Photographers Will Soon Be The Most Valuable People In The News Room

Alyson Shontell |?Nov. 7, 2012, 2:17 PM?|?10,998?|Business Insider

camera picture self

wwiwsky via Flickr
Photographers will soon be the most valuable people in the newsroom, and it won’t be long before they put writers out of jobs.
Why?
Because, when you’re on the go, the easiest stories to consume, create or share aren’t text based. They’re photo based. As TechCrunch’s MG Siegler just wrote, “If pen beats the sword, camera beats pen.”
Take, for example, Hurricane Sandy coverage.
PandoDaily’s Sarah Lacy asked if Sandy could be?Instagram’s big citizen journalism moment. But it wasn’t just a big moment for?Instagram. It was a big opportunity for news outlets. The most read stories were pictures of destruction caused by the storm without much text. People wanted to?see?the news, not read it.
As smart phones and tablets become more mainstream, the web is becoming more visual. Mobile devices are the new glossy magazines; text-ridden sites are boring, black and white newspapers.
Increasingly, attractive, photo-heavy articles are stealing the most online readership. Take these two articles for example:

One big photo hit can account for the same traffic as 10 well-written articles; they’re easier to digest and often take less time to make.
Still, photos aren’t anything without proper packaging. BuzzFeed’s?Jonah Peretti?says he looks for people who can frame photos stories, not just find images. Instead of linking to cute cat photos, his team creates headlines like, “You Won’t Make It All The Way Through These 10 Pictures Of Kittens Without Squealing.”
With that in mind, the question becomes who’s better to for news sites to hire: A writer they can train to take better photos, or photographers who have honed their skills but need help with context? Good photos are difficult to find for cheap. News sites might as well pay people on staff for images rather than iStock or AP.
News sites will still need a few good writers to stir up meaningful conversations and thoughtful analysis. But photographers will be the people the writers can thank for their paychecks. Their articles will steal pageviews and support publications in the rapidly approaching, mobile-first world.

Read more:?http://www.businessinsider.com/photographers-will-soon-be-the-most-valuable-people-in-the-news-room-2012-11#ixzz2BigNZEz8

When luddites go digital

Article that looks at the rise of digital Bangladesh culminating in the current blockage of www.youtube.com in Bangladesh.

Remember those days? It was 1993. Getting a new telephone line took several years and large bribes. Getting an international line was another matter and calling overseas required making a ?Trunk Call? through an operator and a wait of several hours. Phone calls were expensive. A one-minute fax or call to the US cost well over 100 Taka. The exchange rate was very different, and a 116 Taka one page fax would have set you back three US dollars! We needed government permission to import a fax machine and the clunky early generation mobile phones cost over one lakh each (US $ 2,500). It was less than twenty years ago. Now, Mobin, the guy in our mudir dokan (corner shop) downloads videos from my blog (where he is featured) on his mobile phone. We get news on TV sandwiched between gyrating boys and girls advertising FnF connections.  My attempts to curb Facebook use at work has failed miserably. We finally have 3G, at least partially.
How did this digital revolution come about? We had decided to set up our picture agency Drik, not in the established photographic marketplaces of London, Paris or New York, but in Dhaka, where our photographers were based. But while we were close to our photographers our distance from the market, in terms of miles and means was enormous. What we also wanted to do was to set up a South-South exchange, so we could build on our collective strengths. A Dutch organisation called TOOL was interested in publishing my book, and I decided to meet up with them while in Amsterdam for the judging of World Press Photo. Researching on them I discovered they also offered off-line email, using Fidonet technology. More importantly, they too were keen on setting up a South-South exchange. Continue reading “When luddites go digital”

The New Totalitarianism of Surveillance Technology

If you think that 24/7 tracking of citizens by biometric recognition systems is paranoid fantasy, just read the industry newsletters

by?Naomi Wolf

Published on Friday, August 17, 2012 by?The Guardian/UK
A software engineer in my Facebook community wrote recently about his outrage that when he visited Disneyland, and went on a ride, the theme park offered him the photo of himself and his girlfriend to buy ? with his credit card information already linked to it. He noted that he had never entered his name or information into anything at the theme park, or indicated that he wanted a photo, or alerted the humans at the ride to who he and his girlfriend were ? so, he said, based on his professional experience, the system had to be using facial recognition technology. He had never signed an agreement allowing them to do so, and he declared that this use was illegal. He also claimed that Disney had recently shared data from facial-recognition technology with the United States military.
Watching You, Newkirk Avenue and East 16th Street
(photo: Flickr user Flatbush Gardener)

