Tag Archives: Sony

As the heart thumps

We are only two days away from the E3, those who are into gaming will wonder ‘what will we see next?’ We all feel that way, yet lately, the more I see of Elite: Dangerous, the more I await its arrival on PS4. For now it is a Microsoft exclusive. I remember the day I became ‘dangerous’ I had been playing it for quite some time. Consider the screen below. This was the screen we drooled about. It was on a C-64 and it was ‘da bomb’ in those days!

Lave

So many hours, at first jumping short distances, hoping no one would attack me, but after my first pulse laser, I got to be cocky (and got killed in the process). Now we see the next gen pics, one is the PC, the other is as I was told the Xbox One edition (this is not a cut scene, this is actual game view). If you think that ‘it is all about the resolution’ then you are quite frankly a nob (or a dweeb). I have been and will remain a Sony fan (I still love my Xbox 360), there is no denying that this game is beyond amazing!

XB1_1

Most information on the XB1 edition so far, I got from YouTube. As I played the original and have had decades of gaming experience (which is why I knew the flaws Microsoft is fixing now, were a solid known issue for me 6 months before the system was released, and not all have been fixed by the way). Now, most gamers will be the Mario kind, or the Grand Theft Auto kind. This game might not appeal to either, yet, I feel that the flight simulator and Role Playing Game kind will truly love this game, and we are in for a lot more heart elevation than just this game!

To get a good initial look of the game then watch this: https://www.youtube.com/watch?v=grIGMs3Kj4k. The man talks clear but waffles a little in the beginning. He is going through it all clearly, so bear with his explanation, because it is worth it! If need be, skip the movie to 4:45, now you see the first glimpse on how a mere idea in 1984, becomes something truly amazing when the computers catch up to the imagination of an individual, in this case the imagination of David Braben and Ian Bell.

This is not a 30 hour game, this is a game that will keep you busy for many months, if not years to get it all to a worthy level, but let that not stop you, because as you evolve from one ship to the next one, you will be able to transport more goods, have better protection and go hunt criminals. The openness of the game that was, was already impressive, the size of the new edition is beyond anything you can imagine. We are talking a few million times larger than the original. For those who like the idea of space exploration, this is one of two games to get.

What is amazing is not just what it looks like now, it is the fact on how the navigation systems from 1984 are still at the core of what is now, it was the most innovative look and now, this view is the centre of aligning your ship and weapons systems towards your enemies. And it does not just ‘seem’ to be the best, as you watch the game on YouTube you can see how fluent the controls seem to be, especially as we consider the response from Blitz ‘Oops! We’re going the wrong way’ moments later it is all back to normal.

The other game to get is ‘No Man’s sky’, but that one I will leave alone, because, too many people are hyping this game, based on the same materials most saw (YouTube and so on). So we will wait for actual release date information.

What is interesting is that leaking information is not just limited to the political branch of the media, it seems that Dishonored 2 information has leaked. Dishonored was the stealth game on 360/PS3/PC, which had open levels and had a steampunk look to it all. The interesting part is that there was no set way to do the game, stealth or kill everyone, you got to choose. Another interesting part was hat when I replayed it on the 360 a while after I completed it, I found in more than one level another way to get the game done, which is awesome, because that gives a clean ‘open level’ approach, something that I am a big fan of. There is still question whether it comes and whether it is a leak or a ‘miscommunication’ but gamers live for these moments, because Dishonored 2 was not in the open pipeline and a fan will get overly enthusiastic when a sequel arrives of a game he is a fan of.

At this point, the Bethesda conference is only 12 hours away! 12 hours until the Fallout 4 trailer will get additional support and information to those who love that game (that would be me). 12 hours after that the show takes off for thousands of gaming fans! There will be joy, there will be tears and there will be outrage. The latter part might be a bit much for Ubisoft, but there is no way to tell how they will fix previous blunders and how they will appease the deserting population they have experienced. Time will tell and on that part I will not speculate at present! I still feel that they could turn it around and rebuild what they had lost, it just takes one truly visionary person (often not found in a board of directors).

Ubisoft does its presentation 20 hours after Bethesda, Bethesda has a 12 hour leap on Microsoft too, so whatever news they bring will get unadulterated limelight for the better part of a day. The rumours are ripe and some state there will be more than just Fallout 4 and Doom, but again, they are just rumours and Fallout 4 is pretty massive sized news, especially as it comes out this year, so that means within the next 6 months.

So why more on games? You see, games are getting to be a much more important part in the lives of people, many of them not into gaming at all. Gaming is now a major player for Trademarks and let’s take a look at patents!

You see, IP Australia tells us “Software inventions must be industrially applied. Software that is merely a procedure for solving a given type of mathematical problem is not patentable”, yet when we look at the The Copyright Act 1968 (Cth) we see the following “Under the Act an article is industrially applied when, with the consent of the copyright owner, fifty or more items are made from it, which we see in section 77, 17. If the design is not able to be registered, for example because it is not new and original, it will still lose copyright protection once it is commercialised section 77“, now we get to the part that matters: “By registering a design under the Designs Act 2003 (Cth), for example a design for a kettle, the owner obtains a monopoly in that design but, unlike with copyright, the protection is only for a maximum of ten years and not for the life of the owner. With copyright the owner does not obtain a monopoly. If two people independently prepare a drawing of a kettle neither infringes copyright in the other’s drawing. The registration of a design gives the owner a monopoly in that design and the owner can prevent another applying the design, or any fraudulent or obvious imitation of it, to any article in respect of which the design is registered [see s 71(1)]

This jewel comes from the Legal Commission of South Australia (at http://www.lawhandbook.sa.gov.au/ch11s12.php).

New we get back to the gem, the jewel of gaming, Elite. I mentioned that navigational part of the game, which is the kettle. Was it registered, is it protected? Let’s not forget that ‘it will still lose copyright protection once it is commercialised [s 77]’, which gets us to the need for protection for these games and the growing powers of trademarks and Patents. Yet, trying to get a Trade Mark or Patent after you gone public is another matter, so what legal protection did these new makers prepare?

Consider the uniqueness of the Elite navigation display, how protected is it? You might think that this is a joke, but it is not. A new game will cost between 20-150 million dollars, so you need to get it right and make sure you have your protection in place. Even though larger productions are less likely to fear Trade Marks or Patent infringement (usually they fear industrial espionage), but having the protection just makes your case stronger. So here is the Crux for some of the new Law firms. If you take time to visit the E3, how many products are in need for protection? Who has actually done the full scope of this? IP is an evolving market, the protection required will increase with every iteration of the game. You see, the gaming industry has arrived in the location, the hardware industry was in 1998. Now that makers will return to an annual release of a game, an iteration of the original, the game will also face the danger of a ‘white’ version. A look that is similar (but not ‘looks alike’) that provides the gameplay the gamer would like. You see, no matter how their marketing division brings it, Assassins Creed 2, AC Brotherhood, AC Revelations, AC3 and AC Black Flag are in many parts similar, as such, game makers have had 5-7 years to catch up, 3-5 years for those who waited for the second one to become a hit. As such, in light of the fact that re-engineering can usually be done in 40% of the timeframe, the need for legal protection will increase almost exponentially. Do you think that no one else is now thinking of a ‘new’ GTA5? The game brought in a billion dollars, so YES! There is someone trying to flog of a new game offering a similar game. It only takes one innovative part for the original to feel the pain of losing a market share. There is however a change, you see, some still feel the following description: “Obtaining a patent is a long, tedious, and expensive process, that it can be challenged by the examiners and later by others in court“. Yet the Patent Cooperation Treaty (PCT), which is internationally accepted, has an international patent, which does not have the same threshold patents used to have, which means filing is easier and most important cheaper!

If we look at the definitions in section 39.1 of the PCT treaty, we see :”(vi) computer programs to the extent that the International Searching Authority is not equipped to search prior art concerning such programs“, yet is that not a failing of the organisation? The fact that a billion in revenue cannot be protected, is perhaps slightly ludicrous. Again, in Robert Bosch v Siemens we see: “However, it is not to be inferred from these rules that searches or examinations in the software field are to be ruled out in international authorities. On the contrary, it seems to the board that according to the PCT searches and, if applicable, examinations of this type can and may very well (perhaps even should) be carried out if the competent authority is appropriately equipped“.

So, the victims remain as international authorities are ‘trying’ to get equipped? There is enough here to see a needed evolution that not unlike Torts will go on a case to case bases. The case on Sega v Fox Interactive, Electronic Arts, and Radical Entertainment regarding a US Patent, which was settled for an undisclosed amount. There the core of the infringement was the navigation system, the copied one was ‘too’ similar.

The core of gaming is expected to exceed 80 billion in 2015, that target is already likely to be exceeded, so as we see that gaming is now expected to overtake BI Intelligence market revenue by 1300% (yes thirteen hundred), we can surely see the short path we have in view as the need for software patents are required to strengthen an iterative market. Even though there will be some protection in Trade Marks as the branding of a game is too similar, consider the quote “if the novel elements are functional, the item cannot be copyrighted: although it might be eligible for patent protection“, which takes us back to Elite as a first example. Its navigation is quite unique, I have not ever seen it anywhere else to that extend and now as the larger masses go to play, such protection is more and more an issue. Take into consideration that the affordability of patents are now a fact, giving an option to patent, until opposed (which still needs to be decided), we have enough to see the change in the gaming industry, IP is taking a foothold, so when you follow the E3, see how often you hear the term, ‘our new IP’, because that part will take centre stage as per last year. So where are you now in all this?

More interesting, which law firms are considering evolving their portfolio with the gaming industry, which is only an $80 billion market for now!

 

1 Comment

Filed under Gaming, Law, Media, Politics

A week of Awesome

It is now 2 years since the site team of Gamespot showed all lack of insight, sense of humour and based on their ego alone decided to ban me. Ah well! Such is life! The weekend of Awesome is coming to the You Es of A! The E3 is coming and all gamers are looking forward to the avalanche of games and releases. But as there is much to be joyous about, there will also be several issues that the makers, shakers and bakers will be confronted with.

Some of the games, teased with last year are still not released

The most memorable issues are Metal Gear Solid 5, still to come. Batman Arkham Knight, Mass Effect 4, Elder Scrolls online (consoles). The Division, which has faced massive delays and Fable Legends. In all honesty, some had a 2015 release, but no date given. Yet, the feeling that gamers are now faced with is the fact that gamers will be a lot more sceptical, Ubisoft will need to show the best of what they got and with the failing of AC: Unity, visitors might end up getting really cool extras from Ubisoft as they are trying to mend fences with the gaming community.

The makers of Mass Effect will also need to give a view of what is truly in store, even though they have not been announced at present. What will be interesting will be the Microsoft event. You see, their initial crash and burn was partially fixed last year at E3 2014. Than something happened, you see Microsoft delivered and brought the Xbox one community a decent year, in my view a much better year than Sony delivered. In that regard, Sony might need to deliver extra and better than last year. Many gamers are still unsettled that the achievements are not visible off line. Several other issues have been targeted, but overall Sony did not do too badly, it is the fact that Xbox One did so well is why PS4 lost some headway.

