The last few months of reproductive rights in America have looked like a cheap Handmaids Tale rip-off: a rushed nomination of a conservative judge to the Supreme Court; the president spreading lies about late-term abortions; and, in a cinematic flourish, the spread of a deadly pandemic that shuttered abortion clinics in multiple states.
But amid this reproductive dystopia, abortion-access organizations have quietly introduced modern solutions to an increasingly regressive present. Abortion fundsdozens of groups around the country that help people fund and access abortionsare rolling out programs and applications to make their work easier, even as politicians to try to make it harder.
From an Uber-style service to drive patients to their abortions to password-protected lockboxes of cash to help them pay for it, abortion rights advocates are paving the way for a high-tech abortion revolution.
Katie Sullivan, a former board member of the Houston-based Clinic Access Support Network and the organizations resident gear head, spent the last year developing an app that connects volunteer drivers with people who need a ride to clinics. CASN has more than 75 volunteers who have provided more than 1,000 rides a year since 2017a service that is desperately needed in Texas, where more than a million people live 250 miles from their nearest clinic.
Until recently, CASN volunteers were using a combination of text messages and a restaurant scheduling platform called Sling to assign and schedule drives. The system was not secure and not particularly enjoyablebeing a ride dispatcher was like like being a 911 dispatcher for abortion, for free, Sullivan saidso she and a few other volunteers set out to create their own.
Most people come to this cause not as experts, just as varying people trying to get something done, Sullivan said. And I saw a lot of potential [for technology] to better help these folks, to better work with other organizations.
Groups like Sullivans have multiplied in recent years, due to an increase in restrictive laws laws that make it harder for people to get an abortion when they want to, where they want to. The National Network of Abortion Funds currently lists at least 80 such groups across the country. They offer different servicesrides, funding, childcare, plane ticketsbut all have the same goal: bridging the widening gap between needing an abortion and getting one.
Even as abortion funds have become more popular, however, most remain small, slightly disorganized, and distinctly grassroots. (CASN, for example, raised approximately $68,000 in 2018, according to tax records. The local Planned Parenthood raised $5 million.) Many are, as Sullivan put it, run on a spreadsheet and a prayer. Because of this, their systems are primed for what venture capital vultures would call disruption and what most volunteers would call using technology to make their lives easier.
Perhaps the expert on this is Colin Fleming, a software engineer and former DC Abortion Fund board member who in 2015 helped create what has become a blueprint for abortion access technology. Back then, DCAF was growing faster than it knew how to keep up with. Volunteers were taking more than 3,500 calls a year, but still logging the details in Excel spreadsheets. Fleming, along with a few case managers, decided to attend a local Code for America Brigade meeting to see if they could get some help. Someone there connected them to a designer, who connected them to a project manager, who worked with them for a year to develop the perfect product for their needs.
The result is what is now affectionately known as DARIAa seamless system for logging what every caller needs and what support theyve already gotten. The idea, Fleming explained, was to enable volunteers to act more like an account manager who knows their clients needs front to back, rather than a medical receptionist who makes them go through their entire health history at every visit. With DARIA, volunteers spend more time making connections with callers and less time digging through spreadsheets, and feel significantly less burned out.
So far, DCAF has introduced DARIA to six other funds and several more are waiting in the wings. The project, Fleming said, has been a huge success story for DCAFas well as a rewarding way to pay it forward to other funds.It was a real sea change for the organization, he said.
Not everyones high-tech transition has been as easy. CASN rolled out its new driver app on Feb. 23three weeks before Texas Gov. Greg Abbott issued a statewide lockdown order. The governors order also temporarily shuttered all abortion clinics in the state, making CASNs services even more necessary at a time when it couldnt provide them. The group wound up partnering with similar organizations in surrounding states to get abortion-seekers to the nearest functioning clinic.
To this day, CASN hasnt felt comfortable providing rides in Texas. Sullivan is working on adapting the technology to track rides they fund through third-party apps like Uber and Lyft, and to anonymously record data on the most common requests they receive. But the most important lesson the pandemic taught her, she said, was that abortion access groups need to adapt their technology to work togetherand fast.
"If Roe falls, [this is] what the landscape is going to be like, and so we had an interesting test run of what thats going to necessitate, she said. That means were going to have to build systems that let us all work well together, even many states away.
