India is in the midst of the biggest national identification project in the country’s history. The aim is for every Indian to receive a voluntary electronic identification card containing his or her details and a unique number. Called an Aadhaar, it is a 12-digit unique number registered with the Unique Identification Authority of India (http://uidai.gov.in) (UIDAI). The project joins a growing trend across the global South to map populations in order to better achieve development goals.
About one-third of the world’s urban dwellers live in slums, and the United Nations estimates that number will double by 2030 as a result of rapid urbanization in developing countries. How to improve slum-dwellers’ living conditions and raise their standard of living is the big challenge of the 21st century.
With just four years to go until the 2015 deadline to meet the Millennium Development Goals (http://www.undp.org/mdg), and the current economic downturn reversing some gains, any tool that can make development decisions more precise has to be a benefit.
Innovators are turning to the opportunities afforded by digital technologies to reach slums and poor areas. The approaches vary, from India’s national identification system to new ways of using mobile phones and Internet mapping technologies. With mobile phones now available across much of the global South, and plans underway to expand access to broadband internet even in poorly served Africa, it is becoming possible to develop a digital picture of a slum and poor areas and map population needs.
Put to the right use, this powerful development tool can fast-track the delivery of aid and better connect people to markets and government services. In a country of severe regional disparities and caste (http://en.wikipedia.org/wiki/Caste) divisions, the national identification number has the advantage of not documenting people in a way that would bring prejudice.
India’s Aadhaar is intended to serve a number of goals, from increasing national security to managing citizen identities, facilitating e-governance initiatives and tackling illegal immigration. While critics of ID schemes complain about the civil liberties implications of national identity card projects (www.bigbrotherwatch.org.uk), it is a fact that countries that want to increase the social benefits available to their citizens need to understand who those citizens are, where they live and what their social needs are. India’s problem to date has been a lack of knowledge of its citizens: many millions exist in a limbo world of not being known to local authorities.
The unique number is stored in a database and contains details on the person’s demographics (name, age, etc.) and biometrics (http://en.wikipedia.org/wiki/Biometrics) – a photograph, 10 fingerprints and an iris scan. Residents in an area find out about the Aadhaar through various sources, from local media to local government agencies. An ‘Enrolment Camp’ is established in the area where people go to register, bringing anything they have that can prove their identity. The biometric scanning takes place here. ID cards are issued between 20 and 30 days later.
On January 13, 2011 the project declared it had registered its millionth person, a 15-year-old named Sukrity from North Tripura. The goal is to register 600 million people in the next four years.
One of the immediate advantages to many poor people is gaining access to banking services for the first time, because an Aadhaar number is accepted as sufficient ID to open a bank account. The identification authority says the scheme will be “pivotal in bringing financial services to the millions of unbanked people in the country, who have been excluded so far because of their lack of identification.”
The Times of India reported in 2010 that Khaiver Hussain, a homeless man in an addiction treatment programme, was able to get a bank account after receiving the identification number. He was able to open an account with the Corporation Bank along with 27 other homeless people. Having a bank account has removed the fear he had of being robbed of his meagre savings while he slept.
Another homeless day labourer, Tufail Ahmed from Uttar Pradesh, said “This passbook and the UID card have given people like me a new identity. It has empowered us.” He has been able to use the saved money to rent a room with four other day labourers.
In countries where no national ID card schemes exist, people are turning to other methods to register and map populations in order to improve their living conditions.
In Kenya and Brazil, digital mapping projects are underway using mobile phones to paint a picture of the population living in slum areas and shanty towns. An NGO called Map Kibera (www.mapkibera.org) began work on an ambitious project to digitally map Africa’s largest slum, Kibera in Nairobi, Kenya. The Map Kibera project uses an open-source software programme, OpenStreetMap (www.openstreetmap.org), to allow users to edit and add information as it is gathered.
Powerful tools now exist to aid digital mapping. Google Maps (www.maps.google.com) is one example.
While the project is impressively ambitious – and it remains to be seen if it is completed as planned – the economic and development implications of this vast data collection and national identification are enormous. It will enable very accurate identification of markets and needs and also of development challenges and needs. This should lead to many business innovations in the country in coming years and also draw in more business from outside the country.
