Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

November 28, 2013

The Dancer and The Tablet


So we are at this Mediterranean Restaurant next to the beach.

We are sitting outside--it is a little chilly and we cozy up next to one of the fire poles to keep warm.

We weren't eating much; just a drink for our anniversary and something to munch on.

All of a sudden, my wife points to this lady from the next table who gets up and starts dancing provocatively.

You can see the sliver of ocean behind her, the night sky, and the cars and pedestrians are going by behind her.

There are multiple realities going on here:

She is in her own world--dancing to the music, swaying this way and that, and enjoying her femininity. 

On the other hand, the guy she's with is taking a video of her on his tablet computer--he seems more concerned with capturing the moment with his technology than enjoying his girlfriend. 

We are conscientious observers--I sort of wondered if the guy should've been paying more attention to the women who was wooing him than playing with his tablet. 

The other lesson that I can't help reaching is that cameras and microphones are truly everywhere--privacy is a complete myth!  

He is recording her, we are videoing them on our smartphone, and the restaurant is taping all of us on CCTV cameras, and NSA is laughing at us from Fort Meade. 

So if you want solitude, book a flight with Virgin Galactic. ;-)
Share/Save/Bookmark

November 9, 2013

Cancer Takes It Away


This is an amazing video.

It is about the life of Angelo and Jennifer Merendino.

Initially, they a lived a fairy tale life, until she was diagnosed with breast cancer. 

You can see in the video the brutal transformation Jennifer underwent from the disease.

Yet, the love and togetherness this couple maintained is inspiring.

A link with photos of this couple's battle with cancer is here.

Jennifer died on December 22, 2011 at the young age of 40. 

Angelo, a NY photographer compiled their painstaking journey in a book called The Battle We Didn't Choose available at their website My Wife's Fight With Breast Cancer.

It is difficult to look at the pictures of Jennifer's illness and deterioration, especially when marked in contrast to her husband throughout.

The numerous personal pictures makes me feel a little uncomfortable, even as I believe, they are meant to be educational and giving--with 1/2 the proceeds from the book's profits to be going to a non-profit for breast cancer victims. 

The story is very tragic, yet too often repeated throughout society...some may be able to find hope in it, and to appreciate what we have, when we have it.
Share/Save/Bookmark

November 5, 2013

Loneliness Is A Scream

One of the scariest things for many people is not being with other people. 

I don't mean intentionally not being with others--taking time away from the hustle and bustle for yourself--but rather being left alone. 

Think of the horrors of POWs kept in isolation, prisoners put in solitary, or just everyday kids icing out other children in school, adults marginalizing colleagues at work, and family members abandoning spouses and children at home. 


Elizabeth Bernstein makes the distinction between being alone (a potential voluntary state) and loneliness (when you feel that you are forced into an isolated state) in the Wall Street Journal today. 

It's an awesome article that explains so much about loneliness:

- We all experience loneliness from "homesickness, bullying, empty-nesting, bereavement, and unrequited love."

- Loneliness can occur when you are without anybody ("isolation") or with the wrong somebody ("dissatisfaction").

- It's a survivalist function and evolutionary to feel scared when your alone, because when you are "too close to the perimeter of the group, [then you become] at risk of becoming prey."

- Loneliness is also associated with memories or fears from childhood--when we were young and vulnerable--that someone wasn't there or going to be there to take care of us. 

- Too much loneliness is a "strong predictor of early death"--greater than alcoholism, 15 cigarettes a day, or obesity.

- Loneliness is on the rise, with "some 40% of Americans report being lonely, up from 20% in the 1980's" and this is correlated with more people living alone, now 27% in 2012 versus 17% in 1970.

- Loneliness can be placated by "reminding yourself you're not a [helpless] child anymore," building emotional health and personal self-sufficiency, doing things you enjoy when alone, and reaching out to connect with others. 

She jokes at the end of her article that when we aren't feeling lonely, we are annoyed that people just don't leave us alone.

This is a very real concern as well, especially with a multitude of family needs (significant others, young children, elderly parents), 24x7 work environments, and the reality of pervasive online communications and even invasive social media. 

Not exclusive to introverts, too much people can make us feel put upon, crowded, and even worn out--and hence many people may even run from excessive social activity and crowds.

Yet without a healthy dose of others, people can literally go crazy from the quiet, void, boredom, as well as from the real or perceived feelings that they are in some way unworthy of love or affiliation. 

So even though some people can be annoying, users, or try to take advantage of us, no man is an island, and growth, learning and personal serenity is through degrees of love and connection, for each according to their needs. ;-)

(Source Photo: here)
Share/Save/Bookmark

September 28, 2013

Insuring Against Cyber Attacks

More and more, our technology is at risk of a cyber attack. 

In fact, just today the Wall Street Journal reported that Iran has hacked into the Navy's unclassified network. 

