Translate

Tuesday, 20 December 2016

Below are five sets of Wing Chun principles from respected sources. 

A cursory search of the internet shows many different sets of principles originate from different schools.  This shows how varied the art is and you only have to look at videos from different places to see have the various schools of thought have developed independently.  


Wikipedia citing Robert Chu, Leung Ting, etal

Positioning
Many Wing Chun lineages emphasise fighting on the outside of the opponent rather than facing them head on. Such a position could be described as standing at an angle where the Wing Chun practitioner can strike with both their arms, while their opponent can only strike with one of their own arms due to poor positioning. This is often referred to as "taking the blindside" or "fighting on the outside gate".

Balance, structure and stance
Some Wing Chun practitioners believe that the person with better body structure will win. A correct Wing Chun stance is like a piece of bamboo, firm but flexible, rooted but yielding. This structure is used to either deflect external forces or redirect them.[citation needed]

Balance is related to structure because a well-balanced body recovers more quickly from stalled attacks and structure is maintained. Wing Chun trains the awareness of one's own body movement derived from muscular, tendon, and articular sources. Performing Wing Chun's forms such as Chum Kiu or the Wooden Dummy form greatly improve proprioception. Wing Chun favours a high, narrow stance with the elbows kept close to the body. Within the stance, arms are positioned across the vitals of the centerline. Shifting or turning within a stance is carried out variantly on the heels, balls, or middle (K1 or Kidney 1 point) of the foot depending on lineage. All attacks and counter-attacks are initiated from this firm, stable base. Wing Chun rarely compromises structure for more powerful attacks because this is believed to create defensive openings which may be exploited.

Structure is viewed as important, not only for reasons of defense, but also for attack. When the practitioner is effectively "rooted", or aligned so as to be braced against the ground, the force of the hit is believed to be far more devastating. Additionally, the practice of "settling" one's opponent to brace them more effectively against the ground aids in delivering as much force as possible to them.[

Relaxation
Softness (via relaxation) and performing techniques in a relaxed manner, is fundamental to Wing Chun.
Tension reduces punching speed and power. Muscles act in pairs in opposition to each other (e.g. biceps and triceps). If the arm is tensed, maximum punching speed cannot be achieved as the biceps will be opposing the extension of the arm. In Wing Chun, the arm should be relaxed before beginning the punching motion.
Unnecessary muscle tension wastes energy and causes fatigue.
Tense, stiff arms are less fluid and sensitive during trapping and Chi Sau.
A tense, stiff limb provides an easy handle for an opponent to push or pull with, whereas a relaxed limb provides an opponent less to work with.
A relaxed, but focused, limb affords the ability to feel "holes" or weaknesses in the opponent's structure (see Sensitivity section). With the correct forwarding these "holes" grant a path into attacking the opponent.
Muscular struggle reduces a fight to who is stronger. Minimum brute strength in all movement becomes an equalizer in uneven strength confrontations. This is very much in the spirit of the tale of Ng Mui.

Centerline

While the existence of a "central axis" concept is unified in Wing Chun, the interpretation of the centerline concept itself is not. Many variations exist, with some lineages defining anywhere from a single "centerline" to multiple lines of interaction and definition. Traditionally the centerline is considered to be the vertical axis from the top of a human's head to the groin. The human body's prime striking targets are considered to be on or near this line, including eyes, nose, throat, solar plexus, stomach, pelvis and groin.

Wing Chun techniques are generally "closed", with the limbs drawn in to protect the central area and also to maintain balance. In most circumstances, the hands do not move beyond the vertical circle that is described by swinging the arms in front, with the hands crossed at the wrists. To reach outside this area, footwork is used. A large emphasis and time investment in training Chi Sau exercise emphasizes positioning to dominate this centerline. The stance and guard all point at or through the center to concentrate physical and mental intent of the entire body to the one target.
Wing Chun practitioners attack within this central area to transmit force more effectively, since it targets the "core center" (or "mother line", another center defined in some lineages and referring to the vertical axis of the human body where the center of gravity lies). For example, striking an opponent's shoulder will twist the body, dispelling some of the force and weakening the strike, as well as compromising the striker's position. Striking closer to the center transmits more force directly into the body.
Punches
Due to the emphasis on the centerline, the straight punch (straight left / straight right) is the most common strike in Wing Chun. However, the principle of simultaneous attack and defense (simplified Chinese: 连消带打; traditional Chinese: 連消帶打; Cantonese Yale: lìhn sīu daai dá; literally: "linking cancel and attack") suggests that all blocking movements should be accompanied with a simultaneous strike when possible. This allows for the opponent to be put on the defensive faster, and thus allowing the Wing Chun practitioner to defeat the opponent quicker by countering as soon as possible (ideally on the opponents first strike). Other explicit examples of punches can be found in the Chum Kiu and Biu Ji forms (both uppercut and hook punches), although these punches may appear to be superficially different they are simply the result of the punch beginning from a different origin position while following the same fundamental idea, to punch in a straight line following the shortest distance between the fist and the opponent.
The punch is the most basic and fundamental in Wing Chun and is usually thrown with the elbow down and in front of the body. Depending on the lineage, the fist is held anywhere from vertical to horizontal (palm side up). The contact points also vary from the top two knuckles, to the middle two knuckles, to the bottom three knuckles. Punches do not turn at the wrist as a primal directive is economy of motion and this would create two distinct motions for a single movement.
When executing the punch, one must relax and not use the shoulders or activate the trapezius muscles. The punch comes from the center, Kyun Yau Sam Faat (simplified Chinese: 拳由心; traditional Chinese: 拳由心發; Cantonese Yale: kyùhn yàuh sām faat; literally: "punch starts from the heart"). This maxim (punching from the centre of the chest) is used primarily in training, however in application the punch can originate from any location.
Wing Chun primarily encourages using both "low elbow power" (power generated from thrusting the arm forward viscously at the target while keeping the elbows pointed down), along with "hip power" (power generated from a quick "rotation" of the hips). The combination of these two methods of power generation results in a powerful strike