Will it all be about the new games? The announcement of Fallout 4 only days ago will have the gaming community riled like nothing the E3 has seen, especially in light of the disappointment that ESO (Elder Scrolls Online) have left the people feeling. Even though they have been strong to try to fix the damage, more work will be needed and the true feelings of the game via the consoles is as I reckon the time line, 2 months away, so AFTER the E3 2015 has passed.

The announced game for this year, No Mans Sky will be the front runner for loads of praise and awards, in addition, I partially expect that the official launch date will be given at that point. For the Sony players (PS4) one of the most desired answers will be the time of the exclusivity that Xbox players will get on Elite: Dangerous. Many PS4 people (including me) are very much looking forward to that game. I played it on the BBC Micro B as well as the CBM-64. What was shown last year for PC was very much what gamer’s desire, so I can’t wait to see that release. In addition, even though there is no news on Mass Effect 4, what about the rumours on the trilogy being remastered for nextgen? Will we hear the confirmation? We are one week away from finding out more!

The E3 will have all kinds of information, all kinds of confirmation and in some cases even less answers, but that is the magic of the E3, whether you are the gamer of death, the gamer of collection or the family gamer, the E3 will have something of your liking. Yet the trend we face is not the greatest one. Yes, I loved Ratchet and Clank and I would love to play it again, but is it more of the same? You see, Mass Effect 4, MGS5 and Fallout 4 might be new games, but they are mostly new iterations of a game we love. This is not a bad thing, it just is a fact!

You see, last year we got teased with Splatoon, The XB1 fans got a treat with Sunset overdrive, but now? What is coming not that is totally new? The division is delayed, a final date of no man’s sky is not set and Elite is locked to non-Sony gamers. What will the PS4 bring that is totally new?

Well, if you follow the people as they all went to the rapture, you will actually see something that is new. Not unique, but truly new. Which is good for Sony, but that might just be a temporary advantage. Part of me does hope it will get to other platforms, because this is a newer approach to open world gaming, which could spark a new generation of games. In the end exclusivity is nice if you have the console, but open to all is a massive driver to games, which is why some of those acts of exclusivity tends to be counterproductive a I see it.

The countdown of E3 has started, 5 days to go!

Let the gaming commence!

 

Leave a comment

Filed under Gaming, Media

In reference to the router

Is this a case of Mythopoeia? Am I the JRR Tolkien of bloggers (I wish) and writer of facts by a non-journalist? It might be. You see, this is all about a mythological theme that is constant as war is, because war never changes! Its concept and construct is as old as the first ‘soldier’ who combined a flint and a stick and started to spear people. In this mindset it is all about the other person, an archaic approach to the issue that does not lie beneath, it’s in front of the person not seeing what is right in front of him/her.

It is also the first evidence that we consider the concept ‘old soldier never die, they simply fade away’ to be no longer a genuine consideration. In this day and age, the old soldier gets his/her references deleted from the database of considerations. We remain with nothing more than an old person that cannot connect or interact, the router won’t let him/her!

This is how it begins, this is about certain events that just occurred, but I will specify this momentarily, you see, it goes back to an issue that Sony remembers rather well they got hacked. It was a long and hard task to get into that place Login=BigBossKazuoHirai; Password=WhereDreamsComeTrue;

Soon thereafter no more firewall, no more routers, just the bliss of cloud servers and data, so much data! The people behind it were clever, and soon it was gone and the blame fell to the one nation that does not even have the bandwidth to get 10% past anything. Yes, North Korea got blamed and got fingered and in all that the FBI and other spokespeople gave the notion that it was North Korea. The people who understand the world of data know better, it was the only player less then least likely to get it done, the knowhow and the infrastructure just isn’t there. I did have a theory on how it was done and I published that on February 8th 2015 (at https://lawlordtobe.com/2015/02/08/the-next-cyber-wave/) in the article called ‘The next cyber wave’. It is only a theory, but it is a lot more reliable and likely than a North Korean incursion because of a movie no one cares about.

The FBI has plenty of achievements (FIFA being the latest one), but within the FBI there is a weakness, not a failing, but a weakness. Because the US has such a niche setup for NSA, CIA and other Intel officers, their offices are for the most still archaic when it come to the digital era. They go to all the events, spend millions on courses and keep up to date, but for the most, these people are following a wave that is one generation old, they follow, they do not lead. The entire Edward Snowden issue is clear evidence. I remain to regard him a joke, not a hacker, so far he is just placed on a pedestal by the press, who have created something unreal and whatever they do not to change it, it will only cut themselves. That is the fall-back of creating an artificial hero who isn’t one.

Yet, this is not about Snowden, he is only an element. Now we get to the concept of paleo-philosophy and how it hits government structures behind IT. This all started yesterday (at http://www.theguardian.com/technology/2015/jun/04/us-government-massive-data-breach-employee-records-security-clearances), where we see ‘OPM hack: China blamed for massive breach of US government data’. Now first of all, if one power can do this, than it is China! France, UK and a few others can do it too, but let’s just assume it is not an ally! Here is where the entire paleo-philosophy comes into play. You see, even though war remained constant, the players changed and for the most, it is no longer about governments. This is all about corporations. Even the movies are catching on, there is no true side to Russia or China as the enemy. Yes, their students might do it to impress their superiors/professors, but that would just be there defining moment. Ethan Hunt is not hunting a nation, it is now hunting conglomerates, large players who remain and require to be zero percent taxable. Those are the actual ream enemies for the UK, the US and China. You see, I am not stating it was not China, I am only questioning the reasoning and other acts. You see, I tried to get an answer from State Secretary John Kerry at +1-202-647-9572, who does not seem to be answering the phone, neither is his right hand man, Jonathan J. Finer at +1-7234 202-647-8633. This is not a secret, the State Department has the PDF with office numbers, locations and phone numbers in an open PDF and you can Google the little sucker! In the age where loads of stuff is open the right person can combine tonnes of data in a moment’s notice.

So can the larger players! The quote in the beginning is the kicker “the impact of a massive data breach involving the agency that handles security clearances and US government employee records“, you see loads of this information is already with intelligence parts and counter parts. I reckon Beijing and Moscow had updated the records within the hour that the next record keeper moved into the office. Yet, now in 2015, as the engine starts up for the presidential elections of 2016, that data is important to plenty of non-governments, that part is not seen anywhere is it?

Then we get “A US law enforcement source told the Reuters news agency on Thursday night that a ‘foreign entity or government’ was believed to be behind the attack“, which is fair enough, so how was the jump made to China? You see, only 5 weeks ago, the Financial Review gave us “US Treasury pressures Tony Abbott to drop ‘Google tax’” (at http://www.afr.com/news/policy/tax/us-treasury-pressures-tony-abbott-to-drop-google-tax-20150428-1mu2sg). So as the Obama administration ‘vowed’ to crackdown on Tax avoidance, they are really not the player who wants to do anything to upset those luscious donators of pieces of currency paper (loads of currency paper), so a mere 6 months later the US, is trying to undo what they promised, whilst still trying to push the TPP papers through the throats of consumers everywhere, what an interesting web we weave!

You see, for the large corporation that list of who has access to papers, and his/her situation is worth gold today, for the Chinese a lot less so. Yet, I am not writing China off as a possible culprit! Let’s face it, they are not North Korea, which means that they do not need to power their router with a Philips 7424 Generator! So at this point, I would tend to agree with Chinese foreign ministry spokesman Hong Lei who branded the accusations “irresponsible and unscientific” at a news briefing on Friday.

Now we get to the quote that is central to the entire paleo-philosophy matters: “DHS is continuing to monitor federal networks for any suspicious activity and is working aggressively with the affected agencies to conduct investigative analysis to assess the extent of this alleged intrusion”, first of all, I am not having a go at the DHS. I have done so in the past with good reason, but this is not that case. I think that in many areas government in not just falling behind, it started to fall behind in 2005 and has been falling behind ever since. Not just them though, organised large corporations like Sony, CVS Health, Valero Energy and Express Scripts Holding are only a few of the corporations that do not even realise the predicament they are in. The Deep Web is not just a place or a community, some of the players there have been organising and have been sharing and evolving that what they know. A massive pool of information, because Data is money, governments know it, corporation know it and THE HACKERS know it too. For them it is all relative easy, they have been living and walking the cloud data with the greatest of ease they can conflict data points and flood certain shared data hosts, only to achieve to get behind the corridor and remain invisible whilst the data is available at their leisure. In that environment the intelligence community is still trying to catch up with the basics (compared to where the hackers are). You see, whilst people in corporations and government are all about politics, those hackers were bout mayhem and anarchy, now they are figuring out that these skills get them a wealthy and luxurious lifestyle and they like the idea of not having a degree whilst owning most of Malibu Drive, a 21st century Point Break, where the funds allow them to party all the time. Corporations got them into that thinking mode. So were the culprits ‘merely’ hackers or was it a foreign government? That is the question I am unable to answer with facts, but to point at China being likely is event less assuring. Consider who gains power with that data? This much data can be up for sale, it can be utilised. In the premise of both, China is not unlikely, but what is ‘more likely than not’ is also a matter, even though that question is less easily answered and without evidence (I have none) any answer should not be regarded as reliable!

Now we get to the quote “Embassy spokesman Zhu Haiquan said China had made great efforts to combat cyberattacks and that tracking such events conducted across borders was difficult” it is correct, it matters and it is to the point. In addition, we must accept that trackers can also be set on the wrong path, it is not easy, but it can be done, both the hackers and China have skills there, as do the NSA and GCHQ. Yet, in all that, with the Sony hack still fresh in memory, who did it, which is the interesting question, but WHY is more interesting. We tend to focus on clearances here, but what else was there? What if the OPM has health details? What is the value of health risk analyses of 4 million people? At $10 a month that is a quick and easy half a billion isn’t it?

You see, the final part is seen here: “DHS is continuing to monitor federal networks for any suspicious activity and is working aggressively with the affected agencies to conduct investigative analysis to assess the extent of this alleged intrusion”, This is to be expected, but the intruders know this too, so how did they get past it all again? That is the issue, I gave in my earlier blog one possible solution, but that could only be done through the inside person, to be clear of that, someone did a similar thing in the cloud, or in the stream of data, in a way that it does not show. Perhaps a mere pressure of data in a shared cloud point is all it took to get past the security. How many data packages are lost? what intel is gained from there, perhaps it is just a pure replication of packages job, there is no proper way to monitor data in transit, not in cloudy conditions, so as we see that more data is ‘breached’ we all must wonder what the data holders, both government and non-government are not ready for. It is the data of you and me that gets ‘sold’ who does it get sold to?

So as we see an article of a data hack and a photo of routers and wiring, which looks geeky and techy, was this in reference to the router? Or perhaps it is in reference to a reality many in charge are not ready to face any day soon, and in light of the upcoming US elections of 2016, some of these politicians definitely do not want to face it before 2017. Like the Google Tax, let the next person fix it!

A preferred political approach that will allow them to lose exclusivity of your data real fast!

 

2 Comments

Filed under Finance, IT, Media, Military, Politics, Science

Another online danger

It seems that we the consumers are soon in danger of being left out in the offline cold. You might not realise it, you might not even worry, but your money, your payments online are finite!