While we can fix the computers that were attacked, the damage done in terms of data exfiltration and malware infiltration is another matter.

To fix the computers, we can wipe them, swap out the drives, or actually replace the whole system. 

But the security breaches still often impose lasting damage, since you can't get the lost data or privacy information back or as they say "put the genie back in the bottle."

Also, you aren't always aware of hidden malware that can lie dormant, like a trojan horse, nor can you immediately contain the damage of a spreading computer virus, such as a zero-day attack. 

According to Federal Times, on top of more traditional IT security precautions (firewalls, antivirus, network scanning tools, security settings, etc.), many organizations are taking out cybersecurity insurance policies.

With insurance coverage, you transfer the risk of cybersecurity penetrations to cover the costs of compromised data and provide for things like "breach notification to victims, legal costs and forensics, and investigative costs to remedy the breach."

Unfortunately, because there is little actuarial data for calculating risks, catastrophic events such as "cyber espionage and attacks against SCADA industrial controls systems are usually not covered. 

DHS has a section on their website that promotes cybersecurity insurance where they state that the Department of Commerce views cybersecurity insurance as an "effective, market-driven way of increasing cybersecurity," because it promotes preventive measures and best practices in order to lower insurance premiums and limits company losses from an attack. 

Moreover, according to the DHS Cybersecurity Insurance Workshop Readout Report (November 2012) cybersecurity insurance or risk transfer is the fourth leg of a comprehensive risk management framework that starts with risk acceptance, risk mitigation, and risk avoidance. 

I really like the idea of cybersecurity insurance to help protect organizations from the impact of cybersecurity attacks and for promoting sound cybersecurity practices to begin with.  

With cyber attacks, like with other catastrophes (fire, flood, accident, illness, and so on), we will never be able to fully eliminate the risks, but we can prepare ourselves by taking out insurance to help cover the costs of reconstituting and recovery. 

Buying insurance for cybersecurity is not capitulating our security, but rather adding one more layer of constructive defense. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

August 25, 2013

Drone Warfare: Integration At Its Best

I learned a lot about Drone Warfare reading and thinking about "The Killing Machines" in The Atlantic by David Bowden. 

The benefits of drones for military use are numerous:

- Stealth: Drones can be relatively small (some are now even the size of bugs) and they can survey from vehicles that are aerial, terrestrial, underwater, or I would imagine, even subterranean. In a sense, even a spy satellite is a type of drone, isn't it? 

- Persistent: They can hover unmanned over enemy territory for not only hours, but also days at a time, and switching in replacement drones can create a virtually continuous stream of surveillance for months or years, depending on the need. 

- Powerful: The sensors on a drone can include high-definition cameras, eavesdropping devices, radar, infrared, "and a pixel array so dense, that the device can zoom in clearly on objects only inches wide from well over 15,000 feet above." Further, with features like Gorgon Stare, multiple cameras linked together can view entire cities in one feel swoop.   

- Long-range: Drones can function doing reconnaissance or surveillance far away and deep into enemy territory. With drones, no one is too distant or remote as to be untouchable. 

- Lethality: Drones can carry missiles such as The Hellfire, a "100-pound antitank missile" and other weapons that can act expediently on information without the need to call in additional support. 

- Precise: Drones can hit targets with amazing precision--"It targets indiscriminate killers with exquisite discrimination." 

- Safety: Drones carry out their work unmanned with (or without) controllers stationed at safe distances away--sometimes thousands of miles back at the homeland. 

- Expendable: Drones themselves are throwaway. As with a bee, a drone is more or less useless when disconnected from the hive. Similarly, a military "drone is useless as an eyeball disconnected from the brain," since drones function only as an extension of back-end satellite links, data processors, intelligence analysts, and its controller." 

Overall, the great value of drones is their integration of technologies: vehicles, global telecommunications, optics, sensors, supercomputers, weapon systems, and more. 

To me, between the questions of fairness, legality, and privacy--drones are being given a bum rap. 

- Fairness:  Just because one side has a technology that the other doesn't, should not mean it's wrong to use it. This is what competition and evolution is all about. I remember learning in school, when children would complain to the teacher that something was unfair, and the teacher would reply, "life is unfair!" This doesn't mean we should use a shotgun approach, but rather use what we got, appropriately. 

- Legality: Is it legal to kill targets rather than apprehending them, trying them, and otherwise punishing them? This is where sincere deliberations come in on whether someone is a "lawful target" (e.g. enemy combatant), "imminent threat" (e.g. self-defense), whether other alternatives are viable (e.g. collateral damage assessments), and will killing them do more hard than good to foreign relations, influence, and even possibly breeding new hate and terror, rather than quelling it. 