Yes, I know: it sounds like a paranoid rant.
Except that it?turned out to be true.?News21, supported by the Carnegie and Knight foundations, reports that Disney sites are indeed controlled by face-recognition technology, that the military is interested in the technology, and that the face-recognition contractor, Identix, has contracts with the US government ? for technology that identifies individuals in a crowd. Continue reading “The New Totalitarianism of Surveillance Technology”

Livestreaming: "IT SECURITY IN TODAY'S GLOBAL BANKING"

Date :?5th July, 2012?Time :?06:00 PM
Venue:?Ball Room Pan pacific Sonargaon Dhaka

Drik ICT ?will be live?streaming the seminar?”IT SECURITY IN TODAY’S GLOBAL BANKING”

“Bankers’ CTO Forum Bangladesh, where CTOs/CIOs/Heads of IT/Heads of ICT of Government and Commercial Banks are the members, is organising a seminar on “IT SECURITY IN TODAY’S GLOBAL BANKING” jointly with IBM and M/S Thakral Information Systems Pvt. Ltd. at Ball Room, Pan Pacific Sonargaon Dhaka on 05 July, 2012. The Honorable Governor of Bangladesh Bank will be the Chief Guest.
The purpose of this CTO forum is to become trusted partner of policy makers, stake holders and the objectives are to engage in meaningful dialogue and build solutions that are critical to the Banking and IT industry, explore topics of mutual interest and most importantly bring synergy between business and technology leaders.”
Streaming on?5th July, 2012?from:?06:00 PM

Software Design Contest

Subscribe to ShahidulNews


Share


Drik ICT initiates software design contest.

Students of Bangladesh!

Challenge Yourself to Change the World

There are many challenges faced by our world today and even in your local communities. But did you ever imagine that you could help solve these challenges? It?s true, you can! The Microsoft Imagine Cup 2012 Software Design Competition is all about creating real-world applications and solutions that can help make the world a better place. Using Microsoft tools and technology, student competitors can unleash their ideas and technical talent to create cutting-edge software applications. You and your team will develop, test, and build your ideas into applications that can help solve some of the world?s toughest problems, such as poverty, hunger, gender inequality, environmental sustainability, and access to education and healthcare. We know you have the knowledge, the passion, and the drive to make a difference.?Sign up and get started building your solution today!

Software Design Details…

Ready to Get Started?

We know you are excited, but before you start building the next software design solution that benefits people around the globe, take a few minutes to read the?Software Design Rules for Bangladesh and the?Imagine Cup Official Rules and Regulations.

Okay, here?s how it works.

Continue reading “Software Design Contest”

`Owning' the weather? Part I

By Rahnuma Ahmed

“In 2025, US aerospace forces can ?own the weather? by capitalizing on emerging technologies?and focusing development of those technologies to war-fighting applications…?weather-modification offers the war fighter a wide-range of possible options?to defeat or coerce an adversary.”

— Col Tamzy J. House et. al., Weather as a Force Multiplier: Owning the Weather in 2025

