UnNiched: Using Mobile Tech for Health Communications

Posted by AnneryanHeatwole on Nov 01, 2011

Making health initiatives more accessible through technology can help patients and doctors keep themselves better informed about health and wellness. On October 25th, The Path of the Blue Eye hosted unNiched: Scratch, Sniff and Learn, a short conference focusing on innovation in the health marketing and communications world. Fard Johnmar, one of the founders of the Path of the Blue Eye project, introduced all the speakers and explained that the event is about " really getting people together from different disciplines, so that they can learn from each other and improve health and wellness."

Seven organizations gave short presentations on their health and technology initiatives before the group broke out into smaller discussions and demonstrations. Three of the projects presented at unNiched with a mobile focus: MoTeCh, a program using mobile phones to connect community health workers and beneficiaries in Uganda; Ubiqi, a mobile tracking tool for patients with chronic disease; and InStrat, a personalized SMS health alert system. While introducing the mobile technology section of unNiched Johnmar said, "So mobile – you'll see in today's presentations and by interacting with our innovators – really means empowerment, education and finally, most important for me, behavior change."  Watch a short video featuring excerpts from the mobile UnNiched presentations below to see how the organizations are using mobile in their work, and read on for a description of each project.

FAILfaire Returns to New York on December 14th!

Posted by MarkWeingarten on Oct 28, 2011

The fourth FAILfaire, this time in New York City on December 14th, will be an evening dedicated to those tech and mobile projects that were designed to have a social impact but instead crashed, burned, and FAILED. FAILfaire NYC is presented by MobileActive.org and hosted by the U.S. Fund for UNICEF, with participation from UNICEF's Innovation Unit.

If you do not know about Failfaire, here is some background: Launched in early 2010, there have now been three FAILfaires, events designed to provide a platform for those working in online and mobile technology for social change to openly, honestly (and humorously) discuss our own failures.

As noted in the New York Times’ piece on FAILfaire, “Technology’s potential to bring about social good is widely extolled, but its failures, until now, have rarely been discussed by nonprofits who deploy it.” Well, FAILfaire is changing that, and is doing so in style. The format is informal, the discussions are rich, and the refreshments are adult and, well, refreshing.

Slate.com wrote that FailFaire “...[isn’t] about celebrating failure just for the sake of failure, but about taking lessons from each mistake and using them to create more efficient, economical, and accessible projects that could have a greater effect on a community.” We couldn’t agree more!

To join us, please RSVP here, as the event will fill up quickly.

If you like to be considered as a presenter for the next FAILfaire, go to failfaire.org and submit a note about your failed project and what we can learn from it.

The Mobile Minute: Mobile Subscriptions in India, Social Networking via Mobile, and Nokia's Sales Report

Posted by AnneryanHeatwole on Oct 27, 2011

Today's Mobile Minute brings you coverage on India's mobile growth, smartphones in Asia, the relationship between social media and mobile phones in America, Nokia's global sales report, and the rise of open data projects in the United Kingdom.

  • Reuters reports that mobile subscriptions in India are on the rise; in August alone mobile phone operators added 7.34 million new subscribers, bringing the country's total number of mobile subscriptions to 865.71 million. However, now that roughly 70% of the country's population has a mobile phone, the number of new subscribers is rising more slowly than last year as the market becomes more saturated.
  • The mobile and smartphone market in the Asia-Pacific region is growing rapidly, and Cellular News has the breakdown of current and projected sales: "The smartphone market is [...] expected to have healthy growth, with 24% share in total handset shipments in 2011, up from 17% in 2010. Smartphone shipments in Asia will see a significant growth of 56% in 2011, which indicates the growing demand for smartphones in emerging Asian markets. Smartphone shipments in Asian markets will see a boost for Android-based smartphones, with market share increasing to 52% in 2011, up from 16% in 2010. As a result, the combined market share of Samsung and HTC, the leading Android-based smartphone makers in Asia, will swell from 11% in 2010 to 24% in 2011."