You see, not only are the events of last week troubling (not the UK election mind you), the consequence of allowing this to move forward unanswered could be a costly one.

With online presence there is the additional danger of non-online absence.

For this I will emphasize it with one example. The game is from Enix and the title is ‘Order of War: Challenge‘, if you had bought it from Steam, then you have a possible issue, because the game has been wiped of your account. Now, this is not a massive issue of today, this is an issue from the sheer point of view called ‘You paid for it!’ and now it is no more and you can never play it again. An important fact is that this issue played in 2013, so you might wonder what gives!

That is an excellent question. I for one would not care too much for Steam, I never did. Yet the issue of yesterday is now quickly progressing towards issues out today and even more important those who are out tomorrow and after that. This goes far beyond the wiping of a ‘Silent Hill Playable Demo’. Some changes are made because the circumstances changes, which is fair enough. That is not the true issue (even though the Silent Hill fans who missed out would be miffed).

The issue is found in the mobile and console games out now and more important those released after tomorrow.

Let me give you an example.

The mobile/Tables environment has a game called ‘Dungeon Keeper’. Many of those who loved that game when it was originally released on the PC went nuts the moment that game reappeared. Yet, in hindsight this new game was a massive failure on many levels. The game had actually destroyed the image the masterful game maker Peter Molyneux had built. The game is now all about delaying events and forcing people to make very expensive purchases online in the form of Gems. As micro transactions go, this game is the one example why micro transactions should be illegal. A nice view is given at https://www.youtube.com/watch?v=GpdoBwezFVA. Yet compared to the pc edition of the second game (at https://www.youtube.com/watch?v=6DJmS7prcmE), the mobile game is horrendous.

Now we have an additional side, I cannot tell when this happened, but several people (including me) have only had access to the game once in the last two weeks, there have been ongoing server connection issues. In light of the issues that have been mentioned in the past there is now a matter for other cause. You see, if there is an issue with a game, if you had purchased enough gems, the issue at hand is not just that you are forced to a server, the fact that the server is no longer there and the player can no longer play gives weight to the question whether there should be legal consequences for those eager to sell a micro transaction relying game. Can something offered as ‘freemium’ but will only work smoothly when purchases be made, should that game be allowed to be non-functional?  Should the makers not offer an offline side to the game? That is at the foundation of what is wrong. The danger of consumers paying for something that can be removed as soon as the exploiters no longer consider the product to be viable and it stops working for various reasons.

What are those reasons?

Well Dungeon Keeper is a first example. The fact that a server is down is one thing, the fact that the server cannot be reached for two weeks is an entirely other matter. Which leads us to the question, should games that only have online server options be allowed? Beyond that, when gameplay is removed, are those who paid for additional gaming experience be entitled to credit vouchers?

This is the loaded question because basically it is payment for a service, which should be regarded as temporary, however, was that clearly communicated to those buying the service? Now we have ourselves a different video game altogether!

You see, this part will be a growing issue as people are dependent on downloads and could storage of games that are not played on a daily basis. There is the added consideration that these providers never did anything wrong as they might have specified that in the terms of service, yet who reads them? This is not a business agreement, or isn’t it?

Let me move on (for now to another example).

Now we have (or better states we used to have) the PlayStation 3. It has the option of PSN and PlayStation Home. PlayStation Home was discontinued, but what about those people who have spent money for years on the locations there? There had always been an implied assumption that there would be PlayStation Home in PS4. Clearly implied is not correct, too many sources stated most options in silence. Then when the PS4 came it was initially incomplete and in 2014 the verdict was final, no PlayStation Home on the PS4. And recently PlayStation Home was also removed from the PlayStation 3. There was no fault here, there was never any clear agreement that PlayStation Home was to be ported to the PS4, but to lose it on PS3 would never be an acceptable option to those who like it.

I thought it was a cool place, it was partially useless, yet it had the option of being a playful marketing tool. Trailers, unlockable extra’s for games and so on, there were even a few decent games in that environment. Because it had channels so that people could chat, it was something that is out there that would forever be an option. Now it seems that Sony is mostly rejecting the social media, or it is partially doing that. PlayStation home is not the only place, the profiles are a second part, but here we are forced online and in an almost ‘anti-social network’ situation.

This is where the wheels come off the wagon, you see there is another side to all this!

This all links to the previous as there is a real danger that someone at some point will deactivate a service, then what? There is currently an uneven, unequal and a dangerous push to force people online. There is now a second part that has massive consequences for gamers on a global scale. I have made references with the TPP (Trans Pacific Partnership) before, and it seems that several other sources are now on the bandwagon regarding the dangers here, gaming is only one aspect (and not even close to the biggest one, but because of the global setting of gamers a lot easier to spot). It is not just the ‘profile’ issue, that is the least of it all, but it is a driving force around it. More important, the cost of being ‘online’ could soon be another matter altogether.

It would be too simple to state that the TPP is just a bad consequence of a group of utterly incompetent politicians, mostly staying presently at 1600 Pennsylvania Avenue, but that would be not entirely correct either. You see, their inadequacies resulted in a group of industrials to change the premise on Digital Rights Management (DRM) on a massive scale. For the most, I have mixed feelings. I believe that it is perfectly legit for a corporation to protect their product from being illegally copied. Now, the internet providers (ISP’s) are all about bandwidth, so as such, they like people who copy movies, they love it even better when people copy Blu-rays, because 100,000,000 people going for 2-3 blu-rays every night is a massive amount of bandwidth. There is to the smaller extent that a DRM is all about setting up who can legally use something and who cannot, but that seems to be the smallest tip of the iceberg.

An article in the Sydney Morning Herald gives us ‘http://www.smh.com.au/federal-politics/politicalnews/trans-pacific-partnership-will-push-medicine-prices-up-review-finds-20150303-13sxty.html‘. This is not entirely correct, but not wrong either. If we take this quote “The leaked treaty text also reveals new American and Japanese proposals designed to enhance the ability of pharmaceutical manufacturers to extend and widen their patents on drugs and medicines“, it is the word ‘extend’ that is the issue. Because some pharmaceuticals are all about prolonging, we see more and more new patent additions to give any drug a longer exclusivity, which means that generic medication will be less and less of an option. There is in addition the quote “Jeffrey Bleich, accused Australian consumers of habitually stealing copyrighted content and of being some of the worst offenders with amongst the highest piracy rates … in the world“, that statement makes Jeffrey Bleich an idiot to some degree (not the worst he’s ever been called), because his peers in the Netherlands, Denmark and Sweden say exactly the same and he should properly investigate these matters before making those statements.

Now, he was not being too bright (or massively misinformed) and a mere voicer for large corporations, which is to some degree his job I reckon, but he could have been a smudge more thoughtful in that regard. You see, the American side has been utterly stupid for a long time. Because it was always American first, then ‘whomever is left’! We have seen that in Movies, Music and games. Although music not as much. It started in the mid 80’s when Greed took over and American corporations were utterly clueless on global corporate actions from day one. I am not just talking about Games, or movies (even though they are the most visible ones). No the utter consumer disrespect shown by Ashton-Tate, IBM, Lotus Development Corporation, Oracle, Novell and Adobe was beyond belief in those days. You would actually look forward to meeting with Macromedia, WordPerfect and Corel to see that humanity in IT was an option. Now many of them changed tunes over time, the movie and games industry stayed behind for a long time, it is only recently that the US is seeing that the money of their blockbusters are coming from outside the US in some cases in excess of 75%. Now we have ourselves a ballgame! Now we see the shift some are making, but in other ways.

You see, there is a reason why some people have an aversion to buying a game at 40%-70% more. In my early days, I had no options, a game advertised in the American magazines at $19.95 would cost me $69, that’s a not so nice 300%, so America changed the environment from the very beginning. Even today, Australian gamers will pay 40%-70% more for a new game. Now, we will see casual mention on how it is all about shipping. Well guess again. PSN (PS4) was offering games on day one in a shop for $89, On Amazon it was $59 and guess what, the download in Australia was priced at $99.

How do these elements link?

There are two parts. First the quote by Julian Assange “The TPP has developed in secret an unaccountable supranational court for multinationals to sue states. This system is a challenge to parliamentary and judicial sovereignty. Similar tribunals have already been shown to chill the adoption of sane environmental protection, public health and public transport policies“. It is actually not that far a stretch, you only need to consider the legal disagreements between Apple and Samsung to see the dangers here.

After which the following claim is made “The leaked text shows that this agreement is more about corporate power than “free trade”. Investor-state dispute settlement is really a form of corporate sovereignty“. That part can be found here (at https://wikileaks.org/tpp-investment/WikiLeaks-TPP-Investment-Chapter/page-1.html).

Basically, in there you can find the issue “where foreign firms can ‘sue’ states and obtain taxpayer compensation for ‘expected future profits’“, this now reverts back to the earlier mention of games, movies and especially music. A false dimension of revenue has been maintained by corporate ‘baboons’, claiming ‘loss of revenue’. Relying on incomplete information from Napster, Kazaa and a few others players in the peer to peer networking solution. They basically went on the premise, one download means one sale lost. I believe that this was never a reality. People might download and listed, but would never have bought the bulk of it in the first case. That same premise of certain lacks is seen when we see the quote “Attorney-General George Brandis has signalled his intention to introduce more stringent copyright laws to crack down on online piracy“. In that regard the attorney general does not seem to strike too high on the academic scale of logic (on any given day for that matter). I posted an article on September 10th 2014 called ‘Changing topics?‘, in there the issue is better shown, you see it is not just about copyright, because that could have been dealt with quite easily. It was about Malcolm Turnbull’s anti-piracy forum. You see, if copyright was truly the issue, which would have been easy. But in that event the words ‘revenue‘ and ‘bandwidth‘ were very much skated around. Telstra was extremely cautious (and eager) to steer clear of that because in the case of Telstra, monitoring bandwidth, people actually stopping copying movies will cost Telstra billions! Now we see the consequence!

You see, America is figuring out that it cannot deal with its own ISP’s and they definitely cannot deal with the others like Telstra, Tele 2, Com Hem, KPN, TDC and a few others. They are doing it stepwise and the TPP will give them some options. Now back to that term that is laughingly referred to as ‘expected future profits‘.

One source states: “Losses to Video Game Makers Due to Piracy: $8.1 Billion“, based on what numbers? ISP’s state they cannot monitor. Then we get “Pirated Software Impact to Businesses: $63 Billion“. Again on what premise and how?

Well the first one gives us: “Video game piracy of hand-held games leads to the loss of about $8.1 Billion a year, as losses due to pirating of Sony PSP and Nintendo DS games between 2004 and 2009 lead to worldwide losses of nearly $42 Billion“. Here we see an interesting side. These are only two consoles. More important, these consoles have again and again limited legitimate access to games released in US and Japan again and again. So is this truly about piracy, or is the decision as seen here “Monster Hunter 3rd is the best-selling PSP game ever in Japan with 4,780,000 copies sold. Its PS3 HD remaster sold an excellent 500,000 copies as well, yet neither version is scheduled for an international release“. By the way, is the maker not guilty of discrimination? Let me be frank, I will not and have never condoned pirated games. I believe in getting a game and playing the original (I rarely buy games, so when I do, I will go for the VIP options that an original game brings). So, is this about piracy, or about segregation?

