greatest aviation mystery. More than 120,000 sq km (46,300 miles) of the Indian Ocean has been searched with no sign of the aircraft.

Some pieces of debris have been found on African islands including Madagascar.

The deep-water search for the flight was called off earlier this year.

Malaysian Airlines has been trying to win back customers’ confidence, by offering travel discounts and flight promotions.

The carrier’s chief operating officer, Izham Ismail, said the firm was “proud” to be the first airline to sign up for the system.

‘Nearly half’ of firms had a cyber-attack or breach

Digital padlockImage copyright
Getty Images

Nearly half (46%) of British businesses discovered at least one cybersecurity breach or attack in the past year, a government survey has indicated.

That proportion rose to two-thirds among medium and large companies.

Most often, these breaches involved fraudulent emails being sent to staff or security issues relating to viruses, spyware or malware.

The survey was completed by 1,500 UK businesses and included 30 in-depth interviews.

The government said a “sizeable proportion” of the businesses still did not have “basic protections” in place.

While many had enacted rudimentary technical controls, only one-third had a formal policy covering cybersecurity risks.

Less than a third (29%) had assigned a specific board member to be responsible for cybersecurity.

‘Box-ticking exercises’

Businesses’ susceptibility to cyber-attacks was a known issue, noted Prof Andrew Martin at the University of Oxford.

“A lot of businesses have responded to the problem with a box-ticking exercise or by paying an expensive consultant to make them feel better – it’s far from clear that what people are doing is protecting them very well,” he told the BBC.

He added it remained difficult for most people to distinguish malicious emails or websites from safe ones.

“It’s all very well to say don’t open emails from an unknown source – but most of us couldn’t do business if [we] didn’t do that,” he added.

The government’s survey indicates, however, that fewer businesses in 2017 consider cybersecurity to be of “very low priority”. It said 74% now agreed it was a high priority issue for senior management.

Image copyright
Getty Images

Image caption

One construction firm received more thousands of phishing emails a month

The report also highlighted some unusual cybersecurity cases.

It said a large materials supplier for the construction industry faced “significant and ongoing” attacks, despite not having any e-commerce activities of its own.

“This included over 3,000 phishing emails a month and various ransomware attacks,” the report noted.

Phishing is a form of cyber-attack in which emails with malicious links or attachments are disguised as genuine.

The most damaging case of ransomware at the firm in question caused its IT team to lose “around two weeks” of productivity.

Since then, the business has reviewed its cybersecurity policies.

Holiday Inn hotels hit by card payment system hack

Holiday Inn front deskImage copyright
Getty Images

Image caption

The malware could hijack credit card details when front desk payments were made

The owner of the Holiday Inn and Crowne Plaza hotel brands has disclosed that payment card-stealing malware has struck about 1,200 of its franchisees’ properties.

UK-based Intercontinental Hotels Group (IHG) said all but one of the locations affected were in the US, with the other being in Puerto Rico.

Guests have been warned they could have had money stolen as a consequence.

One expert said there might be further hotels affected.

Buckinghamshire-based IHG had previously reported in February that a dozen US hotels that it managed itself had been affected by the same attack.

“Individuals should closely monitor their payment card account statements,” a spokeswoman told the BBC following the latest discovery.

“If there are unauthorised charges, individuals should immediately notify their bank.

“Payment card network rules generally state that cardholders are not responsible for such charges.”

Other affected brands include Hotel Indigo and Candlewood Suites.

Hijacked card data

IHG said an investigation had detected signs the malware had been active at front-desk payment locations at the hotels between 29 September and 29 December 2016.

However, it only has confirmation that the threat was definitely eradicated last month.

The attack hijacked information taken from the payment cards’ magnetic strips as it was being routed through the hotels’ computer servers, said the hotel group.

This could include the card number, expiration date and verification code.

IHG does not believe other guest information was stolen.

It has published a tool for visitors to check if hotels they stayed at are among those affected.

