Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

August 23, 2015

Shopping At CVS Florida Style

So I am posting this with permission of my wife.

This is how people walk around in CVS in Florida. 

This is not how people dress in CVS in Washington D.C. even on the hottest August days. 

It is really weird how people seemingly change their entire conception of appropriate and modest dress (code) just because they can. 

I remember when at least people coming off the beach would put on a wrap or towel or something.

Uh, not anymore--the feeling of freedom has been extended quite some to the point of this becoming all too blase. 

Maybe this is similar to the trend of some women in Times Square in New York who are going around topless with nothing but some paint even though there are families with children that frequent that touristy area. 

Perhaps it would be nice to leave a little mystery for everyone involved. ;-)
Share/Save/Bookmark

July 28, 2015

When Your Pants Are Down

Yesterday in the news was how a drone was used to fly over and take pictures at a nude beach

So at a nude beach, even those that advertise privacy protections, let's face it your walking around in the buff. But still, the use of the drone with a camera was a violation of people's expectations not to be photographed and by those outside the facility.


And about a week earlier, a five year old finds a camera phone in the lady's bathroom in a Starbucks


Yesteday, I had a similar lesson about people's warped sensibilities or perversions (but without the drone or smartphone--this was the low tech version). 


I'm at the pool for a swim after work. 


There are 2 locker rooms for men and women, of course.


But at one point, I see this LADY get out of the pool and head straight for the MEN'S locker room--she actually proceeds to go in one side--through and past the bathrooms, showers, sauna, and lockers--and out the other side to exit the facility. 


So trying to give her the benefit of the doubt, when I get out of the pool, thinking maybe the locker room wasn't clearly marked, I check it--and there is a big sign with a picture (the symbol for men) and you couldn't miss it!


Also, this lady was clearly not new as she gestured a friendly hello to the lifeguard, and she wasn't the slightest bit confused (she had actually made some small talk with me in the pool)   


When she left, as she headed into the men's room, she didn't hesitate, knock on the door or anything, and obviously didn't care whether anyone was in there--dressed or naked.


Perhaps, because the men's locker room is closer to the exit, she was just taking a shortcut--for her, how convenient!


Then again maybe she was a true perv and this was her way of getting some cheap thrills regardless of other people's right to privacy and safety, including those of children. 


In a sense, this is more than just about generalized privacy (such as with information), but even extends to your very privates!


We live in an age when it is a balancing act between sharing and privacy, between openness and modesty, and between doing what's right and pure self-gratification. 


Unfortunately, to put in bluntly, some people just don't seem to give a sh*t about respect for other people's decency or rights, and they will do what they want regardless of the social balancing act or the necessity to use common sense good judgement in public and private.  


The lesson is that when your pants are down, as creepy as it sounds, it's best to assume that someone is always looking or at least may be on the prowl, so be careful out there. ;-)


(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

July 12, 2015

The "Real" OPM Data Breach

A lot has been made and should be made of the theft of over 21 million federal employees' sensitive personnel records and security clearances. 

Everyone rightly, although somewhat selfishly, is worried about identity theft and the compromised privacy of their information.

The government is worried about hostile nation states using the pilfered information to bribe or coerce military, intelligence, high-level politicals, and others to turn and work for them or otherwise to use against them. 

But what is grossly missing in this discussion is not what information presumably the Chinese stole and how they will use it against us, but rather what information they inserted, altered, or otherwise compromised into the OPM personnel and security databases when they got root access to it.

Imagine for a moment what could hostile nations or terrorists can do to this crown jewel database of personnel and security information:

- They could insert phony records for spies, moles, or other dangerous persons into the database--voila, these people are now "federal employees" and perhaps with stellar performance records and high level security clearances able to penetrate the depths of the federal government with impunity or even as superstars!

- They could alter personnel or security records taking prominent or good government employees and sabotaging them to have questionable histories, contacts, financial, drug or criminal problems and thereby frame or take-down key government figures or divert attention from the real bad guys out there and tie our homeland security and law enforcement establishment in knots chasing after phony leads and false wrongdoers and villains.

Given that the timeline of the hack of OPM goes back to March and December 2014, this was more than enough time for our adversary to not only do to our data what they want, but also for the backup tapes to be affected by the corrupt data entering the system. 

The damage done to U.S. national security is unimaginable. As is typically the case with these things, "An ounce of prevention is worth a pound of cure." Instead of investing in security, now we can invest in "credit monitoring and identity theft protection" for a very sparse three years, while federal employees will go a lifetime in information jeopardy, and the federal government will be literally chasing its tail on personnel security for decades to come. 