`Owning’ the weather? You must be thinking, What a preposterous idea!
Apparently not, for those who wrote the report from which I’ve quoted above (August 1996). It was a study commissioned by the chief of staff of the US Air Force to examine the “concepts, capabilities, and technologies the United States will require to remain the dominant air and space force in the future.” One which was reviewed by security and policy review authorities, and cleared for public release.
As I read the report, I cannot help but wonder at what is contained in those documents which have not been revealed to the public, ones that are classified. Neither can I help but marvel at the devotion and hard work that has gone into imagining, drawing-up and detailing such a scheme of mass murder. At the colossal criminality involved. An issue that the authors hurriedly traverse?”[weather-modification techniques] offers a dilemma,” it is a “controversial issue,” “some segments of society” are reluctant?lest they have any second thoughts, lest they develop any moral qualms over the matter.
Of course, as is only to be expected, all the necessary disclaimers are there. The views expressed are those of the authors. They do not reflect the official policy or position of the US Air Force. Or, the Department of Defense. Least of all, the US government. Representations of future scenarios are fictional. Any similarity to real people, to real events, why, to reality itself?is unintentional.
Weather modification, write the authors, has “tremendous military capabilities” (see table). Rainfall can be enhanced to flood the enemy’s lines of communication. To reduce the effectivity of precision guided missiles (PGM). Rainfall can be prevented too. To deny the enemy access to fresh water. To induce drought and wreck food cultivation. Fogs and clouds can be generated, or removed. Friendly forces merit generation, to enhance their ability to conceal themselves. While enemy forces shall suffer from fog/cloud removal, to deny concealment. To smoke ’em out?
To develop an integrated weather-modification system, technological advancements are necessary in five areas: (1) advanced nonlinear modeling techniques (2) computational capability (3) information gathering and transmission (4) a global sensor array, and (5) weather intervention techniques. Some of these “intervention tools” already exist, we are told. Others may be developed. May be refined. For future use. To develop and refine technologies of mass murder….?
Current weather-modification technologies which will mature over the next 30 years, will?in all likelihood?become “a part of national security policy with both domestic and international applications.” A policy that could be pursued at “various levels”: NATO. UN. Coalition. And, if the national security strategy in 2025 includes weather-modification, “its use in our national military strategy will naturally follow.” Its benefit? It’ll “deter and counter potential adversaries.” It’s “appropriate application… can provide battlespace dominance to a degree never before imagined.” The executive summary ends on this ominous note: ?The technology is?there, waiting for us to pull it all together;? in 2025 we can ?Own the Weather.?
Weather War————————————————————————————————
Weather Network
The current military and civilian worldwide weather data network will evolve and expand to become a Global Weather Network (GWN). One which will be a super high-speed, expanded bandwidth, communication network by 2025. By then, weather-prediction models will prove to be “highly accurate in stringent measurement trials against empirical data.” And the “brains” of these models? “Advanced software and hardware capabilities which can rapidly ingest trillions of environmental data points, merge them into usable data bases, process the data through the weather prediction models, and disseminate the weather information over the GWN in near-real-time” (see Figure).
Although “extreme and controversial” examples of weather modification, such as, the creation of made-to-order weather, large-scale climate modification, creation and/or control (or ?steering?) of severe storms, etc. were researched, “technical obstacles preventing their application appear insurmountable within 30 years.” And therefore, the authors write, these are only mentioned briefly.
Close observers are inclined to disagree. Weather warfare, they think, has already started.
“What are the underlying causes of extreme weather instability, which has ravaged every major region of the World in the course of the last few years?” writes professor Michel Chossudovsky, one of the keenest analysts.
He continues, “Hurricanes and tropical storms have ravaged the Caribbean. Central Asia and the Middle East are afflicted by drought. West Africa is facing the biggest swarm of locusts in more than a decade. Four destructive hurricanes and a tropical rain storm Alex, Ivan, Frances, Charley and Jeanne have occurred in a sequence, within a short period of time. Unprecedented in hurricane history in the Caribbean, the island of Grenada was completely devastated: 37 people died and roughly two-thirds of the island’s 100,000 inhabitants have been left homeless; in Haiti, more than two thousand people have died and tens of thousands are homeless. The Dominican Republic, Jamaica, Cuba, the Bahamas and Florida have also been devastated. In the US, the damage in several Southern states including Florida, Alabama, Georgia, Mississippi and the Carolinas is the highest in US history.”
While global warming is undoubtedly an important factor, writes Chossudovsky, it does not fully account for these extreme and unusual weather patterns.
In the 5 years since he wrote “The Ultimate Weapon of Mass Destruction: “Owning the Weather” for Military Use” (Global Research, September 2004), many more natural disasters have occurred: the Asian tsunami which hit 14 countries; Indonesia, Sri Lanka, India and Thailand most severly, killing nearly 230,000 (December 2004). Hurricane Katrina in New Orleans, Louisiana, 1,836 people lost their lives (August 2005). Great Sichuan earthquake in China, 68,000 died (May 2008). The recent earthquake in Haiti, 200,000 estimated dead (January 2010).
Both the Americans and the Russians have developed capabilities, says Chossudovsky, to “manipulate the World’s climate.”
In a 1997 article of The Wall Street Journal (Nov 13), Chen May Yee wrote about a memorandum of understanding to be signed soon between a Russian and a Malaysian company to create a hurricane that would create torrential rains, one that would be directed close enough to clear the smoke without actually coming on land to create a devastation. In an earlier piece The Wall Street Journal had reported that a Russian company, Elate Intelligent Technologies Inc., advertising under the slogan `Weather Made to Order’?sold weather control equipment. Elate is capable of fine tuning weather patterns over a 200 square mile area, for as little as $200 per day. Hurricane Andrew, which had occurred a year earlier and had caused damage worth $30 billion could have been turned into “a wimpy little squall,” according to Igor Pirogoff, a director of Elate. Doesn’t this mean that hurricane Katrina too, could have been diverted?
As I research on the internet, I come across another news item: “Entering a thunderstorm 10 miles off West Palm Beach, a B-57 Canberra jet bomber chartered for one million dollars releases some 9,000 pounds of improved Dyn-O-Gel capable of 10-times stronger water absorption. Miami’s Channel 5’s weather radar shows the huge thunderhead losing moisture. Within seconds, the buildup vanished as one side of the cloud collapsed ?like an avalanche?, according to a chase plane cameraman.” (Sun-Sentinel July 20/01).
As a weapon of war, the use of weather modification techniques was publicly described much earlier. On 20 March 1974, by the Pentagon. A 7 year cloud seeding effort in Vietnam and Cambodia, costing $21.6 million, had been initiated to increase rainfall in target areas, thereby “causing landslides and making unpaved roads muddy, hindering the movement of supplies.” ?That US forces had suffered a drastic defeat in Vietnam, and forced to leave in 1975, is now part of history.
At present, other countries, probably China and North Korea, are feverishly working to catch up. Early snow covered Beijing last November. According to the Chinese state media, it was the result of Chinese metereologists’ efforts to “make rain by injecting special chemicals into clouds,” a technique that often gets results (Agence France-Presse, 1 November 2009).
According to Chossudovsky, weather-modification technology is being perfected in the US under the High-frequency Active Aural Research Program (HAARP), part of the (“Star Wars”) Strategic Defence Initiative (SDI). Recent scientific evidence suggests that HAARP is fully operational. That it has the ability of potentially triggering floods, droughts, hurricanes and earthquakes. That it is?from the military standpoint?a weapon of mass destruction…
(more, next week)
First Published in New Age on 1st February 2010

