What You Need to Know About HIPAA

Posted July 29th, 2016 at 10:35 am (UTC-5)
Leave a comment

VOA/T. Benson

VOA/T. Benson

The 1996 U.S. Health Insurance Portability and Accountability Act (HIPAA) was created to regulate the way health care providers handle health and medical data. But mobile technologies have since given rise to a new breed of health data trackers not covered by HIPAA – a trend that is raising concern as well as questions about HIPAA’s relevance.

Mobile health and fitness apps and trackers all are part of a new market that is not necessarily subject to HIPAA rules, which were designed for health care providers.

“HIPAA did not specify specific technologies,” said Andrew Boyd, assistant professor at the University of Illinois’ department of Biomedical and Health Information Sciences. The regulation was written to provide “policies and procedures in the frame of thought. Mobile technologies and the Internet of Things were not envisioned at the time.”

“We’re just now starting to understand what the implications are,” he said. “We’re trying to now understand the policies and what some of the security risks are. … We’re still in the beginning stages of this. So if the Internet of Things and the mobile apps mature to the point where they are fully integrated into the health care enterprise, the policy in HIPAA will apply. And these are things that people need to begin to understand.”

In a recent report, the Office of the National Coordinator for Health Information Technology (ONC) appealed to Congress to tackle the security of shared health data not covered by HIPAA.

“While HIPAA serves traditional health care well and continues to support national priorities for interoperable health information with its media-neutral Privacy Rule, its scope is limited. It applies only to organizations known as ‘covered entities’ – ONC

Six fitness tracking devices measuring step counts and other fitness features are featured in New York, July 20, 2016. (AP)

Six fitness tracking devices measuring step counts and other fitness features are featured in New York, July 20, 2016. (AP)

Securing this information will be a challenge, said Boyd. Security should be built in from the start, although adding too many security layers might create usability barriers.

“If you’re wearing a Fitbit before you go for a run,” he said, “entering in two passwords to make sure it’s you  … kind of defeats the usability. So there is this tension, there is this drag between making sure the data is secure and you know exactly who you’re dealing with compared to usability. And so finding that balance is going to be hard.”

But he said HIPAA already has the building blocks and its concepts and principles could be applied to this emerging niche, given good regulation.

HIPAA does not apply if an entity that is not a health care provider is handling health information. It does not apply if the patient divulges his/her own health information online or enters it into a mobile app or wearable device, thereby providing it to a firm that is not a health care provider.

And it does not cover consumer health applications and products, nor was it intended to cover all health data, Health and Human Services’ Deven McGraw, Deputy Director Health Information Privacy at the HHS Office of Civil Rights, told Techtonics.

“It was intended to assure protections attached to identifiable health information collected, used and shared by covered entities,” she said in an email. “In that respect, HIPAA has really stood the test of time, as covered entities and their contractor business associates are required to comply with the regulations, which address privacy, security, and breach notification and are technology neutral.”

The Hollywood Presbyterian Medical Center is pictured in Los Angeles, California, Feb. 16, 2016. The FBI is investigating a cyber attack that crippled the hospital's electronic database for days, forcing doctors to rely on telephones and fax machines to relay patient information. (Reuters)

FILE – The Hollywood Presbyterian Medical Center in Los Angeles, California, was locked out of its computer systems following a cyberattack,  Feb. 16, 2016. Hackers demanded a ransom for decrypting the hospital’s hijacked records. The malware used, known as Locky, also  targeted Kentucky’s Methodist Hospital. (Reuters)

Entities covered by HIPAA are required to secure patient information and follow proper handling procedures for the collection, use and sharing of data online. Their associates – cloud services, for example – must have a business associate agreement in place with the vendor to protect the information, said McGraw.

The agreement must include written assurances that the vendor “will implement reasonable and appropriate safeguards to protect the confidentiality, integrity, and availability of the information in accordance with the HIPAA Security Rule,” she said. This means a business associate is “directly liable to HHS for compliance” with respect to the patient information it maintains.

If more than 500 records are released or compromised, covered entities are required to notify the Office of Civil Rights and issue a press statement. If you are a small startup not covered by HIPAA, you might have a problem.

“If you are a small company trying to figure out how we get this to be truly successful and you are not part of a covered entity,” cautioned Boyd, “if you have 1,000 initial users hacked, then you have to tell the Office of Civil Rights and it’s up to $250,000 per incident – all the little companies are going to go bankrupt.”

There are currently “no plans to revamp the HIPAA Rules,” said McGraw. They are “technology neutral and provide flexibility to address the privacy and security of individuals’ protected health information, whether on paper or electronic.”

Boyd believes flexibility and creativity are needed to maintain innovation to find new ways of engaging people with trackers, motion sensors and behavior modification. Applying HIPAA to information “that has not been proved to be medically relevant …would be an overreach of regulation,” he argued, although an update might be needed at some point to reflect the volumes of information transacted outside the health care sector.

“Appropriate regulation is going to be necessary,” he said. “But the more regulation we have, the harder it becomes to innovate … and a really novel solution in order to engage patients, in order to improve their health – I don’t think it’s been invented yet.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Robot Surgeons Are Coming; Pokemon GO’s Security Risks

Posted July 28th, 2016 at 11:49 am (UTC-5)
Leave a comment

Today’s Tech Sightings:

FILE - A doctor uses a computer to operate on a patient with a surgical robot in Hefei, Anhui province Sept. 24, 2014.

FILE – A doctor uses a computer to operate on a patient with a surgical robot in Hefei, Anhui province Sept. 24, 2014.

New Crop of Robots to Vie for Space in the Operating Room

One in three surgeries in the United States are likely to be performed by robotics systems within the next five years, which is more than double the current levels. The approach will have surgeons sitting at computer consoles to guide and manipulate the robotic arms. But the technology is not confined to the United States. Companies developing these systems plan to expand to India, China and other emerging markets.

Why Pokémon GO Is a Security Risk to Your Company

The hugely popular augmented reality game, Pokemon GO, has been cropping up in all sorts of real life places, some of them dangerous, as players hunt for Pokemon characters. The game uses mobile GPS location settings, clock and camera to layer Pokemon characters over real life venues. But in addition to attracting crooks, the settings pose a significant security threat to companies whose employees are hooked on the game.

Facebook Is Pushing More People to an App They Didn’t Choose

Facebook has been on a mission to nudge and steer users toward its Messenger app for direct communication. Many users took issue with that approach, although about 900 million people ended up using Messenger. Now, Facebook is blocking access to mobile messages on Android and intends to extend the ban to iOS as well.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

IBM, Brazil Team Up Against Zika; Windows 10 Update Coming August 2

Posted July 27th, 2016 at 2:30 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

FILE - The logo of IBM is seen on a computer screen in Los Angeles, California, United States, April 22, 2016. (Reuters)

FILE – The logo of IBM is seen on a computer screen in Los Angeles, California, United States, April 22, 2016. (Reuters)

IBM Steps Up Efforts in Fight Against Zika

International Business Machines Corp (IBM) has announced it will provide Brazil’s leading Oswaldo Cruz Foundation with technology and resources to help track the Zika virus. The foundation, affiliated with Brazil’s Ministry of Health, will use IBM’s technology to analyze data about human travel patterns and anecdotal observations on social media.

What Microsoft Is Taking Away From Windows 10 in Anniversary Update

Microsoft is getting ready to roll out a massive Windows 10 update on August 2, better known as the Anniversary Update. The 3-gigabyte package will be delivered to systems that have been running Windows 10 for at least 30 days. It will remove some features while adding new ones. And you can defer deployment, if you prefer.

Using Artificial Intelligence to Fight Cyberthreats

Carnegie Mellon University’s Software Engineering Institute and SparkCognition, a company that uses machine learning for predictive analytics, are collaborating to develop an automated system to identify and remediate cyberthreats. The effort will use IBM cognitive system Watson to index vulnerabilities, related coding rules and information so they are more widely accessible.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

‘Making’ Tomorrow’s Workforce; Wireless Keyboards’ Bug Found

Posted July 26th, 2016 at 11:51 am (UTC-5)
Leave a comment

Today’s Tech Sightings:

Children work with software to program their robot (forefront), LEGO Education's WeDo kit. (LEGO Education)

Young ‘makers’ work with software to program a robot (forefront), using the LEGO Education’s WeDo kit. (LEGO Education)

The Maker movement That Impacts Economy, Education and Culture

Technology is about more than just coding, argues writer Dale Daugherty. “Makers” – those who create and craft using electronics, 3-D printing and a mix of physical and digital skills – are already shaping the future. The maker movement is on the rise and will deeply impact society as it teaches people of all ages and from all walks of life the foundational skills necessary for the jobs of the future.

Flaws in Wireless Keyboards Let Hackers Snoop on Everything You Type

Researchers with security firm Bastille discovered that hackers can record every keystroke on a wireless keyboard hundreds of feet away, using a few cheap accessories and some code. Wireless keyboards are always transmitting; and the vulnerability, called “KeySniffer” allows hackers to listen in remotely and easily read the unencrypted keystrokes – even type on the victim’s computer.

OurMine ‘Hackers’ Now Targeting News Sites

OurMine is a hacker group that considers itself elite and has until now targeted and taken over high-profile celebrity accounts. However, the group’s latest target Tuesday was news site TechCrunch. OurMine hacked into one of the writer’s accounts to gain access to the website’s content management system and publish an article using the writer’s name. The hackers then encouraged the victim to write in to regain control of the account.

More:

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Get Kids Back to School With These Apps

Posted July 22nd, 2016 at 10:41 am (UTC-5)
Leave a comment

FILE - Students arrive for class at Mahnomen Elementary School in Mahnomen, Minnesota. (Reuters)

FILE – Students arrive for class at Mahnomen Elementary School in Mahnomen, Minnesota. (Reuters)

Summertime fun is winding down and, ready or not, kids will have to go back to school in August. To help ease their transition, we sifted through some mobile apps that promise to keep school kids organized and safe.

If you’re having trouble getting out the door, let alone keeping up with school bus schedules, there are a few apps that can help. Google Now provides information about commute times, weather conditions and various events and schedules. You’ll have to give up some trust, though, because the app requires personal information and location data to function properly.

A similar app is Here Comes The Bus, which connects students and parents with their school’s GPS-equipped vehicles. The app provides information about arrivals and departures and lets parents track their children’s progress and whereabouts. Life360 is also a GPS Tracker that helps parents track their kids’ locations at all times and establish trusted circles to stay in touch.

Homework blues

In the classroom, there are plenty of apps to help students make sense of furiously-written notes that may or may not be legible three days later, if found at all.

Flashcards+, reviewed here, is a flashcard creator that helps students organize their notes, making it easy for them to find and remember study material.

Other options include Quizlet, SuperCard Flashcards and Studyblue. SuperCard Flashcards lets students quiz themselves and add notations for problems they need to study further. Studyblue is a crowdfunded learning platform that provides high school students with study material and other tools. Evernote supports several languages and helps organize student notes so that they can be easily retrieved when needed.

A screenshot from the MyHomework Student Planner app. (MyHomework)

A screenshot from the MyHomework Student Planner app. (MyHomework)

When it’s time for homework, MyHomework Student Planner keeps track of schedules and assignments and color-codes due dates. It can also send reminders of upcoming homework to students who sign up for an account. Students can also download study material to their device once they join a Teachers.io class and synchronize it for viewing on their Desktops or laptops.

While good old paper and pen – or keyboard – are probably the best way to approach homework, there are tasks that benefit from automation. Such is the case with bibliography citations. EasyBib makes sourcing easier by automatically tracking down and generating the citation for you. Users can either enter the title of the source material or scan its barcode to get the bibliography notes.

A word of caution: convenience comes at a price. Some of these apps are free. Some include in-app purchases. Others have tracking and data-gathering technologies that might be a concern for privacy-minded parents.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Minecraft Meets AI; the Fall and Decline of Yahoo

Posted July 21st, 2016 at 11:49 am (UTC-5)
Leave a comment

Today’s Tech Sightings:

FILE - A child plays the Minecraft video game at the Minecon convention in London, Britain, July 4, 2015. Minecraft is a blocky world that lets players mine for resources and build elaborate structures, among other activities. (Reuters)

FILE – A child plays the Minecraft video game at the Minecon convention in London, Britain, July 4, 2015. (Reuters)

Minecraft Is Testing Ground for Human-AI Collaboration

Minecraft, the computer game of blocks, has been used to build all sorts of things for fun and educational applications. Now, Microsoft researchers have released an experimental version intended as an artificial intelligence (AI) training ground. Nicknamed Project Malmo, the open source effort allows a learning algorithm, which can control Minecraft characters, to cooperate with humans controlling other characters through a chat client.

Silicon Valley’s Yahoo Diaspora Mourns Company’s Decline

After a decade of decline, Yahoo is in the process of selling its core business. But loyalists who remember Yahoo’s 1990s glory days as Silicon Valley’s biggest startup are sad to see the company sold and possibly dismembered. For those who don’t remember, two Stanford students launched Yahoo in 1994 as a key portal to the World Wide Web. Over the years, a wealthy Yahoo made a lot of acquisitions, some more successful than others.

‘Candid,’ the Anonymous Chat App, Enforces Civility With AI

Whatever the justification, hate speech, bullying, bigotry, threats and slander are unacceptable behavior online and elsewhere. In some cases, the victims fight back. In order to find a better way to deal with this kind of rhetoric, two former Google employees created Candid, an anonymous chat app that uses artificial intelligence to process natural language and flag inflammatory words.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Twitter Account Verification Now Open; Indian Teen Wins Google Award

Posted July 20th, 2016 at 1:45 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

A man reads tweets on his phone in front of a displayed Twitter logo in Bordeaux, southwestern France, March 10, 2016. (Reuters)

A man reads tweets on his phone in front of a displayed Twitter logo in Bordeaux, southwestern France, March 10, 2016. (Reuters)

Twitter Opens Up Account Verification

Twitter used to award its “verified account” blue badge to celebrities who might contend with fake accounts using their names. Now, any public Twitter account can apply to get the verification, provided users fill up a form with information about their influence level and various personal data. That includes any websites, birth dates, telephone numbers, email addresses and maybe even a scan of government-issued identity cards.

Google Rewards Indian Teenager for Service That Helps Local Fishermen Navigate

Google’s Community Impact Award – backed by $10,000 – went to 14-year-old Indian student, Advay Ramesh, for creating a GPS-powered app to keep fishermen safe. The inspiration for the app came to Ramesh after hearing reports about fishermen in the Indian city of Rameshwaram getting arrested for months for crossing the International Maritime Boundary with Sri Lanka.

Pokemon GO Players in Bosnia Brave Minefields to Find Pokemon

Bosnian de-mining charity “Posavina bez mina” has issued a warning to Pokemon GO players to avoid meandering into the country’s remaining minefields. In one of the latest of many Pokemon-related incidents, some Bosnian gamers ignored warning signs and deliberately walked into a minefield in search of Pokemon characters. Luckily, there were no injuries or deaths reported.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

New Hard Drive Uses Chlorine Atoms; Protecting Privacy With Snapchat

Posted July 19th, 2016 at 12:21 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

A Hard Disk Drive (HDD) is seen in Kiev, Ukraine April 21, 2016. (Reuters)

A Hard Disk Drive (HDD) is seen in Kiev, Ukraine April 21, 2016. (Reuters)

World’s Smallest Hard Disk Stores Data Using Chlorine Atoms

Researchers at Delft University of Technology in the Netherlands have created the world’s smallest hard drive – a rewritable device that stores up to 500 terabits per square inch. This is enough room to store all the books ever written. The technique uses chlorine atoms to find the most efficient storage mechanism. The atoms on the surface of the device represent the computer’s binary code.

Despite War, This Ukrainian City’s Tech Sector Has Tripled in Six Years

The Ukrainian city of Lviv has become a magnate for tech companies despite struggling with political turmoil following Russia’s annexation of Crimea two years ago. About two percent of the city’s population are employed as IT professionals, and the emphasis on outsourcing has created a thriving tech sector that has attracted American, Canadian and European tech companies.

Snapchat Finds a Way to Use Facial Recognition to Protect Privacy

Smartphone messaging firm Snapchat has just patented new technology that uses facial recognition to scrutinize whether a scanned photo should be shared without permission. Depending on how the algorithm works and detects pictures, the feature might even be able to edit an image to protect the privacy of the subject.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Mobile Health Bridges Funding Gap for Nonprofit Apps

Posted July 15th, 2016 at 10:39 am (UTC-5)
Leave a comment

A screenshot from 3SidedCube's Essilor Vision Test App, one of the company's first apps that topped the US iTunes Charts as the number one medial app. (3SidedCube)

A screenshot from 3SidedCube’s Essilor Vision Test App, one of the company’s first apps that topped the US iTunes Charts as the number one medial app. (3SidedCube)

Funding a mobile game or a celebrity app is often easier than finding backers for special needs and not-for-profit applications. But the growing interest in mobile health is helping bridge the gap.

Depending on their function and subject matter, apps are either funded by big companies, public donations, or paid for by interested organizations and individuals. Funding is typically available for research and development, and for proofs of concept – early demonstrations showcasing the feasibility of a product.

“There are some certain hot areas like diabetes that will get a lot of funding and that will really push people to that area,” said Duncan Cook, Director of 3SidedCube, a developer of mobile apps for the not-for-profit sector. “And there are a lot of supporters of even smaller areas that will put their backing in because they’ve got family members affected. So it’s definitely doable.”

But it varies. “It’s based on how strong the argument is,” he said, meaning that the developer has to make sure he has a “good case” to convince backers to fund the app in question. And ultimately, it is a selection process where the best apps “rise to the top.”

The American Red Cross Blood Donor App won 3SidedCube a Webby for best Health App in the world. (3SidedCube)

The American Red Cross Blood Donor App won 3SidedCube a Webby for best Health App in the world. (3SidedCube)

UK-based 3SidedCube works both with funded clients and those that have to seek funding to develop the apps they need. “Often they will have a major backer and they will … pitch the idea to the major backer,” he said. “If they like it, they will then fund it and give you money.”

In some cases, vocal and well-organized groups like autism communities are able to reach people who can relate to their cause and attract funding for various technologies. And special needs and nonprofit apps that have received press coverage and good reviews can generate interest and open the door to more funding.

One such app, Be My Eyes, was designed to let seeing people come to the aid of blind users.

“It has already had a huge impact,” said Cook. “Look at the apps … for blind people. … People can sign up and be the eyes of blind people. It’s had a huge impact.”

“It’s harder for individuals than companies to get funding,” said Cristen Reat, co-founder of BridgingApps, a Houston, Texas-based Easter Seals program that provides access to educational and therapeutic tools, and offers app reviews and support to help people with disabilities.

“When you ask the question about funding for individuals … for apps”, she said, “it’s actually quite challenging.”

Ironically, there is no shortage of funding sources. Many U.S. states provide funding for assistive technologies, for example. But Reat, a mother of two children with special needs and chronic conditions, questioned whether the money benefits those who need it the most. “Are the people who really need it getting it and benefiting from it? We see that’s a problem.”

Sam Alexander, Ben Alexander's father, assists Ben, who has non-verbal autism, during a math language class at Tulane University in New Orleans, March 2, 2016. (AP)

Sam Alexander, Ben Alexander’s father, assists Ben, who has non-verbal autism, during a math language class at Tulane University in New Orleans, March 2, 2016. (AP)

Getting access to these funds and qualifying for support is also “very tricky,” she said. This is particularly true of schools, often the last to adopt mobile solutions. This is why schools and families “are looking outside of the school systems for funding” to get technologies for non-verbal children, for example, including apps like SPEAKall! and SPEAKmore.

“We see people come in everyday who are, for example, of school age and they don’t have access to that technology in school,” she said. “So they are coming to us looking for other funding sources to get that technology.”

A lot of the money from state or private contributors also “dries up when you’re an adult,” she said. And so in schools, “you really have to advocate for getting access to even some other traditional technologies that are out there.”

Insurance companies and health care providers should pay for some of these technologies,” she argued. “If some children and adults are able to have access to some of the mobile devices just to use for their daily activities … then some of those health apps should also be put there.”

Reat believes this would be a cost-effective investment. Giving non-verbal children an iPad or tablet “with one or more sophisticated communication apps on it” would be a lot cheaper than a $15,000 … traditional assistive technology device.”

“Why would there not be the knowledge that that’s very cost-effective?” she asked. “And we’re just not quite there yet.”

But interest is growing. And as more and more organizations and agencies approach mobile health, Cook projects that technology will have a “huge impact” on the nonprofit base in the next few years.

“It’s just not going to be as big as e-commerce or banking or any of those other areas that make huge amounts of money,” he said, although he hopes that the “feel-good side of it” will appeal to people and attract funding.

But there is much room for improvement, he added. “We’ve only really just scratched the surface. “I think … there’s a lot more to come.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Pokemon Fraud Rising; AI Could Be Key to Fighting Cybercrime

Posted July 14th, 2016 at 1:04 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

A gamer uses the Pokemon Go application on his mobile phone at a park in Barcelona, Spain, on July 14, 2016. (AFP)

A gamer uses the Pokemon Go application on his mobile phone at a park in Barcelona, Spain, on July 14, 2016. (AFP)

A Surge of Pokemon GO-related Apps Is Out to Steal Your Data

If you’ve caught the Pokemon GO fever, keep your wits about you. Numerous unofficial apps taking advantage of the popularity of the Nintendo game are raising red flags for their pursuit of users’ personal data. Cybersecurity experts warn that some of these fraudulent apps are offering tips and cheats, subscriptions, and game-related content in exchange for access to sensitive data that users’ should not be willing to part with.

Maxthon Browser Sends Sensitive Data to China

The Maxthon browser, developed by China-based Maxthon International for more than 50 languages, seems to have a few problems. Researchers at Fidelis Cybersecurity and Poland-based Exatel recently discovered that the browser regularly sends a zipped file to China that contains information about the computer’s operating system, installed programs, and Internet search data, among other things. It bears mention that Chinese companies have raised concerns in the past for security and privacy issues in their web browsers.

Why AI Could Be the Key to Turning Tide Against Cybercrime

Today’s cybersecurity operations have to be performed by human employees who need to monitor cybersecurity alerts and keep an eye out for malicious software and false alarms – a repetitious and boring process. But security experts see promise in the fight against cybercrime in artificial intelligence (AI) that learns about malware and fraudulent activity trends the more it analyzes without getting bored.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.