Sunday, September 26, 2021

Deep thoughts...

Not sure who wrote this, but it's deep:

Every minute someone leaves this world behind.

We are all in “the line” without knowing it.

We never know how many people are before us.

We can not move to the back of the line.

We can not step out of the line.

We can not avoid the line.

So while we wait in line -

Make moments count.
Make priorities.
Make the time.
Make your gifts known.
Make a nobody feel like a somebody.
Make your voice heard.
Make the small things big.
Make someone smile.
Make the change.
Make love.
Make up.
Make peace.
Make sure to tell your people they are loved.
Make sure to have no regrets.
Make sure you are ready.”

Money principles in capitalist countries...

Former Prime Minister of the United Kingdom, Winston Churchill, once said: "I took a taxi one day to the BBC offices for an interview.

When I arrived, I asked the driver to wait for me for Forty Minutes until I 'll get back, but the driver apologized and said, "I can't, because I have to go home to listen to Winston Churchill's speech".

I was amazed and delighted with the man's desire to listen to my speech! So I took out 20 pounds and gave it to the taxi driver instead of 5 Pounds without telling him who I was. When the driver collected the money, he said: "I'll wait for hours until you come back sir! And let Churchill go to hell".

You can see how Principles have been modified in favour of money; Nations were sold for money; Honour sold for money; Families split for money; Friends separated for money; People killed for money; and people being made slaves for money.

The miracles of ZamZam Water from HOLY MAKKAH

Do u know the miracles of zamzam Water from HOLY MAKKAH?

ZamZam water level is around 10.6 feet below the surface. It is the miracle of Allah that when Zam Zam was pumped continuously for more than 24 hours with a pumping rate of 8,000 liters per second, water level dropped to almost 44 feet below the surface,

BUT WHEN THE PUMPING WAS STOPPED, the level immediately elevated again to 13 feet after 11 minutes. 8,000 liters per second means that 8,000 x 60 = 480,000 liters per minute 480,000 liters per minutes means that 480,000 x 60 = 28.8 Million liters per hour And 28.8 Million liters per hour means that 28,800,000 x 24 = 691.2 Million liters per day
So they pumped 690 Millions liters of ZamZam in 24 hours, but it was re-supplied in 11 minutes only.
And not to forget this well is providing water from the time of Hazrat Ismaeel as till now.

There are 2 miracles here, the first that ZamZam was re-filled immediately & the second is that Allah Holds the extra-ordinarily powerful Aquifer for not throwing
extra ZamZam out of the well.

It is the translation of the word ZamZam, which means Stop Stop! said by Hajirah RZ. Zimam is an Arabic word, it is the rope / REIN attached to bridle or noseband & it is used / pulled to stop the running animal.

Zamzam water has no color or smell, but it has a distinct taste. Water usually fills your thrust. But surprisingly, Zamzam fills your hunger as well as your thrust. One can stay alive just by drinking zam zam water for as long as he can.
_______
The results of the water samples tested by the European laboratories shows that Zamzam water contains

1. CALCIUM & MAGNESUIM:
The difference between Zamzam water and other water was in the quantity of calcium and magnesium salts. The content of these was slightly higher in Zamzam water. This may be why this water refreshes tired hajis.

2. FLUORIDE:
But more significantly, the water contains fluorides that have an effective germicidal action.
_______
Masaru Emoto is a Japanese energy scholar, author and entrepreneur, best known for his claims that human consciousness has an effect on the molecular structure of water.

Following is his research on zamzam water:

1. The quality / purity of Zamzam water has, will not be find any where else in the water on this earth.

2. He used the technology named NANO, and researched a lot on Zamzam water. And found out that if one drop of Zamzam water mix in 1000 drops of regular water, regular water will get the same quality like Zamzam water.

3. He also found that a mineral in one drop of Zamzam water has its own importance that will not be find any other water on this earth.

4. He also found in some tests that the quality or ingredients of Zamzam water can not be changed, why, science does not know the reason. Even he re-cycled the Zamzam water, but no change it was still pure.

5. This scientist also found out that, the Muslims say BISMILLAH before eating / drinking. He says that after saying BISMILLAH on regular water, there are some strange changes happened in the quality of regular water. That makes it best water.

6. He also found out that if some one recites the Quran on regular water, it gets the ability for the treatment of different diseases.
______
"If you are in doubt about it, then bring a book like it." [A challenge from the Lord of the Worlds]

10 commandments of salary negotiation

 Great tips!

The 10 commandments of salary negotiation

by Niya Dragova

The largest salary increase I’ve helped get was for a female FAANG executive: I helped her get $5.4M more on her offer. Through the process, it struck me that even though she was a senior leader everyone admired (you’d 100% know of her if I told you her name), she had very little knowledge of how to negotiate. Don’t get me wrong — she knew how to ask and be assertive, but she was much less comfortable “playing the game.”

And she’s not alone.

Regardless of how senior or junior you are, most tech folks struggle with negotiation. Partially this is because compensation is set up to be intentionally misleading. Partially it’s because sticking up for yourself is nerve-racking AF. 

Here are the 10 commandments to negotiation I wish everyone knew: 

1. Negotiation starts earlier than you think

Every recruiter worth their salt will ask about your salary expectations when you first start interviewing. Do not — I repeat, do not — give them a number.

What to do instead: Ask for the range they’re budgeted for the role.

How to say it: “Can you tell me the salary band for this level? Happy to let you know if it’s within my range, and we can discuss specific numbers later when I’ve met the team.”

Bonus points: If you’re junior/mid, time all your interviews so you get offers around the same time. If you’re senior, get some press before you start meeting folks.

2. Mine for intel during interviews

Go into the interview ready not just to answer questions but to ask some of your own. You will use this as ammunition to negotiate later. Here are a few examples of what you should ask:

  • What’s the biggest priority for the team right now?

  • Why is this role open?

  • What’s the biggest challenge for someone stepping into this role?

  • How does the org structure on the team work?

3. Don’t give in to the pressure

Once you’ve been offered the role, the recruiter’s job shifts from evaluating you to closing you. Most experienced recruiters will ask you again to put up a number for your salary. Clever recruiters may even tell you that they “will go to bat for you.” Yeah, no thanks.

What recruiters say: “If you give me your number, I will make it happen for you.”

What they mean: “I’ll get you something lower, but kinda close to what you asked for.”

4. At FAANG, your recruiter may have no say at all

At FAANG-size companies (i.e. over 5K employees), compensation is heavily formulaic. In fact, there is often a separate team — the “compensation committee” — who sets your salary. They take into account your background, interview performance, and level. They give the recruiter a number to go with. The recruiter then gives you the number, and every time you negotiate they have to go back to that committee to ask for a re-evaluation.

What do clever recruiters do? They get your number up-front to save some legwork.

Unfortunately, this may hurt your chances of getting more on your offer later. It also deprives you of some valuable data — where you fall in the level/salary band. If you get caught in this loop, quickly turn the tables: most companies will consider “new information,” like another offer, to reopen a negotiation. Don’t forget, an offer to stay from your existing company also counts!

5. Read between the lines

Your initial offer speaks volumes, if you know how to interpret the data. Here are a few scenarios you should consider:

Let’s say you’re applying for an L6 role at a big company. 

Initial offer comes in low: The team may have felt that you have a lot of “room for growth.” In this case, my advice is to dig deeper and ask the interviewer to share feedback from folks who met you to fix any misconceptions before you ever negotiate. Telling someone you want more money because you’re “the greatest PM ever” while the team felt you were “meh” is not going to fly.

