Monday, October 31, 2016
Scammers The Rise Of Cyber Crime In Britain Documentary 2015
Fascinating documentary regarding cyber-predation in Great Britain and how all levels of government, as well as NGOs, are working together to raise awareness and trying to proactively fight the a never-ending fight.
Friday, October 28, 2016
Next Generation Identification
Since early 2011, in
an effort to increase resources available to law enforcement (LE), the Federal
Bureau of Investigation (FBI) has incrementally rolled out their Next
Generation Identification (NGI) system which not only enhances the preexisting
Integrated Automated Fingerprint Identification System but expands the biometric
data-capture function exponentially. According to the FBI, NGI advancements
will “increase the range and quality of its identification and investigative
capabilities (Federal Bureau of Investigation,
n.d.) ”
through components such as the Advanced Fingerprint Identification Technology,
Repository for Individuals of Special Concern, Latent and Palm Prints, Rap
Back, Facial Recognition, and Iris Scan (still currently being beta-tested). NGI
additionally enables multi-national collaboration, an especially important
feature in today’s war on terror.
FBI Criminal
Justice Information Services Assistant Director Thomas E. Bush III purports NGI
is not a data collection system but a “database that stores and aggregates
information sent to it…from law enforcement agencies. (qtd. Smith, 2008)” yet Privacy
advocates suggests otherwise, especially with regards to NGI’s facial
recognition capabilities. While the accuracy of fingerprint analysis via NGI has
improved from 92% to 99.6 % (Federal
Bureau of Investigation, n.d.) , the FBI only
guarantees that facial recognition software will result in an 85% accuracy rate
within a list of 50 candidates generated and only “when the true candidate
exists” (qtd. Lynch, 2014). The minimum recommended resolution is .75
megapixels, a shockingly low threshold when compared against the newer iPhones
which possess 8-megapixel resolution (Lynch, 2014) . (Even Google Glass,
which banned the use of facial recognition applications, possess a 5-megapixel
camera! (Warman, 2013) )
Unfortunately, much
of America’s video surveillance infrastructure utilizes technology that does
“meet the necessary resolution standards to make accurate facial recognition” (Walker, 2014) . Furthermore, a
German field study in facial recognition software in 2006 demonstrated only a
60% daytime accuracy rate and a dismal 10% nighttime rate (Smith, 2008) . The FBI insists
that NGI enables a zero percent false positive feedback because the system does
not generate positive identifications but investigative leads. Yet, a database
which contains both criminal and non-criminal (i.e. background check for
employment) data, capable up processing up to 52 million photo queries a day, has
an error rate of almost 8 million people.
Even more unnerving
than the lack of accuracy remains a systemic failure to establish working
guidelines. Documents released to Electronic Frontier Foundation as a result of
a freedom of information lawsuit illuminate that “the FBI and Congress have
thus far failed to enact meaningful restrictions on what types of data can be
submitted to the system, who can access the data, and how the data can be used” (Lynch, 2014) . Many deemed this as
unacceptable particularly given that the annual financial obligation necessary
to support NGI is suspected of being approximately one billion dollars (Smith, 2008) . Nonetheless, the
FBI can mitigate concerns over privacy encroachment through transparency in
both policy and practice.
The following
proposals can alleviate, if not then placate, concerns over privacy intrusions
as well as instill the public with a sincere attempt by LE to minimize mistaken
identities:
·
instituting a comprehensive
policy, based upon significant field testing of enhanced capabilities, that includes
standards required to accept data (i.e. higher camera resolution, minimum Galton
Points, etc.), the full scope of data complied, methods of data acquisition, accessibility
requirements that include limits that cannot be exceeded without a warrant,
flow of information, data usage applications, and a recourse for data removal
(conditional);
·
the establishment
of multiple databases that separate the non-criminal, criminal, and terror
suspect information;
·
Non-introduction of
criminal data without criminal conviction (except terror investigations);
·
Alignment with both
the Privacy Act and Freedom of Information Act;
·
Congressional
oversight that involves semi-annual briefings; and
·
System accessibility
preclude any attempts for information from any non-verifiable and/or non-active
LE entities.
