Page 3,236«..1020..3,2353,2363,2373,238..3,2503,260..»

Senior Lecturer in Mechanical Engineering job with BIRMINGHAM CITY UNIVERSITY | 238845 – Times Higher Education (THE)

Senior Lecturer in Mechanical Engineering

School of Engineering and the Built Environment

Location: Birmingham, EnglandSalary: 46,376 to 50,408 per annumClosingDate: Sunday 17 January 2021InterviewDate: To be confirmedReference: 122020-458

We invite applications to join our team in the School of Engineering and the Built Environment in a dynamic, multidisciplinary environment. We are a practice-based school, our undergraduate programmes are delivered using the CDIO (Conceive, Design, Implement and Operate) framework, making our teaching and research relevant to the evolving world around us. We work in a collaborative and cross disciplinary culture where interacting freely across the school and with colleagues in other schools is encouraged to gain a unique insight into impactful problem domains.

You will have opportunity to demonstrate your expertise in undertaking research and in the delivery of our Engineering courses particularly related to undergraduate and postgraduate courses in Mechanical and Automotive engineering in the role of SeniorLecturer in Mechanical Engineering.

Main Duties and Responsibilities

Skills and Experience

Essential

Subject expertise in:

Desirable

With around 24,000 students from 80 countries, Birmingham City University is a large and diverse place to study. We put students at the heart of everything we do, giving them the best opportunities for future success. The University has an enviable reputation for providing quality, student-focused education in a professional and friendly environment. Our superb courses, state-of-the-art facilities, first-rate staff, and focus on practical skills and professional relevance is producing some of the countrys most employable graduates. Located in a modern 300m campus in the heart of Birmingham, at the City Centre Campus, the School of Engineering and the Built Environment is a thriving, vibrant, and inspiring learning community committed to excellence in research, high quality teaching and impactful industrial engagement.

Our staff and student community is defined by our core values, which outline who we are as a University and how we will work with each other. Our core values are Excellence, People focused, Partnership working and Fairness and integrity.

To apply for this role, please complete the online application and upload a copy of your CV. Candidates are advised to remove personal information to ensure a fair and transparent process.

CLOSING DATE FOR ADVERT AND APPLICATIONS IS SUNDAY 17 JANUARY 2021

Further details:

The University is committed to internationalism and diversity and welcomes applications from all countries, faiths and backgrounds.

It is each individual successful applicants responsibility to ensure that they have permission to work in the UK. Some applicants may require sponsorship from the University and a visa from UKVI to take up the role if successful. More information on this can be found here:https://www.gov.uk/check-uk-visa

Some roles are not capable of sponsorship because they do not meet the UKVI criteria relating to skill and salary level. If you are unsure as to whether you would require sponsorship if successful, or whether the role is capable of sponsorship, please contact us:RTinbox@bcu.ac.uk

Please note on occasions where we receive a large number of applications, we may close the advert ahead of the publicised closing date. If this does happen, we will contact all candidates via email who have started but not yet completed their application, giving 48 hours notice. We would therefore advise that you submit your completed application as soon as possible.

Birmingham City University are an equal opportunities employer and welcomes applications from all sections of the community.

Birmingham City University ('BCU') is committed to protecting your personal data and being transparent about what we do with your personal data. One of the ways we do this is through our privacy notices. For further information pleaseclick here.

See more here:

Senior Lecturer in Mechanical Engineering job with BIRMINGHAM CITY UNIVERSITY | 238845 - Times Higher Education (THE)

Read More..

New engineering business opens its doors in Netherton despite the pandemic – expressandstar.com

Jason Clark with Chris Brown

RJ Clark Engineering is the first business for Mr Clark who has vast experience in the design, manufacturing of tooling for the foundry industry.

The founder, and skilled engineer said: "Opening my first business in Netherton and created new jobs in the engineering sector in the midst of a pandemic and the heart of industry feels like a dream come true.

"Opening and managing a business is no easy task and that in itself has been challenging, but rewarding. Understanding business finance and accessing the right funding package was crucial to starting RJ Clark Ltd.

Accessing finance for entrepreneurs and small businesses isn't easy, especially with the myriad of options because of Covid-19, but Central Business Finance came recommended and has a strong record of supporting manufacturing businesses in the region."