Middle of the road: You got “the number” (the medium opening number that’s basically a template recruiters use). It’s the most common opening offer — companies do this to reduce risk of lawsuits. Over 80% of people get it. It likely means you don’t have a strong advocate on the interview loop. Do not negotiate until you match with a team and you have a manager batting for you. 

Initial offer comes in top-of-band: There was likely a discussion about giving you a higher level. Many times in this case, you can push for an “out-of-band” offer — essentially getting paid for an L7 while you’re an L6.

6. At a startup, the playbook is different 

You may be dealing with the founder directly. It’s very likely there is no range for the role, as smaller companies have much less access to salary data. The goal at the initial offer conversation is to understand three things:

That last one can be tricky because you need data the recruiter may be reluctant to give — the option strike price, preferred price, number of outstanding shares — and you need to understand how options work. At last, get ready to ask:

“What is the valuation based on?”

And get ready to not get a straight answer until you’ve asked five times (yes, this is normal). 

TL;DR: Ask the questions an investor would ask because, *news flash*, you are now an investor — but instead of cash, you’re staking your time and earning trajectory on the company’s success. You can meet with the investors too; it’s 100% OK to ask for that when the company is early-stage.

Lastly, 2021 has been a weird year for startup compensation, so much of the data from previous years is unreliable. Remote work, abundant access to capital, and greater trust in international talent have skewed things quite a bit. Still, I find the Holloway Guide ranges to be a good starting point.

7. Your job is to win hearts and minds

It can be tempting to think you need to negotiate now that you have data. Nope, not yet. The next step, instead, is to upsell your worth before you come back with any kind of counteroffer. This is especially important if you’re going for a senior role.

What to do next: Ask for follow-up meetings with decision makers. If you’re a Director or higher, you can usually ask to meet with any VP and possibly C-level execs. VPs can often meet with the CEO and even board members. Take your time; this is important if you want your salary to reflect your value. If everyone wants you, you’ll be calling the shots later.

How to run these effectively: Come prepared with three things, tailored to who you’re meeting: 

  • Questions about how you can create meaningful impact

  • Ideas based on your interviews so far

  • Bonus points: discussing obstacles to your taking the role and making them sell you on it

8. OK, now get some good data

Did you know that women make only 47 cents in equity for every dollar a man makes? A HUGE reason for that is that many women don’t fully evaluate their offer before negotiating. Let’s change that. Particularly if you are a woman, ask yourself these questions: 

9. Comparing offers

Not all offers are made equal — in fact, they are intentionally confusing. At Google, you may get a front-loaded vesting schedule on your stock; at Amazon, sizable cash bonuses the first two years. It seems obvious that you should look at the comp, but that’s not everything:

  • Which company has a better trajectory?

  • How do promotions work?

  • Is your manager influential enough to pull for you when needed?

  • Is your product or team visible enough to get good resourcing?

  • What’s the company brand worth to your earnings trajectory?

TL;DR: Getting paid more up-front doesn’t always mean you’ll make the most overall. Plan carefully.

10. Time to make an ask

It can be awkward to ask for more money, but trust me, everyone expects you to do it. On top of that, it doesn’t help that so much of the advice out there is conflicting. Let’s set the record straight:

“I need a competing offer.”

MYTH: You absolutely do not need multiple offers. Just being able to say you’re speaking to other companies is sufficient — you can quote the expected salaries for other roles if needed.

“I need to provide copies of my other offers.”

MYTH: Nope, nope, nope (even though Google in particular loves to ask for them). You signed an NDA before every interview, so you can always use that as a reason.

“I should send the recruiter an email with my ask and justification.”

MYTH: Negotiating via email = MAJOR CRINGE and definitely a worse outcome. I know there are folks selling fill-in-the-blank templates out there. My advice if you want a meaningful/large increase is to have the conversation over the phone. 

“If I find a number online, I can quote it as a reason to get more.”

MYTH: Nothing boils a recruiter’s blood more than “It says X on Glassdoor.” Compensation is an exact science — have arguments prepared that are specific to your situation.

“The best way to get more is to reiterate how qualified I am.

MYTH: You already got interviewed and everyone’s read your resume. That’s how you got your initial offer; now you need to build additional arguments. Use the information you collected during the interview about what challenges the team is facing — maybe that increases the scope of the role? Discuss why leaving your current role will be hard — are you critical to your current team? In other words: instead of asking for money, make them give you more money by bringing in obstacles the recruiter needs to overcome to close you. 

“I need to be aggressive and threaten to walk if they don’t match.”

MYTH: LOL, let me know how that goes for you. My guess is you’ll get a mediocre increase worded as a “final offer.” If you want big moves, I’m talking $100K+ more, you need to collaborate with your recruiter, not make them an enemy.

As a final word of wisdom: Start with negotiating your overall compensation, not individual components. For example, ask for “500K” and then the next round ask “Can I have X more equity?” Then, when you’ve exhausted all other avenues, ask for a signing bonus. If you still need more help, you can always read our guide.  

Now that you’ve got all these RSUs in your compensation…

If your new RSUs are more than 10% of your liquid net worth, you should make a plan to diversify ASAP. Holding a concentrated position can translate into greater portfolio volatility, which has been shown to reduce compounded growth rates and future wealth. At Candor we help you automate RSU diversification by converting your stock weekly, even during blackout periods. You can find us here.

Thanks, Niya!

 

Friday, September 24, 2021

Facebook overpaid FTC to spare Zuckerberg!!!

Facebook allegedly agreed to overpay on the original $106 million penalty so its CEO and COO could avoid deposition and personal liability.

Facebook paid billions extra to the FTC to spare Zuckerberg in data suit, shareholders allege

Facebook conditioned its $5 billion payment to the Federal Trade Commission to resolve the Cambridge Analytica data leak probe on the agency dropping plans to sue Facebook CEO Mark Zuckerberg individually, shareholders allege in a lawsuit.

In suits made public Tuesday, two groups of shareholders claimed that members of Facebook’s board allowed the company to overpay on its fine in order to protect Zuckerberg, the company’s founder and largest shareholder. The complaints, which cite internal discussions among Facebook’s board members, were filed in Delaware Court of Chancery last month.

“Zuckerberg, Sandberg, and other Facebook directors agreed to authorize a multi-billion settlement with the FTC as an express quid pro quo to protect Zuckerberg from being named in the FTC’s complaint, made subject to personal liability, or even required to sit for a deposition,” one of the suits alleged.

The FTC has never disclosed that it originally planned to name Zuckerberg personally in the lawsuit, and the agency's two Democrats at the time voted against the settlement in part because of the lack of personal liability for the CEO.

The multi-front battle: The lawsuits show that Facebook has still yet to move beyond the Cambridge Analytica scandal, even as antitrust, alleged privacy failures and other problems plague the company. The Senate Commerce Committee said last week that it was opening a probe into how the company downplayed its own research on how Facebook's photo-sharing app Instagram worsens mental health and body image issues for teens.

Newly public: The groups originally filed their suits last year. They amended the complaints last month after receiving internal files about the board’s discussions on privacy, which a federal judge had ordered Facebook to provide.

How it went down: In February 2019, the FTC sent Facebook’s lawyers a draft complaint that named both the company and Zuckerberg personally as a defendant, the shareholders said. The FTC also said in court that Facebook’s fine would have been closer to $106 million, but the company agreed to the $5 billion penalty to avoid having Zuckerberg or Chief Operating Officer Sheryl Sandberg deposed and any liability for the CEO, the suit alleged.