Reference
List
Federal Bureau of Investigation. (n.d.). Next
Generation Identification (NGI). Retrieved from fbi.gov:
https://www.fbi.gov/services/cjis/fingerprints-and-other-biometrics/ngi
Lynch, J. (2014). FBI Plans to Have 52 Million
Photos in its NGI Face Recognition Database by Next Year. Retrieved from
Electronic Frontier Foundation:
https://www.eff.org/deeplinks/2014/04/fbi-plans-have-52-million-photos-its-ngi-face-recognition-database-next-year
Smith, J. L. (2008). The FBI's Next Generation
Identification Database. Retrieved from Hendon Publishing.
Walker, L. (2014). FBI Announces Its Facial
Recognition System is Ready to Go. Retrieved from Newsweek:
http://www.newsweek.com/fbi-announces-its-facial-recognition-system-ready-go-270955
Warman, M. (2013). The Creepiest Google Glass
Feature Has Been Banned: No Facial Recognition Apps Allowed. Retrieved
from Business Insider:
http://www.businessinsider.com/google-glass-facial-rec-apps-banned-2013-6
Monday, October 24, 2016
I See Social Media Everywhere
Social media, and its resultant by-product of
social networking, seamlessly integrated themselves into our lives in as much
that both concepts have become synonymous. Nevertheless, there resides a
difference even if that difference is miniscule. Painting with broad strokes,
social media can simply be defined as “web-based
communication tools that enable people to interact with each other by both
sharing and consuming information” (Nations, n.d.) . The difference
between social media and social networking then stems directly from the words
preceding “social” whereby social media refers to a mediated form of interactive communications via non-traditional mediums
(although those non-traditional mediums are becoming the standard) and social
networking, sub-categorically, denotes the employment of social media to
address an audience in an attempt to establish a relationship.
The global dominating force of social media
networking remains Facebook, with its 1.13 billion monthly users (Facebook, n.d.) . The most successful
non-U.S. based social media networking platforms, defined by both active user
accounts and new monthly subscriptions, are, in part, based on the successful
model established by Facebook. While Facebook possesses a global virtual
supremacy, regional competition continues to challenge that status.
The three largest non-U.S.-based social media
networks - Ozone, VK, and Odnoklassniki (French & Shaw, 2016) - demonstrate
the status quo challenge stemming from regional upstarts. In China, Qzone, with
its 652 million users (Statista, 2016) , enables individuals to “blogs,
keep diaries, send photos, listen to music, and watch videos…However, most
Qzone accessories are not free; only after buying the "Canary Yellow
Diamond" can users access every service without paying extra” (Wikipedia, 2016) . VK, properly known as V Kontakte, claims 100 million
users (Statista, 2016) and is purported to be “the
largest European online social networking service… allow(ing) users to
message each other publicly or privately, to create groups, public pages and
events, share and tag images, audio and video, and to play browser-based
games” (Wikipedia, 2016) . Odnoklassnki
describes itself as a “social network service for classmates
and old friends…popular in Russia and former Soviet Republics” (Wikipedia,
2016) .
Culturally-specific social media networks are
having an impact in connecting people as well. For example, MyMFB, or My
Muslim Friends Book, is a Muslim alternative to Facebook aimed at connecting
the faith’s 1.5 billion plus followers into a single platform (Milanovic, 2015) . Facenama, is the
ninth most popular website in Iran but, even though Facebook is banned, 58% of
Iranians still utilize the American-based service (Jafari, 2015) . Another trend worth
noting that breaks from “networking” is the aggressive growth of instant
messaging applications such WhatsApp, QQ, and WeChat. Individuals certainly
reap numerous benefits incipient of this instantaneous connection-driven
movement but all of this interaction also comes with a cost to the user.
