But experts suggest that India may need to fall back on the old, proven methods if it wants to administer 600 million doses of covid-19 vaccine in less than seven months.
Giridhar Babu, an epidemiologist and part of the Covid-19 Technical Task Force in India, believes that reaching the country’s goals will require creating a comprehensive list of people to be vaccinated—the method used in previous campaigns. “As of now, health workers and frontline workers [are being vaccinated]: these are the easiest ones to capture,” says Babu. “But once we start going beyond this to the population, there is not a single list which has people with all the comorbidities, elderly people, their [medical] history.”
He says that list should be created by officials going door to door and signing people up. Babu believes that self-registration through Co-WIN may only work for the urban and educated and not for people in rural areas, and that “incomplete registration will then lead to incomplete vaccination.” He acknowledges, though, that making a list of people to be vaccinated “is a phenomenally large exercise which requires a lot of planning.”
“It’s dangerous to have it just on an app”
Experts worry not only that the drive will fall short of its targets, but that it will be used as a way to gather citizens’ private health data. In August, Prime Minister Narendra Modi announced the launch of a national health ID—a way to centralize the health-care data of Indians. Later the health ministry said that citizens being inoculated would have the option to create a unique health ID through their Aadhaar number—India’s controversial 12-digit national ID, which is linked to people’s fingerprints and iris scans.
“When a beneficiary shares their Aadhaar details at the vaccine center for the purpose of ID verification, the Aadhaar data gets shared with Co-WIN at the back end, which is then being used to create a health ID of that person,” says Srikanth Lakshmanan, a tech researcher who has been studying the documents around Co-WIN. “While the government says it’s voluntary, not many people even know that it’s being created.”
Digital policy experts say using an app for the vaccination drive reflects India’s love of techno-solutionism but is fraught with potential difficulties. “It’s not easy to make an app-only solution when the infrastructure is not good—people not only need mobile phones, they need connectivity, internet, they need to be able to use the phone,” says Shweta Mohandas, a policy officer at the Centre for Internet and Society, a think tank. “Especially with regard to medical services, it’s dangerous to have it just on an app … it limits the number of people who can use it.”
Meanwhile, the doctor who received the misaddressed vaccine invitation was able to get the first dose when he showed up at the hospital to inquire about it. He feels thankful, he says, because if it hadn’t been for that SMS addressed to a stranger, he wouldn’t have gotten the vaccine so soon.
But the Co-WIN snags continued.
Days after he got the first shot, he received two more text messages addressed to two other people, with details of the time and location for their first doses. “I wonder,” he said, “if those people have gotten this message or missed their first dose.”
This story is part of the Pandemic Technology Project, supported by The Rockefeller Foundation.
Rocket Lab could be SpaceX’s biggest rival
In the private space industry, it can seem that there’s SpaceX and then there’s everyone else. Only Blue Origin, backed by its own billionaire founder in the person of Jeff Bezos, seems able to command the same degree of attention. And Blue Origin hasn’t even gone beyond suborbital space yet.
Rocket Lab might soon have something to say about that duopoly. The company, founded in New Zealand and headquartered in Long Beach, California, is second only to SpaceX when it comes to launch frequency—the two are ostensibly the only American companies that regularly go to orbit. Its small flagship Electron rocket has flown 18 times in just under four years and delivered almost 100 satellites into space, with only two failed launches.
On March 1, the company made its ambitions even clearer when it unveiled plans for a new rocket called Neutron. At 40 meters tall and able to carry 20 times the weight that Electron can, Neutron is being touted by Rocket Lab as its entry into markets for large satellite and mega-constellation launches, as well as future robotics missions to the moon and Mars. Even more tantalizing, Rocket Lab says Neutron will be designed for human spaceflight as well. The company calls it a “direct alternative” to the SpaceX Falcon 9 rocket.
“Rocket Lab is one of the success stories among the small launch companies,” says Roger Handberg, a space policy expert at the University of Central Florida. “They are edging into the territory of the larger, more established launch companies now—especially SpaceX.”
That ambition was helped by another bit of news announced on March 1: Rocket Lab’s merger with Vector Acquisition Corporation. Joining forces with a special-purpose acquisition company, a type of company that ostensibly enables another business to go public without an IPO, will allow Rocket Lab to benefit from a massive influx of money that gives it a new valuation of $4.1 billion. Much of that money is going toward development and testing of Neutron, which the company wants to start flying in 2024.
It’s a bit of an about-face for Rocket Lab. CEO Peter Beck had previously been lukewarm about the idea of building a larger rocket that could launch bigger payloads and potentially offer launches for multiple customers at once.
But the satellite market has embraced ride-share missions into orbit, especially given the rise of satellite mega-constellations, which will probably make up most satellites launched into orbit over the next decade. Neutron is capable of taking 8,000 kilograms to low Earth orbit, which means it could deliver potentially dozens of payloads to orbit at once. As a lighthearted mea culpa, the introductory video for Neutron showed Beck eating his own hat.
Recovering from the SolarWinds hack could take 18 months
SolarWinds Orion, the network management product that was targeted, is used in tens of thousands of corporations and government agencies. Over 17,000 organizations downloaded the infected back door. The hackers were extraordinarily stealthy and specific in targeting, which is why it took so long to catch them—and why it’s taking so long to understand their full impact.
