Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

October 20, 2013

Going For Gravity

A good friend told me to go see the movie Gravity.

He said, "You'll definitely like it, and make sure you see it in IMAX!"

G-d, I don't recall the last time that I went to an IMAX showing. 

So keeping in the mind the saying, "try it and you'll like it," we went for the $19.00 IMAX 3D experience. 

(OMG, I still remember when movies in NYC were $1!) 

I was hesitant about this movie having heard that there were only 2 characters, and that 1 was Sandra Bullock!

Also, that she was the only one left for the second half of the movie--and I thought how interesting is this going to be?

Okay, I told myself, I'll get excited by the action and destruction in the first half with Clooney and sleep through the second half with Bullock. 

But it was so much better than I anticipated--one of the best movie experiences for me ever!

The IMAX 3D was absolutely amazing...only thing better would've been a massive in-your-face hologram of the whole movie--and I bet this comes one day soon.

The space walks, hurling space debris, exploding space stations and daring escapes was right there and up close in this movie.

I found myself at times reaching my hands out to practically touch the characters--since they seemed that close. 

And Bullocks tears floating in space--were very moving and cool at the same time. 

Bullock is going to win a ton of awards for her performance in Gravity. 

Oh, and one more funny experience was when a lady told this guy in the theatre to hush, and when he didn't listen, she kicked his chair.

But that wasn't the end of it...

After she kicked it a few times, he turned around grabbed her shoe right off of her foot and then threw it at her. 

She ran out of the theatre to get security. 

Security told them both to cut it out, and then I heard the guards outside laughing about these two quarreling theatre-goers. 

Anyway, I didn't sleep a wink in this movie, and enjoyed the whole experience. ;-)

(Source Photo: Rebecca Blumenthal)
Share/Save/Bookmark

June 16, 2013

Dystopia Man

I love this picture that I saw in the art gallery here in Florida. 

I named the person in the portrait, Dystopia Man, because he reminds me of how people would look in a speculative futuristic society.

The way the man looks askew with bloodshot eyes, head split, and hand partially covering his mouth all make me feel like the future is quite unknown, somewhat risky, if not sort of ominous.

We have lots of national and global challenges--with security versus privacy, openness versus secrecy, sharing versus private ownership, social entitlements versus capitalism, theocracy versus democracy, control versus freedom, and man versus machine.

How will these turn out for society, for us?  Will we maintain a healthy balance and respect for individuals? Will these and other conflicts be resolved peacefully? 

Hopefully G-d will grant us the wisdom to solve these dilemmas and many others that await us in the present and not so distant future. 

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

January 26, 2013

A Falafel A Day


Peace comes in many shapes and sizes--peace talks, peace negotiations, peace treaties, and now even peace trucks.

Reminiscent of the peace marches and brightly painted VW peace vans of the 1970's, The Washington Post (26 January 2013) reports on a 76-year old retired Energy Department staffer with a PhD in mechanical engineering who for his second career is starting a peace food truck in DC.

The food truck will have two windows for selling kosher food from one and for selling halal food from the other. 

The owner-activist who is an Egyptian American hopes that "it will bring people from different backgrounds, who are waiting on line, to talk together."

He says: "I think it will work because, well, everyone likes food," and he hopes to fund additional food trucks in Chicago, New York, Israel, and the West Bank. 

The truck has both the Jewish Star of David and Islamic Crescent painted on it--it is truly a truck for representing diversity of people, but with a common taste in good Mediterranean food.

It's amazing what a falafel can do--perhaps, even help bring peace and security to the Middle East.   ;-)

(Source Photo: here with attribution to Shoshanah)

Share/Save/Bookmark

December 14, 2012

Children, Our Future

20 children dead today in school shooting. 

Completely unacceptable!

We need better psychiatric screening, more treatment options, and safer schools.

How can we expect children to excel, when they can't even feel safe. 

Safeguard our children, protect our future.

(Source Photo: here with attribution to Massimo Valiani, Source Quote: ABC News article comment by Quinn, and Mashup by Andy Blumenthal)

Share/Save/Bookmark

August 25, 2012

Choke Points to Checkpoints


This is some promising biometric technology from AOptix

Enrolling in the system is the first step and means just seconds of standing in the capture field of the slender tower, and the device scans both iris and face of the person. 

The scanning captures images within seconds and the software converts the images into binary code. 

It then subsequently scans and matches the person's biometrics against the database for positive identification. 

The beauty of this system is that it is simple and fast and can be used for passenger screening, immigration, or any other access control for entry/egress for a building, location, or even to a computer computer system and it's information.

