RFID Chips Implanted in Humans – Beneficial or Big Brother?

 

RFID Tag in Humans.jpeg

 

A couple years ago the Food and Drug Administration approved the implantation of Radio Frequency Identification (RFID) tags into humans. According to VeriChip Corp., a subsidiary of Applied Digital Solutions Inc., the 134.2-KHz chips could save lives and possibly limit injuries from errors in medical treatments.

It is believed the chips could provide easy access to medical information for individuals with life-threatening diseases, and could be specifically useful during a medical emergency. The chips are expected to give people the ability to know and manage their health-care issues at the very critical time of an emergency situation.

RFID tags have the ability to store a wide range of information, from one serial number to several pages of data. Readers can either be mobile, so that they can be carried by hand, or they can be mounted on a stationary or mobile object. Reader systems can also be built into the architecture of a cabinet, room or building.

The FDA is not aware of any adverse events associated with RFID tags. However, there is a concern about the potential hazard of electromagnetic interference (EMI) to electronic medical devices from radio frequency transmitters like RFID. EMI is a degradation of the performance of equipment or systems (such as medical devices) caused by an electromagnetic disturbance.

Since the technology continues to evolve and is more widely used, it is important for healthcare professionals to keep in mind its potential for interfering with pacemakers, implantable cardioverter defibrillators (ICDs), and other electronic medical devices.

Other important uses for human RFID implants are child abductions. Many parents agree with implanting RFID chips in their children so that if the child was ever abducted, law officers would be able to track them and locate them much quicker than they can now.

Another application is for key political kidnappings, which is along the same lines as the theory of child abductions. There is also discussion about tracking prison inmates and parolees, to effectively locate and monitor them.

Most of the opponents to human RFID implantation in the case of medical records is the belief that anyone would have access to all of your medical records if they had an RFID reader. This isn’t true because the chip implanted in the person would only contain a serial number that would need to be entered into a secure website before any records or medical history for an individual could be accessed.

Whether you agree with the technology or not, RFID chips are the future of identification and traceability. It’s not a perfect technology at this point, but no technology ever was or will be perfect in the beginning, or ever for that matter. The point is it will be what we make of it.

 

Thank you for taking the time to visit my blog. If you enjoyed this article, let me help you with any of your professional content needs including original blog articles, website content and all forms of content marketing. Please contact me at michael@mdtcreative.com and I will put my 15+ years of experience to work for you.

BMW Will Deliver Self-Driving Car by 2021

BMW Will Deliver Self-Driving Car by 2021

 

BMW is on track to deliver a fully self-driving car by the 2021 model year, the company’s senior vice president for autonomous driving, Elmar Frickenstein, claims.

 

“We are on the way to deliver a car in 2021 with level 3, 4, and 5,” Frickenstein told a panel discussion in Berlin recently, explaining the vehicle will have different levels of autonomy, depending on how and where it is used.

 

A Level 5 vehicle is capable of navigating roads without any driver input, while levels 3 and 4 still require a steering wheel and a driver who can take over if the car encounters a problem.

 

Frickenstein later clarified his remarks, saying the company’s autonomous car due in 2021 will offer Level 3 automated driving. This would allow the driver to do other tasks while the car steers itself, but the driver must still be prepared to take control when needed.

 

Technically, the 2021 BMW will be able to equip the car with Levels 4 and 5. Whether this happens depends on regulations, the availability 5G telecommunications and whether there are road infrastructures in cities on which driverless cars can travel.

 

BMW is planning to introduce its new “flagship” car into showrooms in 2021. The electric, autonomous car will be coined the BMW iNext. BMW CEO, Harald Krueger has told annual shareholders in Munich that

 

Krueger told annual shareholders in Munich that the upcoming 2021 vehicle will have a “cutting-edge” electric drivetrain and all new impressive luxurious interior. The new release, along with BMW’s current “i” vehicle line is an all out effort to compete in the luxury car electric vehicle market. This will be an addition to the line which already includes the i8 PHEV and the i3 BEV/REx.

