Tech Volunteers Build Internet Lifeline for Amatrice’s Survivors

Posted September 2nd, 2016 at 10:49 am (UTC-4)
2 comments

Volunteers from Disaster Tech Lab have been installing local Wi-Fi networks in Amatrice in central Italy, to restore some internet connectivity to the town, much of which was destroyed after an August 24 earthquake. (#TeamDTL)

Volunteers from Disaster Tech Lab have been installing local Wi-Fi networks in Amatrice in central Italy, to restore some internet connectivity to the town, much of which was destroyed after an August 24 earthquake. (#TeamDTL)

Internet connectivity has become a way of life, so much so that its loss has deprived many survivors of the August 24 earthquake in Amatrice, Italy of their lifeline to the world. But a team of IT volunteers is on the ground to help fill the gap.

The Internet has become “so ubiquitous” that, for a lot of people, it is the main means of communication and the main means of access to information, said Evert Bopp, Founder and CEO of Irish nonprofit, Disaster Tech Lab (DTL), whose volunteers have been providing the central Italian town with much-needed connectivity.

After the 6.2-magnitude earthquake leveled Amatrice, killing 231 people, internet services were badly damaged. Thousands of residents, now living in shelters after losing everything, were in need of “some forrn of communication” to try and restore some semblance of normalcy to their lives and keep children distracted against a backdrop of devastation.

“It could be for various purposes,” Bopp added in an interview. “It could be as simple as staying in touch with friends and family and letting them know that you’re okay. It could be also things like your utility bills that keep going on even though your house is destroyed. You might have things like bills to pay.”

Disaster Tech Lab teams are providing shelters and command centers with satellite terminals and installing equipment to power local Wi-Fi networks with wind and solar energy. After the earthquake, first responders appealed to survivors to unlock Wi-Fi access on their mobile phones to help them find people trapped in the rubble.

The use of unlicensed Wi-Fi spectrum gives access to people with mobile devices and allows Disaster Tech Lab to rapidly deploy local networks whenever they respond to natural disasters, whether earthquakes, hurricanes or floods, in different parts of the world.

Volunteers from Disaster Tech Lab install satellite terminals to aid rescue efforts in Amatrice, much of which was destroyed in the August 24 earthquake. (#TeamDTL)

Volunteers from Disaster Tech Lab install satellite terminals to aid rescue efforts in Amatrice, much of which was destroyed in the August 24 earthquake. (#TeamDTL)

DTL has more than 250 volunteers working in 11 countries to address connectivity issues in disaster zones.

In some regions, volunteers deploy in areas where 4G or LTE mobile wireless services are still available even after the local telecommunications network has been largely destroyed.

“But because a lot of the aid organizations and responding organizations might come from abroad, they don’t have subscriptions … with providers,” said Bopp. “So we quite often use 4G or LTE connectivity also for backhaul [i.e., to transmit data back and forth beyond the original destination point] and then create a local Wi-Fi network to share it with people who need it, who need the internet access.”

“Connectivity has become such an integrated part of our lives,” he added, “and, you know, it creates a huge gap after a disaster.”

If you have IT skills and are inclined to help, visit the recruitment section on DTL’s webpage to volunteer.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Apple CEO Slams EU; Tech Firms Forge Artificial Intelligence Ethics

Posted September 1st, 2016 at 1:39 am (UTC-4)
Leave a comment

Today’s Tech Sightings:

FILE - Apple CEO Tim Cook waves as he arrives on stage to deliver a keynote address at the Worldwide Developers Conference in San Francisco, California, U.S. , June 8, 2015. (Reuters)

FILE – Apple CEO Tim Cook waves before delivering a keynote address at the Worldwide Developers Conference in San Francisco, California, U.S. , June 8, 2015. (Reuters)

Apple’s Tim Cook: EU Ruling on Apple’s Irish Tax ‘Total Political Crap’

Apple CEO Tim Cook described the European Union’s demand that his company pay nearly $14.5 billion in back taxes as “total political crap.” The EU had said Apple was getting illegal state aid in Ireland, whose government is divided on the issue. And while the U.S. government has criticized the EU decision, the debate is far from over as France and Germany have now come forward in support of the EU.

