Showing posts with label Law Enforcement. Show all posts
Showing posts with label Law Enforcement. Show all posts

November 17, 2013

Some Game This Is


I remember as a kid, my grandfather lived down the block from us on the Upper West Side in Manhattan. 

He was old and not in the best of health with a heart condition, hearing aids, and more. 

One day, he was coming home from the bank, and he went into the elevator in his building. 

He was followed by a punk, who after the elevator door closed, proceeded to grab my grandfather and choke him until he was unconscious. 

The thug took his wallet and left my grandfather on the floor of the elevator. 

Now, today I saw on the news about the Knockout Attack Game--and some "game" this is.

The attacker runs up behind the person unbeknownst and with full force slams their fist against a person head, knocking them unconscious, and when successful, this is done with one punch! 

In other cases, an entire gang will attack, punching and kicking a victim until they stop moving. 

While I couldn't locate the exact video that happened in a neighborhood in NY to a Jewish woman, this video of an attack on a Muslim girl in London about a year ago, approximates it very closely. 

While some victims of these attacks end up with broken jaws, skulls, shattered teeth, internal injuries, bleeding and more, others are not so lucky and end up dead. 

I never forgot what happened to my grandfather and the cowardly schmuck that attacked this old, helpless man--but at least, he apparently did it for the money. 

In these knockout attacks, when they ask the attackers why they do it, the response is for the fun and laughs. 

What a commentary of our society, when people brutally attack other people--not for money, revenge, self-defense, or principle--but simply to see others needlessly suffer and to take a form of intense joy in it. 

Perhaps, there are certain crimes for which the L-rd above must look down and mete out his own version of justice, in a way that restores order to this world of hope and despair.
Share/Save/Bookmark

May 19, 2013

Women, Not Things

In the context of the brutal raping and murder last year of a 23-year old women on a bus to the disgusting rape of a 5-year girl more recently in India, the Wall Street Journal (17 May 2013) has an article on "To Wed Your Rapist, or Not: Indian Women on Trial."

It is an eye-opening article about the prejudices and horrible injustices that women face in India and other countries--and it's not only due to the misogyny of some, and power- and pleasure-seeking of others, but it is based also on justices, lawyers, law enforcement, legislators, and spiritual figures in society that perpetuate the oppression of woman. 

Some societies are stacking the deck, so women cannot reasonably win due protection--from legislators who do not write and pass substantive and equitable laws to protect women, to law enforcement that will not commit the resources to pursue the rapists and women beaters, to lawyers and judges that raise ridiculous demands for proving guilt and sentencing, and to spiritual leaders that blame the victim rather than hold the perpetrators to task. 

These people who are supposed to bring justice to the victims, instead add insult to injury. Some of these include:

- Ruling against rape victims because they didn't successfully fight back. For example, a "lower court ruled that she was lying citing among other things the fact that she could have scratched the man's genitals, but didn't."

- Professing that victims are at fault for causing the rape, such as by wearing skirts, having male friends (i.e. "asking for it"), or otherwise dressing or behaving immodestly. At the extreme, one prominent spiritual figure actually held that the victim could've avoided trouble if she had "chanted a prayer, taken one of her attackers by the hand, and called him 'brother'"--as if one can convince an attacker not to attack by holding their hands and gushing brotherhood.

- Teaching that rape is not possible for strong women or those of a labor caste. A 2005 textbook stated, "In normal circumstances, it is not possible for a single man to hold sexual intercourse with a healthy adult female in full possession of her senses against her will." Oh, really? I doubt these teachers would like to test this hypothesis on their beloved mothers, sisters, wives, or daughters.

In Indian and other societies where women are so degraded, there is a standing notion of a rape victim having to marry their rapist--to make things right. Yet, how can this resolve anything? As if the incident of rape is not enough, the victim must endure a lifetime of rape--and by an individual without character or soul, who could commit such a brutal, violent act to begin with. 

Forcing the victim to marry the rapist does not spare a woman the challenge of marrying normally after such an traumatic act, but rather it precludes her from ever having an opportunity to rid herself of the pain and shame, and go on to be with someone who truly loves and respects her as a person, and not an object. 

As long as societies marginalize women through their beliefs, teachings, and systems of injustice, women will not be spared the agonizing harm they suffer by men who abuse their status of power. But as the old saying goes, "what goes around, comes around,"--what is incredible is that so many of these people just see it going, but don't see it coming. 

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

May 18, 2013

Remembering Every Moment


I saw a frightening movie a while back about a girl that had been drugged and brutally raped. 

In the movie, the girl is eerily warned, "You won't remember, but you will never forget!"

That line leaves an indelible mark--that something can be so horrific, so scaring that you can't recall it, and can't forget it. 

Now there is a new device coming to market that helps you recall everything.