According to Bloomberg Businessweek, the Insight Duo Towers sells for $40,000 each.

Eighty of these are currently in use at all air, land, and sea borders in Qatar.  Further, Dubai International Airport has been piloting this at a terminal that handles 40 million people per year, and it has cut immigration waiting times from 49 minutes to 22 seconds. 

This technology has obvious important applications for military, law enforcement, and homeland security, as well as even more generalized security use in the private sector.

And while very impressive, here are some concerns about it that should be addressed:

1) Enrollment of Biometrics and Personal Identification--registering for the system may only take a few seconds for the actual scan, but then verifying who you are (i.e. who those biometrics really belong to) is another step in the process not shown.  How do we know that those iris and face prints belong to Joe Schmo the average citizen who should be allowed through the eGate and not to a known terrorist on the watch list?  The biometrics need to be associated with a name, address, social security, date of birth and other personal information.

2) Rights versus Recognitions--rights to access and recognition are two different things. Just because there is iris and facial recognition, doesn't mean that this is someone who should be given access rights to a place, system or organization.  So the devil is in the details of implementation in specifying who should have access and who should not. 

3) Faking Out The System--no system is perfect and when something is advertised as accurate, the question to me is how accurate and where are the system vulnerabilities. For example, can the system be hacked and false biometrics or personal identification information changed?  Can a terrorist cell, criminal syndicate, or nations state create really good fake iris and facial masks for impersonating an enrollee and fooling the system into thinking that a bad good is really a good guy. 

4) Privacy of Personally Identifiable Information (PII)--not specific to AOptix, but to this biometric solutions overall--how do we ensure privacy of the data, so it is not stolen or misused such as for identity theft.  I understand that AOptix has PKI encryption, but how strong is the encryption,who long does it take to break, and what are the policies and procedures within organizations to safeguard this privacy data.

5) Big Brother Society--biometrics recognition may provide for opportunities for safe and secure access and transit, but what are the larger implications for this to become a "big brother" society where people are identified and tracked wherever they go and whatever they do. Where are the safeguards for democracy and human rights.

Even with these said, I believe that this is the wave of the future for access control--as AOptix's says, for changing choke points to checkpoints--we need a simple, fast, secure, and cost-effective way to identify friends and foe and this is it, for the masses, in the near-term.

Share/Save/Bookmark

July 13, 2012

Bomb Shelters For Kindergarten Children

I came across of photo from United With Israel, a global advocacy group, taken in Nitzan, Israel. 

Nitzan is home to about 600 families, mostly from Gush Katif, where more than 8,600 residents were evacuated and their homes demolished in Israel's unilateral disengagement from the Gaza Strip in 2005. 

Now living in temporary plaster shelters in Nitzan, just north of the city of Ashkelon, these residents live in constant fear of terrorist and rocket attacks.

Two bomb shelters for their kindergarten classes have been erected.

In this photo, the children are painting murals on the bomb shelter. 

It is heart-wrenching that little school children should need bomb shelters to hide in, because they are being targeted by deadly attackers. 

What type of world are we living in?

The colorful pictures of water, fish, sand, starfish, clouds, and more is beautiful and serene in the face of the fear these children must face daily. 

I have never seen a children's mural on a bomb shelter, but am grateful for the spirit of these kindergarten children to stand up in the face of evil. 

The L-rd "who watches over Israel will neither slumber nor sleep." (Psalm 121)

May these precious children sleep a little better under the protection of G-d and their new bomb shelters. 

(Source Photo: United With Israel)

Share/Save/Bookmark

July 12, 2012

100% Burglar Proof--Tell Me Another One

So I saw this advertisement for a "100% burglar proof" system and I was just bewildered.

Does anyone really think we can be 100% sure of anything--let alone security?

Everyday thieves rob the safest banks, cyber criminals hack the most secure systems, and crooks break into the most secure sites.

Everything we do comes down to risk management--assessing and classifying risk, selecting controls to mitigate risk, and monitoring those for effectiveness and necessary modifications. 

For children, maybe things are basic black and white--it's simpler that way "good guys" and "bad guys" and so on, but for adults we know there are at least "50 shades of grey" and that means that there are no certainties in life--whether security, sure financial bets, or perfect opportunities--everything is a gamble in some respects. 

I remember someone once joked about even marriage being somewhat chancy, since "you never really know the person until you wake up with them in the morning every day."

With 20-20 hindsight, all the pundits seem brilliant, but only the prophets can predict the future with accuracy. 