Wing Chun favours the vertical punch for several reasons:

Directness. The punch is not "loaded" by pulling the elbow behind the body. The punch travels straight towards the target from the guard position (hands are held in front of the chest).
Protection. The elbow is kept low to cover the front midsection of the body. It is more difficult for an opponent to execute an elbow lock/break when the elbow occupies this position. This aids in generating power by use of the entire body structure rather than only the arm to strike. Also with the elbow down, it offers less opening for the body to be attacked while the forearm and punch intercept space towards the head and upper body.
Strength and Impact. Wing Chun practitioners believe that because the elbow is behind the fist during the strike, it is thereby supported by the strength of the entire body rather than just a swinging fist, and therefore has more impact. A common analogy is a baseball bat being swung at someone's head (a round-house punch), as opposed to the butt end of the bat being thrust forward into the opponent's face (wing chun punch), which would cause far more damage than a glancing hit and is not as easy to evade. Many skilled practitioners pride themselves on being able to generate "short power" or large amount of power in a short space. A common demonstration of this is the "one-inch punch", a punch that starts only an inch away from the target yet delivers an explosive amount of force. This is a principle example of a coiled strike in which multiple abdominal muscles can contribute to the punching power while being imperceptible to the attacker. It is a common misconception that "one-inch punches" utilize a snapping of the wrist.
Alignment & Structure. Because of Wing Chun's usage of stance, the vertical punch is thus more suitable. The limb directly in front of the chest, elbow down, vertical nature of the punch coupled with a snap twisting of the waist requires a practitioner's body to naturally untwist or release before the rebound of the punch. This effectively demonstrates an understanding of the equal and opposite force reactions attributed to Newtonian Physics. This is a desirable trait to a Wing Chun practitioner because it promotes the use of the entire body structure to generate power and prevents wrist injury or being pushed away by the high degree of forward power being reflected.
Kicks
Kicks can be explicitly found in the Chum Kiu and Muk Jong forms, though some have made interpretations of small leg movements in the Siu Nim Tau and Biu Ji to contain information on kicking as well. Depending on lineage, a beginner is often introduced to basic kicking before learning the appropriate form. Traditionally, kicks are kept below the waist. This is characteristic of southern Chinese martial arts, in contrast to northern systems which utilize many high kicks.
Kicks in Wing Chun are mostly directed at the lower half of the body. Wing Chun kicks are designed to knock an opponent off balance, break their leg, or to bring an opponent on their knees.
Variations on a front kick are performed striking with the heel. The body may be square and the knee and foot are vertical on contact (Chum Kiu), or a pivot may be involved with the foot and knee on a plane at an angle (Muk Jong). At short distances this can become a knee. A roundhouse kick is performed striking with the shin in a similar manner to the Muay Thai version with most of the power coming from the body pivot. This kick is usually used as a finisher at closer range, targeting anywhere between the ribs and the back of the knee, this kick can also become a knee at close range. Other kicks include a stamping kick (Muk Jong) for very close range and a sweep performed with the heel in a circular fashion.
Every kick is both an attack and defence, with legs being used to check incoming kicks or to take the initiative in striking through before a more circular kick can land. Kicks are delivered in one movement directly from the stance without chambering/cocking.
Types of Kicks include:
Front Kick, Side Kick, Roundhouse Kick (usually delivered to the ribs or thigh), Shovel Kick (A kick that targets the knee/shin), Spinning Back Kick, Sweep.
Elbows and Knees
Wing Chun relies heavily on elbow strikes at close range. Common targets for elbows include the chest, chin, head, and face. Elbow strikes are delivered in a manner similar to Muay Thai, using the whole body and turning of the hips to generate power.
Elbow strikes include: Rising elbow (6 to 12) Horizontal elbow Kneeling elbow (12 to 6) Reversing elbow Spinning elbow strikes

Knees are delivered also, usually in a clinching position, but some Sifus also teach entering with flying knee strikes to bridge the distance.
Uncommitted techniques
Wing Chun techniques are uncommitted. This means that if the technique fails to connect, the practitioner's position or balance is less affected. If the attack fails, the practitioner is able to "flow" easily into a follow-up attack. All Wing Chun techniques permit this. Any punches or kicks can be strung together to form a "chain" of attacks. According to Wing Chun theory, these attacks, in contrast to one big attack, break down the opponent gradually causing internal damage. Chained vertical punches are a common Wing Chun identifier.

