PRISM & Data Breach Response

The emergence of PRISM has caused a stir in the United States.

What is PRISM?

It is a collaboration between the National Security Agency (NSA), the Federal Bureau of Investigations (FBI) and the biggest tech companies in the country.  The agreement has provided the U.S. Government access to data including audio communication, videos, photos, emails, documents, call logs and text messages since 2007.

Headquarters of the NSA at Fort Meade, Marylan...

Headquarters of the NSA at Fort Meade, Maryland. 

How has PRISM come to light?

On Wednesday June 5th, a classified order was shared and made public.  The order to Verizon Wireless by the Foreign Surveillance Court directed the company to turn over domestic & foreign call data from the past and in the future.  Such data would be gathered by the millions and would provide sender and receiver of calls, duration, time and location.

PRISM came about through leaked PowerPoint slides that described the collaboration between the government and the tech giants.  When questioned, companies such as Google, Facebook, Apple, AOL, Yahoo and Microsoft gave the same canned response, “we do not provide the government with direct access to our servers.”

James Clapper, the Director of National Intelligence made statements suggesting that the collaboration existed and that the government was operating within the legal system.  Here’s what Clapper wrote about PRISM.

The whistle-blower

, 29 year old, Edward Snowden was a member of defense contractor Booz Allen Hamilton.  Snowden claims that a “massive surveillance machine” is in the making and that he leaked the information to  “inform the public as to that which is done in their name and that which is done against them.” Snowden is currently in Hong Kong, China while various US diplomats are calling for the country to extradite him.

As if internet security and privacy were not already a hot topic, it can be an effective transition into offering Data Breach Response Coverage.

The Breach Response product is tailored to healthcare, retail, hospitality and higher education operations.  The product is geared to moderate the results of a breach of data.  These mitigation tools will help minimize brand damage and legal liability by offering the following coverage.

Data Breach Response Features

For claim examples for Data Breach Response, click here.

Identity Crisis – Google & Motorola Working on Tattoos as Passwords

Ladies and Gentlemen, is it time to panic?

The days of online password simplicity is officially over.  No longer can your dog’s name and street address protect against a hack into your seemingly endless array of online accounts.  When companies such as Google & Facebook offer cash rewards and jobs to hackers, it makes the once crime into a sport.  As a game fisherman would spend 3 days on a charter boat to land the big Marlin, hackers confine themselves to similar quarters to “land the big one”.  Difference being, hackers get paid more.

Yes, these big companies hire the hackers to build better defenses again future intruders.  After all, the more you know about your enemy the more you can prepare against them.

But has this gone too far?Tattoo Authentication

TATTOOS THAT REPLACE PASSWORDS!?

A PILL THAT GIVES YOU A WIRELESS SIGNAL FROM YOUR STOMACH!?

Chances are that within the past year you have had a conversation containing these words, “And then the Government will start putting computer chips in our brain at birth.”  Congratulations, you are the new Nostradamus, except, it’s not the government doing this… yet.

In May of 2012, Google acquired Motorola Mobility for $12.5 billion.  This purchase affirmed that Google would be extending their portfolio of offerings far past software and into gadgets. Analysts projected the acquisition would not stray Google from their most successful and profitable focus, advertising, but rather use Motorola for Android growth and innovation.

The tattoo prototypes contain electric circuits that are stamped on to a user’s skin.  The circuits are tailored specifically to an individual user, much like a digital social security number.  Your mobile device would only be unlocked and authenticated when you were within a particular distance from these circuits.

The other product is the Proteus Digital Health pill.  The pill that is already approved by the US Food and Drug Administration is a computer chip that operated on acid in the user’s stomach.  The pill acts as a tracking device and signal creator that can be used to identify an individual.  Similar to the tattoo, once the pill is ingested and activated, your mobile device can confirm your identity and allow you access.

The pill is much more farfetched than the tattoo for unlocking devices, but once could certainly justify this becoming a requirement to get past TSA in the (hopefully very distant) future.