Image copyright

Image caption

The Candlewood Suites hotel at New York’s Times Square was one hotel affected

The firm notes that other franchisees that had adopted an encryption-based security measure would not have been affected.

But one cybersecurity expert said that the list might not be comprehensive.

“IHG has been offering its franchised properties a free examination by an outside computer forensic team,” wrote Brian Krebs.

“But not all property owners have been anxious to take the company up on that offer.

“As a consequence, there may be more breached hotel locations yet to be added to the state look-up tool.”

Other hotel chains to have been struck by payment system hacks in recent years include Hyatt, Mandarin Oriental and Trump Hotels.

The US has been slower to switch to a chip-and-pin system than many other countries, which makes it more difficult to carry out such attacks.

Ultrasonic clothes dryer ‘halves drying time’

Prototype ultrasonic clothes dryerImage copyright
US Department of Energy

A tumble dryer that is claimed to dry clothes twice as fast has been developed in the US.

The machine uses high-frequency sound waves instead of heat to dry laundry.

As well as speeding up the drying process, it is expected to use up to 70% less energy than conventional dryers.

The dryer has been developed by scientists at Oak Ridge National Laboratory, Tennessee, in partnership with General Electric.

Shaken dry

The inner lining of the drum of the machine is fitted with small sheets that convert an electric signal into vibrations.

These are at a high enough frequency that they can shake the water out of clothes, in the form of a cold mist.

The water is driven into the outer part of the drum, where it flows down to a collection tank.

According to the US Department of Energy, which supported the project, standard clothes dryers take an average of 50 minutes to dry a medium-sized load.

The prototype model can dry the same amount of laundry in about 20 minutes.

Lack of lint

The research has been driven in part by the fact that the basic technology used in clothes dryers – heating the air to evaporate water out of clothes – has not changed in decades.

“We have seen breakthroughs like injecting bubbles into washing machines to wash the clothes more effectively,” commented Jane Westgarth, a senior analyst at Mintel.

Another advantage of the ultrasonic technology is that it appears to generate far less lint.

Most of the lint created in conventional tumble dryers is the result of tiny fibres being dislodged from clothes by the hot air stream.

As well as causing extra wear on the fabric, the heat can fade clothes over time.

Apple settles patent case at last minute

iPhonesImage copyright
Getty Images

Image caption

Unwired Planet had been seeking a cut of iPhone and iPad sales

Apple has settled a patent dispute with a litigant that had already beaten Huawei and Samsung in court.

The jury for the latest case had been selected but a deal was done in the early hours of the day the US trial was to begin, according to news site Ars Technica.

Unwired Planet had sought $33m (£25.7m) and a cut of iPhone and iPad sales, which it said made use of its tech.

The terms of the settlement have not been made public.

Apple had previously described the case – involving voice recognition and data transmission inventions – as being “frivolous”.

Nevada-based Unwired used to develop mobile software, when it was known as Openwave Systems, but no longer makes products of its own.

It acquired the rights to the inventions involved in the case from Ericsson in a controversial deal. Rather than purchase the technologies outright, Unwired instead agreed to share future revenues generated from the patents with the Swedish telecoms equipment-maker.

That has led some to describe Unwired as a “patent troll” – although the firm’s legal team described the term as “hackneyed”.

“Our ambition is to bring efficiency and fairness to patent licensing and create a marketplace where product manufacturers and innovators feel confident that high quality technology is available at a fair and reasonable price,” a spokeswoman for PanOptis Patent Management, which recently bought Unwired’s licensing business, told the BBC.

“Over the past nine months since we acquired the Unwired Planet patent portfolio, we have actively resolved a majority of the existing litigation that had been initiated by Unwired Planet, including suits involving Samsung, LG and Apple.”

Earlier this month, the firm scored a court victory over Huawei in London.

The Chinese company was ordered to pay a global fee for use of Unwired’s 4G patents or face a UK sales ban.

Unwired previously won a case against Samsung involving 2G technologies.

It is also involved in disputes with Google and HTC.

