Home Tags British Airways

Tag: British Airways

Canadian family posted bite pictures afterward.

Airline upgraded their next flight.
EnlargeLAM Mozambique Airlines reader comments 2 Share this story LAM Mozambique Airlines has told Portuguese-language media that one of its aircraft was struck Thursday, possibly by a drone.
In a Facebook post, the airline said that the crew of the Boeing 737 heard a bang, suggesting that some sort of “external body” hit the aircraft.

The 737 was flying from Maputo and on approach to Tete airport when the incident occurred. The Aviation Herald wrote that “a post flight examination revealed a drone had impacted the right hand side of the radome.” The website Mozambicano also reported the drone strike.

The aircraft apparently landed safely with 80 passengers and six crew members on board. In April 2016, British Airways reported that one of its aircraft may have hit a drone while landing at London Heathrow Airport. Hundreds of near-misses have been reported at airports across the United States in recent years.

Flying a drone within five miles of an airport in the United States is illegal, largely for safety reasons.
EnlargeLe Monde reader comments 7 Share this story GCHQ and the NSA have spied on air passengers using in-flight GSM mobile services for years, newly-published documents originally obtained by Edward Snowden reveal. Technology from UK company AeroMobile and SitaOnAir is used by dozens of airlines to provide in-flight connectivity, including by British Airways, Virgin Atlantic, Lufthansa, and many Arab and Asian companies. Passengers connect to on-board GSM servers, which then communicate with satellites operated by British firm Inmarsat. "The use of GSM in-flight analysis can help identify the travel of a target—not to mention the other mobile devices (and potentially individuals) onboard the same plane with them," says a 2010 NSA newsletter. A presentation, made available by the Intercept, contains details of GCHQ's so-called "Thieving Magpie" programme. GCHQ and the NSA intercepted the signals as they were sent from the satellites to the ground stations that hooked into the terrestrial GSM network.
Initially, coverage was restricted to flights in Europe, the Middle East, and Africa, but the surveillance programme was expected to go global at the time the presentation was made. GCHQ's Thieving Magpie presentation explains how in-flight mobile works. Le Monde Ars has asked these three companies to comment on the extent to which they were aware of the spying, and whether they are able to improve security for their users to mitigate its effects, but was yet to receive replies from Inmarsat or AeroMobile at time of publication. A SitaOnAir spokesperson told Ars in an e-mail: The article and documentation which you highlight makes reference to interception of a signal as it is transited through a satellite network.

The SitaOnAir service uses an Inmarsat satellite constellation for backhaul.

As would be the case for any mobile network operator, SitaOnAir's ground infrastructure contains various elements of security protection. The Thieving Magpie presentation explains that it is not necessary for calls to be made, or data to be sent, for surveillance to take place.
If the phone is switched on, and registers with the in-flight GSM service, it can be tracked provided the plane is flying high enough that ground stations are out of reach. The data, we're told, was collected in "near real time," thus enabling "surveillance or arrest teams to be put in place in advance" to meet the plane when it lands. Using this system, aircraft can be tracked every two minutes while in flight. If data is sent via the GSM network, GCHQ's presentation says that e-mail addresses, Facebook IDs, and Skype addresses can all be gathered. Online services observed by GCHQ using its airborne surveillance include Twitter, Google Maps, VoIP, and BitTorrent. Meanwhile, Le Monde reported that "GCHQ could even, remotely, interfere with the working of the phone; as a result the user was forced to redial using his or her access codes." No source is given for that information, which presumably is found in other Snowden documents, not yet published. As the French newspaper also points out, judging by the information provided by Snowden, the NSA seemed to have something of a fixation with Air France flights.