Trapping skills and sensitivity
The Wing Chun practitioner develops reflexes within the searching of unsecured defenses through use of sensitivity. Training through Chi Sau with a training partner, one practices the trapping of hands. When an opponent is "trapped", he or she becomes immobile.
Yip Man philosophy:
Greet what arrives, escort what leaves and rush upon loss of contact (來留去送,甩手直衝)
Close range
Wing Chun teaches practitioners to advance quickly and strike at close range. While the Wing Chun forward kick can be considered a long range technique, many Wing Chun practitioners practice "entry techniques"—getting past an opponent's kicks and punches to bring them within range of Wing Chun's close range repertoire. This means that theoretically, if the correct techniques are applied, a shorter person with a shorter range can defeat a larger person by getting inside their range and attacking them close to their body.

Grandmaster Jim Fung
In his 'blue book', Wing Chun Kung Fu, Grandmaster Jim Fung described the Wing Chun system as consisting of a logical and comprehensive set of principles, which he defined as:
·         Simplicity
·         Directness
·         Practicality
·         Economy of movement
·         Minimum use of brute strength.

·         Eric Oram discussing principles from William Cheung

·         Kick No Higher than the Waist Area
·         The primary reason for this principle is the maintenance of your balance. The shorter the time your kicking leg is in the air, the longer it can be on the ground providing you with a balanced stance.
·         Another reason is target vulnerability. The longer and higher your leg is off the ground, the more vulnerable your groin is. If you kick at a low target, your leg returns to the ground more quickly, where it can return to protecting your groin.
·         Your supporting leg is also more vulnerable to attack when you kick high.

·         Maintain your Balance

·         Balance is everything. Without it, nothing else really matters. Power in blocking, punching, striking and kicking begins with good balance. Leverage - especially in upright fighting systems - comes from balance. Without balance, energy cannot be pushed up from your stance and released through a movement or technique.
·         An effective stance is a mobile stance. Balance should be part of that mobility. If balance is always there, you can freely interrupt your movement at any time and flow into virtually any other movement - and have constant access to the power of the first movement. This freedom is crucial to success in fighting.
·         Avoid any unnecessary leaning or over-extension of your stance because it will slow you down and make you vulnerable to being knocked off-balance.

·         Protect Your Centreline

·         The shortest distance between two points is a straight line. Use your guard to protect the straight path to your body's centre. Own it, protect it. That is where you live: don't stray too far from home.
·         By occupying a position along the shortest path between you and your opponent, you force him to take a longer path to reach you. Because distance translates into time, the longer it takes for him to reach you, the longer you have to identify the movement and allow your defensive reflexes to work for you.
·          
·         Watch your Opponent's Elbow

·         Quite simply, if a person's arm moves, so does his elbow. Therefore, your opponent's striking arm cannot reach you without its elbow coming with it. The elbow is father away than the fist and is easier to read because watching it does not strain the eye like watching the closer fist does.
·         In addition, because it is farther away, the elbow moves more slowly than the fist and is easier to read. In a linear attack, the elbow moves approximately two and one half times more slowly than the fist. In a circular attack, the elbow moves approximately four times more slowly.
·         Again, distance translates into time: The longer you can follow the path of the strike - by detecting it sooner - the longer you have to let your reflexes work for you.
·         The usefulness of this principle is enhanced when you keep in mind that the knee is to the leg as the elbow is to the arm.

·         Fight on the Blind Side

·         In traditional Wing Chun, the outside of the opponent's lead arm is called his "blind side". This is where you want to position yourself because it allows you to stay the maximum distance away from his opposite arm. That means you have to deal with only one arm at a time.
·         Again, distance equals time. If you achieve the blind-side position and your opponent tries to reach you with his rear hand, it takes longer; that gives you more time to react. Also, your opponent may cross his arms as he tries to reach with his opposite hand, and that will leave him susceptible to being trapped.
·         The objective is to ensure that you have free use of both your arms while you limit your opponent to the use of one. Avoid positioning yourself directly in front of him because you will be threatened by both arms and both legs.