Impact of a mHealth Intervention for Peer Health Workers on AIDS Care in Rural Uganda: A Mixed Methods Evaluation of a Cluster-Randomized Trial

Posted by larrywillchang on Oct 26, 2011
Impact of a mHealth Intervention for Peer Health Workers on AIDS Care in Rural Uganda: A Mixed Methods Evaluation of a Cluster-Randomized Trial data sheet 1349 Views
Author: 
Larry W. Chang, Joseph Kagaayi, Hannah Arem, Gertrude Nakigozi, Victor Ssempijja, David Serwadda, Thomas C. Quinn, Ronald H. Gray, Robert C. Bollinger, Steven J. Reynolds
Publication Date: 
Oct 2011
Publication Type: 
Journal article
Abstract: 

Mobile phone access in low and middle-income countries is rapidly expanding and offers an opportunity to leverage limited human resources for health. We conducted a mixed methods evaluation of a cluster-randomized trial exploratory substudy on the impact of a mHealth (mobile phone) support intervention used by community-based peer health workers (PHW) on AIDS care in rural Uganda. 29 PHWs at 10 clinics were randomized by clinic to receive the intervention or not. PHWs used phones to call and text higher level providers with patient-specific clinical information. 970 patients cared for by the PHWs were followed over a 26 month period. No significant differences were found in patients’ risk of virologic failure. Qualitative analyses found improvements in patient care and logistics and broad support for the mHealth intervention among patients, clinic staff, and PHWs. Key challenges identified included variable patient phone access, privacy concerns, and phone maintenance. 


Mobile Phone-based Infectious Disease Surveillance System, Sri Lanka

Posted by EKStallings on Oct 26, 2011
Mobile Phone-based Infectious Disease Surveillance System, Sri Lanka data sheet 1021 Views
Author: 
Robertson, Colin, Kate Sawford, Samson L.A. Daniel, Trisalyn A. Nelson, Craig Stephen
Publication Date: 
Oct 2010
Publication Type: 
Report/White paper
Abstract: 

Because many infectious diseases are emerging in animals in low-income and middle-income countries, surveillance of animal health in these areas may be needed for forecasting disease risks to humans.


We present an overview of a mobile phone–based frontline surveillance system developed and implemented in Sri Lanka. Field veterinarians reported animal health information by using mobile phones. Submissions increased steadily over 9 months, with ≈4,000 interactions between field veterinarians and reports on the animal population received by the system.


Development of human resources and increased communication between local stakeholders (groups and persons whose actions are affected by emerging infectious diseases and animal health) were instrumental for successful implementation.


The primary lesson learned was that mobile phone–based surveillance of animal populations is acceptable and feasible in lower-resource settings. However, any system implementation plan must consider the time needed to garner support for novel surveillance methods among users and stakeholders.

Featured?: 
No

Video-mediated farmer-to-farmer learning for sustainable agriculture

Posted by EKStallings on Oct 26, 2011
Video-mediated farmer-to-farmer learning for sustainable agriculture data sheet 1404 Views
Author: 
Van Mele, Paul
Publication Date: 
Oct 2011
Publication Type: 
Report/White paper
Abstract: 

From June to September 2011, Agro-Insight conducted a scoping study for SDC, GFRAS and SAI Platform on the production, dissemination and use of farmer training videos in developing countries, with a focus on sustainable agriculture. Literature was consulted, the internet screened, experts and users consulted and a global on-line survey launched in English, French and Spanish.

There is a general consensus that farmers need good agricultural training videos, but they do not browse the web in search of them. For watching videos they rely mainly on outside agencies. Only about 20% of all respondents have never used video to train farmers and have never searched the web for agricultural videos. Many of those didn’t know where to look for videos, hadn’t found videos on the right subject or hadn’t found videos in their local language.

Mobile is one of the technologies discussed, but not the only. The study cites some mobile-based programs and notes current limitations to mobile video for farmers.

Featured?: 
No

Upgrading development: Can technology alleviate poverty?

Posted by EKStallings on Oct 26, 2011
Upgrading development: Can technology alleviate poverty? data sheet 1172 Views
Author: 
Stuart, Emma Jackson
Publication Date: 
Sep 2011
Publication Type: 
Report/White paper
Abstract: 

This report tackles ICT4D under three key headings: information, communication and participation. While not ignoring negatives, the report primarily explores, through the lens of Cambridge activities in ICT4D, the positive impacts and ongoing challenges of ICT4D: its ability to provide access to valuable information, to create meaningful two-way dialogues, to reach remote and excluded communities, and to empower the excluded to participate in their own development and societies.



There are still significant barriers preventing people in the Global South from accessing ICTs. But with the ongoing, rapid growth in mobile phone use and network connectivity across the world, the parameters are changing. We need to keep adapting to this environment in order to succeed. We must also ensure that the poorest and most disadvantaged are not left behind.



