John F. Kennedy and One Person, Armed With Powerful Technology

John F Kennedy Official Portrait

Today marks the fiftieth anniversary of John F. Kennedy’s assassination. I wasn’t alive when it happened, so it is not an event that really touched me personally. Yet, the anniversary has led me to reflect on it quite a bit, if only for the fact that it is really difficult to avoid all of the media coverage.

And what strikes me is that it was a profound precursor to the world we live in now: one person, armed with powerful technology, can absolutely change the world with just an idea and three presses of a finger.

Hard to fathom in the ’60s. Routine today.

Rationalizing Bad Behavior? Carriers Reject Kill Switch for Stolen Smartphones

In April 2012, I posted about the efforts to create a national stolen cell phone database. Those concerned with trying to reduce the lure of cellphones for thieves wanted to create a database that carriers would use before activating a used phone to make sure that it had not been stolen. The New York Times has reported that the database hasn’t slowed thefts “in part because many stolen phones end up overseas, out of the database’s reach, and in part because the [phone’s unique numerical] identifiers [used to identify phones around the world] are easily modified.” Oh, and the database has not really been implemented yet.

So, what to do next?

One idea has been a “kill switch” that would disable any phone upon request. Sounds great.  Your phone is stolen, so you don’t just erase it, you make it unusable before it is wiped and reused. But as the AP is reporting (via Terry Collins in Carriers Reject Kill Switch for Stolen Smartphones at Time) that:

Samsung Electronics, the world’s largest mobile phone manufacturer, has proposed installing a built-in anti-theft measure known as a “kill switch” that would render stolen or lost phones inoperable, but the nation’s biggest carriers have rejected the idea, according to San Francisco’s top prosecutor.

District Attorney George Gascon said Monday that AT&T Inc., Verizon Wireless, United States Cellular Corp., Sprint Corp. and T-Mobile US Inc. rebuffed Samsung’s proposal to preload its phones with Absolute LoJack anti-theft software as a standard feature.

Huh? It seems like such a simple idea.

CTIA-The Wireless Association, a trade group for wireless providers, said it has been working with the FCC, law enforcement agencies and elected officials on a national stolen phone database scheduled to launch Nov. 30….says a permanent kill switch has serious risks, including potential vulnerability to hackers who could disable mobile devices and lock out not only individuals’ phones but also phones used by entities such as the Department of Defense, Homeland Security and law enforcement agencies.

Fair point. So, you have to figure out how to do this well. In the meantime, the carriers are nobly trying ensure the safety of consumers and citizens alike. Not my usual perception of phone companies, but ok.

Or, not ok.

Samsung officials told the San Francisco district attorney’s office in July that carriers were resisting kill switches, and prosecutors have recently reviewed emails between a senior vice president at Samsung and a software developer about the issue. One email in August said Samsung had pre-installed kill switch software in some smartphones ready for shipment, but carriers ordered their removal as a standard feature. 

“These emails suggest that the carriers are rejecting a technological solution so they can continue to shake down their customers for billions of dollars in theft insurance premiums,” Gascon said. “I’m incensed. … This is a solution that has the potential to end the victimization of their customers.”

Perhaps they are not so noble after all. Turns out lots of people benefit from the stolen phone economy. Carriers sell insurance with high deductibles  and monthly fees. Manufacturers sell more phones. Thieves make money. Buyers get cheaper phones on the street, or perhaps get phones at all when they end up overseas.  And Google gets to brag about increased activation stats for the new phones people have to buy. Lots of people benefit from stolen phones. It is important not to underestimate that momentum.

Except, of course, for the people who owned them. And it’s not as if this can’t work. Indeed, it’s already working. As Chris Welch at the Verge noted:

A “kill switch” would be Android’s answer to Apple’s Activation Lock, a new safeguard introduced in iOS 7 that lets users remotely deactivate a phone and wipe its memory. But even after an iPhone has been reset, the original owner’s account credentials must be entered before it can be used again. Authorities hope this will dissuade thieves from targeting Apple products. For its part, Google allows consumers to track and remotely secure Android smartphones, but they’re not quite locked down to the same degree.

So far, Activation Lock and LoJack seems to be doing well, as the AP story noted,

In July, [San Francisco] prosecutors brought federal and state security experts to San Francisco to test Apple’s iPhone 5 with its activation lock and Samsung’s Galaxy S4 with LoJack. Treating the phones as if they were stolen, experts tried to circumvent their anti-theft features to evaluate their effectiveness, and that work is continuing. One Silicon Valley technology security expert said he thinks Apple’s activation lock is the first kill switch that meets law enforcement’s desire to protect iPhone users and other smartphone manufacturers should follow suit.

So maybe it isn’t a crazy idea after all.

The Best Intentions?

One of the trickiest bits in the moral life is that doing the right thing is not necessarily enough. It is important, no doubt. You can’t do the right thing without, you know, doing the right thing.

Yet, the point of the moral life is not simply to do thing that uphold values, but rather to become the kind of person who upholds values in everything you do.  Being a person of virtue is more than just following the rules. It is about being transformed so that everything one does flows out of a desire to enhance human flourishing and into concrete acts that that make that a reality. The good person is one who does good things because they want to.

This distinction between means (what we do) and intention (why we do it) is fundamental to understanding the character of our actions. And it is something we all know. We can see it operating in the old standby, “the road to hell is paved with good intentions.” Sometimes you try to do the right thing, but go about it the wrong way.

So, too, can we do the right thing for the wrong reasons. Many people would harbor some reservations about a guy writing a huge check to charity in order to garner some great press for himself. We might like the fact that the charity has the money, but think the guy was a jerk. And the donor would defend himself based on the good consequences. But still, the act serves as a means for selfish self-promotion.