How Tech Giants Are Devising Real Ethics for Artificial Intelligence

As artificial intelligence (AI) continues its advance into virtually every aspect of life, some of the world’s largest tech companies are trying to come up with a code of ethics for AI development. Researchers from Google’s parent company Alphabet, Amazon, Facebook, IBM and Microsoft are all coming together to discuss AI implications and ensure that related research focuses on benefiting people. The meeting coincides with a new study from Stanford University that looks at the social and economic implications of artificial intelligence.

The Smart Person’s Guide to the Dark Web

It’s a two-edged sword. The unindexed, encrypted network of websites and servers known as the Dark Web is frequented by legitimate and shady parties alike, from criminals and law enforcement agencies to journalists and dissidents. The Tech Republic’s guide examines how the Dark Web works and how to navigate it safely.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

India to Probe WhatsApp Privacy; DeepMind, UK Join to Fight Cancer

Posted August 31st, 2016 at 11:42 am (UTC-4)
Leave a comment

Today’s Tech Sightings:

A security update message is seen on a Whatsapp message in this illustration photo, April 6, 2016. (Reuters)

A security update message is seen on a WhatsApp message in this illustration photo, April 6, 2016. (Reuters)

WhatsApp in Hot Water in India Over Privacy Policy Changes

Messaging service WhatsApp’s about-face on privacy has raised eyebrows in the U.S., Europe, and now in India. New Delhi’s High Court has asked the government and telecom regulators to look into WhatsApp data-sharing after some users complained about changes in its privacy policy. In the U.S., the Federal Trade Commission has been asked to intervene. WhatsApp said last week it will share users’ data, including phone numbers, with Facebook, despite earlier promises of protecting their privacy.

Google DeepMind AI to Help Doctors Treat Head, Neck Cancers

A new collaboration between Google and Britain’s National Health Service will put the tech company’s artificial intelligence system DeepMind to work to reduce radiotherapy planning times for the treatment of head and neck cancers. DeepMind will conduct research to determine if radiotherapy planning, which takes a long time when dealing with sensitive body parts prone to damage, can be reduced from four hours to one.

Trump’s New App Wants You — and Your Data

Privacy activists are alarmed by a new, invasive app launched by the campaign of U.S. presidential candidate Donald Trump that aggressively collects the data of supporters. If allowed, the app, called America First, will also collect data about supporters’ friends as well. Users who donate to the Trump campaign, share the app or watch ads are awarded points – sort of like points you get when playing a video game.

More:

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Apple to EU: It’s Jobs or Taxes; Sri Lankan Teen Hacker Gets Fine, Jail

Posted August 30th, 2016 at 11:55 am (UTC-4)
Leave a comment

Today’s Tech Sightings:

FILE - A view of buildings on The Apple campus in Cork, southern Ireland. (AFP)

FILE – A view of buildings on The Apple campus in Cork, southern Ireland. (AFP)

Apple: You Can Have Taxes or You Can Have Jobs, but You Can’t Have Both

That sentiment sums up Apple’s official response to the EU’s decision that the company received illegal state aid and should pay Ireland nearly $13 billion in back taxes. But the situation is complicated due to an understanding between Apple and Ireland that provides thousands of jobs in exchange for low tax rates. Moreover, Apple is the largest single taxpayer in Ireland right now. The U.S. Treasury Department has also expressed disappointment over the EU’s decision.

Sri Lankan Teen Hacks President’s Website, Gets Fine, Jail Time

A 17-year-old Sri Lankan who thought scheduling exams around Sinhala and Tamil New Year celebrations was a bad idea, hacked into the president’s website to demand the exams be rescheduled. The hacker’s message included additional rants before it was taken down. The teen now faces a $2,000 fine and up to three years in jail.

What to Expect at Europe’ Biggest Trade Show

IFA 2016, Europe’s biggest consumer electronics show, will run September 4-7 in Berlin, Germany. All the big names will be there. Expect announcements about new Android Nougat and Windows phones, virtual reality headsets, wearable health gadgets and more.

More:

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Developing Countries Put Limited Tech to Smarter Use

Posted August 26th, 2016 at 11:06 am (UTC-4)
Leave a comment

Tanzanian porters and guides stand on a rock half way up Kilimanjaro at sunset on Sept. 21, 2014 trying to get a mobile phone signal to call their wives. (AFP)

Tanzanian porters and guides stand on a rock half way up Kilimanjaro at sunset on Sept. 21, 2014 trying to get a mobile phone signal to call their wives. (AFP)

Is technology “dumbing down” people? That’s probably a question for societies where it is ubiquitous and obsessive, not for places like Tanzania – an East African nation low on the human development index, where access to technology is limited.