We have also seen challenges and progress that still need to be made in harnessing ICTs to achieve positive and lasting development outcomes. Technology can only ever be one ingredient in this process, but it can be a potent one. A key strength of ICT4D lies in the potential for participation, especially as technologies become more and more interactive.

Featured?: 
No

Connected Agriculture: The role of mobile in driving efficiency and sustainability in the food and agriculture value chain

Posted by EKStallings on Oct 25, 2011
Connected Agriculture: The role of mobile in driving efficiency and sustainability in the food and agriculture value chain data sheet 1389 Views
Author: 
Kirk, Matthew, Julie Steele, Christèle Delbé, Laura Crow, Steven Yurisich, Barry Nee, Gareth Weir, Kathryn Brownlie, Oliver Grange
Publication Date: 
Oct 2011
Publication Type: 
Report/White paper
Abstract: 

This report focuses on the opportunity to improve agricultural productivity using mobile services, highlighting the opportunity to bring new investment to a key group: smallholder farmers. Mobile telephony could have significant potential to help the poorest farmers towards greater food and income security.


Only in recent years that mobile communications technology has been widely accepted as an enabler of sustainable growth. In developing markets, where the deployment of mobile telecommunications networks has surpassed traditional fixed-line technology, the mobile telecoms industry is well-placed as an enabler of higher performance in the value chain. There is a distinct need for market-led opportunities, and the opportunity for mobile operators to deliver these is significant.


The mobile services studied here enable companies to access and interact directly with different participants in the value chain, helping to build visibility of issues, capacity and quality. They will support company sustainability objectives, and in particular, progress towards the UN Millennium Development Goals by helping to reduce poverty, improve health and increase funding for education.


This report aims to stimulate the necessary engagement between mobile operators, governments, NGOs and businesses to realize these opportunities and explore others.

Featured?: 
No

Ensuring the Security and Privacy of Information in Mobile Health-Care Communication Systems

Posted by EKStallings on Oct 25, 2011
Ensuring the Security and Privacy of Information in Mobile Health-Care Communication Systems data sheet 1560 Views
Author: 
Adesina, Ademola O., Kehinde K. Agbele, Ronald Februarie, Ademola P. Abidoye, Henry O. Nyongesa
Publication Date: 
Jan 2011
Publication Type: 
Journal article
Abstract: 

The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel.



Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hospital. With the implementation of electronic patient records and the Internet and Intranets, medical information sharing amongst relevant health-care providers was made possible. But the vital issue in this method of information sharing is security: the patient’s privacy, as well as the confidentiality and integrity of the health-care information system, should not be compromised.



We examine various ways of ensuring the security and privacy of a patient’s electronic medical information in order to ensure the integrity and confidentiality of the information. The paper discusses modes of encryption, database security, the transformation from eHealth to mHealth, and the theoretical background for privacy and data protection. 

Featured?: 
No

Tech in Election Monitoring: Fighting Fraud and Corruption, one Picture at a Time

Posted by AnneryanHeatwole on Oct 25, 2011

Following this weekend's Tunisian elections, the world is looking to the Middle East to see how new democracies are born. But in many countries with emerging democracies, fraud and corruption can taint the credibility of elections, and the public's trust in the fairness and validity of election results. We have long argued that technology - mobile technology in particular - can play a key role in helping to ensure fair and accurate voting processes and results. However, data has been missing to make that point more definitively. 

In areas where much of the voting process isn't digitized, using technology can help mitigate vote tampering and incorrect results. Additionally, SMS reports of vote tabulation from polling stations by trained election observers can be an effective way of limiting voting fraud and corruption, and has been used in different elections around the world. In Lebanon's 2009 elections, roughly 2500 volunteer citizen observers reported from a statistically significant number of polling station incidence reports throughout election day. In Nigeria, 2011 Project Swift Count deployed 8000 trained election observers across the country to report on the elections, including election results from polling stations directly, using SMS.

Tech in Election Monitoring: Fighting Fraud and Corruption, one Picture at a Time data sheet 3489 Views
Countries: Afghanistan

Institutional Corruption and Election Fraud: Evidence from a Field Experiment in Afghanistan

Posted by ccarlon on Oct 24, 2011
Institutional Corruption and Election Fraud: Evidence from a Field Experiment in Afghanistan data sheet 2034 Views
Author: 
Callen, Michael and James D. Long
Abstract: 

Elections in developing countries commonly fail to deliver accountability because of manipulation, often involving collusion between corrupt election officials and political candidates. We report the results of an experimental evaluation of Quick Count Photo Capture|a monitoring technology designed to detect the illegal sale of votes by corrupt election officials to candidates carried out in 471 polling centers across Afghanistan during the 2010 parliamentary elections. The intervention reduced vote counts by 25% for the candidate most likely to be buying votes and reduced the stealing of election materials by about 60%.

