Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

September 1, 2014

You're Probably Not A 10

There is a review online for nearly everything...from sources such as Amazon to Yelp, Angie's List, IMDb, and more. 

But what you may not realize is that the knife cuts both ways...you are not only the reviewer, but the subject of reviews.

And if you're not all that...then everyone can know it!

The New York Times has an opinion piece by Delia Ephron about how reports cards are no longer just for kids, and that they are "for the rest of my life...[and] this is going on your permanent record."

From cabbies that won't pick you up because you've been rated a bad fare to your therapist that says you can't stop obsessing, restaurants that complain you refused to pay for the chopped liver, and the department store says you wasted their salesperson's time and then bought online, and even your Rabbi says you haven't been giving enough to the synagogue lately. 

People hear things, post things, and can access their records online...your life is not private, and who you are at least in other peoples opinion is just an easy search away. 

In Tweets, Blogs, on Facebook, and even in companies customer records, you have a personal review and rating waiting for discovery.

Your review might be good, but then again...you are not always at your finest moments and these get captured in databases and on social media.

Data mining or exfiltration of your personal information is your public enemy #1.

Of course, you'd like to think (or wish) that you're brand is a 10, but not everyone loves you that way your mother does.  

Too bad you can't tell them, "If I want your opinion, I'll ask for it"--either way, your gonna hear what people think of you loud and clear. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 30, 2014

More Than Just Legs

This was a funny photo that I took of a sculpture of legs sitting in the arm chair--and it is supposed to represent minimalism.

No need to show the body, because the legs alone convey the message.

To me though, this reminds me of the opposite of minimalism, where instead of showy, sexy legs--these are covered fully and crossed respectfully--overall sitting upright and quite modestly.

It reminded me of beautiful Jewish concept called Tzniut, which refers to people dressing and acting modestly and in private.

There is no need to show it all--but rather, to be someone, it's what you do, not what you look like and expose. 

In this way, these legs are enough to convey the concept of modesty--of man or women--if you can just see the whole person and not just their sexuality. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 12, 2014

Surveillance Society {Funny}

This was funny photo my wife and I took in a medical practitioner's office. 

Above the floodlights, was a picture of these staring eyes.

And it was simply thumbtacked onto the wallpaper. 

One of the receptionists asked why we were taking the photo.

We sort of giggled--uh, this was not exactly the typical surveillance scenario in the 21st century of CCTVs, drones, hidden mics, tracking devices, and big data--not even close!

But maybe it's just a reminder that someone is ALWAYS looking. ;-)
Share/Save/Bookmark

April 3, 2014

Records Manager Appreciation Day!


Records Management is not about 45s, 33s, or 8-track music collections, but managing key document and electronic records. 

It's critically important for an organization to be able to archive and access needed information for managing their business, and enabling transparency and accountability. 

Managing records saves us time and money in the long run.

Moreover, as information workers in an information economy, information is power! And we need to be able to get to information, whenever and wherever we need it. 

While records may not be sexy unless you're Lady Gaga or Madonna, information is the lifeblood of the 21st century, so say thank you to your records management and information access professionals today! ;-)
Share/Save/Bookmark

March 17, 2014

Time To Spread The Magic

So I'm not the biggest fan of Disney theme parks -- maybe that is not a popular thing to write.

But to me, the rides alternate between fake or nauseating (when they're not broken down), the characters are outdated, the parks are hot, overcrowded, and the lines and wait times are long, and the ticket prices are sort of crazy for what you're getting (not). 

Let's see, a day at Disney or day at the beach--uh, I'll take the beach any day!

But Disney is doing something magical these days. 

Bloomberg Businessweek reports how Disney's new MagicBands are using technology to make the theme park experience more convenient, even if not more fun. 

The MagicBands are like an all-in-one electronic link between you and Disney:

- No need for an admission ticket, because the MagicBand does that.

- Reserve your favorite rides, use your wrist band. 

- Hotel room keys, that's right the band unlocks your door.

- Shopping at Disney kingdom, the band functions as your debit/credit card. 

- Being greeted by name or wished a happy birthday, the bands make your experience more personal.