The Wind In The Wheat

The 25th March is a significant day in Bangladesh. It was this day, in 1971, when the Pakistani army began its genocide, causing the death of millions, but eventually also leading to the birth of the nation. The Pakistani army had been supported by the United States, who had sent the seventh fleet to the Bay of Bengal in a show of strength, pitting its might against India and its ally of that time, the Soviet Union. The United States also influenced Bangladesh in a very different way. Exactly 57 years earlier to the day, a man born in Iowa was to affect the destiny of Bangladeshis in a profound manner.

Considering that he was one of only few US citizens to receive the Nobel Peace Prize, he was little known, even in his own nation. Amongst Nobel Prize winners, only Rev. Martin Luther King Jr., Mother Teresa, Nelson Mandela and Elie Wiesel have also won the US Presidential Medal of Freedom and the Congressional Medal. Norman Borlaug, the man who prevented a billion people from starving seems to have been easily forgotten. His death on the 12th September 2009, went largely unnoticed in Bangladesh.

Interestingly, the man who is said to be the father of the ‘Green Revolution’ is also blamed by some for having encouraged intensive farming, which some environmentalists feel have led to soil depletion and dependency of farmers. Certainly, a side effect of intensive cultivation is the dependence on both fertilizers and pesticides, effectively a dependence on petrochemical products. While the high yields produced by Borlaug’s techniques are undeniable and revolutionary, the increase in costs of fertilizers and pesticides has resulted in dependence on imports from foreign companies. The rate of increase in rice production in India, for instance, has been far outstripped by the rate of fertilizer intake per ton of rice. Borlaug himself had a simple response to this analysis. There was a need for food, and he provided a way to produce more. He has always said, the real answer was to curb population, but while there were mouths to feed, he made sure there was food to feed them. As a result nations that had been facing a potential famine, Bangladesh, India, Mexico and Pakistan became self sufficient in food. Mexico even became an exporter of wheat. Consequently, Borlaug is credited with having prevented over billion people from starvation.

