Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

February 3, 2012

Online Presence, Your Calling Card

In the age when Facebook has surpassed 800 million users, I still often hear people say that they don't like to join social networks or put any information about themselves on the Internet. 

Whether or not their apprehensions about their privacy being compromised is justified or whether they feel that "it's simply a waste of time" or that they "just don't get it," the impetus for us to all establish and nurture our online presence is getting more important than ever. 

In the competition for the best jobs, schools, even mates, and other opportunities, our online credentials are becoming key.

We've heard previously about jobs checking candidates backgrounds on the Internet and even bypassing candidates or even firing employees for their activities online.  

Numerous examples of people badmouthing their companies or bosses have been profiled in the media and even some politicians have been forced out of office--remember "Weinergate" not too long ago?

Now, not only can negative activities online get you in trouble, but positive presence and contributions can get you ahead.

The Wall Street Journal (24 January 2012) reports in an article titled No More Resumes, Say Some Firms that companies are not only checking up on people online, but they are actually asking "applicants to send links representing their web presence" in lieu of resumes altogether. 

What are they looking for:

- Twitter Accounts
- Blogs
- Short Videos
- Online Surveys/Challenges


The idea is that you can learn a lot more about someone--how they think and what they are like--from their history online, then from a resume snapshot.

Of course, many companies still rely on the resume to screen applicants, but even then LinkedIn with over 135 million members is sometimes the first stop for recruiters looking for applicants.

Is everything you do and say online appropriate or "fair game" for people screening or is this going over some sacred line that says that we all have professional lives and personal lives and what we do "when we're off the clock" (as long as your not breaking any laws or doing something unethical) is no one's darn business.  

The problem is that when you post something online--publicly--for the world to see, can you really blame someone for looking?  

In the end, we have to be responsible for what we disclose about ourselves and demonstrate prudence, maturity, respect, and diplomacy, perhaps that itself is a valid area for others to take into account when they are making judgments about us. 

When it comes to children--parents-beware; the Internet has a long memory and Facebook now has a "timeline", so don't assume everyone will be as understanding or forgiving for "letting kids be kids."

One last thought, even if we are responsible online, what happens when others such as hackers, identity thieves, slanderers, those with grudges, and others--mess with your online identity--can you ever really be secure? 

Being online is no longer an option, but it is certainly a double-edged sword. 

(Source Photo: here; Image credit to L Hollis Photography)

Share/Save/Bookmark

December 31, 2011

The Not So Candid Camera

When you're at the swimming pool, it's a time for swimming, splashing, and fun.

With family and friends, it's even a great time to catch some scenic photos of loved ones having a great time.

You expect to see cameras and smartphones taking some discreet pictures or videos.

Not a new problem, but some people take advantage of the people swimming or tanning to take compromising shots.

When people are knowingly scantily clad in public--people will argue what level of responsibility they have for the way they present themselves.

However, when others take advantage of that--let's be clear, the predator is the aggressor!

At the pool, I saw this taken to a whole new level today--and by someone and in a way I would not have expected.

This older-looking guy, with a hat on, strolls up to the pool with a huge tripod mounted video camera on a WALKER and starts taking rolling video on a pool almost exclusively filled with little children.

There was no warning, no request--"may I", no do you mind, just a video camera mounted on a walker at the head of the pool with lots of little kids, and also some teens, women, and more.

First, I watched to see what this guy was doing...then I thought, I better capture this and I took a series of photographs of the guy--who had no apparent compunction about invading everyones privacy.

But the story isn't over--it get's worse.

All of a sudden, I notice my computer picking up a wireless network with a name that self identified them with a clear inclination for child pornography (I am withholding the actual name so as not to tip off the criminal). I capture this too--with a screenshot. Was it the same guy with mounted video camera or someone else?

So much for a relatively serene vacation, and some quiet private time.
I just saw Dateline's "To Catch A Predator" early this week and I almost can't believe this is happening. I think to myself--is this real? Unfortunately it is.

I reported both incidents to hotel security. At their request, I email them the screenshot of the wireless network name that would make anyone cringe. Next call is to the National Center for Missing and Exploited Children and CyberCrime.com.

Normally, I believe in live and let live, but we all have to do our part to protect children and other innocent victims.

