Ugandan journalist, 10 others arrested for treason

The New Vision is reporting that Patrick Otim, a Pader-based freelance journalist, was arrested and charged with treason along with 10 other men. The group was allegedly forming a rebel organization to fight against the Ugandan government:

They allegedly mobilised logistical support for their rebellion, which included satellite phones, solar panels, Global Positioning System (GPS) machines, black polythene sheets, gum boots, walkie talkies, laptops and fire-arms.

The 11 suspects appeared before Buganda Road Court Magistrate Geoffrey Sayekwo but were not allowed to enter plea because the court did not have jurisdiction. They were unkempt.

Sayekwo read out the charges before sending them on remand to Luzira Prison. They face a second, alternative charge of concealing treason.

The suspects, according to the charge sheet, committed the offence between 2006 and May 2009 in eight districts, including Masindi and Kampala. The other districts are Gulu, Pader, Kitgum, Nebbi, Apac and Amuru.

Blogren, have you heard anything about this?

Beth Kolko: ICTs and their uses in resource constrained environments

Liveblogging Beth Kolko’s presentation on Form, Function and Fiction: ICTs and their uses in resource constrained environments at the Berkman Center. Please excuse misrepresentation, misinterpretation, typos and general stupidity.

The Design for Digital Inclusion group at the University of Washington, which Kolko heads, works on a variety of topics, including tech in Central Asia, the Global Impact Study, the impact of public access to ICTs, technologies for youth with autism, games for development, and more.

Kolko focuses on three main questions: what ICTs are adopted in diverse communities and why? What do people in these communities do with these ICTs? How can we design better technologies for these users?

We assume that ICTs have universal meanings across cultural contexts, but the functions of these technologies vary widely from culture to culture. We need to pay attention to this diversity because designing with it in mind makes systems stronger, less brittle.

Kolko approaches design from both the engineering and humanities perspectives: both form and function. The goal is to blur the boundaries between these two categories until they eventually collapse.

People tend to “get sleepy” when people talk about technology and development, but the findings from the ICT4D field are relevant to a number of communities. Geography is not the primary determiner of resource constraints — the technology developed in, say, Central Asia can be useful in Yakima Valley (in Washington state).

Resource constraints include not just money but also time, cultural capital, screen size, bandwidth.

Kolko’s work in Central Asia has both quantitative and qualitative components, including annual surveys, interviews and usability tests. The survey doesn’t focus on tech use (though it does have a tech use model) — Kolko’s interested in issues of trust, social networks and social institutions as well as technology.

[[Side note: Kolko apologizes for not having a LOLcat photo in her presentation.]]

Internet is weather-dependent: in some places, when it rains, the Internet goes down because rainclouds block satellite access. This intermittent connectivity happens in Central Asia and Cambodia, but also in the rural United States.

Patterns of Internet use (both frequency and duration of access) vary widely across cultures. In Central Asia, most users are online for an hour at a time. There are different pricing structures for chat and actual Internet use (accessing Web pages, etc.).

Mobile phones are particularly key in resource-constrained environments. Mobile phones weren’t created to transfer money, but they’re being used for banking. This, along with general mobile Internet access, brings up questions of mobile phone security. (Moral: if you have an iPhone, use a password.)

Why don’t people use the Internet? It’s too expensive, too hard to access, or too confusing. Also: many Central Asians think it’s “for young people” (though the definition of who’s young depends on who’s answering the question).

Kolko has conducted some design ethnography work focused on the exchange of goods and information via social network in Central Asia. Controlling for demographics, people who use their conventional social networks (face-to-face communication) more are more likely to use technology. These people are also more likely to have higher levels of trust in their friends and family.

Of Central Asian Internet users, more people use the Internet for research for school or job training than for any other purpose. The least common use is for online auctions.

Most Central Asians use their mobile phones several times a day (though only 2% of mobile phones are connected to the Internet). People use their phones not because landlines are particularly expensive or hard to get, but because they want to be able to be reached no matter where they are.

Mobiles aren’t always great: people are already using them for 419-type scams. But their role has been noticeable in the political sphere: after the 2008 revolution in Kyrgyzstan, phones were used to report rioting and looting, both to warn people to stay home and to rally friends and family to help protect businesses. In Kenya, SMS was used to spread rumors and incite violence.

