Self-Defeating Social Media

Grunge Warning Sign - Do Not Read This SignActivism is very trendy on social media and in social networks. Someone in your network, I’m sure, is intent on saving something – be it trees, wildlife, the environment, some poor misunderstood politician, or something else. Everyone.

It gets to be too much and borders on defamation (or jumps solidly on it) at times. For example, imagine a posting of the rear of a car with accompanying text, “This person threw a bag of kittens on the ground and drove off!”. Horrible, right?

Now imagine that the pictured car is yours. “Wait!”, you’ll say, “But I didn’t do that!” And social media will roar back, “No, no, you did, you’re being dishonest!”

Let’s assume good. Let’s say it wasn’t you. Not very brilliant of the person who started that meme, was it? We forget to question what we see and hear on social media, we refuse to ask questions, and we go with the flow. A few of us unpopular folks take a moment and make a decision whether it merits sharing, but most people don’t seem to have enough brain cells to have that conversation in their brain.

People have died over that stuff when it comes to bombings and other things. I’m waiting for the lawsuits to start rolling in.

In Trinidad and Tobago, there are people posting about hunting out of season, selling animals illegally, etc. The system is allegedly corrupt – I don’t know firsthand, so I say alleged because I have to be responsible for what I write and share. That reporting to authorities has not netted any arrests is frustrating, I imagine – but, too, there’s a lot of frustration about crime and what is popularly seen as the inefficacy of law enforcement.

Be that as it may, it has become trendy to re-post things where people appear to be doing things illegally. Selling monkeys, for example. In a perfect world, one would send that to the authorities and the authorities would do their jobs… and people would get arrested. This, allegedly, is not working, so instead this stuff gets re-posted, shared across networks…

And of course, everyone’s upset, and the only thing that can compete with cute animal videos is what people are upset about. Now take a moment. This guy, because people are upset with him, got his post to go viral. Speculation – if he had monkeys to sell, he was more likely to find a buyer. And, if he has a brain, he’ll learn not to post such things where authorities might start paying attention and prosecuting people.

If authorities do actually want to do something, they’re now trying to find someone who may well know that he’s been made. With just enough brain cells, he ducks it and learns his lesson.

In so many ways, re-posting things can be counter-productive to the intended result.

Think first. Post later.

Having good intentions is not enough, and never will be.

If Only.

170616-N-XK398-090I’m reading the latest stuff on NOAA’s Tropical Cyclone 2 Updates (06182017), and I’m remembering some things.

If only there was someone who had dealt with emergency communications and worked toward developing a system where alerts could be sent to people’s mobile phones.

If only he had a military medical background with an idea of how things really work – and don’t – on the ground.

If only CARICOM had put such a system in place; if only when this alleged person was approached by Roosevelt King they hadn’t said they needed to spend a few hundred thousand US dollars to get it done.

If only he hadn’t told them that they could have developed the system from scratch starting at about $10K U.S., with development costs, circa 2006. That was too cheap and would employ local developers. That would be no good.

If only there was someone who had found himself working with such systems at ECN, and worked to troubleshoot existing systems, design new ones and see what goes wrong – plus document it all. If only those systems included NOAA! If only when he returned to Trinidad and Tobago, he tried connecting with people in Digicel and TSTT and met silence.

If only such a person existed. If he did, he’d probably be a farmer by now after having tried to chase a vision no one else wanted. Hypothetically, 12 years is a long time by human standards. 1/6th or 1/7th of a decent lifespan, really.

Ahh, well. If only we had that experience. Too bad.

A Curmudgeon’s Guide to Social Media

Grim JoyI used to be heavily involved in social media; some might think I still am when I’ve simply become more efficient and have sculpted my networks. In all, though, I rate myself a curmudgeon – a ‘a bad-tempered, difficult, cantankerous person.’

This is not to say that I am a curmudgeon, but I imagine that there are some people who send me things who now believe I am a curmudgeon. Wishing people happy birthday on social media with a click is silly. A deluge of images of politicians leaves me feeling dirty in ways a shower cannot cure, a stream of people who believe Putin masterminded everything from the Presidential Election in the U.S. to their lost sock makes me roll my eyes, watching building blocks of uninformed opinion become representative of otherwise intelligent people is the intellectual equivalent of being assaulted with gift wrapped feces.

