Author: Geoff Ebbs

  • Tech assumptions embed digital divide

    Tech assumptions embed digital divide

    Two contradictory technological currents combine to further disempower the already disadvantaged.

    On one hand, the assumption that people in general have a certain technical capacity (both access and skills) means that those without that capacity are left on the wrong side of the digital divide pushing them into a downward spiral that mirrors the compounding impacts of economic disadvantage.

    On the other hand, the concerns around privacy and individual control of their online profile are a luxury that only the rich can afford. If you are not securely and comfortably connected to the digital systems that underpin modern life, you do not get the right to be choosy about the manner in which your profile is built or managed.

    Excluding the technologically disadvantaged

    An example may help.

    To log into any of the major government agencies – Taxation, Medicare, My Health, NDIS, Veteran Services  as well as any of the welfare services on which millions of Australian depends – you must enter your username and password and then verify your identity by entering the code that arrives at your mobile phone. If you do not have a mobile phone you are advised that you cannot use the online services and you must go to an office of the relevant service.

    Thus, the elderly, the digitally illiterate, those with a physical or mental characteristic that causes them to struggle with a smart phone are forced to physically attend offices while the rest of us blithely manage our health records or report our taxation figures online. In many cases, those offices present another range of barriers. At the Centrelink office, for example, you are encouraged to reduce the load on staff by using the computers at the side of the office to access your claim online.

    So far, this example defines the relatively straightforward argument that we increasingly rely on services that demand a technological capacity that is not universally available. It is easy to understand that people with limited, flawed or no access to digital technology are at a disadvantage when it comes to engaging with certain aspects of modern life. While the scale of this disadvantage is not widely understood – partly because of its compound nature – the concept it easy to grasp.

    Profiling them regardless

    The second force at work, though, is more subtle. The privacy implications of digital technology are far reaching and complex. Consider the case of a person completely refusing to engage in the digital world, thereby maintaining their privacy by maintaining what is known in the business as an “air gap”.

    Refusing to participate in the digital world certainly ensures complete protection from direct access to your activity, it does not guarantee that you do not have a digital footprint and it certainly does not allow you to manage or shape your digital profile.

    Take the example of an elderly person who has no mobile phone or debit card.

    Even though they do not participate in social media, for example, they still have a digital profile compiled from references to them made by their friends and relatives. Similarly, face recognition software that draws on databases of passport and license photos does not require their online engagement to store the photograph from their passport or driver’s license.

    The My Health record is a recent and controversial example of an online database that requires every citizen to engage, even if it simply to state that you wish to disengage.

    So, the complete refusal to engage is the simplest example of disengagement and it still involves complex ethical and practical considerations. If we consider those people who use debit cards for banking and mobile telephones to make calls and send text messages but otherwise resist engagement in the more advanced digital platforms the complexities multiply significantly.

    The implications

    Once we start to examine how much control someone has over the digital profile that they willingly create but wish to manage, the issues become so complex that we struggle to find the boundaries.

    Consider a woman fleeing domestic violence, applying for help from the government to support her in a safe refuge form her violent partner.

    The first thing that any domestic violence support organisation will do is remove the SIM card from her phone, cut it in half, smash the mobile phone to pieces and deposit the lot in a bin. The mobile phone is the most common mechanism whereby perpetrators of domestic violence track down their victims. The days following the departure from the scene of domestic violence represent the greatest danger to victims of violence. More women are killed attempting to flee domestic violence than enduring it, this is one of the major challenges for agencies attempting to support women who face violence in a relationship.

    Now, because government departments insist that citizens have a mobile phone to gain online access to their own records, the next thing the agency has to do is to assist the woman to set up new telephone and email account so that she can start applying to government agencies for assistance.

    And so now the complexities begin. Existing email addresses and telephone numbers are often the very tools used by these agencies to verify the identity of an applicant. If they have just smashed their phone into small pieces this may represent a significant challenge.