Published: April 2011
Resources
1) Ushahidi is a website that was developed to map reports of violence in Kenya after the post-election fallout at the beginning of 2008. The new Ushahidi Engine has been created to use the lessons learned from Kenya to create a platform that allows anyone around the world to set up their own way to gather reports by mobile phone, email and the web – and map them. It is being built so that it can grow with the changing environment of the web, and to work with other websites and online tools. Website:http://blog.ushahidi.com/
2) Google Android: Get inventing! This software enables anyone to start making applications for mobile phones. And it offers a platform for developers to then sell their applications (apps). Website:www.android.com
“Unique Identity for All”: Biometric identity is being rolled out across the planet. HSB is one of the many players in this fast-growing data collection sector.
Development Challenges, South-South Solutions was launched as an e-newsletter in 2006 by UNDP’s South-South Cooperation Unit (now the United Nations Office for South-South Cooperation) based in New York, USA. It led on profiling the rise of the global South as an economic powerhouse and was one of the first regular publications to champion the global South’s innovators, entrepreneurs, and pioneers. It tracked the key trends that are now so profoundly reshaping how development is seen and done. This includes the rapid take-up of mobile phones and information technology in the global South (as profiled in the first issue of magazine Southern Innovator), the move to becoming a majority urban world, a growing global innovator culture, and the plethora of solutions being developed in the global South to tackle its problems and improve living conditions and boost human development. The success of the e-newsletter led to the launch of the magazine Southern Innovator.
By 2014, Southern Innovator had published five issues and become a recognised global innovation brand.
Information technology developments in Africa have long lagged behind those in other parts of the world. But the transformation being brought about by the widespread adoption and use of mobile phones – each one a mini-computer – and the expansion of undersea fibre optic cable connections to Africa are creating the conditions for an exciting new phase of computing growth on the continent.
Despite the global economic crisis, Africa is on course to see annual consumer spending reach US $1.4 trillion by 2020, nearly double the US $860 billion in 2008 (McKinsey). On top of this, by 2050, a projected 63 per cent of Africa’s population will be urban dwellers. With Africa’s middle class the fastest-growing in the world – doubling in less than 20 years – matching computing power with this consuming urban population could unleash a treasure trove of opportunity for information technology entrepreneurs.
These developments are creating the conditions for game-changing computing in the next years. And this is encouraging the creation of a new supercomputer (http://en.wikipedia.org/wiki/Supercomputer) for Africa in Kenya that will double the total number of supercomputers in Africa. Hugely powerful compared to personal or commercial computers, supercomputers use cutting-edge technology to carry out high-speed calculations involving vast quantities of data.
Expanded supercomputing power brings numerous advantages to both economic and human development. It will radically alter what can be accomplished in Africa – allowing mass data processing to be done, highly complex and data dense applications to be run, and very large research projects to be conducted on the continent rather than overseas.
Increasing computing power in Africa will bring in its wake, it is hoped, a surge in economic and research opportunities.
It will help African researchers and scientists to undertake globally competitive projects, rather than seeing this work done overseas. It will also open up a vast range of possibilities for African entrepreneurs and businesses to do complex data processing, modelling and research and will enable them to become more sophisticated operations.
The new supercomputer, the iHub Cluster, is being built in the Kenyan capital by one of Africa’s pioneering information technology hubs – iHub Nairobi (http://ihub.co.ke/pages/home.php) – in partnership with Internet products and services company Google and microchip maker Intel Corporation.
Africa’s first supercomputer is located in South Africa and is ranked 497 in terms of computing power on the list of 500 supercomputers in the world (http://www.top500.org/).
It is located in the “Tsessebe cluster” in Cape Town’s Centre for High Performance Computing (http://www.chpc.ac.za/).
“With mobile devices coming in multiple cores, it is important for developers to be exposed to higher performance computing; we are hoping to debut at a higher level than ‘Tsessebe cluster’,” Jimmy Gitonga, the project team leader for the iHub cluster, told Computer World.
Africa suffers from poor supercomputer capacity and this has had a knock-on affect on everything to do with economic development. The iHub supercomputer hopes to help universities and colleges to gain competitive edge and be able to undertake more complex research in the fields of media, pharmaceuticals and biomedical engineering.
