Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

October 8, 2016

Content Filtering - Should We Restrain Ourselves?

So the Rabbi today spoke about thinking before you speak, and not letting your emotions overcome your logic. 

He mentioned, for example, how some people have so much rage--road rage, email rage, etc.--and you can't let your rage dictate your actions. 

People can certainly get under your skin--just look at the candidates for President doing that to each other.

But rather than just react and blurt out stupid or horrible things in a tit-for-tat, we need to stop and think.

The Rabbi recounted the old advice of counting to ten before saying or doing something rash that you will regret. 

The joke was about the one guy bullying another, and the victim counts to ten like he's supposed to, but then rather than take things down a notch or two, he surprises the bully when he hits ten by punching him right in the nose! (lol)

Another cute idea the Rabbi put out there was for marriage counseling--that husbands and wives should drink this "special water" that they hold in their mouth--this way when they are fighting, they have to pause and can't say anything provocative and aggressive to each other. 

The speak then turned high-tech to some of the new apps for content filtering that help you not to send emails or texts that you are sorry for afterwards. 

And I leaned over to my neighbor in synagogue and said that is so funny, because I just saw this 16-year Indian old girl on Shark Tank who developed this app called ReThink that does just that. 

When you write something negative like ugly or stupid etc., a pop up box comes up and ask whether you really want to say that--it gives you pause to rethink what you are saying and doing. 

She notes from her studies of adolescents that when given the opportunity from this pause, "93% of the time, [they] decide not to post an offensive message on social media."

I remember one colleague at work used to recommend, "write what you want [with all your emotions], but then delete it, and write what will be constructive to the situation [with your logic]."

Getting back to the election, a lot of what the candidates are saying now and from decades ago is stupid or shameful--"locker room banter"--maybe we need to have a filter on our mouths even when we think other people aren't listening. 

Realistically, we can't and shouldn't have to go around filtering every word we say and holding back on every deed we do--there is something to be said for simply following your moral compass in the moment and reacting naturally, talking and doing from the heart and based on instinct, inner belief, and passion. 

But if you are getting angry, then it is best to hit the pause button and filter yourself before someone else has to count to ten and pop you one in your big dumb coconut face. ;-)

(Source Photo: Andy Blumenthal) 
Share/Save/Bookmark

August 25, 2016

Modesty And Privacy Of Body and Information

So modesty and privacy is very important in terms of propriety and security.

Both are intimately connected. 

Already as children, we learn not to show or talk about our "privates" to others. 

And as adults, we understand that there are certain things about ourselves that we don't just talk about or divulge to others indiscriminately. 

Not being discrete with these and showing either your private parts or your personal information can get you in a load of trouble by giving others the opportunity to take undue advantage of you. 

Both open you up to be ridiculed or even raped of your person or information identity. 

That which is yours to use with others in propriety is instead disclosed for taking out from your control and for use against you. 

Security demands modesty of body and of information, and if not taken seriously, then no amount of lame covering will keep that which is private from public consumption. ;-)
Share/Save/Bookmark

May 28, 2016

The Federal Island of Insanity

So a colleague at work was supposed to get something done. 

Well it didn't happen, and someone else got left holding the bag--not really very fair.  

Too make matters worse, the guy sort of unapologetically and clouded pops in my door and says to me, "What are we doing here?"

Taken aback and not sure what this guy is talking about, I say "Excuse me?"

He looks up into space for a moment, and turns back toward me and repeats emphatically, "I mean, like what are we e-v-e-n doing here?"

Getting more than a little frustrated at this point, I ask quizzically and with some sarcasm, "You mean on planet Earth?"

Again, turning and looking oddly away and then back my way, he says, "In this building!"

I must've been looking at him at this point like is he on drugs, and I say, "We'll there are important laws that we're fulfilling here (implicitly referring to FOIA, Records Act, Privacy Act, E.O. 13526, etc.)."

Unbelievably, he continues, now shaking his head, "Well that's what I mean...why we need that?"

Having too much work to play out whatever this toxic game was any longer, I'm like, "[if you don't believe in transparency and safeguarding/security of information,] Maybe you should write your Congressman," [smile!] and with that went back to the million and one serious work things I still had waiting for attention.