 

Additionally, we investigate the role of corrupt institutions in facilitating election fraud by combining: (i) separate fraud measurements at three important stages of the election; (ii) rich data on the political connections of key parliamentary candidates; (iii) precise geographic coordinates of polling centers; and (iv) experimental variation from our evaluation. Interestingly, strong political candidates react to the intervention by substituting fraud spatially and weak candidates react by substituting temporally. We explain these results in the context of a theory of corrupt vote transactions in which the capacity of candidates to protect corrupt offcials from prosecution determines equilibrium levels of spatial and temporal substitution


Global Mapping of Technology for Transparency and Accountability

Posted by ccarlon on Oct 21, 2011
Global Mapping of Technology for Transparency and Accountability data sheet 2019 Views
Author: 
Avila, Renata, Hazel Feigenblatt, Rebekah Heacock, and Nathaniel Heller
Publication Date: 
Jan 2010
Publication Type: 
Report/White paper
Abstract: 

As internet and mobile phone use increases, technology is transforming the field of transparency and accountability making it an increasingly dynamic space across the globe. Technology is helping to improve citizen participation in decision-making and producing new ways of identifying public service challenges through processes such as ‘data mashing’.

This paper documents current trends in the way technology is being used to promote transparency in different parts of the world. It reviews over 100 projects from across Africa, Asia, Europe and Latin America, examining how new technologies are re-energising traditional methods. In particular, it focuses on how these new technologies are helping to engage different actors from citizens, media, authorities and the private sector.

Our research finds promising success stories alongside less accomplished examples. The authors argue that a key element of successful technology use in transparency and accountability efforts is their speed – both in execution and in stimulating change. Well-designed efforts produced relevant and usable information that can be used to demand accountability quickly. Technology for transparency and accountability tools need not be sophisticated, but it does need intelligent design that is relevant to the local context. Projects also have a better chance of effectively producing change when they take a collaborative approach, sometimes involving government.


Swing Over to the Mobile Media Toolkit

Posted by MelissaUlbricht on Oct 21, 2011

The Mobile Media Toolkit is a new resource site with lots of content about how mobile tech can be used for reporting, news broadcasting, and citizen media.

The Toolkit content is available in English, Spanish, Arabic, and we are translating into Russian as well. We've been adding lots of helpful new content since our launch a few months ago. Here is a sampling: 

NEW How-To Guides:  The latest is on how to use Bambuzer to live stream content and engage with audiences. Michelle Li of WECT tells us how her newsroom uses Bambuser to share live video and engage with viewers. (And lets us in on what news anchors talk about, off-camera.) Check out the complete guide here.

NEW Case studies, for instance on how to use SMS and radio to engage with listeners in Uganda. No Internet? No problem. Using a new tool called TRAC FM, stations are able to poll listeners via SMS and share the results over the radio. Read the full case study here.

TIPS for the Mobile Journalist, (aka MoJo) such as this video on how to shoot and transfer content from a mobile phone to a tablet using basic hardware and software. For more, check out the Toolkit section on Creating Content (and getting it off) your mobile phone.

Information Economy Report 2011: ICTs as an Enabler for Private Sector Development

Posted by ccarlon on Oct 21, 2011
Information Economy Report 2011: ICTs as an Enabler for Private Sector Development data sheet 1543 Views
Author: 
Fredriksson, Torbjörn, Cécile Barayre, Scarlett Fondeur Gil, Diana Korka, Rémi Lang, Thao Nguyen, Marta Pérez Cusó and Smita Barbattini.
Publication Date: 
Oct 2011
Publication Type: 
Report/White paper
Abstract: 

The Information Economy Report 2011 demonstrates that effective use of information and communication technologies (ICTs) in both the private and the public sector can significantly contribute to and accelerate progress in private sector development (PSD).

Governments and their development partners should take a holistic and comprehensive approach to leveraging ICTs in PSD, although a review of PSD strategies indicates that this is often not the practice. Similarly, donor strategies often refer to the use of ICTs in PSD in a peripheral manner only, if at all. On its own, new technology will have limited effects on PSD. However, when carefully integrated into policies and processes, ICTs can reduce business costs, promote transparent, rules-based systems, and improve communication between the public and private sector.