What's more Disney uses the bands for "big data" analytics--for capturing your likes and preferences for rides, restaurants, food, and souvenirs--and this adds up to customer service enhancements like restocking shelves, opening up reservations, expedited queues, and even targeted mail and text messaging/advertising. 

The bands have radio frequency identification tag/chips (RFID) as well as GPS sensors, so Disney knows who you are, where you are, and even much of what you're doing. 

Spooky from a privacy standpoint--sure, you are really sitting there exposed in just about every way. 

But this technology has arrived, not just at Disney, but via embedded RFID in your smartphones or your body someday soon. 

The synthesis of man and machine...the mystery is gone in the magic kingdom, but maybe the service gets better. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

December 25, 2013

The Lie Of The Open Workspace

There are so many workplace liars—the problem is many of them are experienced and good at selling you a bunch of malarkey.

Often, they tell you what they want, either to save the company money or to make themselves look innovative, but either way it’s inevitably at your cost. 

One of these lies is from chieftains that tell you’ll be better off working in an open workspace--i.e. thrown into a corporate bullpen.

Oh, by the way, vacate your office by Friday!

Sure there are a plethora of benefits to having common spaces to share ideas and open up communications—and these should be plentiful and stocked with comfy sofas, energy-inducing munchables, and ample white boards and tech gear to facilitate collaboration.

But when the pendulum swings all the way to the other side, and your personal office space become a hoteling situation, you know you are losing out to penny-pinching executives, who want to save on leasing office space, furniture, and the like in order to boost their personal bonuses at the end of the year. 

Just ask yourself:

- Do people need privacy to handle sensitive personnel, budget, contracting, and strategic planning and execution issues (as well as occasional family or personal issues—we are all human)?

- Do you need time to close the door for some quiet time to think, innovate, and catch up on work?

- Is there a genuine human need to have a place to put your work and personal things to be productive and comfortable?

The truth is that people need and deserve a balanced work environment—one where people can move healthily between closed and open spaces, individual work and teamwork, privacy and sharing, creativity and productivity, individualism and conformity, comfort and cost-savings. 

Anyone that tells you that people work better in a fully open environment where you have to book up a desk and computer is selling you on short-term organizational cost-savings at the expense of longer-term human capital satisfaction and productivity.

Next time, a “leader” tries to convince you of the merits of your not having a professional workspace, desk, computer, and so on—ask yourself whether you want to work in a Motel 6 every day or for a stable organization that values and invests in it people. 

An appropriate blended environment of open and closed work spaces, where it shows that you are empowered and valued is a career, and not just a job;-)

(Source Photo: here with attribution to epochgraphics)
Share/Save/Bookmark

December 24, 2013

To Archive Or Not

Farhad Manjoo had a good piece in the Wall Street Journal on the Forever Internet vs. the Erasable Internet.

The question he raises is whether items on the Internet should be archived indefinitely or whether we should be able to delete postings. 

Manjoo uses the example of Snapshot where messages and photos disappear a few seconds after the recipient opens them--a self-destruct feature.

It reminded me of Mission Impossible, where each episode started with the tape recording of the next mission's instructions that would then self-destruct in five seconds...whoosh, gone. 

I remember seeing a demo years ago of an enterprise product that did this for email messages--where you could lock down or limit the capability to print, share, screenshot, or otherwise retain messages that you sent to others. 

It seemed like a pretty cool feature in that you could communicate what you really thought about something--instead of an antiseptic version--without being in constant fear that it would be used against you by some unknown individual at some future date. 

I thought, wow, if we had this in our organizations, perhaps we could get more honest ideas, discussion, vetting, and better decision making if we just let people genuinely speak their minds. 

Isn't that what the First Amendment is really all about--"speaking truth to power"(of course, with appropriate limits--you can't just provoke violence, incite illegal actions, damage or defame others, etc.)?

Perhaps, not everything we say or do needs to be kept for eternity--even though both public and private sector organizations benefit from using these for "big data" analytics for everything from marketing to national security. 