With the price so low to our adversaries in attacking our systems, it truly is like stealing and much more. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 25, 2015

18 Million--Change The SSNs

So, maybe one of the most detrimental hysts of information from the Federal government in history. 

Now involving over 18 million current and former federal employees, including military and intelligence personnel. 

No getting around it, but we are major screwed here--this is a treasure trove of personal and privacy information ready to use for identity theft, blackmail, assassination/decapitation attacks at home and work addresses, kidnapping of family members, and literally attacking our national security apparatus from the very inside out--it's people. 

Imagine, if at the time of its choosing, an adversary attacks our nation, but preempts this with sophisticated and coordinated attacks on our critical government personnel--generals, spy masters, political kingpins, and other key decision makers--thereby distracting them from their duties of safeguarding our nation. 

This is our new Achilles Heel and overall a security disaster bar none!

Well, we can't go back and put the genie back in the bottle--although wouldn't it be nice if such critical information (if not encrypted--already unforgivable) would have a self-destruct mechanism on it that we could at least zap it dead.

But for the people whose personal identities are at risk--whose social security numbers (SSNs) and dates of birth (DOBs) have been compromised what can we do? 

While we can't very well change people DOBs, why not at least issue them new SSNs to help thwart the adversaries peddling in this information in the black markets. 
 
If we can put a man on the moon, surely we can issue some 18 million new SSNs and mandate government and financial institutions to make the necessary updates to the records. 

This is not rocket science, and certainly we owe this much to our people to help protect them.

Will our government be there for it's own employees and patriots? ;-)

(Source Photo: here with attribution to Donkey Hotey)
Share/Save/Bookmark

June 5, 2015

People Are Our Greatest Asset, Goodbye!

The Chinese are smart and talented, and there is a cyberwar going on. 

They are suspected are having just stolen the personnel information of 4 million federal government workers.

And there are 4.2 million active, including 1.5 million military personnel. 

So if as they are apt to say, "people are our greatest asset"...

...then we just sort of lost the CROWN JEWELS in terms of highly personal, sensitive, and critical information on the people that handle everything from defense and diplomacy to the economy, energy, the environment, justice, and health and wellbeing. 

Oops!

This is getting scary folks. 

When the adversary through cyber (and other) espionage can know our people, our technology, our communications, virtually everything...then we got some big vulnerabilities!

If we can't defend ourselves adequately (at least for now), I hope at least we are doing okay on the offense! ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 1, 2015

Snapchat, Eat Your Heart Out

As so many of you app users know, Snapchat allows you to send texts, drawings, photos, and videos, but with privacy, knowing they will disappear in a few seconds.

Disappearing messages is certainly not a new idea--in spycraft or for kids. 

Remember the disappearing ink (or maybe you've forgotten because it disappeared)?

Well, this is a photo of disappearing-disappearing ink!

Someone apparently stole the disappearing ink right out of the packaging in the store--it has truly disappeared. ;-)

(Source Photo: Rebecca Blumenthal)
Share/Save/Bookmark

February 13, 2015

tURNING yOUR dEVICE aGAINST yOU!

So interesting article in BBC about the Samsung's "Listening TV."

This TV has voice activated controls and they don't just take commands, but...


"If your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party."


So aside from hackers (and spies) being able to turn your phone and computer mics, cameras, and GPS location data on and off to surveil and eavesdrop on you, now the dumb television set can listen in as well. 


You can be heard, seen, and found...whether you know it or not. ;-)


(Source Photo: Andy Blumenthal with eyes and ears from here and here with attribution to Firas and Simon James)

Share/Save/Bookmark

January 31, 2015

You Can't Hide Your Feelings


You can try to hide your feeling, but it won't work...

Your emotions are now an open book to anyone with facial-recognition software, such as from Emotient, Affectiva, and Eyeris.

This video from Emotient shows examples of Dr. Marion Bartlett demonstrating very well how the system is able to pick up on her expressions of joy, sadness, surprise, anger, fear, disgust, and contempt. 

From broad displays of emotion to subtle spontaneous, natural displays, to micro, fast and involuntary expressions, the system detects and clearly displays it. 

Described in the Wall Street Journal, the software, in real time, successfully uses "algorithms to analyze people's faces" and is based on the work of Dr. Paul Ekman, who pioneered the study of facial expressions creating a catalog in the 1970s with "more than 5,000 muscle movements" linked to how they reveal your emotions. 

A single frame of a person's face can be used to extract 90,000 data points from "abstract patterns of light to tiny muscle movements, which get sorted by emotional categories."