Share/Save/Bookmark

November 26, 2011

Espionage, Social Media Style

You are being watched!
Good guys and bad guys are tracking your movements, rants and raves, photos, and more online.
For example, The Atlantic reported on 4 November 2011 in an article titled How the CIA Uses Social Media to Track How People Feel that "analysts are tracking millions of tweets, blog posts, and Facebook updates around the world."
Further, in January 2009, "DHS established a Social Networking Monitoring Center (SNMC) to monitor social networking sites for 'items of interest.'"
And even more recently in August 2011, DARPA invited proposals for "memetracking" to identify themes and sentiments online and potentially use this for predictive analysis.
The thinking is that if you can use online information to predict stock market movements as some have attempted, why not criminal and terrorist activity?
Similarly, The Guardian reported on 16 March 2010 FBI using Facebook in fight against crime and cautions that "criminals dumb enough to brag about their exploits on social networking sites have now been warned: the next Facebook 'friend' who contacts you may be an FBI agent."
This is reminescent of the work of private sector, Dateline NBC in using Internet chat rooms to catch sexual predators online by luring them to a house where the predators believed they were going to meet up with a underage girl for a tryst.
While these efforts are notable and even praiseworthy by the good guys--assuming you can get over the privacy implications in favor of the potential to have a safer society to live in--these activities should be carefully safeguarded, so as not to infringe on the rights and freedoms of those who behave legally and ethically.
But the good guys are not the only ones using the tools of the trade for monitoring and analyzing social networking activities--the bad guys too recognize the implicit information treasure trove available and have you in their crosshairs.
For example, in the last years Arab Spring, we have nation states tracking their citizens political activities and using their power over the Internet to shut off access and otherwise surpress democracy and human rights. Further, we have seen their use for cyberspying and testing offensive cyber attack capabilities--only the most recent of which was the alleged infiltration of a SCADA system for a Illinois water plant.
Moreover, this past week, Forbes (21 November 2011) reported in The Spy Who Liked Me that "your social network friends might not be all that friendly."
From corporate espionage to market intelligence, there are those online who "steadfastly follows competitors' executives and employees on Twitter and LinkedIn."
In fact, the notion of online monitoring is so strong now that the article openly states that "if you're not monitoring your competitors activity on social media, you may be missing out on delicious tidbits" and warns that "it's easy to forget that some may not have your best intersts at heart."
Additionally, while you may not think your posts online give that much away, when your information is aggregated with other peoples posts as well as public information, it's possible to put together a pretty good sketch of what organizations and individuals are doing.
Forbes lists the following sites as examples of the "Web Spy Manual" with lots of information to pull from: Slideshare, Glassdoor.com, Quora, iSpionage, Youtube as well as job postings and customer support forums.
When you are on your computer in what you believe to be the privacy of your own home, office, or wherever, do not be deceived, when you are logged on, you are basically as open book for all the world to see--good guys and bad guys alike.
(Source Photo: here)

Share/Save/Bookmark

October 20, 2011

Be Careful What You Point That At

By now many of you may or may not have pointed your smartphones at a QR ("Quick Response") code to get more information on products, places, events, and so forth.

A QR code is a barcode that that generally contains alphanumeric information and takes you to a website when you read the QR code with your smartphone (i.e. by taking a picture of it with a QR reader app).

QR codes remind me of the barcodes in the store at the checkout line, but QR codes look more like a squared-off roschach test compared to the barcodes on items you purchase which are rectangular straight lines from top to bottom.

By reading the QR code, you don't have to remember or type any information into your smartphone--your just zipped right off to wherever the QR points you (usually after you confirm on the screen that you are okay with going to the URL).

But QR codes like with any information technology, can be used for good or evil -- for some reason though people seemed to have been unsuspecting of the sort of innocuous looking QRs.

Kaspersky Lab has issued a warning on QR codes after finding consumers in Russia scammed when they thought they were downloading an Android app and where instead infected with malware that caused them to send SMS messages to a premium number that charged for each message sent.

So while QR codes can take a reader to a harmless website for information, like other computer code, they can contain instructions that cause you to send email, SMS messages, download applications, etc.

So unless you know what you are QR reading (i.e. you have a high-degree of confidence in whoever placed the advertisement with the QR code)--think twice before scanning that barcode, because you may get a surprise package in your smartphone that you weren't expecting causing infection of your device, loss of privacy to the information stored on it, or costing you money for things you never wanted or intended to spend on.

Scanning a QR code while as simple taking a picture of a sunset--may not have as beautiful consequences.

(Source Photo: here)

Share/Save/Bookmark

October 13, 2011

Increase Security On Your Google Account

After reading the article Hacked! in The Atlantic (November 2011), I looked into Google's new security feature called 2-Step Verification (a.k.a. Two Factor Authentication).

This new extra layer of security--adding "something you have" to "something you know"--to your sign in credentials helps to better protect you and your information in Google (i.e. in the Google cloud), including your emails, documents, and applications.

While a little extra work to login to Google--you have to type in a verification code that Google sends or calls to your phone (this is the something you have), it provides an extra layer of defense against hackers, criminals, and identity thieves.

To protect your Smartphone, Google provides "Application-specific passwords" that you generate from the 2-Step Verification screen and then you enter those into the specific iPhone, Droid, or Blackberry device.

You can sign up for 2-Step Verification from your Google Account Settings page and help protect yourself, your information, and your privacy.

In the future, I hope that Google (and other cloud vendors) will improve on this and use biometrics, to add "something you are," to the authentication process and make this even sleeker and more secure yet.

Stay safe out there! ;-)

Share/Save/Bookmark

August 26, 2011

Get Me Some Privacy


We all need some privacy at one time or another--that's actually one reason to love blogging (ah, some peace at last!)


No matter how much we love to be surrounded by the socializing multitudes, there are times when everyone needs some space.

Enter the Privacy Shell (or Veasyble)--a new wearable, accordion device that extends over your head to give an individual an escape from the hustle and bustle around them.

It is an accessory made of paper, plastic and fabric and comes in the form of either a visor, neck ruffle, bag, or mask.

The Privacy Shells are supposed to be all about creating isolation for the individual or intimacy for companions.

While some have compared these to ostriches putting their heads in the sand, to me they are more like turtles that seeks to escape into their shell when the surroundings get to be too much or dangerous.

The difference though is that unlike real shells for sea creatures or animals, the Privacy Shell offers no real protection from the world around you.

The Privacy Shells also reminds me of the Confucian Three Wise Monkeys--that cover their eyes, ears, and mouth with their hands to imply they "See No Evil, Hear No Evil, and Speak No Evil" (i.e. I think I'll cover face with my Privacy Shell for a little while, and all will be well).