To that end, Sullivan is working on sharing the driver app with the Chicago-based Midwest Access Coalition, which helped CASN when Texas clinics were shut down. And MAC is thinking of sharing its own app, which allows abortion-seekers to pick up cash at lockboxes around the area in order to pay for their procedures. The shutdown, Sullivan said, made us think we need to find better ways that we can coordinate and do our work together. And I see a lot of room for growth and potential there.
Pretty much everyone working for an abortion fund knows that that if the Supreme Court overturns Roe v. Wade, the decision making abortion legal nationwide, their work will become a lot more important. (As Robin Marty, a longtime movement journalist, recently told The Cut: Were getting to a point where we are literally talking about a region [in the South and Midwest] in which every person who needs an abortion will have to fly somewhere.) But they also know it could get a lot more dangerous. If states pass laws criminalizing abortion providersas several have already triedwhats to stop them from criminalizing volunteers who get patients to a state where the procedure is legal, or even criminalizing the patients themselves?
That's a reality that the Mountain Access Brigade already faces on a daily basis. The Tennessee-based abortion access group provides what its founders like to call wraparound careabortion doula services, education, and financial assistance, all with a welcoming and gender-inclusive lens. Often, this means advising people on how to access an abortion in Appalachia. Occasionally, it means telling them how to get abortion pills at home.
Providing information on at-home abortion isnt necessarily illegal in Tennessee, but performing one is. (Despite the fact that medication abortion is safer than common drugs like Viagra and penicillin, 18 states still require it to be administered in a doctors office.) Because of this, MAB volunteers follow stringent security practices, using pseudonyms and communicating via encrypted apps like Signal. Asked how the overturn of Roe would change their work, Aria Taibi, the organization's outreach director, replied: We already operate under the assumption that what we do could become illegal at any moment.
Thats one of the reasons MAB launched Katie, an encrypted messaging platform named after the pseudonym used by all of its volunteers. The platform functions much like DARIA, allowing case managers to track their clients needs and progress, but it also allows users to securely send and receive texts and voice messages. The service operates as a warm line: callers leave a voicemail and the system automatically assigns a volunteer to call back and assist them. Callers are not required to leave any identifying information, and the whole process is end-to-end encrypted.
The point of all the secrecy is to protect the volunteers, as well as the callers. Multiple women have been accused of performing their own abortions after suffering miscarriages in recent years, and several have gone to trial. MAB seeks to be a resource where abortion-seekers can find accurate, unbiased informationwithout leaving an incriminating search history behind for abusive partners, judgmental parents, or aggressive prosecutors to find.
The last thing we want is [for] someone to contact us about their abortion and then miscarry and be taken to court and go to prison for supposedly inducing their miscarriage, Taibi said.
They have found ways to criminalize reproduction, and so when communicating about it, you just have to be careful, they added. It pays to be very safe.
This level of vigilance isnt unique to MAB. Advocates are keenly aware that the other sidethe antis, as they call themare also upping their tech game. In 2016, hackers breached the website of the National Network of Abortion Funds and sent hundreds of emails bearing anti-abortion messages. The year before, hackers tried and failed to shut down the national Planned Parenthood website.
Because of this, programmers talked about instilling a culture of security at their organizations, from teaching volunteers to use password managers to baking safety features into their apps. (The CASN driver app, for instance, automatically deletes identifying information every month.) Sullivan compared the security practices to hand-washinga simple habit to shield organizations from attacks to their systems. She said she tells new volunteers: Part of caring about these vulnerable [callers] is making sure theyre secure.
But there are limits to what technology alone can do. And part of the irony of talking about all this technology, Fleming admitted, is that despite all of his organizations advancements, getting an abortion in most states is harder now than it was four years ago, when the project began.
Theres a theory of abortion funds that [they] plug holes, and were kind of plugging holes, he said.
DARIA doesnt get anyone an abortion on their own. DARIA is one negotiable step in a big-ass supply chain, he added later. Were helpful, but programming isnt going to fix the world."
See the rest here:
Reproductive Rights Groups Go High-Tech With 'Uber for Abortion' and Encryption - The Daily Beast
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]