“The Board has never provided a serious check on Zuckerberg’s unfettered authority,” one set of shareholders said. “Instead, it has enabled him, defended him, and paid billions of dollars from Facebook’s corporate coffers to make his problems go away.”

They also alleged that Zuckerberg and Sandberg both declined to be interviewed by PricewaterhouseCoopers, the firm hired to audit Facebook’s privacy compliance as part of a 2012 settlement with the FTC, allowed other managers to provide untrue statements about the company’s practices and never provided the board with copies of PwC’s audits.

The accounting firm concluded that Facebook didn’t have enough controls in place to protect user data, the second suit alleged, and “that Facebook’s privacy controls were not operating with sufficient effectiveness to provide reasonable assurance to protect the privacy of covered information.”

Facebook staying out of it: Facebook declined to comment on the suits.

Largest space telescope in history under construction!

The James Webb Space Telescope will be 100 times as powerful as the Hubble. It will change how we see the universe.

The largest space telescope in history is about to blow our minds

Exploring strange new worlds. Understanding the origins of the universe. Searching for life in the galaxy. These are not the plot of a new science fiction movie, but the mission objectives of the James Webb Space Telescope, the long-awaited successor to the Hubble Space Telescope. NASA is building and launching the Webb in partnership with the European Space Agency and Canada.

The launch, which will propel the Webb to nearly a million miles away, is now scheduled for December 18, 2021. When it fully deploys in space, the Webb will usher in a new age of astronomy, scientists say, and show humanity things it has never seen before.

“The Webb represents the culmination of decades, if not centuries, of astronomy,” says Sara Seager, a planetary scientist and astrophysicist at MIT. “We’ve been waiting for this a very long time.”

Scientists started thinking about a follow-up even before the Hubble Space Telescope launched in 1990. After more than three decades in space, it’s unclear how much longer this boundary-breaking satellite will be able to scan and photograph the universe.

The Webb was originally supposed to launch in 2010 and cost around $1 billion. Its price tag has since ballooned to $10 billion, and it’s way overdue. But the wait will be worth it, at least according to the scientists who expect new and revealing glimpses of our universe.

“We’re going right up to the edge of the observable universe with Webb,” says Caitlin Casey, an assistant professor of astronomy at the University of Texas at Austin. “And yeah, we’re excited to see what’s there.”

The Webb will surpass the Hubble in several ways. It will allow astronomers to look not only farther out in space but also further back in time: It will search for the first stars and galaxies of the universe. It will allow scientists to make careful studies of numerous exoplanets — planets that orbit stars other than our sun — and even embark on a search for signs of life there.

The Webb is a machine for answering unanswered questions about the universe, for exploring what has been unexplorable until now. Here’s a guide to what the Webb is capable of.

The Webb’s golden mirror is a giant leap for telescopes of its kind

The launch of the Hubble Space Telescope, named after famed astronomer Edwin Hubble, was itself a huge leap forward for astronomy. Here on Earth, astronomers seek out remote mountaintops and deserts to build major telescopes for the best chance of viewing a dark sky away from pollution and bright lights. But their view is still marred by the slight haze and luminescence of the Earth’s atmosphere. Space is “the ultimate mountaintop,” as NASA explains. There’s no better view of space than the one from, well, space.

Hubble has meant so much during its 30-year run. For one thing, it’s sent us unforgettable, jaw-droppingly beautiful images like those of the Lagoon Nebula and the Pillars of Creation.

It’s also taught us about the age of the universe, about what happens when stars explode, about black holes. It helped establish many of the boundaries that the Webb hopes to push. Most powerfully, its observations have led scientists to believe the universe is expanding at an accelerating rate, propelled by something so mysterious that scientists simply call it “dark energy.”

The Webb, named for the man who led NASA in the decade leading up to the moon landing, is set to take all this a step further. “What we’re going to get is a telescope that’s about 100 times more powerful than Hubble,” says Amber Straughn, an astrophysicist at NASA who works on the Webb.


How?

The Webb improves on Hubble in two key ways. The first is just its size: Hubble was about the size of a school bus, whereas Webb is more like the size of a tennis court. “This thing is enormous,” Straughn says. “Webb is by far the biggest telescope NASA’s ever attempted to send into space.”

But it’s not just the total size of the contraption that matters. When it comes to reflecting telescopes, the key component is the size of its curved mirror. “You could sort of think of a telescope mirror like a light bucket,” Straughn says. The more light you can collect in this bucket, the fainter and farther-away things you can see in the universe.

Hubble’s mirror was an impressive 7.8 feet in diameter. Webb’s beautiful, gold-hued mirrors combine for a diameter of 21.3 feet. Overall, that amounts to more than six times the light-collecting area.

What does that mean in practice? Well, consider one of Hubble’s most famous images, the Deep Field. In 1995, scientists set the Hubble to stare off into a teeny-tiny patch of sky (about the size of the head of a pinhead, held at arm's length from the viewer) and capture as much light as it could from that one spot.

The image that came back was astounding. Hubble uncovered thousands of galaxies in this teensy patch of sky, helping us refine the number of galaxies thought to exist in the universe.

This photograph also revealed Hubble’s larger power — as a time machine. In astronomy, the farther away things are, the older they are (because light from faraway places takes a very long time to travel to Earth). That means this Hubble Deep Field is not only a snapshot of space: It also contains the history of our universe. Galaxies in this image appear to us as they were billions of years ago.

“What Webb will do is take that field and go even further,” UT Austin’s Casey explains. “So the tiny specks of light in the background of the Hubble Deep Field will brighten and become more detailed, we’ll be able to see spiral arms, we’ll be able to see structure, and then we’ll get more specks of light even further in the past. We’re seeing farther back in time with Webb.”

With Webb, astronomers like Casey will be able to see so far back that they’ll potentially spot the very first stars and galaxies. Hubble has seen light dating to about 400 million years after the Big Bang, which took about 13.3 billion years to reach us.

“That’s far! But Webb has the capability to take us to 250 million years after the Big Bang,” explains Casey, who has been approved to work with the Webb Space Telescope. “It might not sound like a big difference. What’s a few hundred million years between friends? Actually, it’s the difference between seeing the first stars that ever turned on [and] arriving a bit too late after the funeral.”

Beyond that are barriers through which even the Webb cannot see. Prior to the first starlight, the universe was shrouded by a “dense, obscuring fog of primordial gas,” as the National Science Foundation explains. There’s no light that reaches our telescopes from this time, which is called the cosmic dark ages.

(There is some background radiation from the Big Bang called the cosmic microwave background, a faint glow that shines to us from before the dark ages. But for the most part, the dark ages is a blank spot in our timeline of the universe.)

Casey and other astronomers hope the Webb will help them understand the end of the dark ages and figure out what caused this fog to lift. Scientists suspect the starlight from the earliest galaxies did it.

“If you have a cloud of gas and it encounters energetic light, that energetic light will ionize that gas and disassociate that cloud,” Casey says. “And so if that light just has turned on, it then hits that gas and really transforms the entire universe from a dark place to a light place.”

The Webb telescope sees infrared light — which can be very, very old

The Webb’s other advantage is the type of light it collects.

