Translate

Thursday, 9 February 2017


The End Is Nigh

"Fake News" is nothing new.  Ever since history began we have had serious sounding people offering apparently credible accounts regarding the end of the human race.  Lately we are being bombarded with a new apocalypse almost daily.  The global suicide rate is increasing yearly. More and more people feel helpless and lost and seek the relief of oblivion from a world that feeds us an unending stream of black despair.  The thing is no matter what "new" theory the doomsayer class bring on board it has been done many times in the past.  There have been predictions of comets smashing us, waves washing us away , plagues killing us, Fundamentalists (of all sorts) rising up and smiting us and nuclear annihilation was a certainty when I was young.  So! below we have a brief history of the highlights of the failed predictions since recorded time 

Pre History
One of the world’s oldest religions, Zoroastrianism claims that the end of existence will happen when a comet, called Gochihr, strikes the earth. 

Norse myths say that Ragnarök will be the battle between the gods, killing all but two of the humans, who will then repopulate the earth. (Adam and Eve raising those incestuous kids again?)

1st century CE
Early Christianity: Second Coming and you are all judged by holy Jesus it will happen from around 100 CE up to any day now!  

7th century
Muslims believed in the Qiyamah (Last Judgement) during which time Jesus will come to earth, end all wars, and kill ad-Dajjal — the Muslim anti-Christ. Then every person who ever lived will be bodily resurrected, before being judged by God. The faithful go to heaven, and the rest to hell. Apparently there's also room for a few "People of the Book," i.e. Jews and Christians, look forward to further heavenly Armageddon’s if that happens!

16th century
In 1504: Painter Botticelli (he of the cherubs and buxom ladies) believed he was living during the End Times, according to an inscription on his painting The Mystical Nativity.
1533: Michael Stifel, Judgement Day. A common saying in German for “PIDOOMA” (the acronym for Pulled It Directly Out Of My Ass is to "talk a Stifel."



18th century
1719: Jacob Bernoulli: saw a comet in 1680 he said it would return shortly and collide with the Earth. The Comet hasn't been seen since.


19th century
The Great Disappointment in the Millerite movement was the reaction that followed Baptist preacher William Miller's proclamations that Jesus Christ would return to the Earth in 1844, what he called the Advent. His study of the Daniel 8 prophecy during the Second Great Awakening led him to the conclusion that Daniel’s “cleansing of the sanctuary” would happen on October 22, 1844. But it came and went and they were disappointed.
1865: predicted by Edward Bishop Elliott, a Victorian Biblical scholar; he later revised this to 1941. Still failed!
1881: according to an 1862 edition of the prophecies of Mother Shipton, who allegedly wrote "The world to an end shall come, In eighteen hundred and eighty one."
20th century
1910: Halley's Comet's tail crosses the Earth and people think that the world will be gassed to death by cyanogen gas.

Jehovah witnesses deserve a special mention for being the most special of Fail Masters