·         Train to See Everything

·         The simplest way to see "everything" is to look at one thing. This may sound like a Zen riddle, but it's not. If you try to watch literally everything, chances are you will end up seeing nothing.
·         So where should you look? As stated before, you should start with your opponent's lead elbow because it is part of his nearest weapon. By focusing on the nearest weapon, you will be able to detect the most immediate threat. Anything other than the most immediate threat will take longer to reach you, thus giving you more time to react.
·         If your eyes lock onto your opponent's lead elbow, you should use your peripheral vision to keep aware of three other points: his opposite elbow and both his knees. If you detect one of those body parts moving toward you, your eyes should immediately jump to that part.
·         If you make contact with one of your opponent's arms through a blocking or trapping technique, your eyes should jump to the next nearest threat. Because you can feel his threatening limb, you no longer need to look at it. Your eyes are free to look elsewhere.
·          
·         Put your Opponent on the Defensive
·          
·         An old saying holds that sometimes the best defense is a good offense. For the most part that is true: You can't win by being strictly defensive. One of the best ways to stop an opponent from attacking is to attack him first and put him on the defensive. That will force him to deal with you, rather than continue trying to hurt you. He must now defend himself - or suffer the consequences.
·         Wing Chun practitioners strive to block and strike at the same time. That allows them to immediately put the pressure back on their opponent.

·         Attack your Opponent's Balance
·          
·         As stated above, balance is everything. Therefore, you must always maintain your balance and use it to attack your opponent's balance. Often that means getting him to lean too far into a technique, over-commit to a movement or over-extend his body. Without proper balance, he will not be able to move, block or strike effectively.
·         In Wing Chun, that is achieved primarily through controlling the opponent's elbow. If you control his elbow, you can control his balance.

·         Learn to Recognize Openings

·         It is one thing to say, "Put your opponent on the defensive." It is quite another to know where to hit him, with what weapon and when. Whatever your system, you must know - really know - what your tools are, what range or distance they function in, and what part of the body each is designed to hit.
·         Furthermore, your eyes must be trained to recognize the opening. If you don't have "good eyes" and don't know how to detect an opening, the greatest techniques in the world are not going to help.
·         Therefore, you must train yourself to be able to detect an opening in any situation and to have the reflexes to take advantage of that opening while it exists.

·         Have "Heart" but Control your Emotions

·         Cardio-vascular endurance is crucial to becoming a complete martial artist; however, that is not what is meant by "heart". In this case, it means fighting spirit, or the will to win.
·         If you don't believe you can win, you probably can't. If your opponent is more convinced of victory than you are, he will probably come out on top. Total confidence, combined with good process and a scientifically sound system, certainly increases the probability of success. But if you do not have heart, even superior skills will never see the light of day; they will be squandered by a more confident opponent.

Javier Garcia writes about his top five principles in Wing Chun Origins
5-Sticking

​One of the most recognisable drills in Martial Arts is Wing Chun’s Chi Sao. This drill is designed to develop sensitivity in the arms, so that attacks are deflected intuitively through the use of ingrained habits and structure.
It is quiet common to see advanced practitioners train this drill blind folded. This emphasises the fact that the attacks are deflected and countered by sticking closely to the opponent and sensing their movements, rather than through speed and fast reflexes. Many great boxers, such as Floyd Mayweather, employ similar tactics, where they will stick to the opponent after landing or missing a punch, in order to shut down any counter attacks.
If performed correctly, it can be a devastating strategy that leaves the opponent frustrated and unable to launch any sort of offense.

4-Vertical Punching

Boxing has  a formidable arsenal of punches and yet, you never see strikes such as hooks or overhang punches in Wing Chun. The reason is because even though these punches are exceptionally powerful, they violate the principle of covering the centre line.

The moment the elbow comes up during a punch, it becomes impossible to cover the centre line and deflect incoming counter-punches. It is the elbow that collects the incoming counter punches, serving as a wedge that jams and deflects the opponents strike, opening the way for the fist to hit its target.
The principle is that of “hit but do not get hit“. Interestingly, before the advent of boxing gloves, bare knuckle boxing resembled Wing Chun in many ways. In those days,the punches were vertical with elbow down in order to keep the opponent at bay.

3-Flanking

It should be obvious that if one stands directly in front of the opponent, he exposes himself to their full arsenal of kicks and punches. Not so if one manages to flank he opponent and attack from one side. From this position, the arm and leg that are furthest from the flank occupied, are relatively useless.
This is a momentary advantage of course, because the opponent will seek to reposition and square up again, but for a brief moment, we need only deal with half of the opponent’s arsenal, whilst he remains exposed to attacks from both our arms and legs.
Wing Chun’s crossing hands and Bui Jee form a designed to seamlessly move from the centre of the opponent’s structure to his flank by attacking his left arm with our right and vice versa.

2 -Forward Pressure

Wing Chun is famous for it’s relentless forward pressure. The practitioner seeks to always move forward, invading his opponent’s centre line and protecting his own. There is great merit in this idea.
In a fight, becoming too defensive can be deadly. You might be able to slip or block one or two punches, but if your opponent keeps moving forward, there is a good chance he will connect sooner or later.
Like in chess, he who gains the initiative usually wins the fight. Unlike combat sports where professionals are trained to slip, block and even take punches for round after round, on the street, a good punch can finish the fight quickly. Wing Chun’s forward pressure is designed to get that punch in first.