Memoto is a 5 megapixel tiny camera (36 x 36 millimeters) with an embedded GPS that is worn around the neck, like a necklace. 

When clipped on, it starts taking the phones and when put down or in a pocket it shuts off. 

The Memoto takes 2 photos a minutes (1 every 30 seconds or nearly 3,000 a day if worn all the time).

The photos are stored in an accessible cloud app that uses GPS to sort the photos on a timeline with a date and location stamp.

Photos are private by default, but can be shared using traditional social media, such as to Facebook or Twitter. 

The battery lasts about 2 days and is rechargeable by connecting to your computer at which time the photos are uploaded to Memoto's servers. 

Wear, photograph, recharge/upload and repeat. 

Privacy issues abound with a device like this--imagine wearing this into the bathroom, locker room, bedroom, or even a private corporate meeting--lots of embarrassing and compromising no-no's here!

At the same time, imagine all the precious or memorable moments in life that you can capture and enjoy--it's the realization of the photographic memory you've never had, but always wanted. 

Also think of that rapist or other criminal approaching you--getting photographed, caught, and punished--so that the victim really does remember, and can forget with a new peace of mind. ;-)
Share/Save/Bookmark

May 6, 2013

The Help Button Is Only A Kiosk Away

Great job by the ANAR (Aid to Children and Adolescents at Risk) Foundation in Europe to aid abused children. 

The ad is hidden from adults, and the message is only visible to children--based on their height and angle of viewing. 

To the abused child, they see: "If someone hurts you, phone us and we'll help" with a number to call to get help in an anonymous and confidential way. 

To the accompanying adult, they see: "Sometimes, child abuse is only visible to the child suffering it."

This is a great reminder to adults to behave themselves in how they treat children, and a way to get critical assistance information to children discreetly. 

Learning from this, I'd love to see a similar campaign here in the U.S. to help child abuse victims, as well as other variations to help abused women, human trafficking victims, and others--by finding technological innovations to help them get the message in ways that their abusers don't necessarily detect and which can't easily be blocked from their victims.

Perhaps, one way to do this is to widely deploy emergency, push button, help kiosks where victims can easily reach out for assistance, where otherwise they would have no way to call for help--such as when their phones, money, passports, and so on have been confiscated. 

Their are a lot of people hurting out there and we need to get to them to tell them that there is help available, that they will be protected (and mean it), and that they can easily reach out and we'll be right there for them. 

Now that's an easy button to really help people. ;-)
Share/Save/Bookmark

March 13, 2013

Balancing Cybersecurity And Citizen Freedom


There is a very interesting discussion of the protection of Federal Networks and the Fourth Amendment in “Cybersecurity, Selected Legal Issues,” Congressional Research Service (CRS) Report for Congress (3 May 2012). 

The Department of Homeland Security (DHS) in conjunction with the National Security Agency (NSA) rolled out EINSTEIN, an intrusion detection system (IDS) in early iterations, and later an intrusion prevention system (IPS) at all Internet points of presence (POPs) for the government.

The system works through copying, storage, and deep packet inspection of not only the metadata for addressing information, but also the actual contents of the flow. This handling is necessary in order to identify suspicious malware signatures and behavior and alert the United States Computer Emergency Response Team (US-CERT) in order to block, quarantine, clean, and respond to the attacks and share information about these.

However, the civil liberties and privacy issue with EINSTEIN is that according to the Fourth Amendment, we are protected from unreasonable search and seizures. Thus, there are concerns about the violation of the Fourth Amendment, when DHS monitors and inspects addressing and content of all email and Internet communications to and from federal agency employees and the public–including not only from government email accounts and systems, but also from private email accounts such as Yahoo and Gmail and social media sites like Facebook and Twitter.

 The justification for the use of EINSTEIN includes:

1.    The government cannot reasonably get warrants in real time in order to safeguard the federal network and systems at the speed that the attacks are occurring.

2.    The government places banners and user agreements on all Federal networks notifying users of monitoring, so there is no expectation of privacy in the communications.

3.    The monitoring is conducted only for malicious computer activity and not for other unlawful activities—so “clean” traffic is promptly removed the system.

4.    Privacy protections are ensured though review mechanisms, including Attorney General and Director of National Intelligence (DNI) reporting to Congress every six months and a sunset provision requiring monitoring reauthorization every four years.

This tension between monitoring of Federal networks and traffic and civil liberties and privacy is a re-occurring issue when it comes to cybersecurity. On one hand, we want cybersecurity, but on the other hand, we are anxious about this security infringing on our freedoms---whether freedom of expression, from search and seizure, from surveillance, or from potentially costly regulation, stifling innovation, and so forth.  It is this tension that has stalled many cybersecurity bills such as the Stop Online Privacy Act (SOPA), Cyber Intelligence Sharing and Protection Act (CISPA), The Computer Security Act of 2012 and more.