India honoured him with the Padma Vibhushan, its second highest civilian honour. In Bangladesh he received the first honorary membership of the Bangladesh Association for the Advancement of Science. His success in Pakistan, might have been halted by the all to familiar bureaucratic systems we regularly encounter. When seeds destined for Karachi, reached Los Angeles en-route, a Mexican bank refused to honour Pakistan treasury’s payment of US$100,000, because the check contained three misspelled words. But the seeds did eventually arrive, and eventually led to a doubling of wheat production for both India and Pakistan.

While the new technology has undoubtedly also led to increased profits for corporate agribusiness, Borlaug never patented any of his ‘inventions’ and neither became wealthy nor famous despite the phenomenal transformation he had engineered. Rather, he encouraged its free use, himself working in the fields, training farmers how to maximize their yields.

As the initiator of the Nobel Prize had discovered, what technology eventually got used for, depended largely upon who got to use them. Unlike Alfred Nobel, Borlaug, also of Norwegian descent, never accumulated the wealth to find ways to offset the negative effects of his discoveries, but he remained a dreamer till the end.

“When wheat is ripening properly, when the wind is blowing across the field, you can hear the beards of the wheat rubbing together. They sound like the pine needles in a forest. It is a sweet, whispering music that once you hear, you never forget.”

Insecure at last: the age of surveillance

Subscribe to ShahidulNews


Share/Bookmark


By Rahnuma Ahmed

?I am worried about this word, this notion ? security. I see this word, hear this word, feel this word everywhere. Security check. Security watch. Security clearance. Why has all this focus on security made me feel so much more insecure??

? Eve Ensler, ?Insecure at Last: A Political Memoir.?

Tailor-made, to suit your needs

Surveillance often works innocuously. Consider this: billboards equipped with small cameras that gather details about passers-by ? gender, a rough estimation of age, and how long she or he looks at the billboard. The cameras, it is said, use software to establish that the person is a billboard-viewer, it then analyses her or his facial features like cheekbone height, distance between nose and chin, to judge the person?s gender and age. Race is not used as a parameter. Not yet, but the companies say that they can, that they will. These details are transmitted to a central database. The purpose is to ?tailor? a digital display of the viewer, ?to show one advertisement to a middle-aged white woman,? and another to ?a teenage Asian boy.? To sell products more efficiently. More rationally. It does not intrude on privacy, so the argument goes, since actual images of billboard viewers are not stored.

These billboards are similar to websites such as Amazon, described as the largest (virtual) bookstore in the world, tailor-made to assist the customer, her needs and interests. I visit the website to look up books on feminist theory, I am shown bell hooks? Feminist Theory: From Margin to Centre, along with, Ain?t I a Woman: Black Women and Feminism, also written by her, one that is, so I am told, ?Frequently Bought Together.? Simultaneously, five other products are displayed, that Customers Who Bought This Item Also Bought. Down below are menus which, at a click, will display my Recent History, books recently purchased, or viewed by me.

The Surveillance Society

Surveillance, as a growing number of Western writers, journalists, artists, academics and human rights activists keep reminding us, is no longer ?the future?. In the words of Henry Potter, London editor of Vanity Fair, ?we are already at the gates of the surveillance society.? According to a group of academics, writers of A Report on the Surveillance Society (September 2006), it exists ?not merely from dawn to dusk,? but for twentyfour hours a day, seven days a week. It is systemic, expressed not only through supermarket check-out clerks who want to see loyalty cards, or the coded access card that allows one to enter the office, or CCTV (closed-circuit TV) cameras, which in Britain, are ?everywhere.? A CCTV consulting firm puts the number deployed at more than 4 million, nearly as many as the rest of the world combined, minus the United States. The report?s authors write, ?these systems represent a basic, complex infrastructure which assumes that gathering and processing personal data is vital to contemporary living.? Surveillance is,?in their words, a ?part of the fabric of daily life.?

