Alina Selyukh

Alina Selyukh is a business reporter at NPR, where she follows the path of the retail and tech industries, tracking how America's biggest companies are influencing the way we spend our time, money, and energy.

Before joining NPR in October 2015, Selyukh spent five years at Reuters, where she covered tech, telecom and cybersecurity policy, campaign finance during the 2012 election cycle, health care policy and the Food and Drug Administration, and a bit of financial markets and IPOs.

Selyukh began her career in journalism at age 13, freelancing for a local television station and several newspapers in her home town of Samara in Russia. She has since reported for CNN in Moscow, ABC News in Nebraska, and NationalJournal.com in Washington, D.C. At her alma mater, Selyukh also helped in the production of a documentary for NET Television, Nebraska's PBS station.

She received a bachelor's degree in broadcasting, news-editorial and political science from the University of Nebraska-Lincoln.

Remember the cryptex, the little handheld safe from The Da Vinci Code where entering the correct combination will reveal the secret message and entering the wrong one will destroy it?

Now replace the little safe with an iPhone, and instead of a secret message, it's holding evidence in a terrorism case. The critical combination? It's a passcode — one the FBI doesn't know, and one that Apple is reluctant to help the agency figure out.

It was a rumor that had many Twitter old-timers up in arms: Twitter is changing its signature structure of real-time posts in reverse chronological order.

It's true. The company now says it's got a new algorithm to predict which tweets you might not want to miss. Those selected tweets, minutes or hours old, will display at the top when you log in after an absence. The rest of the tweets below will remain in real-time and reverse chronology.

Can a kid succeed in school with only a mobile device for Internet access at home?

Lorena Uribe doesn't have to think about that one:

"Absolutely not," she says.

When her old computer broke down several years ago, she and her teenage daughter found themselves in a bind for about five months: homework to do and no computer or broadband access at home.

"I would take her to the mall and have her sit in Panera so she could use the Wi-Fi on her iPad from school," Uribe says.

Tech companies and privacy advocates have been in a stalemate with government officials over how encrypted communication affects the ability of federal investigators to monitor terrorists and other criminals. A new study by Harvard's Berkman Center for Internet and Society convened experts from all sides to put the issue in context.

The notion of a gun smart enough to tell who's holding it isn't new.

Since the 1990s, inventors have been developing firearms geared with technologies that can authenticate their users — for instance by recognizing the fingerprint, the grip or an RFID chip — and stop working if held by the wrong hands.

Predictions are always a tricky thing — especially for a fast-moving world like technology.

Alina Selyukh and Aarti Shahani spoke with Robert Siegel on All Things Considered about some of the biggest themes in tech and tech policy. You can hear their quick recap on net neutrality, drone regulations, self-driving cars and data breaches in the audio above.

After years of debate, cybersecurity legislation may pass this week, tucked inside the trillion-dollar federal spending bill.

The House and the Senate both have passed competing versions of cybersecurity legislation and pressed to negotiate a version they could pass before the end of the year. It's now part of the massive appropriations package, toward the end of the latest amended draft, which is expected to go up for vote later this week.

Is a drone a toy or a (tiny) airplane?

To the Department of Transportation, the question is far from complicated.

"Unmanned aircraft operators are aviators and with that title comes a great deal of responsibility," Transportation Secretary Anthony Foxx said on Monday while unveiling new drone registration rules.

In the words of Wired magazine, it's "one of the most stubborn mysteries of the 21st century": Who is Satoshi Nakamoto?

Satoshi Nakamoto is the pseudonym used to refer to the creator of bitcoin, which is the digital currency that has taken the financial world by storm.

Remember net neutrality?

Right, it's that brain-flexing term that refers to the idea that phone and cable companies should treat all of the traffic on their networks equally. No blocking or slowing their competitors, and no fast lanes for companies that can pay more.

In fact, the term itself was so nerdy that it's been "re-branded" as Open Internet.

For the first time in history, federal researchers report that a majority of U.S. homes rely on cellphones alone for a telephone connection, without a landline.

The number of cellphone-only households predictably has been climbing over the years, surpassing the households with both a landline and a mobile phone and now reaching almost 51 percent. And it's tracked by — of all agencies — the Centers for Disease Control and Prevention.

