RoboSimians; IT Nightmares and the Great Firewall of China

Posted December 30th, 2014 at 2:00 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

The Great Firewall of China is Nearly Complete

Officially called the “Golden Shield,” China’s decade-old Internet firewall, which recently blocked Google Gmail and typically blocks Twitter, Facebook, YouTube and Google search, is the most effective in the world. The program restricts content deemed sensitive and blocks thousands of websites, including some Voice of America sites.

NASA Designs Ape-Like Robot for Disasters

Also known as the RoboSimian, this robot is the result of the DARPA Robotics Challenge that encourages the world’s top talent to create an emergency response robot that could go into environments humans cannot. NASA’s robot moves like an ape and is equipped with seven cameras and four limbs that enable travel on rough terrain and manipulation of various objects.

Low-Risk ‘Worm’ Removed at Hacked South Korea Nuclear Operator

Korea Hydro & Nuclear Power Co., Ltd. announced that it will bolster its IT security after South Korean authorities found evidence that a low-risk computer “worm” had been removed from devices connected to some nuclear control systems.

2015: Six IT Nightmares That Will Keep Us Awake at Night

The legacy of the beating that cybersecurity took in 2014 will continue to haunt IT professionals and businesses in the coming year. But it will also provide new options in credit card security,  multifactor authentication, and more insight into Russia’s and China’s tech ecosystems.

Speaking of security nightmares, this technique is called “swatting” – an online hoax where an extortionist pretending to have committed a crime uses a spoofed telephone number to call up emergency dispatch and have police sent to his victim’s home.

Hackers Reproduce Politician’s Fingerprint From Photos of Her Hands

A German hacker claimed he reproduced the fingerprint of Defense Minister Ursula von der Leyen using commercially available software and high-resolution photos of her hand.

Taiwan Clears Xiaomi, Other Smartphone Brands of Data Privacy Breaches

Following a September probe, Taiwan’s National Communications Commission released a report that clears all 12 smartphone brands it tested of breaching data protection laws.

Microsoft’s Reported ‘Spartan’ Browser Will Be Lighter, More Flexible than IE

Microsoft is reportedly planning a new browser, dubbed “Spartan,” for Windows 10, instead of revamping Internet Explorer (IE). Spartan is intended as a lightweight alternative to Internet Explorer and a marketing “do-over” ahead of doing away with the IE legacy.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Should Social Media Police Online Abuse?

Posted December 26th, 2014 at 1:00 pm (UTC-5)
2 comments

(T. Benson for VOA)

(T. Benson for VOA)

Social media services came under fire recently for not being more proactive in addressing online harassment and violent threats and for removing offensive comments only after being reported. Now some believe the role of social media in overseeing online behavior should change.

“Whoever is in charge of these spaces — that includes the people who are hosting the site, that includes the users on the site, that includes the social media platforms — they have a responsibility to actually try to make their environment such that they are not aggressively targeting and attacking and driving away certain groups of people,” said Mary Anne Franks of Miami University’s School of Law.

She recalls that in its early days, social media “transformed our lives and made available things that were not possible a decade ago.”

Now she asks why the creativity and resourcefulness that made that possible are not being dedicated to getting the most from online communication without the damage that it can do.

Elaine Davies of California’s Chapman University agrees that social media companies should have a “more responsible role.” But she says the problem is that “if one person creates a fake account or they clone someone’s account, they [social media services] don’t know until somebody brings it up; and there should be a rapid response.”

Franks argues that social media sites can be creative about dealing with abusers hiding behind anonymity or similar tools that “foster greater freedom of expression” but also have what she calls a “darker side.”

She points out that Twitter, Facebook and many other services already have policies in place to curb spam, for example, and suggests that they can address abusive behavior “without having to fundamentally alter the kinds of beneficial instruments and ways that people can talk to each other online.”

“And people will quibble about whether that is a violation of free speech or whether it is a positive factor in reducing harassment,” added Johns Hopkins University’s Patricia Wallace, Senior Director of the Center for Talented Youth and Information Technology.

Davis, who believes “the Internet should be for free speech,” questions whether it is even possible for social media companies to proactively police abusive behavior.

Both Davies and Wallace accuse social media companies of being more concerned with making a profit, although Wallace concedes that Twitter and Facebook, for example, have taken down abusive posts and comments in the past.