 

Krueger claimed: iNext is set to be “our new innovation driver, with autonomous driving, digital connectivity, intelligent lightweight design, a totally new interior and ultimately brining the next generation of electro-mobility to the road.

 

BMW is currently revamping company concepts to assure direct competition with the likes of new OEM Tesla which is consistently gaining ground in all current markets, along with the usual competition from, Audi and Mercedes-Benz. This month the company showed its future ideas regarding vehicle autonomy via its Vision Next 100 concept car.

 

Additionally, the company is realizing that car ownership is continually diminishing in urban environments and expected to keep to this trend for the foreseeable future

 

To combat this trend BMW has announced its implementation of car-sharing and ride-sharing ventures. Its first introduction is a car-sharing situation in Seattle, with the possibility of more services like this in the future.

 

Statistics are currently proving that Tesla is dominating the European market forcing the “established” automakers to take notice and up their game in this market. Mercedes has been luckier than BMW with staying ahead of the game, launching new product line-ups and a multiplex of new models. BMW’s sales in the first quarter of 2016 only gained marginal success compared to that of Mercedes.

 

In an attempt to try to regain their momentum and gain ground, BMW has cut prices by 5.9 percent across the board, on all of their current stock of vehicles, in an attempt to regain the market share. This is partly due to the fact the company’s available models are all “older” models, in direct comparison to the competitors. Nevertheless, BMW is reportedly still on par with 2016 projections.

 

In his stockholder’s address, Krueger assured that for the seventh consecutive year, his company is on target, While, unfortunately, they need to surpass their target when factoring in the accelerated growth of the dominant competition.

 

Thank you for taking the time to visit my blog. If you enjoyed this article, let me help you with any of your professional content needs. Including professional and original blog articles, website content and all forms of content marketing. Please contact me at michael@mdtcreative.com and I will put my 10+ years of experience to work for you.

Can Your Car Be Hacked?

car-hacking-jeep-mrb1cna8hpxfcfud6mv5v09kcscdq6papiqeguc30q

Modern technology, it’s a two edged sword. Or, as the saying goes, can’t live with it, don’t know what to do when it’s turned against us (I made that up, it seems fitting). We all remember the movies where the computers and robots we create turn against us.

Well that terrifying scenario no longer seems so farfetched. Charlie Miller and Chris Valesek proved, in 2013, how easy it was to hack and take over a car. Being able to do this was a monumental event that made the whole auto industry wake up to the fact that the vehicles they’re producing are extremely vulnerable to terrifying security breaches.

Miller and Valesek didn’t have malicious intentions, they only wanted to prove just how vulnerable today’s vehicles really are and what a serious security breach this really was.

The two researchers had the capability, by using only their laptops, to shut down the vehicle’s engine and shoot window washer fluid onto the windshield, which would be able to startle an unsuspecting driver, causing them to lose control of the car and crash.

The two researchers identified more than seven major categories of remote attack surfaces, based on their study of 20 models (2014 to 2015) from different manufacturers.

The research the two proved provoked the auto industry to take action with the help of FASTR (Future of Automotive Security Technology Research). FASTR recently released a manifesto, Toward Tomorrow’s ‘Organically Secure’ Vehicle, that declared its organizational and industry intentions to help enable the future of automotive security innovation.

FASTR, which was formerly “Automotive Security Review Board” (ASRB), founded by Aeris, Intel Security and Uber in 2016. FASTR is facilitating an industry-wide collaboration to drive cybersecurity across the entire automotive supply chain.

FASTR is a neutral, nonprofit consortium whose goal is to enable innovation in automotive security with a vision of self-healing vehicles. FASTR’s goal is to deliver the actionable applied and theoretical R&D needed to drive systematic coordination of cybersecurity across the entire supply chain and ensure trust in the connected and autonomous vehicle.