David over at Raptitude figured out that he could have more time to do things with his experiment. Yet even as a curmudgeon, I have to point out that social media, social networks and the humans that use them are a part of our lives – we just don’t need to exist on their plane; they need to exist on ours.

What that means is we should understand that it’s typically not very important, and we should be OK with telling people not to send us crap on WhatsApp, Facebook messenging, Twitter, Instagram, and whatever crackpost (that was a typo but I like it) network that people use as echo chambers to feel good about themselves.

We shouldn’t have to think of ourselves as curmudgeons to do this.  We can control what we take in simply by telling people what we don’t want to spend our time on –  be it the stale joke networks on whatsapp to the in depth discussion on doomed men’s fashion, from the cute puppy videos to the insane amount of posts about adopting animals, etc. In my spare time, I don’t want that to be what defines me.

No, I’d rather define myself than be molded into an acceptable image of what society likes. We are society.

Public Comment on the Trinidad and Tobago CyberCrime Bill, 2017.

cybercrimeI like the spirit of the bill. My own personal background in technology is public knowledge; my LinkedIn profile will demonstrate that I have worked with companies that have been sensitive to ‘cybercrime’.  As an author on technology (virtual worlds and more), as someone who has earned media mention (BBC, New York Times), as someone who has been active in technology circles in the region (CARDICIS, LACNIC) and outside (the 1st Mobile Convergence, among others) and as someone who has spent over two decades of his life in software engineering, I submit the following comment:

Clause 4:

““electronic mail message” means an unsolicited data message, including electronic mail and an instant message;”

While these messages can be unsolicited, they can also be solicited. I think the use of the word ‘unsolicited’ should be reserved for what is popularly known as SPAM.

“hinder” in relation to a computer system, includes—
(a) disconnecting the electricity supply to a computer system;
(b) causing electromagnetic interference to a computer system;
(c) corrupting a computer system; or
(d) inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data;

Item (d) is problematic because it is contextual and no context is provided. It describes functions that can be perfectly legitimate in designed use of systems. Further, I would like to point out that the undesigned use of systems is what is called ‘disruptive’; that ‘disruptive’ in this context is about innovation, and that innovation is of particular importance to a developing economy. To stifle innovation is to stifle the economy and culture of the nation.

For example, no one expected ‘apps’ to become popular on phones, and installing ‘apps’ on a phone can have an adverse impact on performance.

The question then becomes how much is adverse, and we enter a realm of subjectivity in a world where Moore’s Law advances faster than amendments to Acts. This is why computer software has ‘System Requirements’ as far as operating system and hardware.

Further, there are ways of altering data that are not direct, and as such, defining the methods of altering data limits the Act. Since this is a public comment, I shall not divulge further.

I suggest the following:

““hinder” in relation to a computer system, includes—



(d) Affecting computer data or software in such a way that overall performance and use of the system is adversely affected to the degree that a system cannot perform it’s functionality when all documented system requirements are within normal limits.

(e) Rendering the data on a computer system to be unusable for it’s operation.”

 

Clause 10:

It should also be worthy noting that the critical infrastructure also entails the entire Domestic Communication Infrastructure (DCI), which has crossover to the Telecommunications Act (Section 69). This is increasingly important since Session Initiation Protocol (SIP) trunking is  increasingly used for telecommunications (Voice over IP (VoIP)).

Businesses also are concerned when it comes to critical infrastructure; they have their own. Examples include banking systems, medical systems (should we get some in use), etc. While not directly critical infrastructure, havoc can be created by bringing down these systems. I suggest allowing businesses the concept of their own ‘critical infrastructure’ within the bill. It would be open to interpretation by the Court.

As an example, when I worked for Emergency Communications Network in Ormond Beach, Florida, the business was to make people aware of emergencies by phone (telephony), text (SMS), email, and social media according to contract. We did this at the Town, City, County, State and Federal Levels. Our security was therefore required to be as good as or better than these systems, but we were not considered a part of the DCI. However, we had to perform security audits.