    Even without exploring the legal requirements regarding consent of a spouse before some details can be accessed and changed, or a partner can be excluded, the situation is riddled with the anomaly we commonly call a Catch 22. You cannot log into your record without the mobile phone that you wish to report as no longer available. Changing these details at the offices of various agencies may be the only means possible. That relies on having original documents that may well be in the filing cabinet in the family home where an angry spouse sits armed and waiting for the opportunity to punish the person fleeing the control and abuse to which they have been subject for years.

    Without getting into the tangled web that faces every victim of domestic violence it is apparent that anyone outside what is considered the standard digital capacity of the modern citizen faces the traps and pitfalls of those systems once the cracks open up because one piece of the puzzle is missing.

    The My Health record is a recent example of a controversial system that we are assured is perfectly easy to control, simply by logging in and specifying how we want it managed. The assumption, again, is that we all have access to our record online.

    Does it matter?

    To test how dependent you are on your online connection, try leaving your phone at home and going through a normal day. Turn off your domestic wifi and see how well you can meet the demands of your family. Watch the people landing at an international airport. They will queue for half an hour to get access to WiFi so they can reconnect to the services that locate and verify them.

    Reflect on the news stories that emerge when the power is off for more than 24 hours across large sections of a community. The water runs out, fuel pumps stop working, food rots in refrigerators that no longer remain cold, cold, hungry desperate people take advantage of the darkened streets to help themselves to what they need.

    We live in a highly integrated and fragile world that relies on all its constituent parts functioning correctly to maintain the lifestyle to which we have become accustomed. Those people who do not have access to all those components work twice as hard to maintain a base level of engagement. The exclusion of these people from our online activity is a major disempowerment and disadvantage for a whole class of people that is largely invisible to those of us who never experience it.

    It is the assertion of this article that we need to address this imbalance by supporting the digitally challenged as an integral part of our social safety net.

    It is a topic of further exploration that their inability to engage removes any degree of control over how they occupy that digital world. The irony of that situation that may seem abstract and of little interest but it actually identifies a major challenge. The digital representation of ourselves now occupies an important place in the global systems by which we define ourselves that is rapidly becoming more significant than the physical self. We have already forgotten that not so long ago, the physical self completely defined us.

    But that is a consideration for another article.

  • Trump’s trade tweet leaves out the big one – the Petro-Yuan

    Trump’s trade tweet leaves out the big one – the Petro-Yuan

    Although apparently random and etiquette busting, Trump’s tweets are carefully calculated to evoke particular responses. One message that is notably absent from all the bluster about Chinese trade is any discussion of China trading oil in Yuan. While the mainstream press argues that this is because it does not matter, a long term reading of the background indicates that it might.

    The power of the dollar in propping up the US empire has been a recurrent story on The Generator since its inception in 2005. From Robert Newman’s History of Oil in 2005 to last month’s Petro-Yuan article in Modern Diplomacy the Generator has reported regularly on the US tendency to intervene militarily whenever the hegemony of the US dollar is threatened.

    For over a year, a range of alternative press has been speculating on the US reaction of the Chinese announcement of its intention to trade oil in Yuan  but it is rare for the mainstream press to include this in its discussion of the basis of the US trade war. It is completely absent from Trump’s tweets.

    The mainstream press insists that this is mere fantasy. In April, shortly after China began trading oil in Yuan, Forbes ran a long article titled Why the Petro-Dollar is a myth and the Petro-Yuan mere fantasy that thoroughly debunks the notion of oil trading being the basis of US dollar hegemony and, by implication, the notion of a Petro-Yuan being a threat to a non-existent Petro-Dollar. The debunking relies on the argument that the US dollar is the preferred currency because of the US pre-eminence as a trading nation and the world’s largest economy,

    It is not only the conspiracy theorists and the alternative media pointing out that these two pillars of US global dominance may not be reliable in the long term. The trade war between China and the US is news precisely because China is threatening to topple the US from the top perch and the repercussions will be many and various. Who knows, some of those tired old conspiracy theories might even turn out to be relevant.