The total number of connected cars is expected to increase dramatically to an as many as 250 million connected cars on the roadways by 2020. However, FASTR says mass adoption of autonomous vehicles won’t happen without trust that these cars are cyber-secure.

Craig Hurst, FASTR’s executive director, said the societal benefits of connected and autonomous vehicles promise to be profound. However, with connectivity comes certain inherent risks, he warns. “Nearly every wireless communication interface in vehicles today has vulnerabilities,” he said.

The nature of the dramatic complexity of modern vehicle computing is creating a “system of systems” that introduces dependencies across systems. This means, a laptop connected to the internet, connected to poorly secured TCU (telematics control unit), connected to the brakes, he said.

“Security needs to be considered from an expansive, diverse perspective from the onset of vehicle system architecture design,” Hurst noted. “We are moving from a current state of limited but expanding vehicle connectivity (telematics, infotainment, etc.) to a highly complex, fully connected environment including vehicle to vehicle (V2V), vehicle to infrastructure control (V2I), or, more generally, vehicle to everything(V2X).”

Some of the systems that also showed vulnerability included remote keyless entry, unsecured Wi-Fi hotspots, OBD-11 (on-board diagnostic system) and USB. Intel Security in 2015 released a white paper in which it listed many of the most hackable and exposed attack surfaces on a next-generation vehicle.

When a hacker has gained access through one of these entry points, injection of controller area network (CAN) messages may be possible, to manipulate other systems in the vehicle, even safety-critical systems.

As recently as last year Miller and Valasek took their 2015 remote hack of a Jeep Cherokee to the next level, they proved they can control the accelerator, brakes, steering and electronic parking bake at more dangerous driving speeds.

“This is a new class of attacks against CAN messages, “Miller said. “It’s still very basic in the types of messages you use “to attack the car, he says. “It’s an easy attack.

In one attack, Miller and Valasek spun the steering wheel 90 degrees at 60 mph. They also controlled the acceleration pedal, as well as the brakes. “We can permanently lock the electronic parking brake so it’s permanently immobilized.

Even if you restart the car, the parking brake would be on and you would not be able to drive anywhere,” Miller said. “We disable all aspects of steering, so it’s super-hard to turn the wheel and even harder if you drive the car without steering at any speed.”

Obviously, hacking a Jeep that is driving at high speeds makes an already serious issue tenfold. “Now you have scary levels of control,” Valasek said of the high-speed hacks.

Thank you for taking the time to visit my blog. If you enjoyed this article, let me help you with any of your professional content needs. Including professional and original blog articles, website content and all forms of content marketing. Please contact me at michael@mdtcreative.com and I will put my 10+ years of experience to work for you.

Can Your Car Be Hacked?

Can Your Car Be Hacked

 

Modern technology, it’s a two edge sword. Or, as the saying goes, “You can’t live with it, you can’t live without it”, don’t know what to do when it’s turned against us (I made that up, it seems fitting). We all remember the movies where the computers and robots we create turn against us.

 

Well that terrifying scenario no longer seems so farfetched. Charlie Miller and Chris Valesek proved, in 2013, how easy it was to hack and take over a car. Being able to do this was a monumental event that made the whole auto industry wake up to the fact that the vehicles they’re producing are extremely vulnerable to terrifying security breaches.

 

Miller and Valesek didn’t have malicious intentions, they only wanted to prove just how vulnerable today’s vehicles really are and what a serious security breach this really was.

 

The two researchers had the capability, by using only their laptops, to shut down the vehicle’s engine and shoot window washer fluid onto the windshield, which would be able to startle an unsuspecting driver, causing them to lose control of the car and crash.

 

The two researchers identified more than seven major categories of remote attack surfaces, based on their study of 20 models (2014 to 2015) from different manufacturers.