With databases of billions of expressions from millions of faces in scores of countries around the world, the software works across ethnically diverse groups. 

Emotion-detection has a myriad of applications from national security surveillance and interrogation to in-store product marketing and generally gauging advertising effectiveness, to helping professionals from teachers to motivational speakers, executives, and even politicians hold people's attention and improve their messaging.

Then imagine very personal uses such as the software being used to evaluate job applicants or to tell if a spouse is lying about an affair...where does it end?

Of course, there are serious privacy issues in reading people's faces unbeknownst to or unwanted by them as well as possibilities for false positives, so that people's feelings are wrongly pegged or interpreted. 

In the end, unless you wear a physical mask or can spiritually transcend yourself above it all, we can see you and soon we will know not just what you are feeling, but also what you are thinking as well...it's coming. ;-)
Share/Save/Bookmark

November 23, 2014

Data 4 Ransom

The future of cybercrime will soon become the almost routine taking of your personal and corporate data as hostage. 

Once the hacker has control of it, with or without exfiltration, they will attach malware to it--like a ticking time bomb.


A simple threat will follow:


"I have your data. Either you pay for your data back unharmed OR your data will become vaporware! You have one hour to decide. If you call the authorities, you data is history."


So how valuable is your data to you?  


- Your personal information--financial, medical, legal, sentimental things, etc.


- Your corporate information--proprietary trade secrets, customer lists, employee data, more.


How long would it take you to reconstitute if it's destroyed?  How about if instead it's sold and used for identity theft or to copy your "secret sauce" (i.e. competitive advantage) or maybe even to surpass you in the marketplace? 


Data is not just inert...it is alive!


Data is not just valuable...often it's invaluable!


Exposed in our networks or the cloud, data is at risk of theft, distortion, or even ultimate destruction. 


When the time comes, how much will you pay to save your data?


(Source Comic: Andy Blumenthal)

Share/Save/Bookmark

November 9, 2014

Medicine Back When




I thought you may find these photos interesting of how medicine used to be--not all that long ago.

I took these at Georgetown University Hospital in Washington, D.C. 

1) The Circo Electric Bed rotates a patient 210 degrees to help them go from a prone to a vertical position; push the button and you go almost loop de loop. 

2) A Hospital Ward--no private or semi-private rooms yet; say hello to a dozen or so neighboring patients sharing a room, moaning and groaning, each their own. 

3) An X-ray--say cheese as this machine peers inside your body, hopefully not emitting too much radiation to the patient.

4) An operation--looks serious, almost like an alien abduction, hope they had plenty of anesthesia so it didn't hurt. 

Okay, medicine has come a long way...but we're not there yet, not by a medical tricorder longshot. ;-) 

(Source Photos: Andy Blumenthal)

Share/Save/Bookmark

October 20, 2014

Shining A Light On Your Privacy


Check out this special report...

~Half a billion~ downloads of the top 10 Flashlights Apps--the ones we all have on our smartphones--and guess what?

All/most are malware/spyware from China, India, and Russia that are spying on you!

Your contacts, banking information, even your location, is being intercepted by hackers abroad,

The cybersecurity experts Snoopwall (that conducted this study and are offering a free opensource "privacy flashlight") are recommending that you don't just uninstall these flashlight apps, because they leave behind trojans that still are functioning behind the scene and capturing your information. 

So instead doing a backup of key information and then a factory reset of the smartphone is advised.

Pain in the you know what, but these flashlight apps are shining a light and compromising your personal information.

Snopes points out that the flashlight apps may be no more vulnerable to spyware than other apps you download and that perhaps the screening process from the app stores help to protect us somewhat.

When the cyber hackers decide to exploit those apps that are vulnerable, whether for political, military, or financial gain, it will likely be ugly and that flashlight or other app you use may prove much more costly than the download to get them. ;-)

(Thank you Betty Monoker for sharing this.)
Share/Save/Bookmark

October 8, 2014

"Shitty" Advertising

Florida is a beautiful, but sometimes a strange place.

I stop in a restaurant to use the restroom.

Now, I know sometimes people put art inside to sort of spiffy the place up.

But in this (semi-fancy) restaurant's restroom, there was actually advertising--yes, right where you do your thing.

And in one spot, they had this sign from Insite Advertising, Inc. for the bathroom advertisements.

"...Thank you for allowing us to spend this time alone with you. We understand that during your hectic day quiet moments are few and far between..."

Well, this was one alone time that was definitely interrupted and a little less quiet.

Isn't there any place we can go anymore without being bombarded by branding, marketing, advertising, selling, and companies trying to make a another quick buck.