The question hardly matters. It only offers a glimpse into a different world.

Ninety percent of Tanzania’s population of about 48 million people live on less than $3 a day. Fourteen percent subsist on less than a dollar, getting only one meal a day. And child mortality, low-life expectancy, high malnutrition and lack of basic facilities are every day realities.

“In developing societies, people have more limited access to technology. They are more conscious of what they want to use [technology] for and how it augments their lives, and it’s often cultural as well as practical,” said Edward Charles Anderson, Senior ICT Policy Specialist with the World Bank’s Transport and ICT global practice in Tanzania.

Yet Tanzania boasts at least 40 million mobile subscriptions, not counting multiple subscriptions. “Even though they live on $3 a day, they seem to prize a mobile phone and the things they can do with it,” he said in an interview. “But we have to recognize they are fairly simple phones. So we are talking about technology through SMS services … and things like this.”

The cheapest smartphone sells for about $25, which is roughly around 55 Tanzanian shillings. But in the absence of infrastructure, electricity and basic facilities, these devices are a necessity.

The absence of financial infrastructure, for instance, has placed Tanzania, much like East Africa in general, on the cutting edge of mobile payments. As the country leapfrogged to mobile platforms, it became the “largest money market in the world with the most number of users.”

“The lack of functional financial [services], for example, means that having mobile money has had a huge impact for good in East Africa – credit cards and checkbooks don’t work here,” said Anderson. So it’s kind of a vital tool whereas maybe it’s more like a gimmick in somewhere like Silicon Valley right now.”

Mobile money gives Tanzanians in rural areas the opportunity to buy consumer goods like televisions and solar panels – “needs that change people’s lives whether it is seen as a luxury good or a core necessity,” said Anderson.

And where there are no roads or access to knowledge and information, or tools and research facilities, access to the Internet and communication tools becomes “very powerful.”

“I see access to information as being really important for keeping in touch with family members,” he said. “… We see very creative uses of WhatsApp, but I don’t think it’s dumbing them down.”

Meanwhile in the US

It’s a different story. A recent Marist Poll undertaken for WGBH Boston, asked 622 U.S. adults whether or not technology makes them smarter or dumber. The survey was done for the Public Broadcasting Service’s (PBS) debate series Point Taken.

Up to 71 percent said they believed technology is making people less human, and 54 percent said it makes them less connected to their families. Nearly 49 percent reported that technology makes people dumber, while 46 percent said it makes people smarter. The results varied depending on the demographic.

“Technology is a catalyst and enabler to do things differently,” commented Anderson. “It augments many of our capabilities. It has a positive impact [and it] ultimately comes down to how we apply it.”

But he said proper context and a human perspective are needed to determine how technology is to be applied to meet goals. Otherwise, it will be a distraction.

“We sometimes isolate or idolize it too much rather than really integrate it into what we are trying to achieve,” he added.

In that, Tanzania might have it right.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

WhatsApp Turns Its Back on Privacy; Happy 25th Birthday, Linux

Posted August 25th, 2016 at 11:55 am (UTC-4)
Leave a comment

Today’s Tech Sightings:

A security message is seen on a Whatsapp screen in this illustration photo April 6, 2016. (Reuters)

A security message is seen on a Whatsapp screen in this illustration photo April 6, 2016. (Reuters)

WhatsApp Is Going to Share Your Phone Number With Facebook

So much for WhatsApp’s promise to protect the privacy of its one billion users! The global messaging service today announced users have a limited time to opt-out of sharing their information with Facebook. WhatsApp claims Facebook won’t post the telephone numbers online or share them. But Facebook intends to use the data for targeted ads.

Linux Turns 25! How a Hobby OS Hit It Big

Linux, started by Finnish-American software engineer, Linus Torvalds, celebrates its 25th birthday today, August 25, 2016. The open source operating system began with a message from Torvalds that said he was starting a free OS as a hobby. Today, Linux powers millions of servers, devices, and most of the world’s Android smartphones.

