Wednesday, July 07, 2021

RIGHT WING ZIONIST BIAS

Report: Malaysian ‘Troll Army’ Targeted Israelis During Conflict With Hamas

Anti-Israel activists sought to intimidate users on Twitter, Facebook, and WhatsApp
Getty Images

Adam Kredo and Alana Goodman • July 7, 2021 


A series of cyberattacks aimed at shutting down pro-Israel social media accounts and spamming Israelis with abusive messages during the military conflict with Hamas was coordinated by a Malaysian "troll army," according to researchers who have been tracking the network's activities.

The campaign was "organized and led by a network of Malaysian anti-Israel and extremely influential organizations and groups, with hundreds of thousands of combined views and followers," according to research published by the Meir Amit Intelligence and Terrorism Information Center. Thousands of Israelis and pro-Israel leaders were targeted, including high-profile officials such as former prime minister Benjamin Netanyahu.


The "military-grade" attacks—which shut down the WhatsApp number for Israel Defense Force spokesman Avichay Adraee and flooded Israeli actress Gal Gadot's social media with harassing messages—show how anti-Israel activists are increasingly manipulating social media platforms such as Twitter, Facebook, and WhatsApp to crush support for Israel and intimidate the Jewish state's defenders. As anti-Semitism spikes across the globe in the wake of Israel's most recent conflict, there is concern that online vitriol is fueling real world violence—especially when these hacker groups publish personal information.

"The attacks illustrate once again the lack of responsibility by social media platforms to ensure that their users are able to freely express legitimate opinions and to facilitate public debate that does not hinder or silence one side or another of the discourse," the center's research says. "The attacks also illustrate an urgent need among social media platforms to take a more proactive and comprehensive response to ensure that their forums are used appropriately and safely."

A spokeswoman for WhatsApp said the company bans about 3 million accounts each month for engaging in abusive behavior and spam.

"Creating a safe space for users to communicate with one another is a priority and we work to reduce any spam messages that come through our system," the spokeswoman told the Washington Free Beacon.

Facebook and Twitter did not respond to request for comment. The IDF declined to comment.

Postings tied to the Malaysian activists first appeared in mid-May, when Iranian-backed Hamas terrorists fired thousands of missiles at Israel. One Twitter message from that time offered harassment instructions to what it described as a "Malaysian troll army" and a "guerilla army activity for Palestine."

A picture posted along with the Malay-language tweet instructed viewers on how to specifically harass prominent pro-Israel leaders and block their social media accounts. That initial message, sent from a Twitter account with 831 followers, racked up more than 15,000 retweets.

To avoid getting banned on Twitter for spam, the infographic instructed supporters to start sending the harassing messages at 10 a.m. and continue every 5-to-10 minutes for two hours, using phrases that would fly under the radar of Twitter's anti-abuse policy, such as "Israhell," "Filastini," and "zio_nis."


Prominent Malaysian hacking groups also joined the fight, launching cyberattacks on Israelis and pro-Israel leaders. One group, known as DragonForce Malaysia, leaked personal, identifying information, including phone numbers, of Israeli doctors, artists, police officers, and soldiers. This leak led to a massive campaign of harassment on messaging apps like WhatsApp.

The hacking group instructed its followers to "spam" the Israeli phone numbers with just under 10 messages a day "to avoid you being banned by WhatsApp … Goodluck and have fun!"

A group called Tentera Netizen Malaysia, translated as the "Malaysian Army of Internet Citizens," took credit for getting the phone number of IDF spokesman Avichay Adraee banned on WhatsApp by repeatedly reporting it and targeting it with spam. Other trolls posted screenshots of harassing messages they sent to random Israeli WhatsApp accounts, including "You gonna die" and "The world with Palestine!"

Around the same time, a Telegram user identified as Nadir Al-Nuri posted a list of pro-Israel Facebook pages that he said should be targeted. "The intention is to keep them busy with other matters besides hitting our brothers," Al-Nuri wrote on May 14 to his 256,000 followers. That post was viewed at least 138,000 times.


A similar list of pro-Israel Twitter accounts was also posted and reposted across Twitter. Users identified Al-Nuri as the list's creator. These lists were posted along with "instructions on how to block the pro-Israel influencers' Twitter accounts by entering incorrect passwords with the influencers' username multiple times."

"These Malaysian groups designed and disseminated among their followers detailed instructions on how to attack, whom to attack and what content to use," according to the research. "The attacks took place using two main methods, namely by harassing and trolling pro-Israel accounts and by suspending or blocking pro-Israel accounts."

Activists associated with the anti-Israel network also used coded hashtags to amplify their messages. In some cases, these postings were mentioned more than half a million times, with a total reach of more than 250 million users.