Part of Kolko’s research focuses on games for development. Games are cheaper and, often, easier to use than the Internet. For many Central Asian kids, games provide an first introduction to ICT. This initial training in ICT may give these kids a leg up in terms of later educational and career opportunities.

All of the examples above help provide a better understanding of how ICTs are used in resource-constrained environments. But how to build better ICTs for these regions? You need to focus on design ethnography. For example, looking at how people use mobile phones, how they use their social networks, and the “pain points” of their everyday lives.

Researchers interviewed Central Asians in their homes and had them draw diagrams of their own social networks. Their research lead them to two projects: the Mobile Social Software (MoSoSo) directory addresses the lack of published information directories, working through SMS instead of Internet to list and rate businesses. The Starbus focuses on providing more information about public transportation, using GPS and traffic algorithms to track the location and estimated arrival time of a bus, then send this information via SMS to users who request it.

Interestingly, the initial Starbus design was as low-power as possible to maximize the battery life. They tested the system in Seattle and it worked, but when they brought it to Bishkek they realized that the cell phone towers there required the GPS to have more power. They had to rewire the whole thing — “a classic design approach that failed miserably.”

In order to design the best and most appropriate ICTs, you need to drill deeply to truly define what an “Internet user” is in a particular environment — you can’t assume all Internet users access or use the Internet in the same way.

My muse is sadly thin.

Last Tuesday I was at the Berkman Center for “The Second and Third Enclosures”, a presentation by poet and cultural critic Lewis Hyde on what he calls “our ‘cultural commons,’ that vast store of ideas, inventions, and works of art that we have inherited from the past and continue to produce.”

Hyde is working on a book about why these ideas and works of art should be owned by the commons, rather than by individuals. His thesis is that limiting ownership of creative works also limits human creativity in ways we can’t begin to imagine (mostly because there’s no way to know that we’re missing out on them).

I’ve been trying for a week to write up my notes from the event, but I keep getting bogged down by amusing quotes (see: “beating back the bounds,” “fattening your muse”) and a train of thought that winds through medieval England, Scottish printing presses and Roman law to somehow end up at John Cage’s 4’33”.

This is not to say that Hyde’s presentation was less than coherent: many others, including fellow Berktern Joey Mornin, blogging machine David Weinberger and Ethan Zuckerman, have posted recaps.

But potential blog posts have painfully short half-lives, and in half an hour I’m heading back to the Berkman conference room for a talk by Beth Kolko on how communications technology takes on different meanings in resource-constrained environments. I’m going to force myself to live-blog this one.

Evaluating China’s Green Dam software

The news that China will begin requiring all computers sold in the country to include Internet filtering software has sparked waves of commentary on topics ranging from legal challenges to human rights issues to concerns about security and effectiveness. Also, a post on African porn.

The software, known as Green Dam Youth Escort, ostensibly protects children from harmful information online by filtering out sites that contain prohibited keywords. It will be mandatory on every computer sold in China after July 1, 2009.

The OpenNet Initiative, where I’m working as part of my internship for Harvard’s Berkman Center, worked this week to evaluate the functionality of Green Dam. In “China’s Green Dam: The Implications of Government Control Encroaching on the Home PC,” we review the functional elements of this new software and explore the possible effects of its implementation on a national scale. We conclude that Green Dam is deeply flawed and poses critical security concerns for users.

China censors light-colored naked photos; darker skin gets through filter

The latest news in the world of Internet censorship is about China’s Green Dam software, which ostensibly protects Chinese children by filtering out pornographic Web sites.

China has recently announced that all PCs sold in the country must come with the software, beginning on July 1, 2009. Critics say Green Dam will be used to crack down on Internet users, making it even more difficult to access uncensored information from China.

In addition to blocking sites that include keywords such as “pornography” and, somewhat less justifiably, “touch” and “play,” the software also filters out images that have a high percentage of “skin colored” pixels. Oiwan Lam at Global Voices rounded up Chinese reactions to the software; among them was this gem:

How much flesh color does it take to make something “pornography”? I went on the Internet to check out some animal photos. A lovely little naked pig was sent onto the black list. Pitiful little pig! I was curious, so I looked up some photos of naked African women. Oh, they were not censored!

So apparently, it’s morally reprehensible to look up animals or, say, kids playing soccer, but African porn is totally okay!

For the latest news on Green Dam, check out the #greendam hashtag on Twitter.

Crossposted on the OpenNet Initiative blog.