Apparently that was because "the CIA considered that Air France and Air Mexico flights were potential targets for terrorists." GCHQ shared that focus: the Thieving Magpie presentation uses aircraft bearing Air France livery to illustrate how in-flight GSM services work. Ars asked the UK's spies to comment on the latest revelations, and received the usual boilerplate response from a GCHQ spokesperson: It is longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ's work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary, and proportionate, and that there is rigorous oversight, including from the secretary of state, the interception and intelligence services commissioners, and the parliamentary intelligence and security committee. All our operational processes rigorously support this position.
In addition, the UK's interception regime is entirely compatible with the European Convention on Human Rights. So that's OK, then. This post originated on Ars Technica UK
reader comments 148 Share this story
Allow Harry Brignull to explain. It happens to the best of us.

After looking closely at a bank statement or cable bill, suddenly a small, unrecognizable charge appears.

Fine print sleuthing soon provides the answer—somehow, you accidentally signed up for a service. Whether it was an unnoticed pre-marked checkbox or an offhanded verbal agreement at the end of a long phone call, now a charge arrives each month because naturally the promotion has ended.
If the possibility of a refund exists, it’ll be found at the end of 45 minutes of holding music or a week’s worth of angry e-mails. Everyone has been there.
So in 2010, London-based UX designer Harry Brignull decided he’d document it.

Brignull’s website, darkpatterns.org, offers plenty of examples of deliberately confusing or deceptive user interfaces.

These dark patterns trick unsuspecting users into a gamut of actions: setting up recurring payments, purchasing items surreptitiously added to a shopping cart, or spamming all contacts through prechecked forms on Facebook games. Dark patterns aren’t limited to the Web, either.

The Columbia House mail-order music club of the '80s and '90s famously charged users exorbitant rates for music they didn’t choose if they forgot to specify what they wanted.
In fact, negative-option billing began as early as 1927, when a book club decided to bill members in advance and ship a book to anyone who didn’t specifically decline.

Another common offline example? Some credit card statements boast a 0 percent balance transfer but don’t make it clear that the percentage will shoot up to a ridiculously high number unless a reader navigates a long agreement in tiny print. “The way that companies implement the deceptive practices has gotten more sophisticated over time,” said UX designer Jeremy Rosenberg, a contributor to the Dark Patterns site. “Today, things are more likely to be presented as a benefit or obscured as a benefit even if they’re not.” When you combine the interactive nature of the Web, increasingly savvy businesses, and the sheer amount of time users spend online, it’s a recipe for dark pattern disaster.

And after gaining an awareness for this kind of deception, you’ll recognize it’s nearly ubiquitous. Enlarge / The lowest flight prices are listed up top, right? Right??! DarkPatterns.org Shades of grey With six years of data, Brignull has broken dark patterns down into 14 categories.

There are hidden costs users don’t see until the end.

There’s misdirection, where sites attract user attention to a specific section to distract them from another. Other categories include sites that prevent price comparison or have tricky or misleading opt-in questions. One type, Privacy Zuckering, refers to confusing interfaces tricking users into sharing more information than they want to. (It’s named after Facebook CEO Mark Zuckerberg, of course.) Though perhaps the worst class of dark pattern is forced continuity, the common practice of collecting credit card details for a free trial and then automatically billing users for a paid service without an adequate reminder. But while hackers and even SEO firms are often distinguished as “white hat” or “black hat,” intent isn’t always as clear when it comes to dark patterns. Laura Klein, Principal at Users Know and author of UX for Lean Startups, is quick to point out that sometimes it’s just a really, really poor design choice. “To me, dark patterns are very effective in their goal, which is to trick the user into doing something that they would not otherwise do,” she said.
Shady patterns, on the other hand, simply push the company’s agenda over the user’s desires without being explicitly deceptive. Examples of bad design choices that may be accidental aren’t hard to find.

British Airways lists flights that are the second-lowest price as the lowest, and it’s hard to tell whether this misdirection is intentional.

And examples of deceptive patterns that are, strictly speaking, completely legal are a dime a dozen.