In retrospect, I can't help but think that incredibly, there are people coming to work here in D. C. that either don't know why they are there in the first place (but should know!) or don't believe in the mission or meaning of what they are doing.  

In the private sector, I certainly don't think this conversation would've even gone on as long as it did...the consequences there seeming more pronounced, abrupt, and in a definite way connected with reality. 

With more than 16 years into the Federal sector, I still can't believe a lot of what goes on--both good and hopeful, and bad and more than a little disappointing. ;-)

(Source Photo: Danielle Blumenthal)
Share/Save/Bookmark

March 8, 2016

When Technology Is Our Superhero

I liked this Linux Cat Superhero sticker that someone put on the back of the street sign in Washington, D.C. 

There is something great about the promise of technology (with G-d's help of course) to make our lives better. 

When we get excited about technology, envision it, invest in it, and bring it to market--we are superheros making the world a better place. 

While many technologies may be "pie the sky" invoking more hype than higher purpose, if we can discern the doers from the duds then we can achieve the progress for ourselves and our children that we desperately want. 

Technology should be a superhero and not a villian--when its about the mission and doing what we do better, faster, and cheaper.

While Washington DC is a long way from entreprenurial and innovative Silicon Valley, the nexus between IT and public service has never been greater or more important. 

For example, when it comes to ideological clashes between (the iPhone's) security/surveillance and privacy or between the proliferation of robots vs. jobs for real human beings, balancing the competing interests is the soul of technology and public policy. 

Every truly useful technology should have it's superhero to represent and advocate for it, while us mere mortals sort out the implications and make sense of it all for the real world. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

September 20, 2015

Violation of Home and Person

So I took this photo of a newscast recently about women being followed into their homes and attacked. 

What can be more frightening and violating?

A home is one's castle and sanctuary--that is where we go for shelter, safety, and unconditional love. 

When the the home space is violated, then fear and panic ensue as all bets are off to what can happen to everything one loves and holds dear.

Think of basically any scene where the ancient city walls are being broached by a marauding army, and you'll immediately see men, women, and children running and screaming, but alas the city burns and the people are doomed at the hand of their invaders. 

Similarly, when people are followed or suffer a home invasion--their privacy and security is violated to the core--and they easily become victims of theft, rape, and assault. 

I remember when growing up in New York how one local neighborhood kid was followed home one day by a gang, and they started beating him in front of his home until some neighbors came and chased the attackers away. 

But it didn't end there, because this kid was vulnerable for months afterward, not knowing if and when the attackers would return for more. 

It's like when people threaten someone and say, "I know where you live!"

That puts the fear of G-d into people, because it's not only themselves, but their home and family at mortal risk--and not knowing when or how it may happen...people can just piss their pants. 

The opposite is true as well, people tend to be big shots and aggressive when they feel they are anonymous--when their faces are covered by masks, and they have no identifiable insignias--you don't know who they are or where they are from. 

With anonymity, people feel they can do what they want without fear of reprisal. 

But someone who can be identified, they better behave themselves, because they can be found afterwards and "made to pay" for the bad things they did. 

Ultimately, peace comes from having both safety in the home and the serenity of mind that comes with not having to look over your shoulder all the time. 

Everyone should be able to feel safe in their homes and neighborhood, and the attacker be caught, killed, or damned. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

August 24, 2015

My Ashley Madison

So Ashley Madison is now a well-known adulterous website, particularly after hackers stole 37 million records on the site participants, and have released that information to the public.

These tens of millions of users seek companionship for loveless or sexless marriages or perhaps are just plain liars and cheaters--who knows? 

But yikes, now everyone knows!

Huffington reports that divorce lawyers are anticipating a deluge of new clients seeking divorces

And BBC reports that two people have already taken their lives in Canada as a result of the release. 

What is incredible as well are the 15,000 people who used their .gov or .mil accounts presumably to hide their infidelity from their spouses, but now are in potentially huge trouble with their government agencies.

