Wednesday, December 10, 2008

Cat and mouse, on the web

Anonymouse.org, created in 1997 by a German student, provides computer server proxies to citizens around the world living in repressive regimes. Such software allows citizens to get information free of governments censorship. It works by rerouting data through other servers allowing users to surf the net anonymously.

This software is used by millions of people everyday in countries like China and Iran, but government watchdogs have found effective countermeasures to catch the censorship dodgers. Instant messaging is commonly used to evade censors. Other methods have helped to spread the word of updated proxy lists and evade censorship as well. Human rights activists do prison time when caught, but they have prevailed with help from American advocates.

It’s a vicious circle, full of risk not to mention slow surfing and bad graphics, but it is human nature to seek free of expression. Human creativity cannot be stopped; it simply goes underground when people live with too much censorship.

Ultimately, I think the people will always prevail in these types of situations because the need to express oneself is greater than the motivation of the oppressors. To American non-profits that provide free downloads and run these proxies, I say right on. This is exactly what America should be doing to promote democracy instead of engaging in wars in the Near East.

The new face of the silicon age

This article poses the question of who is to blame—Indian workers willing to work for less or the American businesses who choose to outsource jobs. Citing statistics about wages and jobs exported overseas in the first part of this decade, the author puts a human face on the phenomenon by interviewing a young female programmer.

Aparna Jairam, is a working mother and young professional at Hexaware Mumbai. Jairam. She makes $11,000 per year, one-sixth of what computer programmers make here in the US. Jairam does not she apologize for performing a job once done in the US. People in India are not stealing American jobs, she says. She is simply doing what she was trained to do.

The economics times are certainly changing since globalization began more than a decade ago. Americans have watched their jobs being outsourced to developing countries. Globalization seemed innocent enough back in the early 1990’s, but the results have proven otherwise to many US workers and especially to computer programmers.

We signed up for globalization and now we know it was not designed to protect our jobs, but to make big money for businesses. Personally, I avoid buying food from countries that have lax standards about production and little government oversight. And some of these countries are not second or third world countries. For example, I recently read that Australia has a toilet-to-tap system for recyling water which makes me nervous about drinking Australian wine.

The best way to keep jobs here in the US is to buy local whenever possible. As consumers we can still vote with our dollars.

National ID

Congress recently mulled over the merits of a national ID linked to biometrics. What exactly this would look like, no one is sure, but under the Bonner Plan a biometric card would be the only legal form of identification for US workers. This unspecified biometric could be a digital photo, a fingerprint or an iris scan.

The Bonner Plan caused controversy among lawmakers last year and was met with opposition from groups such as the American Civil Liberties Union and a national Council of La Raza, a Latino civil rights organization. Opponents say this form of identification puts an undue burden on the job seeker to prove she is work eligible in a government system fraught with database errors.

I do not know the outcome of this issue, but it as a nation we may have bigger fish to fry than chasing after immigrants. After all, the wages of illegal immigrants make up less than one percent of the GNP. Perhaps the economic disparity between Mexico and US will begin to level out during the next several years reducing the lure of illegal immigration for some. Maybe Obama’s administration will support the idea of helping undocumented workers to earn legal status.

In any event, calling a plan tamper-proof sounds like folly to me. From what I’ve observed in my half century on the planet is that nothing is foolproof. Digital technology lends itself to hacking my its very nature. Conservative politicians might just as well go on devising plans to building a wall across Texas than pursuing the biometrics course as outlined in the Bonner Plan.

Facing down the e-maelstrom

College presidents used to be safely insulated from unpleasantness and angry attacks by protestors, but thanks to e-mail, those days seem to have gone the way of the dinosaur. Now when students have take issue with administration, presidents can expect a flood of messages to appear in their in-boxes.

In the old days, protests on campus were mentioned after the fact in the college newspaper, but today bloggers pick up on stories as well as e-mail addresses of presidents. News spreads well beyond the confines of the institution bringing issues into public scrutiny. College presidents’ staffers are left to sort through the emails to avoid issues with wealth donors and prominent politicians. Because there may be hundreds of bloggers, institutions can not address the source of the information to repudiate inaccuracies spread by bloggers.

Being a former community newspaper writer, I find this situation interesting. I think more good comes from blogs than bad—at least they are being read and I can’t say they same about newspapers. Blogging challenges the status quo by bringing newsworthy topics out from under the shadows of academia. On the other hand, the quality of blogs is not always stellar. Unsubstantiated rumors may appear as fact in a blog.

Furthermore, institutions do need to keep their donors happy to ensure survival. College and universities can handle the pressure; it’s just that they are used to controlling the media. Instead of hiring more PR types to do damage control, higher education institutions should encourage donors to report disturbingly controversial rumors to the PR office.

A nascent robotics culture

There is a new killer computer application on the horizon that promises to nurture our young and care for our elderly. In this report, Sherry Turkle, ponders philosophic questions such as what constitutes "aliveness" (p.191) and when is it appropriate to substitute a robot for a human being or animal.