“In Africa, we need to be on top of the mobile scene, its our widest used device,” Gitonga told Computer World.
Some of the practical applications for the iHub supercomputer in East Africa and the Horn of Africa include improving weather forecasting and drought prediction, increasing the ability to give advance warning of droughts and famines in the region.
“Most of the United Nations agencies and international agencies operating in the region have extensive field research on how to tackle natural disasters in the region. Imagine if they had affordable space where they can meet with developers and test resource-hungry applications,” Gitonga said.
The iHub also wants to offer the services of the supercomputer to researchers and organizations who have had to go abroad to have their data processed. The iHub supercomputer hopes to be used by mobile phone developers, gamers, universities and research institutions.
In the last two years, China had pushed the United States out of the number one spot for supercomputers. The Tianhe-1A located at the National Supercomputing Center in Tianjin (http://www.nscc-tj.gov.cn/en/), China, was the fastest computer in the world from October 2010 to June 2011.
For those looking to see how they can make the most of the growing supercomputer capability in Africa, examples from other countries offer a good idea. Supercomputers can be used for weather forecasting, climate research, oil and gas exploration, physical simulations like when testing aircraft, complex modelling for medical research, processing complex social data necessary for delivering effective social programmes or running modern health care systems.
If you allow another country to gain access to really critical data about your society, over time that will erode your sovereignty, you no longer have control over that data.
MI6 chief Richard Moore to BBC News (30 November 2021).
Data. The United Nations (UN) has always gathered data and published it. But since the advent of the digital revolution, data collection has taken on new forms. It is now gathered 24/7 and sits in databases – or on somebody’s smartphone. It flows in, and flows out. Some call it a ‘data deluge’. Since 2000, despite various initiatives (irritating ‘cookies’ warnings before you can interact with a web page, or the more legalistic General Data Protection Regulation (GDPR) – a regulation in EU law on data protection and privacy in the European Union and the European Economic Area) data has become incontinent: it leaks out everywhere.
An orgy of cross-border data collection and harvesting has only increased in its intensity in the past 20 years. And the UN and other international organisations have played their part.
But what most of us do not want to think about is this: that data is power and when it is parsed and sifted by algorithms and AI (artificial intelligence), it allows the entity doing this to engage in event-shaping. How much of our lives is being shaped by digital ‘voodoo dolls’ in a cyber centre somewhere?
And, as the head of the UK’s MI6 intelligence service says, “over time that will erode your sovereignty, you no longer have control over that data.” In short, you’ve been hacked.
“Cyber-security experts have unveiled one of the biggest computer hacking campaigns to date, releasing a list of 72 organisations whose networks were attacked over a five-year period. Victims include the UN and several governments.
REUTERS – Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world. …
In the case of the United Nations, the hackers broke into the computer system of its secretariat in Geneva in 2008, hid there for nearly two years, and quietly combed through reams of secret data, according to McAfee.”
“Personal information leaked in sensitive contexts can spark violence, discrimination, exclusionary policies. Yet my NGO shares confidential data freely.”
“If there are no consequences for the [UN] agencies for failures like these … there will be more breaches.”
“About this investigation: While researching cybersecurity last November, we came across a confidential report about the UN. Networks and databases had been severely compromised – and almost no one we spoke to had heard about it. This article about that attack adds to The New Humanitarian’s previous coverage on humanitarian data. We look at how the UN got hacked and how it handled this breach, raising questions about the UN’s responsibilities in data protection and its diplomatic privileges.“
“In summer 2019, hackers broke into over 40 (and possibly more) UN servers in offices in Geneva and Vienna and downloaded “sensitive data that could have far-reaching repercussions for staff, individuals, and organizations communicating with and doing business with the UN,” The New Humanitarian reported on Wednesday.”
“Oz Alashe, CEO of CybSafe, says that the unintentional disclosure of this cyber attack on such an important institution last year is concerning.
“This delay, and the fact that the UN did not report this attack to any governing authority – or even their own staff – may have put victims at unnecessary risk. Not only were staff passwords stolen, system controls and security firewalls were compromised too which could have led to the critical confidential reports falling into criminal hands,” he pointed out.