Light comes in a lot of different varieties. The human eye can see only a narrow band known as visible light, but the universe contains lots and lots of light outside this range, including the higher-frequency, higher-energy forms: ultraviolet, gamma rays. Then there’s the lower-energy light with longer wavelengths: infrared, microwaves, radio.

The Hubble Space Telescope collects visible light, ultraviolet, and a little bit of infrared. The Webb is primarily an infrared telescope, so it sees light that’s in a longer wavelength than what our eyes can see. This seems nerdy and technical, but it’s actually what allows Webb to look further back in time than the Hubble.

Infrared light is often very old light, due to a phenomenon call redshifting. When a light source is moving away from a viewer, it gets stretched out, morphing into a longer and longer wavelength, growing redder. (The opposite is true as well: As a light source grows closer, the wavelengths shorten, growing bluer.) It’s similar to what happens when a siren goes by: The pitch increases as the siren approaches, then decreases as it trails away.

Because space is constantly expanding, the farthest things away from us in the universe are moving away from us. “And as light travels through space from those distant galaxies, the light is literally stretched by the expansion of space,” Straughn says.

Imagine a star that’s really far away. The light from that star may start off in the visible spectrum, but it gets stretched on its journey to us. It grows redder and redder. “So when we see distant galaxies with Hubble, they’re sort of these little, tiny red nuggets,” Straughn says. Eventually, these very distant, old galaxies grow so red that they drop into the infrared spectrum. Webb can see this ancient light that has become invisible to the human eye.

Conveniently, infrared light has other uses as well. It’s a really good type of light to use to look at exoplanets. For instance, if you were on a planet that orbits another star and wanted to see Earth, visible light wouldn’t be your best bet.

“The Earth peaks in the infrared,” says Johns Hopkins Applied Physics Laboratory astronomer Kevin Stevenson, who plans to use the Webb in his research. So if we want to be able to study an Earth-like planet in another solar system, “What we really want to do is observe at infrared wavelengths, because that’s where the light from the Earth is being emitted.”

Exoplanet scientists like Stevenson are going to use the Webb to analyze the atmospheres of these worlds: The Webb is capable of determining some of the chemicals in their atmospheres. “We can detect water, CO, CO2, methane,” Stevenson says. While those aren’t definitive signs of life on their own, they could begin to ask fascinating questions: What created that methane and carbon dioxide? Could it have been life?

“We all want to find another Earth, don’t we?” Stevenson says. “The prospect of answering the question ‘are we alone?’ has been something that we’ve been asking ourselves for centuries. And I think with James Webb, this will provide us the first opportunity to really answer that question.”

This $10 billion gadget better not break

Scientists are clearly raring to go, but the Webb revolution has taken a while. One reason for all the launch delays to the launch has to do with contractor snafus. But a big source of all of them, NASA’s Straughn says, is the complexity of the Webb itself.

“Because it’s so big, there aren’t any rockets that are big enough to launch it fully deployed,” Straughn says. The telescope has to be folded up to fit inside a rocket, and has to deploy itself in space. “So that whole process of building a deployable telescope in space is the source of a lot of the engineering challenges.”

Upping the stakes is the fact that while Hubble was launched to around 340 miles above the Earth, Webb will be almost a million miles away — four times the distance from the Earth to the moon.

That means once the Webb is launched, it will be unserviceable by human hands if it breaks. That’s scary, considering the history of the Hubble. Shortly after the Hubble launched in 1990, engineers realized there was a problem with its mirror; the telescope’s initial images came back fuzzy, and astronauts had to launch a space shuttle to fix it. That won’t be possible with the Webb. It just has to work.

It will be far away for good reason. Because Webb is an infrared telescope, it needs to be kept cold. The Earth itself is warm and glows in infrared. “Anything warm glows in infrared light,” Straughn says. “If the telescope was warm, it would just glow and see itself.”

Remarkably, any scientist around the world can apply to use the Webb Space Telescope, provided they write up a project proposal that passes peer review. It’s pretty competitive. Last year the Space Telescope Science Institute, which operates space telescopes from John Hopkins University in Maryland, put out a call for proposals for Webb’s first observing run. About a quarter of the proposals were accepted.

“It feels like part of me is still stunned,” says Lisa Dang, a physics PhD student at McGill University who was one of the lucky few to get approved to use the Webb. “And the other part is having this imposter syndrome — like, these data better be really amazing.”

Dang is set to study one of the most extreme planets ever discovered: K2-141 b, a planet 202 light-years from Earth and so close to its host star that its surface is believed to be covered by an ocean of lava. If it has clouds, they are likely made out of vaporized rock, which could then precipitate out “rock rain.” Not much is confirmed about this lava planet, but Dang will use the Webb to study its atmosphere and see what’s possible on this extreme world.

Winning the project proposal “made me feel like an astronomer for the first time,” Dang says. “But it also makes K2-141 b very real suddenly.”

This is the power of an unprecedented telescope such as the Webb. It will help astronomers like Dang fill in the blank spaces of the cosmos.

“It’s wild, when you think about it, that we’re able to piece together the history of what happened before the Earth or the sun even existed,” Casey says.

If all goes according to plan, these kinds of breakthroughs could come in a matter of months. Astronomers around the world are waiting for the countdown to begin.

Surveillance Software That Can Watch Your Every Move!

The tool is the product of a growing industry whose work is usually kept from the public and utilized by police.

ShadowDragon: Inside the Social Media Surveillance Software That Can Watch Your Every Move

The Intercept, Sep 22

A Michigan State Police contract, obtained by The Intercept, sheds new light on the growing use of little-known surveillance software that helps law enforcement agencies and corporations watch people’s social media and other website activity.

The software, put out by a Wyoming company called ShadowDragon, allows police to suck in data from social media and other internet sources, including Amazon, dating apps, and the dark web, so they can identify persons of interest and map out their networks during investigations. By providing powerful searches of more than 120 different online platforms and a decade’s worth of archives, the company claims to speed up profiling work from months to minutes. ShadowDragon even claims its software can automatically adjust its monitoring and help predict violence and unrest. Michigan police acquired the software through a contract with another obscure online policing company named Kaseware for an “MSP Enterprise Criminal Intelligence System.”

The inner workings of the product are generally not known to the public. The contract, and materials published by the companies online, allow a deeper explanation of how this surveillance works, provided below.

ShadowDragon has kept a low profile but has law enforcement customers well beyond Michigan. It was purchased twice by the U.S. Immigration and Customs Enforcement agency in the last two years, documents show, and was reportedly acquired by the Massachusetts State Police and other police departments within the state.

Michigan officials appear to be keeping their contract and the identities of ShadowDragon and Microsoft from the public. The Michigan.gov website does not make the contract available; it instead offers an email address at which to request the document “due to the sensitive nature of this contract.” And the contract it eventually provides has been heavily redacted: The copy given to David Goldberg, a professor at Wayne State University in Detroit had all mentions of ShadowDragon software and Microsoft Azure blacked out. What’s more, Goldberg had to file a Freedom of Information Act request to obtain the contract. When the state website did offer the contract, it was unredacted, and I downloaded it before it was withdrawn.

Last year, The Intercept published several articles detailing how a social media analytics firm called Dataminr relayed tweets about the George Floyd and Black Lives Matter protests to police. The same year, I detailed at The Intercept how Kaseware’s partner Microsoft helps police surveil and patrol communities through its own offerings and a network of partnerships.