Like Manjoo points out, when we keep each and every utterance, photo, video, and audio, you create a situation where you have to "constantly police yourself, to create a single, stultifying profile that restricts spontaneous self-expression."

While one one hand, it is good to think twice before you speak or post--so that you act with decency and civility--on the other hand, it is also good to be free to be yourself and not a virtual fake online and in the office. 

Some things are worth keeping--official records of people, places, things, and events--especially those of operational, legal or historical significance and even those of sentimental value--and these should be archived and preserved in a time appropriate way so that we can reference, study, and learn from them for their useful lives. 

But not everything is records-worthy, and we should be able to decide--within common sense guidelines for records management, privacy, and security--what we save and what we keep online and off. 

Some people are hoarders and others are neat freaks, but the point is that we have a choice--we have freedom to decide whether to put that old pair of sneakers in a cardboard box in the garage, trash it, or donate it. 

Overall, I would summarize using the photo in this post of the vault boxes, there is no need to store your umbrella there--it isn't raining indoors. ;-)

(Source Photo: here with attribution to Spinster Cardigan)
Share/Save/Bookmark

November 28, 2013

The Dancer and The Tablet


So we are at this Mediterranean Restaurant next to the beach.

We are sitting outside--it is a little chilly and we cozy up next to one of the fire poles to keep warm.

We weren't eating much; just a drink for our anniversary and something to munch on.

All of a sudden, my wife points to this lady from the next table who gets up and starts dancing provocatively.

You can see the sliver of ocean behind her, the night sky, and the cars and pedestrians are going by behind her.

There are multiple realities going on here:

She is in her own world--dancing to the music, swaying this way and that, and enjoying her femininity. 

On the other hand, the guy she's with is taking a video of her on his tablet computer--he seems more concerned with capturing the moment with his technology than enjoying his girlfriend. 

We are conscientious observers--I sort of wondered if the guy should've been paying more attention to the women who was wooing him than playing with his tablet. 

The other lesson that I can't help reaching is that cameras and microphones are truly everywhere--privacy is a complete myth!  

He is recording her, we are videoing them on our smartphone, and the restaurant is taping all of us on CCTV cameras, and NSA is laughing at us from Fort Meade. 

So if you want solitude, book a flight with Virgin Galactic. ;-)
Share/Save/Bookmark

November 9, 2013

Cancer Takes It Away


This is an amazing video.

It is about the life of Angelo and Jennifer Merendino.

Initially, they a lived a fairy tale life, until she was diagnosed with breast cancer. 

You can see in the video the brutal transformation Jennifer underwent from the disease.

Yet, the love and togetherness this couple maintained is inspiring.

A link with photos of this couple's battle with cancer is here.

Jennifer died on December 22, 2011 at the young age of 40. 

Angelo, a NY photographer compiled their painstaking journey in a book called The Battle We Didn't Choose available at their website My Wife's Fight With Breast Cancer.

It is difficult to look at the pictures of Jennifer's illness and deterioration, especially when marked in contrast to her husband throughout.

The numerous personal pictures makes me feel a little uncomfortable, even as I believe, they are meant to be educational and giving--with 1/2 the proceeds from the book's profits to be going to a non-profit for breast cancer victims. 

The story is very tragic, yet too often repeated throughout society...some may be able to find hope in it, and to appreciate what we have, when we have it.
Share/Save/Bookmark

November 5, 2013

Loneliness Is A Scream

One of the scariest things for many people is not being with other people. 

I don't mean intentionally not being with others--taking time away from the hustle and bustle for yourself--but rather being left alone. 

Think of the horrors of POWs kept in isolation, prisoners put in solitary, or just everyday kids icing out other children in school, adults marginalizing colleagues at work, and family members abandoning spouses and children at home. 


Elizabeth Bernstein makes the distinction between being alone (a potential voluntary state) and loneliness (when you feel that you are forced into an isolated state) in the Wall Street Journal today. 

It's an awesome article that explains so much about loneliness:

- We all experience loneliness from "homesickness, bullying, empty-nesting, bereavement, and unrequited love."

- Loneliness can occur when you are without anybody ("isolation") or with the wrong somebody ("dissatisfaction").

