Searching for smart, safe news you can TRUST?

Support safe, smart, REAL journalism. Sign up for our Axios AM & PM newsletters and get smarter, faster.

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Searching for smart, safe news you can TRUST?

Support safe, smart, REAL journalism. Sign up for our Axios AM & PM newsletters and get smarter, faster.

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Denver news in your inbox

Catch up on the most important stories affecting your hometown with Axios Denver

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Des Moines news in your inbox

Catch up on the most important stories affecting your hometown with Axios Des Moines

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Minneapolis-St. Paul news in your inbox

Catch up on the most important stories affecting your hometown with Axios Minneapolis-St. Paul

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Tampa-St. Petersburg news in your inbox

Catch up on the most important stories affecting your hometown with Axios Tampa-St. Petersburg

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Illustration: Aïda Amer/Axios

As the tech industry weaves its products into the fabric of the physical world, it's also extending the insecurities and dangers of digital systems in perilous new ways.

Why it matters: Just as we're finally getting used to the idea of protecting our online accounts and data, we have to start thinking about the vulnerability of the spaces and objects around us to small acts of trickery and sabotage that mess with computers' heads.

In the most dramatic recent demonstration of this technique, artist Simon Weckert "created" a faux traffic jam on Google Maps by filling a little red toy cart with 99 smartphones running the Maps app and rolling it down the sidewalk past Google's Berlin office.

  • Maps read the incoming signals to mean there were a lot of cars stuck on that street, and marked it red.

The big picture: Cybersecurity experts have long been sounding an alarm over the industry's failure to build proper security into "Internet of Things" products.

  • But physical-world hacks won't only happen through the digital lock-picking of internet-connected devices.
  • They will also increasingly take the form of people tampering with the physical world in order to trick, defeat or bypass machines.

Recently, researchers at McAfee tricked a Tesla into accelerating 50 mph by adding a small piece of black tape to a speed limit sign.

  • The tape fooled the vehicle into reading the speed limit as 85 instead of 35.
  • The vulnerability was in Tesla models from 2016. The manufacturer has since switched to a different camera.

Clothing and makeup to defeat facial recognition tech and other surveillance systems may sound like a joke or a gimmick, but "adversarial fashion" is real.

  • Protesters are the early adopters. In Hong Kong last year they used masks and lasers to counter police face-recognition equipment.
  • As surveillance in public places increases, countermeasures will grow more popular — think of them an incognito browser mode for the physical world.

We're beginning to turn surveillance technology on one another — with, for instance, parents and school systems wiring up kids in parole-style location trackers.

  • By putting this technology in the hands of youngsters and giving them an incentive to explore techniques for evading or defeating it, we're accelerating the process by which it will be redeployed in unpredictable ways.

Between the lines: Science fiction author William Gibson, who introduced the term "cyberspace" to the world back in 1981, defined it as "a consensual hallucination," an alternate reality composed of data "where the bank keeps your money."

  • Today, cyberspace and physical space intermingle, providing new opportunities for bad actors and new threats for the rest of us.
  • Gibson also famously wrote, "The street finds its own uses for things." Every new twist in surveillance is likely to inspire a new turn in countermeasures.

Go deeper

Trump bump: NYT and WaPo digital subscriptions tripled since 2016

Data: Axios reporting and public filings; Chart: Axios Visuals

The New York Times and The Washington Post have very different strategies for building the subscription news company of the future.

The big picture: Sources tell Axios that the Post is nearing 3 million digital subscribers, a 50% year-over-year growth in subscriptions and more than 3x the number of digital-only subscribers it had in 2016. The New York Times now has more than 6 million digital-only subscribers, nearly 3x its number from 2016.

Ben Geman, author of Generate
1 hour ago - Energy & Environment

Biden's emerging climate orbit

Photo illustration: Aïda Amer/Axios. Photo: Win McNamee/Getty Images

As of Tuesday morning, we know a lot more about President-elect Joe Biden climate personnel orbit, even as picks for agencies like EPA and DOE are outstanding, so here are a few early conclusions.

Why it matters: They're the highest-level names yet announced who will have a role in what Biden is promising will be a far-reaching climate and energy agenda.

Janet Yellen is back

Photo illustration: Sarah Grillo/Axios. Photo: Hannelore Foerster/Getty Images

A face familiar to Wall Street is back as a central player that this time will need to steer the country out of a deep economic crisis.

Driving the news: President-elect Joe Biden is preparing to nominate former Fed chair Janet Yellen to be Treasury secretary.