1914: Jehovah's Witnesses: Armageddon.
1915: Jehovah's Witnesses: Armageddon.
1918: Jehovah's Witnesses: Armageddon.
1920: Jehovah's Witnesses: Armageddon.
1923: Wilbur Glenn Voliva: Flat Earth to end
1925: Jehovah's Witnesses: Armageddon.
1927: Wilbur Glenn Voliva
1930: Wilbur Glenn Voliva
1934: Wilbur Glenn Voliva
1935: Wilbur Glenn Voliva
1941: Jehovah's Witnesses: Armageddon.
1941: Victorian scholar Edward Bishop Elliott, based on his interpretation of the Book of Revelation, came up with this date after his earlier predictions in the 1860s proved untrue.
1975: Jehovah's Witnesses: Armageddon.
mid-1970s: David Wilkerson: Worldwide economic depression.
1977: William Branham: predicated the destruction of the U.S., termination of all governments into a world government and the Second Coming of Christ.
1977: Pyramidologist Adam Rutherford: Beginning of the Millennium.
1978: Jim Jones took his cult with him and left.
1979-1980: John Todd: Installation of a world government ruled by the Illuminati, with Jimmy Carter as the anti-Christ. Not Jimmy Carter FFS, the last nice guy in American politics
1980: Pat Robertson: "A year of sorrow and bloodshed that will have no end soon, for the world is being torn apart, and my kingdom shall rise from the ruins of it."…NOPE
1981: Hal Lindsey: Pre-tribulation rapture.
1982: Pat Robertson: Great Tribulation.
1982: R.E. McMaster: World War III and/or economic depression, based on cyclical theory. Nope, although the Falklands war kicked off and that was a surprise.
1985: Pat Robertson: Worldwide economic collapse.
1988: Hal Lindsey: Second Coming.
September 11-13, 1988: Edgar Whisenant: Second Coming.
1988: Colin Deal: Second Coming.
1989: Edgar Whisenant: Second Second Coming.
1990: Elizabeth Clare Prophet: Global thermonuclear war. (missed that)
1991: Louis Farrakhan: The looming Gulf War would be the "War of Armageddon which is the final war." (yeah that happened)
1992: Rollen Stewart: Second Coming.
1992: Mission for the Coming Days: Second Coming.
1992: First end of the world prediction from collision with the Pleiades star cluster (a.k.a., "photon belt")
1994: Harold Camping: Second Coming. (bored with all the pornstar first and second comings)
1994: Some Jehovah's Witnesses: Armageddon. (these guys should give up and have some fun)
1997: Heaven's Gate: Earth changes and a UFO abduction coinciding with the Hale-Bopp comet. Mass suicide in the hopes of hitching a ride on said UFOs. (Face Palm)
1997: Jehovah's Witnesses: Armageddon. (still at it)
1998: The Church of the SubGenius: the Rupture. Every year on July 5th, they meet and party in reverence, certain that it will happen this year. (Recent writings have inverted the year to "8661.")
1999: according to some interpretations of Nostradamus
1999: A now little-known collision with Planet X
1999-2000: David Wilkerson: Worldwide economic depression
May 5, 2000: Cataclysmic crust displacement predicted by Richard W. Noone
2000: Y2K: Collapse of civilisation. Christian preachers in Papua New Guinea predicted the end.
Hal Lindsey failed on this one again.
21st century
2001: Cataclysmic displacement of the earths predicted by William Hutton
2003: Mary 2003 was supposed to have Earth cataclysmically smash into Nibiru/Planet X, according to ZetaTalk.
2005-2026: William Strauss and Neil Howe: A crisis period in the U.S. comparable in effect to the American Revolution, Civil War, and Great Depression/WWII. (still waiting)
2007: Hal Lindsey: Second Second Coming. (boring twat)
2007: Pat Robertson: Great Tribulation.
2008 — whenever she dies: Sarah Palin: believes she is of the "Final Generation" and will see the End Times during her lifetime.[citation needed]
2008 — whenever it shuts down: The Large Hadron Collider will destroy the world with black holes, strangelets or something similarly scary and full of nutritious non science.
2009: David Wilkerson: Earth-shattering calamity engulfing the whole megaplex, including areas of New Jersey and Connecticut. Major cities all across America experiencing riots and blazing fires.
2011: Harold Camping tries again: Third Second coming/rapture. May 21st, to be precise. He put up billboards! Later postponed to October 21st, but again nothing came of it. Camping might hold on to the money people sent him if he were not dead now, though he evidently blew a bundle on billboard advertisements.[42] though followers were encouraged to drain their savings for Camping's campaign funds and many are deeply disappointed that they are still alive
2011: Ronald Weinland: Second Coming on the 29th of September. Strike one!
2012: But of course! Lots of movies about what to look forward to when we die horribly in an apocalypse
2012: Ronald Weinland: Second Coming on the 27th of May. Strike two!
2012: Last known end of the world prediction from collision with the Pleiades star cluster
2013: 2012 was just a warm up, the real bad stuff starts 2013 or something and it seems Isaac Newton predicted it.
2013: Ronald Weinland: Second Coming on the 9th of May. Strike three, you're out!
2014 (February 22nd) Ragnarok The end of the present world according to Norse mythology.
2014 (March 21st) Asteroid?
2014: World War III, resurrected Nostradamus prophecy of a fire in the North for the reference of the end of the age of the fifth sun, believed to be a specific Northern region of a country, current speculation is North Korea, as relative to the resolution of a Pope prediction. Oh, and the Rapture. And a giant asteroid hitting the Caribbean.
between April 2014 and October 2015: A tetrad of lunar eclipses (or blood moons) will signal the start of the end times, according to megachurch pastor John Hagee.
Unspecified time during the reign of Pope Francis, the pope succeeding Benedict XVI. Mediaeval Saint Malachy supposedly predicted Peter the Roman (Petrus Romanus) would be the last pope, Rome would be destroyed and a terrible judge would judge his people, The end.[54] Doomsayers have already started fitting up the new pope into the prediction.
2015: Solar flare has killed us all but we don’t know yet.
2015: September 23rd (some references give a margin of September 18th to September 25th) Asteroid.
2015: October 7th. eBible Fellowship, an organisation vaguely related to the late-Harold Camping, is confident they've got the date right this time.
2016: Tom Wattkins: He had a vision of the Great tribulation claiming to have met the beast of revelation, etc. Turns out the same day is a solar eclipse., though of course he'll mention that.
2016: May 16, Pastor Richardo Salazar was allegedly told by God that an asteroid fully made of ice, with a 9km diameter, traveling at 30,000km per hour would strike earth killing 1,200 million people. The funeral would be massive apparently!
2016: June 3-4, Modern scholars got the Mayan date wrong. It was never 2012, rather it was June 2016 and there are plenty of numbers involved, the best numbers
2016: June 14-August 19, according to this super-reliable-super-honest-super-definitely-NOT-bullshitting "NASA scientist", there was meant to be a magnetic reversal between June and August which would cause the Van Allen belt to fall killing 80% of life on Earth. He got this information from aliens via HAARP. Yup, aliens told our good 'ol uncle Dr. Sal that the sky is falling.
2016: October 31st, Walid Shoebat alleges that the world is "100% certain" to end on this exact arbitrary nutjob date. As the basis for this claim, he refers to his own science of "Futurology 101".
2016, Bible student and computer scientist Nora Roth on MarkBeast.com claims as much through a lot of numerology surrounding seventy "sevens".
2016, December: Bible student and computer scientist Nora Roth subsequently revised her claim to December.