In the absence of a clear way forward with legislation to regulate and enforce, or incentivize, standards and best practices for cybersecurity, particularly for critical infrastructure protection, as well as information sharing, the White House released Presidential Policy Directive/PDD-21 on Critical Infrastructure Security and Resilience to establish DHS and other federal agency roles in cybersecurity and to manage these on a risk-based model, so that critical infrastructure is identified, prioritized, assessed, and secured accordingly.

While PDD-21 is a step in the right direction, it is an ongoing challenge to mediate a balance between maintaining our values and constitutional freedoms, while at the same time securing cyberspace.

One thought is that perhaps we can model cybersecurity after the Posse Comitatus Act of 1878 that separated federal military from domestic national guard and law enforcement powers. Using this model, we can create in cyberspace a separation of cybersecurity from our borders outward by the federal government, and within the domestic private networks by our national guard and law enforcement.

Thus, we can create stronger security radiating out at the national periphery, while maintaining our important freedoms within, but always working together to identify and neutralize any and all threats to cyberspace. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

February 3, 2013

A Seeing Eye


This video from NOVA is an amazing display of the surveillance capabilities we have at our disposal.

ARGUS-IS Stands for Automated Real-Time Ground Ubiquitous Surveillance Imaging System.

Like a "Persistent Stare," ARGUS provides continuous monitoring and tracking over a entire city, but also it has the ability to simply click on an area (or multilple areas--up to 65 at a time) to zoom in and see cars, people, and even in detail what individuals are wearing or see them even waving their arms!

Created by the Defense Advanced Research Projects Agency (DARPA), ARGUS uses 368 imaging chips and provides a streaming video of 1.8 gigapixels (that is 1.8 billion pixels) of resolution and attaches to the belly of a unmanned aerial vehicle (UAV) drone. 

ARGUS captures 1 million terabytes of a data a day, which is 5,000 hours of high-definition footage that can be stored and returned to as needed for searching events or people. 

The Atlantic (1 February 2013) points out how using this over an American city could on one hand, be an amazing law enforcement tool for catching criminals, but on the other hand raise serious privacy concerns like when used by government to collect data on individuals or by corporations to market and sell to consumers. 

What is amazing to me is not just the bird's eye view that this technology provides from the skies above, but that like little ants, we are all part of the mosaic of life on Earth.  We all play a part in the theater of the loving, the funny, the witty, and sometimes the insane. 

My Oma used to say in German that G-d see everything, but now people are seeing virtually everything...our actions for good or for shame are visible, archived, and searchable. ;-)

Share/Save/Bookmark

February 1, 2013

Hold That Smartphone!


So coming home yesterday, there is this lady sprawled out, sleeping on the Metro.

Lots of people sleep on the train...especially after a long day and when the weather is the pits out there.

However, this lady falls asleep with her smartphone just lying out on her lap--no hands on--just plop sitting on her skirt. 

A couple of guys to my right start laughing and then saying what's that lady doing--someone is going to steal her phone.

They nudge another passenger standing in front of the lady to tap her and let her know.

The passenger begrudging does it and then the guys yell over from a couple of row away--"Hey lady! You better hold on to your phone or someone's going to grab it and run!"

The lady opens her eyes sees the phone just sprawled out on her lap, fidgets with it for a moment, and then of all things--she just falls right back to sleep again with the phone laying there unattended. 

These two guys on the train are roaring about it--one starts saying that he saw someone grab another person's device on the train just the other day and run right out the train door with it. 

At this point, the lady is sound asleep and now snoring away on top of it and her smartphone is rising and falling with her laborious breathing. 

Hey folks, this lady may not have gotten enough sleep the night before, been drinking a little too much, or may not have been the brightest bulb to begin with--but we've all got to be careful out there--hold unto your valuables and your smartphones is quite that. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

January 27, 2013

Personal Bulletproof Shields


In light of the horrible school shootings we have witnessed in Sandy Hook Elementary School, Virginia Tech, Columbine High School, and more, people and companies are trying to figure out how to fight back. 

In some cases, ex-Marines have decided to stand guard at their children's schools.

In others, companies are coming up with emergency protective devices as a last line of defense for teachers and school children. 

Hardwire Armor Systems has developed a white board that doubles as a bulletproof shield. 

According to USA Today (22 January 2013), the whiteboards are 18" by 20", a quarter inch thick, and 3.75 lbs. and have three rubberized handles on the back for slipping your arm through.

The shield is large enough to cover the head and torso, is 2 1/2 times as strong as Kevlar, and "can stop a bullet from a handgun shot at point-blank range." 

The whiteboards are made of a similar ultra-strong polyethylene material used in Mine Resistant Ambush Protective (MRAP) vehicles in Iraq and Afghanistan, and they are light enough and less dense than water and will actually float. 