- Privacy: The issue of privacy comes less into play with military matters and more with respect to domestic use for law enforcement and other civilian uses (from agriculture to urban planning). The key is protect citizens from being unduly monitored, tracked, and scrutinized--where freedom itself is under big-brother attack and we all become mere drones ourselves in a national hive of complacency and brainless obedience. 

Rather than scaling back drones use, I liked Mary Ellen O'Connell vision of new drones "capable of delivering a warning--'Come out with your hands up!' and then landing to make an arrest using handcuffs."

This is the promise of technology to learn from mistakes of the past and always bring possibilities of making things better in the future. ;-)

(Source Photo: here with attribution to Don McCullough)
Share/Save/Bookmark

August 17, 2013

The Keys To Good Government

Peggy Noonan hit it right on the head in today's Wall Street Journal.

The fear of giving up privacy, she said, is of a "massive surveillance state," and this is not overblown. 

The crux of this concern is that if Government (or I would add hackers) can intrude on citizen's private communications and thoughts, then eventually people will self-censor. 

No privacy does mean government control.

As Noonan makes clear, violations of citizen privacy is not just a threat to the Fourth Amendment protecting against unreasonable search and seizure, but is a bona fide danger as well to the First Amendment guaranteeing free speech. 

People should not be afraid to think critically and creatively because of what the government may do to them (and their families) for disagreeing with fraud, waste, abuse, special interests, and stupidity.

Rather, politicians should fear being criticized and not re-elected for violating the duty to rule justly and as true representatives of the people. 

However, when government and politicians can listen in, see, and know what the lawful opposition in thinking and doing, then they are given virtually absolute power.

And absolute power does corrupt absolutely.  

We should not change our underlying values of freedom and become a nation of routine digital interrogation of everyday John Doe's.

Terrorists, traitors, anarchists, and hostile nation states should be pursued and given no rest or privacy from our intelligence, law enforcement, and warfighters. 

But well-meaning citizens should be free to think, feel, and say what they believe in the best interest of the country. 

Upright citizen's should never have to fear an unjust government, but rather corrupt politicians should be concerned about violating the fundamental rights of the people. 

At least two keys to good government are privacy and free speech. ;-)

(Source Photo: here with attribution to Empirical Perception)
Share/Save/Bookmark

July 13, 2013

Head Spinning From All The Spin

The Nazi Minister of Propaganda, the evil Joseph Goebbels said, "He who controls the message, controls the masses."

All dictatorships function very much from this premise as we see even now a days in totalitarian governments that limit Internet access, block websites, and filter news and messages from the people, so as to keep them docile and servile. 

However, even in a democracy as fine as ours, the ability to control the message is a very powerful tool in directing how events are understood by the public and what action is taken, or not. 

Some recent examples:

1) Syria's Use of Chemical Weapons:
Numerous allies including England, France, and Israel say they have intelligence about Syria's use of sarin gas against their own people...So did Syria cross the red line and use chemical weapons requiring us to take action or is this a matter for investigation and evidence? 

2) Iran's Violation of the Nuclear Non-Proliferation Treaty:
Iran is one of the world's richest in energy resources and reserves...So is Iran violating the Nuclear Non-Proliferation Treaty necessitating that we stop them or are they just building nuclear facilities for peaceful civilian energy needs? 

3) Egyptian Military Coup and Roadmap For Reconciliation:
Egypt's military overthrew the Egyptian Prime Minister from the Muslim Brotherhood who oversaw the rewriting of the constitution in 2011 to be based on Islamic law and not inclusive of other more secular elements of society...So is the restoration of true democracy and civil rights for the Egyptian people or a brutal coup? 

4) Sudan Committing Genocide in Darfur:
With over 400,000 killed, 2,500,000 displaced, and 400 villages completely destroyed in Darfur...So did Sudan commit genocide requiring prevention, intervention, and punishment or was this just Sudanese internal conflict? 

5) People Employed in U.S. at 30-Year Lows:
The proportion of the U.S. population that is working is at low rates not seen since the recession of the 1980's...So is the unemployment rate still a critical national issue or is the unemployment rate really better and the economy strong again? 

6) Edward Snowden Leaking Classified Information:
Snowden sought out the job with Booz Allen Hamilton to gather evidence on classified NSA surveillance and when he did he leaked this information to the news and harmed national security...So is Snowden a traitor or a whistleblower? 

7) An $82 Billion Federal IT Budget:
The Federal IT budget is anticipated to rise to $82 billion in 2014...So are we still spending on large troubled IT projects or realizing billions in IT savings from new technology trends in cloud, mobile, social computing and more?

As Bill Clinton in 1998 said when questioned about the Monica Lewinsky affair..."It depends what the meaning of the word is, is?"

We see clearly that definitions are important, interpretations are important, and spin can make right seem wrong and wrong seem like right. 

How we communicate and present something is very important and has critical ramifications on what is done about it whether in terms of action, attribution, and retribution. 