Okay, we are still here and so many people are sad and disappointed that we have not been plagued, shot, drowned, smitten or commeted to death that they probably killed themselves.

What further we can look forward to failing
2017, October: Nibiru/Planet X will again collide with Earth, this time according to David Meade.
2017: Various Christians: We'll be chipped, and the Great Tribulation begins.
2017 to 2113: Asteroids.
2018: 24th of June, obscure crank Mathieu Jean-Marc Joseph Rodrigue ensures that doom is upon us, based on some middle school math.
2018: Hal Lindsey: Third Second Coming.
2018: The Bible guarantees May 20 2018 Pentecost
2026: More asteroids.
2028: Fred Clark: A tongue-in-cheek offer guaranteeing 15 years of Bible-prophecy hucksterism for four easy payments of $39.99.
2030: Approximate date of a mass extinction event predicted by Bob Geldof. Myles Allen, of Oxford University claims "Competing hyperbole" are unhelpful in understanding real climate change. [75]
2035: Even more asteroids.
2036: Yet more asteroids.[
2037: Hal Lindsey: First Third Coming.
2038: Deterioration of the fundamental older technology that still underlies the most crucial systems today.
2039: End of life, the universe and everything. Also known as the Ascension.
2040: Yes still more asteroids.

2041: March another asteroid apparently.

What is my point?  Well it is simple, please cheer the fuck up and be nice to each other.  The world is going nowhere, none of us is getting out alive so enjoy the ride.




https://youtu.be/Z-OytmtYoOI

Saturday, 5 March 2016

1984 has arrived, just a bit later than expected



Smartphones and 1984:  Are We There Yet?

Most people have heard of the book “1984”.  It is without doubt George Orwell’s best novel and remains one of the most powerful warnings ever issued against the dangers of a totalitarian society.
For those who need a reminder the book was written in 1949 and set in the author’s future.  In Orwell’s bleak vision the main thread of the story is the omnipresent government surveillance at all levels of society.  People are electronically watched 24 hours a day and “disappeared” if they step from the narrow party line. 

