E-Waste Challenges: A Guide to Recycling Old Mobile Phones and Computers

I The development of electronics that support our daily lives requires significant time, resources, and fossil fuels. The journey from mining rare earth materials to processing, manufacturing, and shipping creates immense waste. The innovations in engineering and logistics that allow consumers to buy new mobile phones annually contribute to this issue.

According to the latest Global E-Waste Monitor, the world generates 62 million tons of electronic waste each year, with projections estimating e-waste emissions could reach 82 million tons by 2030. Australia contributes 580,000 tonnes of this annually. Factors like planned obsolescence, technological advancements, and device failures are expected to escalate this figure.

It’s estimated that 23 million mobile phones are unused and gathering dust in drawers across Australia, some of which are truly non-functional. Research indicates that the average Australian produces around 22kg of e-waste annually, nearly three times the global average, according to recent studies from the Productivity Commission.

“It’s the fastest growing waste stream, but it’s also the most valuable,” states Anne Stonier from the Australia New Zealand Recycling Platform (ANZRP). “Electronics also contain substantial amounts of hard plastics. Recycling can help ensure these materials are managed responsibly, contributing to a more circular economy.”

Wondering where to dispose of your old phone? Concerned about keeping your sensitive data safe? Here are some things to consider when recycling your old device.

Discover Local Recycling Programs

Recycling e-waste is more complex than merely putting it in the yellow bin. The first step is to identify local options available to you. For instance, local councils often have designated collection points and e-waste recycling programs. The locations may vary, and e-waste is banned from landfills in Victoria, South Australia, and Western Australia.

Additionally, several major retailers run recycling initiatives. Officeworks, for example, collects and recycles batteries, computer accessories, printer cartridges, and mobile phones. Their drop-off days apply to many other electronic products as well. Bunnings also offers collection bins for batteries and larger electronics like TVs, computers, and printers. The Mobile Muster program, run by the Australian telecommunications sector, collects a variety of devices, including mobile phones and streaming devices.

Many manufacturers also have take-back programs, allowing customers to trade in their old devices for discounts or credits on future purchases. If you’re thinking of upgrading, explore the options available to you.

Some charities accept donations of electronic devices, such as DV Safe Phone and Reconnection Project, which refurbish used devices and distribute them to those in need.

Disposing of Devices that Store Personal Information

Devices, whether it be a smartwatch tracking your daily runs or a tablet previously used for work, often store sensitive personal information.

Before disposing of electronic items, remember to back up or transfer any important files to another device or storage option (like an external hard drive or cloud service) and remove any identifying marks or stickers from the device.

What happens next depends on the device. For most smartphones, tablets, and smart devices, a factory reset will suffice. For computers, laptops, hard drives, and USBs, reformatting the drive and restoring factory settings should be enough. Don’t forget that fax machines, printers, and scanners may retain copies of printed documents, so perform a factory reset on those as well.

Finally, ensure you unpair your old device from any remaining computers or gadgets.

If your device is so outdated that it won’t power on and can’t connect to your computer, there’s not much you can do. Just make sure to remove any external memory cards before recycling.

What If My Device Contains Highly Sensitive Information?

Physically destroying a device, like drilling holes in a hard drive, is usually ineffective and counterproductive to the recycling process. It may also pose dangers, especially with devices featuring non-removable batteries, which could cause explosions and health hazards.

For devices containing highly confidential information you want to ensure is irretrievable, consider using data sanitization software to reformat your device and encrypt the hard drive. Secure data erasure services are also available, though their offerings and prices can differ widely. Some companies may provide free data destruction for donated hard drives so they can be repurposed, while other services are geared toward larger enterprises.

Some specialized recyclers also offer data destruction services, Stonier mentioned. “If you’re worried about your information falling into the wrong hands, it’s best to wipe it,” she advises. “Better safe than sorry.”

What Happens If I Don’t Take Any Action?

The severity of potential threats can vary. A hard drive filled solely with family photos poses less risk than one containing sensitive financial data. For the majority, it’s improbable they would be specifically targeted unless there’s a clear motive or pre-existing vulnerability.