That part is harder to prove in the business case. The source “Business Software Alliance, “2011 BSA Global Software Piracy Study,” May 2012” is an issue. I cannot be certain how they got to $63 billion, but with so many illegal versions of Office, that number seems a lot more plausible. It is funny that there, US and China are the biggest transgressors representing a little less than one third of the entire lost stack. The UK is set at 1.9 billion and Australia less than a billion, yet how were these numbers achieved, through ‘rough’ estimation perhaps?

Now we get to the monkey’s banana moment “Losses due to Music Piracy: $12.5 Billion“, which is stated “According to the Recording Industry Association of America (RIAA)“, yes, they wanted the number to be as high as possible, because it made bad productions and louse representatives look a little better. In addition, some of these numbers cannot be decently vouched for in any way, shape or form. It boils down to well over 500 million CD’s, in a numbers game that number on a population of 7 billion seems small, but here is the kicker, that same source had the following, which I found illuminating: “In a survey of over 6,000 people in Finland between the ages of 7 to 84, researchers found that on average each person who downloaded pirated content online had about 2,900 pirated music files and 90 pirated movie files. The researchers who conducted the study believes that downloaders have more music files is due to the ease of downloading pirated music. According to the study, downloading movie files require faster internet speeds, more digital storage space, as well as a higher technological ability to playback movies“.

The term ‘each person’ now becomes really interesting, because 90 movies boils down to 360 Gb, and 2900 songs come to an rough (very rough) estimation of 14.5 Gb. A person downloading that much would be visible on the ISP counter. You see, you buy bandwidth monthly and downloading this much, as well as watching online and perhaps stuff they no longer have, you are looking at $80 a month, however, only 6 years ago, I paid $70 for 25Gb. you see how the picture changes? That is centre here. By the way, if you think that 25 Gb is little, consider that I have only hit that maximum once during my entire contract with my ISP and that was because on a Friday my system decided to update Windows 7, Office 2013 and my Adobe Master collection, which was quite the resource drain that evening.

Your online presence is now a danger in more than one way. In the first more and more ‘providers’ are forcing us to save on the cloud, forcing us using bandwidth. Now, I understand the first download, but many systems are now gearing towards less memory and more reliant on cloud drives. Which was my issue with the Microsoft Xbox One even before that system was launched.  Are those not streamed services? More important, my issue there was that once a service is disconnected, would we just lose it all overnight? Consider your movie and TV series collection. What happens when your old versions of Star Trek, Dexter and Game of Thrones are discontinued?

In addition, if online presence is essential for our services to run, how will that be monitored? I only need to refer to the Sony hack, to give you a first fright that certain owned items could be lost by a mere scripted command. Again, a situation the consumer is not ready and not prepared for. Now, in the case of PlayStation Home, there is some understanding that certain services will be lost, could a local copy have solved it? (I am asking, not telling). There are unresolved issues, mainly because the new technologies move so fast and to be quite honest, some considerations are new, we never had to make them before. We the consumer must accept that some parts are lost to us at some point. Yes, I loved HERO on the Atari 2600, but to expect that game to function 30 years later is not that realistic either. In that regard, we have attached to software (especially games) to the same extent we hold onto a book. They are not the same, which is a simple reality.

But the dangers of online remain, or do they? In that regard, the issues I raise are mostly about time. We see the failing of a game and losing out on what we spend within a year totally unacceptable, yet in that same notion, we should find peace in the notion that nothing lasts, it is all a mere matter of time. Yet, there we see a partial solution, we cannot realistically expect the provider to give ‘eternal’ support, but is a local version (no servers) after a while, or before the service is pulled a possible solution? That I have yet to see and it is not that far-fetched, because in the end, with the amounts of products and the change of IP, that part is slowly but certainly becoming an essential step to consider, especially in light for the business model of any software corporation. Consider you the player with your game of Halo, or Gears of War. I reckon that at some point, you will accept that online mode falls away, but how would you feel is the single player option falls away too, especially if you still have the console or PC to run it on?

A gaming dimension that will fall away at some point, but are we ready to let go of those moments? Now consider that your console/PC can no longer link to the service, even though you have the original disc. In the new DRM, it is entirely possible that no online verification means no playing the game. This is the certainty that we face and the TPP will push us there a lot faster than you realise. Should you doubt any of the last part, then consider the site gog.com. It holds some of the most brilliant games ever created (sold at very low prices), people still revere these games and many of them (especially the original dungeon keeper) will find a place in the heart of gamers. Moreover, several of these would make fine console games when adapted (higher graphics in most cases). I believe that the MSDOS Dungeon Keeper could be a hit 3DS game (like many other games on that site), even today.

Gaming is not about the latest game (decent graphics and sound aside) it is about joy and the games on that site are most pure joy to play.

Now you might all think that this is about games and many of you readers do not care about games, but now consider that same step when you look at your Office 365 account and the fact that you are pushed away from a version that works perfect for you (like the nightmare Office 2007 users faced in the past). There is an abundance of programs that offer a similar scary outlook.

Now translate this to collections you do care about. Your music, your TV shows, perhaps even your digital books. Do not take the word of those stating that it will not happen, because it will, it has happened in the past, it is happening now and it will happen in the future. The DVD and book on your shelf are a touchable item, that part is (if you treat them properly) secure, something online can be lost by merely removing a server or damaging its data. If someone states that this can never happen, then look at Sony, they experienced that event first hand.

Leave a comment

Filed under Finance, IT, Law, Media, Politics

The next cyber wave

The news is almost two weeks old. There was no real reason to not look at it, I just missed the initial article. It happens! This is also at the heart of the issue on more than one level. Consider the quotes “The first 13-week programme for Cyber London (CyLon) will kick off in April, with a group of startups drawn from industries including defence, retail, telecoms and health services” and “On the one hand, the government is keen to invest in cyber-security startups: witness chancellor George Osborne’s announcement that GCHQ is investing “£3bn over nine years into developing the next stage of national cyber intelligence”“. So is this just about getting your fingers on a slice of this yummy slice of income? You see, this issue skates on problem that I (many others too) saw that Common Cyber Sense existed, but the bulk of companies treated it as an overhyped requirement. Yes, those managers were always so nervous when they got introduced to ‘costs’. I reckon that the Sony hack will remain the driving force for some time, in addition several business units are more and more in need for some better up to data encryption, so this cyber wave is getting some decent visibility. So as we look at the title ‘Cyber London aims to make the UK a launchpad for cyber-security startups‘ (at http://www.theguardian.com/technology/2015/jan/28/cyber-london-accelerator-cyber-security-startups).

There is no denying that the call of 9,000 million is a strong one, especially in this economy. More important, as more companies are gripped by a decent amount of fear regarding their own future, this event will be at the foundation of several longer running projects and corporations. There is of course question on what is real. That question becomes an issue when we see that even now, rumours still emerge on what happened in regards to who did the works on Sony and how it was done, especially in light that the article in Business Insider claims that the hackers still have access. The latter part will be speculated on by me later in this article.

For the most, the next cyber wave is a good thing, especially when thousands of data holders realise that their corporate future depends on keeping these systems decently safe. I use the term decently safe, because ‘complete’ safety is not something that is achievable, not on budget levels that many depend upon. Yes, security can be better and a lot of companies will invest, they will raise the threshold of many companies, yet will they raise it enough? That is at the foundation of what is about to come.

I predict that these startups are all about consultancy and some will offer products, some on safety and some on encryption. Encryption will be the next big thing, the question becomes how will encryption be properly managed? There are plenty of people who enthusiastically encrypt files and after that forget the password. So what then, all data lost? So, you see that clever solutions are needed, which will bring forth a new wave of solutions, new barriers and new bottlenecks. I wonder if these new startup firms have considered a trainings division, not one that is all about ‘their’ solutions and ‘their’ products, but all about raising proper awareness for Common Cyber Sense.

Training that is meant to give long term knowledge to people working at a firm as well as setting a proper initiation of knowledge with these companies, so that a wave of change will not start a rollercoaster of people jumping from firm to firm, a risk many companies will predict to hit them.

Now it is time for some speculation. I have been thinking on how Sony was hit. I came up with a possible idea on New Year’s Eve. When I wrote this part: “In my view of Occam’s razor, the insider part is much more apt”, my mind started to wander on how it was done.

Speculation on the Sony Hack

The inside story is on the hack of Sony, yes, there was a hack at some point, but, in my view, that is not what actually happened. a destruction was started, but that is not what started it, that is how it all ended. When I did my CCNA (2011), I had the initial idea. You see, hacking is about data at rest, so what happens when the hack is done when data is in motion? That part is often not considered, because it seemingly unmanageable, but is it? You see, when you buy the Cisco books on CCNA you get all the wisdom you need, Cisco is truly very thorough. It shows how packages are build, how frames are made and all in great detail. That wisdom can be bought with a mere $110 for two books.  Now we get to the good stuff, how hard is it to reengineer the frames into packages and after that into the actual data? Nearly all details are in these CCNA books. Now, managing hardware is different, you need some decent skills, more than I have, but the foundation of what is needed is all in the Cisco IOS. The hack would need to achieve two things.

  1. The frame that is send needed to be duplicated and ‘stored’.
  2. The ‘stored’ data needs to be transmitted without causing reason to look into spikes.

I think that ‘hackers’ have created a new level (as I mentioned before). I think that Cisco IOS was invisibly patched, patched, so that every package would be stored on the memory card in the router, in addition, the system would be set to move 2% during the day to an alternative location, at night, that percentage would be higher, like 3-5%. So overnight, most of the data would arrive at its secondary location. Normally CCNP technologists with years of experience will look into these matters, now look and investigate how many companies ACTUALLY employ CCNP or CCSI certified people. To do this, you would need one insider, someone in IT, one person to switch the compact flash card, stating 64Mb (if they still have any in existence) and put the sticker on a 512Gb Compact Flash card. Easy peasy! More important, who would ACTUALLY check the memory card for what was on it? The Cisco people will look at the startup file and only that one. The rest is easily hidden, over time the data is transferred, in the worst case, the culprit would only need to restart the routers and all activity would be completely hidden, until the coast is clear, afterwards the memory cards would be switched (if needed) and no trace of what happened would ever be there. What gave me the idea? Well I wondered about something similar, but most importantly, when I did my CCNA, the routers had 64Mb cards, I was amazed, because these suckers are no longer made, go to any shop and I would be surprised if you can even find any compact flash card smaller than 16Gb. Consider a place where Gb’s of data could be hidden under the eyes of everyone, especially as Cisco IOS has never been about file systems.

When the job was finished, the virus could be released damaging whatever they can, when cleanup starts, every aspect would be reset and wiped, whatever the culprit might have forgotten, the cleaning team might wipe.

So this is my speculation on how it was done, more importantly, it gives credibility to the claims that the hacks are still going on and the fact that no one has a clue how data was transferred, consider that this event was brokered over weeks, not in one instance, who else is getting their data syphoned? More importantly have these people involved in this next cyber wave considered this speculated path of transgression? If not, how safe would these systems end up being?