As to any product or vendor that markets itself as having a 100% success rate, you better get yourself a money back guarantee on it, because you will definitely need it! ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

July 6, 2012

The Information Is On You

There was a fascinating article in the New York Times (17 June 2012) called: "A data giant is Mapping and Sharing the Consumer Genome."

It is about a company called Acxion--with revenues of $1.13 billion--that develops marketing solutions for other companies based on their enormous data collection of everything about you!
 
Acxion has more than 23,000 servers "collecting, collating, and analyzing consumer data...[and] they have amassed the world's largest commercial database on consumers."

Their "surveillance engine" and database on you is so large that they:

- "Process more than 50 trillion data 'transactions' a year."
- "Database contains information about 500 million active consumers."
- "About 1,500 data points per person."
- Have been collecting data for 40 years!

Acxion is the slayer of the consumer big data dragon--doing large-scale data mining and analytics using publicly available information and consumer surveys.

They collect data on demographics, socio-economics, lifestyle, and buying habits and they integrate all this data.

Acxion generates direct marketing solutions and predictive consumer behavior information.

They work with 47 of the Fortune 100 as well as the government after 9/11.

There are many concerns raised by both the size and scope of this activity.
 
Firstly, as to the information itself relative to its:

- Privacy
- Security

Secondly, regarding the consumer in terms of potential: 

- Profiling
- Espionage
- Stalking
- Manipulation 

Therefore, the challenge of big data is a double-edged sword: 

- On one hand we have the desire for data intelligence to make sense of all the data out there and use it to maximum affect.
- On the other hand, we have serious concerns about privacy, security, and the potential abuse of power that the information enables. 

How we harness the power of information to help society, but not hurt people is one of the biggest challenges of our time. 

This will be an ongoing tug of war between the opposing camps until hopefully, the pendulum settles in the healthy middle, that is our collective information sweet spot. 

(Source Photo: Andy Blumenthal)


Share/Save/Bookmark

June 8, 2012

Video Chat TMI


This is a new video chat service from Airtime and the music and video make it look pretty good, but I have my sincere reservations. 

Airtime connects as an app from Facebook and according to Bloomberg BusinessWeek (11-17 June 2012), "users can then talk to their Facebook friends, search for someone with similar interests, or just hit the 'next' button to find a random chat partner."

While, I find the idea of randomly engaging online with someone intriguing, I also more find it more than a little scary not knowing who they really are--there are plenty of fraudsters, charlatans, and perverts out there that you would not want to be talking to. 

The not so funny thing is that the precursor to Airtime called Chatroulette--was truly, as the name implies, a gamble and many times a bad one at that, with some unscrupulous users availing themselves of the video to expose themselves online. 

Frankly, it seems that many people may be using these applications more as swingers to hook up, have a fling, and engage in flirtatious or even sexual behavior than for developing any sort of real meaningful relationships. 

Furthermore with Airtime, based I assume on people's Facebook profiles, "as two users converse, Airtime suggests interests and common friends they may have in common"--with these actually popping up on your screen!

Whatever happened to any sort of privacy and discretion in sharing and letting conversations and relationships evolve naturally and over time between people rather than forced and in your face!

To me even the concept of having to use video when chatting is over-rated! I think most people do not feel all that comfortable in front of the camera and are actually more at ease talking without being viewed every moment through a lens.  

I have seen cameras deployed for desktop computers that were hardly ever used. And even with Apple's Facetime application built right into the iPhone, I rarely ever see anyone actually using this--do you? 

I think this is a clear lesson with technology that just because we can do something, doesn't mean we should. 

We need to take into account people feelings and their comfort zone, especially when it comes to privacy, and not just put them in front of every camera and float their personal interests and friends randomly or regularly. 

"Discretion is the better part of valor" and it's time to appreciate technology and social media companies and applications that recognize this and roll out services that are respectful of people privacy, security, and right to have some control over their lives.

Share/Save/Bookmark

June 3, 2012

Celebrating Israel's Birthday

Today was the Israel Day Festival in Rockville, Maryland.

The Israel Scotts Tzofim Friends Caravan--are teenagers who are entering their senior year in high school--here they sing a modern day version of "Hallelujah."



Hora DC is an adult dance group--here performing the classic Fiddler on the Roof, "If I were a rich man."



If was a beautiful Sunday with lot's of spirited joy celebrating Israel's 64 birthday.  

And we hope and pray for many more--with peace and security for all.

(Source Videos: Andy Blumenthal)

Share/Save/Bookmark

April 20, 2012

Robot Guard Thyself


The Asian Forum of Corrections in South Korea has developed this 5' tall robot for patrolling prisons.