The Privacy Shell seems to be a pointed reaction to world population exploding at nearly 6.8 billion, increasing urbanization and overcrowding, and the hurried pace of human activities and ongoing change that is unprecedented--people are screaming out for some quiet, solitude, and real relationship intimacy (social media just doesn't cut it).

Unfortunately, the Veasyble provides for none of these--rather, it's a fashion statement and clever gimmick--like playing peak-a-boo with a baby, just because you cover the kids eyes for a second, doesn't mean that you've really disappeared.

Wearing a privacy shell is really just an attempt to get attention, and it certainly does that.

But the need for privacy is real and we all can benefit from learning to stop the constant running around, the endless need to be productive, and the incessant interactions (online and off).

There is no magic when it comes to privacy--if you want some, you better find a place--physical, mental, and/or spiritual--that you can get away to and regain your sanity, because hiding under an accordion shell is only going to get you arrested for loitering in Times Square. ;-)

(Source Pictures: here)

Share/Save/Bookmark

August 19, 2011

Supercookies Are Super Invasive


You're alone sitting at the computer surfing the web, you're looking up health, financial, entertainment, shopping, and other personal things.

You feel comfortable doing your thing...you have your privacy and can be yourself without someone looking over your shoulder.

But is the sense of safety real or an illusion?

For the most part, when we are online, we are not safe or in private.

Like at work, where you get the warning that you are being monitored, when you are browsing the Internet, your actions are being tracked site by site (but this is done without warning)--by cookies--or data packets exchanged between web servers and user's browsers.

On the plus side cookies are used for identification, authentication, preferences, and maintaining shopping cart contents; but on the negative side, they are installed on users computers to track your activities online.

The Wall Street Journal (18 August 2011) reports that now there are Supercookies! and "history stealing."

- Supercookies are not cookies with that can fly or lift locatives, but rather they are more difficult to locate and get rid off your computer, so they track your activities, but are hidden in different places such as in the web browsers cache.

- "History stealing" is done when you visit certain websites, and they use software to mine you web browser history to determine where you've visited and then use that to for example, target advertising at you. Imagine though what other profiling can be compiled by categorizing and analyzing your browsing history in aggregate.

Currently, the online ad industry has established self-imposed guidelines to supposedly protect privacy, but they seem wholly inadequate such as "collecting health and financial data about individuals is permissible as long as the data don't contain financial-account numbers, Social Security numbers, pharmaceutical prescriptions or medical records." But knowing people's household finances, credit histories, and personal medical histories is okay--by whose standard?

According to the WSJ, web tracking is not only alive and well, but flourishing with "80% of online display ads are based on tracking data."
Why should anyone have the ability to track our personal web surfing?

We don't need ads targeted at us--we are not targets! We are very capable of searching online for what we what we are interested in and when we are interested in it--thank you!

Session cookies that expire at the end of ones web browsing for session management is one thing; but persistent cookies that collect and mine your personal data--that's should be a definite no-no.

Like with the advertisements that come unwanted in the traditional mailbox and get routinely and speedily placed in the garbage, online advertisements that are based on intrusive website tracking is not only a nuisance, but a violation of our privacy--and should be trashed as a concept and a practice.

Share/Save/Bookmark

August 5, 2011

Facial Recognition Goes Mainstream

Bar

Facial recognition applications are no longer just for the military and law enforcement to identify hostiles or criminals, but rather is going mainstream.

The Wall Street Journal (5 August 2011) reports from the bar scene to the television and from vampire gaming to celebrity match-ups, facial recognition software is now part of our everyday technology mix.

Facial recognition is "at a tipping point where some of these face-recognition technologies are not just gimicks, but are becoming useful." Moreover, the technology has become quite good with "frontal face images, the error rate of rejecting a legitimate claim--when the face image and name match-decreased to 0.29% in 2010 from a rate of 79% in 1993."

So here are some examples of how facial recognition is being used:

- SceneTap: Free app for iPhone and Droid "displays real time stats on the local bar scene...shows the number of people at the bar, the male-to-female ratio, and the average age of the patron"--all from facial recognition--this is not bad except for the bartender on a slow night.

- TVs with Viewdle: TV set-top boxes with facial recongition can "identify who is sitting in front of the TV then customize programming accordingly...displaying most recently watched or recorded shows"--can anyone say America's Got Talent!

- Third Eye: Facebook game that based on facial recognition identifies people as either vampires or slayers. Even without the app, I'd bet I'm one of the slayers :-)

- FaceR Celebrity: This iPhone app uses a picture and facial recognition software to determine which celebrities you most closely resemble. For me, it's Sylvester Stallone, all the way--I'm sure of it.

A lot of people are concerned about the privacy implications of facial recognition--collecting and storing images of faces and using it for surveillance and tracking and getting into your business...like knowing what bars or whereever else you are going to.

But apps like SceneTap say they don't collect personal information, nobody sees the video feed, and they don't match the images to photos on the web or Facebook to identify exactly who is entering the bar. This is sounding a little like TSA and the body imaging scanners they use--i.e. don't worry nobody sees your privates! :-)

But perhaps, whether or not they do or don't isn't the point, they could and that is a privacy concern.

Facial recognition technology, even though it is used in gaming, it is not kid's play, and it should be regulated to avoid a society where Internet "big brother" has virtually unlimited capability to track and match each and every facial you!