Let’s not forget that this was no easy feat. The system had to be re-programmed to some extent, no matter how enabling Cisco IOS is, this required top notch patches, which means that it required a CCSI or higher to get it done, more important would be the syphoning of the data in such a way that there would be no visible spike waking any eager beaver to prove themselves. That would require spiffy programming. Remember! This is all speculation; there is no evidence that this is what happened.

Yes, it is speculation and it might not be true, but at least I am not pointing the finger at a military force that still does artillery calculations with an abacus (another assumption on my side).

There are a few issues that remain, I think upping corporate awareness of Common Cyber Sense makes all the sense in the world, I reckon that the entire Cyber Security event in London is essential and it is good to have it in the Commonwealth. This industry will be at the foundation of growth when the economy picks up, having the UK play a centre role is good strategy and if it does evolve in the strongest way, a global financial node with improved cyber protection will lead to more business and possible even better business opportunities. This event also gives weight and view to my writing on January 29th and a few other occasions “As small innovators are given space to proceed and as larger players are denied blocking patents to force amalgamation of the true visionary into their moulding process that is the moment when economies will truly move forward. That is how you get forward momentum!“, this is something I have stated on several occasions and I truly believe that this will be the starting pulse to a stronger economy. It seems that the event creators Alex van Someren of Amadeus Capital Partners, Grace Cassy and Jonathan Luff of Epsilon Advisory Partners, and advisors Jon Bradford of startup accelerator TechStars and Eileen Burbridge of venture capital firm Passion Capital are on such a path. No matter how it is started, they are likely to get a first leg up as these startups will truly move forward. As the event stated: ‘No equity taken’, but it seems to me that on the receiving end of implementing working solutions, finder’s fees and linked contracts could be very very profitable and let’s face it, any surfer will tell you that being at the beginning of the wave gives you the best ride of all.

Let’s see what 2015 brings us, startups tend to be not too boring. Not unlike startups, so will be more waves of speculations on how Sony was hacked, the US government will likely continue on how North Korea was involved and at the centre of it all.

 

2 Comments

Filed under IT, Media, Politics, Science

Double standards, no resolve (part 2)

Part two is not about Greece or the Greeks, it is about what has been behind several parts for a long time now. Yet, the visibility of certain events is now forcing another large change to the surface. First let us look at the events as we see them in the Guardian (at http://www.theguardian.com/technology/2015/jan/25/wikileaks-google-staff-emails-us-government).

The title ‘WikiLeaks demands answers after Google hands staff emails to US government‘ calls for a few thoughts, but I think you should consider a few quotes and then reconsider how you feel. The first one is “Google revealed to WikiLeaks on Christmas Eve – a traditionally quiet news period – that it had responded to a Justice Department order to hand over a catch-all dragnet of digital data including all emails and IP addresses relating to the three staffers“. The second one is “Harrison, who also heads the Courage Foundation, told the Guardian she was distressed by the thought of government officials gaining access to her private emails” and then we get “The investigation followed WikiLeaks’ publication, initially in participation with international news organisations including the Guardian, of hundreds of thousands of US secrets that had been passed to the organisation by the army private Chelsea Manning“. So this was specific! Let us not forget that this person (Manning) should be regarded as guilty of treason! This is nothing less than an intelligence analyst going beyond rogue! Manning was a simple E-1 private with no comprehension of the complexity of wars, especially the war the US found itself in, a theatre that is hard to grasp for some of the brightest generals (you know these highly educated, passed their middle age point individuals with a few decades of military experience, in the US seen wearing stars on their shoulders). No, Manning decided on the safety of hundreds if not thousands of lives. In addition US diplomatic efforts were thrown out of the window, setting economic options back for up to a decade, if not longer.

So when we see the response by investigative editor Sarah Harrison “Knowing that the FBI read the words I wrote to console my mother over a death in the family makes me feel sick“, seems a little hollow. For one the FBI does not care about her mommy, two, what did you expect to happen when you access unauthorised data to the size, scope and extent as Manning had transmitted?

I think Harrison is overreacting, if we accept chapter 13 in the Art of war, both the spy and the receiver of information should have been put to death. Is it not a good thing that it was merely investigated by the FBI?

Yet, there is a side that many are ignoring; many do so in an unintentional way, mainly because it tends to not hit us in any way. For that we need to take a step back to Forbes 2013 (at http://www.forbes.com/sites/robertwood/2013/08/06/excuse-me-apple-google-starbucks-h-p-irs-wants-to-tax-stateless-income/), here we see the following parts: “U.S. companies are said to have more than $1.5 trillion sitting offshore. Most claim that they must keep the money there to avoid the taxes they would face by bringing it back to the U.S.“, “the money at stake is enormous. Plus, the companies involved have treasure troves of cash for many war chests. Big and protracted battles seem inevitable. Still, some big companies may be in for battles that are even larger than they think. They may even need to think different” and “The OECD plan claims that companies like Apple and Google avoid billions in taxes. The G20 is made up of 19 leading world economies plus the European Union. It too has voiced support for a fundamental reassessment of the rules on taxing multinationals“. These thoughts all sound nice, but there is an additional element to all this. You see, as I stated more than once, currency is slowly on the way out (loosely approached). The nations that are left with manageable debt are now slowly but surely diminishing to zero. Greece may be the first one, but at minus 18 trillion, the US is the clearest one to end up with nothing, especially as those large US firms have become stateless. You see, now we get to the good part, the new currency will be IP, but here is the kicker, most (including me) seemed to forget that IP is more than Patents and Trade Marks, it includes data! Now we get to the nice stuff, you see, Google adhered to a situation, Twitter and a few others did not, or at least in a delayed way, but the new currency will include massive amounts of data and many players are now catching on that data is at the core a stateless, virtual and duplicable currency. No matter how Sony called its hack attack, does it now look a little clearer that those having a copy of that data are preparing for more than just a data dump? This is what McKinsey & Company had to say in August 2014 “Indeed, the analytics performed by actuaries are critically important to an insurer’s continued existence and profitability“, as well as “While the impetus to invest in analytics has never been greater for insurance companies, the challenges of capturing business value should not be underestimated. Technology, as everyone knows, changes much faster than people. The key for insurers is to motivate their highly skilled experts to adopt the newest tools and use them with creativity, confidence, and consistency” and finally there is “The proliferation of third-party data sources is reducing insurers’ dependence on internal data. Digital “data exhaust” from social media and multimedia, smartphones, computers, and other consumer and industrial devices—used within privacy guidelines and assuring anonymity—has become a rich source for behavioural insights for insurance companies, as it has for virtually all businesses. Recently, the release of previously unavailable or inaccessible public-sector data has greatly expanded potential sources of third-party data“. Yes, it sounds nice that there is public-sector data, but the one part no mentioned is how the analytics is not driven by those, but ascertained through private-sector data fields. You see the data that Sony had on its employees and on the actions of 70 million customers is a lot more insightful when you link it to medical records. Consider how much profit a company gets if it could ascertain more precisely the risk 7 million of its own customers are. If the connection of medical (obesity) and the gamer data of one person results in a $12 per month surcharge, what happens when we see the US having an obesity rating of around 32%? Now we have 70 million accounts and their gaming behaviour. So if we do the following math 32% of 70 million (falsely assuming that they were all American gamers), then we now get the number of people confronted with a $144 a year additive. So in one swoop, this data set gives way to an additional $3.2 billion for insurance fees. Data is going to be that simply applied sooner than you think. With the cloud being forever virtual (as one would think), people forget that a personal space is linked to a real location (wherever that drive is), but what when the data set is beyond massively huge? What if it is spread over several locations? How do we think then? You see Stateless data is not a new concept, but until recently it was never a realistic concept. It is interesting how tax dodging makes engineers a lot more creative.

At the foundation of all this is not the Wikileaks part, that part just illuminates the nutty side of data. Consider the amounts you as the reader had shared in the last 72 hours via Facebook, LinkedIn, SnapChat, Instagram and such. You freely distributed that, you gave up your privacy rights for whatever you openly published. Now consider that whatever you shared got collected. Several people were on vacation (so someone knows that their house is empty and possible unguarded), some revealed that they were sick (health data) and some revealed other details like parties attended and such.

Now the empty house is the most direct one, but not the most important one. Consider the times you updated your status that you were at home with the flu, or something else. Under normal conditions you just had a sickie, or perhaps another way. Now consider that someone now automatically collects the times you were sick, how does that affect your premium? How will your health cycle be analysed if you are shown to have attended 15-30, or even 50-100 parties a year? How long until this shows as detrimental on your health chart? Weirdly enough not having that does not lower your premium, but there is every evidence that doing it will increase your premium.

Do you think that this is over the top?

Then see the following (at http://www.qbe.com.au/Personal/Home/Managing-Your-Risk/Insurance.html). Here we see “Importantly, reducing the likelihood of making a claim helps protect your No Claim Bonus, helping to keep the cost of your insurance premium down“, which has been a truth for a long time. Yet when we consider the mention ‘Don’t alert people you are going away (including on social networking sites)‘. How long until someone combines the two? At reputation.com we see the following “Life insurance companies are increasingly turning to the Internet to determine a potential customer’s risk“, so if you like extreme sports, you might pay for that passion in other ways too. In addition, the one most disturbing was “Donating to charitable causes is a noble gesture, but if you show too great an interest in any particular medical-focused cause, say breast cancer research or prostate cancer awareness, it might indicate to insurance companies that you’re at a higher risk for certain illnesses“, that gives a possible (implied, but not proven), connection that your social responsibility comes at an insurance price. Did you consider that? And this is not starting this year, or next year. Some of these events started no later than 2010.

This all was nothing but to pave the way for that what comes next. You see, there are several sides to Google and Facebook. They are all about bandwidth and several nations are now seeing that even though Facebook is too large, there is a clear path that data is currency, so how long until we see a growth of radicalisation through localisation? This is not radicalisation in the violent way, but in the opposite way. You should see radicalisation of data, attained by washing all the data markers in local server environments. You can’t wash all the markers, but you can make access to it a lot less available. This is the fear Google (possibly Facebook too) has had for some time. As these privacy acts, that data acts and data collection rights of the US grew in a need for compliance, people become falsely fearful of what is dangerous and what is not. The US government ascertaining whether you are a terrorist is not a danger. An insurance company upping your fees by $150 through collected data is a direct danger (to your cost of living). Now we see the link as it gets us to the first story that included Greece.

There will soon be a higher need for localised connected providers. Localised forms of Hushmail (www.hushmail.com), where the people get encrypted mail accounts that can be accessed online, through the web. How long until mobile users will select encrypted android apps, that do not connect to Google, but to local Hushmail providers. We still have the internet, but it will now go through national portals. The fact that Sony happened was only a matter of time. The fact that people now want that there data comes with actual privacy is a growing wave. The Wikileaks issue was the most visible and the most harmless one (for us citizens at least). The world is changing a lot faster than last year and many are now getting clued in that the things of value have not been guarded in the right way.

We will soon see new options on cheaper internet, cheaper mobiles and on package deals, this is what was skated around when this so called IP hearing was going on. Yet, when we look at an earlier statement by Mr Turnbull, in regards to IP, who said at the time. “It is very, very, very difficult if not impossible for someone that is just selling connectivity, just providing bandwidth to then be monitoring what people are doing“.