1 -Centre Line

Wing Chun’s most famous principle is undoubtedly the centre line. Wing Chun’s structure is designed to cover the practitioner’s centre so that the danger of being countered is reduced.
By keeping the elbows down whilst punching and moving along the centre line, a Wing Chun Practitioner is able to monopolise this precious real estate and deflect counter attacks as he or she moves forward. The opponent is still free to counter by moving around the centre line, through hooks and overhang punches of course, but the idea is that straight attacks through the centre line will get there first.
So if the opponent attacks through the centre, the attacks are deflected by the Wing Chun Structure. If the opponent attacks through the flanks, the Wing Chun practitioner moves forward and gets there first, through economy of movement.

According to “Wing Chun Central”

In Wing Tsun we are taught four main principles. These are:
1) If the way is clear forge ahead!
2) If there is contact keep glued to it!
3) If your opponent is stronger, give in!
4) If the opponent retreats, follow!

The first Fighting Principle: If the way is clear go forward

The fighter should always feel the urge to move forward, i.e. to move directly towards his opponent. This applies both to the arms (which are thrust forward) and the legs (which kick) as well as to the entire body (which should advance). A user of the Leung Ting system should always direct his energy towards the vertical axis of his opponent (forward-flowing energy), like a piece of metal attracted by a magnet.
If no obstacle is blocking the direct path of the Leung Ting fighter, he will always directly attack the opponent's axis with his hand or foot. Directly' means that the attack does not come from one side or at an angle, but that the fighter will advance and attack across the shortest distance, and without first drawing back the hand or leg. Among other things, the Latin word "aggredior" can mean "I am approaching somebody". With regard to its general approach, the Leung Ting system can superficially be called an aggressive self-defence system. However, we are not aggressive in the sense that we foam at the mouth with rage (or fear). This kind of (inherent) aggression would paralyse any reliable reactive capability and therefore be contrary to our objectives.
We have established that going forward with both hand and foot (forward-flowing energy) is the appropriate response to most combat situations.

The second principle: If you get contact stick to it

As soon as one of our arms contacts the opponent's arm, we maintain our pressure towards the vertical centre line and do not withdraw our arm. Both contact and pressure are maintained. Users of traditional self-defence methods will perhaps punch with their right and, if this is blocked, withdraw it to deliver a second punch or launch a kick. WT considers this approach to be fundamentally wrong. Our motto is: "If your attack encounters resistance, do not withdraw but stick to your opponent!" Anybody breaking this rule will expose himself to great danger if his opponent is an experienced WT fighter.

The third principle: If you meet superior strength give way

This introductory section will confine itself to the four most important reflex-like or deformative reactions which are initiated by pressure acting on our arms. Unlike "inborn" reflexes, these reflex-like reactions are not naturally possessed by every healthy person but must be developed by training (Chi-Sao lessons) with an experienced teacher. (In rare cases, they may be dormant and need reawakening). As soon as our adversary's arm contacts one of our arms at any point, and exerts even the slightest pressure, the vector (point of attack, magnitude and direction of the attacking force) will immediately cause this arm to deform itself or react reflexively without any conscious (and time-wasting) control input from the brain. The reaction is directly triggered by the adversary's attacking movement. This is what Bruce Lee meant when he said: "My technique is the technique of my opponent". In other words, your own action is the direct, reflex-like reaction to your opponent's action. Your adversary's attack forms your arm in such a way that it gives you protection

Fourth principle: If your opponent withdraws follow through

Because of your permanent forward pressure you will immediately and automatically invade any gap that presents itself, like water. The fourth principle (if your opponent withdraws, follow through) is therefore the consequence of maintaining forward pressure.


Saturday, 5 March 2016

1984 has arrived, just a bit later than expected



Smartphones and 1984:  Are We There Yet?

Most people have heard of the book “1984”.  It is without doubt George Orwell’s best novel and remains one of the most powerful warnings ever issued against the dangers of a totalitarian society.
For those who need a reminder the book was written in 1949 and set in the author’s future.  In Orwell’s bleak vision the main thread of the story is the omnipresent government surveillance at all levels of society.  People are electronically watched 24 hours a day and “disappeared” if they step from the narrow party line. 

The authors name has even entered the English language as “Orwellian”, an adjective used to describe a totalitarian system in which an organisation or government relentlessly spies on people in an attempt to exercise complete control over their behaviour and thoughts.

What has a book written over 60 years ago got to do with smartphones?  Well maybe more than first appears.  A disturbing picture of the state of data surveillance and collection is emerging.


Apples Fight for your Data Security

Despite Apples posturing towards the FBI regarding the privacy of an individual’s data it seems they might not be as concerned about privacy as we are led to believe.  The respected security researcher Jonathon Zdziarski wrote a paper titled; Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices. The paper describes how; with or without Apple’s help, spying agencies such as NSA and other third parties, familiar with how iOS operates can use these vulnerabilities to extract data from an iPhone, or even install applications for malicious purposes without the user’s knowledge.