(Source Photo: here)

Share/Save/Bookmark

August 4, 2011

Google+ And A History of Social Media

Ten_commandments

Bloomberg Business (25-31 July 2011) tells in biblical terms the history of social media leading up to the recent release of Google+:

"In the beginning, there was Friendster; which captivated the web'ites before it was smitten by slow servers and exiled to the Far East. And then a man called Hoffman begat LinkedIn, saying "This name shall comfort professionals who want to post their resumes online," and Wall Street did idolize it. And then Myspace lived for two thousand and five hundred days and worshipped flashy ads and was subsumed by News Corp., which the L-rd hath cursed. And Facebook emerged from the land of Harvard and forsook the flashy ads for smaller ones and welcomes vast multitudes of the peoples of the world. And it was good."

With the "genesis" of Google+, there is now a new contender in virtual land with a way to share posts, pictures, videos, etc. with limited groups--or circles of friends--and an advance in privacy features has been made.

According to the article, even Mark Zuckerberg and some 60 other Facebook employees have signed up for Google+.

With all this confusion brewing in social media land, one wonders exactly why Randi Zuckerberg (Mark's sister) recently headed for the exits--a better offer from Google? :-)

Google+ has many nice features, especially in terms of integration with everything else Google. On one hand, this is a plus in terms of potential simplicity and user-centricity, but on the other hand it can be more than a little obtrusive and scary as it can \link and share everything from from your profile, contacts, pictures (Picasa), videos (YouTube), voice calls (Google Voice), geolocation (Google Maps), Internet searches, and more.

Google owns a lot of Internet properties and this enables them to bundle solutions for the end-user. The question to me is will something as basic as Circles for grouping friends really help keep what's private, private.

It seems like we are putting a lot of information eggs in the Google basket, and while they seem to have been a force for good so far, we need to ensure that remains the case and that our privacy is held sacred.

(Source Photo, With All Due Respect To G-d: here)

Share/Save/Bookmark

July 30, 2011

Sensors, Sensors Everywhere

Three_surveillance_cameras

Sensors will soon be everywhere--waiting, watching, and working to capture information about you and the environment we inhabit.

Every sensor is an opportunity to collect data and use that data for making better decisions.

Of course, we see sensors deployed first and foremost from our military overseas, in Iraq and Afghanistan, which uses drones to spy on and strike on our adversaries. The drones are really flying platforms of sensors and in some cases with weapons at ready. According to the New York Times (20 June 2011) "From blimps to bugs, an explosion in aerial drones is transforming the way America fights and thinks about its wars..the pentagon now has some 7,000 aerial drones...[and] has asked for nearly $5 billion for drones for next year." These drones are providing "a Tsunami of data" from intelligence, surveillance, and reconnaissance. The change to drones is so significant in our military that the Times reports that "already the Air Force is training more remote pilots, 350 this year alone, than fighter and bomber pilots combined."

Similarly, the Wall Street Journal (5 July 2011) reports that another type of sensor--surveillance cameras--are being deployed big time in China with a new surveillance network in Chongqing of 500,000 cameras (Beijing already has 280,000 cameras in its system) "that officials says will prevent crime but that human-rights advocates warn could target political dissent." While this project is significantly larger and more aggressive than other cities have deployed, China is certainly not alone in deploying surveillance cameras in their cities--Chicago has 10,000, New York has 8,000, and London has over 10,000. According to the WSJ, the overall market last year for surveillance-equiptments sales, not including networking gear or software totaled $1.7 billion! So smile, you are on camera--and it's candid, indeed.

A third article ran in Government Computer News (July 2011) on a more innocuous type of sensors to be used--this being the mass deployment of mobile sensors for the National Weather Service (NWS) on vehicle fleets such as Greyhound buses etc. Beginning in October, "2,000 commercial vehicles will be equipped with sensors...and will be sending data to NWS in near real time. We will be rolling out coverage on the national level." The mobile sensors will be taking 100,000 observations daily--every 10 seconds, about every 300 meters--measuring temperature, humidity, dew, precipitation, and solar information." In the future, we are looking at the potential of a "a sensing probe in every car"--for collecting information on hazardous roads, traffic patterns, and preventing accidents. Other applications for mobile sensors could be for "monitoring chemical and biological agents," nuclear and radiological ones, or CO2 and Ozone and more.

While sensors can collect data that can be used to analyze situations early and often to help people; certainly, they can also be misused to spy on one's citizens and suppress freedom. It can be a slippery slope. Perhaps that why Wired Magazine recently ask (July 2011) who's "Watching the Watchers" making the distinction between:

1) Surveillance--the monitoring of events by those above, the authorities--with CCTV etc. and monitoring events from control rooms, potentially from anywhere around the world.
2) Sousveillance--the monitoring of events by those below, the citizens--with everyday smartphones, cameras, and videocams and posting the digital images and sound bytes to YouTube, Facebook, Twitter, and so on for the world to see.

With IPV6 providing enough Internet address for attaching sensors to every atom on the surface of the earth and sensors becoming smaller and more imperceptible, we can soon monitor and report on everything, everywhere all the time. Some of the biggest challenges remain ensuring the information monitored is kept secure, private, and used legally and ethically and sifting through all the data to identify the truly meaningful information from what's just noise.

(Source Photo: here)

Share/Save/Bookmark

April 23, 2011

Information-Free Is Invaluable

At first I admit it, I didn't really get Google; I mean what is this G-o-o-g-l-e and the shtick about "doing search"?