While we hope our teachers and children never need these to hold off an attacker until first responders arrive, it is good to know that they are there just in case to stop that deadly oncoming bullet. 

The whiteboard costs $299 and a smaller 10" by 13" bulletproof clipboard costs $109.To outfit a standard high school with whiteboards would cost $15,000 and for all 7 million teachers and administrators in America $1.8 billion. 

From teaching math and science to protecting our children and teachers, these ballistic shields can be part of a multi-layered defense plan for our schools--and I would think for corporate America, religious institutions, and government agencies as well--and is an awesome idea. ;-)

Share/Save/Bookmark

December 14, 2012

Children, Our Future

20 children dead today in school shooting. 

Completely unacceptable!

We need better psychiatric screening, more treatment options, and safer schools.

How can we expect children to excel, when they can't even feel safe. 

Safeguard our children, protect our future.

(Source Photo: here with attribution to Massimo Valiani, Source Quote: ABC News article comment by Quinn, and Mashup by Andy Blumenthal)

Share/Save/Bookmark

October 19, 2012

Overcoming The Height Factor


I really liked this law enforcement elevation product called the Mobile Adjustable Ramp System (MARS) made by Patriot 3 in the United States. 

It is fitted on top of armored or unarmored personnel carriers and used by law enforcement or SWAT teams to carry out raids and rescues on multiple stories simultaneously. 

Two independent moving hydraulic platforms can be fitted on a single vehicle and each ramp can extended independently by remote control.

The ramps extends over 40 feet, enough to gain entry to the second and even third stories of buildings, unto an aircraft, breach a fenced perimeter, or even be used as a sniper post.  

According to the Ideas and Discoveries Magazine (Dec. 2012), MARS has been fitted on the Ford F550 pickup truck and at $370,000--can seat 9, hold 40 gallons of gas in an armored tank, go up to 100 miles per hour, and as an armored-cased vehicle, it "can withstand up to 24 hours of relentless gunfire."

While this vehicle may look a little funny, it serves it's purpose which it to take the height advantage away from the bad guys--get in and get out--quickly and safely.

Share/Save/Bookmark

August 24, 2012

Military-Style ATV For Pleasure Or Kicking Butt


This is a very cool all-terrain vehicle (ATV) modeled after the Segway, that is built with military or extreme sports in mind.

According to Bloomberg Businessweek, the DTV Shredder runs on tank treads, has a motocycle throttle, and the mobility of a skateboard.

The Shredder is made by BPG Werks and can go up to 30 miles per hour, has a three-foot turning radius, can haul up to 800 pounds over rocky terrain, and costs only $4,000.

This is a cost-effective, energy-efficient, rugged transportation mule can carry people, equipment, or supplies through friendly or hostile terrain, and it can even be used through a remote controller. 

A precursor transit device from this company was the Uno--a very cool looking, self-balancing, all-electric unicycle--that won Intel's International Science and Engineering Fair (ISEF) in 2007, was on the cover of Popular Science Magazine (2008), and secured $1.25 million from angel investors. 

When we talk about mobile technology, everyone first thinks of smartphones and tablet computers, but new and improved modes of personal transportation can also be innovative and high-tech with applications for everything from snowmobiling to beach patrol and hunting to overseas deployments. 

End of the world scenarios come to mind too--with a mobile device like this...outmaneuver, outwit, outlast.  

Of course, having to stand for the whole ride can be a bummer, and an open ATV certainly does not imply all-weather, so practicality limits its usefulness, but this is still my cool gadget of the week for fighting or for fun. ;-)

Share/Save/Bookmark

August 18, 2012

The Privacy Slope

I read with interest Ronald Bailey's book review of Privacy by Garet Keizer in the Wall Street Journal ( 16 August 2012). 

In a nutshell, privacy is founded in the Constitution's 4th Amendment: "the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall not be violated."

I would define privacy as the freedom--to think, to feel, and to act as ourselves (within ethical boundaries) without fear of intrusion, revelation, or reprisal. 

In other words, it should only be our business who we love, what we are interested or believe in, who we vote for, what we choose to do with our lives, and more. 

I think in grade school, the children generally sum it up well when they playfully chant: "Mind your own BI," where BI is used for business (or biziness). :-)

According to Keizer, the danger to privacy come into play from two main sources: 
- Commerce--who want to sell you something and
- Government--that needs to surveil for security and law enforcement purposes 

After 9/11, their was a perceived need for greater surveillance to enhance homeland security, and with advances in technology and communications (smartphones, Internet, social media, etc.), the ability to snoop became far easier.

In 2002, the DoD program for Total Information Awareness (TIA) was an attempt to know everything (i.e. total) about those who would do us harm, but fears about this capability being used against the innocent, quickly required a rethinking or perhaps, just a rebranding. 

