Category Archives: IT

Double standards, no resolve (part 2)

Part two is not about Greece or the Greeks, it is about what has been behind several parts for a long time now. Yet, the visibility of certain events is now forcing another large change to the surface. First let us look at the events as we see them in the Guardian (at http://www.theguardian.com/technology/2015/jan/25/wikileaks-google-staff-emails-us-government).

The title ‘WikiLeaks demands answers after Google hands staff emails to US government‘ calls for a few thoughts, but I think you should consider a few quotes and then reconsider how you feel. The first one is “Google revealed to WikiLeaks on Christmas Eve – a traditionally quiet news period – that it had responded to a Justice Department order to hand over a catch-all dragnet of digital data including all emails and IP addresses relating to the three staffers“. The second one is “Harrison, who also heads the Courage Foundation, told the Guardian she was distressed by the thought of government officials gaining access to her private emails” and then we get “The investigation followed WikiLeaks’ publication, initially in participation with international news organisations including the Guardian, of hundreds of thousands of US secrets that had been passed to the organisation by the army private Chelsea Manning“. So this was specific! Let us not forget that this person (Manning) should be regarded as guilty of treason! This is nothing less than an intelligence analyst going beyond rogue! Manning was a simple E-1 private with no comprehension of the complexity of wars, especially the war the US found itself in, a theatre that is hard to grasp for some of the brightest generals (you know these highly educated, passed their middle age point individuals with a few decades of military experience, in the US seen wearing stars on their shoulders). No, Manning decided on the safety of hundreds if not thousands of lives. In addition US diplomatic efforts were thrown out of the window, setting economic options back for up to a decade, if not longer.

So when we see the response by investigative editor Sarah Harrison “Knowing that the FBI read the words I wrote to console my mother over a death in the family makes me feel sick“, seems a little hollow. For one the FBI does not care about her mommy, two, what did you expect to happen when you access unauthorised data to the size, scope and extent as Manning had transmitted?

I think Harrison is overreacting, if we accept chapter 13 in the Art of war, both the spy and the receiver of information should have been put to death. Is it not a good thing that it was merely investigated by the FBI?

Yet, there is a side that many are ignoring; many do so in an unintentional way, mainly because it tends to not hit us in any way. For that we need to take a step back to Forbes 2013 (at http://www.forbes.com/sites/robertwood/2013/08/06/excuse-me-apple-google-starbucks-h-p-irs-wants-to-tax-stateless-income/), here we see the following parts: “U.S. companies are said to have more than $1.5 trillion sitting offshore. Most claim that they must keep the money there to avoid the taxes they would face by bringing it back to the U.S.“, “the money at stake is enormous. Plus, the companies involved have treasure troves of cash for many war chests. Big and protracted battles seem inevitable. Still, some big companies may be in for battles that are even larger than they think. They may even need to think different” and “The OECD plan claims that companies like Apple and Google avoid billions in taxes. The G20 is made up of 19 leading world economies plus the European Union. It too has voiced support for a fundamental reassessment of the rules on taxing multinationals“. These thoughts all sound nice, but there is an additional element to all this. You see, as I stated more than once, currency is slowly on the way out (loosely approached). The nations that are left with manageable debt are now slowly but surely diminishing to zero. Greece may be the first one, but at minus 18 trillion, the US is the clearest one to end up with nothing, especially as those large US firms have become stateless. You see, now we get to the good part, the new currency will be IP, but here is the kicker, most (including me) seemed to forget that IP is more than Patents and Trade Marks, it includes data! Now we get to the nice stuff, you see, Google adhered to a situation, Twitter and a few others did not, or at least in a delayed way, but the new currency will include massive amounts of data and many players are now catching on that data is at the core a stateless, virtual and duplicable currency. No matter how Sony called its hack attack, does it now look a little clearer that those having a copy of that data are preparing for more than just a data dump? This is what McKinsey & Company had to say in August 2014 “Indeed, the analytics performed by actuaries are critically important to an insurer’s continued existence and profitability“, as well as “While the impetus to invest in analytics has never been greater for insurance companies, the challenges of capturing business value should not be underestimated. Technology, as everyone knows, changes much faster than people. The key for insurers is to motivate their highly skilled experts to adopt the newest tools and use them with creativity, confidence, and consistency” and finally there is “The proliferation of third-party data sources is reducing insurers’ dependence on internal data. Digital “data exhaust” from social media and multimedia, smartphones, computers, and other consumer and industrial devices—used within privacy guidelines and assuring anonymity—has become a rich source for behavioural insights for insurance companies, as it has for virtually all businesses. Recently, the release of previously unavailable or inaccessible public-sector data has greatly expanded potential sources of third-party data“. Yes, it sounds nice that there is public-sector data, but the one part no mentioned is how the analytics is not driven by those, but ascertained through private-sector data fields. You see the data that Sony had on its employees and on the actions of 70 million customers is a lot more insightful when you link it to medical records. Consider how much profit a company gets if it could ascertain more precisely the risk 7 million of its own customers are. If the connection of medical (obesity) and the gamer data of one person results in a $12 per month surcharge, what happens when we see the US having an obesity rating of around 32%? Now we have 70 million accounts and their gaming behaviour. So if we do the following math 32% of 70 million (falsely assuming that they were all American gamers), then we now get the number of people confronted with a $144 a year additive. So in one swoop, this data set gives way to an additional $3.2 billion for insurance fees. Data is going to be that simply applied sooner than you think. With the cloud being forever virtual (as one would think), people forget that a personal space is linked to a real location (wherever that drive is), but what when the data set is beyond massively huge? What if it is spread over several locations? How do we think then? You see Stateless data is not a new concept, but until recently it was never a realistic concept. It is interesting how tax dodging makes engineers a lot more creative.

At the foundation of all this is not the Wikileaks part, that part just illuminates the nutty side of data. Consider the amounts you as the reader had shared in the last 72 hours via Facebook, LinkedIn, SnapChat, Instagram and such. You freely distributed that, you gave up your privacy rights for whatever you openly published. Now consider that whatever you shared got collected. Several people were on vacation (so someone knows that their house is empty and possible unguarded), some revealed that they were sick (health data) and some revealed other details like parties attended and such.

Now the empty house is the most direct one, but not the most important one. Consider the times you updated your status that you were at home with the flu, or something else. Under normal conditions you just had a sickie, or perhaps another way. Now consider that someone now automatically collects the times you were sick, how does that affect your premium? How will your health cycle be analysed if you are shown to have attended 15-30, or even 50-100 parties a year? How long until this shows as detrimental on your health chart? Weirdly enough not having that does not lower your premium, but there is every evidence that doing it will increase your premium.

Do you think that this is over the top?

Then see the following (at http://www.qbe.com.au/Personal/Home/Managing-Your-Risk/Insurance.html). Here we see “Importantly, reducing the likelihood of making a claim helps protect your No Claim Bonus, helping to keep the cost of your insurance premium down“, which has been a truth for a long time. Yet when we consider the mention ‘Don’t alert people you are going away (including on social networking sites)‘. How long until someone combines the two? At reputation.com we see the following “Life insurance companies are increasingly turning to the Internet to determine a potential customer’s risk“, so if you like extreme sports, you might pay for that passion in other ways too. In addition, the one most disturbing was “Donating to charitable causes is a noble gesture, but if you show too great an interest in any particular medical-focused cause, say breast cancer research or prostate cancer awareness, it might indicate to insurance companies that you’re at a higher risk for certain illnesses“, that gives a possible (implied, but not proven), connection that your social responsibility comes at an insurance price. Did you consider that? And this is not starting this year, or next year. Some of these events started no later than 2010.

This all was nothing but to pave the way for that what comes next. You see, there are several sides to Google and Facebook. They are all about bandwidth and several nations are now seeing that even though Facebook is too large, there is a clear path that data is currency, so how long until we see a growth of radicalisation through localisation? This is not radicalisation in the violent way, but in the opposite way. You should see radicalisation of data, attained by washing all the data markers in local server environments. You can’t wash all the markers, but you can make access to it a lot less available. This is the fear Google (possibly Facebook too) has had for some time. As these privacy acts, that data acts and data collection rights of the US grew in a need for compliance, people become falsely fearful of what is dangerous and what is not. The US government ascertaining whether you are a terrorist is not a danger. An insurance company upping your fees by $150 through collected data is a direct danger (to your cost of living). Now we see the link as it gets us to the first story that included Greece.

There will soon be a higher need for localised connected providers. Localised forms of Hushmail (www.hushmail.com), where the people get encrypted mail accounts that can be accessed online, through the web. How long until mobile users will select encrypted android apps, that do not connect to Google, but to local Hushmail providers. We still have the internet, but it will now go through national portals. The fact that Sony happened was only a matter of time. The fact that people now want that there data comes with actual privacy is a growing wave. The Wikileaks issue was the most visible and the most harmless one (for us citizens at least). The world is changing a lot faster than last year and many are now getting clued in that the things of value have not been guarded in the right way.

