CS1105 Computing and Society 2008/2009 Semester One Team Assignment Case Write-up on ICT in Beijing Olympics Tutorial Group: 17 Tutor: Padmani d/o Visayakumaran Team 17D Ding Bei Hong U087815H Jin Yuwei U087247E Tan Theng Lee U065410X Toh Hui Yee U087108J Zhang Han U087267X Content Page 1. Introduction 2. Ubiquity of ICT use in Beijing Olympics 2.1 Games operations 2.2 Data transmission 2.3 Online digital media coverage 2.4 Online ticketing system 2.5 Traffic management system 2.6 Security 2.7 Achieving a Green Olympics 3. Reliability of ICT deployed in Beijing Olympics 3.1 Olympic risk management 3.2 Unexpected online ticketing system failure 4. Intellectual Property Rights Issue 4.1 Online digital media rights 5. Other ICT-Related Issues ICT in Beijing Olympics 1. Introduction The 2008 Beijing Olympics, officially known as the Games of the XXIX Olympiad, was a greatly anticipated global multi-sporting event. In both the preparation for and duration of the Olympics, Information and Communications Technology (ICT) has been extensively utilized in various aspects to ensure the smooth-running of the event. Besides the Beijing Organizing Committee for the Games (BOCOG), Atos Origin, Samsung and Lenovo were some of the other major players involved in the construction of the IT infrastructure behind the games. The three companies were responsible for systems integration, wireless communication and computer equipment provision respectively. 2. Ubiquity of ICT use in Beijing Olympics The deployment of ICT was seen in many areas, such as the following: 2.1 Games Operations The Games Management System (GMS), developed in Java by Atos Origin, a Francebased IT services company, was vital in supporting the “planning and operation of the Games, including staffing, accommodation, travel, and medical operations” (Schwankert, 2008). For instance, the accreditation system application under the GMS was used to assign “access rights to athletes, coaches, officials, staff, the media and volunteers” (Steve, 2008), which highly sped up the process of accessing gaming data for the relevant parties. 2.2 Data Transmission The Information Diffusion Systems (IDS) was the other core pillar used to store and transmit data efficiently (Steven, 2008). Being involved in integrating the timing and scoring of the games results by Omega, the IDS allowed the recording of the athletes’ timings to be accurate and without dispute, thus ensuring the fairness of the events. For instance, the touching pads in the swimming pools were embedded with sensors that would transmit data to the IDS to record the time taken by each swimmer in the competition, thus determining the ranking effortlessly. 2.3 Online Digital Media Coverage ICT was utilized during the Beijing Olympics to provide online digital media coverage of the Olympics games. ICT provided millions of online viewers with the ability to view the Beijing Olympics through a variety of digital media platforms, such as the broadband, mobile and Internet Protocol Television (IPTV) platforms. The online viewers were also given the choices to either watch the live broadcast of the games or to catch the games using ondemand video streams. 2.4 Online Ticketing System The Online Ticketing System was introduced in 2007 to automate the purchase of tickets for the Beijing Olympics (BOCOG, 2008). The system was convenient and an easy-tofollow procedure for online registration and payment (Figure 1) was put up on the official ticketing website. Figure 1: The Official Ticketing Website provided a guideline for users to follow. All the updated Olympic Ticketing information can be checked out easily on the website. People were encouraged to use VISA Cards for online payment, which reduced a great deal of manual process. 2.5 Traffic Management System ICT was also evident in the management of traffic. The Intelligent Transportation System (ITS), an information-based, intelligent form of transportation system, was constructed and focused on three aspects. Firstly, an online service was created, whereby detailed information regarding public transport to the Olympic venues was provided on the Beijing Olympic Transportation Website. In addition, real-time traffic information of the entire traffic net in Beijing was publicized to guide people in reaching and leaving the venues effectively. Secondly, special hotlines were opened for the public to enquire traffic advice. According to the Beijing Municipal Committee of Communications, the hotline “122” offered help to foreign guests in eight languages, including English, French, German and Spanish. Thirdly, dynamic in-car navigation instruments were installed in vehicles to not only provide directions, but also enable drivers to check the real-time traffic conditions momentarily in order to design a path that would avoid the jam. As such, ICT proved its usefulness in the various ways it could be employed to mitigate traffic flow severity and aid in its smooth flow in Beijing during the Olympics. 