We are developing the social individualist meta-context for the future. From the very serious to the extremely frivolous... lets see what is on the mind of the Samizdata people.

Samizdata, derived from Samizdat /n. - a system of clandestine publication of banned literature in the USSR [Russ.,= self-publishing house]

Some hope with RFID

CNET News.com reports:

Lawmakers in California have scheduled a hearing for later this month to discuss privacy issues surrounding a controversial technology designed to wirelessly monitor everything from clothing to currency.

Sen. Debra Bowen, a California legislator recently on the forefront of an antispam legislation movement, is spearheading the August 18 hearing, which will focus on an emerging area of technology known as radio frequency identification (RFID), a representative for Bowen has confirmed.

RFID tags are miniscule microchips, which already have shrunk to half the size of a grain of sand. They listen for a radio query and respond by transmitting their unique ID code. Retailers adore the concept, which enables them to automatically detect the movement of merchandise in stores and monitor inventory in warehouses using millions of special sensors. CNET News.com wrote about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install “smart shelves” with networked RFID readers.

According to Declan McCullagh of CNET News.com Proponents hail the technology as the next-generation bar code, allowing merchants and manufacturers to operate more efficiently and cut down on theft. The privacy threat comes when RFID tags remain active once you leave a store. That’s the scenario that should raise alarms – and currently the RFID industry seems to be giving mixed signals about whether the tags will be disabled or left enabled by default.

Further, unchecked use of RFID could end up trampling consumer privacy by allowing retailers to gather unprecedented amounts of information about activity in their stores and link it to customer information databases. They also worry about the possibility that companies and would-be thieves might be able to track people’s personal belongings, embedded with tiny RFID microchips, after they are purchased. Katherine Albrecht, the head of Consumers Against Supermarket Privacy Invasion and Numbering, a fierce critic of RFID technology says:

If you are walking around emanating an electric cloud of these devices wherever you go, you have no more privacy. Every door way you walk through could be scanning you.

Policy makers in Britain are also starting to ponder the privacy implications of RFID. A member of Britain’s Parliament has submitted a motion for debate on the regulation of RFID devices when the government returns from its summer recess next month.

The internet in China – and government monitoring of it

Here’s an interesting BBC story about internet usage in China. White Rose relevant paragraphs:

Now there are more than 68m Chinese people on the net.

These figures make China the second-largest net-using nation on the planet after the US. In the first six months of 2003, almost nine million Chinese went online for the first time.

The China Internet Network Information Center gathered the figures and said that the slowdown in numbers could be due to the imposition of strict regulations on cyber cafes.

Over the past few months the Chinese Government has worked hard to close down illegal cyber cafes following a fire in an net cafe last year that left 25 people dead.

The government has also asked legitimate net cafes ones to step up their monitoring of what people do online.

Technological insecurity

ComputerWorld paints a wonderfully gloomy picture of an IT security meltdown and a complete redirection of current security practises (or lack of them):

Predictions: A Web services security breach will wreck the supply chain. And stolen fingerprints or eye scans will thwart biometric systems.

Bye-Bye Incompetents

The fakers, charlatans and incompetents will be purged from the IT security industry. In three years, 40% of the current gaggle of alleged security professionals will leave the industry—some to other professions, many to prison for egregious misrepresentation of their skills.

XML Catastrophe

In the next two years, there will be a major XML Web services security breach. The consequences will be much more severe than the defaced Web sites and stolen credit cards that caused mostly embarrassment in the early days of e-commerce. Instead, automated production lines will grind to a halt, company bank accounts will be emptied, 100-company-long supply chains will break, and the most proprietary corporate data may be disclosed.

Surgical Strikes

Three or four years ago, hackers were taking a haphazard, shotgun approach to Internet attacks, but now they’re using their tools to penetrate very specific and lucrative targets, especially enterprise networks containing valuable intellectual property. These highly targeted attacks are on the rise, each one more intelligent and harmful than the last. By 2005, targeted attacks will account for more than 75% of corporate financial losses from IT security breaches.

Stolen Fingerprints

Biometrics is perceived as the ultimate in security, but what does somebody do once their bioprint is stolen? Within three years, hackers will have all sorts of scanned fingerprints, retinal patterns, etc., and these will be used to bypass biometric network security. When your credit card is stolen, you phone Visa and have a new card issued. When your bioprint is stolen, do you call God and ask for a new set of fingerprints or eyes?

Firing the Clueless

P.T. Barnum knew that a sucker was born every minute. Since most cyber risk is directly attributable to insider activity, including the social engineering of digital dullards, a renewed focus on background checks is necessary. The chief security officer of the future, working with the HR chief, is going to find and fire digital “suckers” before their dimness puts the enterprise at risk.

There is more. Go and get scared… I am.