We will soon see new options on cheaper internet, cheaper mobiles and on package deals, this is what was skated around when this so called IP hearing was going on. Yet, when we look at an earlier statement by Mr Turnbull, in regards to IP, who said at the time. “It is very, very, very difficult if not impossible for someone that is just selling connectivity, just providing bandwidth to then be monitoring what people are doing“.

This is at the heart of the problem, they live of bandwidth, because bandwidth implies data, and the more used, the more data collected, which leads to the better their lives are. This is why they do not want monitoring. I am fairly certain that as their bandwidth falls away, as people move to localised solutions, which remain at the core local, these providers will ‘suddenly’ opt in a ‘possible’ solution. Only at the end of the tether will an industrial give in. Oddly enough, with fear of privacy and the dangers of insurance exploitation on the rise that tether will end up a sudden two inches shorter and now those providers will have to share that what they never had to share before.

Greece has changed the way they play the game; now perhaps we can change the game that is played and make a first monumental change for all!

2 Comments

Filed under Finance, IT, Law, Media, Military, Politics

Pussy versus Tiger

This was my first assessment when I looked at the Guardian regarding the article ‘Barack Obama and David Cameron fail to see eye to eye on surveillance‘. (at http://www.theguardian.com/us-news/2015/jan/16/barack-obama-david-cameron-surveillance-terrorists). As we see America slump more and more into the weak excuse it is on an empty wallet, it must have been quite the surprise for Prime Minister David Cameron, to go to the ‘leader’ of the free world, hoping for a decent lamb chop (which you actually can only get in either Australia or New Zealand) and he ends up having dinner with someone who prefers Purina as a meal.

You see, I am not buying his ‘civil liberty’ approach for one second. In an age where Google is demanding more and more privileges to access your mobile data, where Google search gets transparently pushed into your android phone on top of your functions. In that era HE is proclaiming ‘civil liberties’?

Where we see Facebook where we would have to consent to allow access to our religious beliefs and that of our friends for access to a game. What is this, ‘Gaming for Catholics’? Here we see discord on what is needed to keep the citizens safe?

I particularly like this part “As Cameron warned the internet giants that they must do more to ensure they do not become platforms for terrorist communications, the US president said he welcomed the way in which civil liberties groups hold them to account by tapping them on the shoulder“, tapping on the shoulder? Yes, with Bing, Google, Amazon and Yahoo all in America, he definitely wants the power of collection to be ‘unhindered’ for now. There is of course the thought that President Obama has no control and it is Google and Microsoft telling Congress how it will be for now, which means unmonitored access.

That part is also a requirement to keep the financial sector running uncontrolled until it is too late (a point which might have passed already).

So, is this all rambling? Let us look into the evidence!

The first part comes from the Trans-Atlantic Consumer Dialogue (at http://www.consumersinternational.org/media/1396104/tacd-resolution-on-data-flows-in-the-transatlantic-trade-and-investmemt-partnership.pdf), an organisation not too visible, but it is loaded with high profile participants (at http://tacd.org/about-tacd/whos-who/), the PDF had nothing really new to tell me, but this part is important “The actual extent of these data collection practices, whether they were lawful, or the range of activities involving companies such as Google, Facebook, and Yahoo are still unclear. Until the new US and EU joint group of experts tasked with examining privacy in the light of the National Security Agency’s PRISM Internet data program and related disclosures makes a report to the respective governments and the public, it would be unwise for the negotiators to address data and e-commerce-related trade matters at all. The public on both sides of the Atlantic deserves a full and frank discussion of what actually transpired, and what policies or safeguards should be required as a consequence“. Even though we were confronted with the Snowden fiasco, the massive part that is kept silent is what non governments are collecting, they have been collecting data every second, of every minute of every key press you made these last few years. Data that is valued, without oversight. So ‘yes’, as I see it, the President (or the Democratic Party) is very likely getting told that with oversight, the fat checks will disappear.

This is at the heart of the matter, David Cameron (and several others) needs to keep their civilians safe, whilst as I see it, America is about the bottom dollar at the expense of everyone’s safety. Should you doubt the latter part then consider the next bit “US trade policy requires radical reform, not only to the flawed certification process, but also to the secrecy of trade negotiations in general, the lack of accountability to the public, and Fast Track proposals that insulate trade agreements even from the scrutiny of Congress itself“, which we get from Electronic Frontiers Australia. So, as we see the push for ‘free trade’, how can there be ‘free trade’ without civil liberty? It seems that in the US ‘free trade’ is synonymous with corporate trade, specifically the corporate trade of big business. So as we see that areas are drowning in corporate oversight (by the corporations), we see the term ‘civil liberties’ being cast in a voice to keep big business out of oversight. So, how does your Purina taste today Mr President?

Now the intelligent person will state, what has one thing to do with the other? How did we get from some data discussion to the TPP? This would indeed be a decent question and my answer is that it is all linked. You see, the big data collectors can only continue if it is unhindered by policy. Google’s fortune comes from the data of millions each day. So once the data starts getting holes as the rights of those from the UK, the Netherlands, Sweden, Germany and Australia are set to boundaries, the collected data will show holes, which means the value goes down by a lot. Over 30% of the internet has business, which lands roughly 40% of ALL profits in the hands of US firms. I am precise in my statement here, US Firms! Not US government or the IRS, just US firms who will syphon billions via Ireland and like-minded places where taxability is at 0.1% (or some other ridiculously low number). If this oversight changes, so will the profits dwindle to a much lower percentage, now suddenly it will be a fair game for internet companies on a global scale, which is NOT what the US wants at all.

When we consider “The prime minister adopted a harder stance on the need for big internet companies such as Facebook and Twitter to do more to cooperate with the surveillance of terror suspects“, that fear will hit many and suddenly there are more holes in the collected data, downgrading businesses, the economy and heaven forbid, the DOW Jones Index, hence kitty goes into ‘UCLA’ mode.

But many in Europe are now a lot more awake, the events in Paris did that, when an actual terror attack hits a place like Paris, people suddenly notice and their fear for their safety spring into action, which is counter-productive for these US firms (as the terror attack is not happening in the US), corporate greed takes a front seat on what needs to happen, all under the guise of ‘civil liberty’.

As the president came with “In a sign of the concern in the US at the threat posed by extremists in Europe and in Syria and Iran, the president said disfranchised Muslims were one of the greatest challenges faced by Europe. “It is important for Europe not to respond with a hammer with law enforcement,” Obama said at a press conference with Cameron as he contrasted the way in which US Muslims had integrated and regarded themselves as wholly American“, really? How did Americans react on September 12th 2001? They couldn’t get the DHS started fast enough! In addition, let’s take a look at the Guardian in 2012 (at http://www.theguardian.com/commentisfree/2012/dec/29/fbi-coordinated-crackdown-occupy), ‘Revealed: how the FBI coordinated the crackdown on Occupy‘. It seems that ‘civil liberties’ are not an issue, when profit (read: banks) are in play. If we accept the quote “The document – reproduced here in an easily searchable format – shows a terrifying network of coordinated DHS, FBI, police, regional fusion center, and private-sector activity so completely merged into one another that the monstrous whole is, in fact, one entity: in some cases, bearing a single name, the Domestic Security Alliance Council. And it reveals this merged entity to have one centrally planned, locally executed mission. The documents, in short, show the cops and DHS working for and with banks to target, arrest, and politically disable peaceful American citizens“, now apart from the Snowden issue, I regard the Guardian to be a good paper, this gives a clear view that ‘civil liberties’ is not an issue in the view of profit and in the view of those depending on thus stated profit.

So here we see the clearer view of Kitty (Oval Office) versus Tiger (10 Downing Street). David Cameron needs to get a handle on the terror fear which goes a lot further then ‘commercial interests’, he needs to actually address and deal with these fears, hence the need for data. In this matter he had to speak to the President, let’s face it, getting GCHQ to download Exabyte’s of data (whilst permission is pending), without a meeting first is just bad form. On the other hand we could ask that data set from North Korea, apparently that is where the top hackers are today (according to US officials).

 

Leave a comment

Filed under Finance, IT, Law, Media, Military, Politics

Exploiting mobile users

Is it not amazing that in an age, where we all move into areas where things getting cheaper and cheaper, we see that mobile phones is the one article that remains into the top priced push. Yes, when you move to the post office, or to some ‘budget’ place, the only ‘cheap’ phones are the ones that are the ones that are basically in the bottom part of functionality, phones that have less than 6 months of decent quality usage before Google pushes for more updates, more android and the applications will add towards the maximum RAM.