 

The research the two proved provoked the auto industry to take action with the help of FASTR (Future of Automotive Security Technology Research). FASTR recently released a manifesto, Toward Tomorrow’s ‘Organically Secure’ Vehicle, that declared its organisational and industry intentions to help enable the future of automotive security innovation.

 

FASTR, which was formerly “Automotive Security Review Board” (ASRB), founded by Aeris, Intel Security and Uber in 2016. FASTR is facilitating an industry-wide collaboration to drive cybersecurity across the entire automotive supply chain.

 

FASTR is a neutral, nonprofit consortium whose goal is to enable innovation in automotive security with a vision of self-healing vehicles. FASTR’s goal is to deliver the actionable applied and theoretical R&D needed to drive systematic coordination of cybersecurity across the entire supply chain and ensure trust in the connected and autonomous vehicle.

 

The total number of connected cars is expected to increase dramatically to an as many as 250 million connected cars on the roadways by 2020. However, FASTR says mass adoption of autonomous vehicles won’t happen without trust that these cars are cyber-secure.

 

Craig Hurst, FASTR’s executive director, said the societal benefits of connected and autonomous vehicles promise to be profound. However, with connectivity comes certain inherent risks, he warns. “Nearly every wireless communication interface in vehicles today has vulnerabilities,” he said.

 

The nature of the dramatic complexity of modern vehicle computing is creating a “system of systems” that introduces dependencies across systems. This means, a laptop connected to the internet, connected to poorly secured TCU (telematics control unit), connected to the brakes, he said.

 

“Security needs to be considered from an expansive, diverse perspective from the onset of vehicle system architecture design,” Hurst noted. “We are moving from a current state of limited but expanding vehicle connectivity (telematics, infotainment, etc.) to a highly complex, fully connected environment including vehicle to vehicle (V2V), vehicle to infrastructure control (V2I), or, more generally, vehicle to everything(V2X).”

 

Some of the systems that also showed vulnerability included remote keyless entry, unsecured Wi-Fi hotspots, OBD-11 (on-board diagnostic system) and USB. Intel Security in 2015 released a white paper in which it listed many of the most hackable and exposed attack surfaces on a next-generation vehicle.

 

When a hacker has gained access through one of these entry points, injection of controller area network (CAN) messages may be possible, to manipulate other systems in the vehicle, even safety-critical systems.

 

As recently as last year Miller and Valasek took their 2015 remote hack of a Jeep Cherokee to the next level, they proved they can control the accelerator, brakes, steering and electronic parking bake at more dangerous driving speeds.

 

“This is a new class of attacks against CAN messages, “  Miller said. “It’s still very basic in the types of messages you use“ to attack the car, he says. “It’s an easy attack.

 

In one attack, Miller and Valasek spun the steering wheel 90 degrees at 60 mph. They also controlled the acceleration pedal, as well as the brakes. “We can permanently lock the electronic parking brake so it’s permanently immobilised.

 

Even if you restart the car, the parking brake would be on and you would not be able to drive anywhere,” Miller said. “We disable all aspects of steering, so it’s super-hard to turn the wheel and even harder if you drive the car without steering at any speed.”

 

Obviously, hacking a Jeep that is driving at high speeds makes an already serious issue tenfold. “Now you have scary levels of control,” Valasek said of the high-speed hacks.

 

Thank you for taking the time to visit my blog. I sincerely hope that my blog entertains, helps and gets you thinking. Please take a minute to leave a comment to start and interesting conversation, or add your interesting thoughts to an existing conversation.

 

For more thought provoking articles please check out:

The Importance of a Responsive Website – Mobile Industry Trends

Electric Cars Do Not Pose Elevated Risk of Cancer from Electromagnetic Fields, Experts Say

How Does Data Mapping Fit with Information Governance?

5 Tips That Will Make eDiscovery Data Mapping Smoother

Robot Lawyer Helps Asylum Seekers

Robot Lawyer Helps Asylum Seekers

 

The creator of a chatbox, which was responsible for overturning more than 160,000 parking fines and helping vulnerable people apply for emergency housing, is now setting its sights on a new legal mission, training the bot to help refugees claim asylum.

