Connect with us

TECH

Meta Takes Down Thousands of Facebook Accounts in Nigeria Engaged in Sextortion Scams

Published

on

Meta Takes Down Thousands of Facebook Accounts in Nigeria Engaged in Sextortion Scams

Major Crackdown on Sextortion Networks Linked to Nigeria’s Yahoo Boys

Meta has removed 63,000 Facebook accounts involved in sextortion scams in Nigeria. The accounts, linked to the Yahoo Boys group, targeted primarily U.S. adult men and some minors. New tools are being deployed to combat these scams.

Meta has dismantled approximately 63,000 Facebook accounts in Nigeria engaged in sextortion scams, targeting mostly adult men in the U.S. and some minors. The accounts were linked to the Yahoo Boys group, known for sexual extortion tactics. This follows high-profile cases and a significant rise in sextortion incidents, with Meta reporting some attempts to the National Center for Missing and Exploited Children. Meta is implementing new Instagram tools to protect users, especially minors, from such threats, including features that blur nudity in direct messages.

Digital

South Africa’s AI Initiative Aims to Combat Violent Incitement

Published

on

How Media Monitoring Africa’s New Tool Could Revolutionize Safety—and Raise Free Speech Concerns

Media Monitoring Africa (MMA) is rolling out an artificial intelligence tool aimed at detecting and flagging social media content that could incite violence. The initiative, named Insights into Incitement (I3), represents a significant leap in how technology is harnessed to prevent societal unrest—yet it raises profound questions about its implications for free speech.

I3 is designed to sift through an array of text data, including social media posts, news articles, and political commentaries, to identify and assess comments that might incite violence. It uses a sophisticated algorithm to rank the risk of these posts, marking them in red, yellow, or green based on their potential danger. The tool is accompanied by an online dashboard, offering a transparent, searchable interface for monitoring these flagged contents.

This initiative emerged from the aftermath of the severe violence that rocked South Africa’s KwaZulu-Natal and Gauteng provinces in 2021, triggered by former President Jacob Zuma’s imprisonment. The ensuing riots, which resulted in 300 deaths and substantial property damage, exposed the role social media played in fueling unrest. MMA’s response aims to preempt such crises by targeting the incendiary content that sparks these disturbances.

At its core, I3 seeks to address the rising threats faced by minorities and vulnerable groups, including women, who are often targeted by hate-fueled rhetoric. “At particular risk are minorities, fueled by xeno- and Afrophobia as well as vulnerable groups,” the project’s designers note.

Yet, as the technology progresses, so does the potential for controversy. The tool’s training involves recognizing and flagging inciting phrases—a process that, while rigorous, might also capture benign discussions or legitimate dissent. Critics argue that such systems could inadvertently stifle free speech if not carefully managed.

The expansion of AI tools like I3 across Africa also presents a layer of irony. As AI continues to be deployed to identify and combat disinformation, there is a risk that the very technology could be misused to propagate false or harmful narratives. Recent reports, such as one from Freedom House, highlight the dual-edged nature of AI in disinformation: while it can combat fake news, it also has the potential to generate or amplify it.

South African attorney and tech law expert Zinhle Novazi, who lectures at Stellenbosch University, supports the tool’s intent but also raises concerns. On LinkedIn, Novazi emphasized that while I3 can significantly reduce response times to potential threats, ensuring the tool does not infringe on legitimate speech is crucial. “The challenge lies in ensuring that the tool is used responsibly and does not infringe upon legitimate expressions of opinion or dissent,” she cautions.

As South Africa pioneers this AI-driven approach to public safety, the debate is just beginning. The balance between leveraging technology for security and safeguarding freedoms will be critical as I3 and similar tools become integral to managing the digital landscape. This innovation promises to enhance safety, but it also underscores the need for rigorous oversight to prevent potential overreach and protect democratic principles.

Continue Reading

TECH

U.S. Official Talks Responsible Military AI Use in Nigeria

Published

on

Mallory Stewart’s Visit Highlights Commitment to Safe AI Integration in Africa

Mallory Stewart, Assistant Secretary of State for the Bureau of Arms Control, Deterrence and Stability, visited Nigeria this week to engage with local and regional authorities on the responsible use of artificial intelligence (AI) in military operations. The visit marks a significant step in the United States’ efforts to enhance security cooperation in Africa, reflecting a broader commitment to international norms and ethical considerations in military technology.