Moreover, we should keep in mind that "He who knows doesn't tell, and he who tells doesn't know," so there are limits to what even gets communicated from the get-go. 

What is communicated, when, and in how much clarity or distortion is a function one on hand of people's agendas, biases, career building (including the desire to get and keep power), as well as the genuine need for secrecy and security.

On the other hand, the desire for openness, transparency, truth, and healthy debate (facilitated by the media, checks and balances in government, and the judicial system) provides a counterbalance. 

We the people must press to determine--is the person telling it like it is or are some things being contrived, manipulated, edited, and Photoshopped.

In the end, critical thinking and looking beyond the surface can make the difference between what we know we know and what we think we know. ;-)

(Source Photo: here with attribution to Jah~)


Share/Save/Bookmark

June 16, 2013

Dystopia Man

I love this picture that I saw in the art gallery here in Florida. 

I named the person in the portrait, Dystopia Man, because he reminds me of how people would look in a speculative futuristic society.

The way the man looks askew with bloodshot eyes, head split, and hand partially covering his mouth all make me feel like the future is quite unknown, somewhat risky, if not sort of ominous.

We have lots of national and global challenges--with security versus privacy, openness versus secrecy, sharing versus private ownership, social entitlements versus capitalism, theocracy versus democracy, control versus freedom, and man versus machine.

How will these turn out for society, for us?  Will we maintain a healthy balance and respect for individuals? Will these and other conflicts be resolved peacefully? 

Hopefully G-d will grant us the wisdom to solve these dilemmas and many others that await us in the present and not so distant future. 

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 14, 2013

No Such Agency (NSA) Listening To No Such Information (NSI)

The National Security Agency (NSA) frequently referred to by the secretive surname of No Such Agency is at the forefront of our signals intelligence (SIGINT) and in protecting America--they are amazing!

Recently, there is a lot of controversy about the PRISM program for sifting through communications looking for terrorist contacts, plans, and imminent attacks to be foiled. 

Is this necessary for security or a violation of our privacy? 

Of course, we value our privacy and generally wish we had more. (For me growing up in the busy and crowded city that never slips, I craved a little more quiet and secluded life and that's how I ended up in the Washington D.C. suburbs).

Anyway, if your an average hard-working Joe or Jane, what do you fear about PRISM?

For me, if "they" are tracking calls or listening--this is what they hear:

- The occasional squabble with my loving wife (yes, we drive each other nuts sometimes).

- My teenage kids hanging up their phone on me, not wanting to hear my brilliant (in my own mind) parental advice and guidance.

- My elderly parents lecturing me and telling me that I should go to synagogue more often.

- The daily life transactions with the plumber, the cable service, and the credit card company. 

If your honest and loyal, and the system works fairly, the way it's supposed to, your communications are just some transmission packets travelling through cyberspace to carry out your life's goings on.

Then again, if you're crooked, a traitor, or planning to or have hurt someone, well then your up against some very powerful technology tools and (hopefully) your going to get caught and get what's coming to you.

The big concern then is not when the system works well and fairly, but when it's used corruptly, fraudulently, or for political ends. 

Then it's not what someone overhears you say or sees you do that's a real concern, but rather, with all the advanced electronics and technology, what can be made up about you to address personal or political gripes, grievances, or just settle a score.  

You don't have to be afraid (generally) of what you do honestly, instead you need to fear the dishonesty of those who can or are apt to misuse the technology for their own ends.

Then what you really did or said, can be taken out of context, exaggerated, edited, spliced, or otherwise doctored to something else entirely. 

This is why the integrity and ethical backbone of those who run the country and our vital institutions are of paramount importance.

With honesty, ethics, and justice--a surveillance system can greatly enhance national security. Without these things, they can be a tool of corruption. The best protection is not unplugging the system, but hooking in lots of internal and external controls to keep it honest.   ;-)

(Source Photo: here by LittleBirth)


Share/Save/Bookmark

May 18, 2013

Remembering Every Moment


I saw a frightening movie a while back about a girl that had been drugged and brutally raped. 

In the movie, the girl is eerily warned, "You won't remember, but you will never forget!"

That line leaves an indelible mark--that something can be so horrific, so scaring that you can't recall it, and can't forget it. 

Now there is a new device coming to market that helps you recall everything.

Memoto is a 5 megapixel tiny camera (36 x 36 millimeters) with an embedded GPS that is worn around the neck, like a necklace. 

When clipped on, it starts taking the phones and when put down or in a pocket it shuts off. 

The Memoto takes 2 photos a minutes (1 every 30 seconds or nearly 3,000 a day if worn all the time).

The photos are stored in an accessible cloud app that uses GPS to sort the photos on a timeline with a date and location stamp.

Photos are private by default, but can be shared using traditional social media, such as to Facebook or Twitter. 

The battery lasts about 2 days and is rechargeable by connecting to your computer at which time the photos are uploaded to Memoto's servers. 