But the writing was on the wall all along with their incredible mission statement of: "to organize the world's information and make it universally accessible and useful."

So search is the just the beginning of a long list of now amazingly valuable Google properties and services (now valued with a market capitalization of almost $169 Billion):

- Search (Google Search, Google Search Appliance, Google Desktop)
- Cloud Computing (Google Apps Engine, Google Storage for Developers, Chrome Notebooks)
- Advertising Technology (Adwords, AdSense, DoubleClick)
- Website Analytics (Google Analytics)
- Operating Systems (Chrome OS, Android, Honeycomb)
- Web Browser (Google Chrome)
- Productivity Software (Gmail, Google Calendar, Google Apps Suite)
- Social Computing (Google Wave, Google Talk, Orkut, Buzz)
- News Aggregator (Google News, Google Reader)
- Translation (Google Translate)
- Telecommunication (Google Voice)
- Clean Energy (Google Energy)
- Geospatial (Google Maps, Google Earth)
- Video (YouTube)
- Photos (Picassa)
- Electronic Books (Google Books)
- Blogs (Blogger)

What Google seems to intuitively get is that their free powerful web services creates invaluable consumer market share and mind share--like a honey pot. Once the consumer comes on board--like good little bees, they are ripe for companies to reach out to via advertising for all and every sort of product and service under the sun. And according to 1998 revenue breakdown, as much as 99% of Google's revenue is associated with advertising!
Google is brilliant and successful for a number of reasons:

1) Google is consumer-oriented and knows how to attract the crowd with free services, and they let others (the advertisers) concern themselves with monetizing them.

2) Google is incredibly innovative and provides the breath and depth of technology services (from cloud to productivity to search to video) that consumers need and that are easy for them to use.

3) Google is information rich, but they share this broadly and freely with everyone. While some have complained about the privacy implications of this information bounty; so far, Google seems to have managed to maintain a healthy balance of information privacy and publicity.

4) Google values their people, as their "owners manual" reads: "our employees...are everything. We will reward them and treat them well." And to help retain their talent, Google just gave their employees a 10% raise in January.

5) Google wants to be a force for good--their creed is "Don't be evil." They state in their manual: "We believe strongly that in the long term, we will be better served- as shareholders and in all other ways--by a company that does good things for the world, even if we forgo some short-term gains."

Do not underestimate Google--as the Wall Street Journal, 23-24 April, 2011 summarizes today, they are not a conventional company.

At the end of the day, if Google is successful in their business of making information universally accessible and useful, then we are talking about making an invaluable difference in the lives of humanity--where information builds on itself, and knowledge--like the Tree of Knowledge in the Book of Genesis--is alive and constantly growing for all to benefit from in our Garden of Eden, we call Earth.

(Source Picture: Honeybird)

Share/Save/Bookmark

April 9, 2011

Mapping Our Social Future

Social-network-map

I came across this interesting Social Network Map (Credit: Flowtown).

We are all part of and participants in social networking, and are genuinely hooked on it.

(Even going so far as the guy who was tweeting about his Continental flight plane crash in Denver in 2008.)

But sometimes it is hard to figure out what is going with all the social networking tools out there.

Hence, I find this 2010 map a very interesting visualization that sort of sums it all up.

The social lands are sized by number of users--hence Facebook looking like the goliath out there with 500 million users (now up to 600 million already!) surrounded on either side by Friendster and Twitter (with approximately 115 million users each).

Beneath Facebook are the "Volcanic Islands of iPhone Apps" (and add to that the Android Apps)--and with their explosive growth these are truly volcanic.

On top, you have the land of defunct social networks like a bunch of fallen Yahoo properties, along with the "Receding Glaciers of AOL and Windows Live" as well as the "Former Kingdom of MySpace"--together these are essentially the equivalent of the Siberia of the social map.

On the bottom, you have the "Empire of Google" (sounds a little foreboding with a ring of Darth Vader to it) plus there is what was then the up and comer, the "Rising Island of Google Buzz".

Near the "Sea of Desperation" is Match.com--that's funny.

Then there is a pretty sizable Island for YouTube with the "YouTube Triangle of Viral Videos"--plenty of those and now they are competing with the Networks and Cable.

And on the Right is LinkedIn for professional networking and a whole "United Territories of Wikipedia"--hey, the Encyclopedia of the web deserves it!

There are many more familiar sites like Digg, Flikr, and don't forget Blogger-- a personal favorite. :-)

The Strait of Bing is another one that is apropos since search is still Google pretty much all the way.

Finally, in the center under Facebook is the "Sea of Personal Information"--something we should all be concerned about; our privacy is important and shouldn't be overlooked, even as we open up and share of ourselves more publicly than ever before.

There really is something about a picture being worth a thousand words--I like the Map and how it portrays this activity and I am interested in seeing how this evolves as well as in how this might be applied to other social issues including everything from alternative energy to the spread of democracy and human rights.

Share/Save/Bookmark

April 6, 2011

Ads Here, There, Everywhere


This is wild--Adzookie, a mobile advertising company that puts location-based ads out on cell phones, is doing some unbelievable advertising of its own...

They are offering to paint people's houses and even pay their mortgages every month that you let them have their brightly colored billboard painted onto the side of your house.

In less than a day, they got applications from 1000 homeowners (and even one church)!

Is this a sign of the tough economic times or what?

A number of important lessons here:

1) In case we already didn't learn from Google, advertising is really big business--my G-d, this company will pay your mortgage for you just to advertise on your house. (okay it is a big advertisement and all...)