This new revelation about the Michigan contract raises questions about what digital surveillance capabilities other police departments and law enforcement agencies in the U.S. might be quietly acquiring. And it comes at a time when previously known government social media surveillance is under fire from civil rights and liberties advocates like MediaJustice and the American Civil Liberties Union. It also raises the specter of further abuses in Michigan, where the FBI has been profiling Muslim communities and so-called Black Identity Extremists. In 2015, it was revealed that for years, the state police agency was using cell site simulators to spy on mobile phones without disclosing it to the public.

“Social media surveillance technologies, such as the software acquired by Michigan State Police, are often introduced under the false premise that they are public safety and accountability tools. In reality, they endanger Black and marginalized communities,” Arisha Hatch, vice president and chief of campaigns at civil rights nonprofit Color of Change, wrote in an email.

Michigan State Police spokesperson Shanon Banner said in an email that “the investigative tools available to us as part of this contract are only used in conjunction with criminal investigations, following all state and federal laws.” The founder of ShadowDragon, Daniel Clemens, wrote that the company provides only information that is publicly available and does not “build products with predictive capabilities.”

A Shadowy Industry

Kaseware and ShadowDragon are part of a shadowy industry of software firms that exploit what they call “open source intelligence,” or OSINT: the trails of information that people leave on the internet. Clients include intelligence agencies, government, police, corporations, and even schools.

Kaseware, which is partnered to ShadowDragon and Microsoft, provides a platform for activities that support OSINT and other elements of digital policing, like data storage, management, and analysis. Its capabilities range from storing evidence to predictive policing. By contrast, the two ShadowDragon products acquired by the Michigan State Police are more narrowly tailored for the surveillance of people using social media, apps, and websites on the internet. They run on the Kaseware platform.

To understand how Kaseware and ShadowDragon work together, let us consider each in turn, starting with ShadowDragon.

ShadowDragon: Social Media Surveillance

The Michigan State Police purchased two of ShadowDragon’s OSINT intelligence tools to run on the Kaseware platform: SocialNet and OIMonitor.

SocialNet was invented by cybersecurity consulting firm Packet Ninjas in 2009. Clemens, Packet Ninja’s founder and CEO, went on to start ShadowDragon as a sister company in 2016, licensing the cyber intelligence and investigative tools developed by Packet Ninjas over the prior decade.

At the time of SocialNet’s creation, investigators were left to search social media networks for clues manually. If a person made a public post on Twitter or Facebook, for example, an investigator was free to look online, but they had to personally log onto and search one social network at a time, post by post, for people who might be suspects and for their friends and other associates.

Alerted to this problem by a friend from Pretoria, South Africa-based Paterva, makers of the Maltego OSINT platform, Clemens decided to build SocialNet. As he put it in an interview, “the idea [behind SocialNet] was, let’s throw a net out into all of the social media platforms, the social media universe, and see what we get back.” Clemens has claimed in a company video that “when the FBI started using [SocialNet], they did an evaluation” and concluded “what used to take us two months in a background check or an investigation is now taking between five to 15 minutes.”

Today, SocialNet says it pulls data from more than 120 social media networks, websites, and platforms, as well as from the dark web, data dumps, and RSS feeds. A full list of sources isn’t available, but a company promotional video and listing at the Maltego website gives an indication of which websites fall into their surveillance net:

AOL Lifestream | Amazon | Ameba | Aodle | BabyCenter | BitChute | BlackPlanet | Blogger | Busted! Mugshots | Buzznet | Cocolog | Companies House | Crunchbase | Dailymotion | DeviantArt | Ebay | Etsy | Facebook | Flickr | Foursquare | Gab | GitHub | Goo | Google | Google+ | Gravatar | Hatena | Huffington Post | ICQ | IMVU | ImageShack | Imgur | Instagram | Instructables | Jugem | Kik |LinkedIn | LiveJournal | Livedoor | Mail.ru | Menuism | MeWe | MySpace | Naijapals | Netlog | OK Cupid | Okru | Olipro Company | Pandora | Pastebin | PayPal | PGP | Photobucket | Pinterest | Plurk | POF | PornHub | QQ | Reddit | ReverbNation | Seesaa | Skype | SoundCloud | SourceForge | Spotify | Sprashivai | Steam | Sudani | Telegram | Tinder | TripAdvisor | Tumblr | Uplike | Vimeo | Vine | Virus Total | VK | Voat | Weibo | Xing | Yahoo | Yelp | YouTube | Zillow

The video also shows “public and local” IP addresses as a source of data for SocialNet.

SocialNet overview

SocialNet searches for information that is publicly available across these websites and pulls it in when there is a match. But it is difficult to know with precision which data it pulls. In the promotional video, some categories of information appear, such as BlackPlanet users; Busted! mugshots; Bing search results; Amazon comments, products, users, and wishlists; and so on. Clemens said the company has “crawlers that scrape information from the public websites. Nothing proprietary or private is provided to us by the platform companies.”

On its website, ShadowDragon also claims to conduct “chat protocol monitoring (WhatsApp, Telegram, etc.)” as well as “dialog protocol monitoring (IRC, etc.).” For these services, it’s also unclear exactly what kinds of information can be pulled or how it’s done. Clemens said they don’t intercept any private chats, and they can confirm whether a specific phone number has a WhatsApp account if the user’s privacy settings allow it.

In a March 2019 blog post, Clemens referenced an “integration into monitoring Telegram,” which, along with WhatsApp, had become “a go-to when there are disruptions.” He also claimed to have added “some interesting OSINT capabilities in our SocialNet platform for more hardened and encrypted/secure communication protocols. (Please ping us on this).” Although Telegram has said its instant messages are “heavily encrypted,” it also offers widely available groups and channels.

Clemens said the company is able to monitor chat platforms like Telegram through public sources of information, which reveal, for example, “if you respond to a public thread of Twitter or public Telegram group.” He added, “We don’t evade any encryption implementations because we’re not interested in weakening the technical security for other platforms.” Clemens declined to elaborate on what “capabilities” SocialNet has “for more hardened and encrypted/secure communication protocols.”

In fact, ShadowDragon seems to strive toward total information awareness. In an interview about investigations, Clemens has stated, “I want to know everything about the suspect: Where do they get their coffee, where do they get their gas, where’s their electric bill, who’s their mom, who’s their dad?”

The precise inner workings of SocialNet are off limits to the public, as it is expensive software that is sold at the discretion of the company. Nevertheless, some online resources give an indication of how it works.

With its surveillance net cast across the internet, SocialNet can be used to perform investigations on persons and networks of interest, according to publicly available marketing materials. Investigators can run search queries for names, email addresses, phone numbers, aliases, or other information to begin to identify persons of interest, determine their physical location, ascertain their “lifestyles,” and analyze their broader networks (such as friends and friends of friends).

The materials also show how SocialNet organizes information for the analyst, visually mapping social network graphs and suggesting links between persons of interest and their networks. Timelines can be created to help sort out evidence and piece together clues into a broader picture of what the investigator is trying to uncover. Physical locations can be uncovered or inferred.

An online tutorial from 2011 depicts an investigator using SocialNet to hunt down possible targets by cross-referencing their company domain names with their email addresses, then finding a friend who two targets might have in common. The demonstration suggests that the investigator might want to “social engineer” — or trick — the mutual friend into speaking to the targets.

OI Monitor

The other ShadowDragon tool purchased by the Michigan State Police, OIMonitor, sends alerts in response to the sort of data captured by SocialNet, a company engineer says in an online video.