The authors name has even entered the English language as “Orwellian”, an adjective used to describe a totalitarian system in which an organisation or government relentlessly spies on people in an attempt to exercise complete control over their behaviour and thoughts.

What has a book written over 60 years ago got to do with smartphones?  Well maybe more than first appears.  A disturbing picture of the state of data surveillance and collection is emerging.


Apples Fight for your Data Security

Despite Apples posturing towards the FBI regarding the privacy of an individual’s data it seems they might not be as concerned about privacy as we are led to believe.  The respected security researcher Jonathon Zdziarski wrote a paper titled; Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices. The paper describes how; with or without Apple’s help, spying agencies such as NSA and other third parties, familiar with how iOS operates can use these vulnerabilities to extract data from an iPhone, or even install applications for malicious purposes without the user’s knowledge.

Currently iPhones collect and report back location data and web search data and have access to user information stored in the iCloud and iTunes




Apple can access you contacts even if you disable iCloud and iMessage.  Consumers say they want privacy, but do not typically alter actions to protect themselves. This is among key findings from a recent study commissioned by Trend Micro Incorporated (TYO: 4704; TSE: 4704). The global study conducted by Ponemon Institute, “Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers,” reveals a slight majority of consumers believe the benefits of the Internet of Things (IoT) outweigh privacy concerns. However, 75 percent feel they do not have any control over their personal information. In addition, the research compares consumers’ perceptions on privacy, their willingness to change behaviour and the perceived value of their personal information“

These comprehensive findings show that, while consumers seem to be concerned about privacy and security, they do not fully grasp the role they can play according to Raimund Genes, CTO, Trend Micro. “At the same time, the majority who identify themselves as ‘privacy sensitive’ will not change their behaviour or information sharing practices even if they experience a data breach. This could be attributed to a feeling of powerlessness or an overall lack of awareness. It’s clear that more attention is needed to protect privacy and security on a personal basis. Fortunately, there are resources available to help individuals learn how to protect themselves.” Unfortunately People need to educate themselves because neither governments nor corporations will benefit from users who can keep their information locked down.



So we should Just Use Android Smartphones.

Android is a mobile operating system developed, maintained and distributing by Google to anyone who wants it FOR FREE.  Think about it for a second.  Why would the biggest advertising company in the world, actually he world’s largest publicly traded company spend millions on a product and then give it away?  It’s simply because they can make more money from the collection of data from the estimated 1.4 Billion devices running its software.

Since its meteoric rise in the internet age, Google has reached technological capabilities that seem almost science-fiction. Their latest is a neural network with a “superhuman” ability to determine the location of almost any image.  The internet giant’s immense collection of personal data amounts to its own surveillance network that likely exceeds the best government spy program anywhere in the world. The data sweep is not only online; Google’s Street View cars were discovered collecting information from wi-fi hubs ranging from “people’s medical histories to their sexual preference to marital infidelity.”

Google has said that their collection of data, when used properly, advances the public well-being. This sounds uncomfortably familiar to the propaganda campaign of intelligence officials defending the NSA’s domestic spying program and other intrusions of privacy revealed by Edward Snowden.

The next logical stage in this journey towards 1984 is to track a user's health behaviour using so called smart watch or fitness bands.  These devices are being developed to collect clues of a much more comprehensive nature than just steps in the park. Your blood pressure, electrodermal activity, blood alcohol content and much more than can be already be collected by health-tracking gadgets currently on sale.  I sincerely hope that smartphone users are concerned about insurance corporations collecting this type of personal data because they really as they should be.  If we keep going down the road we are on then soon we will be required to wear "health" bands to get medical insurance.  

On Wednesday 09th March, the European Union is expected to drop the hammer on Google, charging the company with violating antitrust rules with its search dominance. It’s the tail end of a five-year investigation from the EU’s competition commission, and a prolonged regulatory headache for the search giant. It could be costly too: The EU is reportedly plotting a fine as large as $6.4 billion, roughly a tenth of Google’s annual revenue. The Financial Times first reported the news.  Needless to say whatever happens there will be an appeal.

What happens next?