Such hacking attacks are not new. The New York Times reported last month that Iranian agents infiltrated groups on social media and messaging applications as part of a disinformation campaign against Israel.

Update 3:20 p.m.: This post has been updated with comment from WhatsApp.
Code in huge ransomware attack written to avoid computers that use Russian, says new report

"They don't want to annoy the local authorities, and they know they will be able to run their business much longer if they do it this way," said an expert.

Red Square in Moscow last month. Most ransomware originates in Russia and the former Soviet Union, experts say.Alexander Zemlianichenko / AP
AND ALBANIA, NORTH KOREA, ESTONIA, ETC ETC


July 7, 2021, 10:00 AM MDT
By Ken Dilanian


WASHINGTON — The computer code behind the massive ransomware attack by the Russian-speaking hacking ring REvil was written so that the malware avoids systems that primarily use Russian or related languages, according to a new report by a cybersecurity firm.

It's long been known that some malicious software includes this feature, but the report by Trustwave SpiderLabs, obtained exclusively by NBC News, appears to be the first to publicly identify it as an element of the latest attack, which is believed to be the largest ransomware campaign ever.

Biden under pressure as Russian cybercriminals claim credit for ransomware attackJULY 6, 202100:53


"They don't want to annoy the local authorities, and they know they will be able to run their business much longer if they do it this way," said Ziv Mador, Trustwave SpiderLabs' vice president of security research.


Click here to read the report

The new revelation underscores the extent to which most ransomware originates in Russia and the former Soviet Union, and highlights the challenge facing the Biden administration as it contemplates a possible response.

Biden said Tuesday his administration has not yet determined where the latest attack originated. It does not appear to have had a significant disruptive impact inside the U.S., but it is being called the largest ransomware attack in history by volume, having infected some 1,500 organizations, according to security researchers.

The attack was particularly sophisticated, using a previously unknown software flaw — a "zero day" vulnerability — to infect an IT firm, that then infected other IT firms, that then infected hundreds of customers.


VIDEO 03:34 Can cyber insurance keep up with the growing number of ransomeware attacks?  JULY 6, 2021

Trustwave said the ransomware "avoids systems that have default languages from what was the USSR region. This includes Russian, Ukrainian, Belarusian, Tajik, Armenian, Azerbaijani, Georgian, Kazakh, Kyrgyz, Turkmen, Uzbek, Tatar, Romanian, Russian Moldova, Syriac, and Syriac Arabic."

In May, cybersecurity expert Brian Krebs noted that ransomware by DarkSide, the Russia-based group that attacked Colonial Pipeline in May, "has a hard-coded do-not-install list of countries," including Russia and former Soviet satellites that mostly have favorable relations with the Kremlin.


Colonial operates the largest fuel pipeline in the U.S. and was forced shut down all operations for days while trying to get back online, resulting in gas shortages across the country.

In general, criminal ransomware groups are allowed to operate with impunity inside Russia and other former Soviet states as long as they focus their attacks on the United States and the West, experts say.

Krebs noted that in some cases, the mere installation of a Russian language virtual keyboard on a computer running Microsoft Windows will cause malware to bypass that machine.

The Biden administration is trying to harness global support to pressure Russia and its neighbors to crack down.
Nothing like the mafia: cybercriminals are much like the everyday, poorly paid business worker


New research is questioning the popular notion that cybercriminals can make millions of dollars from the comfort of home — and without much effort.

Our paper, published in the journal Trends in Organised Crime, suggests offenders who illegally sell cybercrime tools to other groups aren’t promised automatic success.

Indeed, the “crimeware-as-a-service” market is a highly competitive one. To succeed, providers have to work hard to attract clients and build up their criminal business.

They must combine their skills and employ business acumen to attract (and profit from) other cybercriminals wanting their “services”. And the tactics they use more closely resemble a business practice playbook than a classic Mafia operation.

Read news coverage based on evidence, not alarm.Get newsletter
The online trade of DDoS stressers

Using social network analysis, we studied crimeware-as-a-service payment patterns online.

Read more: Prosecuting within complex criminal networks is hard. Data analysis could save the courts precious time and money

Specifically, we looked at a Distributed Denial of Service (DDoS) stresser. A “DDoS stresser”, also called an IP booter, is an online tool that offenders can rent to launch DDoS attacks against websites.

In such attacks, the targeted website is bombarded with numerous log-on attempts all at once. This clogs up the site’s traffic and leads to all users being denied access, effectively causing the site to crash.
Buy your VIP cybercrime membership today

The stresser we analysed was taken down by Dutch law enforcement after six months of operation. Since all the identities involved were anonymised, we’ve called it StressSquadZ.