They write, it would be a mistake to think of surveillance as ?something sinister, smacking of dictators and totalitarianism,? or as ?a covert conspiracy.? Instead, it is the outcome of modern organisational practices, business, government and the military. It is better viewed as the progress towards efficient administration, as a benefit for the development of Western capitalism and the modern nation-state. Four hundred years ago, rational methods began to be applied to organisational practices, to ensure that the new organisations ran smoothly. It made informal social controls on business and governing, and people?s ordinary social ties ?irrelevant.? The growth of new computer systems after World War II reduced labour intensity, it increased the reliability and the volume of work that could be accomplished. Subsequent growth of the new communications system, now known together as ?information technology? (IT), is related to modern desires for efficiency, speed, control and coordination, and is global.

Capitalism?s push to cut down on costs and to increase profits has accelerated and reinforced surveillance. This, accompanied by the 20th century?s growth of military and police departments, and the development of new technologies, has improved techniques of intelligence-gathering, identification and tracking. Surveillance thus, has become part of being modern.

It is undoubtedly two-sided. It has its benefits: it helps deter traffic violations, tracks down criminals, medical surveillance programmes provide necessary information to public health authorities etc. But, the authors warn us, there are things that are ?seriously wrong? with a surveillance society. Large scale technological infrastructures suffer from problems, equally large in scale, especially computer systems where a mistaken, or an imprudent keystroke can cause havoc. For instance, twenty million ordinary peoples? online search queries from AOL were released for ?research? purposes in August 2006. The names of identifiers were not tagged, but connecting search records with names took only a couple of minutes. Corruptions and skewed visions of power, not that of tyrants, but of leaders justifying extraordinary tactics in exceptional cicumstances, such as the endless ?war on terror,? can be disastrous. Many Muslim Americans have been branded as unfit for travel, or subject to racial profiling. Surveillance systems are wrong on three other counts: they are `meant to discriminate between one group and another?, as recent trends show, distinctions of class, race, gender, geography and citizenship are being exacerbated and institutionalised. Second, it undermines trust, something necessary to social relationships, breeding suspicion in its place. When parents start to use webcams and GPS systems to check on teenage childrens? activities, or spouses check each others? suspected infidelities, it speaks of a ?slow social suicide.? And third, surveillance systems associated with high technology and anti-terrorism distract us from pursuing ?alternatives,? from paying attention to larger and more urgent questions.

Fear internalised

Caroline Osella, a contributor to the ASA (Association of Social Anthropologists) blog discussion on recruiting anthropologists in the ?war on terror? (through the Human Terrain System programme), wrote of a personal experience that illustrates the ?state of paranoid anxiety? that grips people. As the mother of an 11 year-old, she had gone to a school meeting for parents to discuss a planned residential adventure school trip. She was astounded, she writes, to see parents not asking questions about activities planned, or practicalities like food, or other stuff to take along. Instead, questions revolved exclusively around security. School authorities were asked: ?will an adult stay awake all night to monitor that kids are safe and not wandering?,? ?can the kids escape to the outside?,? ?can strangers get in?? And she writes, incredible as it may sound, one father finally asked, ?what guarantee can the school provide that paedophiles will not be able to break the perimeter fence and get into the site, where the kids will be sleeping unchaperoned in tents??

It was surreal, Osella writes, to sit and listen to ?reasoned and careful discussions? of a totally fantastic scenario. It would be great, she says, to embrace some insecurity and uncertainty, and to accept the absence of ?total control? over our lives.

How does surveillance get naturalised? Mark Andrejevic, author of Reality TV: The Work of Being Watched, believes that reality TV has played a part in transforming American attitudes toward surveillance. Producers of early reality programs such as MTV?s The Real World (1992) had a hard time finding people willing to have their lives taped nearly 24 hours a day for several months. Now, thousands of young people form audition lines in college towns, ?more people applying to The Real World each year than to Harvard.? New generations, Andrejevic says, are growing up viewing television shows that let anyone see the lives of others recorded voluntarily. There are other reality shows too, like COPS, where police chases of criminals is filmed. Increasingly, he says, the results of surveillance are seen as `entertainment,? as being within the realm of the public?s right to know.