2) Advertising going online, is old news; the new news is that it's going mobile, big time. Folks, the ads are following us. Wherever we go, the ads will be there. From print to TV to billboards on the side of the road and at bus stops, to the Internet and to our smartphones--there is no escape!

3) People will do almost anything for money (this is an old lesson revisited)--even make their "home sweet homes" into the laughing stock of the neighborhood--or do some people actually think this looks cool?

4) Technology is an enabler to make our lives more convenient (news, shopping, etc.) and a richer experience, but it also lets those obtrusive advertisements pop up or crawl across the computer screen when/where NOT desired. As technology is part of virtually every facet of our lives, the potential for advertising here, there, and everywhere can really go overboard. Perhaps, the time is ripe for additional privacy settings on our computers/phones, so that we could block ads (when we want to) and have the equivalent of a "do not call list" for those pesky ads that just never seem to give up--like the Energizer Bunny--"they just keep going and going and going."

When it comes to technology (and the rest of our environment), I believe that we have to be able to control the flow--whether it's information or advertising.

Even too much of a good thing, can be a real eye sore.

Share/Save/Bookmark

January 27, 2011

Safeguard Your Location

Nice presentation by the Army called "Geotags and Location-based Social Networking."

It offers important information on the potential dangers of leaving on Global Positioning System (GPS) services on electronic devices (such as smartphones and cameras) and using location-based social networking services.

- "Geotagging is the process of adding geographical identification to photographs, videos, websites, and SMS messages. It is the equivalent of adding a 10-digit coordinate to everything you post on the Internet."
- Location-based social networking applications focus on 'checking-in' at various locations to earn points, badges, discounts" and even become mayor for the day.

Exposing your location is not only dangerous if your in the military and engaged on an operation. But rather, for all of us, broadcasting location and patterns of movement can be detrimental to personal privacy and security.

As the geotagging safety presentation advises, consider when (and when not) to:

  1. Turn off the GPS on devices such as smartphones and cameras.
  2. Keep geocoded photos offline from the Internet (i.e. Flikr, Picasa, etc.)
  3. Avoid use of location-based social networking services (e.g. FourSquare, Facebook Places, Gowalla, SCVNGR, etc.)

Sharing information--including where you are, were and are going--with family, friends, and colleagues can be a healthy and fun interchange; but sharing that information with "the wrong" people can leave you exposed and sorry.

Think twice--think about your privacy and security.

Share/Save/Bookmark

November 16, 2010

Who Needs Airport Body Scanners? An Alternative Approach

Not sure if this is serious or a joke, but I received an email for an alternative to body scanners at the airports -- may seem a bit crude, but then again we need to look for an effective security solution that is less invasive.

This particular idea, attributed to Israeli security, is for a booth that rather than take potentially invasive body scans, will safely (but not for you, if you are a terrorist) "detonate any explosive device that you may have on you." Poof!

Advantages: deterrence, speed, privacy, justice, and the objective of safe air transport is achieved.

Share/Save/Bookmark

November 7, 2010

Match Me With You

eHarmony and Match.com and other matchmaking sites are all the rage on the single scene with recommended partners for people being done by computer algorithm.

Now this concept of matching of people is going beyond people’s love lives and into the world of business.

CIO Magazine (1 Nov. 2010) reports in an article called “Call Center Matchmaking: Analytics pair customers with the right agents for better service” that companies are using similar technology to match customers and call centers reps in order to get higher satisfaction ratings and increased retention rates—and it’s working!

Since implementing the IBM system called Real-Time Analytics Matching Platform (RAMP), for example, Assurant has increased customer retention rates by 190 percent.

Other companies have been doing customer matching on a more elementary level for some time—for example, financial service firms route calls from high-net worth or high-balance customers to “premier agents.” Similarly, calls made at certain time are “routed to Boise instead of Bangalore.”

With computer systems like RAMP, there is a recognition that customers can do better by being matched with specific customer service representatives and that we can use business analytics to examine a host of data variables from sex and age to persistence in calling to match a customer to “the right” representative to handle their issues.

Based on success rates, computers have been shown to perform sophisticated business and data analysis, and to successfully match people for more successful business (and life) transactions.

If we can successfully pair people for love and for customer service, it makes me wonder what’s next (maybe happening already)? For example, will we pair people to “the right”:

  • Potential adoptee parents?
  • Neighborhoods?
  • Schools?
  • Jobs?
  • Bosses?
  • Coworkers?

In essence, as the “bar is raised” in a highly global and competitive environment, will we be pushed to seek to maximize our potential for success interaction with others—for developing high-performance and highly profitable interactions—by pairing exclusively with those that “screen” positive for us?

With genetic testing already being used to screen for babies that people want—like an order at Burger King—“hold the pickle, hold the lettuce, special orders don’t upset us…”—we are already well on our way to “special ordering” the people in our lives.

Companies have also started to use intelligence and personality tests to weed out applicants, and the use of personality tests like Myers Briggs is already being employed for better understanding each other and working together.

However crude all this may be, it is essentially a high-tech way of trying to optimize our performance. The question is can we use technology to enhance personal interactions and elevate performance without subjecting people to undue bias, criticism, and violation of their privacy? This is a very slippery slope indeed.

Another potential problem with computer matching is that when we rely on computers to “tell us” when we have a good match, we are potentially missing potential opportunities for matches with others that cannot be easily quantified or summed up by a computer algorithm? As they say, for some “two birds of a feather flock together” and for others “opposite attract”—we shouldn’t limit ourselves to any creative, positive possibilities in relationships.