We explored StressSquadZ’s service operations and payment systems to observe how its service provider interacted with customers. Contrary to the idea of organised cybercrime looking like a cyberpunk version of The Godfather, their strategies seemed to come straight from a business playbook.

StressSquadZ’s provider offered clients a range of marketing and subscription plans. These started at an introductory trial price of US$1.99 for ten minutes of limited service, through to pricier options. Clients wanting a “full power” attack could buy a VIP bespoke service for US$250.

Clearly, StressSquadZ’s provider had a hankering to maximise profit. And just as we all appreciate a good bargain, their customers aimed to pay as little as possible.

Read more: MyGov's ill-timed meltdown could have been avoided with 'elastic computing'
(Cyber)crime doesn’t always pay

The communication data we analysed, mapped below, indicated the clientele compromised of three distinct groups of hackers: amateurs (red), professionals (green) and skilled non-professionals (yellow).
Some users who started with buying trials later graduated to more expensive premium services, which were pathways into more powerful attacks. The lines in this figure represent payments for DDoS stresser services.

The low-impact trial plan was the most popular purchase. These users, which made up about 40% of the total customer pool, are very likely driven by the thrill of transgression rather than pure criminal intent.

A smaller group had more serious intentions, as their more expensive subscription levels indicated. Having invested more, they’d need a higher return on their investment.

Notably, we found the average yield for those involved was low, compared to yield obtained during other cybercrime operations studied. In fact, StressSquadZ operated at a loss for most of its life.

Two things help explain this. First, the service was short-lived. By the time it started gaining traction, it was shut down. Also, it was competing in a large market, losing potential customers to other similar service providers.
Complicit in the act

While stressers can be used legally to test the resilience of security systems, we found the main intent to use StressSquadZ’s was as an attack vehicle against websites.

There was no attempt by the service provider to prevent clients from illegal use, thus making them a facilitator of the crime. This in itself is a crime under computer misuse legislation in most Australian jurisdictions.

That said, the group of criminals tapping into StressSquadZ was very different to a more archetypal and hierarchical criminal group, such as the Mafia. Without a “boss” StressSquadZ was sometimes disorganised and duties and benefits were more equally distributed.
We now face fewer (but stronger) DDoS attacks

The emergence of DDoS stressers over the past decade has actually led to an overall reduction in the number of DDoS attacks.

According to CRITiCaL project, out of 10,000 cyberattacks between 2012 and 2019 – of which 800 were DDoS attacks – the number of attacks fell from 180 in 2012 to fewer than 50 last year.

This may be because individual attacks are now more powerful. Early DDoS attacks were weak and short in duration, so cyber security systems could overcome them. Attacks today carry out their purpose, which it to invalidate access to a system, for a longer duration.

There’s been a massive increase in the scope and intensity of attacks over the past decade. Damage once done on a megabyte scale has now become gigabytes and terabytes.
This graph shows the increase in size of DDoS attacks in megabytes from 2007 to 2018. Carlos Morales/Arbor Network

DDoS attacks can facilitate data theft or increase the intensity of ransomware attacks.

In February, they were used as a persistent threat to seek ransom payments from various Australian organisations, including banks.

Read more: Australia is under sustained cyber attack, warns the government. What's going on, and what should businesses do?

Also in February we witnessed one of the most extreme DDoS attacks in recent memory. Amazon Web Services was hit by a sustained attack that lasted three days and reached up to 2.3 terabytes per second.

The threat from such assaults (and the networks sustaining them) is of huge concern — not least because DDoS attacks often come packaged with other crimes.

It’s helpful, however, to know stresser providers use a business model resembling any e-commerce website. Perhaps with this insight we can get down to business taking them down.


Authors
Roberto Musotto
Research fellow, Edith Cowan University

David S. Wall
Professor of Criminology, University of Leeds
Disclosure statement

David S. Wall receives funding from the EU (TAKEDOWN Project - Horizon 2020, Grant 700688) and the EPSRC CRITiCal project (EP/M020576/1).








CRIMINAL CAPITALI$M
Holding the world to ransom: the top 5 most dangerous criminal organisations online right now


July 7, 2021 

On the internet, nobody knows you’re a dog!

These words from Peter Steiner’s famous cartoon could easily be applied to the recent ransomware attack on Florida-based software supplier Kaseya.

Kaseya provides software services to thousands of clients around the world. It’s estimated between 800 and 1,500 medium to small businesses may be impacted by the attack, with the hackers demanding US$50 million (lower than the previously reported US$70 million) in exchange for restoring access to data being held for ransom.