This is my situation, I got a new phone in 2012, I needed a new one, and the one I bought was ‘decently’ priced at $299. I never regretted buying it. It still has a good screen, I have one game and a few applications, yet over the last two months the push has shown that when I have more than 2 apps running (including the dialler) the lag, the jittery screen, it all starts getting slightly wobbly, so I lock the phone, unlock it, remove all apps except the one I need and it all works fine again. Yet, my phone needs replacing not due to the hardware, but purely due to software. Looking around has been quite the revelation.

Looking at those options, I see that the $99 phones are less and less useful (specifically the smartphones). So as I started to dig, I am seeing a new change. If you want to find the price of a phone, it is often harder and harder to get clear pricing, more important, we can find less and less about how prices were and how the prices devolve.

Is it not strange that there is such an abundance of buy now places, but less and less information on the devices, the price and how long these articles are set to be for? The mobile is the new field for the technological armistice race and there are too many parties willing to make certain that the people cannot be properly informed. You see, this field has evolved for control. In the 90’s and the decade after that, it was relatively simple to get information on what graphic card one needed, which soundcard would be best. But not unlike the gaming industry, the information places are given less and less information. Is it not strange that Ubisoft (a gaming company) did not give a testing sample of Assassins Creed Unity weeks in advance? Especially when literally billions are riding on it? This is at the core of the issue, at the core of some ‘technology’ pages that are less and less information, more and more ‘typed’ marketing, not for their readers, but for the prospective buyers of the product. The media has been changing more and more and many readers remained asleep whilst reading. I must admit that the last description might not be accurate. Many will not realise this faltering until they are confronted with the fact of change (not unlike me).

If you’re looking for a console you can Google ‘PS4 price console’ and you will get pricing information on the very first page, even price drops, all localised. For mobiles it is a jungle out there and no matter how many ‘suddenly’ appear, when you want to look for that actual good deal (like the ZTE ZMAX) you will suddenly find that no one has such a good deal in stock (finding a decent site is also a challenge). They have cheaper (ad therefor useless) smartphones (I will dwell on that shortly) and of course the really ‘up to date ones’ which are not that much better than a ZTE, but will cost you 275% – 450% more. It is all about the money in the end!

You see those who choose Android (like me), will now learn what the cost of alleged abandonment is. (at http://www.zdnet.com/article/google-stops-providing-patches-for-pre-kitkat-webview-abandons-930m-users/), we saw early this week that Google is now stopping the update of the older versions. This means that as we see the headline ‘Google stops providing patches for pre-KitKat WebView, abandons 930 million users‘. This includes the bulk of the people who bought their mobile before Q4 2013. What a fine android web we weave!

You would think that it is a simple matter for updating, don’t you. Well that is not entirely correct. In my case Motorola was pretty decent in giving the information, however, when I press system update, it tells me that I am up to date, so I cannot get beyond 4.1.2 Android. This is now at the heart of several problems.

Who knows what version they are on and more important, when we consider the following text from ZDNet “In other words, the next time a researcher or hacker finds a way to exploit WebView on pre-KitKat Android, Google won’t create a patch for the vulnerability itself. However, if anyone else builds one, Google will incorporate those patches into the Android Open Source Project code“, more important, as long as this is not fixed, an increasing population will be at the mercy of forced upgrades through buying new phones outright, or chaining themselves to a new contract.

There are two sides. In fairness, should Google keep on fixing their ‘flaws’ ad infinitum? Yet on the other side, if my 2 year old mobile is now a security risk, what on earth am I paying for? More important, in this economy we would keep on paying premium just to be connected? The math does not balance out towards the need of the user. So are we witnessing a start from smartphone, back to normal phones? Let’s face it if smartphones are charged to your account and after that abandoned to this extent, what should we do?

Some will push for Apple, but there to some extent, the danger is changed, not necessarily removed. A normal phone will less likely have these issues, or change to the new player. Even though the brand leaves (from past events) a bitter taste in my month, Samsung has taken a new direction with their mobiles called Tizen OS. The following parts are known at present “It is Linux-based platform built from Nokia and Intel’s ditched MeeGo“, open source means many views, so perhaps better patches. The fact that it is Linux based is not bad either. The fact that Tizen is using HTML5, it means that we will get a wave of content that is state of the art, slim and memory efficient (no flash needed). You can look for yourself to some results (at http://www.creativebloq.com/web-design/examples-of-html-1233547), so it seems that the new road that Samsung is taking is also changing the perception that they are getting. From these upgrades, Samsung could evolve from ‘player’ to ‘top contender’. It will definitely bring the fire to the ankles of Apple, which is never a bad idea.

Tizen is not new or just a gimmick, it had been announced before and more important, it has been in development for years, yet with the Google decisions and with the issues that mobile users might be facing sooner rather than later, the timing for Tizen is pretty good and Samsung could benefit greatly, they will get additional benefit as people realise that patches are no longer coming for their less new mobiles, which will hurt consumer confidence.

If you have any doubts then the clarity from Greenbot.com should help. “Google drops Lollipop on November 3rd 2014,  if you have the right device“, which makes us wonder, do I have the right device? “Maybe you don’t have a Nexus phone or tablet. Well, then the situation gets a little murky. If you have a phone purchased in the last year, odds are good that you’ll get an upgrade to Lollipop…eventually“, which gets us, what if your phone is older than one year? Then what? Which gets us the last part “Manufacturers like Samsung, LG, HTC, and Motorola have promised swift updates (typically within 90 days of release) for top devices, but those have to go to carriers to be tested before release, too“, knowing I am ‘up to date’ with my version ‘4.1.2.’ does not inspire confidence! How many people asked questions about versions of Android when they bought their phone? I am a technologist and I never gave it too much thought (other than that I wanted an Android phone). Now, it seems that my Motorola is will remain on Jelly Beans (4.1.2) and now, we have ourselves a ball game, because as this unbalanced approach is pushed from both the desire to remain free (not chained to a provider) and as the life cycle of a mobile phone is now in danger of staying under two years due to the Google changes, we now see the need to not just chastise Google, but to make it clear (actually demand) that consumers are properly informed on the limitations that they are buying at $300, if we regard that patching is done to undue the lacking security of a product sold, we get a new game where the consumer must be informed clearly in a shop regarding the purchase they make.

A costly jump that might not have been needed! This year will bring changes to the mobiles and the shops selling them, I wonder if Google considered that, or perhaps they never cared. Especially when the people get told that they will not face any issues, if they had a Nexus phone (Google’s mobile). Samsung is not without options either, as they progress towards ownership of Blackberry, they might drill into a new mobile market that revolves around data and communication security, which is another mobile hot potato, and it instantly gets them huge chunks of the financial sector for reasons not here speculated! Tactically both Google and Samsung have made brilliant moves, for the consumers not the worst move but likely a costly one this year!

Will you remain in a Google mind or move to Tizen?

Will Eva choose to try the Apple in the end?

Time will tell!

 

1 Comment

Filed under Finance, IT, Media, Politics, Science

Comprehension

Yesterday has been a weird day for France, unlike here in Sydney; they had their dealings with terrorists. You see, I remain in the mindset that what happened in martin Place last month was a crazy person with a gun, the fact that he was a Muslim makes little difference. He was a mental health case with deadly intent, it got him killed, but only after he killed some of his victims. France is an entirely different kettle of fish. Here is the YouTube link:  https://www.youtube.com/watch?v=LBGVwZyXYlQ (in French with English subtitles), I normally would not add something like this, but it is important to see the difference. This is not some hostage situation asking for a flag, this is almost military precision, it is direct, clean (pardon the expression), kill and get out! A policeman was on the scene and was executed without any consideration.

Here you see directly what Israel has faced on a daily basis; this is what the direct hatred of Jews looks like. Even though this is against a satirical cartoonist, the hatred of these extremists’ remains the same. The Guardian has an article by Jonathan Freedland that covers several parts of what bothers me. The article ‘Charlie Hebdo: first they came for the cartoonists, then they came for the Jews‘ (at http://www.theguardian.com/commentisfree/2015/jan/09/charlie-hebdo-cartoonists-paris-killers-fascist-death-cult) gives us a few views. The quote: “They hated the cartoons, we say. Free speech was the target, we declare. They wanted to silence satire and gag dissent“, this was not unlike my view. I find satire enjoyable, but when you touch religion (any religion), some people tend to get a little off the balanced sane side. Some get abusive, some get a little violent, yet as far as I know, none will act to this degree (although opposites in the India – Pakistan debates might not agree with me). No matter what I think or believe, Charlie Hebdo was in a place with free speech and he was entitled to it. The best comparison I heard was from an American Journalist describing Charlie Hebdo as the French version of ‘the Onion’.