Stewart’s two-day visit included discussions with Nigerian officials and members of the Economic Community of West African States (ECOWAS). The meetings focused on the integration of AI in military contexts, emphasizing adherence to international laws and addressing inherent human biases in AI systems.

“We’ve learned the hard way that AI systems can reflect human biases, which may lead to misinformation being provided to decision-makers,” Stewart said. “Our goal is to collaborate with as many countries as possible that are integrating AI into their military operations, to minimize associated risks.”

The U.S. government’s initiative includes working with 55 nations, including those in Africa, to establish frameworks for the responsible use of military AI. This is part of a broader effort to enhance global security and ethical standards in technological advancements.

Nigeria, along with other African nations, is actively exploring the use of AI in its military operations. The country has faced significant security challenges, with sub-Saharan Africa identified as a terrorism hotspot in the Global Terrorism Index report, accounting for nearly 60% of terror-related deaths. While it remains unclear if terror groups are using AI, Nigeria is pushing for AI integration to improve its security capabilities.

Security analyst Kabiru Adamu from Beacon Consulting noted the potential benefits of AI in military operations. “Given the U.S.’s advanced technological capacity, their support could be invaluable for Nigeria, especially if they can tailor their assistance to the unique aspects of Nigeria’s security landscape,” Adamu said. He highlighted the need for adequate supporting infrastructure, such as reliable power sources, to effectively implement AI technologies.

Senator Iroegbu, founder of Global Sentinel online magazine, also emphasized the need for cautious and strategic implementation of AI. “While AI can reduce the number of troops needed and improve intelligence gathering, it’s crucial for Nigeria to develop its own policies and strategies for AI. Increased awareness and policy development are essential,” Iroegbu said.

In June, African ministers endorsed a landmark continental AI strategy aimed at advancing Africa’s digital future. Last week, the African Union approved the adoption of AI across public and private sectors in member states, including Nigeria. This marks a significant step in integrating AI into broader development and security strategies across the continent.

Stewart’s visit underscores the importance of international collaboration and responsible AI practices as African nations navigate the complex landscape of military technology and regional security challenges.

Continue Reading

TECH

Appeals Court Revives Google Privacy Class Action Lawsuit

Published

on

9th Circuit Overturns Dismissal, Orders Reassessment of User Consent and Data Collection Practices

In a significant legal development, the 9th U.S. Circuit Court of Appeals has revived a class action lawsuit against Google, scrutinizing the company’s data collection practices related to its Chrome browser. The court’s ruling on Tuesday overturns a previous dismissal and mandates a closer examination of whether Google collected personal information without user consent.

The lawsuit, brought by Google Chrome users, alleges that the tech giant collected their personal data despite their decision not to synchronize their browsers with their Google accounts. The plaintiffs argue that Google’s privacy disclosures were misleading, suggesting that users could browse privately without their data being collected.

The 9th Circuit’s decision reflects a 3-0 vote, led by Circuit Judge Milan Smith, who criticized the lower court’s approach. Judge Smith highlighted that the lower court had incorrectly applied Google’s general privacy policy, rather than focusing on the specific promises made about Chrome’s privacy features.

Google had previously settled a separate lawsuit concerning Chrome’s “Incognito” mode, agreeing to destroy billions of records and face individual lawsuits from users who believed their private browsing sessions were being tracked. Despite this settlement, the revived class action addresses additional concerns about data collection in non-synced Chrome browsers.

The plaintiffs’ legal representative, Matthew Wessler, expressed satisfaction with the appellate court’s decision, anticipating a trial to further explore the issues raised. The class action now includes Chrome users from July 27, 2016, who opted not to sync their browsers with Google accounts.

Google responded to the ruling by defending its practices, stating, “We disagree with this ruling and are confident the facts of the case are on our side.” The company emphasized that Chrome Sync is designed to enhance user experience across devices and that users have clear privacy controls over their data.