Currently iPhones collect and report back location data and web search data and have access to user information stored in the iCloud and iTunes




Apple can access you contacts even if you disable iCloud and iMessage.  Consumers say they want privacy, but do not typically alter actions to protect themselves. This is among key findings from a recent study commissioned by Trend Micro Incorporated (TYO: 4704; TSE: 4704). The global study conducted by Ponemon Institute, “Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers,” reveals a slight majority of consumers believe the benefits of the Internet of Things (IoT) outweigh privacy concerns. However, 75 percent feel they do not have any control over their personal information. In addition, the research compares consumers’ perceptions on privacy, their willingness to change behaviour and the perceived value of their personal information“

These comprehensive findings show that, while consumers seem to be concerned about privacy and security, they do not fully grasp the role they can play according to Raimund Genes, CTO, Trend Micro. “At the same time, the majority who identify themselves as ‘privacy sensitive’ will not change their behaviour or information sharing practices even if they experience a data breach. This could be attributed to a feeling of powerlessness or an overall lack of awareness. It’s clear that more attention is needed to protect privacy and security on a personal basis. Fortunately, there are resources available to help individuals learn how to protect themselves.” Unfortunately People need to educate themselves because neither governments nor corporations will benefit from users who can keep their information locked down.



So we should Just Use Android Smartphones.

Android is a mobile operating system developed, maintained and distributing by Google to anyone who wants it FOR FREE.  Think about it for a second.  Why would the biggest advertising company in the world, actually he world’s largest publicly traded company spend millions on a product and then give it away?  It’s simply because they can make more money from the collection of data from the estimated 1.4 Billion devices running its software.

Since its meteoric rise in the internet age, Google has reached technological capabilities that seem almost science-fiction. Their latest is a neural network with a “superhuman” ability to determine the location of almost any image.  The internet giant’s immense collection of personal data amounts to its own surveillance network that likely exceeds the best government spy program anywhere in the world. The data sweep is not only online; Google’s Street View cars were discovered collecting information from wi-fi hubs ranging from “people’s medical histories to their sexual preference to marital infidelity.”

Google has said that their collection of data, when used properly, advances the public well-being. This sounds uncomfortably familiar to the propaganda campaign of intelligence officials defending the NSA’s domestic spying program and other intrusions of privacy revealed by Edward Snowden.

The next logical stage in this journey towards 1984 is to track a user's health behaviour using so called smart watch or fitness bands.  These devices are being developed to collect clues of a much more comprehensive nature than just steps in the park. Your blood pressure, electrodermal activity, blood alcohol content and much more than can be already be collected by health-tracking gadgets currently on sale.  I sincerely hope that smartphone users are concerned about insurance corporations collecting this type of personal data because they really as they should be.  If we keep going down the road we are on then soon we will be required to wear "health" bands to get medical insurance.  

On Wednesday 09th March, the European Union is expected to drop the hammer on Google, charging the company with violating antitrust rules with its search dominance. It’s the tail end of a five-year investigation from the EU’s competition commission, and a prolonged regulatory headache for the search giant. It could be costly too: The EU is reportedly plotting a fine as large as $6.4 billion, roughly a tenth of Google’s annual revenue. The Financial Times first reported the news.  Needless to say whatever happens there will be an appeal.

What happens next?

It is up to each and every citizen to educate themselves and decide if they want to be a drone tracked by corporate algorithms or if they want to grow as individuals and make decisions based on learned reasoning rather than asking Google for an answer every time they stumble.  I am not confident that the former will happen.

References
http://www.computerworld.com/article/2855567/data-from-wearable-devices-could-soon-land-you-in-jail.html

Tuesday, 3 November 2015

Marketing Images for the New Android BlackBerry Priv


Below is a collection of BlackBerry Android Priv Artwork..It is an interesting direction and quite different from previous campaigns.  What do you think?




















Tuesday, 6 October 2015

Tata Power SED and Secusmart, a subsidiary of BlackBerry, Sign Contract Agreement

Launcher System Developed by Tata Power


Secusmart, the global expert in secure mobile communications, and Tata Power Strategic Engineering Secusmart Division (SED), part of the multinational Indian conglomerate, Tata Group, today announced a comprehensive partnership for the Indian market. The two companies have signed a term sheet (MoU) providing a framework for the collaboration, the aim of which is to evaluate the design, development and marketing of a highly secure mobile communications system tailored to the needs of Government customers in India.

“In the era of increasing incidents of espionage in State establishments and Corporates with cyber security breaches and data theft, the envisaged association with BlackBerry will increase opportunities to accelerate innovation for high-end secure communication solutions. The proposed collaboration is aimed at leveraging Tata Power SED’s expertise in security, software and hardware design and manufacturing and Secusmart’s expertise in software and security to provide a highly capable and secure communication solution meeting stringent Government requirements,” said Rahul Chaudhry, CEO of Tata Power SED.

The term sheet was signed during German Chancellor Angela Merkel’s official trip to India, underlining the importance of the partnership to both parties, and highlighting how crucial secure mobile communications are to the Government of India.

Dr Hans-Christoph Quelle, Chief Executive Officer, Secusmart, also commented on the partnership. He said: “Since Secusmart was founded, we have continued our focus on making mobile communications more secure, for customers all around the world. I am proud of our continued success in delivering world-class security solutions, and am delighted that our cooperation with Tata Power SED will play such a crucial role in securing mobile communications for the Indian market.”