I assume that Ashley Madison prided themselves on their discretion in handling their clients accounts, but lo' and behold the discretion is for naught compliments of some very naughty hackers. 

Privacy is becoming a very lonely and meaningless word whether you are faithful or a cheater--it's all open fodder on the net. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

August 23, 2015

Shopping At CVS Florida Style

So I am posting this with permission of my wife.

This is how people walk around in CVS in Florida. 

This is not how people dress in CVS in Washington D.C. even on the hottest August days. 

It is really weird how people seemingly change their entire conception of appropriate and modest dress (code) just because they can. 

I remember when at least people coming off the beach would put on a wrap or towel or something.

Uh, not anymore--the feeling of freedom has been extended quite some to the point of this becoming all too blase. 

Maybe this is similar to the trend of some women in Times Square in New York who are going around topless with nothing but some paint even though there are families with children that frequent that touristy area. 

Perhaps it would be nice to leave a little mystery for everyone involved. ;-)
Share/Save/Bookmark

July 28, 2015

When Your Pants Are Down

Yesterday in the news was how a drone was used to fly over and take pictures at a nude beach

So at a nude beach, even those that advertise privacy protections, let's face it your walking around in the buff. But still, the use of the drone with a camera was a violation of people's expectations not to be photographed and by those outside the facility.


And about a week earlier, a five year old finds a camera phone in the lady's bathroom in a Starbucks


Yesteday, I had a similar lesson about people's warped sensibilities or perversions (but without the drone or smartphone--this was the low tech version). 


I'm at the pool for a swim after work. 


There are 2 locker rooms for men and women, of course.


But at one point, I see this LADY get out of the pool and head straight for the MEN'S locker room--she actually proceeds to go in one side--through and past the bathrooms, showers, sauna, and lockers--and out the other side to exit the facility. 


So trying to give her the benefit of the doubt, when I get out of the pool, thinking maybe the locker room wasn't clearly marked, I check it--and there is a big sign with a picture (the symbol for men) and you couldn't miss it!


Also, this lady was clearly not new as she gestured a friendly hello to the lifeguard, and she wasn't the slightest bit confused (she had actually made some small talk with me in the pool)   


When she left, as she headed into the men's room, she didn't hesitate, knock on the door or anything, and obviously didn't care whether anyone was in there--dressed or naked.


Perhaps, because the men's locker room is closer to the exit, she was just taking a shortcut--for her, how convenient!


Then again maybe she was a true perv and this was her way of getting some cheap thrills regardless of other people's right to privacy and safety, including those of children. 


In a sense, this is more than just about generalized privacy (such as with information), but even extends to your very privates!


We live in an age when it is a balancing act between sharing and privacy, between openness and modesty, and between doing what's right and pure self-gratification. 


Unfortunately, to put in bluntly, some people just don't seem to give a sh*t about respect for other people's decency or rights, and they will do what they want regardless of the social balancing act or the necessity to use common sense good judgement in public and private.  


The lesson is that when your pants are down, as creepy as it sounds, it's best to assume that someone is always looking or at least may be on the prowl, so be careful out there. ;-)


(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

July 12, 2015

The "Real" OPM Data Breach

A lot has been made and should be made of the theft of over 21 million federal employees' sensitive personnel records and security clearances. 

Everyone rightly, although somewhat selfishly, is worried about identity theft and the compromised privacy of their information.

The government is worried about hostile nation states using the pilfered information to bribe or coerce military, intelligence, high-level politicals, and others to turn and work for them or otherwise to use against them. 

But what is grossly missing in this discussion is not what information presumably the Chinese stole and how they will use it against us, but rather what information they inserted, altered, or otherwise compromised into the OPM personnel and security databases when they got root access to it.

Imagine for a moment what could hostile nations or terrorists can do to this crown jewel database of personnel and security information:

- They could insert phony records for spies, moles, or other dangerous persons into the database--voila, these people are now "federal employees" and perhaps with stellar performance records and high level security clearances able to penetrate the depths of the federal government with impunity or even as superstars!