According to the Society for Human Resource
Management, some of the advantages made available via social media networking
include open
communication, business expansion targeting both consumers and potential
employees, and a minimization of advertising capital (Society for Human Resource Mangement, 2012) . In addition
to global connectivity, social networking enhances educational undertakings,
raises awareness for causes, and even assists law enforcement in the pursuit of
security objectives. Conversely, some of the disadvantages include the
malicious compromise of information, loss of individual productivity, and
general misuse (Society for Human Resource Mangement, 2012) . Social media
networks have negatively produced cyberbullying, health problems including
addictive behavior, enabled violations of personal relationship, and even
sensationalized unhealthy lifestyles. Invasion of privacy lingers at the
forefront of consequential concerns.
Most Americans place incursions into personal
privacy as their paramount apprehension. From a commercial perspective, 61% of
Americans strongly disagree with the notion that increased access to personal
information increases the efficiency of online services (Madden, 2014) ). Simply put, people
feel reticent when engaging in online endeavors even if only from a
generational perspective. Certain digital footprints, particularly personal
identifiable information, should be carefully guarded by both the user and the
medium receiving the input. Passwords/PINS, social security numbers, and credit
card numbers should never be shared. Ultimately, just like the real world, the
virtual world offers many pleasures and distractions. By exercising moderation
and employing basic risk management principles you will maximize your
experience.
Reference
List
Facebook. (n.d.). Company Info. Retrieved from
Facebook Newsroom: http://newsroom.fb.com/company-info/
French, S., & Shaw, J. M. (2016). The No. 1
Social Network by Country isn’t Always Facebook. Retrieved from
MarketWatch:
http://www.marketwatch.com/story/the-no-1-social-network-in-every-country-in-the-world-2016-02-18
Jafari, H. (2015). Even Our President Is More
Social Than You! Retrieved from Techrasa.com:
http://techrasa.com/2015/08/30/iran-even-president-digs-social-media/
Madden, M. (2014). Public Perceptions of Privacy
and Security in the Post-Snowden Era. Retrieved from Pew Research Center:
http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/
Milanovic, R. (2015). The World's 21 Most
Important Social Media Sites and Apps in 2015. Retrieved from Social Media
Today:
http://www.socialmediatoday.com/social-networks/2015-04-13/worlds-21-most-important-social-media-sites-and-apps-2015
Nations, D. (n.d.). What Is Social Media? Explaining
the Big Trend. Retrieved from About.com:
http://webtrends.about.com/od/web20/a/social-media.htm
Society for Human Resource Mangement. (2012). Social
Media: What are the Advantages and Disadvantages of Social Networking Sites?
What Should We Include in a Policy? Retrieved from SHRM.org:
https://www.shrm.org/resourcesandtools/tools-and-samples/hr-qa/pages/socialnetworkingsitespolicy.aspx
Statista. (2016). Leading Social Networks
Worldwide as of September 2016, Ranked by Number of Active Users (in Millions).
Retrieved from Statista:
https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/
Wikipedia. (2016). Odnoklassniki. Retrieved
from Wikipedia: https://en.wikipedia.org/wiki/Odnoklassniki
Wikipedia. (2016). Qzone. Retrieved from
Wikipedia: https://en.wikipedia.org/wiki/Qzone
Wikipedia. (2016). VK (social networking).
Retrieved from Wikipedia: https://en.wikipedia.org/wiki/VK_(social_networking)
Cyberlaw Concepts - Death and Taxes in the E-World
Benjamin Franklin is attributed with
correlating death and taxes as inevitabilities of life. The virtual world has
not empowered an escape from either. Still, the very premise of our democracy derives
itself from the war-inducing notion of “no taxation without representation”.
Taxation remains the fundamental source of government revenue, revenue designed
to facilitate, sustain and protect initiatives deemed essential to a nation. Arising
from the dawn of the Internet, e-commerce opened another taxable avenue.