When we see the following two quotes we get to the real stuff: “Then on Friday, a siege at a kosher supermarket, four hostages confirmed dead, the murderers apparently linked to those behind Wednesday’s carnage” and “Perhaps the murderers are bent on killing people not only for what they do, but for who they are“, this is at the centre of a lot of issues behind the objections against allowing Palestine into the UN and other places. I and many others have no hatred for Palestinians however, we will not accept Hamas to be allowed at any table for the terrorist organisation that they are. And so long as Palestine will not disavow Hamas and as long as Hamas calls the shots, there is no future for Palestine as I see it. This is at the heart of the matter, so when you think of these poor poor Palestinians, watch the uncensored shooting in Paris and now realise that this is what Israel faced for many years now, with added rockets and nail bombs!

The next part is actually at the centre to what we tend to feel and also how our civilised minds should be feeling. “For Muslims, that has meant spelling out that these killers speak only for themselves. Note the speed with which a delegation of 20 imams visited the Charlie Hebdo offices, branding the gunmen “criminals, barbarians, satans” and, crucially, “not Muslims”“, this makes sense in regards to the next part “Of course they should not have to do it. The finger-wagging demand that Muslims condemn acts of terror committed by jihadist cultists is odious: it tacitly assumes that Muslims support such horror unless they explicitly say otherwise“, this makes sense. Perhaps we all remember the atrocities of the Ku Klux Klan (KKK) and white power groups against African Americans. We distance ourselves as Christians, because their acts are not those of Christians at all. They are at the centre of some agenda of hate that the boggles the usual civilised mind. Some cannot grasp the small mindedness of it. Yes, we all hate at times and we hate enough to kill, maim or harm, but that comes in defence of a rational against us, or our family when it is harmed. To blatantly hate is not within our power (it should not be), I will go one further, children when they are born do not have the capacity to hate; it is the one dark side that gets taught to us, which makes it so inexplicable to some.

Now we get to the parts that I do not completely agree with (even though what is stated is not wrong) “Wednesday’s deaths brought a loud chorus insisting that Charlie Hebdo was vulnerable because it had been left out on a limb. That was down, they said, to the cowardice of the rest of the press, lacking the guts to do what the French magazine had done“. The press has been many things (cowardly to some extent as well), when the press (globally generically speaking) started to cater to advertisers and circulation, many papers started to cater to the emotional reader “Flight MH370 ‘suicide mission’” (The Daily Telegraph, March 2014) and “Death Cult CBD Attack” (The Daily Telegraph, December 2014). It is only one of several papers, the public gets misinformed too often, too much innuendo. “Andrew and the under-age ‘sex slave’” from The Daily Mail, implying the Duke of York is just the most recent of revenue claiming headlines. When you rely on income in this way, we see the newspapers as they no longer are, they are no longer informing the people, hopefully setting their minds to a more informed stable position, we are left with groups of people getting angry on implied innuendo. It makes for revenue (but becomes non-informative). So how about we make it a little more clear? How about tax offices change that glossy magazines are not tax deductible as they do not qualify as ‘researchable materials’? The ATO states “Newspapers and magazines, you can claim a deduction for that part of the cost of newspapers and magazines that relates to your using them in researching a topic as an employee journalist“. When we remove glossy magazines and add the Daily Telegraph and sort minded groups on that list, perhaps they will clean up their act?

So as non-violent Muslims fear repercussions for emotional responses, we in general have a duty to shield them, but in my mind we have an equal need to hunt down these extremists. We need to become a lot less tolerant of hate crimes like we are seeing in Paris this week, but they must be held against the real threat, not the threat that some papers perceive to instil. So this is where my view slightly differed from Jonathan Freedland. The French issue should wake us up in other ways too. Not only should we regard the hate attacks Israel has been under for a long time, we need to notice that walk softly and ‘try to reason’ will not work. The policeman had little option but to talk the man into not shooting him, it did not work! I feel for his family, and for the family of other victims, but you all need to wake up now, terrorists are real, they are not some deranged Sheik with delusions of grandeur wanting a ‘Shadada’ flag in a chocolate shop. They are people with guns, with a tactical mind that tells them to kill that what they hate without hesitation or remorse, so as you keep on crying on ‘your’ privacy, whilst posting your ‘nightly’ achievements on Facebook, remember that limiting those who hunt these extremists, might get you or someone you know killed at some point.

Yet Jonathan’s gem is at the very end “Theirs is a dirty little war, a handful of wicked fanatics against the rest of us. And they must lose“, I could not have said it better myself, but with that comprehension comes a change to all our minds, not to our hearts! Our hearts must never embrace the acts and the violence needed; our minds must however accept that some need to do what they do to stop these people, preferably before innocent lives are lost. It must happen everywhere and it needed to start yesterday. So, as you ponder these ‘lost souls’ as they go Jihad in Syria, then also quickly realise that these people come back with the skill, the intent and the reasoning of the extremists that you saw in the YouTube video, so if you are a parent and you wave your hand to your little boy or girl as they go to school, you should realise that they might leave the house the last time that day. What are you willing to do to keep them safe?

I am not trying to quell you into emotion like the press so often does; I need you to comprehend what must be done by professionals to keep you and your family safe. Think it through and cast your vote! You need not act, you are not trained and not qualified to suddenly emotionally react to these extremists. Only the calm mind will know what to do and they must be given the option to win and to make sure that extremists lose, or we lose it all!

Leave a comment

Filed under IT, Law, Military, Politics

Authentically Realistic

Whilst we see many sources talk about the need of blaming North Korea, we see an abundance of changes that are now not just changing the way we think, but these changes will also change the way we live and act. As we are soon to be lulled into more false sense of security, we must now content with the thought, what is real and what is not.

In IT these issues have existed on several layers for a long time, yet the overall lack of Common Cyber Sense has been absent for a massive amount of time. Bradley Edward Manning, now known as Chelsea Manning is only one of several parts of this puzzle. Wikileaks has added its own levels of damage and let us not forget the acts of Julian Assange and Edward Snowden. This is not on how things were done; it is about a lack of proper measures and controls. In the age of people screaming that they have a right to know, they will publish whatever they can for the need of ego and then scream on how the government is abusing their right to privacy.

These are all elements that link back to ‘Common Cyber Sense’.

CCS as I call it has in its foundations a few branches. The first is proper use and knowledge. Many still laugh and sneer at manuals and proper use of equipment, yet when other people started to ‘look’ through their webcams on laptops into their privacy, smiles disappeared quickly. We live in an age where everything is set around the fake image of comfort, it is fake because comfort at the expense of security is never comfort, it is just an added level of danger into your own life. At this point people forget that what is set into software, can usually be switched on and off at the leisure of a skilled ‘someone else’.

Buying what is cheap and what is right are worlds apart, that part is more and more a given fact. The bulk of people are lulled into ignoration when it comes to a simple easy tool that can be used everywhere, at which time they forget to ask ‘by everyone?’. Consider the HP laptop (one of many brands) has a build in webcam at the top of the screen, instead of relying on a software switch, these makers could have added a little slide that covers the lens, literally a low-tech solution making the lens see nothing, as far as I can tell, no one took that precaution for the safety and security of the consumer, is that not nice?

The second branch is access. If I got $.50 for every person that uses their name, ‘qwerty’ or ‘password’ or even ‘abc123’ for their login, I could buy a small Island like Hawaii or New Zealand, probably even both. Even though many websites and systems demand stronger passwords, there is always that bright person who uses the same password for every site. This is part of a larger problem, but let’s move on for now.

Third is the connection branch, places where we can ALWAYS connect! You think that not having passwords on your home Wi-Fi makes you safe? Wrong! You could add loads of problems on every device that connects to it by not properly setting things up. I wonder if those with an automotive router have considered the dangers of not setting it up properly and letting all the people they pass access to whatever is connected to it in the car.

The fourth branch is for the unknown. This might seem like a weird option, but consider how fast movable technology is growing, I am using ‘movable’ and not mobile, because this changing field includes phones, laptops, PDA’s, tablets and other not yet defined devices (like the apple watch, handheld game systems and consoles).

At the centre of all this is proper usage, but not just your hardware, it also includes your software, a fact many have remained oblivious to.

At this point, I will take a temporary sidestep and let you consider the following term ‘non-repudiation’.

Non-repudiation is about identity and authentication. Basically it states, ‘you and you alone‘ have sent this item (message, photo, financial transfer). In legal reasoning this will be the strong shift that will most likely hit many people in 2016 and onwards, it could hit you this year, but there are more than just a few issues with this situation for the immediate now. So when you lose your money and you state you were hacked, then you might soon have to prove it, which means that any evidence that you EVER gave your password or pin-code to a spouse, lover, boy/girl friend or sibling means that you nullified your rights. You get to pay for the consequences of THEIR acts at that point.