Darn, leave us alone and give us our bathrooms back--I'm not buying from you at a time like this! ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

October 6, 2014

Lock Or Peephole

So is that keyhole in privacy for a lock and key or as an exhibitionistic peephole?

The New York Times had an excellent article on this yesteday, called "We Want Privacy, but Can't Stop Sharing."

We are compelled to share online to demonstrate that we are:

- Important
- Interesting
- Credible
- Competent
- Thoughtful
- Trustworthy

The problem is when you inappropriately overshare online, you may leave youself little to properly disclose in building real-world intimate relationships in a normal give and take of "opening and closing boundaries."

Moreover, being like a lab rat or in a house of glass walls for all to watch indiscriminantly can leave us with feelings of "low self-esteem, depression, and anxiety."

Being under observation--even when it is voluntary--implies being open to judgement and this can drain us of our ability to be ourselves, creative, and take calculated risks.

We don't want to become too busy brushing our hair back and smiling for the camera and making everything (artificially) look like made for reality TV (e.g. Kardashian) perfection. 

The key to privacy is to disclose what needs to be shared, put a lock on what's personal, and not arbitrarily leave the peephole eyes wide open. ;-)

(Source Photo: here with attribution to g4ll4is)
Share/Save/Bookmark

October 3, 2014

Data Like Clouds

So data is like clouds...

Clouds want to be free roaming the wild blue skies similar to how data wants to be searchable, accessible, useful, and so on. 

But with data, like clouds, when it rains it pours--and when data blows about with the windstorm and is compromised in terms of security or privacy, then we not only come away wet but very uncomfortable and unhappy. 

Then, as we actually end up putting our data in the great computing clouds of the likes of Amazon, iCloud, HP, and more, the data is just within arm's reach of the nearest smartphone, tablet, or desktop computer. 

But just as we aspire to reach to the clouds--and get to our data--other less scrupled (cyber criminals, terrorists, and nation states)--seek to grab some of those oh so soft, white cloud data too.

While you may want to lock your data cloud in a highly secure double vault, unfortunately, you won't be able to still get to it quickly and easily...it's a trade-off between security and accessibility. 

And leaving the doors wide open doesn't work either, because then no one even needs an (encryption) key to get in. 

So that's our dilemma--open data, but secured storage--white, soft, beautiful clouds wisping overhead, but not raining data on our organizational and personal parades. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

September 1, 2014

You're Probably Not A 10

There is a review online for nearly everything...from sources such as Amazon to Yelp, Angie's List, IMDb, and more. 

But what you may not realize is that the knife cuts both ways...you are not only the reviewer, but the subject of reviews.

And if you're not all that...then everyone can know it!

The New York Times has an opinion piece by Delia Ephron about how reports cards are no longer just for kids, and that they are "for the rest of my life...[and] this is going on your permanent record."

From cabbies that won't pick you up because you've been rated a bad fare to your therapist that says you can't stop obsessing, restaurants that complain you refused to pay for the chopped liver, and the department store says you wasted their salesperson's time and then bought online, and even your Rabbi says you haven't been giving enough to the synagogue lately. 

People hear things, post things, and can access their records online...your life is not private, and who you are at least in other peoples opinion is just an easy search away. 

In Tweets, Blogs, on Facebook, and even in companies customer records, you have a personal review and rating waiting for discovery.

Your review might be good, but then again...you are not always at your finest moments and these get captured in databases and on social media.

Data mining or exfiltration of your personal information is your public enemy #1.

Of course, you'd like to think (or wish) that you're brand is a 10, but not everyone loves you that way your mother does.  

Too bad you can't tell them, "If I want your opinion, I'll ask for it"--either way, your gonna hear what people think of you loud and clear. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 30, 2014

More Than Just Legs

This was a funny photo that I took of a sculpture of legs sitting in the arm chair--and it is supposed to represent minimalism.

No need to show the body, because the legs alone convey the message.

To me though, this reminds me of the opposite of minimalism, where instead of showy, sexy legs--these are covered fully and crossed respectfully--overall sitting upright and quite modestly.

It reminded me of beautiful Jewish concept called Tzniut, which refers to people dressing and acting modestly and in private.

There is no need to show it all--but rather, to be someone, it's what you do, not what you look like and expose. 

In this way, these legs are enough to convey the concept of modesty--of man or women--if you can just see the whole person and not just their sexuality. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 12, 2014

Surveillance Society {Funny}

This was funny photo my wife and I took in a medical practitioner's office. 

Above the floodlights, was a picture of these staring eyes.