Unless residing in one of a handful of
states, most individuals are accustomed to paying a sales tax. Sales tax is an
additional cost associated with a purchase, “imposed…as a percentage” (Craig, 2013) , beyond the asking
price and collected by the seller to be remitted indirectly back to the
state/local government as revenue. All business deemed a permanent
establishment (PE) within a state with a compulsory sales tax are required to
collect such monies. E-commerce challenges the pre-existing concept of sales
tax as a requirement of PE.
Although certain
items may be exempt from sales tax (i.e. “necessities” and government
purchases), online retailers and online auction sellers operating e-businesses
outside of a state’s jurisdiction are not required to collect sales taxes
unless such entities appease the “substantial nexus” test as predicated by a
1992 Supreme Court ruling established under Quill
Corp. v. North Dakota. If an e-business possess a nexus, or physical
connection, such entities are inconvenienced with the burden of collection of
sales tax. Multiple nexuses across multiple states introduces a matter additionally
complicated by the fifty different systems currently operated by the states. State-championed
proposals, such as Streamlined Sales Tax Project, or Federal law proposals,
such as the Federal Marketplace Fairness Act, are attempts at addressing the
fifty-state bureaucratic nightmare. Nonetheless, consumers taking advantage of
“tax-free” online shopping are still responsible for paying use tax.
As opposed to sales
tax, income tax augments the coffers at both the federal and state level. Income
tax is a direct, compulsory contribution to government, levied by government, typically
as a percentage of an individual’s or entity’s annual gross financial worth
based upon received revenues. At the federal level, that percentage currently
ranges between 0% and 39.6% depending on several factors. State percentages
vary by state and range from 0% to 13.3%. Here again, unless residing in one of
a handful of states, most individuals are accustomed to paying income tax to
both the federal government and the state. (Alaska possess the singularity of
having neither a sales tax nor state personal income tax.) According to the
Internal Revenue Service (IRS), online sales “may be subject to liabilities for
income tax, self-employment tax, employment tax, or excise tax” (Internal
Revenue Service, 2016) . Generally speaking, online retailers
and online auction sellers are required to report earnings generated through
sales and to pay income tax on such unless such sales can be equated to
engaging in a “hobby” as strictly defined by the IRS.
Another
complicated realm under the purview of tax law concerns the taxation of
winnings resulting from online pursuits such as gambling. Taxation varies based
on both activity and location. The matter is convoluted by a determination of
legality so much so that
avoidance is the order of business with entities launching offshore operations (Craig, 2013) . Yet, gambling,
virtual or otherwise, does not allege an illegal action under federal law. In
fact, the Unlawful Internet Gambling Enforcement Act of 2006 does not levy a
clear declaration although it does provide for actions to be taken by banking
institutions regarding deposits suspected of being generated through illegals
mechanisms. Therefore, from a federal perspective, online winnings are taxable
as those winnings simply comprise part of an individual’s total income and any
losses stemming from such activities are then deductible. While the simplicity
of the previous statement precludes an exploration of professional opposed to
enthusiast, the Catch-22 with reporting additional income generated via online
gambling or wagering comes from the states. Thus, the matter of determining
legality remains at the state level. Some states have bans while some states
have specific laws concerning online gambling. Some states purport nothing.
Accordingly, “the taxpayer bears the burden of having to properly substantiate
that a deduction is allowable” (Rosenberg, 2009). As a side note, online
sports betting is illegal. Online fantasy sports operations blur the line and
now rage at the heart of legal debate.
As a final
consideration, telecommuting has dynamically impacted fundamental business processes.
What was once a novelty has proven an ideal alternate methodology that attacks
multiple societal dilemmas. Current technological advancements combined with
better management practices have engendered greater mobility of employees (Craig, 2013) and that mobility has enabled benefits to individuals, businesses and
the environment. Unfortunately, cash-strapped states have found a way to
undermine this idyllic arrangement by introducing a telecommuter tax, a.k.a. “convenience
tax”. Precedent created by cases such as Zelinsky
v. Tax Appeals Tribunal of the State of New York (2003) imbue states with
the authority to extort taxable revenue double what the individual normal pays.