But rather than restraints and weapons, this prison guard carries a suite of technology:

- 3-D Cameras for monitoring safety and security

- Recording devices for capturing activity

- 2-way wireless communications between corrections officials and prisoners

- Pattern recognition and anomaly detection software for differentiating normal behavior from problems

While this sparks the imagination for where this might go in the future, I'm not quite sold on this. 

Firstly, how well can these robots really recognize and interpret human behavior, especially from those who may be fairly adroit at hiding or masking their activities, day-in and day-out. 

And maybe more importantly, without some serious defensive and offensive tricks up its robot sleeve, I have a feeling that many a prisoner with a two by four, would put this million dollar robot in the junk yard pretty fast, indeed. 

I'd rate this as not there yet! ;-)

Share/Save/Bookmark

January 21, 2012

War ---> Peace

I like this clever poster from the United Nations, published in March 2009 by their Department of Public Information, on "Translating War to Peace" with a dove carrying the letter "A" from the word war to the word peace.
If only peace was as simple as moving around a single letter.
Usually, it not the single letter that is painful, but when it becomes many letters and these letters form words of hate, bigotry, intolerance, and injustice that is indeed painful and where war does not translate to peace, but where war become unfortunately inevitable.
As individuals and a nation, I believe peace is what we all hope and pray for and that this comes from a spirit of brotherhood and unity around the world.
Although there are many prayers for peace, I am reminded of one specific beautiful prayer In Judaism, that we sing called "Oseh Shalem"
"May he who makes peace in high places, make peace for all of us and all Israel, and let us say Amen."
I love singing this and humming the tune for this prayer--it is like a deep calling that resonates.
I noticed online that the United Nations "cancelled as a sales item" this poster for peace (and it's also gone from Amazon), and it should make us all wonder where did that peace go and when will it return?
A genuine peace--more than a single letter and a secure and lasting peace of many letters.
(All Opinions my own)

Share/Save/Bookmark

September 23, 2011

A Single Candle

!
This video is an excerpt from the speech today by Israeli PM Netanyahu at the U.N. General Assembly.
Some highlights from this:
While Israel is the only true democracy in the Middle-East, it has been singled out for condemnation by the U.N. (in 21 out of 27 U.N. resolutions) more all than all other nations of the world combined.
And while "it doesn't only cast Israel as the villain, it casts real villains in leading roles:"
- Khadafi-led Libya chaired the U.N. Commission on Human Rights.
- Saddam's Iraq headed the U.N. Committee on Disarmament.
- Hezbollah-controlled Lebanon now presides over the U.N. Security Council.
Netanyahu recalls in his speech--that despite all the many capable and decent people at the U.N., when in 1984 he was appointed Israel's Ambassador to the U.N., that the Lubavitcher Rebbe foretold to him that he would be serving in a "house of many lies," but that even in the darkest place, a single candle can be seen far and wide.
I was proud to see the candle alight and hopeful that from it, intolerance, extremism, terror, and anarchy will be defeated.
All people have a right to dignity and respect--may G-d grant us a path forward to find a genuine peace--one where we not only learn to live with each other, but perhaps where one day, we can learn to love each other, as we are all children of the one G-d in heaven--Oh, what a peace that would be!

Share/Save/Bookmark

May 22, 2011

Peace and Security

With all the questions about peace in the Middle East, there is a lot of enthusiasm for a two-state solution for Israel and the Palestinians, living side-by-side in peace.
This is a practical vision that would resolve a lot of suffering and enable us to move constructively forward.
It may be hard to understand why Israel needs very specific conditions to protect itself, but this video sent to me by a friend explains it very well.
In a historical perspective, I think it is important to be aware of the context of the Jewish security concerns as well:
1) Six million Jews (ONE out of every THREE men, women, and children) were murdered in the Holocaust just last century.

2) Tens of thousands more were lost in numerous wars to overtake Israel (in 1948, 1956, 1967, 1973, 1982, 2006, 2008 and in the Intifada's).

3) Mid-East neighbors (that support terrorist organizations--like Hamas, Hezbollah and more) do not even recognize Israel's right to exist, and are chartered to their ultimate destruction.
As a Jewish American, I too share, pray, and hope for peace in the Middle East...let it be so as a genuine and lasting one.
While Middle East peace often seems impossible, G-d can do what we think is impossible.
(All opinions are my own)

Share/Save/Bookmark

March 31, 2010

Balancing Freedom and Security

There is a new vision for security technology that blends high-tech with behavioral psychology, so that we can seemingly read people’s minds as to their intentions to do harm or not.