So when we see biometrics, we think fingerprint, we expect to be a lot safer. WRONG! Only last month did a group in Germany show how they recreated the finger print of the German Defence minister from simple digital photos, which means that this could have given them access to a whole collection of items, events and information they should not have gotten access to. So what to do? Well, that market is growing really fast. ‘Vein’ is the latest. It does not rely on fingerprint, but on the veins in a finger or hand, it is just as unique as a fingerprint, it is a 3d issue, making it even more secure and it requires an actual living hand. It also will lack the dangers of influence that a retinal scan has when a woman gets pregnant, or in case of a diabetes patient or alcohol levels. These all can shift retinal scans, with the added problem that this person stays outside the lock, becoming the valid person ‘no-more’. Yet, ‘Vein’ is still a new technology and not currently (or in the near future) available for movable devices, which gives us the issue on what devices are actually decently secure.

Let’s not forget, that even though this is not an immediate issue, the people will need to change their possible ‘lacking’ approach with more than just slow muffled interest, whilst they rely on the comfort of not having to comprehend the technology. That part is still not completely disregarded in several cases, the issue at Sony being likely the most visible one for some time to come. There is still a massive amount of actual intelligence missing. Most speculate, including me (yet I have been looking at these speculators and claimers of facts). Whilst Sony is visible, there are still unanswered issues regarding the NSA and how a place like that had the implied intrusion Edward Snowden claimed to have made.

Now let us take a step back to the four branches. I showed the webcam issue in the first branch, but the lack of consideration by the user is often a bigger problem. You see, many ‘lock’ their device, or just walk away and switch their screen off. Their computer remains connected and remains accessible to whoever is looking for a place to hack. I know that waiting 45 seconds is a bother at times, but learn to shut down your computer. A system that is switched off cannot get hacked, the same applies to your router (which actually has the added benefit of letting your adapter cool down, making the device last longer) and your overall electricity bill goes down too, all these benefits, all neglected for the fake comfort of accessing your social media the second you come home. Yet proper usage also includes software upgrades. Many do them, but more often than not, they tend to be made when the system reboots, when this is not done (or the software upgrades are not made) your system becomes increasingly at risk for intrusions of all kinds. Windows 7, which is a lot better than either Vista or Windows 8, still required 84 patches in 2014. With over half a dozen being either critical or important, you see why even in the best of times, under all conditions met, you still run some risk. And this is just Windows; in 2013 they had to fix 47 vulnerabilities regarding Outlook, explorer and the Windows kernel. There was a massive issue with remote execution, which means that your system was open to the outside without the need for a login (source: PCWorld). Now, to their defence, Windows and office are massive programs, but still, it seems that Microsoft (not just them) have taken a strong stride towards ‘comfort’ whilst ignoring ‘safety’ (to some extent).

Branch two is usually the biggest flaw. Even though many websites will require a decent level of strength (usage of small and capital letters, numbers and a special character), but that list is still way too small. The amount of people that I have met that use the lamest of simple words (like ‘abc123’) and these people cry the loudest when their money is gone. You see, it is easier to just hack your computer or device and use that system to order online via other means then it is to hack into your bank account. Yes, it is a bother (at times) to remember every password, yet in that regard you could be clever about it too. There is nothing stopping you from creating variations on a password whilst making sure it is a completely different one. I learned that someone had used her dictionary app to use a version of word of the day, she changed ‘adscititious’ into something like ‘Adsc1t!tious’. Good luck figuring that one out! (I had to look up the word in all honesty), the options become even more interesting if you speak additional languages. So, branch two is something that you the user largely control.

Branch three is actually the growing danger. It is not just when we connect, but when things connect automatically that becomes an issue (and where from). Insurance companies are more and more about your visibility, even though no official moves have been made, the day that junior uploads that catch of the day to his Facebook with dad in the background. That is the option for the members from the ‘institute of discrete entry and removal operations’ to help you with your old stuff (the missing items when you get home). The information you ‘give’ when you connect (especially on free Wi-Fi places), you see, when you connect to free Wi-Fi, more than one danger exists that others can connect to you, yes, you could learn that free Wi-Fi was the most expensive part of your vacation soon thereafter. It however moves more and more to your area of usage. As we get more connections and as we can connect from more places (like the automotive router), we will receive additional responsibilities in setting devices up properly for our safety and the safety of our children.

Now, to take a second sidestep. This is not about scaring you (a nice benefit for sure), some of these things can be prevented from point zero. Knowing what you switch off, switching off when not used are first easy and elemental steps. You see, a hacker looks for a place to get into, when your computer and router are switched off, the hacker will not spot these devices at all and move on. Hackers do not like to waste time, so when you use proper passwords, that same hacker will lose a lot of time getting access to your devices, time he could be having ‘fun’, so these two elements are already diminishing the chance of you getting transgressed upon. But in the end, there is another side. Makers of hardware and software need to become increasingly aware that their ‘toys’ have malicious usage. It was Geek.com that had the article ‘Yes, Xbox One Kinect can see you through your clothes‘ (at http://www.geek.com/games/yes-xbox-one-kinect-can-see-you-through-your-clothes-1576752/), which gives an interesting demo (without showing off anything indecent) how defined and articulate the scan system worked and it is a hackable solution, even there we see the mention that a lens cover would not have been a bad idea.

Yet we have digressed away from the heart of the matter. All these are linked, but the crown in the hardware is an increasing need for non-repudiation, showing that you and only you acted. A lack of this evidence could also go a long way in proving that you were innocent and that you were the victim. It is easy to claim that the makers are at fault and to some degree they are, but there is a growing need to have the right solution, and so far having any clean solution remains absent, whomever comes up with that could own the cornerstone of the global technology sector, an area that represents a massive amount of long term revenue.

 

Leave a comment

Filed under IT, Law

Slander versus Speculation

There is a lot wrong in this world, we cannot disagree with that. Soon we might see rental prices go down in London, because of Superman (the New Ecstasy), yay to those needing an apartment, being free of drugs was never so nicely rewarded! So is this speculation, or slander?

We could debate my sense in taste (many have for decades), yet in the firm juridical ground, when can speculation be regarded as slander?

That part is more and more a question when we consider the US sanctions against North Korea. Oh, and perhaps we forgot to mention that Sony Is a Japanese firm (even though the crime was on US soil), giving additional spotlights to the reasoning of certain actions. Consider the following sources. First let’s take the BBC (at http://www.bbc.com/news/world-us-canada-30661973). Here we see sanctions against organisations and individuals. First there is “Jang Song Chol: Named by the US Treasury as a Komid representative in Russia and a government official“, then there is “Kim Yong Chol: An official of the North Korean government, according to the US, and a Komid representative in Iran” and last there is “Ryu Jin and Kang Ryong: Komid officials and members of the North Korean government who are operating in Syria, according to the US“. Now the article ends with the most hilarious of all quotes “White House officials told reporters the move was in response to the Sony hack, but the targets of the sanctions were not directly involved“.

So the White House is within this part confessing to the breach where they are targeting innocent civilians (of that crime at least)? Can anyone explain to me how this is anything less than legalised slander? Consider that if (not when, but if) they ever figure out who exactly was responsible for the Sony hack (the actual individuals involved), how the US government could be held responsible in any court of law for this. Consider this part (source was the APA of all places, at http://www.apa.org/about/gr/issues/violence/hate-crimes-faq.pdf). “Current federal law defines hate crimes as any felony or crime of violence that manifests prejudice based on “race, colour, religion, or national origin” (18 U.S.C. §245). Hate crimes can be understood as criminal conduct motivated in whole or in part by a negative opinion or attitude toward a group of persons. Hate crimes involve a specific aspect of the victim’s identity (e.g., race)“. If we clinically look at the facts, then these acts are a hate crime against North Korea.

Now, let’s be fair as well. Most will not care, I reckon that the North Koreans might not even care, but this act does remain a legal transgression!

Let me show you why (because without reason, there is nothing), part one is found in yesterday’s news in the Guardian (at http://www.theguardian.com/technology/2015/jan/02/sony-hackers-may-still-access-computer-systems-the-interview).

Here we see the following parts:

  1. Sony Entertainment is unable to confirm that hackers have been eradicated from its computer systems more than a month after the film studio was hit by a debilitating cyber-attack, a report says

So not only has the hack occurred, it is very possible that the transgression and the damage is currently still ongoing, in addition, one of the most watched and scrutinised nations is still accessing Sony? Not one press agency is asking the questions that matter. For example, there was some visible Press Tour into North Korea (must have been around when Kim Jong-Un was elected big boss in 2011), when we saw some of the filmed events there, we saw North Korean officials in total disbelieve that a smartphone could take photographs and these people walked over Sony’s cyber security?