TalkTalk and BT rated worst for broadband in Which? survey

Broadband cabinetImage copyright

TalkTalk and BT have received the worst customer satisfaction scores in a survey of 12 broadband providers.

They scored 38% and 45% respectively with their customers, while Sky (48%) and EE (49%) came close behind them in the Which? survey of 1,800 people.

Frequent price rises, connections that drop, unreliable speeds and “woeful” customer service all contributed to the scores, the consumer group said.

The four account for almost three-quarters of the UK broadband market.

BT alone accounts for almost a third of the country’s broadband connections.

Five stars?

Zen Internet had the highest customer rating at 86% in the survey, followed by Utility Warehouse (81%), John Lewis Broadband (68%), SSE (66%) and Plusnet (65%)

Virgin Media (52%), Vodafone (50%) and the Post Office (48%) were also included.

Which? surveyed people about their broadband in November and December. The customer score is based on satisfaction levels with their provider and whether they would recommend it to others.

Those surveyed were also asked to evaluate aspects of the service, with five stars being the highest rating in seven categories, including speed, reliability and customer service.

BT scored just two stars in all seven categories, while TalkTalk also scored two stars in each except value for money, for which it got three stars.

Just four of the 12 providers scored more than three stars for speed: Zen Internet, Utility Warehouse, Virgin Media and Vodafone.

‘Long way to go’

Alex Neill, Which? managing director of home services, said: “The big players still have a long way to go to satisfy their customers, so if you’re unhappy with your broadband, complain and look to switch if your service doesn’t improve.”

A BT spokesperson said it was disappointed with the survey result and apologised to any customers who had been let down.

“Generally, our broadband performs extremely well for customers and offers very reliable speeds at peak times, according to the latest Ofcom broadband speeds report.”

A TalkTalk spokesperson said: “Our extensive improvement programme has already led to fewer faults, faster average speeds, shorter times to resolve issues and customers reporting higher satisfaction levels.”

Image copyright

Ofcom, the telecoms regulator, said last month that broadband customers who suffered poor service may get automatic refunds under new plans.

Its own survey suggested that 51% of broadband customers were “very satisfied” with their provider, with 36% fairly satisfied.

That meant a “significant” minority – 13% – experienced poor service, mostly due to slow speeds or loss of service, it said.

BT had the lowest score for “very satisfied” of the four providers in the Ofcom survey at 45%, followed by TalkTalk on 49%, Sky on 52% and Virgin Media on 55%.

Last month BT agreed to Ofcom demands to legally separate Openreach, which runs the UK’s broadband network, in a bid to give better service to both consumers and broadband providers.

Digital minister Matt Hancock said: “Too many people are suffering from poor customer service when things go wrong with their broadband.

“Getting a better deal for consumers is at the heart of our Digital Economy Bill, which strengthens Ofcom’s power to make sure providers pay automatic compensation when service falls short.”

French politician appears in seven places at once

A French presidential candidate makes use of the Victorian Pepper’s Ghost illusion.

French politician Jean-Luc Melenchon appeared in seven places at once this week as a “holographic” projection.

The presidential candidate made use of the Victorian Pepper’s Ghost illusion to deliver his campaign speech.

Indian PM Narendra Modi and Turkish President Recep Tayyip Erdogan have previously used this kind of technology. BBC Click takes a look.

Germany’s public wi-fi dilemma – BBC News

Public wi-fi owners in Germany could be held liable for illegal downloads, but campaigners are trying to change the law.

For a country with a reputation as a tech powerhouse, public wi-fi is surprisingly difficult to find in Germany.

The reason is that cafe and shop owners who provide wi-fi could be held liable for illegal activity that happens on their network, such as piracy or illegal downloads.

But campaigners are trying to change this law.

Video journalist: Joe Miller

USAF F-35A stealth jets train at RAF Lakenheath

United States Air Force stealth jets are training in Suffolk on their first overseas deployment.

American stealth fighter jets are training at RAF Lakenheath, in Suffolk, on their first overseas deployment.

They will be flying alongside RAF jets from Marham, in Norfolk.