2.6 Use of ICT in Security The use of ICT for security topped as one of the most important areas being emphasized by BOCOG and are reflected in the following aspects: access control and security monitoring. Firstly, two main ICT technologies were used to control access during the Beijing Olympics, namely biometric smart cards and Radio Frequency Identification (RFID). Biometric smart cards were designed to control the access to the Beijing Olympic Reunion Center. All the guests of the Reunion Center had their own smart cards, which contained their encoded fingerprint data (SecureIDNews, 2008). Cardholders were required to use their smart cards whenever they intended to enter the Reunion Center. On the other hand, RFID was employed in the ticketing at the Games. RFID chips were embedded in the tickets and connected to a remote database to verify authenticity and thus enabled anticounterfeiting (Wong, 2008). Secondly, security monitoring was applied to the entire city of Beijing. During the event, IBM was responsible for providing real-time surveillance on public places by using its new S3, which stood for Smart Surveillance System (U.S.-China Surveillance, 2007). According to Julie Donahue, the S3 is able to reuse an existing infrastructure to do higher level of analyses as well as provide real-time alerts (U.S.-China Surveillance, 2007). As a result, the physical security of Beijing was strongly tightened and the safety of the people was more robustly protected. 2.7 Use of ICT in Achieving a Green Olympics In order to realize a Green Olympics, ICT assumed a significant role in minimizing the impact of the Olympics on the environment. Firstly, high-bandwidth networks allowed video content to be transferred from Beijing to New York for NBC Universal, broadcaster which held exclusive U.S. media rights to the Olympic Games, for coverage of the events. As such, shot selectors and editors numbering to 400 did not have to relocate themselves to Beijing (Cisco 2008). Also, remote access was enabled to the Commentator Information System, a Java-based system allowing broadcasters to obtain real-time results and data feeds in their country of operation (Steven, 2008). These ICT applications greatly reduced the need for travel, thereby saving on the 800 airplane trips and fuel energy required (Cisco, 2008). In constructing new facilities required for the Olympics, the designs were embedded with Metasys Building Management Systems (Milwaukee, 2008). Such smart systems incorporated an Internet Protocol (IP)-based network that combined networks that carried building information systems with those that carried voice and data (Ong, 2008). The management of all the information systems in a building through a centralised control room helped to save on power consumption and thus reduced the footprint on the environment. 3. Reliability and Security of ICT deployed in Beijing Olympics 3.1 Olympic Risk Management Systems’ security in Beijing Olympics was the most important task of the IT team spearheaded by Atos Origin. As the scale of IT infrastructure for the Beijing Olympics was massive, the frequency of computer issues expected was greater. To allay the fear that there could be “3 million abnormal IT behaviour” (Jack, 2008), such as user error and security breach, the team adopted a “conservative and cautious” approach to risk management. Three key areas were focused on – security architecture, risk management and security operations – to ascertain that any potential threats within or outside the Games network could be addressed effectively. To guarantee and improve the usability of the IT systems to be deployed, integration tests were executed at least a year before the Beijing Olympics began. Around “10 000 test cases” were generated to assess the systems, which amounted to over “200 000 hours” (Jack, 2008). These test cases ranged from making sure Chinese language was displayed on the public scoreboards at the competition events, to what would happen if there were a mass food poisoning resulting in lack of IT personnel. Nevertheless, much as these technical rehearsals were extensive and rigorous, they were unable to fully simulate the Olympics, thus risks were still involved in the Olympics and the IT team had to maintain full vigilance and alertness throughout the events. Besides the large number of tests to verify the systems’ robustness (Thomson, 2008), intrusion detection systems and anti-virus software were also installed to shield the entire network of systems from malicious codes and other possible security attacks via the Internet. As such, the computer systems implemented at the Beijing Olympics were secured strongly and considered sufficiently reliable. 