Some say that the new NSA mega data center in Utah is the fulfillment of the TIA dream--according to the Washington Post, already in 2010 NSA intercepted and stored "1.7 billion emails, phone calls, and other types of communications." Further, law enforcement demanded records from cellphone carriers on 1.3 million subscribers "including text messages and caller locations" over just the last year's time. 

Keizer cautions that "the ultimate check on government as a whole is its inability to know everything about those it governs"--i.e. without the people holding the cards, there is the risk of spiraling into a Big Brother totalitarian society--goodbye democracy!

I think Keizer perhaps oversells the fear of government surveillance and underemphasizes intrusion from business--his thinking is that "If consumers are annoyed with a merchant's monitoring, they can buy elsewhere." 

But what Keizer misses is that industry as a whole has moved toward the use of technology--from club cards and promotions to use of Internet cookies, RFID, and more--to systematically track consumers and their buying behavior and that information is readily captured, packaged, used, and sold for marketing and sales--as well as to the government!

As a common practice now, where is a consumer to go that will shield them from hungry business looking to capture market share and earn nice profits?

At the same time, while government surveillance can certainly be misused and abused with terrible consequences for individuals society---there are potentially a lot of people looking over the shoulder of those carrying out public programs--and this "sunlight"--where and when it shines--can help to prevent bad things happening. 

The problem is that the system is not perfect, and there are always those program people who act of out of bounds and those watchers who are ineffective and/or dishonest.

Overall, it's a zero sum game, where those that hype up security and capitalism, can tramp down on privacy, and vice versa.
In totality, we can never just assume everything will be okay when it comes to privacy and how information is used, but we have to be active citizens helping ensure that right things are done, the right way. 

For regular, hardworking, decent citizens, there is a definite need to safeguard privacy--and technology can be helpful here with anonymizers, encryptors, and other shielding tools.

For the bad guys, I would imagine, no question, that the government will continue to develop the means to thwart their secrecy and planning to inflict harm on the American people. 

For business, it's okay to capture consumer information and sell, but pour it on to thick and people will think twice about your company's ethics and brand--and even a lawsuit may be in the making. 

Yes, privacy is a slippery slope, and not only can a person's self be revealed or used inappropriately, but the voyeur can get burned too if they overdo it. 

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

April 1, 2012

A Word Indeed


The information in your smartphone and managed by your telecommunications carrier is available and accessible to others with today's tools and following the right processes. 

Bloomberg BusinessWeek (29 March 2012) reports on a new tool for law enforcement that captures your data from smartphones. 

It is called the Cellebrite or Universal Forensic Extraction Device (UFED).

As the video describes it works with almost every mobile device out there--over 1,800 of them. 

And when attached to a smartphone, it can extract everything from your call log, emails, texts, contact list, web history, as well as photos and videos. 

The forensic tool can even retrieve deleted files from your phone. 

Your smartphone is a digital treasure trove of personal information and the privacy protection afforded to it is still under debate. 

The article cites varying court opinions on "whether it's fair game to examine the contents of a mobile phone without a warrant," since it is in the suspect's immediate possession. 

According to law enforcement sources quoted in the article, "we use it now on a daily basis."

Aside from the contents on the phone itself, Bloomberg BusinessWeek (29 September 2012) earlier reported that telecommunications companies are also storing your personal data for various lengths of time.

For example, detail call records and text contacts are retained for up to 7 years and phone location information indefinitely, depending on the carrier.

This data is available too under the processes specified in the Electronic Communications Privacy Act. 

While the technology is constantly getting better for us to electronically manage our information and communicate with each other, the reach and life cycle of digital information can certainly be far and long.

As we should all by now know, working remotely, digitally, in cyberspace, and encrypting, deleting, or even attempting to destroy data files does not ensure their ultimate privacy. 

In that respect, both digital and non-digital information are the same in one very important facet and that is as we all learned early in life that "a word once said cannot be taken back."

Share/Save/Bookmark

March 16, 2012

Human Trafficking Hurts Everyone

Cbp_report_human_trafficking
A few years ago, I saw the movie Taken (2008) about a 17-year old girl kidnapped in Paris and sold into prostitution. Fortunately, in this movie, the teenage girl's father is a retired CIA agent, and he is able to get his daughter back and inflict some serious punishment on the traffickers. The scariest scene in the movie that's been shown repeatedly in the trailer is where the girl is hiding under the bed pleading with her father to help her, when she is discovered and pulled roughly from underneath to disappear into this netherworld of child trafficking and sex abuse.

This week, I saw another movie called Trade (2007) with a similar theme, where a 13-year old girl is abducted outside her home on the streets of Mexico City while riding her new birthday bicycle. The scenes of sexual abuse, violence, forced drugging, and more were enough to send me for an emotional deep dive. In the movie, while other innocent women are trafficked, abused, and murdered, this little girl is saved by her brother and Texas cop who join forces to rescue her (and other children found behind a secret door in the same house) from being sold into sex slavery. 