- They could alter personnel or security records taking prominent or good government employees and sabotaging them to have questionable histories, contacts, financial, drug or criminal problems and thereby frame or take-down key government figures or divert attention from the real bad guys out there and tie our homeland security and law enforcement establishment in knots chasing after phony leads and false wrongdoers and villains.

Given that the timeline of the hack of OPM goes back to March and December 2014, this was more than enough time for our adversary to not only do to our data what they want, but also for the backup tapes to be affected by the corrupt data entering the system. 

The damage done to U.S. national security is unimaginable. As is typically the case with these things, "An ounce of prevention is worth a pound of cure." Instead of investing in security, now we can invest in "credit monitoring and identity theft protection" for a very sparse three years, while federal employees will go a lifetime in information jeopardy, and the federal government will be literally chasing its tail on personnel security for decades to come. 

With the price so low to our adversaries in attacking our systems, it truly is like stealing and much more. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 25, 2015

18 Million--Change The SSNs

So, maybe one of the most detrimental hysts of information from the Federal government in history. 

Now involving over 18 million current and former federal employees, including military and intelligence personnel. 

No getting around it, but we are major screwed here--this is a treasure trove of personal and privacy information ready to use for identity theft, blackmail, assassination/decapitation attacks at home and work addresses, kidnapping of family members, and literally attacking our national security apparatus from the very inside out--it's people. 

Imagine, if at the time of its choosing, an adversary attacks our nation, but preempts this with sophisticated and coordinated attacks on our critical government personnel--generals, spy masters, political kingpins, and other key decision makers--thereby distracting them from their duties of safeguarding our nation. 

This is our new Achilles Heel and overall a security disaster bar none!

Well, we can't go back and put the genie back in the bottle--although wouldn't it be nice if such critical information (if not encrypted--already unforgivable) would have a self-destruct mechanism on it that we could at least zap it dead.

But for the people whose personal identities are at risk--whose social security numbers (SSNs) and dates of birth (DOBs) have been compromised what can we do? 

While we can't very well change people DOBs, why not at least issue them new SSNs to help thwart the adversaries peddling in this information in the black markets. 
 
If we can put a man on the moon, surely we can issue some 18 million new SSNs and mandate government and financial institutions to make the necessary updates to the records. 

This is not rocket science, and certainly we owe this much to our people to help protect them.

Will our government be there for it's own employees and patriots? ;-)

(Source Photo: here with attribution to Donkey Hotey)
Share/Save/Bookmark

June 5, 2015

People Are Our Greatest Asset, Goodbye!

The Chinese are smart and talented, and there is a cyberwar going on. 

They are suspected are having just stolen the personnel information of 4 million federal government workers.

And there are 4.2 million active, including 1.5 million military personnel. 

So if as they are apt to say, "people are our greatest asset"...

...then we just sort of lost the CROWN JEWELS in terms of highly personal, sensitive, and critical information on the people that handle everything from defense and diplomacy to the economy, energy, the environment, justice, and health and wellbeing. 

Oops!

This is getting scary folks. 

When the adversary through cyber (and other) espionage can know our people, our technology, our communications, virtually everything...then we got some big vulnerabilities!

If we can't defend ourselves adequately (at least for now), I hope at least we are doing okay on the offense! ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 1, 2015

Snapchat, Eat Your Heart Out

As so many of you app users know, Snapchat allows you to send texts, drawings, photos, and videos, but with privacy, knowing they will disappear in a few seconds.

Disappearing messages is certainly not a new idea--in spycraft or for kids. 

Remember the disappearing ink (or maybe you've forgotten because it disappeared)?

Well, this is a photo of disappearing-disappearing ink!

Someone apparently stole the disappearing ink right out of the packaging in the store--it has truly disappeared. ;-)

(Source Photo: Rebecca Blumenthal)
Share/Save/Bookmark

February 13, 2015

tURNING yOUR dEVICE aGAINST yOU!

So interesting article in BBC about the Samsung's "Listening TV."

This TV has voice activated controls and they don't just take commands, but...


"If your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party."


So aside from hackers (and spies) being able to turn your phone and computer mics, cameras, and GPS location data on and off to surveil and eavesdrop on you, now the dumb television set can listen in as well. 