There’s the unclear language hidden in 30-page Terms of Service agreements, which lull users into a sense of complacency as they hit “agree” on every page.
Sometimes users agree to allow apps to post on their Twitter feed or Facebook walls but later forget that this feature is enabled.

The app doesn’t let them know at the moment it’s going to post, of course. “The companies that know what they’re doing operate in sort of a safe zone where they’re not likely to be prosecuted or get into trouble legally,” Brignull explained. Over time, users have been desensitized to these permissions.

There are subscription sites that renew without a reminder a few days in advance or ones that are very easy to sign up for online but then force users to cancel by phone during business hours.

And the vicious cycle of online advertising is even more difficult to pierce.

There are those ads that follow you around the Web, known as behavioral targeting, or those ads based directly on things like your Web history or search terms. Opting out of this is so difficult that UX designer and Dark Patterns contributor James Offer considers that a dark pattern in its own right. Even though the line between outright deception and poor user design is often hard to distinguish, Brignull said “there are some sites where it’s clearly intentional—they’re doing too many things for it to be by accident.” As an example, he points to The Boston Globe, which was recently called out for multiple dark patterns.

Among the offenses, the site didn’t inform subscribers of price increases and buried rates in the site’s FAQ. Listing image by Flickr user: g_cowan Enlarge / This sleight of hand is not as fun nor as harmless as 1980s British magician Paul Daniels. Gary Stone / Getty Images Gripped by numbers Dark patterns may create short-term benefits for companies, but don’t they erode consumer trust over time? Why do this? UX designers told Ars that Dark Patterns are likely a response to company cultures focused on number-based metrics above all else. “I am a huge fan of metrics, but it is one of the dangers of entirely metric-driven companies,” said Klein. “If you’re too metrics-driven, you’re only going to be focused on what moves a particular metric, and you will use any hack or any trick or any deceptive technique to get there.” Klein believes many of the worst dark patterns are pushed by businesses, not by designers. “It’s often pro-business at the expense of the users, and the designers often see themselves as the defender or advocate of the user,” she explained.

And although Brignull has never been explicitly asked to design dark patterns himself, he said he has been in situations where using them would be an easy solution—like when a client or boss says they really need a large list of people who have opted in to marketing e-mails. “The first and easiest trick to have an opt-in is to have a pre-ticked checkbox, but then you can just get rid of that entirely and hide it in the terms of conditions and say that by registering you’re going to be opted in to our e-mails,” Brignull said. “Then you have a 100-percent sign-up rate and you’ve exceeded your goals.
I kind of understand why people do it.
If you’re only thinking about the numbers and you’re just trying to juice the stats, then it’s not surprising in the slightest.” “There’s this logical positivist mindset that the only things that have value are those things that can be measured and can empirically be shown to be true, and while that has its merits it also takes us down a pretty dark place,” said digital product designer Cennydd Bowles, who is researching ethical design. “We start to look at ethics as pure utilitarianism, whatever benefits the most people. Yikes, it has problems.” You can check out anytime you like, but you can never leave Perhaps the most frustrating thing about dark patterns is how difficult it is to get companies to make changes.

They are often unresponsive to user concerns, and it’s much easier (and more profitable) to placate individuals than it is to change an unethical design for the masses.

But when Offer received a refund after accidentally purchasing cancellation protection with a concert ticket, he didn’t think that was good enough. He considered contacting the UK’s Citizen Advice Bureau, but then thought it would just be so much work to try to do so. Sometimes even when users are aware of strange charges, they don’t think the amount of time it would take to fix the issue is worth it.

After all, companies often have a ready response—there are opt outs available, even if the process is obscure and far from transparent, or perhaps users should read the Terms of Service agreement closer despite 4-point font.

About six months ago, I complained to my cable company that I was being charged for Starz—which I didn’t recall signing up for.

The bill was misleading and made it seem like I was not being charged to boot.

The customer service representative was ready: if I’d downloaded the PDF version of the bill rather than the one that’s viewable on the website, the price breakdown would have been more obvious. It’s true that users with eagle eyes and knowledge of these nuances can sometimes circumvent misleading opt-ins. Klein recently did just that when she got a push notification on her phone from Verizon letting her know that she had a voicemail message. Ultimately, the notification was trying to get her to sign a giant terms and conditions page. “It was apparently asking me if I want to see my visual voicemail—and by the way, we’ll charge you $2.99 a month,” she said. "They had given me a free month that I didn’t ask for, and when I went to check my voicemail it asked me to sign up, but it wasn’t clear.
It was a wall of text I had to read.” Just checking a voicemail and clicking “yes” would sign a user up for the service, but Klein was able to recognize what happened. Others aren’t so lucky.
In fact, some users who don’t check their statements closely may not even be aware of surreptitious charges. Oh, sure I'll sign up for a one-month free trial from Stamps.com (thanks podcast!). Wait, what's this charge? Why was I auto-enrolled in month two and now unable to close my account online??? DarkPatterns.org Legal solutions If dark patterns are better designed and more abundant than ever, is there any way to slow the practice down? One possible solution is a legal one. “I’ve recently started to find the idea of better regulation appealing,” said Brignull. “If you put consumer laws in place that’ll prevent a company from doing something, they’ll follow the laws, but as soon as it’s just down to ethics, it’s anybody’s guess how they choose to behave, or to rationalize things in their mind to see something as ethical when maybe it’s not, or the consumer wouldn’t see it that way.” The Federal Trade Commission Act’s prohibition on unfair and deceptive acts or practices does extend to online advertising, marketing, and sales. Regulation is tricky, however, because—again—many dark patterns are technically legal, skirting the rules without breaking them.
Some deceptive patterns that are used in the US are illegal in other countries even. That said, lawsuits can be effective. Lately, subscription sites have been coming under legal fire. JustFab (the owner of ShoeDazzle and Fabletics) paid a $1.88 million fine to settle allegations of deceptive marketing.

After the legal settlement, JustFab now posts a total of 14 notifications about its subscription service and requires readers to affirm their decision to become members two times, according Bloomberg. Other sites are following suit.
Stamps.com paid out $2.5 million in a lawsuit similar to JustFab; Blue Apron and Birchbox are facing lawsuits as well.

A site called AdoreMe.com has also been hit with a lawsuit that even prompted design action.

The site opts first-time users into a VIP membership with a recurring monthly subscription, but now the company has made changes to its website to make it easier for users to cancel… which led to a 30-percent increase in refunds and a 15-percent decrease in subscriptions.
Still, the negative option billing—which requires users to opt out of specific sales to avoid a charge—remains.

The practice continues to be legal with some stipulations. Generally, the problem with litigation is that it often is so specific that it only dissuades one type of problem while leaving others in play. Last October, LinkedIn paid $13 million to settle a lawsuit after its “add connections” feature led users to send multiple spammy e-mails to their business contacts.

Although users had agreed to let LinkedIn scrape their e-mail address book, they had only agreed to send one message asking someone to connect on the site.

A judge said that the second and third e-mails “could injure users’ reputations by allowing contacts to think that the users are the types of people who spam their contacts.” However, that settlement did nothing to end a separate LinkedIn dark pattern.

The site recently touted two-step verification in response to its own password sloppiness as login credentials for as many as 117 million accounts popped up on the Dark Web.

These days LinkedIn continually solicits users who have not shared their phone number to do so in the name of added security and the ability to reset passwords if locked out of an account. What the site doesn’t tell users is that doing so will make the phone number discoverable to others by default. Only after a user starts the process does any notification appear: “Your phone number helps us keep your account secure.
It also helps people who already have your number discover and connect with you.” It’s not initially clear whether there’s an option to turn off this discoverability—but there is an option.

Buried under Privacy and Settings, users can use 2FA while also disabling discoverability.
So just because a specific company stops spamming users doesn’t mean it won’t sneakily use phone numbers given for security reasons to push a feature many won’t realize they’re signing up for. “It’s a bit like the Wild West, isn’t it?” said Brignull. “Technologies move much faster than people who try to do consumer protection for society.” Other fixes If legal means prove ineffective, advocates are now pushing for a technical solution.

This is playing out right now in the battle between tracking blockers, such as Privacy Badger, and sites that seek to track users—even ones who have specifically requested not to be tracked through the universal Web tracking opt out Do Not Track. In the face of public pressure, Facebook cracked down on unwanted game invites from games like Candy Crush, which have pre-selected checkboxes for players to invite all of their friends. “It’s very easy if you’re not paying attention to accidentally spam all of your friends on Facebook, and it makes it easier to do the thing you wouldn’t want to do than the thing you would want to do,” said Klein.

But since Facebook enabled changes, users can now block specific games from sending them invitations and requests (and see the game if other people have it installed).

They can ignore app invites from specific people as well. The key to reining in Candy Crush was not the backend of Facebook, however—it was that consumer pressure.

Take for instance, Ryanair.
In many ways, the company was the poster child for dark patterns.

The budget European airline’s website previously required users to opt out of purchasing priority boarding, airport transfers, sightseeing tours, cabin bags, phone cards, and more.

Even when the controversial corporation was forced to stop opting people in for travel insurance, it still hid a “do not insure” option within its menu. Today, insurance is offered as a separate opt-in, and a marketing team is slowly revamping the company’s website. What changed? Net profit plummeted. “Their well-known dark patterns started to work against them eventually. Now they’ve stopped using them,” Brignull said. Still, there’s no clear solution to the dark pattern problem in the near future.

A public looking for more speed and ease will simply continue to butt heads with companies wanting more and getting better at finding digital sleight of hand.

But sites like Brignull’s and advocate designers like Klein are at least raising awareness. Now we know, and knowing is half the battle.

The other half is just finding the checkboxes in those dense Terms of Service. Yael Grauer (@yaelwrites) is an independent tech journalist based in Phoenix.
She's written for WIRED, Slate, Forbes, and others. Her PGP key and other secure channels are available here: https://yaelwrites.com/contact/.
She previously wrote about VPNs for Ars.
Big bucks in pillaging parking The transport sector is a booming lucrative playground for cyber criminals that is increasingly fragmented, IBM researchers say. The findings in a report Security trends in the transportation industry reveal that airlines, trucking, and parking sector companies are being hosed for credit cards and sensitive information. Big Blue cites multiple menus for the budding transport hacker including raiding frequent flier and rewards schemes, citing breaches of British Airways and United Airlines. But IBM advises says hackers can make a killing popping taxi and hire car companies and parking outfits, among others. "Attackers seeking a treasure trove of sensitive information, credit card data included, need look no further than private transit companies such as taxi and limousine services," the researchers say. "In the transportation industry, an interesting emergent trend is a focus on lucrative niche targets, for instance parking management companies. "We have seen several incidents in this area during the past couple of years, a number of them involving offsite airport parking companies." They reference the 2013 plundering of CorporateCarOnline and the 2014 gaffe in which New York City officials revealed the movements of taxi drivers over some 173 million trips. Three parking companies have been breach recently including book2park.com, Park n Fly, and OneStopParking.com where credit cards were stolen and sold. IBM continues with hackers ripping passenger data including the plundering of a Chinese national train reservation system and customer data including manifests from United Airlines. Transport sector organisations are most likely to be attacked with denial of service attacks and malicious attachments which combined made up 44 percent of attacks on the sector in the 12 months to May. The report also calls out future possible security issues with the pending US national NextGen aviation navigation system including the Automatic Dependent Surveillance Broadcast and Aircraft Interface Devices communications platforms. These efficiency and cost boons could open doors to new threats, researchers say. "Globally, the aviation industry is moving towards IP-based systems that will introduce new security challenges and reduce barriers against cyber attack tools and techniques already in use on the public internet," they say. "A comprehensive approach to address cyber security is required." The global transportation sector is huge.

As of January last year there were more than 50,000 merchant ships and some 70,000 daily flights in the US alone. IBM security bod Michelle Alvarez says on the back of the report that the privatisation of the transportation sector is increasing the strain since it fragments the maintenance of security into individual companies. "Each individual owner or operator is responsible for identifying critical cyber infrastructure and applying remediation," Alvarez says. ®
Firm analysed data from multiple sources to assist Government in rooting out error and fraud related to tax credits - developing an approach that could save £2 billion in long runLiverpool and London (August 7, 2014) - Consumer insight and anti-fraud company Transactis has been named SME (Small and Medium Enterprise) Team of the Year in the 2014 Management Today Analytics in Action Awards for its work in support of efforts by Her Majesty's Revenue and Customs (HMRC) to reduce fraud and error related to tax credits. The company's use of analytics, drawing on data from multiple consumer data sources as well as the information held by the Government, has created template that could save HMRC billions of pounds in the long run.The successful distribution of tax credits, which include incentives to work, assistance for children in low-income families and added support for households facing , relies heavily on recipients promptly and honestly updating HMRC about changing circumstances - such as children leaving home, new sources of income and an employed adult moving in. Constantly monitoring the five million families and close to eight million children supported by tax credits is virtually impossible to do directly and so HMRC was concerned about excessive levels of wrong information and fraud.Transactis, which counts Nationwide Building Society, Shop Direct and Betfair among its clients, ran a successful three-month pilot that demonstrated HMRC could make significant inroads towards its target of reducing loss due to error and fraud to no more than 5% of tax credit spending by enabling the Government department to better address one of the root causes behind the misallocation of these benefits: multiple occupancy by recipients with a people earning income. Transactis analysed reference data from more than 20 sources to identify 50,000 'at risk' cases that could manageably be followed up, reducing losses due to fraud and error by £19 million - which projects to £2 billion in savings if the HMRC rolls out the programme across the tax credit programme.The Analytics in Action Awards judges noted: "A terrific example of meeting a complex challenge to implement actionable insights for a huge government agency, challenging culture and assumptions in a political climate when there are data privacy concerns. Transactis has added real value, and saved taxpayers' money in the process."Paul Daley, head of public sector at Transactis, said: "The use of analytics enabled Transactis to determine which variables most effectively indicated 'risky' tax credit cases and to use those to create an algorithm for selecting which should be investigated. Analytics even allowed us to test some previously unproven assumptions - gut feelings. For example, during workshops, HMRC staff voiced opinions that there was bound to be a correlation between overclaiming of childcare payments and the distance travelled to the childcare provider from home. Our analysis revealed that this was indeed a factor to take into consideration."The Analytics in Action Awards recognise "beacons of excellence": companies that are innovating and leading the way in the use of data analysis to achieve growth, savings or other targets. In bestowing the awards, the judges - who included data experts from British Airways, Visa and Accenture - looked for companies that were seeking to change the way data is used, putting analytics at the heart of the solutions they provide.For more information: contact Hugh Filman at hugh@lindsellmarketing.com or 020 7402 0510About TransactisTransactis is a customer insight, data management and anti-fraud services business, providing marketing, fraud prevention and customer management solutions to some of the most successful organisations in the UK. The company is one of the UK's leading specialists in combining data from multiple sources to provide a detailed and actionable understanding of individual consumer behaviour, risk and opportunity. Using its unique data resources, specialist knowledge and innovative technology, Transactis delivers products and services that allow their clients to make better, faster and more informed decisions to generate greater efficiencies, profit and an enhanced experience for their customers. The company was recently honoured with awards for innovation and overall achievement at the 2013 Retail Fraud Awards. For more information, visit www.transactis.co.uk Source: RealWire