There was a fascinating article (8 January 2010) by AP via Fox News called “Mind-Reading Systems Could Change Air Security.”

One Israeli-based company, WeCU (Read as we see you) Technologies “projects images onto airport screen, such as symbols associated with a certain terrorist group or some other image only a would be terrorist would recognize.”

Then hidden cameras and sensors monitoring the airport pickup on human reactions such as “darting eyes, increased heartbeats, nervous twitches, faster breathing,” or rising body temperature.

According to the article, a more subtle version of this technology called Future Attribute Screening Technology (FAST) is being tested by The Department of Homeland Security—either travelers can be passively scanned as they walk through security or when they are pulled aside for additional screening are subjected to “a battery of tests, including scans of facial movements and pupil dilation, for signs of deception. Small platforms similar to balancing boards…would help detect fidgeting.”

The new security technology combined with behavioral psychology aims to detect those who harbor ill will through the “display of involuntary physiological reactions that others—such as those stressed out for ordinary reasons, such as being late for a plane—don’t.”

While the technology married to psychology is potentially a potent mix for detecting terrorists or criminals, there are various concerns about the trend with this, such as:

1) Becoming Big Brother—As we tighten up the monitoring of people, are we becoming an Orwellian society, where surveillance is ubiquitious?

2) Targeting “Precrimes”—Are we moving toward a future like the movie Minority Report, where people are under fire just thinking about breaking the law?

3) Profiling—How do we protect against discriminatory profiling, but ensure reasonable scanning?

4) Hardships—Will additional security scanning, searches, and interrogations cause delays and inconvenience to travelers?

5) Privacy—At what point are we infringing on people’s privacy and being overly intrusive?

As a society, we are learning to balance the need for security with safeguarding our freedoms and fundamental rights. Certainly, we don’t want to trade our democratic ideals and the value we place on our core humanity for a totalitarianism state with rigid social controls. Yet, at the same time, we want to live in peace and security, and must commit to stopping those with bad intentions from doing us harm.

The duality of security and freedom that we value and desire for ourselves and our children will no doubt arouse continued angst as we must balance the two. However, with high-technology solutions supported by sound behavioral psychology and maybe most importantly, good common sense, we can continue to advance our ability to live in a free and secure world—where “we have our cake and eat it too.”


Share/Save/Bookmark

March 4, 2010

Pushing Out The Edge


These are my remarks from the MeriTalk Innovation Nation 2010 Conference, "Edge Warrior" Panel today. I was the Moderator and this was my introduction to the discussion by the panelists on Edge Computing.

As I thought about the concept of edge computing an image came to my mind—of a cliff—, representing the limits of what is possible today. Then the cliff started to expand--to-grow in size- -with the edge constantly being pushed further out. This is a way to think about the future of technology. We want to be "leading edge,” and some may even want to be “bleeding edge, but we certainly don’t want to go “over-the-edge, so we need to expand and create new opportunities in our organizations.

Both the public and the private sectors are pushing into new frontiers in a variety of innovative technologies that take us to the edge, everywhere. We’re hearing about many of them today at the conference – cloud computing, social computing, mobile computing, green computing and more. And it’s exciting to think about what we can accomplish if we put promising new technologies to work for the government.

But, we must be careful not to fall into one of two extremes, either jumping in prematurely and making costly mistakes, or avoiding and resisting change in favor of the “tried and true” or what I would call the perpetual status quo and never growing to our true potential as individuals, agencies, and a nation.

To me, true leaders don’t fall into either extreme, but rather they brings both sides together to find a balanced approach to innovation, growth, change, and yes, even some elements of managed risk. In any organization, technology leadership is not about leading employees to the edge of the computing cliff, but rather about pushing out the edge so that their capabilities are constantly increasing, while the risks are also constantly being mitigated.

In fact, technology leadership is not very far from the vision that we saw on the show, Star Trek. The show pushed the boundaries of what was possible—going where no one had gone before, but always striving to keep the ship intact and the crew safe.

While we are the stewards to keep our agencies secure to serve the public, we must also acknowledge that we live in a dynamic, competitive, rapidly changing, and increasingly global environment and we cannot afford to stand still while others press ahead. To meet the challenges that face us, we must constantly seek out better ways of executing our mission, and new technologies are critically important in helping us to do this in all directions and at all the edges.

Finally, this is especially true in today’s world, when agency computing is no longer restricted to our brick and mortar office buildings but rather is ubiquitous. From the corner Starbucks to the most remote regions of Iraq, Afghanistan, and elsewhere, our customers demand to be productive everywhere, to carry out their mission.