Twitter and Facebook have clear policies against abusive behavior. While declining an interview request, a Twitter spokesman shared the following statement:

Our rules are designed to allow our users to create and share this wide variety content in an environment that is safe and secure for our users. When content is reported to us that violates our rules, which include a ban on targeted abuse, we suspend those accounts. We evaluate and refine our policies based on input from users, while working with outside organizations to ensure that we have industry best practices in place.

After a recent spike in cyberharassment, Twitter refined its blocking and reporting tools to make it easier for users to report harassment on their mobile phones.

In an interview with TECHtonics, Facebook’s Communications Manager Matt Steinfeld says the company’s community standards state clearly that “harassment, abuse, bullying — things like that — direct attacks from people, are not allowed on Facebook.”

But the abusive behavior needs to be reported to the website administrators.

“We have like 1.3 billion people using Facebook … So it’s really a large neighborhood watch,” he said.

“So if somebody is being bullied or harassed, they are really in the best position to tell us that,” he said, given that “as a third party reviewing things, it’s not always apparent based on the language that that person is using whether they are truly bullying or harassing someone else.”

Because of the difficulty of proactively looking for abusive content, Steinfeld says Facebook makes it “as easy as possible for people to report it to us” and make sure when they do that, that Facebook has “someone looking at it and responding to it. That’s where we put our priority,” he said.

“If it is abusive, if it is harassment, we remove it,” he stressed.

But Jayne Hitchcock, President of Working to Halt Online Abuse, says the victims her organization helps often say they went to Facebook or Twitter or other websites and their complaints were not taken seriously.

“They’ve had friends or relatives file complaints and nothing is being done,” she said. “And the person stalking them or harassing them continues. And then it does get to the point where they do have to go to the police and then hope that the police will believe them and do something. And then it just goes from there. It’s like one big giant snowball.”

Hitchcock argues that social media companies are not doing a “good job” in addressing online abuse. She says victims who filed repeated complaints with Facebook — and their grievance was not addressed — came to her group for help. She questions if the people tasked with reviewing user complaints are qualified.

“It’s one of these things where you wonder, not only in law enforcement, but the so-called abuse people at these websites — if they are properly trained,” she said. “And I don’t think they are.”

She says responding to complaints isn’t enough if they are not taken seriously or if they are passed off without action. She suggests that social media sites might consider “live chat support, post tips on staying safer [by changing their privacy settings or general settings], and being proactive.”

Change is possible, says Franks, although it has to take place on all fronts — legal, social, in the workspace, and on online forums.

She describes harassment and abuse as “fundamental design flaws” and says tech and social media platforms should make structural changes to “inhibit harassment and guard against abuse.”

“To do this, they — and all of us — must reject the tendency to treat social media and technology as though they are natural forces rather than the product of human choices and value judgments,” she said. “Once we recognize this, we can make choices and value judgments that do not merely guard the interests of the privileged, but serve the interests of equality and democracy.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Tracking Santa; the Eyes Have It; Death of Voicemail?

Posted December 24th, 2014 at 2:00 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

It’s Christmas Eve and the Battle of NORAD vs. Google Santa Trackers Has Begun!

Santa and his reindeer are traveling somewhere around the world; and Google is racing to track his every movement ahead of Microsoft and its North American Aerospace Defense Command (NORAD) partner. You can find Google’s Santa Tracker here and NORAD’s Santa Tracker here.

This Brain Hat Helps the Paralyzed Make Music

Musician Eduardo Miranda’s latest invention is a brain computer music interface that lets people create music using only their eyes. Once electrodes connect the device to the back of the head, the system monitors brain activity to determine where the subject is looking and flashes snippets of music on screen that can be selected by merely staring at them.

Diabetes Patients Are Hacking Their Way Toward a Bionic Pancreas

A kid using an Android app to keep track of his blood sugar levels and then tweeting the result has attracted thousands of interested parents and opened the door for an automatic bionic pancreas that measures blood sugar levels and doles out an appropriate insulin dose in response.

Skype Group Chat Hits Word, PowerPoint Online Apps

Skype now has the ability to hold group chats in Office Inline among people collaborating on  Word and PowerPoint documents. A chat button now appears when two or more people are working on a document, allowing them to communicate with each other.