The appeals court’s decision challenges the interpretation that Google’s general privacy policy covers all aspects of data collection. Judge Smith pointed out that Google’s promotional materials for Chrome implied that certain information would not be transmitted unless users activated the sync feature. This implication could lead reasonable users to believe their data was not being collected in the way alleged by the plaintiffs.

The case has been remanded to U.S. District Judge Yvonne Gonzalez Rogers in Oakland, California, who initially dismissed the lawsuit in December 2022. The decision underscores ongoing concerns about privacy and consent in digital services, particularly regarding how tech companies handle user data.

Following the Incognito mode settlement, many users have pursued individual lawsuits in California courts. The revived class action will now examine broader allegations of privacy violations in Google’s Chrome browser.

Continue Reading

TECH

Meta Introduces Monetization for Facebook Creators in Kenya

Published

on

Meta Unleashes Monetization for Kenyan Creators in a Controversial Bid to Dominate Africa’s Digital Landscape

Meta has shaken the digital landscape, unveiling monetization features that finally allow Kenyan creators to earn from their short-form videos on Facebook. This audacious move by the social media giant promises to disrupt the status quo and ignite a new wave of creativity across Africa. But what does it really mean for the vibrant Kenyan creator community and the global market?

In a much-anticipated announcement, Meta introduced two lucrative monetization options: in-stream ads that play before, during, or after videos, and ads on reels that accompany short clips. Kenya now joins an exclusive club of 12 African countries where Meta shares ad revenue with creators, including Egypt, Nigeria, Rwanda, Ghana, and the Seychelles.

“This expansion will empower eligible creators in the vibrant creative industry in Kenya to earn money, whilst setting the bar high for creativity across the world and making Meta’s family of apps the one-stop-shop for all creators,” declared Moon Baz, Meta’s global partnerships lead for Africa, the Middle East, and Turkey.

The journey to extend Meta’s monetization capabilities to Kenya began in March when Nick Clegg, Meta’s President of Global Affairs, visited the country and met with President William Ruto. This strategic engagement laid the groundwork for the features initially planned to roll out by June on both Facebook and Instagram. However, Instagram creators will have to wait longer as the announcement only covered Facebook, raising eyebrows and sparking speculation about Meta’s true intentions.

To qualify for this new revenue stream, creators must have at least 5,000 followers on Facebook and accumulate over 60,000 minutes of watch time in the past two months. These stringent criteria ensure that only the most dedicated and popular creators reap the benefits, pushing others to elevate their game.

Facebook reigns supreme as the most popular social media platform in Kenya, boasting usage by at least 52% of Kenyans aged 15 and above, according to the latest statistics from the Communications Authority of Kenya. WhatsApp follows closely, used by 48.5% of the population, while Instagram lags at 11.5%. The introduction of these monetization features on Facebook, and not Instagram, hints at Meta’s strategic prioritization, but leaves Instagram creators in suspense.

Currently, only YouTube and X (formerly Twitter) share ad revenue with creators, making Meta’s move a potential game-changer. This development is bound to stir controversy, with some viewing it as a necessary evolution, while others might see it as a calculated ploy to tighten Meta’s grip on Africa’s digital economy.

Meta’s decision to monetize short-form videos in Kenya is a bold statement. It underscores the company’s recognition of the continent’s untapped potential and its creators’ burgeoning talent. But it also raises questions about the broader implications for competition, content diversity, and the financial dynamics within the creator economy.

As Kenyan creators begin to harness these new tools, the digital world watches with bated breath. Will this lead to an explosion of creative content and financial independence for African creators, or is it a strategic maneuver by Meta to monopolize Africa’s digital narrative?

One thing is certain: the stakes have never been higher. Meta’s ambitious move has set the stage for a dramatic shift in how content is created, consumed, and monetized in Kenya and beyond. The impact of this decision will ripple across the digital landscape, forever altering the fabric of Africa’s creative economy.

Continue Reading

Editor's Pick

Google Loses Landmark Antitrust Case Over Search Dominance

Published

on

Judge Mehta’s decision could redefine the internet landscape and curb Google’s tech dominance.