  • Oils were Oils in ’84 – PREVIEW

    Oils were Oils in ’84 – PREVIEW

    Peter Garrett 1984
    Senate candidate for NDP taking some time off – 1984

    Midnight Oil 2018 concerts sold out around Australia within hours of going on sale. The band’s mix of pub surf punk activist rock still resonates. “The music was just <kiss>,” notes a twenty year old, seeing the band for the first time on film at a premier of Midnight Oil 1984.

    Ray Argall has taken six years of footage from 1982 – 1986 with acres of concert footage from the surrounding years to tell the tale of a band that is still being made. Some of that was shot by himself (for the band), the soundtrack made by JJJ of the Hordern Pavillion Concerts in 1985 form the basis of the music audio, news broadcasts and images of newspapers complete the visual description of the activist phenomenon that was Midnight Oil and Peter Garrett, separately and together.

    The band is tight. So tight. The transition from rehearsal to stage is a testament to that discipline.

    The larrikin humour and sheer audacity of the Australian spirit is retold in so many incidents. “Pete would tell them to behave and mostly they would,” reminisces manager Gary Morris, “When they didn’t he’d send me in. Knee high to a grasshopper, I’d dive into the crowd and head for the trouble and tell them, politely, we’d negotiate, to calm down. It wasn’t aggression. It was passion.”

    Peter Garrett 1984
    Red Sails Tour – mid Senate campaign for NDP

    For me, the images that haunt are Garrett after days on the campaign trail for the Nuclear Disarmament Party, giving everything on stage in
    the Red Sails tour. A skull with veins, the sweat pouring off him faster than the vascular system can keep up. He collapses on the stage, drinks water, leaps up and sings.

    Elvis at the Edge of Reality takes one where the title suggests, Garrett takes us, the audience, and the band, across the Styx, back, up to Olympus and into the mud. Teenagers dance with him, again and again, across songs, concerts, continents. One 16 year old sings two verses and a chorus before Garrett gently and firmly places him back in the crowd. Najinski of the Australian Pub.

    “There’s not many people who can put themselves out there like that as a dick-head on stage, observes drummer and den father, Rob Hirst, “I mean, that’s not dancing. I watched it for 26 years. Kids stared at him, like just stared and watched. He’s not dancing! He’s fully expressing emotion … but he’s totally in control.”

    That intense nexus of the politician and the performer is the climax of the film. The band operates at the extreme limits of its capacity: it is a well oiled machine, but it’s not sure where it is going. The ultimate outcome of Garrett’s ambition is dealt with in a couple of vignettes. He has retired and the band is reforming while the film is being finalised. This is a timely document.

    Vox Pop?

    Most common comment at the preview? “I was there.”

    “It feels like a concert film,” noted one film lecturer and fan. “But it adds social documentary.”

    “In 1984 I was in High School, in East Germany. I knew the Oils. That’s how I knew Australia before I came here.”

    My take?

    Garrett is the star of the Oils, the central focus of the film but not the star of the show. The Oils is a living, breathing organism, the creation of the human imagination that transcends analysis. The music is the body of work and the history of the creation of that music is an important document. It’s fun to watch, too.

    Thanks Ray Argall

  • Decentralized Applications: Harnessing Bitcoin’s Blockchain Technology

    Decentralized Applications: Harnessing Bitcoin’s Blockchain Technology

    Author: Siraj Raval

    ISBN: 978-1491924549

    Publisher: O’Reilly – Safari Books

    Published: August 2016

    Price: Kindle $US20, Paperback $19.95

    Raval writes for application developers interested in the capacity of the blockchain to underpin distributed applications. He provides excellent explanations of the evolution of the technology and its implication in terms of how applications operate and the impact those modes of operation have on various business models.

    He maps out the various BitCoin technologies and components of the BitCoin ecosystem and discusses the political beliefs that underpin preferences for certain approaches. This is valuable for strategic planners in corporations, government as well as academics researching the area.