This situation seems to me to be the same thing. Carriers put forward a front of concern for the consumer—hacking!—while really working to serve their own interests.  The stated intention is noble, yet masks the real intentions. Heck, if we use a purely utilitarian stance, the many positive consequences of phone theft may really favor protection of the stolen phone economy! Even if millions of former phone owners lose in the process. And we lose a bit more of the rule of law. Plus some respect for the right to private property. “A small price to pay…”

But attending to the good life reminds us that there is more to life than consequences and more to who we are than the benefits that accrue. Sometimes being a good person—or a good company—means doing things that cut into the bottom line. Sometimes we have to take a chance and do something even though we don’t know how that it will end well. We have to actually be the person, not just look like them.

Avoiding the Near Occasions of Sin

Greetings. I hope this post finds you well. It is September and school is back in session. I took a couple months off this summer from blogging and following the tech news. It can be so easy to get so wrapped up in the chase—keeping on top of breaking news, commenting, figuring out something good to say, writing it up, seeing if people respond. But I’m not ever sure if it is helping me become a better thinker or just a better chaser.  So, I thought some disconnection was in order.

At the end of July, Matt Gemmell (Working in the Shed) put well when he noted:

The internet isn’t to blame – it’s us. We’re weak, and our natural tendency is to feed that weakness rather than struggle against it. Some people are more prolific than others, but the boundaries don’t lie where we think they do: context and self-discipline are much, much more important than your personal pace or ability. The difference that a creativity-conducive environment can make is profound.

I personally don’t seem to be able to choose to ignore Twitter, or email, or BBC News when they’re available. I can manage for short periods, but sooner or later I’ll give in. What I can do, though, is remove the temptation. Counting the chocolate bars in the cupboard doesn’t work half as well as just not buying any. I know it, and so do you.

There is a great old school term for this in the Catholic tradition: “near occasion of sin”.  Something is a near occasion of sin when it draws you into doing something that is going to be bad.  The near occasion might be good or bad in itself. (Chocolate is one thing, but meth is quite another.) But it is really more about the particular combination of me/you and that thing leading to doing things that separate you from a balanced and connected life. Chocolate isn’t one of mine, but Cheetos are.

Somehow, it seems like the net is a massive collection of near occasions.

Ideally, time off can help create the space and energy we need to create better habits. But, at the same time, we can only really create good habits once we are back in contact with that thing. We only feed the strength when I struggle with the things that make us weak.  In the long run, I have to figure out how blog without the chase.

I think the two months off helped, but we’ll see.

(Really?) Free The Pictures – Review with PSA

Brian S. Hall has a overview of free cloud picture services at ReadWrite. Interestingly, before he gets to the review itself, he notes

Before diving into the features of the various services, it should be noted that taking advantage of any of these free cloud services comes with a potential price. As the saying goes, if an online site isnt selling you a product, then you are the product.

Good to see a public service announcement of sorts about the costs of “free” services becoming a normal part of a review. While well known to folks who keep up on tech issues, this material is still unknown to many people.

This Can’t End Well: 3D-Printed Gun in Israeli Parliament

At some point, maker culture opens the door to un-maker culture…

Imagine a person holding a gun on his lap, fully visible, while in the same room as President Barack Obama. The equivalent recently happened in Israel when investigative journalists from Channel 10 TV tested government security by slipping a functioning 3D-printed gun into the Israeli Parliament, the Knesset, and into an address by the Prime Minister Benjamin Netanyahu. In fact, the journalists got past Knesset security twice. The Channel 10 journalists printed the gun based on designs from U.S. nonprofit Defense Distributed, and although it contains one metal part, a nail that serves as a firing pin, the gun even made it past a metal detector.

(Via Sean Captain at TechNewsDaily.com | 3D-Printed Gun in Israeli Parliament Ignites Security Concerns. Story has links through to the original Israeli news report.)

Markey Letter to ATF re: Printed Guns

U.S. Congressman Ed Markey’s letter to the Bureau of Alcohol, Tobacco, Firearms and Explosives about Defense Distributed’s manufacturing of 3-D printed guns (public domain)

In an interview that covered key ideas on the singularity, advanced technology proponent Ray Kurzweil argued that while new, powerful technologies open the door to harm and terrorism, humans have the power to rein in the danger. But to do that, he suggests “we need to give a higher priority to preparing protective strategies and systems. We need to put a few more stones on the defense side of the scale.”

Given what has been revealed about the NSA data gathering and the broadening legal acceptability of online surveillance, somehow I don’t see anyone adding “more stones” to law enforcement anytime soon. Indeed, part of the motivation for printed guns seems to be precisely protection from the “defense side of the scale”.

Not to be a total downer, but how does this end well?

And what was that about an eye for an eye leaving the world blind?

Privacy for Children: July 1 COPPA Update

If you have an internet-using child under 13 in your home, chances are they’ve come to you saying something like, “Can you please check your email? I cant use [insert website name here] until you respond to your email!  Pleeeeeeeese!”

Copyright Alejandrocaicedo – “Kids studying at RIA centers”

Been on vacation and at a conference for the past two weeks, so I’ve been off the grid. But I have a new post up about the childrens’ privacy regulation updates that took effect yesterday. The post is over at faithandsafety.org, a site focused on family friendly tech use that is a joint venture between the US Conference of Catholic Bishops and the Orthodox Archdiocese of America.

via Tightening Privacy for Children: July 1 COPPA Update – Blog Post – Faith and Safety.