Now we get to the Chief Executive of Sony himself, his quote gets us the following:

  1. “It took me 24 or 36 hours to fully understand that this was not something we were going to be able to recover from in the next week or two,” Lynton told the Wall Street Journal

So this was not a mere grab for data, this is a system paralyses of sizeable renown, the hack was so complete, high paid executives could not get their minds around the events. So, are we still looking at North Korea? Basically this requires an evolved form of ‘stuxnet’, the hack was seemingly more complete then the stuxnet virus could achieve. We now have only three players left. Russia, China and whatever hacking organisation walks around within the US and its allied nations. How is North Korea anything else but a mere puppet for slander? Whilst some people are possibly hiding their lack of skills, and likely other people linked to all this are trying to cover up issues that have been ignored ever since the first hack of 2011 (the Sony PSN hack). By the way, I am using stuxnet as a comparison, I have zero knowledge how the transgressions was done, but we can all agree it was way beyond a normal level of sophistication.

Yes there is another scenario and I will get to that soon, North Korea is not off the hook yet!

You see we have been looking at the event, but not at the capital involvement that is two tiered at present.

  1. Sony’s network is expected to be fully operational within the next two months but hackers have so far released only a tiny fraction of the 100 terabytes of data they claim to have stolen“, so not only will it take months to repair security measures, the fact that the new fences are there are still no guarantee that the data remains safe.

When gets us to the first tier. Data! Someone streamed 100 Tb, which is more than just a number; it would require every PlayStation 3 on the planet to download up to 2Mb. The fact that this is not monitored, or that is got through to this extent, is a first view that this was no mere trifle event. And even though 100,000 Gigabytes seems small when compared to the PSN issues, it becomes interesting when we consider that the PSN had been hit more than once, but as those members did not all download, where did all this data get syphoned to?

Now we get to the one part that might be regarded as tier two. You see, it is not just the amount taken, which takes a good server park to store, it goes back to issues I discussed in regards to piracy and the parts I mentioned in my blog ‘For our spies only!‘ on September 26th 2014. There I stated “in the end this is NOT about copyright, this is about bandwidth“, the big players all knew it and they were all very concerned if such events would start to get measured and logged. Now someone casually walked away with 100,000 gigabytes of data?

Before I restate, it was not North Korea, let us take a look at another article by the Guardian in that regard. The title is ‘North Korea may have hired outside hackers for Sony attack, says US‘ (at http://www.theguardian.com/world/2014/dec/30/north-korea-hackers-sony-pictures-cyber-attack) and it was written on December 30th. Now we must consider the following: “US investigators believe that North Korea most likely hired hackers from outside the country to help with last month’s cyber-attack against Sony Pictures, an official close to the investigation has said“. The operative word is ‘believe‘, they just do not know. As a speculation that would be my guess as North Korea does not have the skill needed for this, not even close. By the way, those hackers might want to get paid, how will North Korea do that, or perhaps that is beyond US oversight too, because it would be a sizeable amount for something this complete.

The next part is the part that opens the discussion ““The FBI has concluded the government of North Korea is responsible for the theft and destruction of data on the network of Sony Pictures Entertainment,” it said in a statement“. The first question: What evidence?  As stated before, North Korea is lacking in many ways, the fact that they hacked past Sony to this extent, whilst at present no guarantee can be given that the systems are secure at all, whilst North Korea has been watched 24:7 for a long time now gives rise to the demand of evidence showing the guilt of North Korea. So, they are seemingly better than the cyber divisions of both Russia and China? I am not buying it, in addition, the fact that the article implies that outside help was engaged for a hack this thorough leaves us with two thoughts.

  1. If true, where is the real balance of power in cyberspace, because this now implies that North Korea is a real player, even though no one (including people a lot more intelligent than me) have concurred that North Korea does not count when it comes to the internet and cyberspace.
  2. If false, what incompetence is the US hiding from us all and is that not the true crime?

Consider this quote (from the Guardian article too): “Some private security experts have begun to question whether Pyongyang was behind the Sony cyber-attack at all. The consulting firm Taia Global said the results of a linguistic analysis of communications from the suspected hackers suggested they were more likely to come from Russia than North Korea. The cyber security firm Norse said it suspected a Sony insider might have helped launch the attack

I cannot disagree with Taia Global, as this could be Russia hitting back at US sanctions, but that would be speculation on my side, I also very much agree with Norse. Consider that if someone walks into a bank vault and it is empty. There was no sign of break in, the doors were not forced. At this point the police and the FBI will initially look at ‘the insider’ plot. It makes perfect sense. To get past the Sony server parks to this degree someone was giving aid in some way. Initial passwords, the network structure, because if that was not the case there would be a lot more logging evidence to giver clear view whether North Korea was guilty (or not involved).

Mark Rasch hits the nail on the head with this quote ““I think the government acted prematurely in announcing unequivocally that it was North Korea before the investigation was complete,” said Mark Rasch, a former federal cybercrime prosecutor. “There are many theories about who did it and how they did it. The government has to be pursuing all of them.”” there is the crux, the mention of theries on who did it. Even if it is outside help, Russia would still make more sense, the Russian Mafia could be the front for cashing in on selling the data, they pay commission to the people ‘hurt’ through US sanctions, they are looking at the least likely suspect because of a comedy, one that I (and many others) had not even heard of before these events.

It is the last quote that is food for thought from Kevin Mandia of Mandiant “Mandia, who has supervised investigations into some of the world’s biggest cyber-attacks, said the Sony case was unprecedented. “Nobody expected when somebody breaks in to absolutely destroy all your data, or try to anyway, and that’s just something that no one else has seen,” he said

That part is not entirely true, I remember the DBase virus of 1988, I remember some people who had fallen victim to them, a garble parser that does not show until the virus is removed, it leaves your data garbled from that point forward. There was also a data virus in the 80’s. I forgot the specifics, but whilst most viruses would attack ‘.com’ and ‘.exe’ files, this one would attack data files, until that day a truly scary moment. So, it is not entirely unprecedented. Consider, if you copy someone’s data, the best sale is to sell it to the competitors, yet, what happens if the owner no longer has that data, does that not drive up the price? Yet, it is bad tactics, to copy in secret and resell it all makes perfect sense, the fact that these events happened, whilst Sony IT, the Cyber divisions of the FBI and others are not able to track the events is something very novel. It is a first to this degree, do you now understand why it makes no sense to accuse the one nation where we see this as their highlight: “Aug 6, 2013 – North Koreans hungry for tech skills are buying up used desktops on the black market, these desktops smuggled in from China have become a much sought-after item in North Korea“, this is the nation that thwarted one of the biggest cyber power players?

People please wake up. The question becomes what was real? I call my version insightful speculation. I have been involved in IT since the 80’s, this level of hacking requires serious system skills with in depth knowledge of all layer one components (hardware layer), if we ignore the inside job part, this takes North Korea out of the loop, it also removes a massive amount of hackers of the table too. It requires the skills we would require to see from people at the NSA and other high tiered cyber firms. From these facts I come to three options:

  1. The hackers are a new level of hacker with the ability to get past the security of nearly any large firm and government data system.
  2. Sony has been criminally negligent and the US is willing to ‘aid’ this Japanese firm for a price.
  3. A simple inside job (possibly even a disgruntled employee) with links to organised crime.

Please feel free to give me a valid fourth alternative.

 

1 Comment

Filed under Finance, IT, Law, Media, Military, Politics

Last Clooney of the year

My idea of stopping my writing until the new year has truly been bombarded into a sense of that what is not meant to be, so back to the keyboard I go. One reason is the article ‘‘Nobody stood up’: George Clooney attacks media and Hollywood over Sony hack fallout’ (at http://www.theguardian.com/film/2014/dec/19/george-clooney-sony-pictures-hack-the-interview), which I missed until this morning. So has the actor from ER become this outspoken because of his marriage to Human rights lawyer Amal Alamuddin? Nah! That would be incorrect, he has been the champion of major causes for a long time, outspoken, thinking through and definitely a clever cookie with a passion for Nespresso!

The article kicks off with a massive strike towards to goal of any opponent “George Clooney has spoken of his frustrations with the press and his Hollywood peers at failing to contain the scandal around The Interview, which Sony has pulled from cinema release as well as home-video formats“. It goes a lot deeper then he spoke it does, perhaps he fathomed the same issues I have had for some time now, some mentioned in my previous blog ‘When movies fall short‘ (at https://lawlordtobe.com/2014/12/15/when-movies-fall-short/), two weeks ago.

I will take it one-step further, several players (not just Sony) have been skating at the edge of competence for some time now, as I see it, they preferred contribution (revenue minus costs) regarding issues of security. It remains debatable whether this was intentional or just plain short-sightedness, that call requires levels of evidence I have no access to.

By the way, Mr. Clooney, you do realise that this topic has the making of an excellent movie, not unlike the largely unnoticed gem ‘Margin Call‘ with Kevin Spacey, Paul Bettany and Zachary Quinto.

The one quote I object to (to some extent) is “With just a little bit of work, you could have found out that it wasn’t just probably North Korea; it was North Korea … It’s a serious moment in time that needs to be addressed seriously, as opposed to frivolously”. You see, the inside job is a much more likely part. Yes, perhaps it was North Korea (requiring evidence), yet this would still not be the success they proclaim it to be without the inside information from disgruntled (or greedy) employees. In addition to the faltering security Sony has needed to ‘apologise’ for twice now (the Sony PSN hack of 2011), none of which was correctly covered by the press regarding this instance either. There was the press gap of November 2013, so we have at least two events where the press catered with silence, but at the price (read: reward) of….?

Yet the part: “He joins others who voiced their dismay at Sony’s decision, including Stephen King, Judd Apatow and Aaron Sorkin. Rob Lowe, who has a small role in The Interview, compared Sony to British prime minister Neville Chamberlain and his capitulation to Nazi Germany before the second world war“, is more than just a simple truth, it shows a fear of venue, cater to the profit. Chamberlain was from the old era and he failed to perceive the evil that Adolf Hitler always was. That view was partially shown by Maggie Smith in ‘Tea with Mussolini‘ too, yet the opposite was strongly shown in Remains of the Day, when Christopher Reeve as Jack Lewis states: “You are, all of you, amateurs. And international affairs should never be run by gentlemen amateurs. Do you have any idea of what sort of place the world is becoming all around you? The days when you could just act out of your noble instincts, are over. Europe has become the arena of realpolitik, the politics of reality. If you like: real politics. What you need is not gentlemen politicians, but real ones. You need professionals to run your affairs, or you’re headed for disaster!

This hits the Sony issue straight on the head. Not that the Gigabytes of data are gone, but that they got access to this data at all. IT requires a new level of professionals and innovator, a lesson that is yet to be learned by those having collected Exabyte’s of data. It is a currency that is up for the taking with the current wave of executives that seem to lack comprehension of this currency. Almost like the 75-year-old banker who is introduced to a bitcoin, wondering where the gold equivalent is kept. The new order will be about IP, Data and keeping both safe. So, it is very much like the old Chamberlain and Hitler equation, we can see Chamberlain, but we cannot identify the new Hitler because he/she is a virtual presentation of an identity somewhere else. Likely, a person in multiple locations, a new concept not yet defined in Criminal Law either, so these people will get away with it for some time to come.

Yet the final part also has bearing “Clooney was one of the Hollywood stars embarrassed by emails being leaked as part of the hack. Conversations between him and Sony executives showed his anxiety over the middling reception for his film The Monuments Men, with Clooney writing: “I fear I’ve let you all down. Not my intention. I apologize. I’ve just lost touch … Who knew? Sorry. I won’t do it again.”“, personally he had no reason to be embarrassed, when your boss spills the beans (unable to prevent security), do you blame the man or the system that is this flawed?

Why has it bearing? Simple, he shows to be a man who fights and sometimes fails. He states to do better, just as any real sincere person would be, a real man! By the way, since 2011 Sony still has to show such levels of improvement. A lacking view from the people George Clooney served in a project, so we should not ignore the need to look at those behind the screens and the press should take a real hard look at what they report and on where their sources are, that same press that has not scrutinised its sources for some time. When was the last time we asked the press to vouch for ‘sources told us‘?

Consider the quote “We cannot be told we can’t see something by Kim Jong-un, of all fucking people … we have allowed North Korea to dictate content, and that is just insane“. As I mentioned in the previous blog, with the bulk of the intelligence community keeping their eyes on North Korea, why is there no clear evidence that North Korea did this? Not just the US both United Kingdom and France have access to an impressive digital arsenal, none have revealed any evidence. Consider that the École polytechnique under supervision of French defence is rumoured to be as savvy as GCHQ, can anyone explain how those three cannot see clearly how North Korea did this? So, either, North Korea is innocent and just surfing the waves of visibility, or the quote by George Clooney in the Guardian “the world just changed on your watch, and you weren’t even paying attention” would be incorrect. The quote would be “the world just changed on your watch, and those in charge do not comprehend the change“. In my view of Occam’s razor, the insider part is much more apt, the other option is just way to scary, especially as the IT field is one field where North Korea should be lacking on several fronts.

I will let you decide, have a wonderful New Year’s eve!

Leave a comment

Filed under Finance, IT, Law, Media, Military, Politics

When movies fall short

There is nothing as intensely satisfying as when we are confronted with a reality that is a lot more entertaining than a movie would be. Those are moments you live for, that is unless you are a part of Sony and it is your system getting hacked. Life tends to suck just a little at that point.

This is not the latest story to look at, but in light of the elements that have been visibly resolved, it is the best one around. Some will state that the Hostage story in Martin’s Place, Sydney is the big issue, but that is an event that is getting milked for every second possible by the media, I checked! The price of chocolate remains unaffected, so let’s move on to Sony!

The first part is seen in the article ‘Sony hack would have challenged government defences – FBI’ (at http://www.theguardian.com/technology/2014/dec/12/sony-hack-government-defences-fbi), those who think it is new news seem to have forgotten the issues people had in May 2011 (at http://uk.playstation.com/psn/news/articles/detail/item369506/PSN-Qriocity-Service-Update/). “As the result of a criminal cyber-attack on the company’s data centre located in San Diego, California, USA, SNEI shut down the PlayStation Network and Qriocity services on 20 April 2011, in order for the company to undergo an investigation and make enhancements to the overall security of the network infrastructure” 77 million accounts were compromised and the perpetrators got away with a truckload of data.

So when we see the quote “The cyber-attack that crippled Sony Pictures, led to theft of confidential data and leak of movies on the internet would have challenged almost any cyber security measures, the US Federal Bureau of Investigation (FBI) has said“, we should consider the expression once bitten twice shy and not, when bitten use antiseptic, go into denial and let it be done to your network again.

The fact that this revolves around another branch of Sony is just ludicrous, it’s like listening to a prostitute stating that the sick man used the other entrance this time, so we need not worry! If you think that this is an over the top graphical expression, consider that twice in a row that the personal details of millions in the form of data ‘leaked’ to somewhere.

The second quote will not make you feel any safer ““In speaking with Sony and separately, the Mandiant security provider, the malware that was used would have slipped or probably got past 90% of internet defences that are out there today in private industry and [would have] challenged even state government,” Joseph Demarest, assistant director of the FBI’s cyber division told a US Senate hearing“, as we know that governments tend to be sloppy with their technology as they do not have the budgets the bulk of commercial enterprises get, we can look at the quote and regard the statement to be a less serious expression of ‘do we care’, which is nothing compared to the ignored need to keep personal data safe.

You see, commercial enterprises have gotten sloppy. getting newly graduates to look into a system where you need seasoned veterans and you need a knowledge base and a good setup, all factors that seem to be in ‘denial’ with a truckload of companies the size of Sony, as they are all cutting corners so that they can project revenue and contributions in line with the ‘market expectations’.

The quote that becomes interesting is “A link between Gop and North Korea has been muted over Pyongyang’s reaction to the Sony Pictures film The Interview, which depicts an assassination attempt on Kim Jong-un“, so is this group calling itself Guardians of Peace (Gop), the ‘simpleton’ group they are trivialised to be, or is there more. You see, we see a growing abundance of data collections that seem to go nowhere, but is this truly the case? You see, data is money, it is a currency that can be re-used several times, the question becomes, finding someone willing to buy it. If we regard the 2 billion Microsoft paid for Minecraft to be more than just the IP of the sandbox game, then what is it? Which part of that 2 billion is seen as value for the 120 million registered users on PC? Do you now see the currency we are confronted with?

In my book the Sony exercise is a display of the expression ‘a fool and his money are soon parted‘. In light of the 2011 issue, the fact that security was increased to the extent that it could be done again makes for entertainment on a new level, in addition, like a bad infomercial it does not stop here, no! For $9.95 you get so much more then you see now. That we see in the article that was published two days before that (at http://www.theguardian.com/technology/2014/dec/10/fbi-doubts-north-korea-link-sony-pictures-hack). The part that should make you howl like a hyena is seen here “The security firm hired by Sony to investigate the attack, FireEye, described the attack as an “unparalleled and well-planned crime, carried out by an organised group, for which neither SPE nor other companies could have been fully prepared” in a leaked report“, So did you notice ‘unparalleled and well-planned crime‘ and ‘leaked report‘, oh sarcasm, thy name be Miss Snigger Cackle!