This is at the heart of the problem, they live of bandwidth, because bandwidth implies data, and the more used, the more data collected, which leads to the better their lives are. This is why they do not want monitoring. I am fairly certain that as their bandwidth falls away, as people move to localised solutions, which remain at the core local, these providers will ‘suddenly’ opt in a ‘possible’ solution. Only at the end of the tether will an industrial give in. Oddly enough, with fear of privacy and the dangers of insurance exploitation on the rise that tether will end up a sudden two inches shorter and now those providers will have to share that what they never had to share before.

Greece has changed the way they play the game; now perhaps we can change the game that is played and make a first monumental change for all!

2 Comments

Filed under Finance, IT, Law, Media, Military, Politics

Authentically Realistic

Whilst we see many sources talk about the need of blaming North Korea, we see an abundance of changes that are now not just changing the way we think, but these changes will also change the way we live and act. As we are soon to be lulled into more false sense of security, we must now content with the thought, what is real and what is not.

In IT these issues have existed on several layers for a long time, yet the overall lack of Common Cyber Sense has been absent for a massive amount of time. Bradley Edward Manning, now known as Chelsea Manning is only one of several parts of this puzzle. Wikileaks has added its own levels of damage and let us not forget the acts of Julian Assange and Edward Snowden. This is not on how things were done; it is about a lack of proper measures and controls. In the age of people screaming that they have a right to know, they will publish whatever they can for the need of ego and then scream on how the government is abusing their right to privacy.

These are all elements that link back to ‘Common Cyber Sense’.

CCS as I call it has in its foundations a few branches. The first is proper use and knowledge. Many still laugh and sneer at manuals and proper use of equipment, yet when other people started to ‘look’ through their webcams on laptops into their privacy, smiles disappeared quickly. We live in an age where everything is set around the fake image of comfort, it is fake because comfort at the expense of security is never comfort, it is just an added level of danger into your own life. At this point people forget that what is set into software, can usually be switched on and off at the leisure of a skilled ‘someone else’.

Buying what is cheap and what is right are worlds apart, that part is more and more a given fact. The bulk of people are lulled into ignoration when it comes to a simple easy tool that can be used everywhere, at which time they forget to ask ‘by everyone?’. Consider the HP laptop (one of many brands) has a build in webcam at the top of the screen, instead of relying on a software switch, these makers could have added a little slide that covers the lens, literally a low-tech solution making the lens see nothing, as far as I can tell, no one took that precaution for the safety and security of the consumer, is that not nice?

The second branch is access. If I got $.50 for every person that uses their name, ‘qwerty’ or ‘password’ or even ‘abc123’ for their login, I could buy a small Island like Hawaii or New Zealand, probably even both. Even though many websites and systems demand stronger passwords, there is always that bright person who uses the same password for every site. This is part of a larger problem, but let’s move on for now.

Third is the connection branch, places where we can ALWAYS connect! You think that not having passwords on your home Wi-Fi makes you safe? Wrong! You could add loads of problems on every device that connects to it by not properly setting things up. I wonder if those with an automotive router have considered the dangers of not setting it up properly and letting all the people they pass access to whatever is connected to it in the car.

The fourth branch is for the unknown. This might seem like a weird option, but consider how fast movable technology is growing, I am using ‘movable’ and not mobile, because this changing field includes phones, laptops, PDA’s, tablets and other not yet defined devices (like the apple watch, handheld game systems and consoles).

At the centre of all this is proper usage, but not just your hardware, it also includes your software, a fact many have remained oblivious to.

At this point, I will take a temporary sidestep and let you consider the following term ‘non-repudiation’.

Non-repudiation is about identity and authentication. Basically it states, ‘you and you alone‘ have sent this item (message, photo, financial transfer). In legal reasoning this will be the strong shift that will most likely hit many people in 2016 and onwards, it could hit you this year, but there are more than just a few issues with this situation for the immediate now. So when you lose your money and you state you were hacked, then you might soon have to prove it, which means that any evidence that you EVER gave your password or pin-code to a spouse, lover, boy/girl friend or sibling means that you nullified your rights. You get to pay for the consequences of THEIR acts at that point.

So when we see biometrics, we think fingerprint, we expect to be a lot safer. WRONG! Only last month did a group in Germany show how they recreated the finger print of the German Defence minister from simple digital photos, which means that this could have given them access to a whole collection of items, events and information they should not have gotten access to. So what to do? Well, that market is growing really fast. ‘Vein’ is the latest. It does not rely on fingerprint, but on the veins in a finger or hand, it is just as unique as a fingerprint, it is a 3d issue, making it even more secure and it requires an actual living hand. It also will lack the dangers of influence that a retinal scan has when a woman gets pregnant, or in case of a diabetes patient or alcohol levels. These all can shift retinal scans, with the added problem that this person stays outside the lock, becoming the valid person ‘no-more’. Yet, ‘Vein’ is still a new technology and not currently (or in the near future) available for movable devices, which gives us the issue on what devices are actually decently secure.

Let’s not forget, that even though this is not an immediate issue, the people will need to change their possible ‘lacking’ approach with more than just slow muffled interest, whilst they rely on the comfort of not having to comprehend the technology. That part is still not completely disregarded in several cases, the issue at Sony being likely the most visible one for some time to come. There is still a massive amount of actual intelligence missing. Most speculate, including me (yet I have been looking at these speculators and claimers of facts). Whilst Sony is visible, there are still unanswered issues regarding the NSA and how a place like that had the implied intrusion Edward Snowden claimed to have made.

Now let us take a step back to the four branches. I showed the webcam issue in the first branch, but the lack of consideration by the user is often a bigger problem. You see, many ‘lock’ their device, or just walk away and switch their screen off. Their computer remains connected and remains accessible to whoever is looking for a place to hack. I know that waiting 45 seconds is a bother at times, but learn to shut down your computer. A system that is switched off cannot get hacked, the same applies to your router (which actually has the added benefit of letting your adapter cool down, making the device last longer) and your overall electricity bill goes down too, all these benefits, all neglected for the fake comfort of accessing your social media the second you come home. Yet proper usage also includes software upgrades. Many do them, but more often than not, they tend to be made when the system reboots, when this is not done (or the software upgrades are not made) your system becomes increasingly at risk for intrusions of all kinds. Windows 7, which is a lot better than either Vista or Windows 8, still required 84 patches in 2014. With over half a dozen being either critical or important, you see why even in the best of times, under all conditions met, you still run some risk. And this is just Windows; in 2013 they had to fix 47 vulnerabilities regarding Outlook, explorer and the Windows kernel. There was a massive issue with remote execution, which means that your system was open to the outside without the need for a login (source: PCWorld). Now, to their defence, Windows and office are massive programs, but still, it seems that Microsoft (not just them) have taken a strong stride towards ‘comfort’ whilst ignoring ‘safety’ (to some extent).

Branch two is usually the biggest flaw. Even though many websites will require a decent level of strength (usage of small and capital letters, numbers and a special character), but that list is still way too small. The amount of people that I have met that use the lamest of simple words (like ‘abc123’) and these people cry the loudest when their money is gone. You see, it is easier to just hack your computer or device and use that system to order online via other means then it is to hack into your bank account. Yes, it is a bother (at times) to remember every password, yet in that regard you could be clever about it too. There is nothing stopping you from creating variations on a password whilst making sure it is a completely different one. I learned that someone had used her dictionary app to use a version of word of the day, she changed ‘adscititious’ into something like ‘Adsc1t!tious’. Good luck figuring that one out! (I had to look up the word in all honesty), the options become even more interesting if you speak additional languages. So, branch two is something that you the user largely control.

Branch three is actually the growing danger. It is not just when we connect, but when things connect automatically that becomes an issue (and where from). Insurance companies are more and more about your visibility, even though no official moves have been made, the day that junior uploads that catch of the day to his Facebook with dad in the background. That is the option for the members from the ‘institute of discrete entry and removal operations’ to help you with your old stuff (the missing items when you get home). The information you ‘give’ when you connect (especially on free Wi-Fi places), you see, when you connect to free Wi-Fi, more than one danger exists that others can connect to you, yes, you could learn that free Wi-Fi was the most expensive part of your vacation soon thereafter. It however moves more and more to your area of usage. As we get more connections and as we can connect from more places (like the automotive router), we will receive additional responsibilities in setting devices up properly for our safety and the safety of our children.

Now, to take a second sidestep. This is not about scaring you (a nice benefit for sure), some of these things can be prevented from point zero. Knowing what you switch off, switching off when not used are first easy and elemental steps. You see, a hacker looks for a place to get into, when your computer and router are switched off, the hacker will not spot these devices at all and move on. Hackers do not like to waste time, so when you use proper passwords, that same hacker will lose a lot of time getting access to your devices, time he could be having ‘fun’, so these two elements are already diminishing the chance of you getting transgressed upon. But in the end, there is another side. Makers of hardware and software need to become increasingly aware that their ‘toys’ have malicious usage. It was Geek.com that had the article ‘Yes, Xbox One Kinect can see you through your clothes‘ (at http://www.geek.com/games/yes-xbox-one-kinect-can-see-you-through-your-clothes-1576752/), which gives an interesting demo (without showing off anything indecent) how defined and articulate the scan system worked and it is a hackable solution, even there we see the mention that a lens cover would not have been a bad idea.

Yet we have digressed away from the heart of the matter. All these are linked, but the crown in the hardware is an increasing need for non-repudiation, showing that you and only you acted. A lack of this evidence could also go a long way in proving that you were innocent and that you were the victim. It is easy to claim that the makers are at fault and to some degree they are, but there is a growing need to have the right solution, and so far having any clean solution remains absent, whomever comes up with that could own the cornerstone of the global technology sector, an area that represents a massive amount of long term revenue.

 

Leave a comment

Filed under IT, Law

Slander versus Speculation

There is a lot wrong in this world, we cannot disagree with that. Soon we might see rental prices go down in London, because of Superman (the New Ecstasy), yay to those needing an apartment, being free of drugs was never so nicely rewarded! So is this speculation, or slander?

We could debate my sense in taste (many have for decades), yet in the firm juridical ground, when can speculation be regarded as slander?

That part is more and more a question when we consider the US sanctions against North Korea. Oh, and perhaps we forgot to mention that Sony Is a Japanese firm (even though the crime was on US soil), giving additional spotlights to the reasoning of certain actions. Consider the following sources. First let’s take the BBC (at http://www.bbc.com/news/world-us-canada-30661973). Here we see sanctions against organisations and individuals. First there is “Jang Song Chol: Named by the US Treasury as a Komid representative in Russia and a government official“, then there is “Kim Yong Chol: An official of the North Korean government, according to the US, and a Komid representative in Iran” and last there is “Ryu Jin and Kang Ryong: Komid officials and members of the North Korean government who are operating in Syria, according to the US“. Now the article ends with the most hilarious of all quotes “White House officials told reporters the move was in response to the Sony hack, but the targets of the sanctions were not directly involved“.