And it was simply thumbtacked onto the wallpaper. 

One of the receptionists asked why we were taking the photo.

We sort of giggled--uh, this was not exactly the typical surveillance scenario in the 21st century of CCTVs, drones, hidden mics, tracking devices, and big data--not even close!

But maybe it's just a reminder that someone is ALWAYS looking. ;-)
Share/Save/Bookmark

April 3, 2014

Records Manager Appreciation Day!


Records Management is not about 45s, 33s, or 8-track music collections, but managing key document and electronic records. 

It's critically important for an organization to be able to archive and access needed information for managing their business, and enabling transparency and accountability. 

Managing records saves us time and money in the long run.

Moreover, as information workers in an information economy, information is power! And we need to be able to get to information, whenever and wherever we need it. 

While records may not be sexy unless you're Lady Gaga or Madonna, information is the lifeblood of the 21st century, so say thank you to your records management and information access professionals today! ;-)
Share/Save/Bookmark

March 17, 2014

Time To Spread The Magic

So I'm not the biggest fan of Disney theme parks -- maybe that is not a popular thing to write.

But to me, the rides alternate between fake or nauseating (when they're not broken down), the characters are outdated, the parks are hot, overcrowded, and the lines and wait times are long, and the ticket prices are sort of crazy for what you're getting (not). 

Let's see, a day at Disney or day at the beach--uh, I'll take the beach any day!

But Disney is doing something magical these days. 

Bloomberg Businessweek reports how Disney's new MagicBands are using technology to make the theme park experience more convenient, even if not more fun. 

The MagicBands are like an all-in-one electronic link between you and Disney:

- No need for an admission ticket, because the MagicBand does that.

- Reserve your favorite rides, use your wrist band. 

- Hotel room keys, that's right the band unlocks your door.

- Shopping at Disney kingdom, the band functions as your debit/credit card. 

- Being greeted by name or wished a happy birthday, the bands make your experience more personal.

What's more Disney uses the bands for "big data" analytics--for capturing your likes and preferences for rides, restaurants, food, and souvenirs--and this adds up to customer service enhancements like restocking shelves, opening up reservations, expedited queues, and even targeted mail and text messaging/advertising. 

The bands have radio frequency identification tag/chips (RFID) as well as GPS sensors, so Disney knows who you are, where you are, and even much of what you're doing. 

Spooky from a privacy standpoint--sure, you are really sitting there exposed in just about every way. 

But this technology has arrived, not just at Disney, but via embedded RFID in your smartphones or your body someday soon. 

The synthesis of man and machine...the mystery is gone in the magic kingdom, but maybe the service gets better. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

December 25, 2013

The Lie Of The Open Workspace

There are so many workplace liars—the problem is many of them are experienced and good at selling you a bunch of malarkey.

Often, they tell you what they want, either to save the company money or to make themselves look innovative, but either way it’s inevitably at your cost. 

One of these lies is from chieftains that tell you’ll be better off working in an open workspace--i.e. thrown into a corporate bullpen.

Oh, by the way, vacate your office by Friday!

Sure there are a plethora of benefits to having common spaces to share ideas and open up communications—and these should be plentiful and stocked with comfy sofas, energy-inducing munchables, and ample white boards and tech gear to facilitate collaboration.

But when the pendulum swings all the way to the other side, and your personal office space become a hoteling situation, you know you are losing out to penny-pinching executives, who want to save on leasing office space, furniture, and the like in order to boost their personal bonuses at the end of the year. 

Just ask yourself:

- Do people need privacy to handle sensitive personnel, budget, contracting, and strategic planning and execution issues (as well as occasional family or personal issues—we are all human)?

- Do you need time to close the door for some quiet time to think, innovate, and catch up on work?

- Is there a genuine human need to have a place to put your work and personal things to be productive and comfortable?

The truth is that people need and deserve a balanced work environment—one where people can move healthily between closed and open spaces, individual work and teamwork, privacy and sharing, creativity and productivity, individualism and conformity, comfort and cost-savings. 

Anyone that tells you that people work better in a fully open environment where you have to book up a desk and computer is selling you on short-term organizational cost-savings at the expense of longer-term human capital satisfaction and productivity.

Next time, a “leader” tries to convince you of the merits of your not having a professional workspace, desk, computer, and so on—ask yourself whether you want to work in a Motel 6 every day or for a stable organization that values and invests in it people. 

An appropriate blended environment of open and closed work spaces, where it shows that you are empowered and valued is a career, and not just a job;-)

(Source Photo: here with attribution to epochgraphics)
Share/Save/Bookmark