This attack could end up undermining trust in the UN – trust that they are able to keep sensitive information safe and trust that they will notify affected individuals when they fail.”
“I am very honoured to join you today in this inauguration ceremony of the Regional Hub for Big Data in China, in support of the United Nations Global Platform. The inauguration of this Regional Hub is most important, and timely.
The demand for data, especially during the COVID-19 pandemic, is greater than ever. Governments are in need of detailed data on the spread of the virus and its impacts on society. Under these challenging circumstances, statistical institutes have had to respond urgently to the demand for data, and to present innovative solutions. Consequently, in these times of need, the statistical community is now able to effectively use Big Data and advanced technologies.
For example, census data – together with detailed geospatial information – can help identify the most vulnerable populations during the pandemic. And, real-time data on the position and movement of ships, for example, can estimate the volume of cargo being transported, and thus help produce estimates on the state of the economy. These real-time shipping data are available as a global data set on the United Nations Global Platform, and can be accessed by the whole statistical community.”
“Around 2013, U.S. intelligence began noticing an alarming pattern: Undercover CIA personnel, flying into countries in Africa and Europe for sensitive work, were being rapidly and successfully identified by Chinese intelligence, according to three former U.S. officials. The surveillance by Chinese operatives began in some cases as soon as the CIA officers had cleared passport control. Sometimes, the surveillance was so overt that U.S. intelligence officials speculated that the Chinese wanted the U.S. side to know they had identified the CIA operatives, disrupting their missions; other times, however, it was much more subtle and only detected through U.S. spy agencies’ own sophisticated technical countersurveillance capabilities.”
A United Nations research institute is being set up in China that will amass and analyze huge amounts of data from around the world on sustainable development goals. Chinese researchers are expressing the need for data in order to analyze human behavior.
“China’s influence is undoubtedly growing in the United Nations, with four of the 15 specialized agencies of the intergovernmental organization being led by Chinese nationals. Beijing seized the “absence” of the United States, accelerated by the Trump administration’s disdain for the U.N., to extend its tentacles to unexpected places.
A plan to set up the first U.N. big data research institute is underway in Hangzhou, Zhejiang Province, China. Officially, it would facilitate U.N. operations by amassing and analyzing huge amounts of data from around the world on sustainable development goals (SDGs) to tackle global issues such as starvation and climate change.
One cause for concern is that Chinese researchers are expressing the need for data in order to analyze human behavior. The United States, which is wary of any data leaks to China, is raising alarms against the plan. In an October 7, 2020, article inThe Wall Street Journal,Hudson Institute fellow Claudia Rosett warned that the plan would enable China to collect data from U.N. member states and set the standards for data collection.”
“The data privacy and security of Rohingya refugees in Bangladesh has reportedly been jeopardised by the UN Refugee Agency. In an exposé published on 15 June by Human Rights Watch (HRW), UNHCR stands accused of improperly collecting the Rohingya’s biometric information and later sharing it with the Myanmar government without the Rohingya’s consent. Refugees said they had been told to register to receive aid, but the risks of sharing their biometrics had not been discussed, and the possibility this information would be shared with Myanmar was not mentioned.
The potential harm of sharing information with a regime that has a long history of manipulating registration systems to exclude and marginalise Rohingya populations is obvious. That biometrics are involved makes it worse. Unlike names or other personal information, biometrics are sticky – it’s not something you can change or escape.”
“People in Afghanistan are fearful of the Taliban accessing personal information captured and stored by aid agencies including biometric data which could be used to identify individuals. Experts have raised concern that approaches used by security firms and United Nations development agencies could prove problematic for refugees and vulnerable groups, reports the Thomson Reuters Foundation, the charitable trust of Thomson Reuters.
The Intercept reported that equipment used by the U.S. army for biometric collection has already been seized by the Taliban. Biometric data on Afghans who assisted the U.S. were widely collected, making anybody identified vulnerable to persecution from the Taliban.
Sources told the Intercept that there was little planning for such an event, while the U.S. Army plans to continue to spend another $11 million on biometrics capture equipment including 95 more devices.