Chris Brown, director of Central Business Finance, added; "Seeing RJ Clark open and ready for business when businesses are closing because of the pandemic is a great accomplishment. Supporting entrepreneurs and small businesses achieve growth across the Midlands and seeing RJ Clark Ltd come to fruition from concept to completion is a privilege not to mention see the creation of 5 new jobs for the area!"

Mr Clark added: "Central Business Finance took the time to understand what I wanted to achieve, what are my plans for the future and really understand both the financial market and the manufacturing industry."

Central Business Finance, has already supported over 300 businesses in 2020 with commercial finance to access funding to either continue trading or start a new business.

Visit link:

New engineering business opens its doors in Netherton despite the pandemic - expressandstar.com

Read More..

‘Earables’ the next milestone in wearable tech, say engineers – E&T Magazine

A team of engineers based at the University of Illinois Grainger College of Engineering are exploring a new sub-area of mobile technology based on sophisticated and connected earphones.

The leap from todays earphones to 'earables' would mimic the transformation that we had seen from basic phones to smartphones, explained Professor Romit Roy Choudhury, an expert in electrical and computer engineering. Todays smartphones are hardly a calling device anymore, much like how tomorrows earables will hardly be a smartphone accessory.

Choudhury and his colleagues who are drawing from a wide range of fields are developing new algorithms and experimenting with them on earphone platforms with live users. They hope that in the future, these wearable devices will continuously sense human behaviour; run acoustic augmented reality; have digital assistants whisper information, and track user health and fitness.

The researchers have published a series of papers in this area, including a recent paper on voice localisation for earphones.

If you want to find a store in a mall, the earphone could estimate the relative location of the store and play a 3D voice that simply says 'Follow me'. In your ears, the sound would appear to come from the direction in which you should walk, as if its a voice escort, said PhD student Zhijian Yang.

'EarSense: Earphones as a Teeth Activity Sensor' considers how earphones could sense facial and in-mouth activities such as teeth movements and taps, enabling a form of hands-free communication to smartphones and other computing devices. Moreover, as various medical conditions manifest in the chattering of teeth, a smart earphone could make it possible to identify them. The team is planning to look into whether sensors incorporated into earphones could be used to analyse facial muscle movements and thus emotions.

A third paper, 'Voice Localisation Using Nearby Wall Reflections', explores the use of algorithms to detect the direction of a sound; this would allow a wearers earphones to tune into the direction of a person who is speaking to them.

Weve been working on mobile sensing and computing for 10 years, said PhD student Yu-Lin Wei. We have a lot of experience to define this emerging landscape of earable computing.

Speaking to E&T recently, Anders Andren, CEO of Swedish audio brand Urbanista, said that sensors were likely toplay a role in making consumer audio products more helpful in the future; for instance, in adjusting active noise control to the wearers environment.

Well go into exciting times with sensors, with gyros, he said. I think theres plenty to dive into. Well go from the old phones into smart hearables and that will be interesting.

Sign up to the E&T News e-mail to get great stories like this delivered to your inbox every day.

More:

'Earables' the next milestone in wearable tech, say engineers - E&T Magazine

Read More..

VW Bolsters U.S. Footprint With Advancements In Electric Car Portfolio, Infrastructure And Engineering – CarScoops

VW is moving forward with its assault on the U.S. market in a bid to establish itself as an industry giant as far as electrification. The German carmaker hopes to take the fight to Tesla on its home turf.

The first order of business is the ID.4 fully-electric crossover, expected to arrive at dealerships nationwide in early 2021. Other plans include infrastructure expansion, as well as further developments in terms of engineering and manufacturing.

The introduction of the ID.4, our new compact SUV the Volkswagen Taos and rising vehicle quality have given us real momentum heading into 2021, said VW Group of America COO, Johan de Nysschen. Its important that the infrastructure supporting our products continues to grow in the U.S. as we aim to deliver more vehicles designed in the market, for the market at the right time and at the right price.

Read: VW Tiguan Front Seatbelts May Rupture During Impact, Recall Announced

This year has been a very important one for VW, despite an industry thats still recovering and dealing with a global pandemic. In reverse chronological order, VW recently announced the addition of a 51-vehicle charge park at its Innovation and Engineering Center California (IECC) in Silicon Valley. Its one of the largest publicly accessible charge parks in the Bay Area.

Last month, the carmaker broke ground on a new Battery Engineering Lab in Chattanooga, joining its electric vehicle expansion and battery pack assembly facility, which is also under construction. Overall, this will stand as VWs main hub for electric vehicle production and engineering in North America.