Wear, photograph, recharge/upload and repeat. 

Privacy issues abound with a device like this--imagine wearing this into the bathroom, locker room, bedroom, or even a private corporate meeting--lots of embarrassing and compromising no-no's here!

At the same time, imagine all the precious or memorable moments in life that you can capture and enjoy--it's the realization of the photographic memory you've never had, but always wanted. 

Also think of that rapist or other criminal approaching you--getting photographed, caught, and punished--so that the victim really does remember, and can forget with a new peace of mind. ;-)
Share/Save/Bookmark

May 5, 2013

Action Video Extravaganza

This is an awesome action video--5 minutes and totally worth it.

It feels like being inside a single player shooting game. 

I first saw this video on Facebook posted by a colleague as a interesting advertisement for Go Pro wearable helmet cameras, often used for capturing extreme sports activities. 


Now we are going from helmet cams to Google glasses. 


With the new Google Glass coming out this year for $1,500--that mimics most smartphone functions including taking pictures and videos just by a simple verbal command such as "Okay Glass, record a video" or "Okay Glass, take a picture,"-- things are going to get a lot dicier. 


While this type of James Bond action doesn't happen everyday for most of us, if we can capture every day events like these --it will be both awesome from a recall, sharing, entertainment, study and scientific perspectives and scary from a privacy one. 


If Google Glass really works as it's envisioned, it is going to revolutionize how we interact with the world and each other--get ready augmented reality, here we come. ;-)

Share/Save/Bookmark

April 29, 2013

Bathroom Kudos

Going to a restaurant the other night, I stepped into the men's room for a minute and noticed this sticker on the right of the mirror that said "Great Work" in big yellow letters on the red background. 

I wondered what a strange sign to put in such a private setting as if we need applause for going to the bathroom or washing our hands. 

Then again, if you've seen many men's bathrooms, it could certainly be a time for kudos when it is kept clean and people use good personal hygiene--hence, the other sticker on the left, "It's cool to care!"

The frog sticker in the middle, he's just keeping an eye on things and thanking everyone for the job well done. 

This is a funny commentary on our society these days where people seem to need a pat on the back for everything--even the highly mundane and personal. 

Presumably, going to the men's room will never be the same boring, uncaring event again--at least at this fine eating establishment. ;-)

(Source Photo: Andy Blumenthal)


Share/Save/Bookmark

March 29, 2013

Catching More Flies With Honey

There's an old saying that you can catch more flies with honey than with vinegar. 

And this is true in cyberspace as well...

Like a honey pot that attracts cyber criminals, organizations are now hiring "ethical hackers" to teach employees a lesson, before the bad guys teach them the hard way. 

The Wall Street Journal (27 March 2013) reports that ethical hackers lure employees to click on potentially dangerous email links and websites, get them to provide physical access to data centers and work site computers, or give up passwords or other compromising information through social engineering.

The point of this is not to make people feel stupid when they fall for the hack--although they probably do--but rather to show the dangers out there in cyberspace and to impress on them to be more careful in the future. 

One ethical hacker company sends an email with a Turkish Angora cat (code-named Dr. Zaius) promising more feline photos if people just click on the link. After sending this to 2 million unsuspecting recipients, 48% actually fell for the trick and ended up with a stern warning coming up on their screen from the cyber security folks. 

Another dupe is to send an faux email seemingly from the CEO or another colleague so that they feel safe, but with a unsafe web link, and see how many fall for it. 

While I think it is good to play devil's advocate and teach employees by letting them make mistakes in a safe way--I do not think that the people should be named or reported as to who feel for it--it should be a private learning experience, not a shameful one!

The best part of the article was the ending from a cyber security expert at BT Group who said that rather than "waste" money on awareness training, we should be building systems that don't let users choose weak passwords and doesn't care what links they click--they are protected!

I think this is a really interesting notion--not that we can ever assume that any system is ever 100% secure or that situational awareness and being careful should ever be taken for granted, but rather that we need to build a safer cyberspace--where every misstep or mistake doesn't cost you dearly in terms of compromised systems and privacy. ;-)

(Source Photo: Dannielle Blumenthal)
Share/Save/Bookmark

March 23, 2013

Innovation Infertility

Many of you may have probably the seen the movie, "Children of Men,"--it is themed around a time in the future when women are infertile (because of pathology, pollution, drugs, or whatever) and the world is in chaos--for what is life without children to carry on?

Fortunately, in the movie, after 18 years, one woman does get pregnant and bears a child and there is hope in the scientific community for a resurgence of humankind. 

Unfortunately, we are now in a similar period of technology, where big innovation of yesterday has come grinding to a miserable saunter. 

When the biggest news leaking out of superstar innovator, Apple is the potential for an iWatch--uh, not exactly earth shattering, we know we are in innovator's hell!

And vendors from Apple to Samsung and Sony trying to come out with some sort of voice activated television--again, who doesn't hate the TV clicker, but really this is not going to revolutionize our entertainment center days.

With hundreds of thousands of apps available for everything from social networking, eCommerce, gaming, and more, it seems like there are more copycat apps then anything else coming out these days--where's the real wow factor?

Microsoft can't find it's way in a mobile world, the mighty Intel has been supplanted by ARM with mobile chips, Marissa Mayer is trying to figure out how to remake the jump for joy, Yahoo, relevant again, as are the Vanderhook brothers and Justin Timberlake trying to do for MySpace.

With the overemphasis on the form factor making bigger and smaller sizes and shapes for computing devices, we seesaw between iPod Classics and Nanos and between iPads and Minis. But where are the great functional enhancements? Yeah, ask Siri.

Similarly in computing architecture, we have latched unto cloud computing as the next great savior of IT-mankind, ignoring the repackaging again of the mainframe into a cool new computing model again, and relegating the prior go-to architecture of distributed computing as the evil twin.  Sure, we can save some bucks until the pendulum swings back toward more decentralization and agility again.

In social computing, with Facebook what can you say--it's got a billion users, but virtually not a single one would pay a dime to use it. If not for marketers scooping up our personal information online and advertisers annoying us with their flashing and protruding pop-ups, we continue to trade privacy for connectedness, until we lose too much of ourselves to identity thieves and snooping sources, and we fall back clamoring for more protection. 

In security, we are getting clobbered by cyber intrusions, cyber espionage, and cyber attacks--everyday!  We can't seem to figure out the rules of cyberspace or how to protect ourselves in it. We can't even find enough qualified people to fight the cyber fight.

I was surprised that even magazine, Fast Company, which prides itself on finding the next great innovation out there, states this month (April 2013), "Growing uncertainty in tech is creating chaos for startups, consumers, and investors...nobody has a non-obvious new social business model that can scale."

As in the movie, Children of Men, we are suffering from an infertility of innovation--whether from burnout, a focus on short-term profit instead of long-term R&D investments, declining scores in STEM, or a lack of leadership--we are waiting for the next pregnancy so we can have hope again, but are disappointed that so many are false positives or overhyped prophets. 

One of the things, I am most excited about is Google Glass and their concept of augmented reality, but the glasses are geeky and will need to be package in a lot more eloquent solution to really be practical in our futures. 

The next great thing will come--life is a great cycle--but as in the Bible with 7 fat cows and 7 skinny cows, leading to the great famine in Egypt, we are now seeing lots of skinny cows walking around and it is darn scary. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

March 13, 2013

Balancing Cybersecurity And Citizen Freedom


There is a very interesting discussion of the protection of Federal Networks and the Fourth Amendment in “Cybersecurity, Selected Legal Issues,” Congressional Research Service (CRS) Report for Congress (3 May 2012). 

The Department of Homeland Security (DHS) in conjunction with the National Security Agency (NSA) rolled out EINSTEIN, an intrusion detection system (IDS) in early iterations, and later an intrusion prevention system (IPS) at all Internet points of presence (POPs) for the government.

The system works through copying, storage, and deep packet inspection of not only the metadata for addressing information, but also the actual contents of the flow. This handling is necessary in order to identify suspicious malware signatures and behavior and alert the United States Computer Emergency Response Team (US-CERT) in order to block, quarantine, clean, and respond to the attacks and share information about these.

However, the civil liberties and privacy issue with EINSTEIN is that according to the Fourth Amendment, we are protected from unreasonable search and seizures. Thus, there are concerns about the violation of the Fourth Amendment, when DHS monitors and inspects addressing and content of all email and Internet communications to and from federal agency employees and the public–including not only from government email accounts and systems, but also from private email accounts such as Yahoo and Gmail and social media sites like Facebook and Twitter.

 The justification for the use of EINSTEIN includes:

1.    The government cannot reasonably get warrants in real time in order to safeguard the federal network and systems at the speed that the attacks are occurring.

2.    The government places banners and user agreements on all Federal networks notifying users of monitoring, so there is no expectation of privacy in the communications.

3.    The monitoring is conducted only for malicious computer activity and not for other unlawful activities—so “clean” traffic is promptly removed the system.

4.    Privacy protections are ensured though review mechanisms, including Attorney General and Director of National Intelligence (DNI) reporting to Congress every six months and a sunset provision requiring monitoring reauthorization every four years.

This tension between monitoring of Federal networks and traffic and civil liberties and privacy is a re-occurring issue when it comes to cybersecurity. On one hand, we want cybersecurity, but on the other hand, we are anxious about this security infringing on our freedoms---whether freedom of expression, from search and seizure, from surveillance, or from potentially costly regulation, stifling innovation, and so forth.  It is this tension that has stalled many cybersecurity bills such as the Stop Online Privacy Act (SOPA), Cyber Intelligence Sharing and Protection Act (CISPA), The Computer Security Act of 2012 and more.

In the absence of a clear way forward with legislation to regulate and enforce, or incentivize, standards and best practices for cybersecurity, particularly for critical infrastructure protection, as well as information sharing, the White House released Presidential Policy Directive/PDD-21 on Critical Infrastructure Security and Resilience to establish DHS and other federal agency roles in cybersecurity and to manage these on a risk-based model, so that critical infrastructure is identified, prioritized, assessed, and secured accordingly.

While PDD-21 is a step in the right direction, it is an ongoing challenge to mediate a balance between maintaining our values and constitutional freedoms, while at the same time securing cyberspace.

One thought is that perhaps we can model cybersecurity after the Posse Comitatus Act of 1878 that separated federal military from domestic national guard and law enforcement powers. Using this model, we can create in cyberspace a separation of cybersecurity from our borders outward by the federal government, and within the domestic private networks by our national guard and law enforcement.

Thus, we can create stronger security radiating out at the national periphery, while maintaining our important freedoms within, but always working together to identify and neutralize any and all threats to cyberspace. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

March 9, 2013

Tweet On, Dead Or Alive


So recently, I saw the movie Vanilla Sky with Tom Cruise who plays a wealthy playboy who has everything, but has a horrible disfiguring accident as a result of a disgruntled girlfriend, and Cruise ends up in despair, overdosing, and ultimately in cryonic suspension--but with the added package of being in a lucid dream while in frozen suspension for 150 years. 

The idea of somehow being placed in suspended animation after death in the hope of eventually being brought back to life with technologies in the future has been an interest of many who naturally seek immortality. 

A company called Alcor Life Extension, not only researches cryonics, but also actually performs it and has over 100 patients preserved and frozen in liquid nitrogen (as well as over 30 pets). 
Understanding the great desire for people to somehow defeat death, I was not completely surprised to read about LivesOn in the New York Times (2, March 2013), which is an algorithm being developed to continue Tweeting even after you are dead!

You can sign up at the website to join their beta trials--no, you don't have to be dead yet!

But LivesOn will start learning what and how you normally Tweet and through artificial intelligence will start to tweet on its own for you and you can give it feedback to refine its performance. 

It's slogan of "When your heart stops beating, you'll keep tweeting," seems more than a little crude. 

Given all the distress about accessing a person's social media account after they die to learn more about them, their friends, perhaps the circumstances of their death, or even to post a closing to account--the legal and policy issues are still being worked out in terms of privacy and the user agreements for the sites. 

With artificial intelligence now being able to, in a sense, take over for you and continue your posts even when you are dead, this practically begs the question of who you are and what makes you distinct from a computer that can mimic you to the world?  

Can a computer or robot one day be able to assume your identity? How difficult would it really be? Would anyone even know the difference?  And would they care?  Are we all just patterns of thoughts and behaviors that can be predicted and mimicked, and if so what are we really? ;-)

(Source Photo: here with attribution to Anders Sandberg)

Share/Save/Bookmark

February 8, 2013

What's Your Information Lifecycle


A critical decision for every person and organization is how long to keep information out there in the physical and cyber realms.

Delete something too soon--and you may be looking in vain for that critical document, report, file, picture, or video and may even violate record retention requirements.

Fail to get rid of something--and you may be embarrassed, compromised, ripped off, or even put in legal jeopardy. 
It all depends what the information is, when it is from, and who gets their hands and eyes on it!

Many stars have been compromised by paparazzi or leaked photos that ended up on the front page of newspapers or magazines and even government officials have ended up in the skewer for getting caught red handed like ex-Congressman Anthony Weiner sexting on Twitter.

Everything from statuses to photos put on social media have gotten people in trouble whether when applying to schools and jobs, with their partners, and even with law enforcement. 

Information online is archived and searchable and it is not uncommon for parents to warn kids to be careful what they put online, because it can come back to haunt them later. 

Now smartphones applications like Snapchat are helping people communicate and then promptly delete things they send. 

With Snapshot, you can snap a photo, draw on it, even add text and send to friends, family, others. The innovation here is that before you hit send, you choose how long you want the message to be available to the recipient before vanishing--up to 10 seconds.

Snapchat has sent over 1 billion messages since July and claims over 50 million are sent daily--although forget trying to verify that by counting up the messages because they have self-destructed and are gone!

Of course, there are workarounds such as taking a screenshot of the message before it vanishes or taking a photo of the message--so nothing is full proof. 

Last year, according to The Atlantic, the European Commission proposed a "Right-To Be Forgotten" as part of their data protection and privacy laws. This would require social media sites to remove by request embarrassing information and photos and would contrast with the U.S. freedom of speech rights that protects "publishing embarrassing but truthful information."

