Alongside Techonomy's recent mini-conference on the Internet of Everything in Menlo Park in May, we interviewed Michael Fertik, CEO of Reputation.com. Fertik is one of the world's most successful innovators focusing on a topic of great concern globally—privacy on the Internet. Reputation.com can sanitize and improve the way one is viewed in Google searches and other online contexts, and Fertik has given more thought than most to what we are doing as the Net evolves and more and more info about us is exposed in disparate contexts. In this video interview he talks about his hopes and fears, and waxes surprisingly philosophical about the relative importance and value of being human, and being a machine. More
Internet of Things Security & Privacy
Reputation.com’s Fertik: Put Humans Back at the Center of the Internet
Could a Drone Kill You on Its Own?
Drones are among the fastest-growing concerns of citizens and governments worldwide. The U.S. has taken the lead in using them militarily for attacks and assassination, generating extensive criticism and promoting a debate over whether the policy reduces or increases terrorism. Israel, too, has extensively used military drones, and China has admitted contemplating it. Now worries have emerged among rights activists and others that the decision over whether or not to kill may itself be delegated to the drones. More
Now, Everybody’s an Investigator
As the real-time manhunt continues in Boston—with the city on lockdown and one suspect still at large—we’re witnessing a profound shift in the role of the crowd. Since the Boston Marathon attacks on Monday, the public has been asked for by law enforcement officials, and taken it upon themselves, to help solve the crime. Having a plethora of evidence from a variety of sources—photos, video, and eyewitness accounts—has been key in the effort to apprehend the perpetrators. But where it gets hazy is when the public, emboldened on sites like Reddit and 4Chan Think Tank, becomes judge and jury, and ends up wrongly implicating lookalikes. More
Investigators Will Crowdsource Clues to Boston Attack
Tracking down the perpetrators of Monday's Boston Marathon bombing will depend in part on determining the techniques they used, an aspect of the investigation that will rely heavily on evidence gathered from videos and photos of the crime scene. The New Yorker's Paige Williams spoke with former crime-scene analyst and Boston University School of Medicine instructor Adam B. Hall about the types of clues investigators will be looking for, and why. Forensic chemistry, explains Hall, lets investigators put together chemical evidence in crimes that involve drugs, arson, and explosives. To learn about the devices used in the Boston attack, Hall says investigators will be collecting every piece of evidence they can. More
Google’s Person Finder Launched Moments After Boston Explosions
Within moments of the explosions at the finish line of the Boson Marathon today, Google put its Person Finder into action to help friends and family locate loved ones who might have been affected and were unreachable by cell phone. At 7:00 pm, the app was tracking about 3,000 records. More
With Mobile the Future, How Does a Company Stay Secure?
A PC, Mac, iPad, Android, BlackBerry, and Nexus 7 all sit on Sam Curry’s desk one afternoon while he works from home. Though not everyone has access to such a range of mobile devices, this lineup offers a glimpse at the diversity of devices people now use to work. Curry is CTO of Identity and Data Protection at RSA, a firm specializing in information security. During a phone call last week, he said that all the devices on his desk provide connectivity for his work at RSA, each with its own unique set of capabilities and limitations. More
Seeking Consensus on Cyberdefense
The cyberattack that temporarily paralyzed the American Express website last week highlighted the escalating frequency and brazenness of strikes aimed at global financial institutions. In the past six months, similar attacks hit JPMorgan Chase, Wells Fargo, and Bank of America, while another disabled computers at banks and television networks in South Korea. As predicted by Arthur W. Coviello at the Techonomy 2012 conference last November, the perpetrators of these attacks appear to be more focused on disruption than on fraud. More
Techonomy 12 Security & Privacy Techonomy Events Video
Cyberwar: It’s a MAD MAD World
As society relies ever more on the Internet, cyberwar and its unpredictable consequences has become our 21st century bogeyman. And the country most responsible for letting this particular genie out of its bottle, as with another frightening weapon back in the 1940’s, appears to be the United States. Can there really be winners in a cyberwar? More
Learning Partner Insights Security & Privacy
Educating IT Security Soldiers for a Virtual Cold War
On a new global battlefield, countries, criminals, and commercial competitors can effectively leverage technology to steal from or attack target organizations. Corporate intellectual property is at risk of breach as most everyone seeks to gain advantage in the innovation race. Military and government information faces the same risks with consequences for national security, digitized assets, and international affairs. The most dangerous hackers are no longer solitary, discontented teenagers working from their basement bedrooms, but instead are highly skilled professionals employed by corporate offices or military bases. More
Bio & Life Sciences Security & Privacy
Black Box for DNA Analysis Keeps Data Off the Cloud
Despite the widely hailed plummeting price and time to get a whole-human-genome sequence, it still takes a battery of software applications and a dream team of specialists to analyze, interpret, and apply DNA data in a medically useful way. A new piece of hardware described in The New York Times this weekend is positioned to substitute for at least a few players on the team. More
Security & Privacy Techonomy Events
Are Recent Network Attacks as Serious as Washington Says?
Some members of Congress and the White House want to mandate certain “cybersecurity practices” because they believe private sector companies are not doing enough to protect systems. Push-back from business stalled the legislation before the recent election. Now, a series of high-profile attacks is being used to bolster the argument that the U.S. government needs more authority over private sector systems as well as access to data that might indicate incursions. More
Government Manufacturing Security & Privacy
A Gun Made from a 3D Printer? Techno-Challenges Grow More Complex
At Techonomy we believe that just about literally everything is being transformed by technology, especially Internet technology, and we also are quite psyched about 3D printing. It's another example of the empowerment of individuals—in the potent tradition of the PC, Web browser, Facebook, etc. But now guns are beginning to be made with 3D printers. There is likely nothing that can be done to stop that. It underscores another fundamental Techonomy point—that all of us, as citizens, leaders, and human beings—need to be thinking harder about what technology is doing to the world in which we live. Disruption is right. More
Obama Campaign Uses Big Data to Target Voters Block by Block
As reported by Richard McGregor in the Financial Times, one voter whose name, age, and address were published in the "Obama for America" app, which helps canvassers target doors to knock on, was decidedly nonplussed about having his personal information downloadable by anyone with a smartphone. "Everything is an invasion of privacy these days," he said. "If I got excited about it, I would have had a coronary by now." Others are less sanguine about the ways the Obama campaign is using technology, and data culled from social media, to micro-target voters. But both campaigns have tools that tell them a lot more about voters than their ages and addresses, and they're using them to "slice and dice" the voting population in a way Barack Obama could have never envisioned when he gave his seminal 2004 convention speech. More
Security & Privacy Techonomy Events
Bret Hartman of RSA on Cyber Defense
In this video from Techonomy 2011 in Tucson, Ariz., Bret Hartman, CTO of RSA, talks about lessons his company learned when they faced a major cyber attack in early 2011. Hartman addresses the technological, legal, and political barriers to protecting our security, and discusses the severity of intellectual property theft as a global problem. More