U.S. District Judge Amit Mehta ruled that Google’s search engine has been unlawfully leveraging its market dominance to quash competition and stifle innovation. This landmark decision arrives nearly a year after the U.S. Justice Department launched the nation’s most significant antitrust case in a quarter-century against the tech behemoth.

Judge Mehta’s 277-page ruling, emerging three months after closing arguments, thoroughly dissects the tactics Google has employed to maintain its stranglehold on the search market. “After having carefully considered and weighed the witness testimony and evidence, the court reaches the following conclusion: Google is a monopolist, and it has acted as one to maintain its monopoly,” Mehta declared.

This ruling is a dramatic setback for Google and its parent company, Alphabet Inc., which has long argued that its dominance is purely a reflection of its superior product. Google’s search engine, processing approximately 8.5 billion queries daily, has become synonymous with internet searches globally.

Google’s defense hinged on consumer preference, citing its unmatched efficiency as the reason for its market position. Yet, Mehta’s ruling underscores that Google’s grip on the market is not just about quality but about strategic moves that prevent competitors from gaining a foothold. The Justice Department’s case painted Google as a ruthless corporate entity that has systematically obliterated competition to protect its digital advertising empire, which raked in nearly $240 billion last year.

Central to the court’s decision is Google’s practice of paying billions to be the default search engine on new devices, a strategy that effectively sidelines competitors. In 2021 alone, Google shelled out over $26 billion to secure these default agreements. Critics argue that these practices inflate advertising costs and hinder consumer choice.

Google ridiculed these claims, pointing to the historical precedent of search engines like Yahoo, which once led the market but fell from grace as Google rose. Yet, Mehta highlighted evidence showing that default settings are pivotal, citing Microsoft’s Bing holding an 80% market share on the Edge browser—proof that competitors can thrive when given a chance.

While acknowledging Google’s superior search capabilities, Mehta’s ruling sets the stage for a new phase where penalties and remedies will be debated to restore competitive balance. This decision could catapult Microsoft’s Bing and other search engines into more significant roles, particularly as artificial intelligence reshapes the tech frontier.

Satya Nadella, Microsoft’s CEO, was a star witness, articulating the challenges Bing faced due to Google’s deals with companies like Apple. Nadella’s frustration was palpable as he described the monopolistic landscape: “You get up in the morning, you brush your teeth, and you search on Google. Everybody talks about the open web, but there is really the Google web.”

Nadella warned that without antitrust intervention, Google’s dominance could become even more unassailable with the rise of AI, potentially stifling future innovation in the search market.

Google, predictably, plans to appeal, potentially escalating the case to the U.S. Supreme Court. This decision vindicates the Justice Department’s efforts to curb Big Tech’s power, a crusade that intensified under President Joe Biden’s administration.

This ruling marks just one battle in Google’s ongoing legal wars. The company faces numerous other antitrust suits both domestically and internationally. A federal trial in Virginia looms on the horizon, challenging Google’s advertising technology monopoly.

The implications of this decision extend beyond Google, potentially setting a precedent for how tech giants operate. Will we witness a more competitive and innovative digital marketplace, or will Google’s deep pockets and legal acumen enable it to maintain its dominance? As the appeal process unfolds, all eyes will be on the courts to see if this ruling signals a new era of accountability and fairness in the tech industry.

Continue Reading

TECH

Global IT Outage Exposes Deep-Seated Vulnerabilities in Digital Infrastructure

Published

on

A Faulty Update Sparks Worldwide Chaos, Highlighting the Fragility of Modern Technology

On July 19, 2024, the world witnessed a digital catastrophe of unprecedented scale. A massive IT outage, triggered by a faulty update to the Falcon cybersecurity software from CrowdStrike, brought organizations ranging from airlines to hospitals to a standstill. Even the delivery of uniforms for the Olympic Games was disrupted, casting a spotlight on the glaring vulnerabilities within our global information ecosystem.

This incident underscores the intricate web of interdependencies that characterize modern organizational networks, cloud computing services, and the internet. The catastrophic failure began with an automatic update to CrowdStrike’s widely-used cybersecurity software, causing PCs running Microsoft’s Windows operating system to crash. To compound the problem, Microsoft simultaneously released an update to its Azure cloud computing platform, exacerbating the disruption.