The global ransomware attack has been labelled the biggest on record. Russian cybercriminal organisation REvil is the alleged culprit.

Despite its notoriety, nobody really knows what REvil is, what it’s capable of or why it does what they does — apart from the immediate benefit of huge sums of money. Also, ransomware attacks often involve vast distributed networks, so it’s not even certain the individuals involved would know each other.

Ransomware attacks are growing exponentially in size and ransom demand — changing the way we operate online. Understanding who these groups are and what they want is critical to taking them down.

Here, we list the top five most dangerous criminal organisations currently online. As far as we know, these rogue groups aren’t backed or sponsored by any state.
DarkSide

DarkSide is the group behind the Colonial Pipeline ransom attack in May, which shut down the US Colonial Pipeline’s fuel distribution network, triggering gasoline shortage concerns.

The group seemingly first emerged in August last year. It targets large companies that will suffer from any disruption to their services — a key factor, as they’re then more likely to pay ransom. Such companies are also more likely to have cyber insurance which, for criminals, means easy moneymaking.

DarkSide’s business model is to offer a ransomware service. In other words, it carries out ransomware attacks on behalf of other, hidden perpetrator/s so they can lessen their liability. The executor and perpetrator then share profits.

Groups that offer cybercrime-as-a-service also provide online forum communications to support others who may want to improve their cybercrime skills.

This might involve teaching someone how to combine distributed denial-of-service (DDoS) and ransomware attacks, to put extra pressure on negotiations. The ransomware would prevent a business from working on past and current orders, while a DDoS attack would block any new orders.
REvil

The ransomware-as-a-service group REvil is currently making headlines due to the ongoing Kaseya incident, as well as another recent attack on global meat processing company JBS. This group has been particularly active in 2020-2021.
REvil’s HappyBlog web site showing US$70m ransom demand. Author provided

In April, REvil stole technical data on unreleased Apple products from Quanta Computer, a Taiwanese company that assembles Apple laptops. A ransom of US$50 million was demanded to prevent public release of the stolen data. It hasn’t been revealed whether or not this money was paid.
Clop

The ransomware Clop was created in 2019 by a financially-motivated group responsible for yielding half a billion US dollars.

The Clop group’s speciality is “double-extortion”. This involves targeting organisations with ransom money in exchange for a decryption key that will restore the organisation’s access to stolen data. However, targets will then have to pay extra ransom to not have the data released publicly.

Historical examples reveal that organisations which pay a ransom once are more likely to pay again in the future. So hackers will tend to target the same organisations again and again, asking for more money each time.
ClopLeaks website showing directly downloadable ransom files. Author provided


Syrian Electronic Army


Far from a typical cybercrime gang, the Syrian Electronic Army has been launching online attacks since 2011 to promote political propaganda. With this motive, they have been dubbed a hactivist group.

While the group has links with Bashar al-Assad’s regime, it’s more likely made up of online vigilantes trying to be media auxiliary for the Syrian army.

Their technique is to distribute fake news through reputable sources. In 2013, a single tweet sent by them from the official account of the Associated Press, the world’s leading news agency, had the effect of wiping billions from the stock market.
The fake AP tweet from the Syrian Electronic Army. www.theatlantic.com/

The Syrian Electronic Army exploits the fact that most people online have a tendency to interpret and react to content with an implicit sense of trust. And they’re a prime example of how the boundaries between crime and terror groups online are less distinct than in the physical world.
FIN7

If this list could contain a “super villain”, it would be FIN7. Another Russian-based group, FIN7 is arguably the most successful online criminal organisation of all time. Operating since 2012, it mainly works as a business.

Many of its operations have been undetected for years. Its data breaches have exploited cross-attack scenarios, wherein the data breach serves multiple purposes. For example, it may enable extortion through ransom while also allowing the attacker to use data against victims, such as by reselling it to a third party.

In early 2017, FIN7 was alleged to be behind an attack targeting companies providing filings to the US Security and Exchange Commission. This confidential information was exploited and used to obtain ransom which was then invested on the stock exchange.

As such, the groups made huge sums of money by trading on confidential information. The insider trading scheme facilitated by hacking went on for many years — which is why it’s not possible to quantify the exact amount of economic damage. But it’s estimated to be well over US$1 billion.
Organised crime vs organised criminals

When it comes to complex criminal organisations, techniques evolve and motives vary.

The way they organise themselves and commit crimes online is very different from your local offline gang. Ransomware can be launched from anywhere in the world, so it’s very difficult to prosecute these criminals. Matters are made even more complicated when several parties coordinate across borders.