Share/Save/Bookmark

December 29, 2009

What Hollywood Can Teach Us About Fighting Terrorism

U.S. law enforcement officials have thwarted about two dozen known terrorist plots since 9/11 and there are probably lots more that haven’t made the papers. Some of them, like this month’s “Underwear Bomber” have nicknames, like the “Shoe Bomber” (2002), the “Lackawanna Six,” (same year), and the “Virginia Jihad” (2003). Others are known by geographical location, such as Fort Dix (2007) and the foiled plot against synagogues in the Bronx (2009). But one thing they all have in common is their determination to threaten and even destroy our freedom and way of life.

As a person who is deeply dedicated to America’s safety and security, both personally and professionally, I worry about the rise of terrorism that has sprung up in the past few decades. Terrorists are relentlessly determined to destroy our lives even if it means taking their own lives to do it. But what is even more frightening is that despite all the actions we have taken to fight terrorism, our culture remains deeply reactive. Can we really stay one step ahead and lucky forever?

The best example of our relative complacency in the face of a deadly threat is the policy of taking off our shoes for screening only after the case of the Shoe Bomber came to light. Now again, we waited for an Underwear Bomber before talking seriously and publicly about full body screening for all?

There is a saying that you can’t drive a car by looking in the rearview mirror, but unfortunately that seems to be the way our culture approaches the fight against terrorism. The focus should not be on stopping the last threat, but on anticipating and countering the future threat before it ever materializes.

To do this, we need to think like the bad guys do as well as conduct more exercises to expose our own security weaknesses (red teaming), rather than be surprised when the terrorists find our next Achilles heel.

In the particular case of the Underwear Bomber, it was particularly shocking that we knew this person was a threat. His own father warned us, yet we didn’t put him on the terrorist watch list or revoke his visa (as the British did). And just today I read that this individual told investigators there are literally hundreds more just like him, all waiting to strike.

Think about that for a second. There are seemingly endless terrorists out there, and they can have a 99% failure rate and still be “successful.” Yet U.S. and global law enforcement can’t fail at all—not even once—without dire and deadly consequences on a massive scale.

However, instead of gripping that unbelievable reality and treating it as the dire situation it is, there is actually talk about “rehabilitating” the terrorists. As if we have succeeded at rehabilitating “normal” criminals…now we are going to try and “deprogram” people who are religiously “inspired” to commit their diabolical deeds?

To adequately manage the new reality we face today, we must not only stay ahead of known threats, but also proactively envision new potential attack scenarios, prepare for them, and thwart them before they become potentially lethal.

A great place to start would be Hollywood; our entertainment industry has done a pretty good job of imaginatively exposing potential attack scenarios—in dozens of films from Air Force One to The Sum of All Fears, Executive Decision to The Peacemaker, and Arlington Road to The Siege, and many more.

There are also television shows like 24, with now seven seasons and counting, that keep Americans riveted to their seats week after week with terrorism plots that play out before our very eyes. We seem to generally view these as serious threats that are possible in our time.

I respect the President for openly acknowledging the "systematic failure," but it is going to take all of us to commit and follow through with ongoing security measures. It is not a one month or one year event (or even an 8 year event post 9/11), but rather a complete new security mindset that stays with us always.

We can and should learn from the visionary talent in our vibrant entertainment industry and from wherever else they may reside, and adopt creative and proactive thinking about terrorism and make this a regular part of our security culture. I understand that there are many forces at play here, and that most of us are not privy to some of the more sophisticated ways that we fight terrorism every day. But what I am talking about is our collective, public culture, which still seems to shrug off the seriousness of threats against us. For example, just today, I saw a sign in an airport that directed wheelchairs through security screening. It seemed almost an invitation to sew explosives into a wheelchair (although I understand that these are actually screened).

I have the deepest respect for the men and women who serve to protect us every day. But as a culture, it is long past time to wake up. We don’t have the luxury of collective denial anymore. We must embrace security as a fact of life, fully and in an ongoing manner.

Further, as we approach 2010, let us resolve to learn from the most imaginative people in our society about how we may think out of the box when it comes to combating terrorism.

In the real world, we must act now to quickly deploy new, more advanced screening technologies to our airports, marine ports, and border crossings, and employ our most creative minds to “outwit, outplay, and outlast” the terrorists who plot against us—whether in their shoes, their underwear, or wherever else their evil schemes might lead them.