The UNHCR has been using biometrics in the region since 2002 when it tested iris recognition technology on Afghan refugees in the Pakistani city of Peshawar. Aid agencies praise biometric technology’s anti fraud and contactless capabilities.”
“Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization.
The hackers’ method for gaining access to the UN network appears to be unsophisticated: They likely got in using the stolen username and password of a UN employee purchased off the dark web.”
“Organizations like the UN are a high-value target for cyber-espionage activity,” Resecurity Chief Executive Officer Gene Yoo said. “The actor conducted the intrusion with the goal of compromising large numbers of users within the UN network for further long-term intelligence gathering.”
“A spokesperson for the United Nations has confirmed that the organization was breached by hackers in early 2021, and that attacks tied to that breach on various branches of the UN are ongoing. The data breach appears to stem from an employee login that was sold on the dark web. The attackers used this entry point to move farther into the UN’s networks and conducted reconnaissance between April and August. Information gleaned from this activity appears to have been put to use in further attacks, with attempts made on at least 53 accounts.”
UN data breach creates long-term havoc for organization
“The UN has a unique need for cutting-edge cybersecurity given that it is one of the world’s prime targets for hackers, and that it fields regular attacks from advanced operators. Many of these go unrecorded, but the organization has weathered some high-profile attacks in recent years.”
At some of the world’s most sensitive spots, authorities have installed security screening devices made by a single Chinese company with deep ties to China’s military and the highest levels of the ruling Communist Party
China has barely scratched the surface of its potential to carry out a “people’s war” on global public opinion.
“China’s propaganda machine also has over 1 million journalists and reporters tasked with the mission to “tell China’s story well.” Armed with AI and bots, China’s huge internet army could hobble global social media platforms with a large-scale flooding attack to win the CCP’s public opinion war.”
New York – The United Nations Development Programme (UNDP) recently experienced a cyber-attack, in which local IT infrastructure in UN City, Copenhagen was targeted.
On March 27, UNDP received a threat intelligence notification that a data-extortion actor had stolen data which included certain human resources and procurement information.
Actions were immediately taken to identify a potential source and contain the affected server as well as to determine the specifics of the exposed data and who was impacted.
UNDP is currently conducting a thorough assessment of the nature and scope of the cyber-attack, and we have maintained ongoing communication with those affected by the breach so they can take steps to protect their personal information from misuse. Additionally, we are continuing efforts to contact other stakeholders, including informing our partners across the UN system.
UNDP takes this incident extremely seriously and we reiterate our dedication to data security. We are committed to continue working to detect and minimize the risk of cyber-attacks.
Foreign states are targeting British universities in order to undermine national security, MI5 has warned.
Vice-chancellors from 24 leading universities were briefed on the threat by the security services and the government on Thursday.
They were warned cutting-edge research could be targeted by states to boost their own militaries and economies.
The deputy prime minister has announced a consultation on measures to protect UK universities.
There has been no direct reference to any one state, but Parliament’s intelligence and security committee warned last year that China could be gaining undue influence in British academic research.
“Unique Identity for All”: Biometric identity is being rolled out across the planet. HSB is one of the many players in this fast-growing data collection sector. Companies such as HSB collect data on behalf of international organisations.Facial recognition AI software triangulates facial features to produce a recognition match.This story is from 1992 and is a rare glimpse into Canada’s data sharing agreements with the US and other countries.
“Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other.”
“Surveillance Capitalism: A new phase in economic history in which private companies and governments track your every move with the goal of predicting and controlling your behaviour. Under surveillance capitalism you are not the customer or even the product: you are the raw material.”
“In a wide-ranging interview ahead of his first major public speech since taking on the role as head of MI6, Mr Moore:
warned China has the capability to “harvest data from around the world” and uses money to “get people on the hook” …
“Speaking about the threat posed by China, Mr Moore described its use of “debt traps and data traps”.
He said Beijing is “trying to use influence through its economic policies to try and sometimes, I think, get people on the hook”.
Explaining the “data trap”, he said: “If you allow another country to gain access to really critical data about your society, over time that will erode your sovereignty, you no longer have control over that data.
“That’s something which, I think, in the UK we are very alive to and we’ve taken measures to defend against.”