The difficulty of uncovering the extent of the damage was summarized by Brad Smith, the president of Microsoft, in a congressional hearing last week.
“Who knows the entirety of what happened here?” he said. “Right now, the attacker is the only one who knows the entirety of what they did.”
Kevin Mandia, CEO of the security company FireEye, which raised the first alerts about the attack, told Congress that the hackers prioritized stealth above all else.
“Disruption would have been easier than what they did,” he said. “They had focused, disciplined data theft. It’s easier to just delete everything in blunt-force trauma and see what happens. They actually did more work than what it would have taken to go destructive.”
“This has a silver lining”
CISA first heard about a problem when FireEye discovered that it had been hacked and notified the agency. The company regularly works closely with the US government, and although it wasn’t legally obligated to tell anyone about the hack, it quickly shared news of the compromise with sensitive corporate networks.
It was Microsoft that told the US government federal networks had been compromised. The company shared that information with Wales on December 11, he said in an interview. Microsoft observed the hackers breaking into the Microsoft 365 cloud that is used by many government agencies. A day later, FireEye informed CISA of the back door in SolarWinds, a little-known but extremely widespread and powerful tool.
This signaled that the scale of the hack could be enormous. CISA’s investigators ended up working straight through the holidays to help agencies hunt for the hackers in their networks.
These efforts were made even more complicated because Wales had only just taken over at the agency: days earlier, former director Chris Krebs had been fired by Donald Trump for repeatedly debunking White House disinformation about a stolen election.
How Apple’s locked down security gives extra protection to the best hackers
“It’s a double-edged sword,” says Bill Marczak, a senior researcher at the cybersecurity watchdog Citizen Lab. “You’re going to keep out a lot of the riffraff by making it harder to break iPhones. But the 1% of top hackers are going to find a way in and, once they’re inside, the impenetrable fortress of the iPhone protects them.”
Marczak has spent the last eight years hunting those top-tier hackers. His research includes the groundbreaking 2016 “Million Dollar Dissident” report that introduced the world to the Israeli hacking company NSO Group. And in December, he was the lead author of a report titled “The Great iPwn,” detailing how the same hackers allegedly targeted dozens of Al Jazeera journalists.
He argues that while the iPhone’s security is getting tighter as Apple invests millions to raise the wall, the best hackers have their own millions to buy or develop zero-click exploits that let them take over iPhones invisibly. These allow attackers to burrow into the restricted parts of the phone without ever giving the target any indication of having been compromised. And once they’re that deep inside, the security becomes a barrier that keeps investigators from spotting or understanding nefarious behavior—to the point where Marczak suspects they’re missing all but a small fraction of attacks because they cannot see behind the curtain.
This means that even to know you’re under attack, you may have to rely on luck or vague suspicion rather than clear evidence. The Al Jazeera journalist Tamer Almisshal contacted Citizen Lab after he received death threats about his work in January 2020, but Marczak’s team initially found no direct evidence of hacking on his iPhone. They persevered by looking indirectly at the phone’s internet traffic to see who it was whispering to, until finally, in July last year, researchers saw the phone pinging servers belonging to NSO. It was strong evidence pointing toward a hack using the Israeli company’s software, but it didn’t expose the hack itself.
Sometimes the locked-down system can backfire even more directly. When Apple released a new version of iOS last summer in the middle of Marczak’s investigation, the phone’s new security features killed an unauthorized “jailbreak” tool Citizen Lab used to open up the iPhone. The update locked him out of the private areas of the phone, including a folder for new updates—which turned out to be exactly where hackers were hiding.
Faced with these blocks, “we just kind of threw our hands up,” says Marczak. “We can’t get anything from this—there’s just no way.”
Beyond the phone
Ryan Storz is a security engineer at the firm Trail of Bits. He leads development of iVerify, a rare Apple-approved security app that does its best to peer inside iPhones while still playing by the rules set in Cupertino. iVerify looks for security anomalies on the iPhone, such as unexplained file modifications—the sort of indirect clues that can point to a deeper problem. Installing the app is a little like setting up trip wires in the castle that is the iPhone: if something doesn’t look the way you expect it to, you know a problem exists.
But like the systems used by Marczak and others, the app can’t directly observe unknown malware that breaks the rules, and it is blocked from reading through the iPhone’s memory in the same way that security apps on other devices do. The trip wire is useful, but it isn’t the same as a guard who can walk through every room to look for invaders.
Despite these difficulties, Storz says, modern computers are converging on the lockdown philosophy—and he thinks the trade-off is worth it. “As we lock these things down, you reduce the damage of malware and spying,” he says.
This approach is spreading far beyond the iPhone. In a recent briefing with journalists, an Apple spokesperson described how the company’s Mac computers are increasingly adopting the iPhone’s security philosophy: its newest laptops and desktops run on custom-built M1 chips that make them more powerful and secure, in part by increasingly locking down the computer in the same ways as mobile devices.
“iOS is incredibly secure. Apple saw the benefits and has been moving them over to the Mac for a long time, and the M1 chip is a huge step in that direction,” says security researcher Patrick Wardle.