    He discusses separately the decentralisation of various aspects of technology such as bandwidth, asset registration and processing capacity and then pulls all that together with a discussion of the practical implications of that.

    Thus a serious foundation for the principles underpinning distributed application is built up before he touches the topic of specific platforms or presents a line of pseudo code.

    By Chapter 3 he has the reader building their first dApp and then moves in Chapter 4 to exploring the operation of the first distributed marketplace, the Open Bazaar.

    By interweaving practical technical development with real world considerations he provides a path to market that will suit most hands on developers.

    From there on he introduces one technology after another, outlining its operation, implications, installation and manipulation.

    This is a hands on book for real world developers who want to get immersed in the capabilities of distributed applications, quickly.

    It is beautifully produced with code blocks, examples and illustrations all carefully laid out and presented to maximum effect.

    At 18 months old, some of the technologies have moved on a version or two, but the rapid immersion approach ensures that you can follow Raval into a topic and then quickly catch up with the latest developments.

    O’Reilly is selling it as a contemporary work, at $US20 for the Kindle version and $US19.50 for the paperback it is clearly aimed at meeting the current needs of active programmers. With the rapid move from concept to hands-on implementation, this is not a book for planners or strategists, though if you find a copy in the lunch room, you will enjoy the introductions to any of the topics that interest you.

    You can buy the book directly by clicking the picture of the cover above.

  • Mastering BitCoin: Programming the Open Blockchain

    Mastering BitCoin: Programming the Open Blockchain

    Author: Andreas M. Antonopolous

    ISBN: 978-1491954386

    Publisher: O’Reilly – Safari Books

    Published: June 2017

    The second edition of this text is aimed directly at software developers and programmers but many technically savvy readers who are not coders report that it helped them understand the technology much better than any of the more general introductions.

    It deals in detail with the requirements of coding distributed apps and software to take advantage of the blockchain. To achieve this, it describes in detail how each of the components work before delving into the code itself.

    While the background and the introduction to each concept is general, the examples are all in Python and C++. Most programmers will find that the examples are translatable to the code of their choice but If that represents a serious challenge, you may need to look elsewhere.

    The book evolved from a published set of documents on GitHub and the many participants who contributed to the evolution of the text are acknowledged up front. As with all collaborative projects the maturity that comes with the robust use, testing and feedback shows in the quality of the examples and the depth of the discussion around challenges and reasons for things being developed in particular ways.

    There is nothing shrill or hyped about this text, it is considered, well reviewed and recently updated.

    At $US11.95 for the Kindle edition and $US21.53 for the paperback this is a full-priced text, but it represents real value for money. I thoroughly recommend it as a solid technical overview and a good guide for developers and programmers serious about considering a move into distributed application development.

  • Blockchain: Blueprint for a New Economy

    Blockchain: Blueprint for a New Economy

    Author: Melanie Swan

    ISBN: 9781491920497

    Publisher: O’Reilly – Safari Books

    Published: February 2015

    O’Reilly has been publishing technical books for decades and has established a reputation for accuracy, timeliness and depth that is unparalleled in the market. BLueprint for a New Economy lives up to this reputation and covers the philosophical, economic and technical implications of the technology in great depth.

    The one limitation of the book is its age: At three years old in a fast moving are like this it is seriously in need of an update. While the underlying technology and its implications have not changed, it is frustrating to read facts and figures that an educated layperson knows are wrong peppered throughout the text. While this remains a valuable reference, I am not recommending it as an introductory text for that reason.

    If you are comfortable with your knowledge of the overall area and want to go deeper into the implications at an academic, philosophical or policy level this remains relevant and useful. Do not turn to it, however, for a current snapshot of the industry.

    At $US4.82 and $US9.54 for the ebook and paperback respectively, O’Reilly appears to be currently discounting this in preparation for a new edition. When that happens I have no hesitation recommending this as the authoritative text providing a complete overview on a range of levels.