Category Archives: Decision Making

Implications: NSA Email Monitoring

The ultra-covert U.S. National Security Agency (NSA) finds itself in the public eye from news alleging they monitor the world’s email.  This news, however, should not be a major surprise given many predictors (i.e., rumors), including a few listed below.

email.jpg

It will be of interest, however, to see how this allegation permeates into the following discussions:

  1. Organizational Security (i.e., NSA as victim):  It is a mistake to believe organizational security is only about keeping foreign hackers out of the network.  This case, and other famous leaks (such as Wikileaks) makes clear that employees, or other attackers with access, have always posed a very real security threat (see “Ultimate Insider Attack” link below). 
  2. American Citizen Privacy:  Growth in technology capabilities combine with terrorism realities to make domestic discussions of individual privacy both interesting and complicated (see also related topic:  The USA Patriot Act)
  3. Diplomatic Niceties:  It will be tough, diplomatically, to accuse another country of cyber-attacking the US if, in fact, the US itself cyber-attacks others (see “China Hacks US” link below).
  4. Open Source Intelligence:  Critical intelligence is increasingly gleaned from large growth in social media communications, such as email, twitter, and SMS, making this what is known as a “big data” problem.

In 1929, Secretary of State Henry Stimson’s stated elegantly, but not practically, that “Gentlemen do not read each other’s mail.”  His opinion changed greatly, of course, when in WWII Secretary of War Stimson depended on cryptanalysis to decrypt enemy communications  

Reading other’s mail continues to become more interesting!

___________


RELATED LINKS

header.jpg

    Book Review: Information, Technology, and Innovation: Resources for Growth in a Connected World

    “Futurist” John M. Jordan’s Information, Technology, and Innovation: Resources for Growth in a Connected World is encyclopedic in coverage of trends and effects from digital transformation.  As a seasoned instructor, novices will benefit from Dr. Jordan’s introduction and topic development.  However, advanced readers will also benefit both from the breadth of discussion, as well as the notes that accompany each chapter.

    Review_ITandInnovation.jpg

    As an early fan of futurist George Gilder, I was pleased to see the book begin with the “second half of the chessboard” story.  Further insight into the book can be divined from its five sections:  Foundations, Work and Organization, Business Model Disruption, Technology Landscapes, and Some Big Questions. 

    Many will agree that our economy moved from industrial to automation with the transistor invention.  This book helps support the important notion that we are now transforming from automation to a subsequent economy.  In particular, leaders and educators should pay heed to Dr. Jordan’s “some big questions” section.  Here Dr. Jordan summarizes implications ranging from identity and privacy, to innovation.

    What WILL You Do?

    I am a cognitive scientist, which in lay terms means I am an “applied psychologist.”  Typically I research work environments that include humans, computers and some task (e.g., police work).  However, I am interested in all things “thinking,” including the role of ethics in decision making, such as the “Trolley Problem” below.

     

    A trolley is running out of control down a track. In its path are five people who have been tied to the track by a mad philosopher. Fortunately, you could flip a switch, which will lead the trolley down a different track to safety. Unfortunately, there is a single person tied to that track. Should you flip the switch or do nothing?

     

    Ethical problems are certainly not easy.  To improve response time and effectiveness, it behooves the decision maker to work from a specific “perspective.”  Thus, reflecting on ethical problems in advance may provide a framework for more appropriate decisions.

    Similarly, “Naturalistic Decision Making” (NDM) is the cognitive study of people making complex decisions in situations typically marked by high stakes (e.g., death) and time constraints.  Successful NDM cases can be described as quite breathtaking.  Remember, for example, Captain Sully’s dramatic actions in 2009 to land US Airways Flight 1549 in Manhattan’s Hudson River.  Even more spectacular, in my opinion, was crew action in 1989 to minimize fatalities in the crash-landing of United Airlines Flight 232.  Lessons from these decisions are used to benefit others.

    But what about naturalistic decisions that do not require pilot training?  For example, what if you observes someone being victimized–would you get involved?  In 2011, bystanders lifted a burning car to rescue an injured motorcyclist.  I would like to think all of us would put ourselves in harm’s way to do the same, but I am not so sure.  For example, at least twelve people observed the1964 murder of Kitty Genovese in a New York courtyard while she screamed for help, yet did nothing.  Here I would like to think all of us would react differently, but again, I am not sure.

    LoganCar.jpg

    Lack of witness action is called the “Bystander Effect,” or “Genovese Syndrome.”  Unfortunately, there is no shortage of examples including claims that a graduate assistant witnessed the rape of a child and then took no immediate action, nor notified authorities.  I would hope that others in a similar situation would intervene, as they have claimed, but again am not so sure.  The encountered scene was indeed horrific, given its nature and the status of the alleged assailant, and thus most likely absent a scripted response.

    Let’s reflect, then, on this case as presented to create an improved reaction:

    blue-ribbon.jpg
    • Step 1:  Take a Stand.  A child cannot consent to a sexual act.  Thus, any sexual act involving children has to be considered an assault.  Plain and simple, assume action is required.

    • Step 2:  Study How Predators Ply Their Trade.  Gregory M. Weber, Assistant Attorney General for the State of Wisconsin, authored “Grooming Children for Sexual Molestation.”  Unfortunately, predators often do not lurk in rain coats.  More often they choose a target area, become friends of the parents, select victims and begin recruitment.  Predators are sophisticated enough to “hide” in plain sight and be “exactly” the person to entrust children.  The opportunity to train children to recognize and report early signs of grooming is great.

    • Step 3:  Anticipate Your Action.  Plan ahead so your action is quick and without anguish, and set as the very minimum an anonymous 911 call.