It’s no wonder the challenge for law enforcement agencies is significant. It’s crucial that authorities investigating an attack are sure it was indeed perpetrated by who they suspect. But to know this, they need all the help they can get.






Authors
Roberto Musotto

Research fellow, Edith Cowan University
Brianna O'Shea

Lecturer, Ethical Hacking and Defense, Edith Cowan University
Paul Haskell-Dowland

Associate Dean (Computing and Security), Edith Cowan University
Disclosure statement







POST-FORDISM 2.0
Bugatti merges with Rimac and announces a hybrid/electric future
By Loz Blain
July 06, 2021


Bugatti and Rimac have merged to form Bugatti Rimac, with Mate Rimac as CEO, in a blockbuster deal
Bugatti Rimac

After months of rumors, the blockbuster hypercar business deal of the decade is now official: storied brand Bugatti, with its 112-year history of ultra-exclusive automaking, is now majority owned by 12-year-old Croatian electric hypercar upstart Rimac Automobili.

Bugatti was founded in France back in 1909, and made some of the world's most famous and influential race cars, luxury cars and sports cars. It was a high-end, boutique automotive powerhouse right through until the death of its founder Ettore Bugatti in 1947, after which things slowly trickled to a halt in 1963.

The brand was resurrected in the late 1980s to build the EB110, a V12 supercar with a carbon fiber chassis, but really rocketed into prominence again when Volkswagen acquired Bugatti in 1998 and set about building the world's first production hypercar.

The Bugatti Veyron smashed every paradigm in the supercar world to create a class all of its own. It was the most powerful production car in history, debuting with 1,001 horsepower. It was the fastest, too, with its Super Sport version averaging 431.072 km/h (267.856 mph) to seize the title of world's fastest production car between 2010 and 2017, when it was displaced by Koenigsegg's Agera. Bugatti's follow-up car, the Chiron, was unofficially the first car in the world to break the 300-mph (482.8-km/h) mark.


The Chiron and Nevera are two of the most important hypercars of this generation. The Porsche is pretty decent too.
Bugatti Rimac


It's fair to say Volkswagen thoroughly reinvigorated the Bugatti brand under its stewardship, and now it's passing the torch to 33-year-old wunderkind Croatian EV genius Mate Rimac as the electric era dawns.

Rimac, of course, has just launched his own groundbreaking hypercar. The Rimac Nevera, some 12 years in the making, is itself a technological wonder, a 1,914-horsepower, 1,741 lb-ft (2,360-Nm) AWD all-electric widowmaker that can catapult you to 60 mph (96 km/h) from a standstill in 1.85 seconds.


Under the terms of the deal announced today, a new company has been created, called Bugatti Rimac. This isn't the world's most imaginative name, but we can see why they steered clear of Bumac or Rimatti.

Bugatti Rimac will be 55 percent owned by Rimac Group, with the other 45 percent owned by Porsche. Mate Rimac will be CEO, and this new entity will own both Bugatti Automobiles and Rimac Automobili. Both companies will continue to have their own factories and distribution networks.

Rimac and Bugatti will keep their separate headquarters and production facilities for the time being
Bugatti Rimac


Does this mean Bugatti is going fully electric? Surprisingly enough, no. It'll continue to manufacture its current range, including the Chiron, for the moment, and while upcoming products will definitely be fusions of Bugatti and Rimac DNA, Top Gear reports the combustion engine will live on in future hybrid Bugattis alongside fully electric cars – and Rimac won't be confining Bugatti just to the hypercar realm, hinting that the brand might expand back into the ultra-luxury realm as well in the coming years.

Rimac Group is also splitting out its EV technology business into a new, fully independent entity called Rimac Technology, which will continue to sell powertrain, battery, infotainment, e-axle, connectivity and other technologies developed for the Nevera hypercar to other manufacturers, including Porsche, Koenigsegg, Hyundai, Aston Martin, Pininfarina and others. This company stays 100 percent under Rimac Group ownership.

Rimac also recently announced an €200-million (US$238-million) Rimac Campus development to house the companies, including Rimac's own test track, kindergarten and gym. Spread across a 100,000-square-meter (1,076,400-sq-ft) location just outside Zagreb, the Croatian capital, and ready to accommodate a workforce two and a half times bigger than the 1,000-odd employees currently working for Rimac, the new campus begins construction in the next few months and is scheduled for completion in 2023.


You can watch the entire launch event, set in a spectacular castle in Dubrovnik, in the video below.