3.2 Unexpected Online Ticketing System Failure Although the Online Ticketing System was a widely preferred purchasing medium, design errors caused it to crash shortly after the tickets went on sale to the public in November 2007. The paralysis of the system was caused by the purchase of 200 000 tickets per minute, which had far exceeded the system’s designed processing capability of only 150 000 tickets per minute (Sumner, 2007). The slowdown of the process resulted in buyers having to spend 3 to 4 hours to complete the online purchase, causing much distress and frustration among buyers. Many resorted to purchasing the tickets from the Bank of China despite the long queue required. Eventually, the errors in the system could not be rectified and the ticketing policies were adjusted to allow tickets to be allocated through a Lottery System (BOCOG, 2008). 4. Intellectual Property Rights Issue 4.1 Online digital media rights The International Olympics Committee (IOC) offered a great amount of quality Olympics event coverage to viewers around the world by working with official rights holders. The IOC worked closely with rights holders to minimize the risk of online piracy and protected the exclusive rights of the event content with sophisticated anti-piracy campaign. The Chinese government also ordered the top ten web sites in China, such as Sina, Netease and Sohu, to sign an agreement prohibiting the provision of any digital media that would violate the rights of China Central Television (CCTV), the official Internet broadcaster of the games in China. The IOC also made use of advanced technologies to check the Internet for unauthorized Olympic content. The video fingerprinting technology and sophisticated web crawling techniques helped to prevent, track, and take action against any uploading of unauthorized content of the events. The IOC also cooperated with video sharing websites to monitor additional copyright infringement. A video showing students’ protest for Tibet was uploaded on YouTube during the Beijing Olympics. The video was later requested by the IOC to be taken down and the IOC filed a copyright infringement claim against the video (see appendix figure 2). However, the copyright infringement was later withdrawn by the IOC. The IOC also censored Internet access at the Olympic venues during the events. Kevan Gosper, a senior member of the IOC, mentioned that the journalists in China would only be able to access websites whose content were related to Olympic competition. Information especially on political and human rights were blocked. The censorship caused human rights activists to criticize the IOC. 5. Other ICT-Related Issues While ICT has generally been used to further the progress of the Olympics operations, abuse of ICT has been cited during the Olympics period. According to enterprise security firm Secure Computing, a phenomenal rise of 360 million spam messages pertaining to Beijing Olympics was observed, infecting computer systems with a malware called Storm (Jack, 2008). Also, about 13 phishing attacks targeted at the Beijing Olympics have been detected since December 2007, most of which attempted to install Trojans via a Microsoft Office vulnerability on computers in military and government organizations (Darren,2008). Such attacks preyed on people’s curiosity and enticement towards the Olympics and posed severe security threats to business organizations in mainly Asia. On the overall, it can be seen that ICT use in today’s world is pervasive and while ICT provides more than satisfactory technical solutions to problems most of the time, much more can be done to improve the usability of certain systems to enhance reliability. -End(1964 words) References 1. Amnesty International USA. (2008). IOC caves in to China's demands on internet censorship. Retrieved 5th October, 2008 from http://www.amnestyusa.org/document.php?lang=e&id=ENGNAU200807305646 2. Beijing Municipal Committee of Communications. (2008). Beijing Municipal Traffic Management Bureau launch 10 convenient services to meet Olympic traffic needs and provide high-quality transport services