iPhone + UAVs + Crisis Response

The year I spent at the University of California at Berkeley was one of the best times of my life. So I’m thrilled that this project, reported by Wired, was made in the Berkeley Republic. In fact, I’m not at all surprised that Cal students are behind the initiative since it completely violates the terms of the Apple Software Developer Kit agreement, “applications may not be designed or marketed for real-time route guidance; automatic or autonomous control of vehicles, aircraft, or other mechanical devices; dispatch or fleet management; or emergency or life-saving purposes.”

As the title suggests, the Berkeley project enables an individual to remotely control the flight trajectory of a UAV and to take pictures all from the iPhone interface. The video below is definitely worth watching. See my other blog here on the use of UAVs for conflict early warning and response.

Still on the subject of the iPhone is the question whether of whether or not the next generation iPhone is suitable for emergency management. Gav’s blog kicked off a conversation that continued on the Humanitarian ICT list serve where several colleagues chimed in with some of the iPhone’s advantages and disadvantages. One of the concerns echoed repeatedly stems from the issue regarding Apple’s terms of agreement. However, as the Berkeley students have demonstrated, some may get away with crossing Steve Jobs. In any case, of particular interest to me are the location-aware social networking applications being developed for the iPhone SDK such as Loopt, which lets you see whether your contacts are in the vicinity.

Patrick Philippe Meier

Dialup Radio for Communication in Conflict Zones?

I blogged about Tad Hirsch‘s TXTmob project back in April and spoke to him this week about his Dialup Radio project. The intuitive web-based interface allows anyone to upload brief radio-style audio files to make them available via phone along with the option of using different menu options. For example, one could broadcast news about electoral-related violence in difference cities and towns across Zimbabwe: “For today’s news on Bulawayo, press 1, for news on Gweru, press 2,” etc.

Dialup Radio has been designed specifically to meet the needs of human rights activists in the developing world. The system can be installed locally or may be operated across national borders. Particular attention has been paid to system security and to minimizing costs of operation

The Dialup Radio project is currently being used in Zimbabwe where independent radio stations have been outlawed. Other tactics include copying broadcasts on cassette tapes and disseminating the tapes widely among taxi and long-distance bus drivers across the country. Indeed, the best place to get accurate reporting in Zimbabwe may very well be from a taxi driver. I certainly found this to be the case while in Nairobi following the December 2007 presidential elections and the ensuing violence.

Patrick Philippe Meier

Crisis Mapping Zimbabwe

As a doctoral research fellow with the Harvard Humanitarian Initiative (HHI), Jennifer Leaning and I are pursuing applied research on crisis mapping to identify innovative approaches that can be scaled up to maximize impact. The following initiatives are two projects of potential interest.

Sokwanele follows in the footsteps of Ushahidi in providing a web-based interface to map election-related violence in Zimbabwe. The design is simple and self-explanatory. Each incident is associated with the identity of the perpetrating party, e.g., Zanu youth.

It would be particularly useful to have a time-animation functionality in order to depict any patterns in the spread of the violence as this could reveal tactics of perpetrators. A colleague and I created crisis maps for Colombia and the DRC back in July 2007 using Google Earth (KML). We added the time-bar functionality and visualized the data over time, immediately taking note of distinct patterns. The underlying conflict data was drawn from the Conflict Analysis Resource Center (CERAC) in Bogota and from the Peace Research Institute, Oslo (PRIO) respectively, both of which I have been affiliated with as a researcher. Clicking on the pictures below will provide you with a full-screen shot of the interface.

Another crisis map of Zimbabwe depicts Morgan Tsvangirai’s campaign “with information on campaign stops, detentions by police, vehicle impoundments, and references to all information from on-line news sources.” The Google Earth KML file is regularly updated.

The question that remains for me is what methods can be used to measure the impact these projects are having?

Patrick Philippe Meier

China, Olympics and Satellite Imagery

Will international attention on the Beijing Olympics impact the government’s policy on censorship? Some argue that the Olympics create a unique window of opportunity for digital activists while others maintain that Beijing’s grip on information communication is more effective than ever. The recent 2008 study, Access Denied: The Practice and Policy of Global Internet Filtering, states that “China institutes by far the most extensive filtering regime in the world, with blocking occurring at multiple levels of the network and spanning a wide range of topics.” Little surprise then that neither Chinese Google Maps nor Microsoft’s Chinese Virtual Earth include high resolution satellite imagery of China.

I was therefore amused to learn from Stefan Geens that China’s national broadcasting television (CCTV) is inadvertently providing full access to high-resolution satellite imagery of China via a website that maps the location of football stadiums for Euro 2008.