Other highlights include the opening of the Oxnard Engineering Campus (also in California) back in July, and the unveiling of the Arizona Proving Grounds featuring a 50-vehicle charging station.

The latter is tasked with evaluating EV battery and charging performance under extreme hot-weather conditions.

more photos...

View original post here:

VW Bolsters U.S. Footprint With Advancements In Electric Car Portfolio, Infrastructure And Engineering - CarScoops

Read More..

These 4 Measures Indicate That SIA Engineering (SGX:S59) Is Using Debt Reasonably Well – Simply Wall St

Howard Marks put it nicely when he said that, rather than worrying about share price volatility, 'The possibility of permanent loss is the risk I worry about... and every practical investor I know worries about.' It's only natural to consider a company's balance sheet when you examine how risky it is, since debt is often involved when a business collapses. As with many other companies SIA Engineering Company Limited (SGX:S59) makes use of debt. But should shareholders be worried about its use of debt?

Debt is a tool to help businesses grow, but if a business is incapable of paying off its lenders, then it exists at their mercy. Part and parcel of capitalism is the process of 'creative destruction' where failed businesses are mercilessly liquidated by their bankers. However, a more common (but still painful) scenario is that it has to raise new equity capital at a low price, thus permanently diluting shareholders. Of course, plenty of companies use debt to fund growth, without any negative consequences. When we examine debt levels, we first consider both cash and debt levels, together.

Check out our latest analysis for SIA Engineering

As you can see below, SIA Engineering had S$12.7m of debt at September 2020, down from S$15.7m a year prior. But it also has S$514.9m in cash to offset that, meaning it has S$502.2m net cash.

According to the last reported balance sheet, SIA Engineering had liabilities of S$223.8m due within 12 months, and liabilities of S$93.0m due beyond 12 months. Offsetting this, it had S$514.9m in cash and S$353.9m in receivables that were due within 12 months. So it actually has S$552.0m more liquid assets than total liabilities.

This excess liquidity suggests that SIA Engineering is taking a careful approach to debt. Because it has plenty of assets, it is unlikely to have trouble with its lenders. Simply put, the fact that SIA Engineering has more cash than debt is arguably a good indication that it can manage its debt safely.

It is just as well that SIA Engineering's load is not too heavy, because its EBIT was down 91% over the last year. When a company sees its earnings tank, it can sometimes find its relationships with its lenders turn sour. When analysing debt levels, the balance sheet is the obvious place to start. But it is future earnings, more than anything, that will determine SIA Engineering's ability to maintain a healthy balance sheet going forward. So if you're focused on the future you can check out this free report showing analyst profit forecasts.

But our final consideration is also important, because a company cannot pay debt with paper profits; it needs cold hard cash. SIA Engineering may have net cash on the balance sheet, but it is still interesting to look at how well the business converts its earnings before interest and tax (EBIT) to free cash flow, because that will influence both its need for, and its capacity to manage debt. Happily for any shareholders, SIA Engineering actually produced more free cash flow than EBIT over the last three years. That sort of strong cash conversion gets us as excited as the crowd when the beat drops at a Daft Punk concert.

While it is always sensible to investigate a company's debt, in this case SIA Engineering has S$502.2m in net cash and a decent-looking balance sheet. And it impressed us with free cash flow of S$62m, being 129% of its EBIT. So we don't think SIA Engineering's use of debt is risky. The balance sheet is clearly the area to focus on when you are analysing debt. However, not all investment risk resides within the balance sheet - far from it. For instance, we've identified 1 warning sign for SIA Engineering that you should be aware of.

Of course, if you're the type of investor who prefers buying stocks without the burden of debt, then don't hesitate to discover our exclusive list of net cash growth stocks, today.

PromotedIf you decide to trade SIA Engineering, use the lowest-cost* platform that is rated #1 Overall by Barrons, Interactive Brokers. Trade stocks, options, futures, forex, bonds and funds on 135 markets, all from a single integrated account.

This article by Simply Wall St is general in nature. It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your financial situation. We aim to bring you long-term focused analysis driven by fundamental data. Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material. Simply Wall St has no position in any stocks mentioned. *Interactive Brokers Rated Lowest Cost Broker by StockBrokers.com Annual Online Review 2020

Have feedback on this article? Concerned about the content? Get in touch with us directly. Alternatively, email editorial-team@simplywallst.com.