The move has been described by the USAF as part of an “increased deterrent”.

With stealth capability and state of the art technology, the F-35A is one of the world’s most advanced warplanes.

Celebrities warned over Instagram ads

Man photographs Instagram logoImage copyright

Celebrities and “influencers” in the US have been warned to clearly identify when they are promoting products on Instagram in return for payment.

The consumer regulator sent letters to more than 90 individuals and marketing firms, though it has not revealed who was put on notice.

It is the first time the regulator has intervened on the issue.

An advocacy group which petitioned for the move said Instagram had become “a Wild West of disguised advertising”.

How online ‘influencers’ are changing the food industry

How social media is transforming the fashion industry

‘Deceiving consumers’

The Federal Trade Commission targeted a sample of posts that either referenced a brand or directly endorsed products.

Its rules say that anyone endorsing a brand must “clearly and conspicuously” declare connections to it, for example if products have been given free, if a payment has been made for the endorsement or if there is a business or family relationship.

The rules apply to marketing agencies involved in such deals as well as the endorsers themselves.

Image copyright
Getty Images

Image caption

Kim Kardashian is among the “influencers” named in the petition, though it is unclear if she was among those who received a warning

The intervention was part-prompted by the advocacy group Public Citizen which carried out its own investigation last year, naming celebrities including Rihanna and Kim Kardashian among 113 influencers who it said endorsed a product without disclosure.

“Instagram has become a Wild West of disguised advertising, targeting young people and especially young women,” the group said.

“It is often unclear whether an Instagram user is paid to post a product endorsement or if they genuinely use it. That’s exactly why brands are using influencer marketing as a primary way to reach young consumers. But without clear disclosure, brands are deceiving consumers and reaping the monetary benefits.”

Growing trend

Points made by the regulator in the letters include:

  • Some disclosures which had been made were not clear enough. It said that “#sp,” (an abbreviation for sponsored), “Thanks [Brand],” or “#partner” in an Instagram post did not make it obvious to many people that a post was paid for.
  • Instagram users on smartphones typically see just the first three lines of text on a post, unless they expand it. Therefore disclosures should be made high up in the post.
  • When multiple tags, hashtags, or links are used, readers may just skip over them – meaning a disclosure may not be conspicuous.

The regulator did not give specific wording which should be used to make a disclosure but said that phrases such as “paid for” “Sponsored” and “Promotion” may help get that message across, as well as “#ad”.

In guidelines it also says “A simple disclosure like ‘Company X gave me this product to try…’ will usually be effective.”

Social media has become an increasingly important part of marketing campaigns for many brands around the world, especially those aimed at younger consumers.

Celebrities and others who have garnered huge followings on Instagram and other services are often part of advertising campaigns.

The FTC has previously taken action when its rules have been violated. Last year it reached a settlement with Warner Bros over claims the firm had not disclosed it had paid high profile YouTubers to give one of its video games positive reviews.

Instagram’s non-celebrity ‘influencers’

Image copyright
Getty Images

Image caption

Chiara Ferragni has almost 9 million Instagram followers

Aside from celebrities, there are countless “digital influencers” on social media, people who have risen to a celebrity-like status with millions of followers. On Instagram they include:

  • Fashion blogger Chiara Ferragni – 8.9 million followers
  • Fashion blogger Aimee Song – 4.5 million followers
  • Style blogger Julie Sarinana – 4.5 million followers
  • Photographer Brian DiFeo – 3 million followers
  • Photographer Liz Eswein – 1.3 million followers

The exact net worth or rate per post is hard to pin down, but be prepared to fork out several thousand dollars, or even tens of thousands, if you want your product featured in one of their Instagram posts.

Credit card with a fingerprint sensor revealed by Mastercard

Fingerprint cardImage copyright

Image caption

The fingerprint sensor draws power from the terminal meaning it does not need batteries of its own

A payment card featuring a fingerprint sensor has been unveiled by credit card provider Mastercard.

The rollout follows two successful trials in South Africa.