The screensaver on an Undercurrents researcher’s computer terminal bears a maxim that might strike a chord in a lot of CBC units these days: “Only the paranoid survive.”
The quirky media and technology show will fade to black at the end of March. Its cancellation raises a host of issues for a CBC deeply troubled by budget cuts, an ageing audience, a dearth of alternative programme concepts and an inability to plan for a future.
In the show’s pilot, Wendy Mesley – Undercurrents’ host and progenitor – set the tone for this accessible look at the relationship among technology, media and society: “Like it or not we are living in a wired world where OJ Simpson, Big Brother, even your bank machine, all converge … we’ll explore all the issues, the undercurrents of the information age.”
To those who loved it, Undercurrents was a program that satisfied a vital public need, and an ambitious concept for a public broadcaster that some say had grown a little musty. The show promised avant-garde production and investigative journalism that critically explored today’s new media and technology culture. Youngish researchers and producers were hired from outside the CBC. They brought with them experience and new ideas from specialty channels, TV Ontario and CTV. Some came straight out of journalism school.
Critical reaction to the first programs was mixed. John Doyle, a critic with the Globe and Mail’s Broadcast Week, lauded Undercurrents when it launched, calling it “a superb example of solid CBC-TV journalism and original reporting.” Others were less flattering. The Toronto Star’s Greg Quill accused the show of “flirting with infotainment.” At the Vancouver Sun, Alex Strachan wasn’t impressed by a report on a weekend conclave of computer geeks in the California desert for a kind of Hackerstock. “It sounds interesting,” he wrote, “but it isn’t.”
What hurt more was schedulers playing musicial chairs with the show’s slot. Switching Undercurrents from Tuesday at 7 pm to Friday at 7 pm midway through its life left viewers confused and sent ratings plummeting just as network programmers were casting about for places to apply a whopping 30 percent budget cut. As a result, some feel the show never had a fighting chance.
In the end, it was the show’s precarious financial arrangement that killed it. Undercurrents was never funded from the general current affairs budget. Instead, it drew on a special reserve of cash created by the network. When it came time to mete out the cuts in December, the special funding bubble burst. Rather than cut further into the budgets of flagship current affairs programs, executives chose to drop Undercurrents.
Executive producer Frances Mary (FM) Morrison acknowledges that gratitude for her program’s special funding obscured a recognition of its fragility. “That was really our Achilles heel,” she says. “We were just this little orphan that didn’t have its own money. We weren’t adopted into the larger family.”
With the network funding gone, Undercurrents’ budget (rumoured to be over a million dollars per season) was nowhere to be found. Discussions about chasing a corporate sponsor went nowhere because the show needed more money than any sponsor could have provided. “It was never an issue of $100,000 or $200,000,” says Morrison. “It was the issue of our entire budget. [CBC] would still have had to come up with the rest of it.”
CBC TV’s news, current affairs and Newsworld director Bob Culbert and former current affairs head Norm Bolen both say they wanted the show to stay on the air but couldn’t find a way to fund it withou seriously hurting programs like The Fifth Estate, Marketplace and Venture.
Bolen, now VP of programming at the History and Entertainment Network, says it came down to choosing between The Health Show and Undercurrents. The Health Show won because it had a “bigger audience, a broader demographic and was bringing in revenue from sales of programming to the specialty channels.”
Mesley has another theory. “The majority of people who worked on this programme are not traditional CBCers… They can’t bump, they don’t get huge severance packages. Of course, if you want a future, those are the wrong reasons for letting people go.”
With its intensive focus on issues like the abuse of computer-morphed images, surreptitious “data-mining” of consumer purchase records, or media “freebies,” there’s no question that Undercurrents has met a need in this media-saturated world. But controversy over the cancellation centres on the age-old question of CBC and the youth audience.
Morrison and Mesley both say they intended the show to appeal to a younger-than-usual CBC audience. But CBC executives weren’t convinced it was an audience the network could, or should, go after. According to Culbert, a youth mandate was something the production team brought to Undercurrents. “It started as a media ethics show targeted at a classic CBC audience. Nobody sat around one day and said ‘let’s invent the show that will go after younger viewers.’”