Criminal activity is often opportunistic, and taking basic precautions can prevent future issues and anxieties.

Source: www.theguardian.com

Prohibiting Phones in Schools Might Negatively Impact Certain Students’ Mental Well-Being

Some schools mandate that students store their cell phones in lockers throughout the school day.

Robin Utrecht/Shutterstock

Concerns about the adverse effects of excessive screen time are growing. Specifically, phone usage in educational settings can detract from learning experiences. However, some studies indicate that outright banning smartphones from schools can lead to feelings of loneliness among students, at least initially.

“When a school opts to completely prohibit smartphones, several factors should be considered,” explains Sanyogita Kare from Radboud University in the Netherlands. “Socially vulnerable youth may face additional challenges, leading to a possible sense of estrangement from peers.”

Mobile phones and similar devices have been linked to various issues, ranging from declining academic performance to worsening mental health among adolescents. However, there is a lack of concrete evidence supporting these claims. As of January 1, 2024, the Netherlands has instituted a ban on the use of smartphones and other smart devices in classrooms. Many schools enforce strict rules, prohibiting students from using such devices at all during class and often requiring that they be stored in lockers.

Seeking to unravel this impact, Carré and colleagues conducted a study with students from two middle schools in the Netherlands, both of which disallow smartphone usage during class. Surveys were administered initially in December 2023, prior to the nationwide ban, and repeated in March or April 2024.

The researchers aimed to analyze two types of loneliness: social loneliness and emotional loneliness. “Social loneliness pertains to your overall network and feelings of group belonging,” states Carre. “Emotional loneliness speaks to the depth of connection in close friendships.”

Upon comparing loneliness rates before and after the ban, findings were mixed. “Though we did not observe a significant change in social loneliness, there was a slight uptick in psychological loneliness,” Carre mentions. This surge may occur if some classmates are absent, thereby limiting students’ ability to connect with close friends during the school day.

The research also revealed that while the general sense of social loneliness didn’t rise among children, those who found social interactions more challenging were likely to feel increased loneliness. Carre notes that these impacts might not be long-lasting as students adjust to the ban over time.

A limitation of the study is that there was no comparison made with other Dutch schools where regulations are more lenient, such as allowing phones during breaks. Jonathan Canter from RAND, a U.S. nonprofit research organization, states, “To draw meaningful comparisons, we need data from similar students in schools without prohibition. Without that, we can’t ascertain whether our findings reflect broader patterns.”

Both Carre and Cantor express that there’s a gap in fundamental data regarding the effects of phone bans in schools. Canter and his team have recently attempted to address this issue by looking into voluntary bans on phones in U.S. schools.

They discovered significant variability in policies; certain schools enforce total bans on phones, while others permit their use at the discretion of teachers. In the UK, government guidelines suggest the use of phones in schools but leave the final decision to the discretion of school leaders regarding whether these devices should be banned.

“The pressing issue is the need for rigorous evaluations to assess the effectiveness of these policies at the school level. This requires detailed data on the types and timing of policies implemented,” Kanter states. “This is the focal point of current analysis efforts.”

topic:

Source: www.newscientist.com

ICE Acquires Israeli-Made Spyware Capable of Hacking Phones and Encrypted Apps

Following the Trump administration’s decision, US immigration agents now have access to one of the most advanced hacking tools available globally, having secured a contract with Paragon Solutions, a company based in Israel, to develop spyware capable of infiltrating any phone, including encrypted applications.

The Department of Homeland Security initially established a contract with Paragon, a subsidiary of a US firm, in late 2024 during the Biden administration. However, this $2 million contract was suspended pending confirmation of an executive order that limits the application of US government spyware, as reported by Wired at that time.

According to recent updates, the suspension has been lifted. Public Procurement Documents now identify US Immigration Customs Enforcement (ICE) as the contracting agency.

This signifies that one of the most potent stealth cyber weapons ever engineered—created outside the United States—now resides with agencies that have been repeatedly accused of violating due process rights by private sectors and human rights organizations.