Effectively, any individual residing in one state but working/earning income in
another state may face having to file multiple state tax returns for money
values beyond just what is earned in the state of employment. Furthermore, the
telecommuter tax has ramifications extending beyond the individual. Judicial end-arounds
of the “substantial nexus” test, such as Telebright
Corporation, Inc. v. New Jersey Division of Taxation (2012), establish dangerous
precedent permitting the “stretching the limits
of traditional taxing principles in order to collect…tax revenues. It
means…companies must now be judicious when permitting telecommuting…or face
increased state tax liabilities and compliance” (McClellan,
2014) .
Reference
List
Craig, B. (2013). Cyberlaw: The Law of the
Internet and Information Technology. Boston: Pearson.
Internal Revenue Service. (2016). Tax Laws and
Issues for Online Auction Sellers. Retrieved from IRS.gov:
https://www.irs.gov/businesses/small-businesses-self-employed/tax-laws-and-issues-for-online-auction-sellers
McClellan, C. (2014). Tax Consequences of
Telecommuting Employees. Retrieved from carr-mcclellan.com:
http://www.carr-mcclellan.com/insights/tax-consequences-of-telecommunicating-employees/
Rosenberg, E. (2009). Online Gambling Poses Tax
Conundrum. Retrieved from WSJ.com:
http://www.wsj.com/articles/SB10001424052748704779704574553763086903756
Monday, October 17, 2016
Whether Raising Chickens or Harnessing the Wind, GIS gets the job done
Early efforts in man’s quest to harness the raw power of
earth bore the resemblance of child-like bewilderment. Drill a hole here, put a
wind mill up there. Evaluate. Adjust. Relocate. Repeat. Trial and error were
the inefficient order of the day without any thought to the consequences. Today’s
information-driven approach minimizes both the fiscal and physical impacts. Information
Technology, partnered with science, changed the very nature of energy
exploration and the resultant profitability of its exploitation. One particular
offspring of this partnership is the advent of geographic information systems
(GIS), simply described as “a computer system capable of assembling, storing,
manipulating, and displaying geographically referenced information” (Stair &
Reynolds, 2014) .
Wind farming remains one particular explorative endeavor embracing
technology. According to U.K.-based consultant Samuel Clark, GIS “methodologies
which combines database information with mapping and modeling is at the heart
of the process” (Clarke, 2013) . Such capabilities
enable leadership to visualize, analyze, and interpret human impacts on the
natural environment. Additionally, it offers increased efficiency, better
decision making, improved communications, and better record keeping (Environmental
Systems Research Institute, n.d.) . America currently
leads the world in harnessing the power of the wind.
Wind farm design constraints primarily consider available
wind resources, noise, aviation, air defense, electrical connectivity and electromagnetic
interference (Clarke, 2013) with additional
constraints evaluating terrain, public acceptance, proximity to protected
areas, site accessibility, proximity to the (electrical) grid, availability of
installation equipment (Ouma, 2012) . As opposed to the
agricultural constraints considered by the placement of a chicken farm, wind
farms embrace a coexistence with for-profit agricultural endeavors. Consider
that “a standard wind farm of 20 turbines will extend over an area of about 1
square kilometre (sic), but only 1% of the land is used...The rest of the land
can be used for farming or natural habitat” (Wind Measurement International,
n.d.) .
Additionally, landowners can repeat additional financial rewards by subletting
their property.
The table provided below provides comparable constraints
and preferences easily identified by the employment of GIS technology via the association
of concerns across two different human endeavors.