- It's a survivalist function and evolutionary to feel scared when your alone, because when you are "too close to the perimeter of the group, [then you become] at risk of becoming prey."

- Loneliness is also associated with memories or fears from childhood--when we were young and vulnerable--that someone wasn't there or going to be there to take care of us. 

- Too much loneliness is a "strong predictor of early death"--greater than alcoholism, 15 cigarettes a day, or obesity.

- Loneliness is on the rise, with "some 40% of Americans report being lonely, up from 20% in the 1980's" and this is correlated with more people living alone, now 27% in 2012 versus 17% in 1970.

- Loneliness can be placated by "reminding yourself you're not a [helpless] child anymore," building emotional health and personal self-sufficiency, doing things you enjoy when alone, and reaching out to connect with others. 

She jokes at the end of her article that when we aren't feeling lonely, we are annoyed that people just don't leave us alone.

This is a very real concern as well, especially with a multitude of family needs (significant others, young children, elderly parents), 24x7 work environments, and the reality of pervasive online communications and even invasive social media. 

Not exclusive to introverts, too much people can make us feel put upon, crowded, and even worn out--and hence many people may even run from excessive social activity and crowds.

Yet without a healthy dose of others, people can literally go crazy from the quiet, void, boredom, as well as from the real or perceived feelings that they are in some way unworthy of love or affiliation. 

So even though some people can be annoying, users, or try to take advantage of us, no man is an island, and growth, learning and personal serenity is through degrees of love and connection, for each according to their needs. ;-)

(Source Photo: here)
Share/Save/Bookmark

September 28, 2013

Insuring Against Cyber Attacks

More and more, our technology is at risk of a cyber attack. 

In fact, just today the Wall Street Journal reported that Iran has hacked into the Navy's unclassified network. 

While we can fix the computers that were attacked, the damage done in terms of data exfiltration and malware infiltration is another matter.

To fix the computers, we can wipe them, swap out the drives, or actually replace the whole system. 

But the security breaches still often impose lasting damage, since you can't get the lost data or privacy information back or as they say "put the genie back in the bottle."

Also, you aren't always aware of hidden malware that can lie dormant, like a trojan horse, nor can you immediately contain the damage of a spreading computer virus, such as a zero-day attack. 

According to Federal Times, on top of more traditional IT security precautions (firewalls, antivirus, network scanning tools, security settings, etc.), many organizations are taking out cybersecurity insurance policies.

With insurance coverage, you transfer the risk of cybersecurity penetrations to cover the costs of compromised data and provide for things like "breach notification to victims, legal costs and forensics, and investigative costs to remedy the breach."

Unfortunately, because there is little actuarial data for calculating risks, catastrophic events such as "cyber espionage and attacks against SCADA industrial controls systems are usually not covered. 

DHS has a section on their website that promotes cybersecurity insurance where they state that the Department of Commerce views cybersecurity insurance as an "effective, market-driven way of increasing cybersecurity," because it promotes preventive measures and best practices in order to lower insurance premiums and limits company losses from an attack. 

Moreover, according to the DHS Cybersecurity Insurance Workshop Readout Report (November 2012) cybersecurity insurance or risk transfer is the fourth leg of a comprehensive risk management framework that starts with risk acceptance, risk mitigation, and risk avoidance. 

I really like the idea of cybersecurity insurance to help protect organizations from the impact of cybersecurity attacks and for promoting sound cybersecurity practices to begin with.  

With cyber attacks, like with other catastrophes (fire, flood, accident, illness, and so on), we will never be able to fully eliminate the risks, but we can prepare ourselves by taking out insurance to help cover the costs of reconstituting and recovery. 

Buying insurance for cybersecurity is not capitulating our security, but rather adding one more layer of constructive defense. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

August 25, 2013

Drone Warfare: Integration At Its Best

I learned a lot about Drone Warfare reading and thinking about "The Killing Machines" in The Atlantic by David Bowden. 

The benefits of drones for military use are numerous:

- Stealth: Drones can be relatively small (some are now even the size of bugs) and they can survey from vehicles that are aerial, terrestrial, underwater, or I would imagine, even subterranean. In a sense, even a spy satellite is a type of drone, isn't it? 