You couldn't look anywhere on Facebook without seeing it: friends, celebrities and complete strangers dumping buckets of ice water to raise awareness of ALS, a neurodegenerative illness also known as Lou Gehrig's disease.

The 2014 Ice Bucket Challenge ended up raising more than $115 million for ALS research and reached an unprecedented bar for a charity social media campaign — unprecedented and inimitable.

The Consumer Technology Association forecasts that 400,000 drones will be sold in the United States this holiday season. That's not to mention the commercial drones being developed by Google (now known as Alphabet), Amazon, Wal-Mart and others.

How do terrorists communicate to hide from investigators?

We know little about the means used by those involved in the deadly attacks in Paris, but intelligence and security officials have already launched a new wave of chatter about encryption.

If you live in an apartment building or another densely populated area and your Wi-Fi is slow, your neighbors bingeing on Netflix may be to blame.

Your and your neighbors' Wi-Fi networks have a limited number of wireless frequency channels to move your data. And when things get crowded and busy, Wi-Fi networks can overlap and bump into each other and slow down your Internet connection.

 

Copyright 2015 NPR. To see more, visit http://www.npr.org/.

Updated at 5:30 p.m. ET Nov. 11 to include information from the credit reporting companies and the Consumer Financial Protection Bureau.

In December 1912, financier John Pierpont "J.P." Morgan testified in Washington before the Bank and Currency Committee of the House of Representatives investigating Wall Street's workings of the time.

It's been about a year since Google (now known as Alphabet) first introduced its drone-delivery system known as Project Wing. The project now seems to have a timeline to become reality: 2017.

Reuters is reporting from an air traffic control convention:

Uber has shaken up what it takes to get from point A to point B in cities across the country with a simple premise: If you need a ride, a driver nearby could pick you up within minutes.

Behind that idea is an algorithm, which promises to keep supply and demand in constant balance, encouraging drivers toward busy areas and tempering customer requests by increasing the price of each ride. It's called surge pricing.

IBM's big-data ambitions have been well-known for years, thanks to the high-profile Watson computer that's been delving into all kinds of industries.

The latest is weather.

It's an obscure provision of a relatively obscure law, overseen, rather unpredictably, by the Librarian of Congress.

A section in the country's copyright law known as the Digital Millennium Copyright Act prohibits unlocking of "access controls" (in simpler terms, breaking digital locks to dig around computer code) on various software.

In the tense relationship between Russia and the United States, the latest salvo comes via The New York Times: According to American military and intelligence officials, Russian submarines and spy ships are "aggressively operating" near submarine cables that carry Internet communications, raising concerns of a potential attack "in times of tension or conflict."

When it comes to anti-bullying campaigns, Kortney Peagram has seen many: Wear this bracelet if you're not a bully, respond to something mean with something nice. They come and go like fads, she says:

"These awareness campaigns, if it's cheesy, they won't use it."

Peagram is a psychologist who works with more than 30 schools in Illinois to help teachers and students deal with bullying and confrontational behavior — in other words, what most kids would call drama.

Much of it is now online, where mercurial, youthful emotions fly at double-speed.

A court ruling on Friday gave Google a new boost of confidence for its ambitious goal to digitize all the world's books. The ruling also gives us a new test of the idea of "fair use" of copyrighted content for the era, in which we increasingly expect to find everything online including the kitchen sink.

For a decade now, Google's enormous project to create a massive digital library of books has been embroiled in litigation with a group of writers who say it's costing them a lot of money in lost revenue. On Friday, Google notched a new victory when a federal appeals court ruled that the company's project was fair use.

A three-judge panel's vote was unanimous. Here's the summary opinion written by Judge Pierre Leval of the 2nd U.S. Circuit Court of Appeals in Manhattan, in the case of Authors Guild v. Google, Inc:

On Tuesday, we reported on a push by some advocacy groups to make it easier for people to own, instead of rent, the boxes connecting them to cable TV.

No information is private online — the phrase is hardly news to anybody who actively uses the Web for work, play and in between. Here's a CNN headline dating back to 2013 that minces no words: "Online privacy is dead."

That particular CNN article focused on the revelations about the scope of Web data available to the federal government. The ensuing pushback still ripples out as privacy advocates and many tech companies try to rein in government access to what Americans say and do online.

Pages