This information was first highlighted by journalist Jack Paulson in the All Source Intelligence Saback Newsletter.

Neither Paragon nor ICE immediately responded to inquiries for comments.

Once effectively utilized against a target, the hacking software known as Graphite can infiltrate any phone. By essentially gaining control over the device, users (in this instance, ICE) can monitor an individual’s location, access messages, view photos, and even read data stored in encrypted applications like WhatsApp and Signal. Additionally, spyware such as Graphite can function as a listening device by activating the phone’s recorder.

An executive order signed by the Biden administration sought to implement restrictions on the use of spyware by the US government, asserting that it must refrain from operating commercial spyware that poses significant risks to intellectual property or security concerns for the US, or creates a substantial risk of inappropriate usage by foreign entities. The Biden administration even took the extraordinary step of blacklisting rival spyware manufacturer NSO Group, underlining their alleged facilitation of targeted attacks on the mobile phones of adversaries, human rights defenders, and journalists.

Paragon aims to differentiate itself from NSO Group, stating that it exclusively engages with democratic entities and has a strict policy against providing services to clients that may misuse the technology against civil society members, such as journalists. Paragon has yet to disclose its clients, claiming no insight into how its clientele may target particular individuals.

Spyware developers like Paragon and NSO assert that their technologies are intended for preventing crime and curtailing terrorist threats. Nevertheless, past incidents have showcased the software being misused to harass innocent individuals, including those perceived as opponents of the government.

John Scott Railton, a senior researcher at the University of Toronto, stated that spyware like Graphite is being exploited by governmental bodies. He remarked that such tools are “designed for dictatorship, not democracies that prioritize freedom and individual rights.”

“The invasive and secretive nature of hacking abilities is corrupting. Consequently, a growing number of democratic surveillance scandals, including those involving Paragon’s Graphite, are emerging,” he added.


Paragon severed ties with Italy after it was uncovered that 90 individuals, including journalists and civil society figures, had been targeted with spyware across multiple countries. Those targeted by the Italian government included rights advocates critical of its dealings with Libya. Several journalists were also among those targeted, yet the motivations behind these hacking campaigns remain unclear.

The US government is apprehensive about deploying spyware technology outside its borders, as the companies providing these technologies to various nations pose potential security threats.

“As long as the same commercial spyware technology is shared among multiple governments, a built-in counterintelligence risk is present. All these entities are aware of the secret surveillance technologies employed by the US and can anticipate how to detect and counteract them,” Scott Railton remarked. “We remain uncertain of the implications since we face a shortage of avenues to cancel all foreign contracts with Paragon.”

Nadine Farid Johnson, the policy director at Columbia University’s Knight First Amendment Institute, dedicated to promoting free speech, expressed concerns over the “rapid and dramatic expansion of ICE’s budget and authority,” calling for congressional restrictions on the contexts in which spyware may be employed.

“Spyware like Paragon’s Graphite represents a profound threat to free speech and privacy,” Farid Johnson stated. “It has been previously used against journalists, human rights advocates, and political dissenters. The quiet reinstatement of the suspension order raises serious questions over whether certain administrative departments are bypassing the government’s own review protocols.”

Quick Guide

Please contact us about this story

show

The best public interest journalism relies on direct accounts from knowledgeable sources.

If you have any information to share on this topic, please reach out to us confidentially using the following methods:

Secure Messaging in the Guardian App

The Guardian app features a tool for submitting tips about stories. All messages are encrypted end-to-end and are disguised within the routine operations of the Guardian mobile app, preventing observers from knowing that you’re communicating with us.

If you haven’t yet downloaded the Guardian app, please do so (iOS/Android) and navigate to the menu to select ‘Secure Messaging’.

SecureDrop, Instant Messenger, Email, Phone, Post

If you’re able to use the TOR network securely without being tracked, you can send messages and documents to the Guardian through our SecureDrop platform.

Finally, our guide at theguardian.com/tips provides various secure contact methods and outlines their pros and cons.

Illustration: Guardian Design / Rich Cousins

Thank you for your feedback.


Source: www.theguardian.com