Secusmart GmbH (www.secusmart.com), a subsidiary of BlackBerry Limited (BlackBerry – NASDAQ: BBRY, TSX: BB), is a leading expert in the development and implementation of comprehensive solutions for protecting businesses and public authorities from electronic eavesdropping. The Vodafone Secure Call app was created by Secusmart to allow companies to make secure mobile voice calls regardless of the platform and device being used. Vodafone Germany, the system’s first marketing and distribution partner, has been equipping German business customers with this solution for secure communications since the start of 2015. With its SecuSUITE for BlackBerry 10 high-security solution, Secusmart also protects the mobile communications of German and foreign governments as well as agencies and organisations responsible for providing emergency services.

The Tata Power Company Limited, Strategic Engineering Division (Tata Power SED) has been a leading private-sector player in the indigenous Design, Development, Production, Integration, Supply and Life-cycle Support of mission critical Defence Systems of Strategic importance, for close to four decades. During this period, the Division has partnered the Ministry of Defence (MoD), the Armed Forces, DPSUs and DRDO in the development & supply of state-of- the-art Systems and emerged as a Prime Contractor to MoD for Indigenous Defence Production when it secured Orders for Pinaka Multi Barrel Rocket Launcher, Akash Army Launcher and Integrated EW System for the Indian Army and for the Akash Air Force Launcher, COTS-based Automatic Data Handling System for Air Defence and Modernisation of Airfield Infrastructure (MAFI) for the Indian Air Force. 

Text based on a Secusmart press release
For more information, visit www.TataPowerSED.com


Monday, 28 September 2015

UK National Health Service accredited apps leak medical data



A number of UK National Health Service (NHS) accredited smartphone health apps do not properly secure customer data and have poor information privacy practices, according to researchers at Imperial College London, who checked 79 of the 230-plus apps available in NHS England's Health Apps Library.

Apps in the library are supposed to be compliant with data protection legislation and undergo tests to ensure they meet standards of clinical and data safety. But despite this vetting, the researchers found that many of the apps weren't up to the required standard with some ignoring privacy standards, and nearly a third (29 per cent) sending the data ,which included both personal and health data, without any encryption at all. The majority also sent personal data to an third party associated online service.

"If we were talking about health apps generally in the consumer space, then what we found would not be surprising," said Kit Huckvale, a PhD student at Imperial College London, who co-wrote the study, suggesting that the NHS vetting procedures should conform to a higher standard.
The study sent bogus user data to all 79 apps in the study, and looked into how this was handled, eventually exposing those with poor security.  Four apps sent both identifying and health information without encryption. Although the study was not designed to examine data handling after transmission to online services, security problems appeared to place users at risk of data theft in two cases. The NHS has since claimed that it has removed the apps that are vulnerable, or has contacted the developers to insist they were updated.

But the findings are not surprising. After all, in June, NHS England was put under scrutiny for its review criteria for the Health Apps Library. The criteria were designed to provide a framework to assess those apps for suitability before they're published for the public to download - but they had been labelled weak, and furthermore it seemed as if some of the apps failed to meet even that low standard.

At the time, Phil Booth, co-ordinator at health privacy campaign group medConfidential, described the review criteria as "very weak", and added that his organisation had given feedback to NHS England on how some of the apps could be improved, but that the advice appeared to have been ignored.  For example the five step approval process is heavily focused on ensuring the information the app supplies is from an approved source and there appears to be little or no assessment of the apps suitability to handle or transmit data securely.

"Unfortunately, not all of the apps currently in the library even meet the criteria they supposedly should. And, despite having provided detailed and specific feedback on a number of these apps using the provided feedback forms on the relevant web pages SIX weeks ago, we have had no response - and nothing appears to have changed on the site."  At that time however a spokesperson from NHS England went directly to denial mode and claimed that the newly published report was out of date and that NHS Choices has improved slightly since it was written. Well that’s okay then except for the fact nothing whatsoever has been fixed.

The findings of the Imperial College London study suggest that NHS England failed to take notice of medConfidential's advice. It is likely that the Health Apps Library could be another major IT project fail for the NHS. It appears the NHS is taking a purely reactive stance to ensuring the library contains secure apps, as opposed to an eminently more sensible (considering what’s at stake) proactive approach, and this may well lead to personal and health data getting into the hands of criminals.

The NHS is just one amongst many organisations that needs to get up to speed with the criminal reality that is todays cyber world.


Wednesday, 29 July 2015

The Blame for Cyber Breaches moves into the Boardroom






The Blame Shifts?

Until quite recently Senior IT Execs have been the the lightning rods of the cyber breach era.  As soon as a company was hacked the unfortunate "IT Guy" could be seen packing his bags while silently cursing the miserable IT budget he had to work with. While most corporate entities would deny they have a blame culture they are generally happy to make exceptions and blame the head of IT when they get hacked. However things may be changing and the days are ending when IT execs most important task was to get high scores on "User Experience" surveys and take one for the team when the business was breached.