As Stefan concludes:

Once you’re zoomed in on an Austrian stadium, there is nothing keeping you from heading on over to China and zooming in on your house or keeping tabs on the People’s Army.

In other words, the Chinese state’s own broadcasting organization thinks that the state-mandated censorship of maps is useless and in need of circumventing. This example also illustrates the ease with which such circumventing can be achieved, and the long-term futility of restricting access to mapping tools from behind the Chinese firewall.

I’m waiting to hear back from a colleague based in China to find out whether the map is still fully accessible within the country.

Patrick Philippe Meier

Tracking Genocide by Remote Sensing

The Remote Sensing Project at Yale University’s Genocide Studies Program has just released a 50-page Working Paper entitled “Tracking the Genocide in Darfur: Population Displacement as Recorded by Remote Sensing.” The Project also has studies on Timor-Leste and Rwanda. The Darfur report uses satellite imagery of vegetation from 1998 through 2007 in the regions of Darfur most impacted by the genocide. The analysis shows that natural vegetation coverage is steadily recovering albeit not as a result of increased rainfall but of,

the abrupt change in land use directly related to the systematic violence committed by Sudanese government and militia forces against the peoples of Darfur. In an agriculture-based society, this vegetation rebound resulted from the loss of livestock and the inability to farm, caused by human displacement and the destruction of subsistence resources from 2003 to 2007.

The Working Paper demonstrates that a direct correlation exists between the displacement of local populations and the looting of livestock, as depicted in the rebound of vegetation coverage and vigor. To be sure, the returning vegetation is not a result of intensified agrarian activities but of depopulation.

The research also shows that,

it is possible to study the influences of climate and land use on a fragile environment using remote sensing applications. For future research into the prevention of genocide, these types of applications can be useful in understanding and quantifying the factors contributing to environmental strains that can cause violence associated with competition for diminishing resources. If preventive measures can be implemented and enforced based on an understanding of these factors, it might be possible to avoid acts of genocide.

This was in fact the underlying motivation behind my work on the Horn of Africa’s Conflict Early Warning and Response Network (CEWARN), which monitors cross-border pastoral conflict. Recognizing that tracking political, economic and social factors was insufficient for conflict early warning, I turned to the regional organization’s Climate Prediction and Applications Center (ICPAC) for GIS data on vegetation, forage and rainfall; the assumption being that environmental factors influence pastoral conflict and therefore could potentially serve as early warning indicators.

Preliminary statistical analyses of the data suggest that aggravating behavior, along with a reduction in peace initiatives and reciprocal exchanges, is associated with an escalation in pastoral conflict, particularly when coupled with an increase in vegetation that may provide cover for organized raids. We therefore recommend that conflict early warning systems integrate both response options and salient environmental indicators into their analyses to better deal with the complexity of the relationships between pastoral conflict and the environment in an era of climate change.

The results of my study were recently published in the Journal of Political Geography:

P. Meier et al. (2007). “Environmental Influences on Pastoral Conflict in the Horn of Africa,” Journal of Political Geography, 26:716-735.

One lesson to be drawn from the Yale study in terms of crisis mapping and prevention of mass atrocities is that we should redouble our efforts to pursue a more systematic and rigorous research agenda that focuses explicitly on multi-modal pattern analysis of proxy indicators.

Patrick Philippe Meier

Creating Covert Channels for VoIP

Steganography is the art of hiding messages by embedding them in ordinary communications. The word is Greek for “covered, or hidden writing”. The term can be traced back to Herodotus (in 440 BC) who mentions two particularly interesting examples (summarized on Wikipedia):

Demaratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Wax tablets were in common use then as re-usable writing surfaces, sometimes used for shorthand. Another ancient example is that of Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians.

Steganography is distinct from cryptography which obscures the meaning of a message, but it does not conceal the fact that there is a message. In today’s digital age, steganography includes concealment of one’s and zero’s within data files. An ordinary-looking image file, for example, can include embedded messages that can go unnoticed unless someone is actively looking for a code, much like invisible ink. As has been noted, the advantage of steganography over cryptography that messages do not attract attention to themselves, to messengers, or to recipients.

And now, two Polish scientists with the Institute of Telecommunications in Warsaw have just revealed that they are developing a steganographic system for VoIP networks. This may eventually be a more effective way for activists and social resistance movements to communicate and evade detection. All that we need now is the software and interface to make this communication as simple as two clicks of a mouse. Any takers? Of course, repressive regimes could also use the same tactic, and I realize this presupposes Internet connection and access, but it’s a start.