It is up to each and every citizen to educate themselves and decide if they want to be a drone tracked by corporate algorithms or if they want to grow as individuals and make decisions based on learned reasoning rather than asking Google for an answer every time they stumble.  I am not confident that the former will happen.

References
http://www.computerworld.com/article/2855567/data-from-wearable-devices-could-soon-land-you-in-jail.html

Tuesday, 3 November 2015

Marketing Images for the New Android BlackBerry Priv


Below is a collection of BlackBerry Android Priv Artwork..It is an interesting direction and quite different from previous campaigns.  What do you think?




















Tuesday, 6 October 2015

Tata Power SED and Secusmart, a subsidiary of BlackBerry, Sign Contract Agreement

Launcher System Developed by Tata Power


Secusmart, the global expert in secure mobile communications, and Tata Power Strategic Engineering Secusmart Division (SED), part of the multinational Indian conglomerate, Tata Group, today announced a comprehensive partnership for the Indian market. The two companies have signed a term sheet (MoU) providing a framework for the collaboration, the aim of which is to evaluate the design, development and marketing of a highly secure mobile communications system tailored to the needs of Government customers in India.

“In the era of increasing incidents of espionage in State establishments and Corporates with cyber security breaches and data theft, the envisaged association with BlackBerry will increase opportunities to accelerate innovation for high-end secure communication solutions. The proposed collaboration is aimed at leveraging Tata Power SED’s expertise in security, software and hardware design and manufacturing and Secusmart’s expertise in software and security to provide a highly capable and secure communication solution meeting stringent Government requirements,” said Rahul Chaudhry, CEO of Tata Power SED.

The term sheet was signed during German Chancellor Angela Merkel’s official trip to India, underlining the importance of the partnership to both parties, and highlighting how crucial secure mobile communications are to the Government of India.

Dr Hans-Christoph Quelle, Chief Executive Officer, Secusmart, also commented on the partnership. He said: “Since Secusmart was founded, we have continued our focus on making mobile communications more secure, for customers all around the world. I am proud of our continued success in delivering world-class security solutions, and am delighted that our cooperation with Tata Power SED will play such a crucial role in securing mobile communications for the Indian market.”

Secusmart GmbH (www.secusmart.com), a subsidiary of BlackBerry Limited (BlackBerry – NASDAQ: BBRY, TSX: BB), is a leading expert in the development and implementation of comprehensive solutions for protecting businesses and public authorities from electronic eavesdropping. The Vodafone Secure Call app was created by Secusmart to allow companies to make secure mobile voice calls regardless of the platform and device being used. Vodafone Germany, the system’s first marketing and distribution partner, has been equipping German business customers with this solution for secure communications since the start of 2015. With its SecuSUITE for BlackBerry 10 high-security solution, Secusmart also protects the mobile communications of German and foreign governments as well as agencies and organisations responsible for providing emergency services.

The Tata Power Company Limited, Strategic Engineering Division (Tata Power SED) has been a leading private-sector player in the indigenous Design, Development, Production, Integration, Supply and Life-cycle Support of mission critical Defence Systems of Strategic importance, for close to four decades. During this period, the Division has partnered the Ministry of Defence (MoD), the Armed Forces, DPSUs and DRDO in the development & supply of state-of- the-art Systems and emerged as a Prime Contractor to MoD for Indigenous Defence Production when it secured Orders for Pinaka Multi Barrel Rocket Launcher, Akash Army Launcher and Integrated EW System for the Indian Army and for the Akash Air Force Launcher, COTS-based Automatic Data Handling System for Air Defence and Modernisation of Airfield Infrastructure (MAFI) for the Indian Air Force. 

Text based on a Secusmart press release
For more information, visit www.TataPowerSED.com


Monday, 28 September 2015

UK National Health Service accredited apps leak medical data



A number of UK National Health Service (NHS) accredited smartphone health apps do not properly secure customer data and have poor information privacy practices, according to researchers at Imperial College London, who checked 79 of the 230-plus apps available in NHS England's Health Apps Library.