Historically the CEO's role in a breach scenario has been to offer mournful faced interviews, claiming that our privacy is important and such a significant cyber breach had been unforeseeable "who could know such a thing was possible?"..(everyone who reads the news!). But a recent spate of high-profile resignations show that the focus is now been turned squarely on senior board members.

Following a hack that compromised over 20 million personal records of government employees US Office of Personnel Management head Katherine Archuleta has been forced to resign. When the London based hedge fund, Fortelus, was hacked to the tune of $1.2 million, Thomas Meston, the CFO also lost his job.


Katherine Archuleta

These are two latest resignations in a trend that began in earnest last year when the CEO of giant US retailer Target, Gregg Steinhafel, was forced to resign from his $24 million per annum position in the wake of a disastrous data breach that compromised 40 million shoppers credit cards and 70 million customers personal data. Given a breach of this magnitude, Steinhafel was given little alternative but to leave his position as the head of the $40 billion corporation.


Target Retail Breach


The difficult fact for senior executives to understand regarding the cyber landscape is that there is nothing anyone can do after the event to limit damage. Unlike cash and other tangible assets, once the data escapes it can be replicated endlessly and shared globally in an instant.  No amount of court orders can slow down the process and a product recall doesn't really cut it. Once a breach has occurred the corporation will most likely find itself accused of negligence. It is then up to the CEO and his board to disprove any negligence claims by proving that all reasonable steps had been taken to safeguard the organisation’s database.
 
In the 80’s and 90’s when the computerized office was becoming a reality and a lot of the world’s current crop of CEO’s were in college studying business administration (without an ITC module), it was reasonable for executive boards to delegate the safeguarding of the corporate data to the experts in the IT department. The “IT guy” would install Anti-Virus software and get back to their proper job of responding to user feedback surveys, managing the network and helping users with their mouse, keyboard and printer. But now, suddenly it seems, there are hundreds of mobile devices connected to company servers and hundreds of thousands of new variations of malware being developed targeting these mobile devices it is a whole new landscape, combine this with the relentless ongoing and targeted email “phishing” campaigns that we see every day then it is clear that traditional safeguards are no longer adequate. Board members are now expected to understand the risks and authorize budgets to ensure properly designed and layered cyber defenses are in place and train staff to understand the outcome of risky behavior.  If they don't they risk ignominious dismissal.

Why Hack User Data instead of Financial Data?

The underlying reason for the growing trend in cyber-crime is because of the increasing value of corporate databases. The more business that is conducted online, the more corporations know about private citizens and therefore the more valuable the database becomes. In the case of a growing number of corporations, the company’s database is substantially more valuable than its cash holdings. A case in point is the recent Ashley Madison hack where the very personal details of up to 37 million trainee adulterers were taken from the company’s servers. This hack has destroyed Ashley Madison’s hope of a $200 million IPO and has the potential to cause untold misery to millions of families.

International organised criminals have rapidly shifted focus from financial fraud to data theft. Stolen data can be laundered more easily than stolen cash by disguising it as legitimate market research. The data can be doctored and presented to a rival organisation as legitimate; in others cases; it is simply put up for sale to the highest bidder. This is generally done via the Dark Web, using encrypted websites where anything can be bought and sold. The damage inflicted on the compromised corporation can be terminal.  With a single cyber-attack, a company can see its damage-control costs escalate out of control, its customer goodwill shattered, the company put at risk of lawsuits, and the company’s stock price decimated.

In 2014 the total number of detected security incidents globally grew to 42.8 million with the number of breaches costing over $20 million doubling.  These breaches were a litany of high-profile corporate and government security breaches such as Target Corp., Home Depot, Neiman Marcus, Michael Stores, Sony Pictures Entertainment, and Wall Street giant JPMorgan Chase, costing an estimated US$500-billion.

Bring on the Lawyers

Given the rising number of cyber violations, it’s not surprising, there has also been numerous class-action lawsuits filed in the U.S. from stakeholders for breach of fiduciary duty, including a case against another hacking incident at Sony involving the alleged theft and release of social security numbers and other personal data, while electronic commerce giant eBay Inc. is facing a class-action launched in July, 2014 by 125-million customers whose personal data was breached early last year.



The shifting face of IT Governance

With so much at stake, there is now a shift beginning toward data governance being removed from the IT department and into the boardroom as part of the enterprise risk-management framework. Boards are only now beginning to figure out that oversight of cyber security has become as much a part of their financial duty as the accounting on the balance sheet. It is not the job of the board to manage data security but it is the job of the board to ensure it is managed as well as reasonably possible.


The IT literate CEO

Given the current global tsunami of cyber-crime, CEO's need to sponsor projects that implement layered defense, mobile device management, staff training and also address the risks posed by third parties interacting with the business. Focus should be on the rapid detection of security intrusions, and an effective and rapid response.


But whatever form of attack may occur, from now on the cyber security buck stops at board level. Senior executives are beginning to realize that the delegation of total responsibility for corporate security to the "IT Guy" is over.