At the conclusion of the movie, the tagline comes up about 50,000 to 100,000 girls, boys, and women being trafficked annually to the U.S. to be pimped out or sold for forced sex--and more than 1 million are trafficked annually across international borders against their will.

According to The Department of Homeland Security U.S. Customs and Border Protection, "There are at least 12.3 million enslaved adults and children around the world at any given time." I would guess that these numbers are quite understated given all the silent victims around the world that have been silenced by fear, coercion, and violence and so we don't even know about them and their plights. 

Further, The Department of State's Office to Monitor and Combat Trafficking in Persons has many good resources including information, tips, and training located at that site. 

I've attached, at the top, the phone number of the Customs and Border Protection hotline to report human trafficking. There is also a non-profit hotline at the National Human Trafficking Resource Center.

While this is frequently portrayed as women's issue and it is, it is also a family and societal issue that affects all of us. When a women or child is abused, the impact goes way beyond the individual.

I know that I can certainly not understand how anyone can inflict these cruelties on others. Money doesn't explain it. Circumstances doesn't explain it. To me, there must truly be such a thing as evil in this world, and unfortunately, we are all witnesses to it.

Look out for others, the way you would want them to look out after your own--maybe together, we can help tilt the scale in favor of the victims.

Share/Save/Bookmark

February 25, 2012

The False Information G-d

The amount of data in the world is exploding and yet the belief in G-d is evaporating.  

A review in the Wall Street Journal (22 February 2012) of a book called "Abundance" points to the explosion of data with the prevalence of information technology. 

From the earliest civilization to 2003, all written information totaled 5 exabytes (an exabyte is a quintillion bytes or 1 followed by 18 zeros).

But this is nothing compared to the last number of years, "where the change is not just accelerating, but the rate of acceleration of change is itself accelerating."

Between 2003-2010, 5 exabytes of digital information was created every 2 days, and by next year, 5 exabytes will be produced every 10 minutes!

Similarly, Wired Magazine (March 2012) reports in an interview with George Dyson that the "Digital Universe" is growing organically and "cycling faster and faster and it's way, way, way more than doubling in scale every year. Even with the help of [tools like] Google and YouTube and Facebook, we can't consume it all."

According to ComputerWorld (13 February 2012) in Your Big Data To-Do List, with all this data being generated, there is a mistaken assumption that we have to consume it all like drinking from a firehose. The article references a McKinsey study that projects that by 2018, there will be a need for 140,000 to 190,000 additional data analysts and statistical experts to try and make sense of it all. The article suggests that instead of trying to grasp at all the data, we instead "data scoop" and "target projects that can showcase results as opposed to opting for the big-bang, big-data projects."

And tools are being developed and deployed to try to get our arms around the information rolling in around the world. For example, Bloomberg Businessweek (November 28 - December 4, 2011) describes the tool from Palantir being used by the military, Intel, and law enforcement agencies for data mining, link analysis, and even predictive analytics. 

These days, "It's like plugging into the Matrix"--in terms of the amount of data streaming in. One special forces member in Afghanistan describes it as follows: "The first time I saw it, I was like Holy crap. Holy crap. Holy crap." But the thinking is now-a-days that with tools like Palantir (and others), we "can turn data landfills into gold mines."

But while information is power, Harvard Business Review (September 2011) in Learning to Live With Complexity acknowledges "We are hampered by cognitive limits." And moreover, "Most executives think they can take in more information than research suggests they can." And harnessing data into information is constrained by the complexity involved--driven by the number, interconnections, and diversity of interacting elements.

The result is that while we are becoming in a sense data rich, in may ways, we are still information poor. And even with all the sensors, data, and tools available to search, access, and analyze it, we are becoming perhaps overconfident in our ability to get our arms around it all and in turn master the world we live in. 

The hubris in our abilities to use information technology is leading many to worship the proverbial information G-d, and in turn, they are forgetting the real one. According to the Pew Forum on Public and Religious Life (February 2010) as quoted in CNN, "young Americans are significantly less religious than their parents and grandparents were when they were young."  Moreover, a full one in four American millennials--those born after 1980--are not affiliated with any faith--they are agnostic or atheists.

Similarly, Mental Floss Magazine just a few months ago (November-December 2011) had various authored columns asking "Is G-d In Our Genes?" and another "Is G-d In a Pill?" questioning whether the age-old belief in G-d comes either from a genetic disposition in some to a drug-induced states in others.

While religion is a personal matter, and for a long time people have argued whether more people have died in wars over religion or money and power, as a person who believes in G-d, I find it most concerning that with the rise of information (technology) power in the last 30 years, and the exuberance and overconfidence generated from this, there is an associated decline in belief in G-d himself.  