Rimac Live Event — Bugatti Rimac Announcement

Source: Rimac/Bugatti
WORTH REPEATING
Iceland’s short work week trial declared an “overwhelming success”

By Rich Haridy
July 05, 2021



A trial looked at how reducing a work week to 35 or 36 hours affected worker well-being and productivity
johnkwan/Depositphotos


A massive five-year trial in Iceland exploring the effects of a shorter working week is reporting significantly positive outcomes. The results suggest cutting just four or five hours from a standard work week can lead to dramatic increases in worker well-being and improvements in productivity.

The five-day, 40-hour work week was well and truly entrenched in the 20th century. Previously, the industrial revolution resulted in work dominating life to such an unhealthy extent it wasn’t unusual for people to work 16 hours a day, six days a week. Across the late 1800s demand for better regulation of work hours ultimately culminated in US federal laws setting the maximum work week at 40 hours, with overtime for hours worked beyond that threshold.

More recently there has been a growing push to again cut our standard work week down. This primarily has come from several prominent “four-day week” experiments, showing great benefits in cutting the work week down from five days.

A significant New Zealand trial in 2018 found widespread improvements in productivity and worker engagement after asking workers to deliver the same output as usual across a four-day work week. Their pay remained the same, the participants simply worked 30 hours across four days instead of 37.5 hours over five days. A Swedish trial saw similar benefits testing six-hour work days.

These experiments with alternative work weeks take a number of forms, from reducing one’s total work hours over five days to cramming extra hours into a four-day week. The Iceland trial demonstrates how broadly a shortened work week can be applied, looking at around 2,500 workers across a variety of industries.

The trial first started small, initiated by the Reykjavik City Council. A few dozen employees were offered 40 hours of pay but directed to only work 35 or 36 hours every week. Early results proved successful and over the subsequent years the trial was expanded to include a number of different workplaces, including schools, hospitals and police.

Across all metrics the experiment was found to be a success. Productivity either improved or remained the same in the vast majority of workplaces trialed. And worker well-being and health dramatically improved.


“This study shows that the world’s largest ever trial of a shorter working week in the public sector was by all measures an overwhelming success,” says Will Stronge, director of research at Autonomy, a UK organization tasked with analyzing the data. “It shows that the public sector is ripe for being a pioneer of shorter working weeks – and lessons can be learned for other governments.”

Unlike other trials testing more strict formulas, such as a specific four-day work week, this trial tasked its participants with finding their own individual ways of making the shorter week work. Some workers took a half day off once a week, others took a full day off every fortnight.

Workplaces changed internal processes to maintain productivity across shorter hours. This manifested in briefer, more focused meetings and new strategies for increased workflows.

Shift workers saw restructured shift patterns, with amended and often flexible start or end times. Even police stations experimented with different work hours, finding benefits to changing conventional shift patterns.

“In a police station, hours for investigative officers were shortened every other week, so that workers would leave one hour early on Monday to Thursday (8:00 to 15:00), and four hours early on Fridays (8:00 to 12:00),” the report states. “The next week they would work longer days (8:00 to 16:00). This way every other week was shortened by eight hours. Staff working around the clock had a different pattern.”

The report notes the key to successfully deploying a shortened work week is, “flexibility in how tasks were completed, how hours of work and shifts were constructed, combined with interest and engagement in the process of shortening hours from the workplace.”


The trial has proved so successful in Iceland that since its completion 86 percent of the country’s entire working population has either directly moved to a shorter work week or been offered that opportunity.

The report notes a significant amount of evidence correlating increased productivity with shorter work hours. It’s unsurprising people feel better when they work less but perhaps what is surprising is how productivity generally increases when people work shorter hours.

As work hours increased between 2005 and 2015 productivity per hour decreased
Alda, Association for Democracy and Sustainability, 2021


Data spanning 10 years reveals most wealthy European countries show productivity per hour dropping as working hours increase. This relationship reverses as work hours reduce, with a correlation often seen between increased productivity and shortened work hours.

Gudmundur Haraldsson, a researcher working on the new report, says the findings from this massive trial present a roadmap for future work reforms, demonstrating how shorter work weeks can improve outcomes for both businesses and individuals.

“The Icelandic shorter working week journey tells us that not only is it possible to work less in modern times, but that progressive change is possible too,” says Haraldsson. “Our roadmap to a shorter working week in the public sector should be of interest to anyone who wishes to see working hours reduced.”


Sources: Autonomy, Alda


1933


World's first 3D-printed school tackles classroom shortages in Africa
By Nick Lavars
July 05, 2021

Having completed the world's first 3D-printed school in Malawi, 14Trees now hopes to carry out similar projects in Kenya and Zimbabwe
CDC Group

Through pioneering projects in Mexico, China, Texas and elsewhere, we're starting to see how 3D printing can make building construction a whole lot more cost effective. An affordable housing venture in Africa named 14Trees has now leveraged the technology to produce the world's first 3D-printed school in Malawi, where students started taking their first lessons late last month.