Governments need to work with the private sector to create an investment climate and a business environment that encourage the use of ICTs within private firms as well as in government. The potential of ICTs can then be realized, through adequate infrastructure and skills, and a commitment by governments to making markets work effectively. In some areas, there is already considerable experience and evidence to guide policy initiatives. In other areas, where opportunities for ICTs to contribute to PSD have emerged only in the past few years (as in the case of mobile money services), more analysis and testing of different business models is needed to assess potential and identify best practices.


Scaling Up Without Falling Short: Leveraging Mobile Tech for the Base of the Pyramid

Posted by EKStallings on Oct 19, 2011

Despite possibilities of scaling projects with technology, many technology-based initiatives in social and economic development have failed to make it past early pilot stages or grow to scale. This study by Hystra, in collaboration with Ashoka and TNO, examines what successful ventures within four sectors can teach us about models for scaling Information and Communications Technology (ICT) -based applications and projects aimed at reaching bottom-of-the-pyramid customers (referred to as Base of the Pyramid in the report). The researchers focused specifically on these sectors: education, health, agricultural services, and financial services.

What Did the Study Review?

Initially considering 280 projects as promising models, researchers found that over half were not worth researching because projects lacked sustainability or replicatibility. Many of the projects were dead pilot projects or were small with no sign of the possibility or intent of scaling in size or reach.

From there, researchers homed in on 16 groundbreaking cases. These projects had reached scale (defined as having 10,000 clients or more) or had the potential to do so. All projects were assessed against three criteria: Is the solution solving the (specified) problem? Is the project economically viable? Is the project scalable and replicable? The researchers grouped projects into specific clusters based on business model type. All projects researched were value-added or market-based, because of the researchers’ belief that such models increase project sustainability and client investment in the project.

The models that the researchers looked at varied. For instance, researchers asked whether end-users accessed the technology themselves as opposed to being delivered trough an intermediary.

Leveraging Information and Communication Technology for the Base of the Pyramid

Posted by EKStallings on Oct 14, 2011
Leveraging Information and Communication Technology for the Base of the Pyramid data sheet 1791 Views
Author: 
Carvalho, Alexandre de, Lucie Klarsfeld, Francois Lepicard
Publication Date: 
Sep 2011
Publication Type: 
Report/White paper
Abstract: 

This document presents the conclusions of the study “Leveraging ICT for the BoP” sponsored by AFD-Proparco, Ericsson, ICCO, France Telecom-Orange, and TNO and conducted by Hystra and Ashoka from October 2010 to June 2011.



This study aimed to learn from “what works” in terms of full projects (as opposed to technologies) combining both an economically viable model and socio-economic impacts on their end-users, in the field of ICT for development (ICT4D). This work is thus based on the screening of existing projects led by various types of actors (social entrepreneurs, NGOs, private companies…), in 4 sectors of “development” where ICT has already shown it could play a key role: healthcare, education, agriculture, and financial services. 15 of the most ground breaking market-based business models, with a proven scale and results on the ground showing that ICT can be a lever improving the living standards of the BoP, are analysed in depth in the report to support the main conclusions.

 

Featured?: 
No

Gibberbot

Posted by ccarlon on Oct 14, 2011
Gibberbot data sheet 1919 Views
Organization that developed the Tool: 
Main Contact: 
info@guardianproject
Problem or Need: 

Gibberbot is designed for people who need to chat securely. If you and the person you are communicating with are both able to use it, secure chat can be used as a replacement for email and text messaging.

Gibberbot should work on any Android phone. It’s probably best for users who are reasonably comfortable chatting and handling their phone, and it’s only currently available in English.

Main Contact Email : 
Brief Description: 

Gibberbot is an instant messaging app for Android phones, developed by The Guardian Project. Gibberbot implements off-the-record messaging (OTR). Off-the-record messaging is a way to conduct an instant messaging conversation with the following attributes

  • Encryption. An eavesdropper cannot read your messages
  • Authentication. You can verify the identity of the person you’re chatting to - or at least of the account they are using.
  • Deniability. It is not possible for a third party to prove that a particular user sent or received a particular message.
  • Perfect forward secrecy. It is not possible for an attacker to decrypt a previous conversation, even if he/she obtains the encryption keys used to encrypt it.

Gibberbot can also use Orbot to route your chats over the Tor network. This prevents an observer from following the source and destination of your messages (effectively, from knowing you are chatting) and provides a way to circumvent web censorship that may involve chat servers being blocked.