5 Ways Tech Is Helping Italian Earthquake Rescue Efforts

The death toll continues to rise in the aftermath of the 6.2-magnitude earthquake that rocked central Italy on Wednesday. But technology is helping rescuers by providing unsecured Wi-Fi access to local networks, text donations, free texts and calls, free accommodation and Facebook safety checks.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Drones for Refugees; Tim Cook’s Apple, 5 Years Later

Posted August 24th, 2016 at 1:24 pm (UTC-4)
Leave a comment

Today’s Tech Sightings:

Migrants and refugees fleeing Libya are assisted by members of a Spanish NGO, during a rescue operation at the Mediterranean sea, north of Sabratha, Libya, Aug. 18, 2016. (AP)

Migrants and refugees fleeing Libya are assisted by members of a Spanish NGO during a rescue operation at the Mediterranean Sea, north of Sabratha, Libya, Aug. 18, 2016. (AP)

How a Former Refugee Uses Drones to Help Others Survive Dangerous Sea Crossings

“Drones for Refugees” is a project designed to help rescue workers move swiftly to locate and rescue refugees making the treacherous crossing of the Aegean and Mediterranean seas to a better life. The project was founded by drone expert Mehdi Salehi, who fled Afghanistan 15 years ago.

Tim Cook at 5 Years: More Profits for Apple, Less Innovation

It’s been five years since Tim Cook took over as the CEO of Apple, and his report card is in. By all accounts, Cook’s Apple has shifted from cool innovation to profitability. Writers Jefferson Graham and Jon Swartz argue that today’s Apple is more prone to introduce minor updates to older products than introduce new cultural hits.

Google Hires Satellite Exec to Head Up Project Loon

Google is moving forward with Project Loon, designed to use balloons to deliver internet connectivity in remote parts of the world. Now, Google’s latest hire – Viasat executive Tom Moore- could move the program, which is still being tested, into the commercial phase

More:

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

WWW Turns 25; Saving Lives in South Africa’s Slums

Posted August 23rd, 2016 at 12:06 pm (UTC-4)
Leave a comment

Today’s Tech Sightings:

FILE - World Wide Web founder Tim Berners-Lee speaks during a news conference in London Dec. 11, 2014. (Reuters)

FILE – World Wide Web founder Tim Berners-Lee speaks during a news conference in London Dec. 11, 2014. (Reuters)

Happy 25th Birthday to the World Wide Web

Yes, it’s been 25 years already. On August 23, 1991, Switzerland-based computer scientist Tim Berners-Lee deployed the World Wide Web (WWW), where all documents and web pages are stored, for the first time. Berners-Lee, who worked for CERN – the European Organization for Nuclear Research – invited users outside of the organization to join the web, making August 23, 1991, the official anniversary for the birth of the WWW.

US Plan to Collect Social Media Info From Visitors Faces Fierce Opposition

Tech advocates and civil liberty groups are pushing back against a move by the U.S. Department of Homeland Security to collect social media data from visa-waiver visitors to the country. Critics argue individuals who pose a threat to the United States are unlikely to disclose their social media data and presence on travel and entry forms.

Lumkani Can Save Lives in Slums

After a January 2013 fire destroyed about 800 shacks and left thousands homeless in Khayelitsha, South Africa, Francois Petousis came up with an answer. The Cape Town University electrical engineering student and five co-founders created a little blue box called Lumkani. The device is the world’s first networked heat-detector designed for slum environments.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

‘Mobile Security Broken’ Without Concerted Effort for Change

Posted August 19th, 2016 at 10:51 am (UTC-4)
Leave a comment

A woman sits near a display showing the dangers of hackers breaking into mobile devices during the Global Mobile Internet Conference in Beijing, China, April 29, 2016. (AP)

A woman sits near a display showing the dangers of hackers breaking into mobile devices during the Global Mobile Internet Conference in Beijing, China, April 29, 2016. (AP)

Does any of this sound familiar? A vulnerability or malware is discovered. A patch is released and the problem is fixed. But then a new threat pops up and the cat-and-mouse security cycle begins again with no winners in sight. And some security experts believe this approach will no longer be sustainable as more and more devices go online.

Mobile security is broken. And the industry must work together with federal regulators in order to fix it – Cesare Garlati, co-chair of the Mobile Working Group at the Cloud Security Alliance

There is no doubt that the patching process whenever researchers discover new malware or software vulnerability is a lifesaver, not just for mobile devices, whose popularity makes them a prime target for hackers and criminals. But how much longer can this tug-of-war continue?

“This game of cat-and-mouse between hackers and device manufacturers is distracting us from the larger issue,” said prpl Foundation’s chief security strategist Cesare Garlati, co-chair of the Mobile Working Group at the Cloud Security Alliance.

“In a few years,” he warned, “the security issues we see with mobile will be seen as a small segment of catastrophic IoT security problems. Every connected device needs a clear path for receiving critical security updates—not just mobile.”

Barring that, every connected device could pose a threat. “And the hyper-focus on mobile security updates simply isn’t enough,” he added. …”Mobile is now just a small fraction of the devices that surround us.”

The threat landscape has changed “to be almost unrecognizable” over the last two years, said Garlati. And the situation is unlikely to improve as new unprotected devices hit the market and more vulnerabilities and malicious software emerge every day.

“We continue to see increases in banking malware and phishing schemes adapted to mobile devices,” said Kaspersky Lab’s Kurt Baumgartner, Principal Security Researcher, Global Research & Analysis Team, in an email.

Android, the world’s most popular mobile operating system, is a particularly desirable hacking target and one that “continues to be splintered globally.” Baumgartner said that will require major suppliers to “improve their update delivery model.”

Add to that the vulnerabilities that continue to emerge in crypto libraries – tools that are used to create encryption keys, manage secure certificates and perform other encryption-related functions. “The VPN market and the need for properly encrypted network communications continues to be a confusion for almost all mobile customers out there,” he said. That leaves their network communications exposed. “There seems to be no end in sight for this sort of problem.”

“Everything will remain to a certain extent insecure,” added Travis Witteveen, CEO of Avira, a maker of antivirus software, as criminals follow the money and the highest volume with the lowest chances for getting caught. “After all,” he noted, “banks are still being robbed today and houses broken into. To think that computing devices should be different is naive.”

While there is no such thing as perfect security, he said “users should take the responsibility and invest in solutions to match their usage on mobile OS platforms just as they do in the physical world too.”

It doesn’t help that a recent study found that people ignore security warnings 90 percent of the time. But Baumgartner said “general user gullibility” and an increase in ransomware and business email compromise will lead defenders to focus on stronger verification and protecting encrypted communications.

That might not be enough to address larger mobile security issues, particularly when manufacturers are often in a hurry to be first to market with their new products. Garlati believes  cooperation between industry leaders and government regulators will be required to ensure that any forthcoming regulation encompasses technologies like Internet of Things devices that are redefining mobile security.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

US to Cede Internet DNS Control; Window’s 10’s Data Mining Dilemma

Posted August 18th, 2016 at 12:40 pm (UTC-4)
Leave a comment

Today’s Tech Sightings:

FILE- Internet Corporation for Assigned Names and Numbers, ICANN, President and Chief Executive Rod Beckstrom, speaks during a press conference in London. (AP)

FILE- The logo of the Internet Corporation for Assigned Names and Numbers, ICANN, is pictured during a press conference in London, England. (AP)

US: We’re Now Ready to Give Up Governing the Internet

The U.S. National Telecommunications & Information Administration says it is now ready to pass internet domain name (DNS) control to the Internet Corporation for Assigned Names and Numbers (ICANN), a California-based nonprofit organization. The move marks the end of a 20-year U.S. plan to transfer control to ICANN.

Braigo Launches Web App to Help the Blind Parse Text on Images

More than 285 million visually-impaired people around the world are unable to experience all the various facets of the internet. To help address the problem, Braigo Labs, a provider of scientific and technological services, is launching a free web application for more than 50 languages to help  blind and visually-impaired people read text on images.

Researcher Claims Microsoft Is Involved in ‘Sneaky Data Mining’

Windows 10 transmits encrypted data from users’ computers every five minutes, according to Mike Patterson, CEO of security analytics group Plixer. The transfer continues even after the operating system’s settings are adjusted, and it is unclear what type of hidden information is being transmitted, presumably without the user’s knowledge. In fairness, Microsoft is not the only company engaged in surreptitious data collection.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.