Apps in the library are supposed to be compliant with data protection legislation and undergo tests to ensure they meet standards of clinical and data safety. But despite this vetting, the researchers found that many of the apps weren't up to the required standard with some ignoring privacy standards, and nearly a third (29 per cent) sending the data ,which included both personal and health data, without any encryption at all. The majority also sent personal data to an third party associated online service.

"If we were talking about health apps generally in the consumer space, then what we found would not be surprising," said Kit Huckvale, a PhD student at Imperial College London, who co-wrote the study, suggesting that the NHS vetting procedures should conform to a higher standard.
The study sent bogus user data to all 79 apps in the study, and looked into how this was handled, eventually exposing those with poor security.  Four apps sent both identifying and health information without encryption. Although the study was not designed to examine data handling after transmission to online services, security problems appeared to place users at risk of data theft in two cases. The NHS has since claimed that it has removed the apps that are vulnerable, or has contacted the developers to insist they were updated.

But the findings are not surprising. After all, in June, NHS England was put under scrutiny for its review criteria for the Health Apps Library. The criteria were designed to provide a framework to assess those apps for suitability before they're published for the public to download - but they had been labelled weak, and furthermore it seemed as if some of the apps failed to meet even that low standard.

At the time, Phil Booth, co-ordinator at health privacy campaign group medConfidential, described the review criteria as "very weak", and added that his organisation had given feedback to NHS England on how some of the apps could be improved, but that the advice appeared to have been ignored.  For example the five step approval process is heavily focused on ensuring the information the app supplies is from an approved source and there appears to be little or no assessment of the apps suitability to handle or transmit data securely.

"Unfortunately, not all of the apps currently in the library even meet the criteria they supposedly should. And, despite having provided detailed and specific feedback on a number of these apps using the provided feedback forms on the relevant web pages SIX weeks ago, we have had no response - and nothing appears to have changed on the site."  At that time however a spokesperson from NHS England went directly to denial mode and claimed that the newly published report was out of date and that NHS Choices has improved slightly since it was written. Well that’s okay then except for the fact nothing whatsoever has been fixed.

The findings of the Imperial College London study suggest that NHS England failed to take notice of medConfidential's advice. It is likely that the Health Apps Library could be another major IT project fail for the NHS. It appears the NHS is taking a purely reactive stance to ensuring the library contains secure apps, as opposed to an eminently more sensible (considering what’s at stake) proactive approach, and this may well lead to personal and health data getting into the hands of criminals.

The NHS is just one amongst many organisations that needs to get up to speed with the criminal reality that is todays cyber world.


Wednesday, 29 July 2015

The Blame for Cyber Breaches moves into the Boardroom






The Blame Shifts?

Until quite recently Senior IT Execs have been the the lightning rods of the cyber breach era.  As soon as a company was hacked the unfortunate "IT Guy" could be seen packing his bags while silently cursing the miserable IT budget he had to work with. While most corporate entities would deny they have a blame culture they are generally happy to make exceptions and blame the head of IT when they get hacked. However things may be changing and the days are ending when IT execs most important task was to get high scores on "User Experience" surveys and take one for the team when the business was breached.

Historically the CEO's role in a breach scenario has been to offer mournful faced interviews, claiming that our privacy is important and such a significant cyber breach had been unforeseeable "who could know such a thing was possible?"..(everyone who reads the news!). But a recent spate of high-profile resignations show that the focus is now been turned squarely on senior board members.

Following a hack that compromised over 20 million personal records of government employees US Office of Personnel Management head Katherine Archuleta has been forced to resign. When the London based hedge fund, Fortelus, was hacked to the tune of $1.2 million, Thomas Meston, the CFO also lost his job.


Katherine Archuleta

These are two latest resignations in a trend that began in earnest last year when the CEO of giant US retailer Target, Gregg Steinhafel, was forced to resign from his $24 million per annum position in the wake of a disastrous data breach that compromised 40 million shoppers credit cards and 70 million customers personal data. Given a breach of this magnitude, Steinhafel was given little alternative but to leave his position as the head of the $40 billion corporation.