Off-the-record messaging only works when both parties in the conversation are using it. This means both parties need to use Gibberbot, another mobile app, or chat software that supports it. Currently Gibberbot is the only option we know of for mobile phones. Off-the-record plugins are available for several PC chat programs, including Pidgin (Windows and Linux), Adium (Mac), Trillian (Windows) and Miranda (Windows).

Tool Category: 
App resides and runs on a mobile phone
App resides and runs on a server
Key Features : 
  • When used with Orbot, Gibberbot combines the security, privacy and anonymity provisions of off-the-record messaging with the additional anonymous browsing and circumvention protection of the Tor network.
  • Gibberbot is currently the only implementation of off-the-record messaging for mobile phones that we are aware of.
  • The code for Gibberbot is open source and freely available for download - there are no costs involved except your airtime while chatting.
  • The project encourages user feedback through a mailing list, feedback form on their website, twitter account and IRC channel.
Main Services: 
Other
Tool Maturity: 
Currently deployed
Platforms: 
Android
Program/Code Language: 
Java/Android
Is the Tool's Code Available?: 
Yes
Is an API available to interface with your tool?: 
Yes
Global Regions: 

Gibberbot Locations

You need to upgrade your Flash Player
Featured?: 
No

SaferMobile: Mobile Email Security, Data Protection, and Anonymous Browsing Guides

Posted by ccarlon on Oct 14, 2011

For many, mobile devices are an indispensable tool for storing and sharing increasingly sensitive information. Contacts, emails, and mobile browsing history can easily be compromised without taking the proper measures to ensure that that information is safely in the right hands... and out of the wrong ones. Newly added to our mDirectory are the following how-to guides on securing mobile email, mobile anonymity, backups, and data deletion from our SaferMobile team: 

  • Securing Your Mobile Email - This guide catalogs the different tactics you can take to keep mobile email safe. It covers email security basics, TLS/SSL enabling, and email encryption. The guide also provides customized tactics and suggestions for Android, Blackberry, iPhone, and Nokia/Symbian phones.
  • Mobile Tools for Backups, Data Deletion and Remote Wipe - Anyone who has ever had their phone stolen knows how frustrating and potentially dangerous that can be. Here we have a comprehensive review of some of the tools out there for data backup and restore, data deletion, and remote wipe.

For all other materials produced by the SaferMobile team, check out this complete list (and watch for a new SaferMobile site soon!)

Mobile Tools for Backups, Data Deletion and Remote Wipe

Posted by MelissaLoudon on Oct 14, 2011
Mobile Tools for Backups, Data Deletion and Remote Wipe data sheet 4210 Views
Author: 
SaferMobile
Abstract: 

Anyone who has had a phone stolen knows the frustration of trying to rebuild your contact list, not to mention data on the phone that is unrecoverable. Worse, the data stored on your phone can be dangerous in the wrong hands. In addition to being able to impersonate you to your mobile contacts, consider the risk of an attacker who has access to some of all of the following:

  • Your saved contacts - names, phone numbers, perhaps also email addresses and physical addresses
  • Call logs - calls made and received
  • Stored text messages
  • A calendar with your appointments, or a task list
  • Your mobile email
  • Your web browser with stored passwords
  • Photos, video and sound recordings stored on the phone and memory card
  • Data stored by applications - notes, social networking contacts and posts

Three kinds of tools can lessen the pain of losing your mobile data, and limit your risk should your phone be lost or stolen.

  • Backup and restore tools allow you to save a backup of contacts and other data stored on your phone
  • Data deletion tools can be used to ‘clean’ a phone completely before disposing of it, giving it away or travelling to a location where you are worried it could be stolen or confiscated
  • Remote wipe tools are set up so that if your phone is lost or stolen, you are able to clean it remotely, deleting sensitive data. Many remote wipe tools also allow you to track the phone provided it has not been turned off.

Anyone who has had a phone stolen knows the frustration of trying to rebuild your contacts list, not to mention data on the phone that is unrecoverable. Worse, the data stored on your phone can be dangerous in the wrong hands. In addition to being able to impersonate you to your mobile contacts, consider the risk of an attacker who has access to some of all of the following:

  • Your saved contacts - names, phone numbers, perhaps also email addresses and physical addresses
  • Call logs - calls made and received
  • Stored text messages
  • A calendar with your appointments, or a task list
  • Your mobile email
  • Your web browser with stored passwords
  • Photos, video and sound recordings stored on the phone and memory card
  • Data stored by applications - notes, social networking contacts and posts

Three kinds of tools can lessen the pain of losing your mobile data, and limit your risk should your phone be lost or stolen.