Read more from the original source:

These 4 Measures Indicate That SIA Engineering (SGX:S59) Is Using Debt Reasonably Well - Simply Wall St

Read More..

English is easier: India is woefully underprepared to teach engineering in regional languages – The Times of India Blog

While the new National Education Policy recommends greater use of the local language as a medium of instruction, specific ramifications of this will unfold over time. One announcement that has caused churn in recent weeks is that the next academic session will see selected engineering institutions including IITs and NITs offer technical education in regional languages as well. Union education minister Ramesh Pokhriyal has done widespread outreach on this, and he emphasises the need to strengthen and save the 22 languages in the Eighth Schedule of our Constitution. The question is whether this worthy goal should be pursued through re-engineering elite engineering institutions.

As much as education, science and technology already shape the global landscape today, they will play the ultimate role in defining which nations succeed or fail tomorrow. In this context it is a matter of concern how few globally competitive institutes of excellence India has, and on top of this IITs have dropped further behind in the QS World University rankings. Government told Parliament last year that there is a shortage of 3,709 faculty members against a sanctioned strength of 9,718 across the 23 IITs. When almost all the top engineering education has hitherto been in English, where will the faculty be found for delivering technical lectures in regional languages?

Pointing to how excellent technical education is offered in Chinese and German in those countries misses the key point: There the entire ecosystem as well as history are geared in the same direction whereas here we are trying to buck that. Unlike those nations India is a multilingual country, and even there more courses are being offered in English than before. Local language textbooks and translations are not even available for traditional engineering courses, forget new ones like artificial intelligence. IITs are supposed to be autonomous institutions an essential precondition for excellence. Let them choose what language they want to teach in.

This piece appeared as an editorial opinion in the print edition of The Times of India.

END OF ARTICLE

Excerpt from:

English is easier: India is woefully underprepared to teach engineering in regional languages - The Times of India Blog

Read More..

The Same U.S. Government That Wants To Weaken Our Encryption Just Got Massively Hacked – Reason

The U.S. Treasury and Commerce departments, along with untold numbers of government and corporate computer networks, have been breached in what may be an espionage attempt by the Russian government. (The Russians are, of course, denying responsibility.)

The avenue was reportedly a malicious software update pushed through SolarWinds Inc., an Austin-based network management company that counts both the federal government and hundreds of major U.S. companies among its clients. Essentially, the hackers slipped some malicious code into a software update; if you were on the infected networks that installed the update, this gave the hackers backdoor access to your data.

The infiltration apparently began in the spring but was not announced until this past weekend. SolarWinds reports that as many as 18,000 customers may have downloaded the infected update.

The Wall Street Journal reports that this infiltration may be above and beyond the usual cyberespionage:

While those familiar with the hack couldn't precisely specify its scope or the resulting damage to the U.S. government, several described it as among the most potentially worrisome cyberattacks in years, because it may have allowed Russia to access sensitive information from government agencies, defense contractors and other industries. One person familiar with the matter said the campaign was a "10" on a scale of one to 10, in terms of its likely severity and national-security implications.

Last week FireEye, a California-based cybersecurity firm, also reported a sophisticated hack that compromised its tools, which it attributed to a foreign government.

It's worthwhile to consider these developments in the light of law enforcement's efforts to weaken encryption protections. When officials insist that individuals should not have access to strong encryption unless the government can bypass those protections and access our data, they don't acknowledge that police won't be the only ones exploiting those back doors. Others with malicious intent, be they criminals or foreign governments (or both), will figure out how to get through too. It has happened before to our own very own government, as another country, possibly China, figured out how to access a cybersecurity bypass that had been installed for the National Security Agency.

In this latest incident, the extent of which we still don't know, the hackers had to create their own back door. So even cybersecurity that hasn't been undermined by statute isn't going to be perfect protection. But weaker security certainly isn't the answer. These back doors are bad. Whenever any senator or FBI director or police chief demands the power to bypass encryption, he or she should be reminded of this potentially dangerous breach.

Read more:
The Same U.S. Government That Wants To Weaken Our Encryption Just Got Massively Hacked - Reason

Read More..

How to Enable End-to-End Encryption in Google Messages – Lifehacker

Last month, Google announced End-to-End encryption (E2EE) would soon be available for RCS messages in its Google Messages app on Android. According to numerous reports, the feature is already rolling out to Google Messages beta testers, which means itll probably show up in the regular version of the app soon.