 

The original “Do Not Pay” created by Stanford student Joshua Browder, describes itself as “the world’s first robot lawyer”, giving free legal aid to users through a simple-to-use chat interface.

 

The chatbot, using Facebook Messenger, can now help refugees fill in an immigration application in the US and Canada. It also helps refugees in the UK apply for asylum support as well.

 

The London-born developer worked with lawyers in each country, as well as speaking to asylum seekers whose applications have been successful to find out how he can use his lawyer bot to help with the asylum application process.

 

Browder says this new function for his robot lawyer is “long overdue”. “I’ve been trying to launch this for about six months, I initially wanted to do it in the summer. But I wanted to make sure I got it right because it’s such a complicated issue. I kept showing it to lawyers throughout the process and I’d go back and tweak it,” Browder said in a statement.

 

Browder began working on this project before Donald Trump’s election as US President, but now feels it’s more important now than ever. “I wanted to add Canada at the last minute because of the changes in the political background in the US,” he said.

 

The chatbox works by asking the user a series of questions, to determine which application the refugee needs to fill out and whether a refugee is eligible for asylum protection under international law.

 

After this step, it takes down the necessary details required for the appropriate asylum application.

 

Browder says it was crucial the questions were in plain English. “The language in some application forms can be quite complicated,” he said.

 

Then the details are used to auto-fill an application form for either the US, Canada or the UK. “Once the form is sent off, the details are deleted from my end,” Browder said.

 

Browder chose Facebook Messenger as a home for the latest incarnation of his robot lawyer because it’s easily accessible to anyone. “It works with almost every device, making it accessible to over a billion people,” he states.

 

Browder acknowledges Messenger doesn’t come without its pitfalls. Unlike some other chat apps, it’s not automatically end-to-end encrypted. However, there is end-to-end encryption between his server and Facebook. Browder added: “Ideally I would love to expand to WhatsApp when their platform opens up, particularly because it’s popular internationally.”

 

After the information is sent, the data is destroyed from his servers within 10 minutes of someone using the bot.

 

The next step is making the service available in more languages. Browder is currently working on translating it into Arabic.

 

Lawyers have said they can see the major benefits that leveraging sophisticated chatbot technology will have in the asylum application process.

 

Thank you for taking the time to visit my blog. I sincerely hope that my blog entertains, helps and gets you thinking. Please take a minute to leave a comment to start and interesting conversation, or add your interesting thoughts to an existing conversation.

 

For more thought provoking articles please check out:

Wireless Infrastructure Installation

The Importance of a Responsive Website – Mobile Industry Trends

Electric Cars Do Not Pose Elevated Risk of Cancer from Electromagnetic Fields, Experts Say

How Does Data Mapping Fit with Information Governance?

5 Tips That Will Make eDiscovery Data Mapping Smoother

5 Tips That Will Make eDiscovery Data Mapping Smoother

In the legal system, when the attorneys for both sides prepare for the litigation by exchanging each side’s information, the process is called discovery. The exchanging of discoverable digital information, or “electronically stored information” (ESI), introduced the term “e-discovery”.

 

All of this digital information is stored on a large variety of different devices including databases, network servers, computer systems, disks, drives, computers and handheld devices to name a few. Considering the massive amount of information collected and stored by companies today, the location and organization of all this data can a daunting task. However, when all of this information is collected and organized into a data map it becomes much easier to have an idea of what data is available and where to find it.

 

E-discovery data map

One of the most effective ways to organize all of a company’s data and make it all available for e-discovery is a data map. An e-discovery data map organizes all of the company’s IT infrastructure, making all the information immediately accessible. The data map is a catalog of all of the organization’s records, files, programs and other digital data.