Securing your Mobile Email

Posted by MelissaLoudon on Oct 14, 2011
Securing your Mobile Email data sheet 4516 Views
Author: 
SaferMobile
Abstract: 

Email wasn’t designed with security in mind. Unless you take steps to protect your communication, emails are sent in plain text - and so are your email account username and password.

At the same time, if you and your recipient are taking the appropriate security precautions, mobile email can be a secure and reliable alternative to other forms of mobile communication. If you have data service for your mobile, encrypted email can replace text messaging, and if you aren’t able to access a website securely to upload content - photos or videos for example - getting it to a trusted contact as an email attachment can be a safer alternative.

Email wasn’t designed with security in mind. Unless you take steps to protect your communication, emails are sent in plain text - and so are your email account username and password.

At the same time, if you and your recipient are taking the appropriate security precautions, mobile email can be a secure and reliable alternative to other forms of mobile communication. If you have data service for your mobile, encrypted email can replace text messaging, and if you aren’t able to access a website securely to upload content - photos or videos for example - getting it to a trusted contact as an email attachment can be a safer alternative.

This article suggests the following tactics for improving the security of your mobile email:

Email security basics

Even if you’re not using encrypted email, you can take some basic precautions to improve your email security. For example


Blacknoise: Low-fi Lightweight Steganography in Service of Free Speech

Posted by ccarlon on Oct 13, 2011
Blacknoise: Low-fi Lightweight Steganography in Service of Free Speech data sheet 1512 Views
Author: 
Paik, Michael
Publication Date: 
Jan 2010
Publication Type: 
Report/White paper
Abstract: 

Censorship of communications is a widespread, current practice in various countries with repressive governments in order to prevent or restrict speech; political speech in particular. In many cases state-run telecommunications agencies including those providing internet and phone service, actively filter content or disconnect users in defense of incumbents in the face of widespread criticism by citizens.

In this paper I present Blacknoise, a system which uses commodity low-cost mobile telephones equipped with cameras, and takes advantage of their lowfidelity, noisy sensors in order to enable embedding of arbitrary text payloads into the images they produce. These images can then be disseminated via MMS, Bluetooth, or posting on the Internet, without requiring a separate digital camera or computer to perform processing.


Mobile Anonymity and Censorship Circumvention: How to Browse the Web Anonymously On Your Phone

Posted by MelissaLoudon on Oct 13, 2011
Mobile Anonymity and Censorship Circumvention: How to Browse the Web Anonymously On Your Phone data sheet 8109 Views
Author: 
MelissaLoudon
Abstract: 

If you don’t want someone to know that you were accessing a particular web site (or that you were accessing it at a particular time, such as when inflammatory content was posted), you need to anonymize your mobile browsing. Depending on how your network is set up, the site you are accessing may be able to see and keep a record of your IP address. Your network administrator, Internet Service Provider and/or Mobile Network Operator can see and keep records of the IP addresses of both your Internet-connected mobile device and the sites you are accessing. IP addresses can nearly always be linked to a geographic location, whether a zip code or a city, and your ISP or mobile network provider can link your IP to your individual device.

The first part of this article - Using HTTPS for Secure Mobile Browsing - describes how mobile browsing over HTTPS provides:

  • encryption for you data during transmission
  • verification of the identity of the remote site

However, using HTTPS does not hide your identity. If you don’t want someone to know that you were accessing a particular  web site (or that you were accessing it at a particular time, such as when inflammatory content was posted), you need to anonymize your mobile browsing. Depending on how your network is set up, the site you are accessing may be able to see and keep a record of your IP address. Your network administrator, Internet Service Provider and/or Mobile Network Operator can see and keep records of the IP addresses of both your Internet-connected mobile device and the site you are accessing. IP addresses can nearly always be linked to a geographic location, whether a zip code or a city, and your ISP or mobile network provider can link your IP to your individual device.

Organisations and countries that block websites can do so by blocking communication to and from specific IP addresses. For this reason, anonymizing your browsing is also the first step to circumventing Internet censorship.

This article describes two tactics for anonymous browsing and censorship circumvention - using a proxy, and using a mobile version of the circumvention tool Tor. Both are used on cpmputers as well as mobile devices. Specific tools for mobile phones are described in the second part of the article.