For many organizations, the path to recovery is laborious and complex. Thousands of servers and PCs, spread across the globe, require manual fixes. Despite technical workarounds issued by Microsoft, CrowdStrike, and other tech giants like Amazon, the vast majority of global users, especially large companies, face a daunting recovery process.

This incident is not an isolated glitch but a stark reminder of how fragile our modern technology infrastructure is. Cyberattacks and technical malfunctions alike have the potential to paralyze global operations in novel and devastating ways. The economic fallout from such disruptions—lost productivity, recovery costs, and business interruptions—can be astronomical. As a former cybersecurity professional and current security researcher, I believe we are finally grasping the precariousness of our information-based society.

The Bigger Picture

Ironically, just over a month ago, a post on CrowdStrike’s blog eerily forecasted this very scenario—where the global computing ecosystem could be compromised by a single vendor’s faulty technology. Little did they know, their own product would become the catalyst for this upheaval.

Software supply chains have long been recognized as a critical cybersecurity risk and potential single points of failure. Companies like CrowdStrike, Microsoft, and Apple have direct, trusted access to countless computers worldwide. This trust hinges on the assumption that their products and updates are secure, thoroughly tested, and reliable. The SolarWinds hack of 2019, which infiltrated the software supply chain, serves as a chilling precursor to today’s crisis.

CrowdStrike CEO George Kurtz has been quick to clarify that this is not a cyberattack but a technical issue, assuring that the problem has been identified, isolated, and fixed. While this may offer some solace, it doesn’t mitigate the immediate and potentially severe security risks posed to affected organizations. In the scramble to address the outage, some may disable critical security devices, inadvertently exposing themselves to cyber threats. Furthermore, the chaos is likely to spawn scams targeting bewildered users, leading to potential identity theft and financial losses.

Moving Forward

As we grapple with the aftermath, several critical lessons and actions emerge. Companies must rigorously vet the security and resilience of the products and services they rely on. This involves thorough due diligence on vendors and robust internal testing protocols for updates and upgrades, even for routine security tools.

Governments and corporations alike need to prioritize resilience in network and system design. This means avoiding single points of failure and understanding the dependencies within their infrastructure. A resilient design can mitigate the impact of such disruptions, ensuring continuity in the face of unforeseen challenges.

Organizations must also renew their commitment to best practices in cybersecurity and IT management. This includes maintaining comprehensive backup systems to facilitate recovery and minimize data loss. Ensuring that policies, procedures, staffing, and technical resources are up to the task is vital.

The dilemma posed by the software supply chain crisis complicates the standard IT advice of keeping systems patched and current. The recent events highlight the need to balance the imperative of regular updates with the risks of potential future failures. This balancing act will be crucial in fortifying our digital infrastructure against similar incidents in the future.

In conclusion, the global IT outage of July 19, 2024, is a wake-up call. It exposes the fragile underpinnings of our digital world and demands a renewed focus on security, resilience, and preparedness. The road to recovery may be long, but it offers an opportunity to build a more robust and reliable digital ecosystem for the future.

Continue Reading

Military

US Warns of Escalating Space Threats from Russia and China

Published

on

US Intelligence Highlights Growing Concerns Over Space-Based Weapons and Strategic Alliances

The United States is sounding the alarm over the growing threat posed by Russia and China in space, warning that both nations are moving closer to deploying space-based weapons. U.S. military and intelligence agencies emphasize that these developments could significantly impact America’s defense capabilities.

Lieutenant General Jeff Kruse, director of the Defense Intelligence Agency, underscored the gravity of the situation at the Aspen Security Forum, stating, “Both Russia and China view the use of space early on, even ahead of conflict, as important capabilities to deter or to compel behaviors. We just need to be ready.”

The urgency of these concerns was amplified earlier this year when House Intelligence Committee Chairman Mike Turner called for the declassification of information related to a new Russian anti-satellite capability involving nuclear weapons. While the White House has acknowledged awareness of Russia’s plans, it maintains that Moscow has not yet deployed such a capability.

Kruse confirmed that the U.S. has been monitoring Russia’s intent to place nuclear weapons in space for nearly a decade. “They have progressed down to a point where we think they’re getting close,” he said, warning that Russia is unlikely to decelerate without significant repercussions.