The technology works in the same way as it does with mobile phone payments: users must have their finger over the sensor when making a purchase.

Security experts have said that while using fingerprints is not foolproof, it is a “sensible” use of biometric technology.

‘Nine changes’

Mastercard’s chief of safety and security, Ajay Bhalla, said that the fingerprint technology would help “to deliver additional convenience and security. It is not something that can be taken or replicated.”

However, fingerprint sensors can be compromised.

Image copyright

Image caption

Card holders must place their finger over the square sensor when using the card for a transaction

Karsten Nohl, chief scientist at Berlin’s Security Research Labs, told the BBC: “All I need is a glass or something you have touched in the past.”

He adds that if that information is stolen, “you only have nine fingerprint changes before you run out of options”.

But Mr Nohl is cautiously optimistic about the technology, saying it is “better than what we have at the moment”.

“With the combination of chip and PIN, the PIN is the weaker element. Using a fingerprint gets rid of that.”

“Fingerprints have helped us avoid using terrible passwords, and even the most gullible person is not going to cut off their finger if [a criminal] asks nicely.”

No scanner needed

The cards are thought to be the first to include both the digital template of the user’s fingerprint and the sensor required to read their fingerprints at the point of sale.

Previous biometric payment cards only worked when used in conjunction with a separate fingerprint scanner.

That limited their usefulness, as only stores with the correct equipment could accept them.

Having both the data and the scanner on the same card means that they should be accepted everywhere a normal chip and PIN payment card can be used.

But the biometric verification can only be used for in-store purchases: online and other so-called “card not present” transactions will still require further security measures.

Bose sued for logging listening habits

Bose headphonesImage copyright

Image caption

Bose needs to do more to warn people about the data it is gathering, say lawyers

Headphone maker Bose is being sued by a customer who claims the firm has gathered data about his listening habits without his permission.

Chicago resident Kyle Zak claims Bose’s app scoops up data which is then sold to firms use it to target adverts.

Mr Zak wants the court to grant an injunction that stops Bose grabbing data about audio preferences and is seeking $5m (£3.9m) in damages.

Bose has not yet responded to requests for comment about the legal action.

Basic information

“People put headphones on their head because they think it’s private, but they can be giving out information they don’t want to share,” Christopher Dore, a lawyer representing Mr Zak, told the Reuters news agency.

Mr Dore works for law firm Edelson PC which specialises in cases revolving around data privacy.

Legal papers filed by Edelson said Mr Zak downloaded the Bose Connect app soon after buying a pair of QuietComfort 35 headphones. He provided basic information to sign up for the app that lets users control what they listen to via their smartphone.

Soon after, alleges the lawsuit, he noticed that it was logging far more data about his audio choices than he expected.

The suit claims that similar data is taken from users of other Bose gadgets including the SoundSport Wireless, Sound Sport Pulse Wireless, QuietControl 30, SoundLink Around-Ear Wireless Headphones II, and SoundLink Color II.

Mr Dore said the sign-up process for the app gave no hint about how much data Bose gathered nor what it planned to do with it.

What people listened to gave an “incredible amount of insight” into someone’s personal life, religious and political views, he added.

Country and Other Area Pages A – E


Antigua and Barbuda

Bahamas, The
Bosnia and Herzegovina
Burkina Faso

Cabo Verde
Central African Republic
Congo, Democratic Republic of the
Congo, Republic of the
Costa Rica
Cote d’Ivoire

Dominican Republic

East Timor (see Timor-Leste)
El Salvador
Equatorial Guinea

Country and Other Area Pages L – R




Marshall Islands


New Zealand
North Korea




Palestinian Territories
Papua New Guinea





Country and Other Area Pages S – Z


Saint Kitts and Nevis
Saint Lucia
Saint Vincent and the Grenadines
San Marino
Sao Tome and Principe
Saudi Arabia
Sierra Leone
Sint Maarten
Solomon Islands
South Africa
South Korea
South Sudan
Sri Lanka


Trinidad and Tobago


United Arab Emirates
United Kingdom