Other company materials say OIMonitor can go further, helping to detect potential crime before it happens and performing other advanced feats. One video explains OIMonitor can “automate and customize monitoring parameters.” In another video, a ShadowDragon representative provides an example of a corporation looking to protect its physical venue or executives. The corporation would “build out an entire dossier of attack patterns, of things people say that’s bad or something threatening,” and OIMonitor “just alerts them when it sees the criteria that they’ve set and that they have experience recognizing as a problem.”

Clemens told me that “customers come to us for the ability to identify and analyze previous patterns of behavior and relationships using only public information. We disagree with predictive policing and so we don’t build products with predictive capabilities or even suggestions.” Yet their own website says, in the description for the “Predicting Violence” video, “Clever security teams use OIMonitor to find indicators of unrest and violence before they start. Because riots don’t start in a vacuum; there are always indicators.” It’s also unclear if information pulled from ShadowDragon may be pooled with other data and used by clients for predictive policing on other systems (Clemens declined to comment on that).

Hatch raised an alarm about the civil rights implications of ShadowDragon’s software, stating, “It could be used to incorrectly identify Black people as criminal suspects and out social justice activists who wish to remain anonymous for fear of being harassed by police and white nationalists.”

ShadowDragon also appears to be hoarding information that users and platforms wanted to delete. OIMonitor provides clients with access to ShadowDragon’s private “historical archive from 2011 to today,” and it saves monitoring results in case the data disappears from the web, according to one company video.

In a case example given by the company, running the phone number of a suspect through the ShadowDragon software “popped up with an old Foursquare account” he had logged into at his mother’s house 10 years ago. After looking for the suspect for a month, the investigators were able to find him the following day.

In addition to police, ShadowDragon services corporate clients, and it can be potentially used for worker surveillance. In a blog post, the company advertised the ability to use OIMonitor for employee background checks by employers. Clemens declined to respond to questions about using ShadowDragon for worker surveillance.

Kaseware: An End-to-End Investigative Platform

Compared with ShadowDragon, Kaseware, the other software company contracting with Michigan State Police, is more sweeping in scope, handling more aspects of police work and venturing into the controversial realm of algorithmic crime fighting.

In 2009, Kaseware’s founders were working at the FBI, where, the company says, they transformed its 1980s mainframe system into an award winning, modern, web-enabled platform called Sentinel. Soon thereafter, some of the designers of Sentinel left the FBI to build Kaseware, based out of Denver and launched in 2016 as a cloud “software as a service” product for government and corporations.

Kaseware is a centralized online platform where law enforcement authorities, intelligence agencies, and corporations can dump their surveillance data. Once on the platform, the surveillance can be monitored, mapped, and otherwise analyzed using tools built specifically for Kaseware. The company touts the system’s speed and ability to integrate diverse sources of information for command-and-control centers, saying it handles investigations and security monitoring in an “end-to-end” way: from the ingestion of raw surveillance at one end to the conclusion of an investigation at the other. Its diverse set of capabilities are similar to Microsoft’s Domain Awareness System.

Kaseware claims to streamline a wide range of law enforcement drudgery: generating reports, managing workloads, facilitating video conferences, and querying information from the controversial federal records clearinghouse National Crime Information Center. A redacted portion of the MSP contract says it can “integrate with FBI eGuardian system via file exchange.” The eGuardian system allows the FBI to collect and share Suspicious Activity Reports, or SAR, from different agencies across the United States. As the ACLU notes, the system gives law enforcement officials broad discretion to collect information about commonplace activities and to store it in criminal intelligence files without evidence of wrongdoing.

A cornerstone Kaseware feature is its ability to ingest and analyze massive amounts of data. Files, records, logs, disc images, and evidence are pulled into the platform, which can also handle evidence from “recordings, body cameras, closed-circuit television (CCTV) cameras and other sources.” The company claims it can help hunt down a perpetrator’s physical location.

Kaseware marketing materials say its platform ingests zip codes, addresses, GPS coordinates, geotags, satellite imagery, and data from internet-connected devices, correlating it with “socioeconomic trends and environmental events to create layered maps” to reveal “illegal activity” and — crucially, for civil rights advocates — conduct “predictive policing.”

Predictive policing, or the use of statistics that quantifies past crimes to predict future ones, has been heavily criticized by legal scholars and activists on grounds that the systems generate discrimination and harm. Two scholars tested the PredPol predictive policing software for Oakland, California, and found its software would target Black people at twice the rate as white people. This is because Black people are overrepresented in Oakland’s drug crime databases, leading to disproportionate policing of low-income communities and communities of color.

The Michigan State Police told me, “We do not use the predictive policing function of the Kaseware platform.” However, it is worth noting the capability is there, and the software has been sold to other clients who may be making use of it.

Kaseware also touts its access to open source intelligence across its marketing literature. Its platform utilizes OSINT tools like ShadowDragon “to instantly search hundreds of open web, dark web, deep web and social media sources to access crucial data on cybercriminals’ names, keywords, emails, aliases, phones numbers and more.” Clients “can also import social media information for forensic analysis alongside other case details, including photos, followers, likes, friends and post connections.”

It’s unclear if Kaseware has special access to information or services with the companies listed in the way that Dataminr, for example, is provided access to Twitter’s “firehose,” a database of every public tweet from the moment it was posted. Twitter’s senior director of global public policy strategy, Nick Pickles, told me in an email that “we’re not able to disclose details of our commercial agreements,” but it is “safe to say that” Kaseware is “on our radar.” Another Twitter spokesperson, Katie Rosborough, did not answer questions about Kaseware or ShadowDragon, saying only that Twitter’s public programming interface is not available for law enforcement purposes. Partners like Dataminr historically have not used that interface.

Contracts and Deployments

The Michigan State Police contract redacts every mention of ShadowDragon, SocialNet, OIMonitor, and Microsoft Azure in the contract shared with the public. David Goldberg’s FOIA request was “partially denied” citing exemptions to the act to protect “trade secrets, or financial or proprietary information”; to “protect the security or safety of persons or property, or the confidentiality, integrity, or availability of information systems”; and to protect “the identity of a person who may become a victim of a cybersecurity incident as a result of the disclosure of identifying that person” or that person’s “cybersecurity-related practices.”

As I reported at The Intercept, through its Public Safety and Justice division, Microsoft provides an extensive array of services to police forces across the world via its own products and that of partners (like Kaseware), who typically operate on the Azure Cloud. Microsoft services the U.S. and Israeli militaries with its HoloLens augmented reality goggles. Its carceral solutions include its own Digital Prison Management Solution based on its Domain Awareness System surveillance platform built with the New York Police Department years ago. Together with its partners, Microsoft’s products and services extend across the carceral pipeline, from juvenile detention and pretrial through prison and parole.

Kaseware’s Chief Business Officer Mark Dodge, a former Naval intelligence and CIA officer, told me in interviews prior to this year that before working at Kaseware, he had worked at Accenture, where he helped develop Microsoft’s Domain Awareness System for the NYPD. He said he also did work for Singapore, which runs the Microsoft DAS, and “a couple others,” including in London. Dodge then had a brief stint with Microsoft partner Axon, the industry leader in Taser stun guns and body cameras — illustrating how circles in the intelligence, police, and corporate surveillance industry intersect.