Mobile Tools: 

A User Guide to Orbot - Anonymized Tor Browsing on Your Mobile Phone

Posted by MelissaLoudon on Oct 13, 2011
A User Guide to Orbot - Anonymized Tor Browsing on Your Mobile Phone data sheet 9556 Views
Author: 
SaferMobile
Abstract: 

Orbot is an anonymizing and circumvention app that connects Android phones to the Tor network. Developed by The Guardian Project, it is currently the only way to use Tor on a mobile phone.

Orbot is for Android users who need to browse anonymously or circumvent blocked sites. It should work on both older and new model Android phones, and does not require a rooted phone (although there are some advantages to using it with one). Orbot is designed for proficient Android users.

Orbot is an anonymizing and circumvention app that connects Android phones to the Tor network. Developed by The Guardian Project, it is currently the only way to use Tor on a mobile phone.

Who should use it?

Orbot is for Android users who need to browse anonymously or circumvent blocked sites. It should work on both older and new model Android phones, and does not require a rooted phone (although there are some advantages to using it with one). Orbot is designed for proficient Android users.

How does it work?

Orbot sets up a connection to the Tor network and makes it available to apps through a local proxy.


Secure Chat on Android: Gibberbot, a User Guide

Posted by MelissaLoudon on Oct 13, 2011
Secure Chat on Android: Gibberbot, a User Guide data sheet 5138 Views
Author: 
SaferMobile
Abstract: 

Gibberbot is an instant messaging app for Android phones. Gibberbot implements off-the-record messaging (OTR), a way to conduct an instant messaging conversation with encryption, authentification, deniability, and forward secrecy.

Gibberbot is an instant messaging app for Android phones, developed by The Guardian Project. Gibberbot implements off-the-record messaging (OTR). Off-the-record messaging is a way to conduct an instant messaging conversation with the following attributes

  • Encryption. An eavesdropper cannot read your messages
  • Authentication. You can verify the identity of the person you’re chatting to - or at least of the account they are using.
  • Deniability. It is not possible for a third party to prove that a particular user sent or received a particular message.
  • Perfect forward secrecy. It is not possible for an attacker to decrypt a previous conversation, even if he/she obtains the encryption keys used to encrypt it.

Gibberbot can also use Orbot to route your chats over the Tor network. This prevents an observer from following the source and destination of your messages (effectively, from knowing you are chatting) and provides a way to circumvent web censorship that may involve chat servers being blocked.

Off-the-record messaging only works when both parties in the conversation are using it. This means both parties need to use Gibberbot, another mobile app, or chat software that supports it. Currently Gibberbot is the only option we know of for mobile phones. Off-the-record plugins are available for several PC chat programs, including Pidgin (Windows and Linux), Adium (Mac), Trillian (Windows) and Miranda (Windows).


The Mobile Minute: Mobile Subscriptions Per Capita, Challenges to mHealth Projects, and the Importance of Password Protection

Posted by AnneryanHeatwole on Oct 13, 2011

Today's Mobile Minute brings you news about the decline of knock-off phones in China, mobile phone statistics in South Africa, the case for password protecting your mobile phone, challenges to mHealth projects in Africa, and new global mobile statistics.

  • A new article from the L.A. Times looks at the fall in popularity of shanzhai (knock-off) phones in China, as shanzhai phones now represent only 7% of the Chinese market, down from 20% in 2007. The article says that the trend for buying brand-name phones is due to the greater availability of low-cost smartphones, and a preference for high-end features in smartphones that the knock-offs can not replicate.
  • Nielsen Wire recently released a study on mobile use in South Africa, examining everything from network loyalty and social mobile use (such as downloading ringtones, wallpapers, and screensavers), to comparisons between mobile contracts and pre-paid phones and the use of SMS and mobile instant messaging services.
  • Do you password protect your phone? Read Write Web reports that more than half of smartphone owners surveyed by Confident Technologies do not lock and password protect their phones. If your phone is stolen, lost, or confiscated then all of your personal data (including contacts in the address book, emails saved in your inbox, and log-ins for social media sites like Twitter and Facebook) stored on your phone could be compromised; using a password makes this information harder to access.
  • PBS examines the hype around mHealth projects in the developing world, and whether mobile technologies are successful at managing health issues. The article looks at challenges to mHealth projects such as limited mobile access for beneficiaries, spotty network coverage, the high costs of large-scale projects, and the difficulty of maintaining charged phones.