for Beijing Residents. Retrieved October 6th ,2008 from http://2008.bjjtw.gov.cn/English/BJPnews/200808/t20080827_21111.htm 3. BOCOG. (2007). BOCOG modifies Phase 2 domestic ticketing policy. Retrieved October 7th, 2008 from http://en.beijing2008.cn/tickets/news/n214189957.shtml 4. BOCOG. (2007). Notice from the BOCOG Ticketing Center. Retrieved October 7th, 2008 from http://en.beijing2008.cn/tickets/news/n214189880.shtml 5. Cisco Systems, Inc. (2008). Broadcaster Provides Unprecedented Coverage of Beijing Olympics. Retrieved October 6th, 2008 from http://www.cisco.com/en/US/solutions/ns341/ns525/ns537/ns705/C36-49147900_NBC_External_CS.pdf 6. Darren, Pauli. (2008). Asia launches Olympic exploits at enterprise. Retrieved October 9th, 2008 from http://www.networkworld.com/news/2008/042408-asia-launches-olympic-exploitsat.html 7. David Batty. (2008). Media face web censorship at Beijing Olympics. Retrieved October 5th, 2008 from http://www.guardian.co.uk/world/2008/jul/30/china.olympicgames2008 8. Information of electronic products. (2008). HIGH-TECH OLYMPICS. Retrieved October 6th, 2008 from http://www.hitech2008.org.cn/docs/action_04_01/20080625/1214361838048.html 9. Jack, Loo. (2008). Making sure everything works at the Beijing Olympics. Retrieved October 7th, 2008 from http://www.networkworld.com/news/2008/050708-making-sure-everything-worksat.html?inform?ap1=rcb 10. Larry Kilman. (2008). Thousands Protest China's Press Freedom Violations. Retrieved October 2nd, 2008 from http://www.editorsweblog.org/newspaper/2008/07/thousands_protest_chinas_pre ss_freedom_v.php 11. Lenner, Sumner. (2007). China’s Olympic ticketing system crashes on first day. Retrieved on October 8th, 2008 from http://www.networkworld.com/news/2007/110207-chinas-olympic-ticketingsystem-crashes.html 12. Loo, Jack. (2008). Security firm warns against Olympic Scam. Retrieved October 8th, 2008 from http://www.networkworld.com/news/2008/081908-security-firm-warns-againstolympic.html?page=1 13. Milwaukee. (2008). Johnson Controls Serves as the Largest Provider of Sustainability Solutions for the Olympics. Retrieved October 6th, 2008 from http://www.prdomain.com/companies/J/JohnsonControls/newsreleases/200886605 82.htm 14. Ong, BK. (2008). Smart buildings, take two. Retrieved October 7th, 2008 from http://www.asiaone.com/Business/Story/A1Story20080723-78278.html 15. Philip Wong. (2008). RFID goes prime time in Beijing Olympics. Retrieved October 5th, 2008 from http://news.cnet.com/8301-17938_105-10010136-1.html 16. Rebecca Thomson. (2008). Photo story: Beijing Olympics IT team applies final touches. Retrieved October 5th, 2008 from http://www.computerweekly.com/Articles/2008/08/01/231718/photo-story-beijingolympics-it-team-applies-final.htm 17. Ross, O.Storey. (2008). Managing Olympic Risk. Retrieved October 8th, 2008 from http://www.networkworld.com/news/2008/021908-managing-olympic.html 18. SecureIDNews. (2008). Beijing Olympic Reunion Center access controlled with biometric smart cards. Retrieved October 5th, 2008 from http://www.secureidnews.com/2008/08/28/beijing-olympic-reunion-center-accesscontrolled-with-biometric-smartcards 19. Shoaib Hashmi. (2008). ‘International Olympic Committee’ reconsiders its decision of copyright violation claim on YouTube. Retrieved October 5th, 2008 from http://startupmeme.com/international-olympic-committee-reconsiders-itsdecision-of-copyright-violation-claim-on-youtube/ 20. Sports Business International. (2008). 2008 Olympics - the digital Games. Retrieved October 4th, 2008 from http://www.sportbusiness.com/news/167749/2008-olympics-the-digital-games 21. Sports Business International. (2008). Verizon and AT&T agree Olympic coverage deal with NBC. Retrieved October 4th, 2008 from http://www.sportbusiness.com/news/167508/verizon-and-at-t-agree-olympiccoverage-deal-with-nbc 22. Steve Ranger. (2008). Atos wants ‘invisible’ tech at Beijing 2008. Retrieved October 6th, 2008 from http://www.zdnetasia.com/news/hardware/0,39042972,62041150,00.htm 23. Steven Schwankert. (2008). Beijing Prepares for ‘High-tech Olympics’. Retrieved October 6th, 2008 from http://www.networkworld.com/news/2008/061208-beijing-prepares-for-hightech.html?page=3 24. Sun Wenjian & Tong Shuquan. (2008). HIGH-TECH OLYMPICS. Retrieved 6/10/2008, from http://www.hitech2008.org.cn/docs/action_04_01/20080805/1217903214718.html 25. U.S.-China Surveillance. (2007). IBM to scan Beijing streets at 2008 Olympics. Retrieved October 5th, 2008 from http://www.chinamatrix.com/surveillance/2007/12/12/ibm-to-scan-beijing-streetsat-2008-olympics/ Appendix Figure 2: IOC’s copyright notice on YouTube