Patrick Philippe Meier

Crimson Hexagon: Early Warning 2.0?

The future of automated textual analysis is Crimson Hexagon, a patent pending text reading technology that allows users to define the questions they want to ask, and crawl the blogosphere (or any text-based source) for fast, accurate answers. The technology was created under the aegis of Harvard University Professor Gary King.

I met with the new company’s CEO this week to learn more about the group’s parsing technology and underlying statistical models. Some UN colleagues and I are particularly interested in the technology’s potential application to conflict monitoring and analysis. At present, early warning units within the UN, and other international (regional) organizations such as the OSCE, use manual labor to collect relevant information from online sources. Most units employ full-time staff for this, often meaning that 80% of an analyst’s time is actually used to collect pertinent articles and reports, leaving only 20% of the time for actual analysis, interpretation and policy recommendations. We can do better. Analysts ought to be spending 80% of their time analyzing.

Crimson Hexagon is of course not the first company to carry out automated textual analysis. Virtual Research Associates (VRA) and the EC’s Joint Research Center (JRC) have both been important players in this space. VRA developed GeoMonitor, a natural language parser that reads the headlines of Reuters and AFP news wires and codes “who did what, to who, where and when?” for each event reported by the two media companies. According to an independent review of the VRA parser by Gary King and Will Lowe (2003),

The results are sufficient to warrant a serious reconsideration of the apparent bias against using events data, and especially automatically created events data, in the study of international relations. If events data are to be used at all, there would now seem to be little contest between the machine and human coding methods. With one exception, performance is virtually identical, and that exception (the higher propensity of the machine to find “events” when none exist in news reports) is strongly counterbalanced by both the fact that these false events are not correlated with the degree of conflict of the event category, and by the overwhelming strength of the machine: the ability to code huge numbers of events extremely quickly and inexpensively.

However, as Gary King mentioned in a recent meeting I had with him this month, VRA’s approach faces some important limitations. First, the parser can only parse the headline of each newswire. Second, adding new media sources such as BBC requires significant investment in adjusting the parser. Third, the parser cannot draw on languages other than English.

The JRC has developed the European Media Monitor (EMM). Unlike VRA’s tool, EMM is based on a key-word search algorithm, i.e., it uses a search engine like Google. EMM crawls online news media for key words and places each article into a corresponding category, such as terrorism. The advantage of this approach over VRA’s is that EMM can parse thousands of different news sources, and in different languages. The JRC recently set up an “African Media Monitor” for the African Union’s Continental Early Warning System (CEWS). However, this approach nevertheless faces limitations since analysts still need to read each article to understand the nature of the terrorist event.

Google.org is also pursuing text-based parsing. This initiative stems from Larry Brilliant’s TED 2006 prize to expand the Global Public Health Information Network (GPHIN) for the purposes of prediction and prevention:

Rapid ecological and social changes are increasing the risk of emerging threats, from infectious diseases to drought and other environmental disasters. This initiative will use information and technology to empower communities to predict and prevent emerging threats before they become local, regional, or global crises.

Larry’s idea led to the new non-profit InSTEDD, but last time I spoke with the team, they were not pursuing this initiative. In any case, I wouldn’t be surprised if Google.com were to express an interest in buying out Crimson Hexagon before year’s end. Hexagon’s immediate clients are private sector companies who want to monitor in real-time their brand perception as reported in the blogosphere. The challenge?

115 million blogs, with 120,000 more added each day. As pundits proclaim the death of email, social web content is exploding. Consumers are generating their own media through blogs and comments, social network profiles and interactions, and myriad microcontent publishing tools. How do we begin to know and accurately quantify the relevant opinion that’s out there? How can we get answers to specific questions about online opinion as it relates to a particular topic?

The accuracy and reliability of Crimson Hexagon is truly astounding. Equally remarkable is the fact that the technology developed by Gary King’s group parses every word in a given text. How does the system work? Say we were interested in monitoring the Iranian blogosphere—like the Berkman Center’s recent study. If we were interested in liberal bloggers and their opinion on riots (hypothetically taking place now in Tehran), we would select 10-30 examples of pro-democratic blog entries addressing the ongoing riots. These would then be fed into the system to teach the algorithm about what to look for. A useful analogy that Gary likes to give is speech recognition.

The Crimson Hexagon parser uses a stemming approach, meaning that every word in a given text is reduced to it’s root word. For example, “rioting”, “riots”, “rioters”, etc., is reduced to riot. The technology creates a vector of stem words to characterize each blog entry so that thousands of Iranian blogs can be automatically compared. By providing the algorithm with a sample of 10 or more blogs on, say, positive perceptions of rioting in Tehran were this happening now, the technology would be able to quantify the liberal Iranian bloggers’ changing opinion on the rioting in real time by aggregating the stem vectors.