While technology has the potential to raise our standard of living (in leaps and bounds even) and help solve many of our vexing problems, we cannot forget that technology is run by human beings who can choose to be good or evil and use information technology to either better mankind or the opposite, to destroy it. 

Ultimately, I believe that it is but G-d almighty who shapes the thoughts and destiny of mankind, so that one man sees just a string of bits and bytes--a matrix of zeros and ones--while another sees a beautiful new musical composition, the next terrorist attack, or even the amazing cure for cancer.  

(Source Photo: here)

Share/Save/Bookmark

February 19, 2012

Big Phish, Small Phish

Phishing is an attack whereby someone pretends to be a trustworthy entity, but is really trying to get your personal information in order to steal from you or an organization.
Phishing is a type of social engineering where fraudsters try to deceive and spoof their victims by sending email or instant messages (or even by calling) and pretending to be a legitimate private or public sector organization. They then either request personal information, provide links to fake websites, or even create unauthorized pop-ups from legitimate websites to get you to give them your personal data.

Additionally, phishing emails can contain attachments that infect recipient's computers with malware, creating a backdoor to control or compromise a system and its information.

In all of these cases, the intent of phishing is impersonate others and lure consumers into providing information that can be used to steal identities, money, or information.
The word phishing alludes to the technique of baiting people and like in real fishing, fooling at least some into biting and getting caught in the trap. 

In this fraudulent type, perpetrators pretend to be legitimate financial institutions, retailers, social media companies, and government agencies in an attempt to get you to divulge private information like date of birth, social security numbers, mother maiden names, account numbers, passwords and more.
Once criminals have this valuable information, they can commit identity theft, break into your accounts, and steal money or information.

Spear-phishing is a derivative of this scam that is targeted on specific people, and whaling is when the scam is perpetrated on organization executives or other high profile targets,  which can be especially compromising and harmful to themselves or the organizations they represent.
The first recorded phishing attack was in 1987.  Over the years, the prevalence of these attacks have steadily increased. According to the Anti-phishing Working Group (APWG), there were some 20,000-25,000 unique phishing campaigns every months through the first half of 2011, each targeting potentially millions of users.  Additionally, as of March 2011, there were as many as 38,000 phishing sites.  The most targeted industry continues to be financial services with 47% of the attacks.
There are a number of ways to protect yourself against phishing attacks.
  1. Delete email and messages that are unwarranted and ask for personal information
  2. Do not click on links, instead go directly to a website by using a search engine to locate it or copying the link and pasting it into the browser
  3. Configure your browser to block pop-ups
  4. Use anti-virus, firewalls, and anti-spam software
  5. Set up automatic security updates
  6. Input personal information only into secure sites, such as those that begin with "https"
  7. Only open attachments when you are expecting them and recognize where they are coming from
  8. Check financial statements upon receipt for any fraudulent activity
  9. If you are caught in a phishing scheme, notify law enforcement and credit reporting authorities immediately
  10. Always be cautious in giving out personal information
Whether you consider yourself a big fish or a small fish, beware of those trying to catch you up on the Internet--hook, line, and sinker.

Share/Save/Bookmark

February 1, 2012

App Provides Push-Button Emergency Help

Crimepush
An important new free iPhone/Android App called CrimePush hit the market today.

It allows you or a loved one at the push of a button to report a crime.  

Once you download the app, you can store your name, phone number, and address (so it's there in case something G-d forbid happens).

Further, you can set the App to report crimes with your information or anonymously and with or without your GPS location. 

Then you have a screen that provides you with 9 options for the various types of crime or emergency:

- Theft
- Threat
- Altercation
- Sexual Abuse
- Medical
- Accident
- Vandalism
- Drugs
- Harassment


Click on theft, as an example, the date and time are pre-populated for you, and you have a free text area to describe the incident, and the options to add a photo, video, or audio.

Then simply hit the "push" button to submit to the authorities. 

My understanding is that more enhancements to the CrimePush App are in the works such as the ability to shake your phone to activate CrimePush, so the police can find you quickly through GPS. 

CrimePush has the potential to help a lot of people and ultimately actually help to reduce crime by having people report instead of ignore, and provide information to the authorities faster, more accurately, and more comprehensively using the various multimedia options to capture the crime and the criminals.

(Source Photo: here)

Share/Save/Bookmark

December 31, 2011

The Not So Candid Camera

When you're at the swimming pool, it's a time for swimming, splashing, and fun.

With family and friends, it's even a great time to catch some scenic photos of loved ones having a great time.

You expect to see cameras and smartphones taking some discreet pictures or videos.

Not a new problem, but some people take advantage of the people swimming or tanning to take compromising shots.

When people are knowingly scantily clad in public--people will argue what level of responsibility they have for the way they present themselves.

However, when others take advantage of that--let's be clear, the predator is the aggressor!