The mass collection of DNA data, and ?policy? laundering

The introduction of the Serious Organised Crime and Police Act 2005 in the UK has led to anyone being arrested on ?suspicion? of committing the slightest offence. After arrest, the police remove a DNA sample, which stays on the police database, even though the person may not be charged. Increasing by 40,000 samples per month, the database has surpassed more than 3 million DNA samples, a fifth of which belong to people of African-Caribbean origin. Who owns these DNA samples? ?Once a database like this is established, the authority concerned tends to regard the information as being in its ownership, to be exchanged without reference to the subjects,? writes Potter. The British government admitted that it had passed more than 500 DNA samples (I wonder whose, Arabs? Muslims?) to foreign agencies. But when asked to which countries, ?no one seemed to know.? The chairman of the Nuffield Bioethics Committee, Sir Bob Hepple anxiously commented, ?We didn?t have any legislation to establish the DNA database and it has not been debated in parliament.?

Western governments, it seems are devising new strategies to circumvent traditional ideals of civic liberty, based on notions of freedom and privacy (mind you, not in its colonies). Dr Gus Hosein, senior fellow with Privacy International says, ?illiberal policies? are pushed through international treaty organisations. The British government brought into effect communications surveillance policies through the European Union, and ID cards through the United Nations. ?The government returns home to Parliament, holding their hands up saying ?We are obliged to act because of international obligations? and gets what they want with little debate.? It is a strategy that has led to the coinage of new words: ?policy laundering.?

Having originated in the West, these surveillance systems are gradually extending outside it, to control, regulate and limit the lives of people in non-Western countries.

First published in The New Age on 15th September 2008

Venturing Into The Impossible

” Any sufficiently advanced technology is indistinguishable from magic.”
Sir Arthur C Clarke?(16 December 1917?? 19 March 2008)
“Oh you are going to take pictures? Let me put on my sincere smile. Don’t manage it all the time.” He chuckled, as he stroked his belly. I should have been awed by a man who had propagated the idea of the geostationary satellite. Arthur C Clarke was the author of one of the most significant books on science fiction, and has inspired the names of lost dinosaurs and spacecraft. I had not been sure what to expect. But he quickly put me at ease. “I’ll protect you from Pepsi.” He said, stroking the Chihuahua that curled up on his lap. “He fought a hound.”
arthur-c-clarke-bw-2482.jpg
Sir Arthur C Clarke who died early morning on the 19th March 2008 at a hospital in Colombo, Sri Lanka, where he had lived since the 1950s. ? 2001. Shahidul Alam/Drik/Majority World
Continue reading “Venturing Into The Impossible”

Fraud Band

Subscribe to ShahidulNews


Share


Salma, a housewife in Norshingdi, receives a call from her husband, a migrant labourer in Singapore. Rural women in Bangladesh have set up small mobile phone businesses which now allow easier communication in villages.
Salma, a housewife in Norshingdi, receives a call from her husband, a migrant labourer in Singapore. Rural women in Bangladesh have set up small mobile phone businesses which now allow easier communication in villages. Norshingdi. Bangladesh ? Shahidul Alam/Drik/Majority World

She was mildly self conscious when I asked to photograph her, but a smile soon spread over her face. The telephone had connected her to her husband, a worker in Singapore. Salma, a woman in a village near Sonargaon in Bangladesh, had recently learnt to use the village mobile telephone, and it had transformed her life. Had this been where the story ended, it would have been a simple affair with a happy ending. Perhaps for Salma, it wasn’t significant that the technology that allowed her access to her husband, was one of many that allowed people in distant lands to tap her call, to add her to a database, to classify her as yet another consumer of products or a source of cheap labour for electronic sweatshops. For many others however, the wealth of new opportunities provided by globalisation, merely represents a wider net for global exploitation.

There are now many Salmas, and on the 14th August 2003, Grameen’s subscriber base reached a million. Greater than the total subscriber base of the government land lines. ISPs too pop up in many street corners, and though Internet telephony (VOIP) is illegal here, the service is openly advertised in convenience stores. In between the tangled wires on every street pole in Dhaka is the attractive advert: broadband, 24 hours, only taka 1000 per month. That’s about US $ 17. Not a bad price for broadband, until you realise that the definitions differ. The bandwidth on offer is 1K/sec, and breaks every time a storm, or a competing ISP cuts the cable, or when electricity fails (generally 2-3 times a day) at any of the relay nodes. No wonder many users call it ‘fraud band’.