14Trees is a joint effort between the UK's CDC Group and construction multinational LafargeHolcim, and is looking to help address housing shortages in Africa. As we've seen with other 3D-printed construction projects, the team uses a large extruder to form the walls of structures before the finishing touches, like windows, doors, roofing and various fittings, are added by skilled workers.

This approach can greatly reduce the time of construction and its impact, with CDC Group claiming the technique reduces the environmental footprint of constructing new buildings by 50 percent. 14Trees began scaling up its operations in Africa late last year, and recently completed the first 3D-printed "affordable" house in Africa, printing the walls in just 12 hours.

Along with a housing shortage, there is also a great need for new schools in Malawi, with UNICEF estimating that the shortage of 36,000 classrooms in the country would take 70 years to build. With the help of 3D printing, 14Trees believes this gap could be addressed in as little as 10 years.


Classes began at the world's first 3D-printed school in Malawi on June 21

CDC Group

The organization's first school was built in the district of Salima, with the walls printed in just 18 hours, compared to the several days required by conventional methods. It was then officially transferred to a village community in the Yambe zone, with classes then beginning on June 21.

“Before, we had 12 schools in the Yambe zone; we now have 13 – with this new 3D-printed school," says Juliana Kuphanga Chikandila, a Primary Education Advisor in Malawi. "To increase our supply of education to children, we need a total of four more primary schools in the Yambe zone, but as a district, we need approximately 50 more schools to serve those in need. I am very impressed by the new building – its durability and design provide the space and facilities that students did not have before; teaching and learning can now happen inside and outside the classroom."


With the world's first 3D-printed school now complete in Malawi, 14Trees will now look to build on this proof of concept with further projects in Kenya and Zimbabwe. Elsewhere, a 3D-printed school is also planned for Madagascar, with construction to take place sometime this year.

The short video below offers a look at the 14Trees 3D printing process.

14Trees pioneers 3D printing technology in Africa for affordable housing and schools

Source: CDC Group
UK Ministry of Defence developing missiles that talk to each other
By David Szondy
July 03, 2021



The CSTWD program will allow next-generation missiles like the Spear 3 to communicate with one another


The British Ministry of Defence is investing £3.5 million (US$4.8 million) in the Defence Science Technology Laboratory (Dstl) for the Co-operative Strike Weapons Technology Demonstrator (CSWTD) program to develop new systems that will allow missiles in flight to communicate with one another.


Back in the 1960s, the first laser-guided munitions were nicknamed "smart bombs." These could simply be steered toward their target by a pilot or weapons officer, but five decades later we're seeing an emerging generation of weapons that are smart in the very real sense that they can gather data, assess situations, and alter their plans to achieve their objectives.

The problem is that for such weapons to be effective, they need to be able to operate as a team rather than in a top-down fashion. The current generation of missiles can talk to their launcher, but not to one another. This is a considerable drawback with weapons that are able to adapt to their situation and need to inform their fellow missiles of the situation.

To remedy this, the CSWTD will look at developing both new hardware and new software that will make missiles more cooperative, as well as studying how to apply them to real-world scenarios. The new program is part of a larger £6-billion (US$8-billion) research and development budget by the ministry.


The two-year project began in April 2021 and the new technology could be integrated into a smarter integrated network of missiles within five years.

"Currently missiles can communicate with the launch platform but not each other," says a Dstl scientist identified as Charlie. "The aim of this program is to investigate how inter-missile communication and cooperative behaviors can be technically achieved to solve UK military challenges"

Source: Ministry of Defence


  

Fronius rolls out its first customer SolHub solar-to-hydrogen station
By Loz Blain
June 30, 2021

Visualization of the SAN Biotech Park under construction in Herzogenburg, with its huge 1.5 MW solar array on top
SWAP Arcitectur / Janusch - the visual collective / SAN Group

Well-respected Austrian solar energy company Fronius has broken ground on its first customer green hydrogen hub, giving us a good look at what it'll take to run a fleet of vehicles on green hydrogen produced entirely on-site using solar panels.

The first Fronius SolHub is under construction as part of SAN Group's new hydrogen facility in Herzogenburg, Lower Austria. Producing an average of around 100 kg of clean hydrogen a day, it'll be used as a filling station for SAN's own hydrogen vehicles. SAN is also working out deals with other companies interested in potentially running their own similar hubs, to use this facility as a demonstrator of sorts.