The length of the MSP contract is five years, from January 31, 2020, to January 31, 2025. The Kaseware license costs $340,000 annually, while SocialNet and OIMonitor cost $39,000 each, bringing the package to $418,000 per year, or $2,090,000 over five years. The state of Michigan redacted the contract values of ShadowDragon features. The MSP opted for a two-day training session at $3,000, which ShadowDragon says constitutes a “big deep dive on threat assessment and sentiment analysis.”

The total cost of the MSP contract is $3,293,000.

The sum paid to Microsoft for its Azure Government Cloud services is bundled into the “Licensing & Support Services” portion of the contract, and there is no indication how much of that money Microsoft receives.

Because most of their contracts are not made public or difficult to access, it’s hard to discern how pervasive Kaseware and ShadowDragon are in the world.

The first ShadowDragon contract with the U.S. Immigration and Customs Enforcement agency was awarded to IT firm C & C International Computers & Consultants, Inc. on July 16, 2020, at a cost of $289,500. The second was for a contract awarded to cybersecurity firm Panamerica Computers on August 31, 2021 at a cost of $602,056. Both were for the use of SocialNet.

ShadowDragon’s SocialNet, OIMonitor, and malware investigation product MalNet is also being deployed by IT firm ALTEN Calsoft Labs and Cloudly in Asia — “especially India” — as “solutions for industries such as Government, Banking, Financial Services, Healthcare and many other verticals.” ALTEN is headquartered in Bangalore, India, and has offices in the U.S., Europe, and Singapore. Cloudly is a cybersecurity, intelligence, and surveillance firm based in Silicon Valley.

With offices in the U.S. and Denmark, ShadowDragon claims a market presence in “North America, Europe, the Middle East, Asia and Latin America.”

When asked about potential human rights abuses by clients, Clemens said the company vets “all in-bound requests for our products to ensure they’re not used to conduct human rights violations.”

Dodge, in the interviews predating this story, told me Kaseware had about 30 customers as of June 2020 but does not disclose most of them. The Winslow, Arizona, Police Department rolled out a Kaseware Computer Aided Dispatch and Records Management System in 2018, and the Wickenburg, Arizona, Police Department was at least considering it.

Kaseware states its platform “is now used by police departments around the world, Fortune 100 Companies, and many international non-profit organizations.”

Kaseware did not respond to a request for comments for this article.

Human Rights: A World of All-Seeing Public Surveillance

With Kaseware and ShadowDragon, we live in a world where the public’s online behavior can be monitored across the internet and accessed at the click of a button to determine who we are, who we know, what our “lifestyle” is like, where we are located, and more.

These capabilities fundamentally change police powers, said Eric Williams, managing attorney at the Detroit Justice Center’s Economic Equity Practice: “It is qualitatively different when you go from the police being able to check information” a little at a time “to artificial intelligence being able to analyze everything that you’ve done online.”

The potential for discriminatory applications is enormous. Williams noted that searches made by big data tools are “inevitably biased against people of color, poor people” and the like. He said that activists from Black Lives Matter, unions, and the #MeToo movement may be targeted by these technologies, “depending on who is in charge of them.”

Phil Mayor, a senior staff attorney at the ACLU of Michigan, said of ShadowDragon, “mapping of the relationships between people risks suspicion by association” and “is likely to entrench systemic racism and is a threat to everyone’s privacy. … This presents the scary possibility of law enforcement of our daily lives that would be unimaginable until recently.”

There is virtually no transparency behind what Kaseware and ShadowDragon do, or how the Michigan State Police and other clients might be using their products, where they are deployed, for what purpose, and who gets access. Likewise for how these tools impact activists, the poor, and marginalized communities, who are disproportionately the targets of police surveillance.

“It’s deeply concerning that this kind of technology is being purchased and used by law enforcement without public discussion,” Mayor told me. “Before engaging in new forms of surveillance of citizens, law enforcement should be coming to the polity and asking what we expect in terms of our privacy rather than making those decisions for us.”

Williams echoed this, stating, “It is problematic that public money is being spent on surveillance, of a particularly intrusive type, and the public is unaware of it.” Even if the police want to keep their surveillance methods hidden, “the public has a right to know, and should know, given the lack of laws we have governing a lot of electronic surveillance.”

In the U.S., as many as 70 percent of police forces use social media to gather intelligence and monitor the public. Yet the law does little to constrain these kinds of tools and practices.

“There’s not a lot of regulations on this,” Williams said, “and we can’t begin to have a discussion on how it should be regulated if we’re not aware that it’s happening.” He added that he favors a ban on the technology, given its opaque deployment and intrusive nature.

Dragnet social media surveillance needs to be urgently addressed by lawmakers, who should step in and ban this attack on civil rights and liberties immediately.

Thursday, September 2, 2021

Fridge & dishwasher makers restrict repairs!

Hindering access to information for technicians can mean higher costs and longer waits for customers — and more appliances sent to landfills.

How fridge and dishwasher makers restrict repairs — and enable more e-waste
By Jared Newman
FASTCompany, Aug 31, 2021

For Dean Landers, fixing people’s refrigerators, dishwashers, and washing machines is more of a hassle than it should be.

Even after 40 years running an award-winning repair service in Baltimore, Landers says he still gets the runaround from appliance makers. He can’t always obtain the diagnostic data or electronic codes he needs to finish a job, and if he needs to consult with the manufacturer when all the usual repair steps fail, some won’t even let him pay for the privilege.

That all translates to longer waits and costlier repairs for customers, who in turn may end up replacing their appliances instead of fixing them.

“Every day, we run into something where we need to figure something out by doing an end-around, by talking to somebody else, by doing deeper-dive research than I should have to do because of the structure that these manufacturers have set up,” Landers says.

Home appliances are an overlooked facet of the right-to-repair movement, which aims to make parts, tools, and diagnostic information more easily available to users and independent repair shops. While the difficulties of repairing consumer electronics and heavy equipment have received widespread attention, large appliances have flown under the radar, even as evidence shows that they’re more prone to breaking down than they once were.

That leads not just to greater expenses for consumers, but to more electronic waste. Data from the Environmental Protection Agency shows that 2.1 million tons of waste from major appliances went to landfills in 2018, up from 1.2 tons in 2005, even as recycling increased during that same time frame. A 2015 United Nations University study found that large appliances, such as dishwashers and washing machines, made up nearly two-thirds of all e-waste worldwide. Unlike with phones and other consumer electronics, home appliances have no thriving refurbished market, likely due to the high costs of hauling the products around.

Lawmakers have started to take notice. Large appliances like refrigerators, dishwashers, and washing machines are becoming the next frontier in the growing right-to-repair movement, with a new bill in Congress and fresh interest from the Federal Trade Commission.

Why appliances are hard to fix

If you’ve ever suspected that appliance manufacturers don’t make them like they used to, the evidence is on your side. A 2015 study by the Öko-Institut, a German environmental group, found that 13% of all large appliances that people replaced in 2012 were less than five years old, up from 7% in 2004. Most of those replacements were prompted by breakdowns in the original products.

Based on surveys of its members, Consumer Reports also estimated in 2019 that 40% of all refrigerators will experience issues within their first five years, with problem rates as high as 60% for certain Electrolux and Frigidaire models. For dishwashers and washing machines, the chance of having an issue within five years was 30%, and it was 20% for ranges.

Matthew Zieminski, the general manager of operations for the appliance-repair booking service Nana, says home appliances are a lot more complicated than they used to be. A modern clothes dryer might have a dozen different functions, from steaming and wrinkle-releasing to low-heat drying. That means more potential points of failure, and more ways for users to break things by choosing the wrong settings.