- Persistent: They can hover unmanned over enemy territory for not only hours, but also days at a time, and switching in replacement drones can create a virtually continuous stream of surveillance for months or years, depending on the need. 

- Powerful: The sensors on a drone can include high-definition cameras, eavesdropping devices, radar, infrared, "and a pixel array so dense, that the device can zoom in clearly on objects only inches wide from well over 15,000 feet above." Further, with features like Gorgon Stare, multiple cameras linked together can view entire cities in one feel swoop.   

- Long-range: Drones can function doing reconnaissance or surveillance far away and deep into enemy territory. With drones, no one is too distant or remote as to be untouchable. 

- Lethality: Drones can carry missiles such as The Hellfire, a "100-pound antitank missile" and other weapons that can act expediently on information without the need to call in additional support. 

- Precise: Drones can hit targets with amazing precision--"It targets indiscriminate killers with exquisite discrimination." 

- Safety: Drones carry out their work unmanned with (or without) controllers stationed at safe distances away--sometimes thousands of miles back at the homeland. 

- Expendable: Drones themselves are throwaway. As with a bee, a drone is more or less useless when disconnected from the hive. Similarly, a military "drone is useless as an eyeball disconnected from the brain," since drones function only as an extension of back-end satellite links, data processors, intelligence analysts, and its controller." 

Overall, the great value of drones is their integration of technologies: vehicles, global telecommunications, optics, sensors, supercomputers, weapon systems, and more. 

To me, between the questions of fairness, legality, and privacy--drones are being given a bum rap. 

- Fairness:  Just because one side has a technology that the other doesn't, should not mean it's wrong to use it. This is what competition and evolution is all about. I remember learning in school, when children would complain to the teacher that something was unfair, and the teacher would reply, "life is unfair!" This doesn't mean we should use a shotgun approach, but rather use what we got, appropriately. 

- Legality: Is it legal to kill targets rather than apprehending them, trying them, and otherwise punishing them? This is where sincere deliberations come in on whether someone is a "lawful target" (e.g. enemy combatant), "imminent threat" (e.g. self-defense), whether other alternatives are viable (e.g. collateral damage assessments), and will killing them do more hard than good to foreign relations, influence, and even possibly breeding new hate and terror, rather than quelling it. 

- Privacy: The issue of privacy comes less into play with military matters and more with respect to domestic use for law enforcement and other civilian uses (from agriculture to urban planning). The key is protect citizens from being unduly monitored, tracked, and scrutinized--where freedom itself is under big-brother attack and we all become mere drones ourselves in a national hive of complacency and brainless obedience. 

Rather than scaling back drones use, I liked Mary Ellen O'Connell vision of new drones "capable of delivering a warning--'Come out with your hands up!' and then landing to make an arrest using handcuffs."

This is the promise of technology to learn from mistakes of the past and always bring possibilities of making things better in the future. ;-)

(Source Photo: here with attribution to Don McCullough)
Share/Save/Bookmark

August 17, 2013

The Keys To Good Government

Peggy Noonan hit it right on the head in today's Wall Street Journal.

The fear of giving up privacy, she said, is of a "massive surveillance state," and this is not overblown. 

The crux of this concern is that if Government (or I would add hackers) can intrude on citizen's private communications and thoughts, then eventually people will self-censor. 

No privacy does mean government control.

As Noonan makes clear, violations of citizen privacy is not just a threat to the Fourth Amendment protecting against unreasonable search and seizure, but is a bona fide danger as well to the First Amendment guaranteeing free speech. 

People should not be afraid to think critically and creatively because of what the government may do to them (and their families) for disagreeing with fraud, waste, abuse, special interests, and stupidity.

Rather, politicians should fear being criticized and not re-elected for violating the duty to rule justly and as true representatives of the people. 

However, when government and politicians can listen in, see, and know what the lawful opposition in thinking and doing, then they are given virtually absolute power.

And absolute power does corrupt absolutely.  

We should not change our underlying values of freedom and become a nation of routine digital interrogation of everyday John Doe's.

Terrorists, traitors, anarchists, and hostile nation states should be pursued and given no rest or privacy from our intelligence, law enforcement, and warfighters. 

But well-meaning citizens should be free to think, feel, and say what they believe in the best interest of the country. 

Upright citizen's should never have to fear an unjust government, but rather corrupt politicians should be concerned about violating the fundamental rights of the people. 

At least two keys to good government are privacy and free speech. ;-)

(Source Photo: here with attribution to Empirical Perception)
Share/Save/Bookmark

July 13, 2013

Head Spinning From All The Spin

The Nazi Minister of Propaganda, the evil Joseph Goebbels said, "He who controls the message, controls the masses."

All dictatorships function very much from this premise as we see even now a days in totalitarian governments that limit Internet access, block websites, and filter news and messages from the people, so as to keep them docile and servile. 

However, even in a democracy as fine as ours, the ability to control the message is a very powerful tool in directing how events are understood by the public and what action is taken, or not. 

Some recent examples:

1) Syria's Use of Chemical Weapons:
Numerous allies including England, France, and Israel say they have intelligence about Syria's use of sarin gas against their own people...So did Syria cross the red line and use chemical weapons requiring us to take action or is this a matter for investigation and evidence? 

2) Iran's Violation of the Nuclear Non-Proliferation Treaty:
Iran is one of the world's richest in energy resources and reserves...So is Iran violating the Nuclear Non-Proliferation Treaty necessitating that we stop them or are they just building nuclear facilities for peaceful civilian energy needs? 

3) Egyptian Military Coup and Roadmap For Reconciliation:
Egypt's military overthrew the Egyptian Prime Minister from the Muslim Brotherhood who oversaw the rewriting of the constitution in 2011 to be based on Islamic law and not inclusive of other more secular elements of society...So is the restoration of true democracy and civil rights for the Egyptian people or a brutal coup? 

4) Sudan Committing Genocide in Darfur:
With over 400,000 killed, 2,500,000 displaced, and 400 villages completely destroyed in Darfur...So did Sudan commit genocide requiring prevention, intervention, and punishment or was this just Sudanese internal conflict? 

5) People Employed in U.S. at 30-Year Lows:
The proportion of the U.S. population that is working is at low rates not seen since the recession of the 1980's...So is the unemployment rate still a critical national issue or is the unemployment rate really better and the economy strong again? 

6) Edward Snowden Leaking Classified Information:
Snowden sought out the job with Booz Allen Hamilton to gather evidence on classified NSA surveillance and when he did he leaked this information to the news and harmed national security...So is Snowden a traitor or a whistleblower? 

7) An $82 Billion Federal IT Budget:
The Federal IT budget is anticipated to rise to $82 billion in 2014...So are we still spending on large troubled IT projects or realizing billions in IT savings from new technology trends in cloud, mobile, social computing and more?

As Bill Clinton in 1998 said when questioned about the Monica Lewinsky affair..."It depends what the meaning of the word is, is?"

We see clearly that definitions are important, interpretations are important, and spin can make right seem wrong and wrong seem like right. 

How we communicate and present something is very important and has critical ramifications on what is done about it whether in terms of action, attribution, and retribution. 

Moreover, we should keep in mind that "He who knows doesn't tell, and he who tells doesn't know," so there are limits to what even gets communicated from the get-go. 

What is communicated, when, and in how much clarity or distortion is a function one on hand of people's agendas, biases, career building (including the desire to get and keep power), as well as the genuine need for secrecy and security.

On the other hand, the desire for openness, transparency, truth, and healthy debate (facilitated by the media, checks and balances in government, and the judicial system) provides a counterbalance. 

We the people must press to determine--is the person telling it like it is or are some things being contrived, manipulated, edited, and Photoshopped.

In the end, critical thinking and looking beyond the surface can make the difference between what we know we know and what we think we know. ;-)

(Source Photo: here with attribution to Jah~)


Share/Save/Bookmark

June 16, 2013

Dystopia Man

I love this picture that I saw in the art gallery here in Florida. 