So the White House is within this part confessing to the breach where they are targeting innocent civilians (of that crime at least)? Can anyone explain to me how this is anything less than legalised slander? Consider that if (not when, but if) they ever figure out who exactly was responsible for the Sony hack (the actual individuals involved), how the US government could be held responsible in any court of law for this. Consider this part (source was the APA of all places, at http://www.apa.org/about/gr/issues/violence/hate-crimes-faq.pdf). “Current federal law defines hate crimes as any felony or crime of violence that manifests prejudice based on “race, colour, religion, or national origin” (18 U.S.C. §245). Hate crimes can be understood as criminal conduct motivated in whole or in part by a negative opinion or attitude toward a group of persons. Hate crimes involve a specific aspect of the victim’s identity (e.g., race)“. If we clinically look at the facts, then these acts are a hate crime against North Korea.

Now, let’s be fair as well. Most will not care, I reckon that the North Koreans might not even care, but this act does remain a legal transgression!

Let me show you why (because without reason, there is nothing), part one is found in yesterday’s news in the Guardian (at http://www.theguardian.com/technology/2015/jan/02/sony-hackers-may-still-access-computer-systems-the-interview).

Here we see the following parts:

  1. Sony Entertainment is unable to confirm that hackers have been eradicated from its computer systems more than a month after the film studio was hit by a debilitating cyber-attack, a report says

So not only has the hack occurred, it is very possible that the transgression and the damage is currently still ongoing, in addition, one of the most watched and scrutinised nations is still accessing Sony? Not one press agency is asking the questions that matter. For example, there was some visible Press Tour into North Korea (must have been around when Kim Jong-Un was elected big boss in 2011), when we saw some of the filmed events there, we saw North Korean officials in total disbelieve that a smartphone could take photographs and these people walked over Sony’s cyber security?

Now we get to the Chief Executive of Sony himself, his quote gets us the following:

  1. “It took me 24 or 36 hours to fully understand that this was not something we were going to be able to recover from in the next week or two,” Lynton told the Wall Street Journal

So this was not a mere grab for data, this is a system paralyses of sizeable renown, the hack was so complete, high paid executives could not get their minds around the events. So, are we still looking at North Korea? Basically this requires an evolved form of ‘stuxnet’, the hack was seemingly more complete then the stuxnet virus could achieve. We now have only three players left. Russia, China and whatever hacking organisation walks around within the US and its allied nations. How is North Korea anything else but a mere puppet for slander? Whilst some people are possibly hiding their lack of skills, and likely other people linked to all this are trying to cover up issues that have been ignored ever since the first hack of 2011 (the Sony PSN hack). By the way, I am using stuxnet as a comparison, I have zero knowledge how the transgressions was done, but we can all agree it was way beyond a normal level of sophistication.

Yes there is another scenario and I will get to that soon, North Korea is not off the hook yet!

You see we have been looking at the event, but not at the capital involvement that is two tiered at present.

  1. Sony’s network is expected to be fully operational within the next two months but hackers have so far released only a tiny fraction of the 100 terabytes of data they claim to have stolen“, so not only will it take months to repair security measures, the fact that the new fences are there are still no guarantee that the data remains safe.

When gets us to the first tier. Data! Someone streamed 100 Tb, which is more than just a number; it would require every PlayStation 3 on the planet to download up to 2Mb. The fact that this is not monitored, or that is got through to this extent, is a first view that this was no mere trifle event. And even though 100,000 Gigabytes seems small when compared to the PSN issues, it becomes interesting when we consider that the PSN had been hit more than once, but as those members did not all download, where did all this data get syphoned to?

Now we get to the one part that might be regarded as tier two. You see, it is not just the amount taken, which takes a good server park to store, it goes back to issues I discussed in regards to piracy and the parts I mentioned in my blog ‘For our spies only!‘ on September 26th 2014. There I stated “in the end this is NOT about copyright, this is about bandwidth“, the big players all knew it and they were all very concerned if such events would start to get measured and logged. Now someone casually walked away with 100,000 gigabytes of data?

Before I restate, it was not North Korea, let us take a look at another article by the Guardian in that regard. The title is ‘North Korea may have hired outside hackers for Sony attack, says US‘ (at http://www.theguardian.com/world/2014/dec/30/north-korea-hackers-sony-pictures-cyber-attack) and it was written on December 30th. Now we must consider the following: “US investigators believe that North Korea most likely hired hackers from outside the country to help with last month’s cyber-attack against Sony Pictures, an official close to the investigation has said“. The operative word is ‘believe‘, they just do not know. As a speculation that would be my guess as North Korea does not have the skill needed for this, not even close. By the way, those hackers might want to get paid, how will North Korea do that, or perhaps that is beyond US oversight too, because it would be a sizeable amount for something this complete.

The next part is the part that opens the discussion ““The FBI has concluded the government of North Korea is responsible for the theft and destruction of data on the network of Sony Pictures Entertainment,” it said in a statement“. The first question: What evidence?  As stated before, North Korea is lacking in many ways, the fact that they hacked past Sony to this extent, whilst at present no guarantee can be given that the systems are secure at all, whilst North Korea has been watched 24:7 for a long time now gives rise to the demand of evidence showing the guilt of North Korea. So, they are seemingly better than the cyber divisions of both Russia and China? I am not buying it, in addition, the fact that the article implies that outside help was engaged for a hack this thorough leaves us with two thoughts.

  1. If true, where is the real balance of power in cyberspace, because this now implies that North Korea is a real player, even though no one (including people a lot more intelligent than me) have concurred that North Korea does not count when it comes to the internet and cyberspace.
  2. If false, what incompetence is the US hiding from us all and is that not the true crime?

Consider this quote (from the Guardian article too): “Some private security experts have begun to question whether Pyongyang was behind the Sony cyber-attack at all. The consulting firm Taia Global said the results of a linguistic analysis of communications from the suspected hackers suggested they were more likely to come from Russia than North Korea. The cyber security firm Norse said it suspected a Sony insider might have helped launch the attack

I cannot disagree with Taia Global, as this could be Russia hitting back at US sanctions, but that would be speculation on my side, I also very much agree with Norse. Consider that if someone walks into a bank vault and it is empty. There was no sign of break in, the doors were not forced. At this point the police and the FBI will initially look at ‘the insider’ plot. It makes perfect sense. To get past the Sony server parks to this degree someone was giving aid in some way. Initial passwords, the network structure, because if that was not the case there would be a lot more logging evidence to giver clear view whether North Korea was guilty (or not involved).

Mark Rasch hits the nail on the head with this quote ““I think the government acted prematurely in announcing unequivocally that it was North Korea before the investigation was complete,” said Mark Rasch, a former federal cybercrime prosecutor. “There are many theories about who did it and how they did it. The government has to be pursuing all of them.”” there is the crux, the mention of theries on who did it. Even if it is outside help, Russia would still make more sense, the Russian Mafia could be the front for cashing in on selling the data, they pay commission to the people ‘hurt’ through US sanctions, they are looking at the least likely suspect because of a comedy, one that I (and many others) had not even heard of before these events.

It is the last quote that is food for thought from Kevin Mandia of Mandiant “Mandia, who has supervised investigations into some of the world’s biggest cyber-attacks, said the Sony case was unprecedented. “Nobody expected when somebody breaks in to absolutely destroy all your data, or try to anyway, and that’s just something that no one else has seen,” he said

That part is not entirely true, I remember the DBase virus of 1988, I remember some people who had fallen victim to them, a garble parser that does not show until the virus is removed, it leaves your data garbled from that point forward. There was also a data virus in the 80’s. I forgot the specifics, but whilst most viruses would attack ‘.com’ and ‘.exe’ files, this one would attack data files, until that day a truly scary moment. So, it is not entirely unprecedented. Consider, if you copy someone’s data, the best sale is to sell it to the competitors, yet, what happens if the owner no longer has that data, does that not drive up the price? Yet, it is bad tactics, to copy in secret and resell it all makes perfect sense, the fact that these events happened, whilst Sony IT, the Cyber divisions of the FBI and others are not able to track the events is something very novel. It is a first to this degree, do you now understand why it makes no sense to accuse the one nation where we see this as their highlight: “Aug 6, 2013 – North Koreans hungry for tech skills are buying up used desktops on the black market, these desktops smuggled in from China have become a much sought-after item in North Korea“, this is the nation that thwarted one of the biggest cyber power players?

People please wake up. The question becomes what was real? I call my version insightful speculation. I have been involved in IT since the 80’s, this level of hacking requires serious system skills with in depth knowledge of all layer one components (hardware layer), if we ignore the inside job part, this takes North Korea out of the loop, it also removes a massive amount of hackers of the table too. It requires the skills we would require to see from people at the NSA and other high tiered cyber firms. From these facts I come to three options:

  1. The hackers are a new level of hacker with the ability to get past the security of nearly any large firm and government data system.
  2. Sony has been criminally negligent and the US is willing to ‘aid’ this Japanese firm for a price.
  3. A simple inside job (possibly even a disgruntled employee) with links to organised crime.

Please feel free to give me a valid fourth alternative.

 

1 Comment

Filed under Finance, IT, Law, Media, Military, Politics

Last Clooney of the year

My idea of stopping my writing until the new year has truly been bombarded into a sense of that what is not meant to be, so back to the keyboard I go. One reason is the article ‘‘Nobody stood up’: George Clooney attacks media and Hollywood over Sony hack fallout’ (at http://www.theguardian.com/film/2014/dec/19/george-clooney-sony-pictures-hack-the-interview), which I missed until this morning. So has the actor from ER become this outspoken because of his marriage to Human rights lawyer Amal Alamuddin? Nah! That would be incorrect, he has been the champion of major causes for a long time, outspoken, thinking through and definitely a clever cookie with a passion for Nespresso!

The article kicks off with a massive strike towards to goal of any opponent “George Clooney has spoken of his frustrations with the press and his Hollywood peers at failing to contain the scandal around The Interview, which Sony has pulled from cinema release as well as home-video formats“. It goes a lot deeper then he spoke it does, perhaps he fathomed the same issues I have had for some time now, some mentioned in my previous blog ‘When movies fall short‘ (at https://lawlordtobe.com/2014/12/15/when-movies-fall-short/), two weeks ago.

I will take it one-step further, several players (not just Sony) have been skating at the edge of competence for some time now, as I see it, they preferred contribution (revenue minus costs) regarding issues of security. It remains debatable whether this was intentional or just plain short-sightedness, that call requires levels of evidence I have no access to.

By the way, Mr. Clooney, you do realise that this topic has the making of an excellent movie, not unlike the largely unnoticed gem ‘Margin Call‘ with Kevin Spacey, Paul Bettany and Zachary Quinto.

The one quote I object to (to some extent) is “With just a little bit of work, you could have found out that it wasn’t just probably North Korea; it was North Korea … It’s a serious moment in time that needs to be addressed seriously, as opposed to frivolously”. You see, the inside job is a much more likely part. Yes, perhaps it was North Korea (requiring evidence), yet this would still not be the success they proclaim it to be without the inside information from disgruntled (or greedy) employees. In addition to the faltering security Sony has needed to ‘apologise’ for twice now (the Sony PSN hack of 2011), none of which was correctly covered by the press regarding this instance either. There was the press gap of November 2013, so we have at least two events where the press catered with silence, but at the price (read: reward) of….?