Crimson Hexagon is truly pioneering a fundamental shift in the paradigm of textual analysis. Instead of trying to find the needle in the haystack as it were, the technology seeks to characterize the hay stack with astonishing reliability such that any changes in the hay stack (amount of hay, density, structure) can be immediately picked up by the parser in real time. Furthermore, the technology can parse any language, say Farsi, just as long as the sample blogs provided are in Farsi. In addition, the system has returned highly reliable results even when using less than 10 samples, and even when the actual blog entry had less than 10 words. Finally, the parser is by no means limited to blog entries, any piece of text will do.

The potential for significantly improving conflict monitoring and analysis is, in my opinion, considerable. Imagine parsing Global Voices in real time, or Reliefweb and weekly situation reports across all field-based agencies world wide. Crimson Hexagon’s CEO immediately saw the potential during our meeting. We therefore hope to carry out a joint pilot study with colleagues of mine at the UN and the Harvard Humanitarian Initiative (HHI). Of course, like any early warning initiative, the link to early response will dictate the ultimate success or failure of this project.

Patrick Phillipe Meier

Berkman@10 Roundup of Day 1

This blog entry summarizes the first day of Harvard’s Berkman@10 conference in Boston. The blog includes talks given by Jonathan Zittrain, John Palfrey, Jimmy Wales and Yochai Benkler.

Jonathan Zittrain kicked off Berkman’s birthday party with an animated presentation of his book, The Future of the Internet, and How to Stop It. I began reading JZ’s book last week in the hopes of having finished it by today but alas it was not to be. So I will write a review on The Future of Internet in a future blog entry. In any event, JZ’s concern seems to be a re-centralization, or control, of the Internet and associated technologies like the iPhone. He is particularly peeved by Steve Jobs’ comments when he launched the iPhone:

We define everything that is on the phone … You don’t want your phone to be like a PC. The last thing you want is to have loaded three apps on your phone and then you go make a call and it doesn’t work anymore. These are more like iPods than they are like computers.

Zittrain worries that companies like Apple and Facebook will increasingly constrain the generative nature of the Internet and thereby undermine the creativity, freedom and innovation that have driven the information revolution to this day. He likens this to dark matter or energy which keeps the universe expanding at an accelerating rate. JZ is genuinely concerned that the IT ecosystem’s dark energy will cease expand the Internet as we know it today; a reversal of the “bit bang” to the “bit crunch“.

As mentioned, I have yet to finish Zittrain’s book but my preliminary thoughts are one of skepticism. My reaction is based on my recent dissertation research. I suspect that we are unlikely to see the kind of tipping point described by JZ, which I refer to as the “bit crunch” theory of the Internet. Zittrain draws on the example of hitchhiking, once a widespread mode of transportation but much less so today given fears over personal safety. At the same time, Zittrain does highlight the fact that websites dedicated to hitchhiking do exist. In my opinion, this points to a game of cyber cat-and-mouse, a dynamic whereby adaptation and evolution are likely to be the Internet’s constants, i.e., factors unlikely to change in the dark energy equation of the Internet regardless of who the players are.

Other tidbits: JZ made interesting references to the IETF, Nanog, StopBadWare.org and the origins of ITU (to deal with encryption in telegrams).

John Palfrey led a discussion on the impact of the Internet on Democracy, a topic closely related to my dissertation research. In John’s words, “The internet allows more speech from more people than ever… but states are finding more and more ways to restrict online speech and to practice surveillance.” My dissertation question is whether repressive regimes will manage to impose an information blockade on sensitive communications or whether resistance groups will ultimately prevail, and why?

John made references to Global Voices and asked Ethan Zuckerman to comment on the projects impact and continuing challenges. Ethan opined that the biggest challenge was not necessarily government censorship but rather that citizen journalism had yet to influence mainstream media in a concerted and significant way. Later on in John’s moderation of the discussion, the subject of Cuba and in particular the use of flash drives came up. Interestingly, flash drives are the ICT of choice for activists in Cuba who seek to communicate and share information with one another. As one blogger in Havana exclaimed:

Cubans have a new saint. It is a small and is called USB-flash, memory stick….Praise be this new protector and distributor of information that has come into our lives!