Clause 16:

Consent can be as fluid as a relationship, and the storing of the image(s) does not mean that they actually took the images; they may have been sent by the offended party. A scenario of a bad breakup might be immediately followed by an accusation of such images existing on someone’s computer system (phone, computer, etc.) and suddenly, what were once consensual intimate images become reason for the upheaval of the accused’s life. That seems a bit extreme, and seems like an aspect of the system very open to abuse.

Sharing the images without written and signed consent, on the other hand, is without question an offense.

General Notes

(1) There is a lot of authority to decide given to Magistrates and Police who may not understand the technologies that they are dealing with. This brings up potential appeals that can clutter the Court(s) further; there is no mention of prerequisite training and continued education in these aspects of Law. This legislation may not be the place for such things, but as a layperson all I can suggest is that it should exist somewhere.

(2) There are potentially cases where trained professionals can be accused of doing illegal things when, in fact, they communicated what they were doing clearly with the person or legal entity that they were doing work for. This highlights the importance of appropriate contractual documentation, and this needs to be highlighted to professionals and their clients such that all understand it.

It would be good to see that level of professionalism become the norm.

(3) Separate from (2): Sometimes bad things happen when troubleshooting or installing a system, and professionals can be put at risk by this legislation. This is, sadly, quite common – ask any Doctor. Systems are increasingly complex and while attempting to fix something that is the focus of a contract, it is possible to break something else – particularly when the lowest bidder gets the work by not billing for appropriate documentation.

Further, operating systems and hardware are fluid. Unlike medicine, where the human body generally follows certain anatomy and physiology, computer systems by and large are made up of various permutations of software and hardware that may or may not be up to date, making it a very difficult thing to protect against. There is no certification that covers everything, there is no degree that is current with technology and there is no way to know everything about a system when troubleshooting it.

Thus, actual criminal intent needs to be required in all of this. After all, lawyers are not held accountable for losing cases (even when they do everything correctly) by means of fines or jail time. To put this burden on the shoulders of other professions seems unethical.

 

(4) It bothers me that the opportunity to protect the privacy of individuals is not highlighted in this Bill. While individual privacy has been protected by copyright in the past in other nations (I do not know about here), there are larger concerns.

For example, asking me for a digital copy of my National ID opens me up to identification theft. I do not have laws that protect MY information once it gets into government systems – until Clause 15 is enacted, and even then, I have no assurances other than someone will get prosecuted. That hardly makes me feel secure. This leads to security audits in Government offices, which are not mentioned at all in this legislation (see (6)).

(5) There should be different criteria for first time offenders and repeat offenders, as well as with minors and adults. We might end up making criminals of children before they begin thinking of adulthood. We need to be very careful here not to limit young curious minds because ignorance of appropriate technology etiquette. These could be teaching moments.

Repeat offenders, on the other hand, may need Court orders that limit their access to technology as is done in other parts of the world.

(6) There is no mention of the requirement of 3rd party audits on Government computer systems (critical infrastructure and otherwise) to assure that national security and privacy of information of citizenry is maintained at the highest levels by the government. This, in my eyes, is a serious flaw.

Conclusion

I observe local IT professionals, and more often amateurs and amateurs in professional’s clothing, putting themselves into positions where they could be wrongfully accused of things that they themselves were contracted to do.

Certifications and Degrees do not make someone responsible.

The public needs to be better educated on this Bill in this regard, particularly since companies are notorious for hiring someone who they know instead of who knows what they are doing. There is public speculation on Government doing this as well, which I know little enough to comment on but have heard enough to make comment.

The Bill implicitly pushes forward best practices in the IT field, where contracts would have to be in writing and agreed upon, where documentation should be provided on the work to be done as well as the work done. I would suggest some degree of indemnification when it comes to troubleshooting and repairing systems to give guidelines in the readings of the Act by Magistrates.

The Act should codify requirements of critical infrastructure to be audited to assure security of information. This is the main thrust of the legislation, and yet there are no preventive measures to be found in this Bill that provide for that and no responsibility communicated that makes the Government responsible for critical systems. Certainly, securing systems is of interest enough to create a Bill like this – it should also be of enough interest to assure that government computer and network systems, as well as those that use them, are independently audited on at least an annual basis. Failure in this regard makes this Bill moot.