Target Retail Breach


The difficult fact for senior executives to understand regarding the cyber landscape is that there is nothing anyone can do after the event to limit damage. Unlike cash and other tangible assets, once the data escapes it can be replicated endlessly and shared globally in an instant.  No amount of court orders can slow down the process and a product recall doesn't really cut it. Once a breach has occurred the corporation will most likely find itself accused of negligence. It is then up to the CEO and his board to disprove any negligence claims by proving that all reasonable steps had been taken to safeguard the organisation’s database.
 
In the 80’s and 90’s when the computerized office was becoming a reality and a lot of the world’s current crop of CEO’s were in college studying business administration (without an ITC module), it was reasonable for executive boards to delegate the safeguarding of the corporate data to the experts in the IT department. The “IT guy” would install Anti-Virus software and get back to their proper job of responding to user feedback surveys, managing the network and helping users with their mouse, keyboard and printer. But now, suddenly it seems, there are hundreds of mobile devices connected to company servers and hundreds of thousands of new variations of malware being developed targeting these mobile devices it is a whole new landscape, combine this with the relentless ongoing and targeted email “phishing” campaigns that we see every day then it is clear that traditional safeguards are no longer adequate. Board members are now expected to understand the risks and authorize budgets to ensure properly designed and layered cyber defenses are in place and train staff to understand the outcome of risky behavior.  If they don't they risk ignominious dismissal.

Why Hack User Data instead of Financial Data?

The underlying reason for the growing trend in cyber-crime is because of the increasing value of corporate databases. The more business that is conducted online, the more corporations know about private citizens and therefore the more valuable the database becomes. In the case of a growing number of corporations, the company’s database is substantially more valuable than its cash holdings. A case in point is the recent Ashley Madison hack where the very personal details of up to 37 million trainee adulterers were taken from the company’s servers. This hack has destroyed Ashley Madison’s hope of a $200 million IPO and has the potential to cause untold misery to millions of families.

International organised criminals have rapidly shifted focus from financial fraud to data theft. Stolen data can be laundered more easily than stolen cash by disguising it as legitimate market research. The data can be doctored and presented to a rival organisation as legitimate; in others cases; it is simply put up for sale to the highest bidder. This is generally done via the Dark Web, using encrypted websites where anything can be bought and sold. The damage inflicted on the compromised corporation can be terminal.  With a single cyber-attack, a company can see its damage-control costs escalate out of control, its customer goodwill shattered, the company put at risk of lawsuits, and the company’s stock price decimated.

In 2014 the total number of detected security incidents globally grew to 42.8 million with the number of breaches costing over $20 million doubling.  These breaches were a litany of high-profile corporate and government security breaches such as Target Corp., Home Depot, Neiman Marcus, Michael Stores, Sony Pictures Entertainment, and Wall Street giant JPMorgan Chase, costing an estimated US$500-billion.

Bring on the Lawyers

Given the rising number of cyber violations, it’s not surprising, there has also been numerous class-action lawsuits filed in the U.S. from stakeholders for breach of fiduciary duty, including a case against another hacking incident at Sony involving the alleged theft and release of social security numbers and other personal data, while electronic commerce giant eBay Inc. is facing a class-action launched in July, 2014 by 125-million customers whose personal data was breached early last year.



The shifting face of IT Governance

With so much at stake, there is now a shift beginning toward data governance being removed from the IT department and into the boardroom as part of the enterprise risk-management framework. Boards are only now beginning to figure out that oversight of cyber security has become as much a part of their financial duty as the accounting on the balance sheet. It is not the job of the board to manage data security but it is the job of the board to ensure it is managed as well as reasonably possible.


The IT literate CEO

Given the current global tsunami of cyber-crime, CEO's need to sponsor projects that implement layered defense, mobile device management, staff training and also address the risks posed by third parties interacting with the business. Focus should be on the rapid detection of security intrusions, and an effective and rapid response.


But whatever form of attack may occur, from now on the cyber security buck stops at board level. Senior executives are beginning to realize that the delegation of total responsibility for corporate security to the "IT Guy" is over.