This is a pretty big deal. Adding E2EE to any form of communication adds an extra layer of security to a conversation, and all the messages and files within it. Encrypted messaging apps arent anything new; E2EE conversations are available in WhatsApp, Facebook Messenger, Apples Messages, Signal, Telegram, and plenty of other apps, but E2EE launching in Google Messages is an important upgrade.

Google Messages supports RCS messages, which are quickly replacing SMS as the standard text messaging protocol. RCS messaging is better than SMS in many ways, but it wasnt until Google developed a universal RCS protocol known as Chat that the technology finally saw widespread adoption. Unlike other RCS protocols, however, Chat lacked E2EE. That was a blow to privacy-minded users and advocates who hoped RCS would be a more secure replacement for SMS.

Worry, no more.

To try out E22EE right now, youll need to enroll in the Google Messages beta program on Android. Otherwise, hang tight, as the feature will roll out to everybody in an upcoming update for the stable version of the app.

G/O Media may get a commission

From there, youll need to turn on Chat features in Messages:

Encrypted conversations display a padlock icon next to the delivered tag under the most recently-sent message, and also on the Send button.

Note that Google Messages E2EE only kicks in when both members in a conversation are using the latest version of the app on devices and mobile networks that support RCS messaging (most do). All other conversationsincluding group chatswill be left unencrypted. Its theoretically possible that group-chat encryption could show up in a future Messages update, but Google hasnt indicated such a feature is on the way.

[Android Police]

Read more from the original source:
How to Enable End-to-End Encryption in Google Messages - Lifehacker

Read More..

Ransomware gangs are getting faster at encrypting networks. That will make them harder to stop – ZDNet

The cyber-criminal groups behind some of the most notorious and damaging ransomware attacks are using the same tactics and techniques as nation-state-backed hacking operations and they're only going to get more sophisticated as they look for even bigger pay days.

Ransomware has continued to evolvein the past year, with some ransomware crews making off with millions of dollars following each successful attack.

One of the key reasons why ransomware has become such a common cyberattack is because it's the easiest way for malicious hackers to make money from a compromised network.

SEE:A winning strategy for cybersecurity(ZDNet special report) |Download the report as a PDF(TechRepublic)

Previously, cyber criminals might have focused on stealing information that could be used or sold on, but by encrypting the network, they can make a large sum of money from demanding a ransom in a shorter amount of time than it would take to make from exploiting stolen credentials or financial information.

And now the skills of ransomware gangs are catching up with the Advanced Persistent Threat (APT) groups associated with nation states.

"Ransomware attackers are essentially just a couple of years behind the tradecraft we've seen ATP crews adopt. This is still a growing problem, it's not going to go away," Mitchell Clarke, principal incident response consultant at security company FireEye Mandiant, told ZDNet.

Researchers at Mandiant presented analysis of how ransomware and the cyber-criminal gangs behind it has evolved and matured in recent times during a presentation at Black Hat Europe 2020, demonstrating how the cyber-criminal groups running these campaigns are increasingly conducting full-scale network intrusions similar to those seen in nation-state attacks.

Ransomware groups like DoppelPaymer and REvil have been highly prolific this year, encrypting networks and making millions. Part of the reason for the success of these campaigns is because they're highly targeted.

Cyber-criminal hackers uncover vulnerabilities on networks then spend months laying the groundwork to compromise the systems with ransomware before finally unleashing the attack and encrypting the network.

This is similar to how APT groups hide for months or even years without being detected, although their goal is surveillance or stealing sensitive data rather than making money with ransomware.

"If we look back to older cases of ransomware, it was largely opportunistic. Attackers would land on a corporate environment and advance into a small subset of a wide organisation. The transition from opportunistic crime into APT-like campaigns is just a realisation that it's more profitable to completely cover an organisation with ransomware," said Clarke.

"The attacker has taken their time to step through that APT process, to understand the victim environment and to move across it as quietly as possible and with as much privilege as they're able to get. Then when it's time to deploy ransomware, to cover a whole organisation."

But that isn't where the evolution of ransomware campaigns stops; there's the risk that as these groups gain more experience with successful attacks, the time between initial compromise and an attempted full encryption of the network will become much shorter meaning there's even less time to potentially detect suspicious activity before it's too late.