The aim here is to generate hydrogen fuel in a completely standalone, self-contained and clean fashion, and to do so, the SolHub requires some 1.5 megawatts of photovoltaic panels. That's not a small installation – the average home rooftop system is typically around 3-6 kilowatts, to put things in context. For 1.5 MW of solar, you're looking at some 5,000 or more panels, taking up close to 100,000 square feet (9,000 square meters) of space.

A prototype SolHub unit at Fronius's research and development site
Fronius

One hundred kilograms of green hydrogen a day will fully fuel around 16 typical fuel cell passenger cars, or power some 1,500 km (930-odd miles) of bus or truck travel.

Fronius is investing quite a bit on hydrogen, and is soon to begin construction on a new "hydrogen competence center" in Steinhaus, where it plans to accelerate R&D as well as production of H2 systems. This first SolHub installation is expected to be complete and commissioned by the spring of 2022.

Source: Fronius

 

Colombia used ‘excessive’ force against protesters: IACHR

Inter-American Commission on Human Rights urges Colombia to make structural changes to its militarised police force.


Demonstrators clash with police during anti-government protests in Medellin on June 28, 2021 [File: Santiago Mesa/Reuters]
Demonstrators clash with police during anti-government protests in Medellin on June 28, 2021 [File: Santiago Mesa/Reuters]

Bogota, Colombia – The Colombian government used “excessive and disproportionate” force during mass protests earlier this year, the Inter-American Commission on Human Rights (IACHR) said in a long-awaited report released on Wednesday.

The IACHR, an autonomous body in the Organization of American States, called on the South American nation to make structural changes to its militarised police force, which has been accused of committing “egregious” abuses against protesters.

“The response of the state was characterised by an excessive and disproportionate use of force, in many cases, including lethal force,” IACHR President Antonia Urrejola said during a press conference.

The protests, known as the Paro Nacional, erupted in April as a pushback against a controversial tax reform bill and inequalities caused by the pandemic.

After the largely peaceful demonstrations resulted in a harsh crackdown by police forces, the protests quickly expanded into a reaction to state violence, gripping the South American country for months.

Human Rights Watch has confirmed that 34 people – largely protesters and civilian bystanders – were killed during the protests. Other activist organisations put that death count even higher.]

Other alleged human rights violations, including sexual abuse by riot police, forced disappearances and many injuries, prompted the visit of the human rights panel in early June.

The highly critical IACHR report followed a detailed investigation into the state’s response to the protests, which included testimony from more than 500 people including government officials, human rights defenders and violence victims in protest hotspots like the cities of Cali and Bogota.

The commission documented law enforcement’s indiscriminate use of firearms against protesters and civilians not participating in protests, gender-based violence and the use of violence against journalists and medical staff.

It also called on President Ivan Duque‘s administration to investigate abuses and protect the right to protest.

The report was welcomed by international observers like Gimena Sánchez-Garzoli, Andes director of the Washington Office on Latin America, who said the report also rejects the narrative by Duque and his party that protesters are vandals and criminals.

“They’ve been blaming the opposition, blaming everybody and not looking inward,” Sánchez-Garzoli said. “I think this report shows that attitude is not what the international community accepts.”

Demonstrators gather at the Los Heroes monument during a protest to demand government action to tackle poverty, police violence and inequalities, in Bogota on May 28 [File: Santiago Mesa/Reuters]
The human rights panel offered more than 40 recommendations to the Colombian government, most notably urging it to separate Colombian police from the country’s military.

Like the army, Colombian police fall under the jurisdiction of the country’s defence ministry, a product of decades of armed conflict.

But that structure has led to militarised law enforcement – notably by the riot police, ESMAD – that has been heavily criticised by the Colombian public and international observers.

Sergio Guzmán, director of Colombia Risk Analysis, said the recommendations “lend credibility” to longtime calls to demilitarise police forces.

“In a country under conflict it makes sense to have all military and police authorities under this same chain of command, but that’s not the same case today,” Guzmán said.

While Duque has pledged police reforms including increased officer training and different disciplinary standards for officers, Guzmán doubts that the Duque administration will implement many of the suggestions made in the report.

The government already has rejected a number of the suggestions, while Duque and members of his party criticised the report on Wednesday morning, continuing to decry “acts of vandalism” and “roadblocks that violate the rights of citizens”.

“No one can recommend that a country be tolerant of criminal acts,” the president said to a group of journalists on Tuesday.

While protest organisers have temporarily suspended the demonstrations, Guzmán predicted only more protests are on the horizon if significant changes are not made.

“The underlying reasons people have for protesting aren’t resolved: unemployment, unequality, corruption, urban poverty,” he said. “As there’s no reform for police – how police conduct their jobs, how police deal with protests – that’s likely to be a trigger for future unrest.”

SOURCE: AL JAZEERA