Monday, 8 June 2015

BlackBerry Extends its IoT reach from Cars into Ships and Hospitals

Most of us know that the BlackBerry’s QNX operating system used to power BlackBerry 10 phones has also become the technology of choice for mapping, communication and entertainment systems in cars.  Automakers from mass producer Ford to exclusive Porsche and BMW use the software.  QNX Software Systems is the leader in automotive software by a long shot and is forecast to remain the leader for the foreseeable future. According to Egil Juliussen, director of research, infotainment and ADAS, IHS Automotive QNX will grow from ”more than 16 million units in 2013 to 56 million in 2020,” But now BlackBerry is looking to use QNX to enter the transportation industry with iOT technology that will enable shipping companies to keep track of their cargo.

What is IoT again?

The Internet of Things describes the technology which connects objects to wireless networks, whether it's a person's smartphone to their fridge, or a trucking company to its fleet. The latter example is where BlackBerry says there's plenty of growth potential this year. Chennakeshu said the current systems used by the shipping industry are "a little archaic and not scalable."
"It's a very large business, in the tens of billions of dollars, with very low penetration."



Tracking a Shipment

Container ship

BlackBerry have unveiled the foundation of its Internet of Things platform at the Consumer Electronics Show in Las Vegas, marking the first step towards building a service BlackBerry believes will be a gateway to significant growth for its business.  BlackBerry will provide hardware and software support for cloud-based communications boxes built into shipping containers.

Each device will include a cellular radio, Wi-Fi connectivity, a microprocessor and sensors that monitor what's in the container, its location and other details to help fleet managers stay on top of their products and anticipate potential problems.
"There's lots of useful information you can collect to get more efficient," said Sandeep Chennakeshu, president of the BlackBerry's Technology Solutions unit in a telephone phone interview from CES. "(The communication box is) very similar to a cell phone, except it doesn't have a display or a keypad. That's right up our alley."

An early test was completed in October this year and plans are underway to make the devices available in "limited specific-use cases" in April, Chennakeshu said.
Bear in mind that there are 200 million shipping container movements every year and of those an estimated 10,000 containers are lost.  Even a limited trial in this industry is large

Over the past year, under the leadership of chief executive John Chen, the company has undergone a dramatic change in priorities and refocused mostly on large contracts with businesses, rather than chasing individual users.
BlackBerry has also looked for other ways to leverage its existing technology in new ways. Moving into the Internet of Things business is just one of a number of new initiatives.

Over the air updates

Chasing the shipping industry is only part of BlackBerry's bigger plan for the QNX Internet of Things platform, BlackBerry also sees opportunity to sell similar technology to automakers, who plan to install sensors in cars to detect mechanical problems and notify drivers when they need to get their vehicle serviced.  There was also a recent announcement of QNX auto system that will allow over the air updates for car software and so avoid expensive visits to the shop or even mass recalls such as the 1.9 million cars recalled by Toyota last year over a software issue.

Healthcare and IoT

BlackBerry announced at the beginning of this year that its QNX software will be used in the next generation of the HBox, a device made by U.S.-based medical technology company NantHealth, which BlackBerry acquired a minority stake in last April.

The HBox operates as a hub between mobile devices and the servers of health care companies, serving as part of an encrypted pipeline to transfer medical records between doctors and medical care centers.
“With HBox, we have created a ‘human signal’ capturing device that automatically and securely transmits, through our HIPAA-compliant ‘NantCloud,' critical medical data and vital signs to the mission control center,” said Patrick Soon-Shiong, M.D., founder and CEO of NantHealth. “Instantly and safely connecting the patient with the doctor and hospital allows for a higher quality of healthcare, expediting diagnosis and treatment, as well as more efficiently and accurately providing vital information into the hands of those in need.”
The QNX enabled HBox will be compatible with BlackBerry’s BES enterprise mobility management platform. HBox, once integrated with BES, will be fully encrypted to allow deployment in a HIPAA-secured environment, enabling clinicians and patients to securely access and receive medical information as soon as it is available, wherever they are.


The HBox marks the second ground breaking product resulting from the collaboration of BlackBerry and NantHealth. Last month, the two companies announced the first secure clinical genome browser, the NantOmics Cancer Genome Browser™, which provides doctors unprecedented access to patients’ genetic data on the BlackBerry® Passport smartphone.


Human Genome Displayed on a Passport



So, next time you hear someone say "BlackBerry the struggling smartphone maker" ignore them, BlackBerry is about a whole lot more than consumer smartphones.