"We're seeing a gap from initial compromise to a ransom event being in the months it's in that period before a ransom that organisations can implement changes to be able to detect," explained Tom Hall, principal incident response consultant at FireEye Mandiant.

"But as they get more sophisticated, we're going to see that window dropping from months to weeks and weeks to days. If organisations don't grasp the problem of being able to catch them when they've got months, there's no hope when we're down to shorter time periods," he added.

SEE:Cybersecurity: Let's get tactical(ZDNet/TechRepublic special feature) |Download the free PDF version(TechRepublic)

However, one of the key reasons why cyber criminals continue to be successful with ransomware attacks is because they're able to exploit vulnerabilities that are simple to protect against but organisations have failed to do so.

Applying the security patches that fix security vulnerabilities shortly after they're released prevents cyber criminals being able to exploit issues that have been fixed, while applying two-factor authentication and preventing the use of default passwords on the network can also go a long way to protecting against ransomware and other attacks.

"It's not like these situations couldn't have been prevented. It really highlights that a solid patch-management programme would have solved having vulnerabilities exposed that kicked off the entire breach," said Clarke.

View original post here:
Ransomware gangs are getting faster at encrypting networks. That will make them harder to stop - ZDNet

Read More..

UK has not ordered ‘backdoor access’ to WhatsApp messages – but could issue injunction against Facebook’s encryption plans – Sky News

The UK has not ordered Facebook to provide law enforcement agencies with a way to access end-to-end encrypted messages on WhatsApp, Sky News has learnt, despite a legal power which could allow it to do so in secret.

However, the power may be used to prevent Facebook from applying the same encryption protocol to its other services, something the company plans to do despite concerns the move will blind it to child predators' grooming victims over its platform.

The notice would allow Facebook to use a potentially weaker form of encryption to protect users' messages, while also forcing the company to retain the ability to monitor those messages and be able to deliver decrypted conversations in response to a warrant - something it cannot do with WhatsApp.

According to sources with direct knowledge of discussions between the government and the company, the legal instrument - officially known as a Technical Capability Notice (TCN) - was not used to force Facebook to include what critics describe as a "backdoor" to access specific WhatsApp messages, because no technological mechanism exists to bypass the encryption protocol that WhatsApp uses.

As one former senior civil servant explained to Sky News, there are two key reasons why the government did not issue a TCN to Facebook regarding WhatsApp - despite repeated complaints about the service from successive home secretaries.

The first was that "there isn't a reasonable method yet" for the company to provide lawful authorities access to the content of targeted messages, simply as a matter of how the technology functions.

A key legal test in the legislation requires it must be "reasonably practicable" for the communications provider to comply with a TCN in order for one to be issued.

However, the encryption protocol that Facebook uses - the Signal protocol, which is becoming an industry standard - has been robustly designed and repeatedly audited by cryptographers to ensure it prevents third parties from accessing the message content.

The second reason, the former civil servant added, was political: "We aren't sure TCNs will work on American companies, and politicians tend not to want to try and find out."

While the technological challenge posed by messages encrypted using the Signal protocol is currently insurmountable, the fear about US-based companies dismissing complaints from foreign jurisdictions appears to be shrinking.

According to sources with knowledge of diplomatic meetings between political envoys from the Five Eyes intelligence alliance, concerns about Facebook's plans are gaining the crucial support of the American government.

Through its own monitoring, Facebook submits thousands of reports to US authorities every year about predators using its platforms to attempt to groom children online, and millions of reports about images and videos featuring child abuse.

These child protection authorities estimate that 70% of Facebook's reports will be lost if the company allows predators and their potential victims to communicate using an end-to-end encrypted service that the company itself can no longer monitor.

Facebook has not disputed this figure, although it argues that it can use the same tools that it uses with WhatsApp - looking for indications of child abuse in the metadata of messages - to detect and tackle predators.

In response to England's children's commissioner, who on Tuesday expressed her concern the company's encryption plans would put children at risk, a spokesperson for the company said: "Child exploitation and grooming have no place on our platforms.

"Facebook has led the industry in developing new ways to prevent, detect, and respond to abuse and we will continue to work with law enforcement to combat criminal activity.

"End-to-end encryption is already the leading technology used by many services to keep people safe and, when we roll it out on our other messaging services, we will build on our strong anti-abuse capabilities at WhatsApp.

"For example, through a combination of advanced technology and user reports, WhatsApp bans around 250,000 accounts each month suspected of sharing child exploitative imagery."