At the pool, I saw this taken to a whole new level today--and by someone and in a way I would not have expected.

This older-looking guy, with a hat on, strolls up to the pool with a huge tripod mounted video camera on a WALKER and starts taking rolling video on a pool almost exclusively filled with little children.

There was no warning, no request--"may I", no do you mind, just a video camera mounted on a walker at the head of the pool with lots of little kids, and also some teens, women, and more.

First, I watched to see what this guy was doing...then I thought, I better capture this and I took a series of photographs of the guy--who had no apparent compunction about invading everyones privacy.

But the story isn't over--it get's worse.

All of a sudden, I notice my computer picking up a wireless network with a name that self identified them with a clear inclination for child pornography (I am withholding the actual name so as not to tip off the criminal). I capture this too--with a screenshot. Was it the same guy with mounted video camera or someone else?

So much for a relatively serene vacation, and some quiet private time.
I just saw Dateline's "To Catch A Predator" early this week and I almost can't believe this is happening. I think to myself--is this real? Unfortunately it is.

I reported both incidents to hotel security. At their request, I email them the screenshot of the wireless network name that would make anyone cringe. Next call is to the National Center for Missing and Exploited Children and CyberCrime.com.

Normally, I believe in live and let live, but we all have to do our part to protect children and other innocent victims.

Share/Save/Bookmark

December 2, 2011

Who Will Protect Those Who Protect Us?

This is a video that the Federal Law Enforcement Officers Association (FLEOA) sent to Congress to appeal to them not to cut funding to all the activities that our law enforcement officers do for us.

While the functions of government can always be more efficient--and we should constantly work to achieve these--federal law enforcement is incredibly important.

From the FBI to the Secret Service and from Border Patrol to DEA, we need to support all our federal law enforcement efforts.

These agents and officers risk their lives every day for all of us, and it's time that we stand by them to protect their mission and jobs.

Share/Save/Bookmark

November 26, 2011

Espionage, Social Media Style

You are being watched!
Good guys and bad guys are tracking your movements, rants and raves, photos, and more online.
For example, The Atlantic reported on 4 November 2011 in an article titled How the CIA Uses Social Media to Track How People Feel that "analysts are tracking millions of tweets, blog posts, and Facebook updates around the world."
Further, in January 2009, "DHS established a Social Networking Monitoring Center (SNMC) to monitor social networking sites for 'items of interest.'"
And even more recently in August 2011, DARPA invited proposals for "memetracking" to identify themes and sentiments online and potentially use this for predictive analysis.
The thinking is that if you can use online information to predict stock market movements as some have attempted, why not criminal and terrorist activity?
Similarly, The Guardian reported on 16 March 2010 FBI using Facebook in fight against crime and cautions that "criminals dumb enough to brag about their exploits on social networking sites have now been warned: the next Facebook 'friend' who contacts you may be an FBI agent."
This is reminescent of the work of private sector, Dateline NBC in using Internet chat rooms to catch sexual predators online by luring them to a house where the predators believed they were going to meet up with a underage girl for a tryst.
While these efforts are notable and even praiseworthy by the good guys--assuming you can get over the privacy implications in favor of the potential to have a safer society to live in--these activities should be carefully safeguarded, so as not to infringe on the rights and freedoms of those who behave legally and ethically.
But the good guys are not the only ones using the tools of the trade for monitoring and analyzing social networking activities--the bad guys too recognize the implicit information treasure trove available and have you in their crosshairs.
For example, in the last years Arab Spring, we have nation states tracking their citizens political activities and using their power over the Internet to shut off access and otherwise surpress democracy and human rights. Further, we have seen their use for cyberspying and testing offensive cyber attack capabilities--only the most recent of which was the alleged infiltration of a SCADA system for a Illinois water plant.
Moreover, this past week, Forbes (21 November 2011) reported in The Spy Who Liked Me that "your social network friends might not be all that friendly."
From corporate espionage to market intelligence, there are those online who "steadfastly follows competitors' executives and employees on Twitter and LinkedIn."
In fact, the notion of online monitoring is so strong now that the article openly states that "if you're not monitoring your competitors activity on social media, you may be missing out on delicious tidbits" and warns that "it's easy to forget that some may not have your best intersts at heart."
Additionally, while you may not think your posts online give that much away, when your information is aggregated with other peoples posts as well as public information, it's possible to put together a pretty good sketch of what organizations and individuals are doing.
Forbes lists the following sites as examples of the "Web Spy Manual" with lots of information to pull from: Slideshare, Glassdoor.com, Quora, iSpionage, Youtube as well as job postings and customer support forums.
When you are on your computer in what you believe to be the privacy of your own home, office, or wherever, do not be deceived, when you are logged on, you are basically as open book for all the world to see--good guys and bad guys alike.
(Source Photo: here)

Share/Save/Bookmark