South Korea Seeks China’s Cooperation in Probe Into Cyberattack on Nuclear Operator

South Korea has asked Beijing to cooperate in a probe into a recent cyberattack against one of its nuclear power plant operators after it traced related Internet addresses to a Chinese city near North Korea. An official said the addresses are not proof that either China or North Korea were the source of the attack.

South Korea Indicts Uber CEO, Local Unit for Transport Law Breach

Ride-sharing service Uber’s troubles just keep coming. The latest comes from South Korea, where prosecutors issued an indictment against the company’s local unit and its CEO for violating laws that prohibit companies or individuals from operating transportation services without the appropriate license.

The Slow Death of Voicemail

Coca-Cola has just become one of the world’s biggest companies to shut down its voicemail system. An internal memo advised employees that the move was intended to simplify work and increase productivity. The change makes a lot of sense for the younger tech-oriented generation that  grew up texting and using mobile phones.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Privacy; North Korea; and the Spider Dress

Posted December 23rd, 2014 at 2:08 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Downing North Korea’s Internet Not Much of a Scalp

North Korea lost its Internet connectivity for half a day Monday, though the reasons for the blackout remain unclear. But that is hardly a major loss for a country that barely has 1,000 Internet addresses, one Internet service provider and one connection to the outside world via China.

Facebook Page for Russia Rally Blocked as Putin Tightens Grip on Internet

Facebook blocked access to a page promoting a Russian opposition rally scheduled for January 15 in response to a request from the country’s communications regulator. And Russia is seeking to block more posts relating to mass protests.

Experts: Internet Privacy Will Be Hard to Find in 2025

Amid government surveillance and endless hack attacks, it seems as if computer users are losing the fight to safeguard what’s left of their privacy. And a majority of experts cited in a recent Pew Research Center report agree that current expectations of digital privacy may be gone by 2025.

Flaw in Open-Source PDF Viewer Could Put WikiLeaks Users, Others at risk

Vulnerabilities in open-source component FlexPaper, which displays PDF files, could be exploited by hackers to launch spoofing and cross-site scripting attacks against visitors on some websites. The New Zealand-based developer, Devaldi, has confirmed the vulnerability.

Who’s Really Taking You for an Uber Ride?

Ride-sharing company Uber has been under fire since several Uber drivers allegedly assaulted, raped or kidnapped passengers. An Uber spokesman says drivers have to go through rigorous background checks before they are hired. So how do the bad drivers make it through?

Spider Dress Protects Your Personal Space Bubble

While the 3-D-printed robotic Spider Dress first showed up in 2013, it is now more than just a prototype. Equipped with all kinds of sensors, the dress extends its spidery legs whenever it senses another person invading the wearer’s personal space bubble.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Law Enforcement Still Playing Catch-Up on Cyberharassment

Posted December 19th, 2014 at 2:06 pm (UTC-5)
Leave a comment

Following the trail of harassers in cyberspace can be difficult for law enforcement agencies, although there have been many cases where abusers have been caught, according to cybercrime law enforcement instructor Hale Guyer. (Ted Benson for VOA)

(Ted Benson for VOA)

A recent spike in cyberharassment that in some cases included threats of violence has raised questions about the effectiveness of law enforcement in cyberspace, where the abusers’ trail is often harder to follow.

The absence of a direct line of contact makes it “a little more difficult” for law enforcement to track online harassers, said Hale Guyer, a cybercrime law enforcement instructor and a retired special investigator.

A police officer patrolling a neighborhood could arrest a person calling out names or blowing his or her horn in the middle of the night to harass someone. But a harasser who abuses a victim in an online post or uses a third party to do the harassment “throws a whole different element in it than if I would do a direct harassment,” said Guyer.

“Law enforcement has always had a difficult time keeping up with what’s going on online,” said Johns Hopkins University’s Patricia Wallace, Director of the Center for Talented Youth Online and Information Technology.

She says there have been egregious cases, with perpetrators putting up fake posts to harass others — even drive them to suicide — where police were unable to do much.

In cases like that, the problem is “if you don’t know who is coming at you, you don’t know where to look,” said Elaine Davies of California’s Chapman University.

“If I were to decide that I wanted to stalk somebody or harass somebody, I could do it from another state,” said Guyer. “I could do it from another country. There are no geographic limitations on this stuff anymore. So it is definitely a challenge.”