Turkle explains the relational psychology of how human beings engage with each other and their computers. Her qualitative fieldwork with children and seniors reveals that we project ourselves and our feelings on to robots to satisfy emotional needs. Clearly, robots cannot reciprocate when it comes to love, but this is how our brains are hardwired. This phenomenon of treating a robot like a sentient being is present and easily observable when among children at play. Indeed, it is very human to have fantasies of a mutual connection that does not exist.

There is a lot more troubling technology out there such as human and animal cloning. Still, I would have concerns and reservations about my family members being nurtured by a relational artifact. With that said, robo-love is better than no love. There is much we can learn from this technology and if used carefully, it could be applied to help alleviate human suffering.

Monday, December 8, 2008

Mind control

The new technology of brain implants is called brain-computer interface (BCI) and here’s how it works. Electrodes are embedded in the brain or worn on the surface of the skull. These electrodes are sensitive enough to pick up the thought patterns of the user. The user thinks of a motor function such as hitting a ball or opening an email. The computer interprets the neural activity associated with the thought activating the cursor on the screen to perform the function.

A young quadriplegic, Matthew Nagle, had the BCI chip implanted in 2004 and has been the subject of medical research since then. Though considered experimental and highly invasive by medical researchers, the technology is giving hope to young disabled people like Nagle who believe it many someday help them regain mobility.

I think BCI technology is very promising to say the least. It represents the very best technology has to offer – to mitigate human suffering. My adult daughter has a form of epilepsy that is controlled with anti-seizure medication. The medications she has tried are highly toxic causing side effects such as kidney stones, paranoia and a host of other health problems. My hope is that this kind of technology will be developed to control irregular electrical impulses in the brain allowing her to eventually stop taking the medications. We are not that far away technologically speaking from helping people with all kinds of brain injuries and disorders.

Privacy, legislation, and surveillance software

If you work in the private sector, chances are your email is anything but private. Your employer could be part of the growing trend to monitor productivity by using surveillance software. Workplace monitoring is nothing new, but it is on the rise and getting more sophisticated. Monitoring software allows employees to measure and collect all computer activity of their employees.

The American Management Association reported in 2005, that over half of employers store, review or monitor email, files and Internet connections. Most of the employers surveyed by the AMA said they have written policies in place. Still employees violate these policies to shop, surf and download music at work. The temptation of having technology at our fingertips is more than most workers can resist. Employers clearly have the upper hand and workers will remain vulnerable to firings for violation of company policy. In spite of the Electronics Communication Privacy Act (ECPA), employers are well protected from employee privacy claims because they own the technology used by employees and can therefore monitor it at will.

I work in for the State of Washington and therefore, enjoy my Fourth Amendment freedom from unreasonable search and seizure. The rule of thumb at my institution is that it is OK to use technology to take care of personal business, but do it on your own time. Don’t let your computer use get out of control or deter you from performing the functions of your job. I appreciate this attitude of trust very much and try not to abuse the privileges I have. I know the private sector is very different having worked there in the past. Personally, I would not want to work on an employer who was spying on me. However, I think most employers are reasonable about employee checking personal email or calling home to check on the kids so long as the job gets done.

Nord, G., etal (2006) Privacy, legislation, and surveillance software. Computers in society, 14, 68-71. From Communications of the AMC, 49(8), 2006, August pp.73-77.

March of the robolawyers

Game theory can now be applied to the field of family law as evidenced by software that helps divorcing couples divide assets or seek mediation. The approach is anti-combative, guiding both parties through step-by step trade-offs to bring into focus what matters most to them rather than playing out destructive and costly emotional dramas. Programs such as Family Winner seem to work because they use conflict-management principles. This takes the emotion out of the divorce proceedings with very good results everyone concerned.

Couples who have used the programs give them high ratings perhaps because the emotions that can be exacerbated by real live attorneys are eliminated by robolawyers. Anything that reduces the emotionality of divorce has to be a good in my opinion. For too long unscrupulous divorce attorneys have been the real winners who take advantage of clients by advising them to go for the jugular. Not all attorneys cash in on client vulnerabilities, but I've seen it happen among friends. This software has great potential to reduce human suffering. I give it the thumbs up.

The Economist (2006). March of the robolawyers. In P. DePalma (Ed.), Computers in society, 14, (pp.200-201). New York: McGraw Hill.

Sunday, December 7, 2008

Secrets of digital detectives

The devil is in the details, so they say, and now computer technology exists to do the detailed work of tracking criminal activity. These new software programs analyze patterns from insurance claims and credit-card transactions. Anti-fraud software is designed to sift through mundane details and permutations that humans inevitably miss. It works by using statistical data from past transactions to determine a probability score for fraud versus legitimacy. The results have saved companies millions of dollars. Anti-fraud software is also used in the telecom industry to identify fraud on mobile networks. Of course, thieves have countered back and changed certain behaviors to avoid detection, but so far the software is working well for business and getting more sophisticated.

I am usually opposed programs that make it easy for business and government to spy on people, but in this case, I think the computer programs are highly beneficial and serve the greater good. Fraud is rampant in our society and quite expensive for honest consumers. None of us likes to pay higher prices and premiums. On the other hand, I’m a person with weird spending habits. I might shop at a thrift store and Nordstrom’s on the same day or eat at Zeke’s greasy spoon on my way to the opera. So far, my spending habits have not set off any false positives with my credit cards, but I’d better be careful.