Share/Save/Bookmark

October 20, 2009

“The Happiness Myth” and Enterprise Architecture


Recently, I was reminded of an interesting article that appeared in The Wall Street Journal (20 Dec 2007) that what really matters in life is not happiness, but rather peace of mind.

Generally speaking, people “are consumed by the pursuit of happiness,” and this fact is codified in our very Declaration of Independence
that states: “that all men are created equal, that they are endowed with certain unalienable rights, that are among these are life, liberty, and the pursuit of happiness.”

However, absolute happiness is often in conflict with the "reality on the ground".

There are some of the inherent conflicts we deal with in enterprise architecture (sort of like the Murphy's Law of EA):

Here are some typical user wants (often associated with problematic architectures):
  • A baseline, target, and transition plan without their having to provide virtually any input or to collaborate whatsoever.
  • An architecture roadmap that they do not have to actually follow or execute on.
  • A platform for information sharing and access to information 24/7, but they also want to hoard “their information”, and keep it secure and private, on a need-to-know only basis, which they subjectively decide.
  • A structured IT governance process to ensure sound IT investments for the organization, but also they want leeway to conduct their own affairs, their way, in which they buy want they want, when they want, how they want, from whomever they want, with whatever founds they can scrounge up.
  • A requirements generation and management process that captures and aligns specific functional requirements all the way up to the organization’s strategic plan, mandates and legislation, but that they don't have to be bothered with identifying, articulating, or aligning.


The world of EA is filled with conflicting user demands and polarizing directions from user that want and expect to have it all. While certainly, EA wants and strives to meet all reasonable user requirements and to satisfy the user community and “make them happy,” at a point there comes the realization that you can’t (no matter how hard you try) make everyone happy all of the time.

People want it all, want it now, and often when you give them what they want, they realize that it wasn’t “really” what they had wanted anyway.

So the way ahead is to understand and take into account your user requirements, but more importantly to do the “right” thing for the organization based on best practices, common sense, and initiatives that will truly drive improved performance and mission results.

The WSJ states, “Dad told me: “life isn’t built around ‘fun.’ It’s built around peace of mind. Maybe Dad sensed the paradox of happiness: those most desperate for it run a high risk of being the last to find it. That’s because they make foolish decisions. They live disorderly lives, always chasing the high of the moment.”

In User-centric EA, we don’t “chase the high of the moment,” or look to satisfy each and every user whim, but rather we keep the course to developing sound IT planning and governance and to enhancing organizational decision-making capabilities for our end users. EA is a discipline that ultimately strives to ensure peace of mind for the enterprise through the provision of vital "insight" and "oversight" functions.


Share/Save/Bookmark

September 18, 2009

What Stops Us From Going Cashless

How many of you ever wondered why we continue to use dollar bills and coins when we have credit and debit cards that make cash virtually obsolete?

I for one have long abandoned cash in lieu of the ease of use, convenience, orderliness of receiving monthly statements and paying electronically, and the cleanliness of not having to carry and handle the cold hard stuff.

Not that I am complaining about money at a time of recession, but seriously why do we not go dollar-digital in the “digital age”?

Before debit cards, I understood that some people unfortunately have difficulty getting the plastic because of credit issues. But now with debit cards, everyone can shop and pay digitally.

Even government run programs like the Supplemental Nutrition Assistance Program (SNAP aka food stamps) now uses an electronic card for purchasing no money paper stamps.

It seems that credit/debit card readers are pretty much ubiquitous—stores of course, online—it’s the way to go, even on the trains/buses and candy machines.

From the taxman perspective, I would imagine it is also better and more equitable to track genuine sales transactions in a documented digital fashion than enabling funny “cash business.”

So why don’t we go paperless and coinless and fully adopt e-Commerce?

An interesting article in the Wall Street Journal, 11 Sept. 2009, described a trendy NYC restaurant that was doing just that.

“The high-end New York City restaurant said goodbye to dollars: Tip in cash if you like but otherwise, your money is no good here.”

Others have been going cashless for some time now.

“In the world of online and catalog retailing, credit and debit cards have long been king. And in recent years, a handful of airlines have adopted ‘cashless cabins.’”

As the NYC restaurant owner said, “Suddenly, it struck me how unnecessary cash was…[moreover,] the convenience and security of going cashless are well worth the added cost.”

Further, from the customer perspective, using a debit or credit card lets users optimize their cash flow and earn reward points.

I believe that the day is coming when bites and bytes are going to win over paper and coins.

This is going to happen, when the IRS requires it, the government stops printing it because it always has (i.e. inertia), when retailers recognize that the benefits of digital money outweigh the fees, and when resistance to change is defeated by common sense of modernization.