Share/Save/Bookmark

April 17, 2010

City 2.0 Makes City Sense

They call it City 2.0—that is cities that are IT enabled with all sorts of sensors and smart technology.

  • Cameras monitor traffic flow.
  • Sensors test water quality and monitor sewage runoff.
  • Smart meters keep track of energy usage.
  • Acoustical systems monitor structural integrity of bridges and other infrastructure.
  • Building management systems control ventilation, lighting, power, fire, and security.
  • Environmental monitoring tracks weather, smog, and even potential natural disasters.

And I think this is all probably still just the beginning…

Governing Magazine, April 2010 has an article entitled “The Sentient City” by Zach Patton” that describes how systems are helping cities “send resources to the street corner where gangs are converging, manage traffic before it becomes congested, and respond to emergencies seamlessly—automatically—before they’re even reported.”

With technology, we are able to be not only more aware of our surroundings, but also be more proactive in managing them.

There are many critical technology elements that come into play for a sentient city:

  • Sensors—for awareness of what is going on
  • Networking—for linking together the sensors with the backend systems
  • Storage—for housing all the incoming city data
  • Business Intelligence—for making sense of it all
  • Alerting—for notifying authorities and citizens of important happenings

According to analyst Rob Enderle, with technologies for a sentient city, “you can run a city cheaper and have happier and safer citizens.” Further, according to the article, the city “becomes a more efficient place for people to live and work. It also means a government can do more with less.”

Obviously, there is significant investment that needs to be made in city infrastructure, systems, and people to make this next generation of city living a complete reality.

But with the investment will come rewards of more and better information for managing all the people, places, and things interacting with each other in the environs.

The flip side of a sentient city is a certain degree of risk to people’s privacy. For example, where cameras and other sensors abound, people’s comings, goings, and doings could become subject to invasive scrutiny.

In this case, a little information can become a dangerous thing without adequate safeguards as to what can be monitored, when, and with how much personally identifiable information. For example, this issue is currently being dealt with at airports full body technology scanners that are programmed to hide a person’s facial identity.

The benefits of sensing and monitoring our environment are great in terms of efficiencies, safety, and security of our citizens, and I believe that this capability will grow from discrete sensing systems into more holistic city management systems that monitors all the city’s functions and operations, feeds this information into dynamic knowledge centers, and provides real-time information for managing day-to-day city living more intelligently and proactively.

As our population grows and our major city centers continue to have to deal with the ever greater potential for overcrowding, traffic, dirt, crime, and other facets of close knit metropolitan life, our need for more and better information for managing these will become ever more critical to support the continued livability and likability of our cities that we call home.


Share/Save/Bookmark

April 4, 2010

Advanced Biometrics for Law Enforcement

Homeland Security Today Magazine (March 2010) has an interesting article called “Biometrics on the Battlefield" about how the American military has had significant success in Afghanistan taking biometrics and in using it for “vetting, tracking, and identification.”

Here’s how it’s done:

The biometrics system uses HIIDE (Handheld Interagency Identity Detection System) devices, which is “similar in size to a large camera, [that] connects directly to the BATS [Biometrics Automated Tool Set] database and matches inputs against a biometrics watch list of 10,000 individuals.”

The database “BATS uses a combination of fingerprints, photographs and iris scans, in addition to an in-depth background examination” to “screen potential local employees, identify detainees, and differentiate friendly individuals from insurgents and terrorists.”

How successful has the use of biometrics been?

“The use of biometrics has clearly thwarted security breaches and helped prevent unwanted activities by the enemy. Additionally, in 2008 alone, hundreds of HVTs (high value targets) were identified through the use of this biometrics technology.”

The article suggests the application of this biometric system for domestic law enforcement use.

Currently, fingerprint cards or stationary scanners are common, but with the proposed military biometrics system, there is the technology potential to use mobile scanning devices quickly and easily in the field.

The article gives the example: “if an officer came into contact with an individual under suspect conditions, a simple scan of the iris would ascertain that person’s status as a convicted felon, convicted violent felon, convicted sex offender or someone on whom an alert has been placed.”

In this scenario, quicker and more accurate identification of suspects could not only aid in dealing with dangerous offenders and benefit the officers in terms of their personal safety, but also contribute to ensuring community safety and security through enhanced enforcement capabilities.

Of course, using such a system for law enforcement would have to pass legal muster including applicable privacy concerns, but as the author, Godfrey Garner, a retired special forces officer, states “hopefully, this valuable technology will be recognized and properly utilized to protect law enforcement officer in the United States. I know that I’ve seen it protect our sons and daughters on the battlefields of Afghanistan.”

We are living in an amazing time of technology advances, and the potential to save lives and increase public safety and security through lawful use of biometrics is a hopeful advancement for all.


Share/Save/Bookmark

March 31, 2010

Balancing Freedom and Security

There is a new vision for security technology that blends high-tech with behavioral psychology, so that we can seemingly read people’s minds as to their intentions to do harm or not.

There was a fascinating article (8 January 2010) by AP via Fox News called “Mind-Reading Systems Could Change Air Security.”

One Israeli-based company, WeCU (Read as we see you) Technologies “projects images onto airport screen, such as symbols associated with a certain terrorist group or some other image only a would be terrorist would recognize.”