 

Creating an e-discovery data map is, by no means, an easy task. However, the following 5 tips will make it easier to create an effective collection of the digital data, in preparation for litigation.

 

Determine what data is available

Often the biggest challenge in e-discovery is finding out how much data exists, within a company, and where it is located. This may seem like an unusual comment. However, departments within the company may use SharePoint servers, where users will copy data to shared drives on networked file systems without realizing they have copied them. Also, administrators may not know what systems are being used for what data.

 

Find out who has the data

Another important task is to find out who owns, or is responsible for, the different pieces of data. In most cases, administrators don’t always know who is responsible for pieces of data or how often they are used. Uncovering this information is important to the initial organization of the e-discovery data mapping process.

 

Know what to look for

A legal complaint will give the lawyers the key facts about the case, supplying them with an idea of what data they need to produce. After finding out what data needs to be produced, it is then just a matter of finding the relevant material within the company.

 

Make it understandable

When all of the data is discovered, it needs to be compiled, analyzed and presented. The main goal is to make sure the e-discovery data map is easy to understand by non-technical readers. This means that technical terms and concepts will need to be translated.

 

Maintain the data map

After going through the lengthy process of creating an e-discovery data map, it is important to keep it up to date. Changes within a company happen on a regular basis, systems are upgraded, new applications are installed and old hardware is replaced. Even though keeping the data map up to date can be challenging, it is a lot simpler and less time consuming than starting all over with the process.


Litigation can be a difficult process for everyone involved, especially for those responsible for the timely data preservation and production in addition to their normal duties. Planning for e-discovery in advance is a way to reduce the pressures.

How Does Data Mapping Fit with Information Governance?

Data governance is a set of processes that makes sure an organization’s crucial data is managed formally, effectively and efficiently by all of the users, throughout the whole business. It also ensures that data is reliable and can be trusted with everyone being held accountable for any adverse event due to error or low quality data.

 

The focus is on putting people in charge of preventing and correcting any issue that may arise with the enterprise’s data so that the whole organization can become and remain more efficient. Data governance is also an evolutionary process for a company, that alters the company’s thinking and initiates a process to handle information so that it may be utilized by the entire organization.

 

Data Mapping

Over time, it is likely, organizations have created multiple copies of their data to serve a variety of purposes. These various views of an organization’s data may overlap in some instances, resulting in duplicate data.

 

On the other hand, there may be some information that is known only to the user that is specifically interested in that type of information and still other data that isn’t represented at all. This is why data mapping is a crucial tool in data governance.

 

Data maps that exist within an organization’s data governance include:

 

eDiscovery Data Maps – These maps are required by the Legal department to support their need to know where locate information that is relevant to litigation, audit and government investigations.

 

Records Retention Schedules – These are often developed and maintained by the Records Management department, and identity official company records and the time periods these records are to be retained in order to meet the organization’s legal, regulatory and operational requirements.

 

Application Profiles – Information Technology may maintain these maps to identify the key structured data systems under its management. These profiles may identify the system name and owner, as well as other technical information needed by IT.

 

Information Security and Data Classification Inventories – These maps identify systems or storage locations that contain sensitive and private data. Often identified by the Privacy Office or Information Security, these systems or locations warrant enhanced control and protection against breach or attack.

 

Privacy Data Flows – These show the path that privacy and sensitive information takes from the point it is acquired from the customer or employee to the point it leaves the organization.

 

An organization needs a comprehensive understanding of all of its data, and the value of that data, from several different perspectives, including regulatory requirements, privacy and security, business importance and cost. Without a comprehensive view, an organization risks falling back into the habit of siloed information management.

 

One of the first tasks of the Data Governance Team should be the development of an all-inclusive map of the organization’s data to provide the baseline for assessing whether its Data Governance objectives are being obtained.

 

Often, the organization’s record type inventory is a good place to start adding relevant fields of information regarding storage location, security classification, specific sensitive information contained and how the data flows through the organization.