Share/Save/Bookmark

August 30, 2009

Privacy vs. Exhibitionism

We are a nation torn between on one hand wanting our privacy safeguarded and on the other hand wanting to share ourselves openly and often on the Internet—through Social Media, e-Commerce, e-mail, and so forth.

These days, we have more information about ourselves available to others than at any time in history. We are information exhibitionists—essentially an open book—sharing virtually everything about ourselves to everybody.

Online, we have our personal profile, photos, videos, likes and dislikes, birth date, addresses, email and phone contacts, employer, resume, friends and family connections, banking information, real estate transactions, legal proceedings, tax returns, and more. We have become an open book to the world. In a sense we have become an exhibitionistic nation.

While we continue to friend, blog, tweet, and post our thoughts, feelings, and personal information online, we are shocked and dismayed when there is a violation of our privacy.

How did we get to this point—here are some major milestones on privacy (in part from MIT Technology Review--July/August 2009):

1787—“Privacy” does not appear in Constitution, but the concept is embedded in protections such as “restrictions of quartering soldiers in private homes (Third Amendment), prohibition against unreasonable search and seizure (Fourth Amendment), prohibition against forcing a person to be a witness against himself (Fifth Amendment).

1794—Telegraph invented

1876—Telephone invented

1890—Boston Lawyers Samuel Warren and Louis Brandeis wrote in Harvard Law Review of “the right to be let alone” and warned that invasive technologies threatened to take “what was whispered in the closet” and have it “proclaimed from the house-tops.”

1914Federal Trade Commission Act prohibits businesses from engaging in “unfair or deceptive acts or practices”; has been extended to require companies to write privacy policies describing what they do with personal information they collect from customers and to honor these policies.

1934Federal Communications Act limits government wiretapping

1969—ARPANet (precursor to Internet) went live

1970Fair Credit Reporting Act regulates collections, dissemination, and use of consumer information, including credit information

1971—First e-mail sent.

1973—Code of Fair Information Practices limits secret data banks, requires that organizations ensure they are reliable and protected from unauthorized access, provides for individuals to be able to view their records and correct errors.

1974—Privacy Act prohibits disclosure of personally identifiable information from federal agency.

1988—Video Privacy Protection Act protects against disclosure of video rentals and sales.

1996—Health Insurance Portability and Accountability Act (HIPPA) protects against disclosures by health care providers.

1999Scott McNealy, CEO of Sun Microsystems states: “You have zero privacy anyway. Get over it.”

2000—Children’s Online Privacy Protection Act prohibits intentional collections of information from children 12 or younger

2001—USA Patriot Act expands government’s power to investigate suspected terrorism acts

2003—Do Not Call Implementation Act limits telemarketing calls

2006—Google Docs release for creating and editing docs online

2009—Facebook 4th most popular website in the world

As anyone can see, there is quite a lot of history to protecting privacy. Obviously, we want to be protected. We need to feel secure. We fear our information being misused, exploited, or otherwise getting out of our control.

Yet, as technology progresses, the power of information sharing, collaboration, and online access is endlessly enticing as it is useful, convenient, and entertaining. We love to go online and communicate with people near and far, conduct e-commence for any product near seamlessly, and work more and more productively and creatively.

The dichotomy between privacy and exhibitionism is strong and disturbing. How do we ensure privacy when we insist on openness?

First, let me say that I believe the issue here is greater than the somewhat simplistic answers that are currently out there. Obviously, we must rely on common sense + technology.

From a common sense perspective, we need to personally safeguard truly private information—social security numbers and mother’s maiden name are just the obvious. We need not only be concerned about distinct pieces of information, but information in the aggregate. In other words, individual pieces of information may not be easily exploitable, but when aggregated together with other publically available information—you may now be truly exposed.

In terms of technology, we need to invest more time, money, and effort into securing our systems and networks. Unfortunately, businesses are more concerned with quarterly revenue and profit targets than with securing our personal information. We have got to incentivize every business, organization, and government entity to put security and privacy first. Just like we teach our children, “safety first”, we need to change our adult priorities as well or risk serious harm to ourselves and our nation from cyber criminals, terrorisms, and hostile nation states.

But the real issue is, why do we continue to treat technology as if it is more secure and private than it truly is? In a sense, we shut our eyes to the dangers that we know are lurking, and tell ourselves “it only happens to somebody else.” How do we curb our enthusiasm for technological progress with a realism of recognizing the very real dangers that persist?


Share/Save/Bookmark