I named the person in the portrait, Dystopia Man, because he reminds me of how people would look in a speculative futuristic society.

The way the man looks askew with bloodshot eyes, head split, and hand partially covering his mouth all make me feel like the future is quite unknown, somewhat risky, if not sort of ominous.

We have lots of national and global challenges--with security versus privacy, openness versus secrecy, sharing versus private ownership, social entitlements versus capitalism, theocracy versus democracy, control versus freedom, and man versus machine.

How will these turn out for society, for us?  Will we maintain a healthy balance and respect for individuals? Will these and other conflicts be resolved peacefully? 

Hopefully G-d will grant us the wisdom to solve these dilemmas and many others that await us in the present and not so distant future. 

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 14, 2013

No Such Agency (NSA) Listening To No Such Information (NSI)

The National Security Agency (NSA) frequently referred to by the secretive surname of No Such Agency is at the forefront of our signals intelligence (SIGINT) and in protecting America--they are amazing!

Recently, there is a lot of controversy about the PRISM program for sifting through communications looking for terrorist contacts, plans, and imminent attacks to be foiled. 

Is this necessary for security or a violation of our privacy? 

Of course, we value our privacy and generally wish we had more. (For me growing up in the busy and crowded city that never slips, I craved a little more quiet and secluded life and that's how I ended up in the Washington D.C. suburbs).

Anyway, if your an average hard-working Joe or Jane, what do you fear about PRISM?

For me, if "they" are tracking calls or listening--this is what they hear:

- The occasional squabble with my loving wife (yes, we drive each other nuts sometimes).

- My teenage kids hanging up their phone on me, not wanting to hear my brilliant (in my own mind) parental advice and guidance.

- My elderly parents lecturing me and telling me that I should go to synagogue more often.

- The daily life transactions with the plumber, the cable service, and the credit card company. 

If your honest and loyal, and the system works fairly, the way it's supposed to, your communications are just some transmission packets travelling through cyberspace to carry out your life's goings on.

Then again, if you're crooked, a traitor, or planning to or have hurt someone, well then your up against some very powerful technology tools and (hopefully) your going to get caught and get what's coming to you.

The big concern then is not when the system works well and fairly, but when it's used corruptly, fraudulently, or for political ends. 

Then it's not what someone overhears you say or sees you do that's a real concern, but rather, with all the advanced electronics and technology, what can be made up about you to address personal or political gripes, grievances, or just settle a score.  

You don't have to be afraid (generally) of what you do honestly, instead you need to fear the dishonesty of those who can or are apt to misuse the technology for their own ends.

Then what you really did or said, can be taken out of context, exaggerated, edited, spliced, or otherwise doctored to something else entirely. 

This is why the integrity and ethical backbone of those who run the country and our vital institutions are of paramount importance.

With honesty, ethics, and justice--a surveillance system can greatly enhance national security. Without these things, they can be a tool of corruption. The best protection is not unplugging the system, but hooking in lots of internal and external controls to keep it honest.   ;-)

(Source Photo: here by LittleBirth)


Share/Save/Bookmark

May 18, 2013

Remembering Every Moment


I saw a frightening movie a while back about a girl that had been drugged and brutally raped. 

In the movie, the girl is eerily warned, "You won't remember, but you will never forget!"

That line leaves an indelible mark--that something can be so horrific, so scaring that you can't recall it, and can't forget it. 

Now there is a new device coming to market that helps you recall everything.

Memoto is a 5 megapixel tiny camera (36 x 36 millimeters) with an embedded GPS that is worn around the neck, like a necklace. 

When clipped on, it starts taking the phones and when put down or in a pocket it shuts off. 

The Memoto takes 2 photos a minutes (1 every 30 seconds or nearly 3,000 a day if worn all the time).

The photos are stored in an accessible cloud app that uses GPS to sort the photos on a timeline with a date and location stamp.

Photos are private by default, but can be shared using traditional social media, such as to Facebook or Twitter. 

The battery lasts about 2 days and is rechargeable by connecting to your computer at which time the photos are uploaded to Memoto's servers. 

Wear, photograph, recharge/upload and repeat. 