The leaked report, which was from the 7th of December (at http://recode.net/2014/12/07/sony-describes-hack-attack-as-unprecedented/) gives us “demanding that organizations which have obtained the leaked information avoid publishing any more material from the hackers, and destroy existing copies. Boies called it “stolen information.”“, you see, the issue here is that if we consider the quote “This attack is unprecedented in nature. The malware was undetectable by industry standard antivirus software and was damaging and unique enough to cause the FBI to release a flash alert to warn other organizations of this critical threat“, so even after the malware, info was still going past the firewall, or was this just ‘leaked’ by an internal source? It takes a little twist when we look at the quote in the December 10th article “The malware had been signed and authorised by Sony Pictures, allowing it to bypass certain security checks“, in my mind this reads as follows: ‘Some idiot gave a pass to malware to roam free on the system‘, so is it that, or was this an internal operation all along? If the second part is true, then who was the beneficiary of all that private data? Who is it means for? You see, many forget that our information is not always for stealing from our credit cards, sometimes it is used to profile us, as a customer, as marketing or as leverage. Why the word leverage? Consider healthcare, consider usage, what happens when an insurance company gets to profile 20 million couch potatoes, what if your healthcare premium suddenly goes up by 15%, do you have any idea how much money that is? So as insurance companies keep the leveraged margins of charge, whilst overcharging risks in addition, we see a growing margin of profit for these insurance companies, whilst getting them to pay for what you are insured for has not gotten any easier has it?

So is this simply a cinematography from Sony Pictures film, called The Interview, which depicts an assassination attempt on Kim Jong-un, or was that the smoke screen? The FBI seems to have ruled out North Korea, as far as I have been able to tell, the only fans of North Korea are the North Koreans and Dennis Rodman (who has no fame in any IT endeavour), so is there enough doubt regarding the reality of what happened and why it happened? Yes, as I see it there is, the question becomes, when there is this much smoke, where are we not looking? That part is to some extent seen in another Guardian Article (at http://www.theguardian.com/film/2014/dec/12/hackers-attack-film-studios-sony-pictures-leak-cybersecurity-warning). We see this quote “Sean Sullivan, senior adviser and researcher at the security company F-Secure, said that he believes the purpose of the Sony hack was extortion. “If it was just hacktivists, they’d have released everything all at once,” he said. “But these releases, it’s like they’re shooting hostages. One thing one day, another the next. This is a really different tactic from what we usually see.”“, this is certainly plausible, but is that it? Why ransom of data and sell it back with the FBI and others on your tail, when you can sell it in Hong Kong, Bangkok, Riyadh and a host of other locations. A simple transaction for an external encrypted drive, a deal you can offer to ALL parties for amount X, the more you offer, the higher X is.

Whilst our data is sold on and on, we run additional risks of getting invoiced for our lives choices and extorted by other financial firms because our privacy is no longer a given in the age of data and it is directly linked to corporations that cannot clean up their act. In the mean time we see leaked report on impossible hack successes, whilst it took only one executive to ‘accidently’ sign and authorise a mere trinket of malware.

So yes, the movies are falling short; reality can be scary and entertaining all at the same time. The question becomes, will there be a change to our invoice of life because of corporate considerations, or lack there off?

 

1 Comment

Filed under Finance, IT, Law, Media, Science

Where we disagree

There is another article in the Guardian; it was published almost 12 hours ago (at http://www.theguardian.com/business/2014/dec/14/deficit-problem-crisis-productivity-george-osborne). It is a good story, it gives a decent view, but I feel that I cannot agree. It must be said that this is all in the eyes of the beholder. The article is good and sound and many will adhere to this idea. Yet, I do not completely agree. Yes, all the facts are right, the view is not incorrect, but it feels incomplete. The first quote “The most important issue is the poor performance of the nation’s productivity, which, far from being improved, has almost certainly been exacerbated by the constant emphasis on the putative need for austerity”, now this is a decent view to have, it is an optional view, yet in my view the following com up:

  1. Productivity relies on orders; the UK is competing with its baby brother India where daily labour rates are decently below the hourly rate of a UK worker. That in itself is not enough, the EEC overall is pretty broke, no less than one in 10 has no job, it is driven up by Spain and Greece, yet after a long term most Europeans are very careful about where money is spend on. So which manufacturing industry is getting the few coins that do get spend?
  2. There is no reputed need to austerity; there is an overspending in excess of 1 trillion that needs to be addressed. We can bark high and low on the reasoning for it, but that water passed the bridge a long time ago, now the debt needs to be taken care of. The US, Japan and UK have a combined debt of 30 trillion of national debt, the UK is a little over 3% of all this, let’s make sure that when the two behemoths stumble into nothingness, the UK does not end up being the biggest debt of all (again just my view), yet I feel certain that the banks will be in charge of a nation with such debts.

Yes, productivity will take care of all it, but I believe that the debt needs more then productivity. It needs innovation and IP. They will drive true productivity. People forget about the innovators. Alan Turing is still regarded as the man behind the concept of Artificial intelligence. What was a fab in the 40’s became the driving power for the planet from the 90’s onward; let’s not forget the foundations for the computer. We seem to herald IBM and others, yet Professor Sir F.C. Williams was at the foundation of the driving force that became the behemoth for almost half a century and this wave is still going strong.

The new currency will be IP; innovation will drive the places of work, the places of sales and the filling of coffers (the empty bags currently in a corner of George Osborne’s office).

People keep on ignoring the need for innovation; I tried it twice in a previous job. The response remained almost the same ‘it works as it is, so leave it‘, that is the drive stopper that ends a future, although the early 1900’s did not have the need for IP, consider the history of the paperclip and Gem Manufacturing Ltd, a British company. They had the better design, but never registered the patent, which is why Johan Vaaler is often seen as the inventor. I am not debating the validity, yet he registered his patent. In those days the rights were approached a lot more liberal then now. Nowadays our lives are all about IP, patents and who it is registered to. Haven’t we learned anything in 115 years? No matter that we now enjoy an article that is not patented, in nice contrast to people who enjoy a life because the man behind finding a cure (read vaccine) for polio did intentionally decide not to patent it (Dr Jonas Salk, who deserves a sainthood for that act), our future for certain, our survival to some exaggerated extent is depending on IP. Need drives production, but who owns the article that is needed? That part I see ignored again and again.

William Keegan does not look at the IP side, because he focuses on the steps following it, yet those in this real rat race seems to silence the need to look at it as they talk about productivity and manufacturing, but the innovator behind it, the one designing the IP, that person is worth gold. Consider Microsoft paying 2 billion for a piece of IP called Minecraft. A simple game, looking the way Minecraft does, is worth the revenue the high end looking GTA-5 made. It is all about IP in gaming; it should be the same in nearly any industry, not just the one that got kicked off by Alan Turing and Professor Sir F.C. Williams. IP drives every computer industry, it became the centre piece in the jewel that is now called ‘Business Intelligence‘ and ‘Predictive Analytics‘, but we broke the system after that.

Why was the system broken?

It is a broken system that is now illuminated in its flaws by people like Sir Kenneth Robinson and Brian Blessed. We ignored for too long that IP and innovation requires creativity. As Universities have been pushing logic and business, they forgot that the future tends to be created in the arts. Creativity is the driving force for any future, whatever is produced after this required a need for IP. It is a chicken and the egg issue, will the thought create the idea or is the idea the drive for creation? As I see it, this drive needs an artistic side, a side I was never any good in, but the best futures will need an artistic hand. It is shown into the massive amounts of IP the gaming industry manages. People might wonder why I keep on coming back to the gaming industry.

The answer is simple Games have driven a trillion dollar industry (totalled). Commodore Business Machines (C-64, Amiga) Atari (2600,800, ST), Creative Labs (soundcard), The consoles that followed by Nintendo, Sony, SEGA and Microsoft and the list goes on and on, all from creativity. Even the military sees the essential need of creativity. Consider the text “Space-based Missile Defense: Advancing Creativity“, it is at the heart of everything, so many forgot about that, those in charge forgot about that part. It is why my vote for Cambridge chancellor would not have been for Lord Sainsbury of Turville, but for Brian Blessed. Lord Sainsbury is not a wrong person, or a bad choice. As I see it, all our futures require a much stronger drive towards the arts and creativity. In my crazy creative view photography was invented in 1642 by a Dutchman named Rembrandt van Rijn; his visionary view came 200 years before the chemicals were invented, if you want evidence? It is in the Rijksmuseum and they call it ‘the Nightwatch’.

 

Leave a comment

Filed under Finance, Gaming, IT, Science