There have been cases where online harassers have been caught, says Guyer. But law enforcement agents have to prove who was behind the harassment; which can be difficult, and the issue of jurisdiction creates another barrier if the perpetrator is in another state or another country.

Davies says police might go back and forth across state lines, for example, and then say it is not their problem. And that means that the victims are not getting the legal protection they need.

“The prosecutor is going to be sitting there with a decision to make if … he or she has all the witnesses in another state,” said Guyer. “Is it going to be worth their while to file a misdemeanor or a non-serious charge, let’s say, and make arrangements to fly all of these people four of five states away back?”

Police will get involved if the online harassment is deemed cyberstalking, if there is a direct threat of physical harm or fear of physical harm from the perpetrator, said Jayne Hitchcock, President of Working to Halt Online Abuse.

She says a lot of people probably are not aware that laws exist to punish online harassment, even though many countries have them. And even the way existing laws are phrased can be problematic, says Wallace.

“There’s not that much that law enforcement can do because they don’t have laws that say that,” she said.

A troubling part of that, adds Davies, is that cyberharassment, at least in the U.S., has to be repetitive and has to strike fear in its victim before the law can be invoked, whereas an onlooker might not agree that the situation merits fear.

“If those two elements are not there, then you don’t have an issue, according to the Federal Act of Cyberstalking,” she said.

That, in her view, is a “huge cop-out” because of the physical harm that persistent cyberharassment and bullying inflict on victims.

“Until that victim is met with grave bodily harm, law enforcement isn’t going to step in,” she said. “We need to change the laws.”

Good cyber laws do exist, argues Guyer, although jurisdictional problems might arise if a prosecutor is unable to find case law to help inform how a new case should be handled — a problem that should be addressed in training for both law enforcement agents and prosecutors.

“When I teach my classes,” Guyer said, “I usually ask people sitting in the classes — and they are all law enforcement — what percentage of people in your agency are trained to investigate cybercrimes? And I get a very low amount. I get three, four, five percent.”

A lot of law enforcement agencies are doing a good job, said Hitchcock. In many cases, she says all it takes is a visit from a police officer to the perpetrator’s home to warn him or her to stop the harassment or end up in jail. But she concedes that there are law enforcement agencies that might not be able to handle cybercrime and should get more education and training.

Many U.S. states require recruits to undergo mandatory training in various aspects of police work. But Guyer says “to date, there is no mandatory training in computer crimes.”

Training should include lawyers, judges and all concerned parties, says Mary Anne Franks of Miami University’s School of Law, because part of the problem is that “law enforcement is very slow to catch up with technology.”

“When you are talking about cybercrime, the technology is going so fast, it is very difficult to have the laws catch up on it,” added Guyer.

He recalls a 1999 report that warned that law enforcement agencies should be prepared as cybercrimes become more prevalent. Despite new laws, he says law enforcement agencies need the time and the training to do their investigations.

“We’re still playing catch-up in a lot of different areas,” he said.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

WordPress Infected; TorrentLocker; Sony’s Nightmare

Posted December 18th, 2014 at 2:05 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Technology Trends For 2015: Part One

What will the 2015 tech landscape look like? Expect more wearable tech, more encryption and more space ventures.

Who Really Hacked Sony Pictures? (It Probably Wasn’t North Korea)

Did North Korea orchestrate the destructive hack attack that targeted Sony Pictures a few weeks ago? U.S. officials seem to think so, but writer Sebastian Anthony says there is little evidence to implicate the North Koreans, and suggests the whole operation might have been an inside job.

Sony Pictures Employees Now Working in an Office ‘From 10 Years Ago’

The hack attack nightmare that Sony Pictures has lived the past few weeks offered the world an inside look at a post-hacking situation that has reset the clock at Sony’s offices.

Google Blocks WordPress Sites After Malware Attack

A malware campaign known as SoakSoak that exploits a vulnerability in a plugin called RevSlider has infected more than 100,000 WordPress websites. The attack forces affected WordPress websites to redistribute the malware to their visitors. So far, Google has blocked up to 11,000 affected WordPress domains.

Over 9,000 PCs in Australia Infected by TorrentLocker Ransomware

TorrentLocker, one of several ransomware threats to emerge this year, uses a phony Australia Post website to infect visitors and encrypt their data. The malware is likely to have racked up $585,000  from 39,000 PC infections worldwide during the past few months.