Chicken Farm
Location Constraints:
|
Wind Farm Location
Constraints
|
Primary
|
Primary
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chicken Farm
Location Preferences
|
Wind Farm
Location Preferences
|
|
|
|
|
|
|
|
|
|
|
Reference List
Clarke, S. (2013). Finding the Perfect Site for a
Wind Farm. Retrieved from EngineerLive:
http://www.engineerlive.com/content/22779
Environmental Systems Research Institute. (n.d.). What
is GIS? Retrieved from ESRI.com: http://www.esri.com/what-is-gis
Ouma, C. (2012). Assessing Locations for Wind Power
Generation. Retrieved from ExploringGreenTechnology.com:
http://exploringgreentechnology.com/wind-energy/assessing-locations-for-wind-power-generation/
Stair, R. M., & Reynolds, G. W. (2014). Fundamentals
of Information Systems (8th ed.). Boston: Cengage Learning.
Wind Measurement International. (n.d.). FAQ.
Retrieved from windmeasurementinternational.com:
http://www.windmeasurementinternational.com/wind-info/wind-energy_faq.php
Sunday, October 16, 2016
Business Intelligence at Irish Life
Pioneering IT
developer IBM noted that many big businesses are “unable to interpret 90
percent of their information” (Savvas, 2011) . Leading insurance
provider and retirement planner Irish Life stood out as one of those business
unable to access, and therefore interpret, data-rich information.
Paul Egan, IT
manager for business intelligence at Irish Life, succinctly described the data
analytics environment arising from use of Oracle Discoverer as “MIS Monday
Madness…copying and pasting and emailing…to satisfy audiences” (McKenna,
2011) .
Irish Life’s environment was facilitated by a mismanagement of accessibility that
defined information accessibility as the sole realm of IT. Such a outdated purview of roles engendered a
system that failed to empower the appropriate personnel with the correct
applications. The end result produced “static, with little trend analysis” (McKenna,
2011)
reporting with poor functionality and a lack of individual service. A change
was needed.
Mr. Egan’s vision
foresaw individual environments were his IT staff could “enable data sources
for power users to build dashboards” (McKenna, 2011) leaving the
dedicated IT staff to focus on data development. Adoption of such a
forward-thinking initiative requires operator criticism in order to induce a
product which provides better user functionality. After a two-month test period
that involved multiple systems and direct feedback, Tableau was chosen because
its “strength is in allowing non-IT professionals to build their own dashboards
which can then be published on the internet or distributed on mobile devices” (Smith, 2012) .
Irish Life also
dictated that any system chosen must support business growth and retention but maintain
a “primary focus…to improve the sales pipeline and customer service management” (Savvas, 2011) . Irish Life’s power
users needed business intelligence capabilities which could “graphically
represent data across the organisation (sic), improve decision-making and map
patterns and trends in a cleaner way” (Savvas, 2011) by combining historical
trends, real-time fiscal performance and future financial predictions.
Furthermore, Irish
Life consciously decided customer ownership remained a necessary byproduct of
their initiatives. Through the introduction of mobile-accessibility and online
tools, customers are endowed with knowledge and feel a sense of control over
their financial destiny. Customers can now engage better educated financial
advisors using supported analysis regarding market predictions with the ability
to “monitor a range of different aspects…such as sales margins, costs, the
value of new business and head count” (McKenna, 2011) . Consequently, Irish
Life “tripled its customer base” (Stair & Reynolds, 2014) .
Reference List
McKenna, B. (2011). Irish Life Chooses Tableau over
QlikView, Oracle. Retrieved from ComputerWeekly:
http://www.computerweekly.com/news/2240112678/Irish-Life-chooses-Tableau-over-QlikView-Oracle
Savvas, A. (2011). Irish Life Deploys New BI
System. Retrieved from ComputerWorldUK: http://www.computerworlduk.com/data/irish-life-deploys-new-bi-system-3321944/
Smith, G. (2012). Irish Life Chooses Tableau to
Deliver Business Intelligence Dashboards. Retrieved from
SiliconRepublic.com:
https://www.siliconrepublic.com/enterprise/irish-life-chooses-tableau-to-deliver-business-intelligence-dashboards
Stair, R. M., & Reynolds, G. W. (2014). Fundamentals
of Information Systems (8th ed.). Boston: Cengage Learning.
Subscribe to:
Posts (Atom)