The VSAT on our rooftop delivers 512K connectivity. A respectable speed, except that we expect to have 200 dialup customers, another 200 leased line clients, and maybe a few smaller ISPs running Voice over IP (VOIP) services and the ‘broadband connections’ using that bandwidth. That is the only way we can pay for the US $ 3500/month for staying connected. Plus a $ 3,500/64 KB/year license fee. An average user in the west would pay around 20 – 30 Euro for comparable access.

Even getting here hasn’t been easy. In 1994, when we setup Bangladesh’s first email service, we were using off-line email. Our server, a 286, and just one telephone line which we used for voice, fax and email, provided email connectivity to the world bank, UNICEF, major universities, and several organisations that are now ISPs. Since then the Net has been both a boon and a bane. It has been our lifeline to the rest of the world, and it has been the area where the government has attacked us the hardest. On the 27th of February 2001, we setup the country’s first human rights portal www.banglarights.net. The government promptly closed down all our telephone lines the next day. It took a lot of protests, to get the local lines back, but even now, we cannot make an international telephone call. Not using the government lines anyway. However, our VSAT on the rooftop, allows us an access that the government will not be able to stop simply by pulling a plug somewhere. Our e-newsletter reaches a carefully targeted 5000 worldwide, and a note saying the government was getting heavy would be immediately followed by a string of protests from fairly
influential organisations worldwide. So we walk a fine line, and continue to be subversive. On the other hand, the government’s lack of knowledge can be used (and abused) to find ways round the system. The import of the satellite phone by the BBC, which connects through Inmarsat, was allowed by the Bangladesh Telephone and Regulatory Council (BTRC), on condition that it not be used to make calls outside the country!

For the majority world, education offers the most effective route to take advantage of the globalisation juggernaut. And it is here, that the technological opportunities and the networking that accompanies globalisation, can be best utilized. Interestingly, the role models that seem to have worked best are those developed in the south, and it is only when the asymmetrical flow of information, which flows essentially from north to south, is replaced by south-south movement, that we will begin to turn the tide around. We started using the Net for education fairly early on, but activism and survival have really been the main driving forces behind our relationship with new media. An incidence of rape at a local university was being hushed up, and it was our presence on the Net that forced the establishment to arrange an investigation. The rapists got off with mild punishment, but it was the first time they had been challenged, and it has changed campus dynamics. It was our fragile network that allowed us to contact legal help groups and other activist organizations, when Taslima Nasreen, the feminist writer was under threat. It was the Net that kept us relevant.

The most interesting shifts have been in the area of media. With mainstream media coming under increasing restrictions, and the cost of publishing soaring, media activists have been taking to the Net to get their ideas across. A whole set of blogs, newsletters, opinion forums and activist sites have sprung up. Apart from providing an alternative space where points of view not palatable to mainstream media can be aired, these Net spaces have also become meeting grounds for the diaspora, who have until now felt excluded from the development process, and numerous archives abound providing alternative information sources.

The main struggle however remains between activists trying to make full use of a vibrant media, and a skeptical, fossilized and generally corrupt bureaucracy, that is deeply suspicious of what this media might do. It is reminiscent of the first time Bangladesh rejected the fibre optic cable that went along the Bay of Bengal, since the information minister was scared that ‘state secrets’ would be leaked out. A new rule in Bangladesh prevents CDs from being sent overseas, while the same data sent through the Net can be sent legally.

Our journalism school is trying to develop on-line learning modules, and we are hoping to start up a regional centre for investigative journalism that will rely heavily on new media for its success. There are interesting political implications too. Our latest plans for setting up a ‘public accountability site’, promises to be the most problematic for the establishment. The idea is to setup kiosks in poor neighbourhoods, which will provide information relevant to the locality that they can use to determine how public funds and other resources are being used. The government has promised such transparency, and we want to hold them to it. But when the public begins to sense how their resources are used, the trouble will start, and those who made the ministerial speeches, will be the first to shut us down. That too is a fight that we need to win, and we’ll use new media as our primary tool.
Presented at the World Summit on Information Society. Geneva. 9th December 2003