Privacy issues abound with a device like this--imagine wearing this into the bathroom, locker room, bedroom, or even a private corporate meeting--lots of embarrassing and compromising no-no's here!

At the same time, imagine all the precious or memorable moments in life that you can capture and enjoy--it's the realization of the photographic memory you've never had, but always wanted. 

Also think of that rapist or other criminal approaching you--getting photographed, caught, and punished--so that the victim really does remember, and can forget with a new peace of mind. ;-)
Share/Save/Bookmark

May 5, 2013

Action Video Extravaganza

This is an awesome action video--5 minutes and totally worth it.

It feels like being inside a single player shooting game. 

I first saw this video on Facebook posted by a colleague as a interesting advertisement for Go Pro wearable helmet cameras, often used for capturing extreme sports activities. 


Now we are going from helmet cams to Google glasses. 


With the new Google Glass coming out this year for $1,500--that mimics most smartphone functions including taking pictures and videos just by a simple verbal command such as "Okay Glass, record a video" or "Okay Glass, take a picture,"-- things are going to get a lot dicier. 


While this type of James Bond action doesn't happen everyday for most of us, if we can capture every day events like these --it will be both awesome from a recall, sharing, entertainment, study and scientific perspectives and scary from a privacy one. 


If Google Glass really works as it's envisioned, it is going to revolutionize how we interact with the world and each other--get ready augmented reality, here we come. ;-)

Share/Save/Bookmark

April 29, 2013

Bathroom Kudos

Going to a restaurant the other night, I stepped into the men's room for a minute and noticed this sticker on the right of the mirror that said "Great Work" in big yellow letters on the red background. 

I wondered what a strange sign to put in such a private setting as if we need applause for going to the bathroom or washing our hands. 

Then again, if you've seen many men's bathrooms, it could certainly be a time for kudos when it is kept clean and people use good personal hygiene--hence, the other sticker on the left, "It's cool to care!"

The frog sticker in the middle, he's just keeping an eye on things and thanking everyone for the job well done. 

This is a funny commentary on our society these days where people seem to need a pat on the back for everything--even the highly mundane and personal. 

Presumably, going to the men's room will never be the same boring, uncaring event again--at least at this fine eating establishment. ;-)

(Source Photo: Andy Blumenthal)


Share/Save/Bookmark

March 29, 2013

Catching More Flies With Honey

There's an old saying that you can catch more flies with honey than with vinegar. 

And this is true in cyberspace as well...

Like a honey pot that attracts cyber criminals, organizations are now hiring "ethical hackers" to teach employees a lesson, before the bad guys teach them the hard way. 

The Wall Street Journal (27 March 2013) reports that ethical hackers lure employees to click on potentially dangerous email links and websites, get them to provide physical access to data centers and work site computers, or give up passwords or other compromising information through social engineering.

The point of this is not to make people feel stupid when they fall for the hack--although they probably do--but rather to show the dangers out there in cyberspace and to impress on them to be more careful in the future. 

One ethical hacker company sends an email with a Turkish Angora cat (code-named Dr. Zaius) promising more feline photos if people just click on the link. After sending this to 2 million unsuspecting recipients, 48% actually fell for the trick and ended up with a stern warning coming up on their screen from the cyber security folks. 

Another dupe is to send an faux email seemingly from the CEO or another colleague so that they feel safe, but with a unsafe web link, and see how many fall for it. 

While I think it is good to play devil's advocate and teach employees by letting them make mistakes in a safe way--I do not think that the people should be named or reported as to who feel for it--it should be a private learning experience, not a shameful one!

The best part of the article was the ending from a cyber security expert at BT Group who said that rather than "waste" money on awareness training, we should be building systems that don't let users choose weak passwords and doesn't care what links they click--they are protected!

I think this is a really interesting notion--not that we can ever assume that any system is ever 100% secure or that situational awareness and being careful should ever be taken for granted, but rather that we need to build a safer cyberspace--where every misstep or mistake doesn't cost you dearly in terms of compromised systems and privacy. ;-)

(Source Photo: Dannielle Blumenthal)
Share/Save/Bookmark