The Secret Business of Stolen Smartphones Is Booming

Ever wonder what happened to your favorite phone after it was snatched from your hands? This story offers some insight into the business of stolen smartphones.

Microsoft Stops Offering Alternative Browsers to Windows Users in Europe

Microsoft no longer shows new European Windows users a browser choice screen. The move comes as part of an antitrust settlement with the European Union after it was determined that the tech giant was using its dominance to push its own Internet Explorer browser – again.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

‘The Interview’ Cyberwar; 3D-Printing Cancer; Apple in Russia

Posted December 17th, 2014 at 2:04 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Not Even North Korea Can Stop the Internet

Those behind the devastating hack attack that targeted Sony Pictures Entertainment have also threatened violence against theaters showing the movie The Interview. To thwart that group’s effort to prevent people from seeing the picture, which centers around an assassination plot against North Korean leader Kim Jong Un, one writer is urging Sony to release it online.

Hacked Sony Ex-Employees Sue for Privacy Violations

Two former employees are suing Sony Pictures Entertainment after the hack referenced above leaked sensitive data online. The former employees say their social security numbers and various other personal information were released by the hackers and that Sony, a target of previous attacks, has failed to protect its employees’ data.

3D Printing Points Way to Smarter Cancer Treatment

British scientists have come up with a new way to attack cancer, using 3D-printed models of cancerous parts of the body. The method uses CT scans to print plastic molds of tumors and organs that allow experts to fill them with liquid to evaluate the flow of drugs containing radioactive material that are used in calibrated amounts to kill cancerous cells.

Five ways to Get More Women in Tech

The number of women working in technology in the United States and other parts of the world remains miniscule compared to men. Here are five ways to help attract women developers to the tech workplace.

Baidu Confirms Uber Partnership to Bring Ride-Sharing Service to China

The deal, announced in a press conference in China, allows Baidu, China’s largest search engine, to invest up to $600 million in Uber and integrate the ride-sharing service into its online maps.

Apple Wins Decade-Old, Billion-Dollar iPod Antitrust Lawsuit

An eight-member jury in the Oakland, California U.S. District Court has unanimously ruled that Apple is not liable for violating antitrust laws for its iTunes and iPod updates. A decade-old lawsuit alleged that Apple was monopolizing online music distribution and blocking access to rival services.

Apple ‘Puttin’ a Hold on Online Sales in Russia

Apple announced today that it is temporarily closing its online store in Russia as the country’s currency tumbles. The Russian ruble lost 20 percent of its value today, the biggest decline since 1998.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Unmasking Tor; 3-D Printing; Sony Blues; Facebook Drops Bing

Posted December 16th, 2014 at 2:38 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users

According to WIRED, the U.S. Federal Bureau of Investigation (FBI) used an abandoned Metasploit project called the “Decloaking Engine” in 2012 to launch “Operation Torpedo” to identify child port suspects using Tor’s anonymous network to hide.

Patient-Specific Knee Parts Can Now Be 3D-Printed

Columbia University researchers using high-resolution MRI scans created a 3D model of a torn meniscus in a patient’s knee, then reprinted the model with built-in growth and repair factors that activate relevant stem cells.

Adoption of 3D Printing Grows, but Hurdles Remain

According to IT research firm Gartner, up to 60% of organizations polled in a recent survey say high start-up costs remain the main stumbling block to the adoption of 3D printing strategies, although early adopters have reaped the benefits in terms of reducing the costs of research and development.

Sony Fights Hack Damage as New Threats Emerge

Sony Pictures is facing new threats of more data leaks three weeks after a devastating hack attack crippled its systems and compromised sensitive information.  An online post from hackers claiming to be the “Guardians of Peace” threatened to release more stolen data to the public on Christmas.

Skype Translator Previews for Real-Time Chats

Microsoft has released the first public version of Skype Translator, a service that allows for real-time translations, along with an on-screen transcript. The final product will be able to translate chats in more than 45 languages.

Facebook Drops Bing to Turn Search Queries Into Better Targeted Ads

Facebook is dropping a deal with Microsoft that provided investment and made Bing the social media giant’s default search engine. For all intents and purposes, this looks like another block in Facebook’s ad-driven landscape.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Online Harassment Is a Game of Control

Posted December 12th, 2014 at 2:45 pm (UTC-5)
1 comment

FILE - A young woman reads instant messages on her laptop screen at her home in Kings Park, N.Y. (AP)

FILE – A young woman reads instant messages on her laptop screen at her home in Kings Park, N.Y. (AP)

The ugly episode that has come to be known as GamerGate may have receded, but it left in its wake some unanswered questions. Why did a seemingly legitimate discussion of gaming journalism devolve into harassment and threats of violence against women journalists and critics? What triggered this behavior and was it a reflection of offline gender harassment?

The incident prompted TECHtonics to take a look at online harassment and the environments that facilitate it.

Young women experience particularly severe forms of online harassment

“Power and control are the biggest forms of gender violence in the United States, as well as around the world,” said Professor Elaine Davies of California’s Chapman University in an interview. “So the person needs to feel some sort of power or some sort of control over the person that they are harassing or victimizing. That’s what it boils down to.”

While there will always be issues of control, Johns Hopkins University’s Patricia Wallace, Senior Director of the Center for Talented Youth and Information Technology, says this is not unique to the gaming community.

“If people really stopped and thought about what it meant to send out a tweet or a vicious message and how… the Internet environment is actually facilitating that, I think that could cause people to slow down a bit.”

Patricia Wallace
Johns Hopkins University

“But gaming is a big place for it, where there is quite a lot of harassment going on and … people assuming that if a woman is playing a game, then she’s not serious about it or that her boyfriend must have shown her how to play or she’s probably not very good at it and that it’s just not, you know, an equal playing field.”

“There are plenty of exceptions” in the gaming community, cautions Wallace. But she says that a “residual culture of the locker room boy’s arena that really is not fond of seeing women, girls get into their [space]” remains despite a gaming demographic, typically dominated by young, white males, that now includes more women.

But Mary Anne Franks, a law professor at the University of Miami, Florida, says it is important to look at some of the issues that led up to the “outpouring of hatred and violence” in the GamerGate controversy.

A woman dressed as "Smite" video game character poses for portraits as she cosplays at the Comic Con Experience fair in Sao Paulo, Brazil, Dec. 4, 2014. (AP)

A woman dressed as “Smite” video game character poses for portraits as she cosplays at the Comic Con Experience fair in Sao Paulo, Brazil, Dec. 4, 2014. (AP)

“It is not a coincidence that so much of the first targeted harassment and abuse was directed toward Anita Sarkeesian, who was their critic, who was pointing out the fact that in many games there are certain sexist tropes that are probably damaging to the perception of women,” said Franks. “And I think that was really something that the gaming community or certain segments of the gaming community really found offensive.”

GamerGate supporters say those who threatened and harassed women online do not speak for the group, which was reportedly formed to defend ethics in gaming journalism.

Freelance writer William Usher, who tackles media corruption issues, says the GamerGate “consumer revolt” was about “media needing ethics policies to disclose relationships and monetary ties to those they cover.”

He says the media “conflated the issue of harassment onto GamerGate using fabrication and misinformation.”

Usher says a GamerGate harassment patrol was formed to stop trolls and harassers, including some who were sending out rape and death threats. But he adds that some of the victims did not wish to cooperate with the GamerGate harassment patrol.

Gurney Halleck, a writer and free speech proponent who goes by a  pseudonym, says online harassment is just a new avenue for the same perpetrators who, “paralyzed by their fears, strike out anonymously” to project their insecurities upon their targets.

“It is a shame people involved on both sides of the GamerGate controversy have been the recipients of such actions, and unfortunate that this has prevented the very important topic of journalistic ethics from being properly discussed,” he said.

But Franks says going beyond discussion or criticism to threats of violence and physical harm taps into a “serious vein of hostility that is psychological, but probably not that uncommon” and reveals gender as a unifying force behind this hostility, not just in gaming.

“And we are … in kind of a disadvantage to try to figure out how many people really feel this way and how serious they are about the kinds of viewpoints that they are expressing because it could be a really small minority that simply happens to have a lot of time and a lot of vitriol.”

Whether the threats are ever going to be carried out is beside the point, says Franks. She worries that harassing women or sexually objectifying them based on their gender is becoming standard practice online.

And it is also affecting how women interact on the Internet.

“It is making many women … recalculate whether it is worth it to participate in online communities because of the sheer force of the harassment, the abuse which takes up so much time and so much energy, in addition to … real anxiety and distress about your physical safety,”  said Franks.

A combination of locker room behavior and toxic disinhibition gives rise to this behavior, according to Wallace. She says disinhibition makes people on the Internet behave in ways that they wouldn’t in face-to-face encounters.

“When they get online,” she continues, “they are exposed to characteristics that often create disinhibition, particularly the toxic variety, where they’ll say just these vile things. And … you’ve seen that in GamerGate with people just shooting out these death threats and just gross type of messages. And the ingredients that we are talking about here are this perception of anonymity.”

While Wallace suggests that disinhibition may subside if the perpetrators are more easily identified, she says the physical distance between the perpetrator and his victim also gives the aggressor “a sense of safety.”

“The victim may not know who to retaliate against … It is being at a safe distance and shooting barbs where the person can’t … see who it is,” she added.

Things might be different were the perpetrator to see the hurt he’s inflicting in his victims’ eyes.

“That aggressor cannot see the actual face of the victim or [have] eye contact,” she added. “And that has been known to have an effect on aggression … Just being able to see the harm you are doing can inhibit your behavior. But on the Internet, especially in a venue like Twitter, you can’t see any of that.”

Davies’ research reveals online harassment and cyberbullying instill “great anxiety” in their victims and cause “huge health effects.”

“They lose a lot of weight,” she explained. “They gain a lot of weight. They have terrible insomnia. They have gastroenteritis. They have lots of other issues because they have such great anxiety.”

Davies says education is key to let people know that online harassment and threats of violence constitute “criminal behavior” and that perpetrators should be held accountable. And she suggests including more women in character development or game content, for example, to help start a shift in gender perceptions.

“The only way to combat that is by being a much more inclusive community,” she said. “And until we have that, you are always going to have issues of power and control.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

3-D Printing Goes Wild; Bitcoin Finds Microsoft; the Hacking Wars

Posted December 11th, 2014 at 2:44 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Silicon Valley Summit Explores Ways to Make Tech Workforce More Diverse

Leading tech companies, including Apple, Google, Facebook and many others, are participating in a California summit to look at ways to increase diversity in the tech sector, currently dominated by white and Asian men.

Microsoft Begins Accepting Bitcoin

Microsoft has added Bitcoin as a payment option for apps, Xbox games and other digital purchases across its various Windows platforms. The move was not officially announced but surfaced during online discussions.

3D-Printed Drones May Help Save Endangered Wildlife

The Wildlife Conservation Unmanned Aerial Vehicle (UAV) Challenge hopes to save the world’s remaining rhinoceros species from extinction due to relentless poaching. Up to 139 teams from more than 29 countries on six continents are tasked with developing open-source, anti-poaching drones equipped with sensors to monitor poaching activities. The 3-D-printed drones are expected to launch next spring in South Africa.

Uber Offers Woman Credit in Response to Sexual Harassment Allegation

According to Newsweek, Uber offered to pay about $31 to a woman who reported that she was sexually harassed by a London driver. After several email exchanges between the woman and Uber executives, the ride-sharing company refunded the price of the trip, saying steps will be taken to avoid similar incidents in the future.

Analysts: Alibaba Security Flaws Exposed Data on Millions of Users

Israeli cybersecurity analysts say two separate vulnerabilities on websites run by Chinese e-commerce giant Alibaba have exposed the names and addresses of millions of users and left  merchants’ accounts vulnerable to hackers.

Now at the Sands Casino: An Iranian Hacker in Every Server

Bloomberg reports that in February, Iranian hackers broke into the computer systems of Las Vegas Sands Corporation, the biggest gaming company in the world, wiping hard drives clean as employees scrambled to unplug their computers. The hackers did not steal cash or credit card information and reportedly wanted to punish the company’s CEO.

Sony Pictures Tries to Disrupt Downloads of its Stolen Files

After suffering one of the most devastating hack attacks in recent memory, Sony Pictures has gone on the offensive to stop the pilfering of its data. Using Amazon’s cloud services in Asia, Sony started a denial of service counterattack, commonly used to fight piracy.

How Facebook Knows When Its Ads Influence Your Offline Purchases

Atlas, an online advertising tool recently deployed on Facebook, is part of the social media giant’s attempt to show advertisers a link between their online ads and offline purchases. So if you provide a merchant with your email or phone number, expect that Facebook will match them with online owners. You might want to read between the privacy policy lines.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.