You can be heard, seen, and found...whether you know it or not. ;-)


(Source Photo: Andy Blumenthal with eyes and ears from here and here with attribution to Firas and Simon James)

Share/Save/Bookmark

January 31, 2015

You Can't Hide Your Feelings


You can try to hide your feeling, but it won't work...

Your emotions are now an open book to anyone with facial-recognition software, such as from Emotient, Affectiva, and Eyeris.

This video from Emotient shows examples of Dr. Marion Bartlett demonstrating very well how the system is able to pick up on her expressions of joy, sadness, surprise, anger, fear, disgust, and contempt. 

From broad displays of emotion to subtle spontaneous, natural displays, to micro, fast and involuntary expressions, the system detects and clearly displays it. 

Described in the Wall Street Journal, the software, in real time, successfully uses "algorithms to analyze people's faces" and is based on the work of Dr. Paul Ekman, who pioneered the study of facial expressions creating a catalog in the 1970s with "more than 5,000 muscle movements" linked to how they reveal your emotions. 

A single frame of a person's face can be used to extract 90,000 data points from "abstract patterns of light to tiny muscle movements, which get sorted by emotional categories."

With databases of billions of expressions from millions of faces in scores of countries around the world, the software works across ethnically diverse groups. 

Emotion-detection has a myriad of applications from national security surveillance and interrogation to in-store product marketing and generally gauging advertising effectiveness, to helping professionals from teachers to motivational speakers, executives, and even politicians hold people's attention and improve their messaging.

Then imagine very personal uses such as the software being used to evaluate job applicants or to tell if a spouse is lying about an affair...where does it end?

Of course, there are serious privacy issues in reading people's faces unbeknownst to or unwanted by them as well as possibilities for false positives, so that people's feelings are wrongly pegged or interpreted. 

In the end, unless you wear a physical mask or can spiritually transcend yourself above it all, we can see you and soon we will know not just what you are feeling, but also what you are thinking as well...it's coming. ;-)
Share/Save/Bookmark

November 23, 2014

Data 4 Ransom

The future of cybercrime will soon become the almost routine taking of your personal and corporate data as hostage. 

Once the hacker has control of it, with or without exfiltration, they will attach malware to it--like a ticking time bomb.


A simple threat will follow:


"I have your data. Either you pay for your data back unharmed OR your data will become vaporware! You have one hour to decide. If you call the authorities, you data is history."


So how valuable is your data to you?  


- Your personal information--financial, medical, legal, sentimental things, etc.


- Your corporate information--proprietary trade secrets, customer lists, employee data, more.


How long would it take you to reconstitute if it's destroyed?  How about if instead it's sold and used for identity theft or to copy your "secret sauce" (i.e. competitive advantage) or maybe even to surpass you in the marketplace? 


Data is not just inert...it is alive!


Data is not just valuable...often it's invaluable!


Exposed in our networks or the cloud, data is at risk of theft, distortion, or even ultimate destruction. 


When the time comes, how much will you pay to save your data?


(Source Comic: Andy Blumenthal)

Share/Save/Bookmark

November 9, 2014

Medicine Back When




I thought you may find these photos interesting of how medicine used to be--not all that long ago.

I took these at Georgetown University Hospital in Washington, D.C. 

1) The Circo Electric Bed rotates a patient 210 degrees to help them go from a prone to a vertical position; push the button and you go almost loop de loop. 

2) A Hospital Ward--no private or semi-private rooms yet; say hello to a dozen or so neighboring patients sharing a room, moaning and groaning, each their own. 

3) An X-ray--say cheese as this machine peers inside your body, hopefully not emitting too much radiation to the patient.

4) An operation--looks serious, almost like an alien abduction, hope they had plenty of anesthesia so it didn't hurt. 

Okay, medicine has come a long way...but we're not there yet, not by a medical tricorder longshot. ;-) 

(Source Photos: Andy Blumenthal)

Share/Save/Bookmark

October 20, 2014

Shining A Light On Your Privacy


Check out this special report...

