intrusion

Twitter, Trump & Tunnel Vision

When I speak in public or meet with clients, a problem I discuss is digital tunnel vision, a shortsightedness that I believe has come to exist in the digital age. Corporations spend tremendous amounts of money to protect against outside intrusion. Although, some companies are failing when it comes to protecting against in-house intrusion. Twitter & Trump is an excellent example of inside invasion and digital tunnel vision.

There is no doubt that Twitter spends millions on digital security but my question is how much have they spent on inner-intrusion. Or have they even considered the fact that the wrong person can use them as an information weapon. The action of deactivating Trump’s Twitter account created no dangers, but it could have. The could have here is the real issue and threat. What if a rogue nation bribed the Twitter employee to post a message with far more dangerous words. Disaster could have befallen.

When I first began skip tracing an social engineering in the eighties my tagline was “Information is the greatest tool!” and it is, no doubt. The problem is that information can destroy people and companies. Now we are seeing how it is manipulating and dividing society.

Two items here, I believe companies should have a broader picture of the part they play in the world. Also think about how one employee could be the inner hacker, that lights the fuse of destruction. The curious question now is which organization will be used next as a pawn by an employee?

Frank M. Ahearn
http://www.FrankAhearn.com

Advertisements

The Mind – The Only Place For Freedom!

A new year and new thoughts about privacy. What I have been thinking about is what happens when smartphones go beyond being smart? I am not talking about the rise of the machines and other fine Hollywood fantasies. Although, Hollywood fantasies tend to be on the mark. What I mean is when hardware will be able to extract information from us by touch. Maybe they can now, I do not know. I am not referring to when your thumb or retina unlocks an iPhone or laptop. But when you pick up a random mobile phone or laptop will it ever be able extract our fingerprints or DNA? I know these are not original thoughts but I do feel these are thoughts we should ponder.

In privacy, the initial strategies are always how avoid or combat intrusions. It is difficult to imagine how one would go about using technology if machines could extract information from humans. The same way humans extract information from machines. Creating and protecting privacy always comes down to who is better at the game.

We know we are being tracked online and watched by the eye in the sky or the random person across from us with a Twitter account. So the question is, when do the machines come alive and join the party? When must we become concerned about that human to machine touch? How we will live free among this coming predation. Maybe the mind will be the only place available for privacy and freedom.

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Art of Disappearing: 199 Essential Privacy And Disappearing Tips