Bolen expresses a profound lack of faith in the under-30 audience. “People under 30 don’t watch information programming, okay? Let’s get that straight. I sure wouldn’t spend the rest of my life trying to get an audience that doesn’t watch a certain genre of programming. This is a business where you pay attention to reality. People under 30 watch trashy American sitcoms, which I’m not in the business of doing, and which the CBC isn’t in the business of doing.”
“I think that’s bullshit,” says Reid Willis, producer and director of CityTV’s Media Television. “People under 30 are interested in what’s going on in the media. The 20 to 30 group is more media savvy than the generation that preceded them.” But Willis thinks the lack of information programming pitched at a young audience is down to a lack of interest from advertisers.
Mesley and Morrison remain convinced Undercurrents did appeal to a younger audience, but felt it was sabotaged by the schedule shuffling. In the show’s first slot, Tuesdays at 7 pm, its average audience was 499,000. The biggest night came on Sunday, October 22, 1995 when a repeat aired at 9:30 pm got an audience of 865,000. But Undercurrents’ debut in the 96/97 season in its new 7 pm slot on Fridays was demoralizing for the crew. Morrison reports the audience for the season opener at 438,000 and 434,000 for a strong programme the following week.
She says the numbers built as audiences found the programme’s new location, peaking at 678,000 on December 6. According to CBC audience research figures, average minute audience for the 96/97 season to February 2 stood at 518,000 viewers.
“Friday at seven was not a good place for Undercurrents,” claims Morrison. “It’s an older audience. In fact the audience for Air Farce [which followed Undercurrents at 7:30] is quite old, surprisingly old. I was actually astonished to find out how old that audience was.”
CBC audience research bears Morrison out, reporting that the 18-34 demographic for both Air Farce and Undercurrents has been identical this season – a mere 14 percent of the total audience.
Fridays at seven is also a heavily competitive slot packed with overhyped American tabloid TV shows like Entertainment Tonight, Inside Edition, Hard Copy and A Current Affair. Morrison says focus groups told her that audiences in that time period surf around looking for stories they like and then switch around with no loyalty to a particular programme.
“People build a menu. We took a leaf out of the tabloid book in terms of our presentation in order to survive in the seven o’clock environment.”
Undercurrents’ jerky camera work and flashy graphics didn’t endear itself to everyone, a fact the show’s producers recognized early on. “I can point to stories where we sabotaged ourselves with stylistic extremes,” admits Morrison.
But Mesley bristles at accusations the show was all style and no content, or a clone of Media Television. “We are the antithesis of Media Television. Obviously everyone has adopted their style from rock videos. But they get nearly all their video as handouts. We are not saying, ‘This is hip.’ We are not saying, ‘This is the latest consumer thing you can add to your collection.’ We are saying ‘Think about this.’”
Undercurrents’producers express pride in the show’s innovations. They cite its lead role in web page design at the corporation., its efforts at promoting a more playful visual presentation, and its success in promoting an acceptance of media stories elsewhere in news and current affairs. But what seemed to enliven everyone interviewed for this story was a love of the public broadcasting ethos, where stories are told because they are important, not because advertisers say they are important. Many of the young researchers and producers at Undercurrents had done time at the privates, and appreciated the freedom and extensive resources offered by the CBC. But they felt they had come to a CBC whose values were in peril.
“It will be like C-SPAN here,” quipped an Undercurrents freelancer who has done time at the specialty channels.
Others who thrived in the upbeat atmosphere at Undercurrents say they’re not too keen to look for work elsewhere in the CBC. One such is 25-year-old researcher Bret Dawson. “It’s not a happy place,” he says.
It’s not clear what, if any, programming will replace Undercurrents. If the current trend prevails, it looks like any new programming will have to survive on a smaller budget, generate outside income and prove it can draw in viewers in short order. Under those conditions, people at Undercurrents and elsewhere wonder how long CBC’s commitment to innovative new programming can hold out.
CBC TV’s Undercurrents host Wendy Mesley. Scan Magazine was published in the 1990s for Canadian media professionals.
In 2021 Wendy Mesley commented on the story in a Tweet.
You must be logged in to post a comment.