Now, companies like Reputation.com even provide services for privacy and reputation management where they monitor information about you online, remove personal information from sites that sell it, and help you with search engine optimization to "set the record straight" with personal, irrelevant, exaggerated or false information by instead publishing positive truthful material.

According to Bloomberg BusinessWeek (7 Feb. 2013), "Ephemeral data is the future," but I would say comprehensive reputation management is the future--whether through the strategic management of permanent information or removing of temporary data--we are in a sense who the record says we are. ;-)

Share/Save/Bookmark

February 3, 2013

A Seeing Eye


This video from NOVA is an amazing display of the surveillance capabilities we have at our disposal.

ARGUS-IS Stands for Automated Real-Time Ground Ubiquitous Surveillance Imaging System.

Like a "Persistent Stare," ARGUS provides continuous monitoring and tracking over a entire city, but also it has the ability to simply click on an area (or multilple areas--up to 65 at a time) to zoom in and see cars, people, and even in detail what individuals are wearing or see them even waving their arms!

Created by the Defense Advanced Research Projects Agency (DARPA), ARGUS uses 368 imaging chips and provides a streaming video of 1.8 gigapixels (that is 1.8 billion pixels) of resolution and attaches to the belly of a unmanned aerial vehicle (UAV) drone. 

ARGUS captures 1 million terabytes of a data a day, which is 5,000 hours of high-definition footage that can be stored and returned to as needed for searching events or people. 

The Atlantic (1 February 2013) points out how using this over an American city could on one hand, be an amazing law enforcement tool for catching criminals, but on the other hand raise serious privacy concerns like when used by government to collect data on individuals or by corporations to market and sell to consumers. 

What is amazing to me is not just the bird's eye view that this technology provides from the skies above, but that like little ants, we are all part of the mosaic of life on Earth.  We all play a part in the theater of the loving, the funny, the witty, and sometimes the insane. 

My Oma used to say in German that G-d see everything, but now people are seeing virtually everything...our actions for good or for shame are visible, archived, and searchable. ;-)

Share/Save/Bookmark

February 2, 2013

A SCIF Can Be Yours


A SCIF can be yours...if the wallpaper is right.

According to PC Magazine, a SCIF (Sensitive Compartment Information Facility) is a secure area where classified information can be discussed and handled. A SCIF is built to prevent information from leaking, being intercepted and compromised. 


Now, your business or home office can have its own SCIF-type protection without the use of more expensive Faraday cage electromagnetic mesh (e.g. chain-link) conductive shielding or Japanese anti-Wi-Fi paint that blocks all frequencies.

BusinessWeek (31 January 2013) reports on a new wallpaper called MetaPaper that blocks Wi-Fi signals and helps "improve data security and network speeds."

The Wi-Fi shielding wallpaper is developed by the French pulp and paper institute, Center Technique du Papier (CTP). 

MetaPaper is a snowflake pattern wallpaper "printed in conductive metallic ink" that "blocks Wi-Fi signals, while still allowing FM radio and emergency frequencies to pass through."

Its filtering is 99% effective (which may not be good enough for handling state secrets, but could be terrific for safeguarding most information) and sells for $12 per square meter. 

Aside from information security, additional benefits of MetaPaper is to protect people's health in terms of attenuating electromagnetic waves that cause genetic damage and cancer as well as socially to create quiet space, Wi-Fi free zones, such as in hospitals and movie theaters. 

Here is a link to a presentation on MetaPaper's development and benefits. ;-)

Share/Save/Bookmark

January 21, 2013

Hiding Yourself In Plain Sight

I remember hearing that sometimes the best way to hide is in plain sight--just where no one would think to look.

Now there is a new clothing line being introduced by Adam Harvey for Stealth Wear that hides you using your own clothes. 

According to Slate (11 January 2013), the clothing line is envisioned to have:

Anti-drone hoodies and scarfs:  These will be made with special metalized material that can shield you from things like drone thermal imaging technology, and I would imagine could also help against facial recognition along the lines of a prior project CVDazzle that uses face-painting and hair styling for concealment. 

XX-shirts: These cover your upper body and can shield you from x-rays. I wonder how this will impact TSA scanning at airports?

Pocket-blocks: A cell phone pouch made from "signal attenuating material" to prevent tracking and interception. 

Don't confuse this stealth wear clothing line with a Canadian company called StealthWear that makes a different type of protective clothing--padding for jackets, forearms, shoulders, torso, and so on for those working in "aggressive educational environments."

The new Stealth Wear, however, is a concept for a high-tech fashion line designed to provide counter surveillance and more personal privacy--in this sense, it's really the anti Big Brother. 

With more and more cameras, imaging machines, facial recognition, drones, and other surveillance tools out there--I suppose it is not surprising to see a cultural backlash in terms of everyday surveillance protection clothing coming to the fore. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark