• The Listener
  • North & South
  • Noted
  • RNZ

How will NZ's technology cope during lockdown?


During the COVID-19 Alert Level 4 lockdown, we will be relying on technology for work, learning, recreation and socialising.

More people will be using internet and phone lines – but the network overloaded on Monday when too many people tried to make calls at once. Spark says it saw unprecedented phone demand, but it has plenty of broadband capacity. Meanwhile, there are reports of cyber attackers and scammers gearing up to take advantage of the pandemic.

The Science Media Centre asked experts to comment on tech issues which may arise in a lockdown. 

Professor Dave Parry, Head of Computer Science, AUT University, comments:

“Broadband capacity is huge – it's very difficult to see it being overloaded, even with a massive increase in demand. International links are currently more than is needed and extra capacity is being added all the time.

“The major issue limiting people’s access is likely to be how they connect to the internet – fibre is very fast, followed by 3G and ADSL. Some rural areas working on copper lines might still be relatively slow, but these are being upgraded.

“Mobile overload normally happens because there are too many phones working near each other and the local cell gets overloaded. This happens quite often in disasters such as the Christchurch Earthquake. Operators manage demand and sometimes that means limiting connection numbers. WiFi, including public WiFi, will usually have a lot more capacity and is less likely to overload. Text messages may be delayed but are likely to get through.

“The biggest issue in terms of working from home and security is going to be using the family computer – If everyone uses it and it hasn’t had regular security patches then it could be compromised from something the kids may have downloaded. Home internet is normally as safe as anywhere as long as you haven’t turned off security to install it. Some public internet may not have security – you can tell by seeing if there is a padlock on the WiFi system icon.

“People are visiting a lot of new sites and changing what they do – some people will exploit that including using the fact that in an emergency people are less likely to check that something is legitimate. The biggest issue by far is spam and malicious email – be aware that if you are using a new email client it might not filter out the spam as well as the old one. Unless you are sure where an email has come from don’t click on any links – normally the ‘from’ address gives you a good idea, but also think, ‘is this something I’m expecting?’ Never give out passwords on the phone.

“The biggest issue with online education is keeping the communication going – both with teachers and with other students. Virtually all approaches use discussion areas or something similar. If you can avoid email, but communicate in a discussion forum then people can see each other’s questions and often answer each other. Just putting slides or even videos of lessons online is not as good as having a plan to communicate – one way might include having special times when you will be ‘live’.

“Trying to videoconference more than about 5 people is often tricky, but people are pretty good at typing! Rules around being polite and waiting your turn are really helpful. In most cases, I think teaches will spend a lot more time preparing lessons and finding resources than they normally do – but making sure ALL the students are involved is a big effort.

“The internet and phone system is incredibly reliable, but sometimes things don’t work. If you do need to change things, write down or take a picture of the current setup screens – it might just be a temporary issue and you want to be able to get back to what works. Things can get very frustrating – take a deep breath and wait – often the solution is obvious once you look at things calmly.”

 

Associate Professor Ian Welch, School of Engineering and Computer Science, Victoria University of Wellington, comments:

“There is an increased cyber security risk because people who haven’t worked at home before might be more likely to not follow good practices or could be plugging in computers from work into their home network. The problem here being that the home network might be very insecure compared to the corporate one where the machine came from.

“In a way, it is the reverse of the ‘bring your own device’ problem where now instead of bringing an insecure device into a secure environment we have the opposite problem. The consequence could be a virus on the work computer that is used to steal sensitive information.

“The answer here is to make sure the firewall is enabled and ensure that all the standard security updates are applied that you would have automatically had applied at work. Note that this is purely speculation.

“On cyber scams – we’ve seen people take advantage of other’s misery in the past.

“Cyber scams are an extension of confidence tricks where con operators exploit both our better motivations such as trust but also our negative emotions such as fear and avarice. The ‘affect heuristic’ comes more into play when people do not have the resources or time to reflect, and this sounds like now. The affect heuristic relates to how emotions will affect our decision making and lead us to make automatic judgements rather than deliberate decision making. In lay terms, we rush to judgement.

“So phishing emails or Facebook messages (I’ve had my fair share of those recently) are about using fear to make people do the bad thing which is to click on that link or maybe rush a payment through to someone apparently in need. The FBI has recently warned about this. In this case, it’s about promises of money for your details via economic stimulus. These details are used to extract your money!

“In a recent attack, the aim is to get you to install ransomware. Following recent trends, it focuses on employees rather than home users.

“Standard guidance is to think – is it too good to be true? Have I never heard from them via email or Facebook before? Probably if the answers are yes, you should say no. You can also look up their email or phone number on the web or another independent source, or better, ring them to check.”

Dr Syed Faraz Hasan, Senior Lecturer (Communication Engineering and Networks), Department of Mechanical and Electrical Engineering, Massey University, comments:

“Spark/Vodafone/2Degrees have what is called a ‘cellular network’ which is designed primarily for voice traffic and is typically limited in capacity. Increasing capacity on short notice is quite impossible. The impact of this limitation will reduce with the commercial use of 5G because it offers higher bandwidth and capacity.

“On the other hand, ‘data network’ carries data, which we often access using Wi-Fi, Fibre Optic cables, etc. These networks have considerably larger network capacity and are difficult to overload.

“I experienced congestion myself when I tried calling a student yesterday to confirm he had the right information about lecturing plans. I was able to get through to him in the next go, though.

“Stand-alone home devices are more vulnerable to cyber attacks if they don’t have access to organisational security mechanisms. Most organisations provide security through cloud-based solutions, which must remain active when people work from home.

“On online education – Massey has run a number of courses through online media between different campuses quite successfully over the past few years. Running a course from campus is easier because you have access to an enterprise network at both ends, network speed is fast and IT services are readily available. Having the same experience from home is more challenging because different participating devices and their enabling networks are not identical in terms of performance.”

This article was first published by the Science Media Centre.