“We do tend to see a shorter lifespan now than we did in the past. And part of that is just, there’s a lot more features, and it’s a lot more complex of an environment than it was 20 or 30 years ago,” Zieminski says.

Still, some reliability issues can’t just be explained by the presence of more technology. Last year, LG settled a class action lawsuit over compressor problems in nearly 1.6 million refrigerators. As part of the settlement, LG denied any wrongdoing and said its fridges weren’t defective. However, according to two technicians I spoke with, those fridges are now a frequent source of repair requests.

After publication, LG spokeswoman Taryn Brucia said the company now backs its refrigerators with a five year warranty on its cooling system, including labor, and a 10-year warranty for linear compressor parts with five years of coverage for labor.

LG is also facing a class action lawsuit over compressors in its Kenmore-branded refrigerators, and Samsung is facing a class action suit over its refrigerators’ ice makers.

Kei Son Summers, an appliance repair tech and the owner of Mr. Kei Services in Oklahoma City, says he believes quality control has fallen by the wayside as companies race to get their products out the door.

“It’s a problem all around when manufacturers don’t take the time to quality-check their [product] before it goes out,” he says.

Authorized repair pressure

Because their appliances are breaking down faster, manufacturers have strong incentives to drive down the cost of repairs while they’re still under warranty, which is often for one year but can run longer depending on the manufacturer. One way companies accomplish this is by pressuring technicians to perform warranty repairs at below their typical costs, says Nathan Proctor, who heads the right-to-repair campaign for the U.S. Public Interest Research Group, or U.S. PIRG.

Proctor says that in many cases, technicians can only access troubleshooting guides or diagnostic information by becoming authorized service providers, but that authorization can come with strings attached. For instance, the manufacturer can dictate the price of warranty repairs and require a certain number of them, effectively forcing technicians to recoup their costs in volume or through additional out-of-warranty work.

Three repair technicians confirmed to me that this is common practice among manufacturers.

“If you don’t take the warranty jobs, you can’t get access to the parts, you can’t get the service instructions, and you can’t service the out-of-warranty stuff, so you’re kind of over a barrel,” Proctor says.

While joining an authorized repair program isn’t always detrimental—it can lead to new business, for instance, or provide steady work for new technicians — working with every manufacturer doesn’t always make sense. Repair companies may not want to become authorized if they don’t stand behind a company’s products, or if the brand isn’t popular enough to justify fixing appliances at cut rates.

In those cases, technicians have to rely on workarounds to get the information they need. For example, Dean Landers says that a lot of electronic parts have a programming code that allows them to pair with the existing system, but some manufacturers won’t provide those codes to unauthorized technicians. Landers says he’s hired a former field technician whose only job now is to track down the help that appliance makers won’t provide.

“If you don’t have a relationship with them, because you’re not authorized . . . you can’t get it,” he says. “And so now you’ve got to try to do an end-around. You’ve got to try and find someone that does have that access that will help you, through chat rooms, Facebook pages, myriad ways.”

Technicians and consumers do have options at their disposal for finding their own fixes. Sites like RepairClinic and Sears Parts Direct provide both parts and guides for common issues, similar to how iFixit works for consumer electronics.

But technicians say those resources don’t always have the information they need or the best prices. In those cases, they have to rely on quid-pro-quo arrangements with other repair providers, in which they trade access to various brands.

“You have to have a lot of friends is what you have to do,” Landers says.

Meanwhile, appliance makers put pressure on consumers to stick with authorized technicians as well. A 2018 survey of 50 appliance makers by U.S. PIRG found that 45 of them had threatened to void the warranties of any product repaired by a non-authorized service provider. Proctor says 43 of those companies were still threatening to void warranties as of last October.

The practice echoes that of the consumer electronics industry, which has used an array of tactics to discourage unauthorized repairs. Apple, for instance, has warned users against installing cheaper third-party screen replacements and withheld battery-health reporting features. Many other device makers have stuck scary—and potentially illegal—warning stickers on their products, telling customers that unauthorized repairs could void their warranties.

“It’s the same as Apple or anybody else. It’s to control the behavior of their existing customers to their own benefit,” Proctor says.

Safety first

The appliance industry has argued that its motivations aren’t so nefarious. In a 2019 statement to the FTC, the Association of Home Appliance Manufacturers, or AHAM, said it was concerned with the agency’s investigation into repair restrictions. The trade group cited the proprietary nature of manufacturers’ products and the safety of users, given that technicians are entering customers’ homes and dealing with delicate electronics.

Those arguments echo what other industries claim in their fight against right-to-repair laws, but AHAM also points to the large number of locally-owned repair shops that exist as evidence that the repair industry is healthy. The group says there are more than 20,000 service providers across the U.S., 87% of which are authorized with at least one brand, and 94% of which employ 10 or fewer people. (The group otherwise did not answer specific questions for this story.)

According to U.S. PIRG’s Proctor and some technicians, the industry’s argument that authorizing repair technicians is necessary to ensure quality doesn’t withstand scrutiny.

“I’ve seen some of these guys that are certified, they ain’t worth crap sometimes,” says Myles Ong, the owner of J&M Appliances in Las Vegas.

Landers had a similar assessment, especially outside of major cities where technicians are in shorter supply. “They’re not vetting those guys,” he says. “They need bodies.”

Besides, Ong says, he’s heard of numerous instances in which LG has sent compressors directly to consumers so they can find their own repair technicians, something that Landers says he’s seen happening as well. (LG spokesman Ken Hong would only say that the company doesn’t sell compressors through its customer service website.)

That may be a response to both a shortage of technicians during the pandemic and the refrigerators involved in LG’s class action lawsuit, but it undercuts the argument that only authorized technicians are trustworthy. It’s also prompting more people to just give up and replace their appliances.

“Now, [technicians are] scheduling people out weeks and months, and people don’t have that time,” Ong says. “They’re buying new stuff instead of waiting.”

Carrots and sticks

Landers says the solutions are straightforward. Working with the United Appliance Servicers Association, a trade group for technicians, he recently helped establish a vetting process for refrigerator company Sub-Zero that doesn’t have the usual warranty strings attached. The trade group vets the repair company, Sub-Zero gives its approval, and the technicians get access to the information they need.

“I think that’s a phenomenal middle ground,” he says.

While Landers doesn’t expect the industry to have a right-to-repair awakening on its own, new laws or regulations could help them see the light. In the EU, new rules that went into effect this year require appliance makers to offer replacement parts for up to 7 years for dishwashers and 10 years for other appliances. The FTC has already said that it will crack down on potential violations of the Magnuson-Moss Warranty Act, which generally bars companies from tying warranty coverage to a specific service provider. U.S. PIRG’s Proctor says stricter enforcement of those rules could give technicians more leverage when dealing with appliance makers.

Meanwhile, a bill proposed by Congressman Joe Morelle, called the Fair Repair Act, would require companies to make tools, parts, and diagnostics available for any product that depends even partly on the use of electronics. In other words, the very digitization that makes appliances more failure-prone could also end up ensuring they’re easier to repair.

The appliance industry will almost certainly fight those rules, but technicians believe the companies will ultimately benefit when anyone can make repairs more easily. It’ll improve the brands’ reputations, they say, and will benefit the environment at a time when customers are becoming more sensitive about e-waste.

“As long as we get the information to know how to do it, we don’t have to send stuff to a landfill,” Ong says.