The days of simplicity have passed us.  As consumers, our privacy and identities have never been more vulnerable.  Technology has optimized the world we live in far past what one could ever imagine and it is a great thing, until you depend on it.

Read the article from The Telegraph here.

Convenience Store Footer

The End of Distracted Driving? – Continued

Earlier this week we posted an article about distracted driving and various movements to reduce the exposure.  In this article we discussed a government grant that was given to Massachusetts and Connecticut to spot texting offenders on the road as well as a new mobile application that aims tto prevent distracted driving by disabling a phone’s functionality while it is in the hands of a driver.

We received a tweet from @freshgreenlight later that afternoon with more information to contribute to the discussion of distracted driving.

* Fresh Green Light describes themselves as a “21st Century driving school” with locations in Rye, NY, Greenwich, CY and Darien, CT. 

Here’s what we found:

Insurance Companies HAVE already joined the cause to prevent against distracted driving.  Esure has developed a free app for Android phones that disables various apps and blocks phone calls and texts while drivers are traveling in excess of 10 mph.  The DriveOFF application has yet to offer discounts or incentives to download.

DriveScribe is another free app that focuses on monitoring driving habits of young drivers.  The system blocks text messages and calls while also reporting speed to the administering party.  The app can also detect whether a driver has blown a stop sign or not.

Canary certainly dominates the monitoring aspect of distracted driving, but does little to prevent said behavior.  The app lets parents see phone use and exact driver location in real-time.  The app will also send notifications to parents when their driver enters “restricted zones” that can be established.  This app will have success with those who behave when they know they are being monitored.

We have also found a very helpful map that communicates how quickly this country has adapted safe driving laws in regards to texting and driving.  The map can be found here from the Insurance Institute for Highway Safety.

While new model vehicles are being equipped with their own on-board computing systems, the communication between phone and car will begin to optimize for safer and more convenient travel.  Until the day that driverless cars rule the road, there will always be risk for distracted driving, but until then, it is up to entrepreneurs and investors to create safer and more secure solutions to prevent accidents.

If you enjoy our content, follow us on our various social media sites.

Twitter

Facebook

Google+

LinkedIn

Google+ & Your Agency’s Future

Image representing Google as depicted in Crunc...

Image via CrunchBase

Is it time to start paying attention to Google+?The platform that was once considered the fastest growing social media site has quieted down over the past few years as the number of early adapters slowed.  Opinions of the tech giant are hot and cold.  Some can admire the endless capacity of information and therefore the tailoring of information specifically to you, while others are fearful of the identity profiles that are collected and stored for each user. Can you say, ‘Big Brother’?

It is safe to say that regardless of your opinion of Google, the company isn’t slowing down.

In early 2013 we saw the introduction of Google Glass, the wearable computer that has been the topic of many privacy discussions.  In late 2012 we saw approval for Google to operate the first driverless vehicle in multiple states across the country.  Now, Google has revisited the Google+ platform to further distinguish it from other social sites.

Google+ does not want to be your alternative to Facebook and/or Twitter.  Instead, the platform wants to be able to significantly separate itself by amount of platforms that it can stitch together and use in one seamless process.  This means YouTube, Google Maps, Google Reviews, Gmail and now Google+ will cater to your one identity.

If you are a marketing savvy insurance agency and have videos and/or reviews on the internet, it behooves of you to begin to integrate these sites with a Google+ profile.  In a digitally optimized world, Google is aiming to do some work for you.

In this sense, if you post a picture of a concert, Google will recognize the content and place a “concert” tag to the photo for search purposes.  Google is also aiming to perfect the #Hashtag game by organizing the thousands of titles into categories and subcategories automatically.  For instance, Twitter organizes the trends by exact lettering after a #hashtag.  So a tweet using #GeneralLiability does not associate at all with #GL.  Under the Google platform, the subcategories will automatically be associated together and be placed under a broader heading of #CasualtyInsurance or just #Insurance.

This effort by Google is promoting the further consultation between people, businesses, sites and topics with less effort on the publisher’s end.

Check out this article on CNN.com that discusses the future of Google+.