Security Technology Executive

NOV-DEC 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/229956

Contents of this Issue

Navigation

Page 5 of 71

MY POINT OF VIEW By Steve Lasky, Editorial Director Ringing in the New Year, learning from the old one L "The saddest aspect of life right now is that science gathers knowledge faster than society gathers wisdom" ast year at this time as we transitioned from 2012 into 2013, the stark reality of the Sandy Hook school shootings numbed our collective senses. As we move into 2014 and leave this year in the rearview mirror, I feel like Dr. Who (shame on those of you who don't know the good Doctor), caught up in some sort of parallel universe -one that my favorite science fiction author, Isaac Asimov, would both appreciate and view with foreboding. The brilliant writer who penned the classic Foundation series and I, Robot, was once asked about the rapid pace of technology and its effect on society. He responded by saying, "The saddest aspect of life right now is that science gathers knowledge faster than society gathers wisdom." And what did Asimov view as the one constant of this frenetic technological advancement? "It is change, continuing change, inevitable change that is the dominant factor in society today. No sensible decision can be made any longer without taking into account not only the world as it is, but the world as it will be," he concluded. Asimov made these observations more than 40 years ago. They have proved prophetic. We as an industry and citizens of the world now wrestle with moral and personal conundrums that sometimes conflict with technology's good intentions. You only have to dig as deep as yesterday's headlines. Technology's rapid ascent creates heroes and villains quicker than a politician's sound bite. Solutions created in the innocent construct of solving societal problems, deterring crime or expediting brutal conflicts, now morph into Frankenstein monsters their creators never intended. Regardless where you rank Edward Snowden on the traitor or hero meter, the fallout resulting from his NSA revelations have let the proverbial Genie out of the bottle and taken the Orwellian theme of "Big Brother" is watching to a level never before seen in the United States. It seems that with every passing day America's not so covert agency drops another load onto the streets of DC. The blowback has splattered not only foreign leaders and their tapped cell phones, but ordinary U.S. citizens unaware both phone and email correspondence was suddenly government property. Again, make your own judgments. In the spirit of good theater, we now find out that not only were cell, land lines and the internet being monitored, but junior's PlayStation 4 and Xbox One have come under the microscope of the agency's anti-terrorist unit. It seems while your teenage son was busy battling Garrosh Hellscream, Voljin and Deathwing, NSA operatives were busy trolling for al Qaida warriors. Both the NSA and the UK's Government Communications Headquarters (GCHQ), a British intelligence agency, have been working to infiltrate the virtual world of online games considered as an attractive environment for al Qaida, cyber terrorists and hackers, While NSA tactics have certainly created a firestorm in their new light of day, the technology used to power the spy engine is a nebulas concept to most Americans. Not so with 2013's other hot technology topic – drones. These denizens of the sky are tangible targets for any and all privacy advocates to see. It is ironic that the same technology most Americans have accepted as a necessary tool of military combat, fails to illicit the same allegiance when applied to local law enforcement. While drone technology, when applied to crime deterrence and investigation, has a definite place in police work and emergency management applications, selling it to the general public figures to be more difficult as a result of the NSA's growing hit list. David McCullough, one of America's most lauded historians, a two-time winner of the Pulitzer Prize and a recipient of the Presidential Medal of Freedom, stated: "The evil of technology was not technology itself, Lindbergh came to see after the war, not in airplanes or the myriad contrivances of modern technical ingenuity, but in the extent to which they can distance us from our better moral nature, or sense of personal accountability." Perhaps 2014 will mark the beginning of a more enlightened discussion about our technology roadmaps – not only the impact to law enforcement and homeland security, but to our citizens as well. ❚ If you have any comments for Steve Lasky regarding this or any other security industry-related issue, please e-mail him at steve.lasky@cygnus.com. SECURITY TECHNOLOGY EXECUTIVE (USPS 009-826; ISSN 1946-8474 print; ISSN 2158-7078 on-line) is published nine times per year: January/February, March, April, May, June/July, August, September, October and November/December by Cygnus Business Media, 1233 Janesville Avenue, Fort Atkinson, WI 53538. Periodicals postage paid at Fort Atkinson, WI and additional entry offices. POSTMASTER: Please send all change of address to SECURITY TECHNOLOGY EXECUTIVE, PO Box 3257, Northbrook, IL 60065-3257. Subscription Policy: Individual subscriptions are available without charge in the U.S. to qualified readers. Publisher reserves the right to reject nonqualified subscribers. One year subscription to nonqualified individuals: U.S. $35 One Year; $70 Two Years; Canada and Mexico $55 One Year; $100 Two Years; all other countries, payable in U.S. funds, drawn on U.S. bank.: $80 One Year; $150 Two Years. Single issues available (prepaid only), $10 each. Canadian GST #131910168. Canada Post PM40612608. Return Undeliverable Canadian Addresses to: SECURITY TECHNOLOGY EXECUTIVE, PO Box 25542, London, ON N6C 6B2. The opinions expressed by the authors and contributors to Security Technology Executive are not necessarily those of the editors or publisher. SECURITY TECHNOLOGY EXECUTIVE is published and copyrighted 2013 by Cygnus Business Media. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording or any information storage or retrieval system, without written permission from the publisher. The publisher reserves the right to accept or reject all editorial or advertising material. Publisher assumes no responsibility for return of unsolicited manuscripts or artwork. Printed in the U.S.A. 6 SECURITY TECHNOLOGY EXECUTIVE • November/December 2013 www.SecurityInfoWatch.com

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - NOV-DEC 2013