Despite repeated denials from Russian and Chinese officials, U.S. concerns persist. Russian Deputy Foreign Minister Sergei Ryabkov dismissed U.S. allegations as “fake news,” while a Chinese Embassy spokesperson in Washington accused the U.S. of using the space threat narrative to justify its own military expansion.

However, Kruse pointed to China’s rapid expansion in space as equally troubling. “China is the one country that more so even than the United States has a space doctrine, a space strategy, and they train and exercise the use of space and counterspace capabilities in a way that we just don’t see elsewhere,” he said.

General Stephen Whiting of U.S. Space Command echoed these concerns, describing China’s strategic buildup as a “kill web” in space. “In the last six years, they’ve tripled the number of intelligence, surveillance, and reconnaissance satellites they have on orbit,” Whiting said, highlighting the threat to U.S. and allied forces in the Indo-Pacific region.

The lack of military communication with China about space operations adds another layer of risk, according to Whiting. “We want to have a way to talk to them about space safety as they put more satellites on orbit,” he said, to prevent miscommunication and unintended actions.

As Russia and China continue to advance their space capabilities, the U.S. must navigate these emerging threats to maintain its strategic advantage and ensure global security.

Continue Reading

Military

China’s Bold Move: 66 Military Aircraft Encircle Taiwan in Largest Show of Force This Year

Published

on

Taiwan’s defense ministry reported a staggering 66 Chinese military aircraft encircling the island within a 24-hour window—the highest number recorded this year. This provocative move followed closely on the heels of Beijing’s naval exercises in nearby waters, showcasing a bold display of military prowess that has alarmed observers around the world.

China, which steadfastly claims Taiwan as part of its territory, has never renounced the use of force to achieve reunification. The latest sortie comes amid a backdrop of increasing political friction and military posturing. Just a day earlier, Taipei had detected Chinese aircraft moving toward the western Pacific for drills with the PLA aircraft carrier Shandong, a clear signal of Beijing’s strategic ambitions.

According to Taiwan’s defense ministry, the detected aircraft, along with seven PLAN vessels, were operational until 6 am on Thursday. Of the 66 aircraft, 56 breached the sensitive median line in the Taiwan Strait, a narrow waterway that serves as a buffer zone between the island and mainland China. This blatant violation underscores the intensifying pressure Beijing is exerting on Taipei.

Military experts suggest that this show of force is a direct response to recent political developments, including a meeting between Taiwan’s President Lai Ching-te and Washington’s new de facto ambassador to Taiwan. “Beijing is flexing its military muscles to express displeasure at the support Taiwan receives,” noted Su Tzu-yun from Taiwan’s Institute for National Defense and Security Research.

The current record sortie surpasses a previous peak in May when China dispatched 62 military aircraft and 27 naval vessels around Taiwan during military exercises following Lai Ching-te’s inauguration. Beijing labels Lai a “dangerous separatist,” and his administration’s ties with the United States have further strained cross-strait relations.

In an interesting twist, Taiwan’s defense minister Wellington Koo observed that the Shandong carrier had not traversed the usual Bashi Channel, but had instead navigated further south via the Balingtang Channel toward the Western Pacific, a move likely intended to complicate tracking efforts. This maneuver was corroborated by Japan, which confirmed that the Shandong, accompanied by three other PLA navy vessels, was located southeast of Miyako Island, with fighter aircraft and helicopters observed taking off and landing on the carrier.

The Philippines also noted a China-Russia exercise in the Philippine Sea, heightening regional military tensions further. This comes amidst a series of confrontations over the disputed South China Sea, an area fraught with overlapping territorial claims and strategic significance.

As China continues its aggressive posturing, the stakes in the Taiwan Strait grow ever higher. The international community watches closely, aware that any miscalculation could lead to a broader conflict. Taiwan, undeterred, remains vigilant, prepared to respond to any threat to its sovereignty. The geopolitical chess game in the Asia-Pacific region has entered a perilous new phase, with the next move uncertain but undoubtedly consequential.

Continue Reading

Most Viewed

You cannot copy content of this page