Several interesting points were articulated during the question and answers session:

  • There are now more Internet users in China than in the US, and the vast majority of these users actually welcome censorship.
  • The Internet is ultimately about people, not routers. If we want to change the future of the Internet, we need to change people, who will find ways to exert power in new network fashion as they learn about the world of network organizing (Ethan Zuckerman).
  • The impact of the Internet on democracy (small “d” as opposed to big “D”) is an area of study that is as important as the impact on Democracy (Beth Kolko).
  • The Kyrgyz revolution was particularly interesting vis-a-vis the use of information communication technology beyond the Internet. Indeed, mobile phone usage is particularly high, and civil society made use of this technology to protect shops and stores from being looted by marauders. In other words, ICTs were used for protection by civil society where and when the state was unable to do so (Beth Kolko).
  • The impact of computer games should not be overlooked since young people who wish to play inevitably become accosted to technology and find ways to deal with the last mile problem in order to play. This also enables them to access new sources of technology that they were not privy to heretofore (Beth Kolko).

Jimmy Wales, the founder of Wikipedia and Yochai Benkler also spoke at Bekrman@10. Both made very interest points and intriguing references. For example, Jimmy explained why consensus was more important than democratic voting. For example, if 30% of individuals who vote on an issue are then overruled by the majority vote, the tyranny of the majority is unlikely to appease potential spoilers (much like challenges in managing peace processes). So instead, Jimmy emphasizes the importances of process, i.e., continued deliberation and rewriting of Wikipedia entries until consensus is reached, by which time some engaged in the ongoing arguments will have demonstrated behavioral problems and therefore have been discredited. This reminded me of the value of Wikis emphasized by the creaters of Intellipedia, which I blogged about here.

Benkler’s comments were very much in line with his book The Wealth of Networks, so I shan’t repeat them here. Benkler did make a number of interesting references, however. For example, Porkbusters and Kaltura. The question is whether features can be designed to improve or incite more sustained cooperation. While I’m skeptical about the feasibility of such goals, I thought Jimmy made an excellent point, “make it cheaper to do something good and more expensive to do something bad.” In essence, Jimmy’s Wikipedia experiment demonstrates that people tend to cooperate far more often than traditional theories in sociology and political science would allow.

This is the stuff that Jonathan Zittrain’s dark matter is ultimately made of, which explains why I am skeptical about his tipping point thesis regarding the Internet. The human desire to communicate and be heard is innate and unlikely to lay dormant for long should JZ’s future temporarily come to pass.

Patrick Philippe Meier

Burma and the Responsibility to Empower

The military dictatorship’s blocking of foreign aid to Burma/Myanmar has drawn worldwide condemnation. For me, however, the crux of the problem is twofold: first, the tradition of external response, and second, the nature consensual intervention. It is high time we shift to people-centered disaster/conflict early warning & response.

The UN’s Global Survey of Early Warning Systems for natural disasters defines the purpose of people-centered early warning systems as follows:

To empower individuals and communities threatened by hazards to act in sufficient time and in an appropriate manner so as to reduce the possibility of personal injury, loss of life, damage to property and the environment, and loss of livelihoods.

Precisely because of cases like that of Burma, the international humanitarian community should focus more seriously on “the capacity of disaster-affected communities to ‘bounce back’ or to recover with little or no external assistance following a disaster”  (Manyena 2006). The question that most interests me is how information communication technology can increase community resilience to disasters and conflict.

Humanitarian aid and disaster response is still subject to the principle of state sovereignty. This in part continues to plague international responses to violent conflict such as the genocide in the Sudan. State-based intervention is anything but timely and efficient. This is why the humanitarian community should consider more decentralized and tactical approaches to rapid response. The field of strategic nonviolent action is specifically focused on these types of responses. The humanitarian community should take heed.

We need a far more cross-disciplinary approach to humanitarian response; one that does not divide disaster response from conflict prevention. And one that does not shy away from a more tactical and proactive approach to saving lives.

Patrick Philippe Meier

Twitter: Sending Out Voice-to-Text SOS

One of the constraints of using SMS to evade state censorship in developing countries under repressive rule is literacy—or lack thereof. TwitterFone is a new service that converts voice to text and then posts it to Twitter. While Jott and Spinvox already enable voice to text conversion for Twitter and Facebook, TwitterFone is said to be far simpler to use.

According to TechCrunch,

The service launched moments ago into private beta. To use it you need to verify your phone number and Twitter account, and TwitterFone will then give you a local phone number to call to leave messages (they support the U.S., UK and Ireland now, adding more). Then, any message you send will be transcribed, and posted to Twitter along with a link to the recording. If the message is longer than 140 characters, just the first part is transcribed, but the entire recording is still available. There is a time limit of 15 seconds on the recording. The service is partially automated via voice recognition software, and flagged words go to a human for translation.

Patrick Philippe Meier