Yet the part: “He joins others who voiced their dismay at Sony’s decision, including Stephen King, Judd Apatow and Aaron Sorkin. Rob Lowe, who has a small role in The Interview, compared Sony to British prime minister Neville Chamberlain and his capitulation to Nazi Germany before the second world war“, is more than just a simple truth, it shows a fear of venue, cater to the profit. Chamberlain was from the old era and he failed to perceive the evil that Adolf Hitler always was. That view was partially shown by Maggie Smith in ‘Tea with Mussolini‘ too, yet the opposite was strongly shown in Remains of the Day, when Christopher Reeve as Jack Lewis states: “You are, all of you, amateurs. And international affairs should never be run by gentlemen amateurs. Do you have any idea of what sort of place the world is becoming all around you? The days when you could just act out of your noble instincts, are over. Europe has become the arena of realpolitik, the politics of reality. If you like: real politics. What you need is not gentlemen politicians, but real ones. You need professionals to run your affairs, or you’re headed for disaster!

This hits the Sony issue straight on the head. Not that the Gigabytes of data are gone, but that they got access to this data at all. IT requires a new level of professionals and innovator, a lesson that is yet to be learned by those having collected Exabyte’s of data. It is a currency that is up for the taking with the current wave of executives that seem to lack comprehension of this currency. Almost like the 75-year-old banker who is introduced to a bitcoin, wondering where the gold equivalent is kept. The new order will be about IP, Data and keeping both safe. So, it is very much like the old Chamberlain and Hitler equation, we can see Chamberlain, but we cannot identify the new Hitler because he/she is a virtual presentation of an identity somewhere else. Likely, a person in multiple locations, a new concept not yet defined in Criminal Law either, so these people will get away with it for some time to come.

Yet the final part also has bearing “Clooney was one of the Hollywood stars embarrassed by emails being leaked as part of the hack. Conversations between him and Sony executives showed his anxiety over the middling reception for his film The Monuments Men, with Clooney writing: “I fear I’ve let you all down. Not my intention. I apologize. I’ve just lost touch … Who knew? Sorry. I won’t do it again.”“, personally he had no reason to be embarrassed, when your boss spills the beans (unable to prevent security), do you blame the man or the system that is this flawed?

Why has it bearing? Simple, he shows to be a man who fights and sometimes fails. He states to do better, just as any real sincere person would be, a real man! By the way, since 2011 Sony still has to show such levels of improvement. A lacking view from the people George Clooney served in a project, so we should not ignore the need to look at those behind the screens and the press should take a real hard look at what they report and on where their sources are, that same press that has not scrutinised its sources for some time. When was the last time we asked the press to vouch for ‘sources told us‘?

Consider the quote “We cannot be told we can’t see something by Kim Jong-un, of all fucking people … we have allowed North Korea to dictate content, and that is just insane“. As I mentioned in the previous blog, with the bulk of the intelligence community keeping their eyes on North Korea, why is there no clear evidence that North Korea did this? Not just the US both United Kingdom and France have access to an impressive digital arsenal, none have revealed any evidence. Consider that the École polytechnique under supervision of French defence is rumoured to be as savvy as GCHQ, can anyone explain how those three cannot see clearly how North Korea did this? So, either, North Korea is innocent and just surfing the waves of visibility, or the quote by George Clooney in the Guardian “the world just changed on your watch, and you weren’t even paying attention” would be incorrect. The quote would be “the world just changed on your watch, and those in charge do not comprehend the change“. In my view of Occam’s razor, the insider part is much more apt, the other option is just way to scary, especially as the IT field is one field where North Korea should be lacking on several fronts.

I will let you decide, have a wonderful New Year’s eve!

Leave a comment

Filed under Finance, IT, Law, Media, Military, Politics

When movies fall short

There is nothing as intensely satisfying as when we are confronted with a reality that is a lot more entertaining than a movie would be. Those are moments you live for, that is unless you are a part of Sony and it is your system getting hacked. Life tends to suck just a little at that point.

This is not the latest story to look at, but in light of the elements that have been visibly resolved, it is the best one around. Some will state that the Hostage story in Martin’s Place, Sydney is the big issue, but that is an event that is getting milked for every second possible by the media, I checked! The price of chocolate remains unaffected, so let’s move on to Sony!

The first part is seen in the article ‘Sony hack would have challenged government defences – FBI’ (at http://www.theguardian.com/technology/2014/dec/12/sony-hack-government-defences-fbi), those who think it is new news seem to have forgotten the issues people had in May 2011 (at http://uk.playstation.com/psn/news/articles/detail/item369506/PSN-Qriocity-Service-Update/). “As the result of a criminal cyber-attack on the company’s data centre located in San Diego, California, USA, SNEI shut down the PlayStation Network and Qriocity services on 20 April 2011, in order for the company to undergo an investigation and make enhancements to the overall security of the network infrastructure” 77 million accounts were compromised and the perpetrators got away with a truckload of data.

So when we see the quote “The cyber-attack that crippled Sony Pictures, led to theft of confidential data and leak of movies on the internet would have challenged almost any cyber security measures, the US Federal Bureau of Investigation (FBI) has said“, we should consider the expression once bitten twice shy and not, when bitten use antiseptic, go into denial and let it be done to your network again.

The fact that this revolves around another branch of Sony is just ludicrous, it’s like listening to a prostitute stating that the sick man used the other entrance this time, so we need not worry! If you think that this is an over the top graphical expression, consider that twice in a row that the personal details of millions in the form of data ‘leaked’ to somewhere.

The second quote will not make you feel any safer ““In speaking with Sony and separately, the Mandiant security provider, the malware that was used would have slipped or probably got past 90% of internet defences that are out there today in private industry and [would have] challenged even state government,” Joseph Demarest, assistant director of the FBI’s cyber division told a US Senate hearing“, as we know that governments tend to be sloppy with their technology as they do not have the budgets the bulk of commercial enterprises get, we can look at the quote and regard the statement to be a less serious expression of ‘do we care’, which is nothing compared to the ignored need to keep personal data safe.

You see, commercial enterprises have gotten sloppy. getting newly graduates to look into a system where you need seasoned veterans and you need a knowledge base and a good setup, all factors that seem to be in ‘denial’ with a truckload of companies the size of Sony, as they are all cutting corners so that they can project revenue and contributions in line with the ‘market expectations’.

The quote that becomes interesting is “A link between Gop and North Korea has been muted over Pyongyang’s reaction to the Sony Pictures film The Interview, which depicts an assassination attempt on Kim Jong-un“, so is this group calling itself Guardians of Peace (Gop), the ‘simpleton’ group they are trivialised to be, or is there more. You see, we see a growing abundance of data collections that seem to go nowhere, but is this truly the case? You see, data is money, it is a currency that can be re-used several times, the question becomes, finding someone willing to buy it. If we regard the 2 billion Microsoft paid for Minecraft to be more than just the IP of the sandbox game, then what is it? Which part of that 2 billion is seen as value for the 120 million registered users on PC? Do you now see the currency we are confronted with?

In my book the Sony exercise is a display of the expression ‘a fool and his money are soon parted‘. In light of the 2011 issue, the fact that security was increased to the extent that it could be done again makes for entertainment on a new level, in addition, like a bad infomercial it does not stop here, no! For $9.95 you get so much more then you see now. That we see in the article that was published two days before that (at http://www.theguardian.com/technology/2014/dec/10/fbi-doubts-north-korea-link-sony-pictures-hack). The part that should make you howl like a hyena is seen here “The security firm hired by Sony to investigate the attack, FireEye, described the attack as an “unparalleled and well-planned crime, carried out by an organised group, for which neither SPE nor other companies could have been fully prepared” in a leaked report“, So did you notice ‘unparalleled and well-planned crime‘ and ‘leaked report‘, oh sarcasm, thy name be Miss Snigger Cackle!

The leaked report, which was from the 7th of December (at http://recode.net/2014/12/07/sony-describes-hack-attack-as-unprecedented/) gives us “demanding that organizations which have obtained the leaked information avoid publishing any more material from the hackers, and destroy existing copies. Boies called it “stolen information.”“, you see, the issue here is that if we consider the quote “This attack is unprecedented in nature. The malware was undetectable by industry standard antivirus software and was damaging and unique enough to cause the FBI to release a flash alert to warn other organizations of this critical threat“, so even after the malware, info was still going past the firewall, or was this just ‘leaked’ by an internal source? It takes a little twist when we look at the quote in the December 10th article “The malware had been signed and authorised by Sony Pictures, allowing it to bypass certain security checks“, in my mind this reads as follows: ‘Some idiot gave a pass to malware to roam free on the system‘, so is it that, or was this an internal operation all along? If the second part is true, then who was the beneficiary of all that private data? Who is it means for? You see, many forget that our information is not always for stealing from our credit cards, sometimes it is used to profile us, as a customer, as marketing or as leverage. Why the word leverage? Consider healthcare, consider usage, what happens when an insurance company gets to profile 20 million couch potatoes, what if your healthcare premium suddenly goes up by 15%, do you have any idea how much money that is? So as insurance companies keep the leveraged margins of charge, whilst overcharging risks in addition, we see a growing margin of profit for these insurance companies, whilst getting them to pay for what you are insured for has not gotten any easier has it?

So is this simply a cinematography from Sony Pictures film, called The Interview, which depicts an assassination attempt on Kim Jong-un, or was that the smoke screen? The FBI seems to have ruled out North Korea, as far as I have been able to tell, the only fans of North Korea are the North Koreans and Dennis Rodman (who has no fame in any IT endeavour), so is there enough doubt regarding the reality of what happened and why it happened? Yes, as I see it there is, the question becomes, when there is this much smoke, where are we not looking? That part is to some extent seen in another Guardian Article (at http://www.theguardian.com/film/2014/dec/12/hackers-attack-film-studios-sony-pictures-leak-cybersecurity-warning). We see this quote “Sean Sullivan, senior adviser and researcher at the security company F-Secure, said that he believes the purpose of the Sony hack was extortion. “If it was just hacktivists, they’d have released everything all at once,” he said. “But these releases, it’s like they’re shooting hostages. One thing one day, another the next. This is a really different tactic from what we usually see.”“, this is certainly plausible, but is that it? Why ransom of data and sell it back with the FBI and others on your tail, when you can sell it in Hong Kong, Bangkok, Riyadh and a host of other locations. A simple transaction for an external encrypted drive, a deal you can offer to ALL parties for amount X, the more you offer, the higher X is.

Whilst our data is sold on and on, we run additional risks of getting invoiced for our lives choices and extorted by other financial firms because our privacy is no longer a given in the age of data and it is directly linked to corporations that cannot clean up their act. In the mean time we see leaked report on impossible hack successes, whilst it took only one executive to ‘accidently’ sign and authorise a mere trinket of malware.

So yes, the movies are falling short; reality can be scary and entertaining all at the same time. The question becomes, will there be a change to our invoice of life because of corporate considerations, or lack there off?

 

1 Comment

Filed under Finance, IT, Law, Media, Science