Security sources who spoke to Sky News said there is an important difference between Facebook banning users based on abuse content contained in profile pictures and group names - or on other metadata signals the company could develop - and law enforcement agencies being able to safeguard children and bring prosecutions against offenders with evidence in court.

They added there was also a very significant difference between WhatsApp and Facebook's other services. People talking on WhatsApp have almost always been introduced through some other way. The chance of a child predator randomly typing in a phone number and finding a vulnerable child who will respond to them is extremely low.

However, Facebook as a platform is designed to help users find other people who have similar characteristics to them. If a Facebook user acts like a vulnerable child, then the platform will introduce them to vulnerable children - something child predators are known to take advantage of.

According to Home Office policy advisers, if the UK's new Online Harms bill doesn't introduce an obligation for Facebook to retain its own ability to monitor for child abuse - potentially by making its chief executive, Mark Zuckerberg, personally liable in incidents where the lack of this ability interrupts an investigation - then a TCN could be used to effectively issue an injunction against the company rolling out end-to-end encryption across its social networking services.

There is a concern that such a TCN may not successfully impact the company's decision to implement the encryption if it was made in isolation by the British government, but it could be successful if similar actions were taken by multiple countries working in concert.

To this end, the British government has engaged in a diplomatic strategy of signing multiple joint statements challenging Facebook's plans and conducting envoys to the US.

Sky News has spoken to multiple people with knowledge of these envoys to the US, where British officials have addressed technology companies - including Facebook - and American politicians about the issues of encrypted communications and terrorist content on social media.

Those on the British government side complained to Sky News that - over the course of several years - they have seen "no meaningful progress" on the encryption issue, even as the companies adopted novel technologies to tackle the spread of terrorist propaganda and child abuse material on their platforms.

"End-to-end encryption was always the elephant in the room" at talks on countering this material, one participant told Sky News, while another described the companies as "difficult and intransigent" from the UK government's perspective.

Civil society organisations and technology industry representatives expressed similar disappointment in the value of these meetings, saying that governments were refusing to acknowledge that the technological challenges posed by extremist content were very different to the challenges posed by end-to-end encryption - and alleging an ulterior purpose for the complaints in the government desire to collect public communications.

Chloe Squires, director of national security at the Home Office, provided written testimony to the US Senate last December "to make clear why this is such an important issue for the UK government", in a statement which repeatedly referenced Facebook moving its social networking services to use end-to-end encryption.

In her letter, Ms Squires explained how TCNs worked: "Technical capability notices can't be used to require companies to provide unfettered access to the communications of their users. However, they can provide a legal basis to ask a company to establish a lawful access mechanism to encrypted communications."

She added: "The technical difference we are talking about is whether the provider of a service retains a technical capability to access the content of communications that are already encrypted over that service. It is not the difference between messages being end-to-end encrypted or not encrypted at all."

Preceding Ms Squires' testimony, an open letter addressed directly to Mr Zuckerberg, and signed by British, American, and Australian officials, stated: "Companies should not deliberately design their systems to preclude any form of access to content, even for preventing or investigating the most serious crimes.

"We therefore call on Facebook and other companies to [...] not to implement the proposed changes until you can ensure that the systems you would apply to maintain the safety of your users are fully tested and operational."

Broader international agreement on the issue was stated in a Council of the European Union conclusion on combating child sexual abuse, which urged technology companies "to ensure lawful access for law enforcement [...] to digital evidence, including when encrypted".

The most recent joint statement regarding Facebook's plans was published this October, signed by all of the members of the Five Eyes intelligence alliance, as well as a coalition including India and Japan.

In the eyes of the British government, each of these statements has moved the debate on in terms of the language used to explain the risks posed by Facebook's plans, and to express the coalition's desire that those plans be halted, as well as through the number of international signatories who could potentially issue similar orders to Facebook within their own jurisdictions.

As a Home Office spokesperson told Sky News: "We remain deeply concerned that Facebook's end-to-end encryption plans will remove their ability to proactively detect and report child sexual exploitation and abuse."

"We are not alone in these concerns. International governments, child protection organisations and, most recently, the Children's Commissioner have all called on Facebook not to press ahead, putting millions of children's safety at risk," they added.

Follow this link:
UK has not ordered 'backdoor access' to WhatsApp messages - but could issue injunction against Facebook's encryption plans - Sky News

Read More..