Then hidden cameras and sensors monitoring the airport pickup on human reactions such as “darting eyes, increased heartbeats, nervous twitches, faster breathing,” or rising body temperature.

According to the article, a more subtle version of this technology called Future Attribute Screening Technology (FAST) is being tested by The Department of Homeland Security—either travelers can be passively scanned as they walk through security or when they are pulled aside for additional screening are subjected to “a battery of tests, including scans of facial movements and pupil dilation, for signs of deception. Small platforms similar to balancing boards…would help detect fidgeting.”

The new security technology combined with behavioral psychology aims to detect those who harbor ill will through the “display of involuntary physiological reactions that others—such as those stressed out for ordinary reasons, such as being late for a plane—don’t.”

While the technology married to psychology is potentially a potent mix for detecting terrorists or criminals, there are various concerns about the trend with this, such as:

1) Becoming Big Brother—As we tighten up the monitoring of people, are we becoming an Orwellian society, where surveillance is ubiquitious?

2) Targeting “Precrimes”—Are we moving toward a future like the movie Minority Report, where people are under fire just thinking about breaking the law?

3) Profiling—How do we protect against discriminatory profiling, but ensure reasonable scanning?

4) Hardships—Will additional security scanning, searches, and interrogations cause delays and inconvenience to travelers?

5) Privacy—At what point are we infringing on people’s privacy and being overly intrusive?

As a society, we are learning to balance the need for security with safeguarding our freedoms and fundamental rights. Certainly, we don’t want to trade our democratic ideals and the value we place on our core humanity for a totalitarianism state with rigid social controls. Yet, at the same time, we want to live in peace and security, and must commit to stopping those with bad intentions from doing us harm.

The duality of security and freedom that we value and desire for ourselves and our children will no doubt arouse continued angst as we must balance the two. However, with high-technology solutions supported by sound behavioral psychology and maybe most importantly, good common sense, we can continue to advance our ability to live in a free and secure world—where “we have our cake and eat it too.”


Share/Save/Bookmark

January 9, 2010

Architecting A Secure Society

Once again, we are confronted with the basic security question of how much is the right amount?

It’s a classic catch-22 that requires us to architect security to meet opposing ends: we expect security to be as much as necessary to stop the terrorists, but as little as possible to ensure efficient travel and trade and maintain people’s privacy and equality.

In the last decades, we have behaved schizophrenically, calling for more security every time there is an attempted attack, only to withdraw and demand greater privacy protections, speedier security processing, and only random checks when things cool down.

The Wall Street Journal reported in the January 9-10, 2010 edition that the U.S.’s handling of security nowadays is an ever-losing proposition. The article calls it a virtual game of “Terrorball,” in which we cannot win, because there only two perpetual rules:

· “The game lasts as long as there are terrorists who want to harm Americans; and

· If terrorists should manage to kill or injure or seriously frighten any of us, they win.”

Based on the above, I believe that we can only win the game by changing its rules. Rather than being reactive to every terror scare, we are prepared with one approach—one that delivers an optimal level of security based on the current level of risk.

I recall when Michael Chertoff was Secretary of Homeland Security. During that time, he was a strong advocate for a risk-based approach that was multilayered, strong yet flexible enough to accommodate changing circumstances. From that perspective, which I think made a lot of sense: security decisions are made on the basis of objective criteria. These include technical feasibility, maximum effect, cost-benefit analysis, and so on.

A risk-based approach, or what I call “optimal security,” clearly makes a lot of sense. Yet it is tempting, when a security situation actually occurs, to let emotions get the better of us. On the one extreme, sometimes hysteria takes place and everybody seems a potential threat. Other times, we get angry that anyone at all is subjected to scrutiny or questioning.

In order to save the most lives and change the terror game, we have to decide to become more rational about the threat that faces us. This doesn’t mean being cold and calculating, but rather rational and proactive in developing a security architecture and governance that seeks to protect the most with the least negative impacts—but not trying to plug every possible hole at all costs.

In optimal security: sure, there is the ideal where we want to protect every American from every possible threat. However, there is also the reality where, because of competing priorities and scarce resources (to address everything from the deficit, health care, education, social programs, energy, science, defense, and more) we cannot—no matter how much we genuinely want to—prevent every terror instance.

So the terror playbook can and should be transformed. We can recognize there will always be terrorists—enemies of the state—who want to harm us and given enough attempts, no matter how optimal our security, they will occasionally get a sucker punch in on us—and we must be prepared for this. Moreover, rather than “freaking out” about this the terror threat, we can grow and commit to doing the best we can and accepting that we will increase security when information is there to support that need, and we will relax when that becomes possible.

Bottom line: We must move away from hysteria and any other factor that prevents us from being objective and make rational choices to deploy protections that are most effective and simultaneously safeguard our liberty.

“Life, liberty and the pursuit of happiness” captures the security debate well. We want to safeguard lives, but at the same ensure liberty and we want to be happy and not afraid all the time.

To accomplish this balance, our optimal security realization should be based on highly effective intelligence, supported by the very best technology, and a security platform that adjusts to threats in real time.

While our intelligence continues to strengthen and our technology continues to improve, the greatest challenge is our ability as a nation and as individual human beings to cope with the distress caused by terrorism.

We are ambivalent emotionally about the threat and what needs to be done to combat it. However, once we look inside and understand the emotions that this issue raises, and come to terms with reality we face, we will as a nation be more at peace and less likely to jump from one extreme to another in terms of our demands and expectations from those who protect us every day.


Share/Save/Bookmark