~Half a billion~ downloads of the top 10 Flashlights Apps--the ones we all have on our smartphones--and guess what?

All/most are malware/spyware from China, India, and Russia that are spying on you!

Your contacts, banking information, even your location, is being intercepted by hackers abroad,

The cybersecurity experts Snoopwall (that conducted this study and are offering a free opensource "privacy flashlight") are recommending that you don't just uninstall these flashlight apps, because they leave behind trojans that still are functioning behind the scene and capturing your information. 

So instead doing a backup of key information and then a factory reset of the smartphone is advised.

Pain in the you know what, but these flashlight apps are shining a light and compromising your personal information.

Snopes points out that the flashlight apps may be no more vulnerable to spyware than other apps you download and that perhaps the screening process from the app stores help to protect us somewhat.

When the cyber hackers decide to exploit those apps that are vulnerable, whether for political, military, or financial gain, it will likely be ugly and that flashlight or other app you use may prove much more costly than the download to get them. ;-)

(Thank you Betty Monoker for sharing this.)
Share/Save/Bookmark

October 8, 2014

"Shitty" Advertising

Florida is a beautiful, but sometimes a strange place.

I stop in a restaurant to use the restroom.

Now, I know sometimes people put art inside to sort of spiffy the place up.

But in this (semi-fancy) restaurant's restroom, there was actually advertising--yes, right where you do your thing.

And in one spot, they had this sign from Insite Advertising, Inc. for the bathroom advertisements.

"...Thank you for allowing us to spend this time alone with you. We understand that during your hectic day quiet moments are few and far between..."

Well, this was one alone time that was definitely interrupted and a little less quiet.

Isn't there any place we can go anymore without being bombarded by branding, marketing, advertising, selling, and companies trying to make a another quick buck.

Darn, leave us alone and give us our bathrooms back--I'm not buying from you at a time like this! ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

October 6, 2014

Lock Or Peephole

So is that keyhole in privacy for a lock and key or as an exhibitionistic peephole?

The New York Times had an excellent article on this yesteday, called "We Want Privacy, but Can't Stop Sharing."

We are compelled to share online to demonstrate that we are:

- Important
- Interesting
- Credible
- Competent
- Thoughtful
- Trustworthy

The problem is when you inappropriately overshare online, you may leave youself little to properly disclose in building real-world intimate relationships in a normal give and take of "opening and closing boundaries."

Moreover, being like a lab rat or in a house of glass walls for all to watch indiscriminantly can leave us with feelings of "low self-esteem, depression, and anxiety."

Being under observation--even when it is voluntary--implies being open to judgement and this can drain us of our ability to be ourselves, creative, and take calculated risks.

We don't want to become too busy brushing our hair back and smiling for the camera and making everything (artificially) look like made for reality TV (e.g. Kardashian) perfection. 

The key to privacy is to disclose what needs to be shared, put a lock on what's personal, and not arbitrarily leave the peephole eyes wide open. ;-)

(Source Photo: here with attribution to g4ll4is)
Share/Save/Bookmark

October 3, 2014

Data Like Clouds

So data is like clouds...

Clouds want to be free roaming the wild blue skies similar to how data wants to be searchable, accessible, useful, and so on. 

But with data, like clouds, when it rains it pours--and when data blows about with the windstorm and is compromised in terms of security or privacy, then we not only come away wet but very uncomfortable and unhappy. 

Then, as we actually end up putting our data in the great computing clouds of the likes of Amazon, iCloud, HP, and more, the data is just within arm's reach of the nearest smartphone, tablet, or desktop computer. 

But just as we aspire to reach to the clouds--and get to our data--other less scrupled (cyber criminals, terrorists, and nation states)--seek to grab some of those oh so soft, white cloud data too.

While you may want to lock your data cloud in a highly secure double vault, unfortunately, you won't be able to still get to it quickly and easily...it's a trade-off between security and accessibility. 

And leaving the doors wide open doesn't work either, because then no one even needs an (encryption) key to get in. 

So that's our dilemma--open data, but secured storage--white, soft, beautiful clouds wisping overhead, but not raining data on our organizational and personal parades. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark