Friday, March 18, 2016

Agency, Dotage, & Vacation Virtualisation

The problem: There are too many old people with limited mobility and too much money, in comparison to the too many young mobile people with too little money. This situation limits the agency of both parties.

Challenge: How to normalise, or balance this situation.

Solution: A Vacation Virtualisation Ecosystem


Virtual Vacations Mart: A means of advertising location and price of Virtual Vacations (4 Types, Sole Control Vacation Share, Fly on the wall & Replay)

Payment System: Ability to book, and pay by the glimpse!

Control System: Allows control of the visiting entity, to start with a human, in the future likely to be robotic / drones.

Communication System : In the more remote areas of the planet this will be a key investment area.

Capture Platform: 360 Stereoscopic Camera & Surround Sound Platform that can capture and transmit the required views and sounds to the Virtual Vacationers (ie transmit the view and soundscape each is looking at, the sounds and views will change orientation as the "virvaker" turns their head)


Sole Control is where a single individual controls the movement of the Capture Platform through a specific area

Vacation Share involves multiple virtual vacationers hitching a ride on a vacation platform that will take a pre-defined path through an area.

Fly on the Wall, similar to Vacation Share, but normally involves a visit to the normal or perhaps news worthy locations around the planet. What is it like in Alepo at the moment? What is it like in a Mumbai slum?

Replay, would likely be used to record the journeys to more remote locations, or journeys that are likely to be viewed multiple times. They would be cheaper to deliver, and thus lower cost. By far the majority of virtual visits to the Taj Mahal are likely to be via Replay.

Some Implications

Flow Control/Rationing : We will soon see some locations being swamped with virtual vacation platforms. The locations would move to limit the number of Sole Control vacation platforms allowed to visit at one time. Imagine how many folks will want to visit the Taj Mahal.

Bandwidth limitations will provide some challenges.

Smelly Vision would be a major enhancement that would allow the realistic transmission the smells of a location.

Environmental Replication Varying the humidity, temperature, and UV rays experienced by the virtual vacationer would also provide further enhancement of the experience. One can envision pods designed to fully replicate the fast changing environment of a specific vacation journey, replicating walking from sunny plains through a humid jungle in to a cool dark cave.

Monday, October 19, 2015

My Ludicrous Logitech Remote Experience

This is a more personal post with an embedded message.

As a ridiculously extravagant gift to myself I purchased two different Logitech Harmony Remotes
My goal was to attain better control over my devices, ranging from X10 lighting and power switches to the various media devices used around our house.

As usual the first thing I did was to read and translate the Terms and Conditions the result was a surprise even to me, you have just got to love lawyers!

Here is my plain English translation:

1 It's not yours, it's ours, we just let you use it while we choose to allow you to.
2 You can't nick it or let anyone else nick it. 
    (It's not good enough to use for anything important, think of it as a toy.)
3 If you give it to anyone they are also lumbered with these rules.
4 There's stuff in this made by others, the stuff they make might not work, which is not our fault. You accept their stuff may spy on you and misuse your personal data. This is nothing to do with us but we make you accept this rule anyway. Oh yes and they can change their stuff without you knowing anything about what they did or why they did it.
5 We can stop you using it whenever we want to with no need to tell you why.
6 We never said it would work and it's your fault if it doesn't, and it would be absolutely nothing to do with us!
7 We will never EVER accept any liability under any circumstance what-so-ever.
(unless of course, if you happen to know we have to accept liability by laws of your jurisdiction, in which case we will work very hard to duck our liabilities)
8 Special Clause for the U.S. government, even though we say on the box it can't be sold in the USA
9 You must comply with export controls, though we won't say why, or which ones apply.
10 If you are buying this for someone else we will pretend they bought it and will apply all
these rules to them whether or not they read them.
11 We are going to pretend your own countries law's don't apply and you can't make us think they do "La la la, la lah!"
12 If English is not your language tough! We only believe what we said in this English Version.
13 We have put a list of other folks on the internet, as they are the people who wrote most of this thing, and you have to accept all their rules too!

14 We have NO obligation to keep this thing working....

Why did I buy this stuff again?

Anyway I shall ignore these silly T's and C's, mostly because I still hold to the ludicrous idea that most Corporations want to do good by their customers, yes I know, silly me! I also have a sneaking suspicion that in a court of law most of these terms are invalid. 

Why do Corporations write such ludicrous Terms and Conditions? That's a far deeper question, which I suspect it is part seeing their purchasers as commodities to trade rather than Customers, and part a defensive position against the litigious world in which we live.

I am starting to consider that I need a set of Terms and Conditions myself for all those that want to do business with me.... I wonder how ludicrous I should make them?

Thursday, October 08, 2015

"Man in the Middle" Reduces Agency and Subordinates

It is an obvious statement that passing direct control of a device or thing to others to act on it, on the behalf of the owning entity, reduces the owners direct control, or Agency. While the owning entity may choose to trust the new agent, or service provider, the added complexity, aimed at making life easier to control automatically or remotely, will always add risk, and reduce security. Thus individual entities are both subordinated and less secure.

There is a clear difference between Architecting for Control versus Architecting for Agency. Often the former focuses on the control needs of the larger entity, rather than individual entities. The perspective of the designing architect is naturally driven by the needs of the corporate entity that is paying for the control architecture. It takes a corporation with very strong values to recognise the importance and value of Architecting for Agency.

Architecting for Agency is perceived not to be in the interest of the Corporation or Service Provider. The current architectural fashion is to architect Control Agents under the Provider Star Model. Meaning that all control commands come through the provider, making them the Prime Controller. This also provides one point of attack to gain control over all the devices in their dominion. It should be noted that the most important outcome is the ultimate loss of Agency of the owners of devices or things. Subordination is a natural outcome, individual entities become the serfs of the corporate service providers, not their masters.

So what does Architecting for Agency look like?

It often starts in the deliberately confusing Terms and Conditions of the service providers, here one can establish the architectural intent of the providers. See next blog post: My Logitech Remote Control Experience.

It continues with the Identity & Entitlement Model used by the provider; your identity and rules or theirs?

The Network Topolgy is also a great indicator. Does the owning entity control the communication pathway or hubs through which all control commands flow from owning entity to things or devices.

The future points to a mesh network where all entities can combine and communicate under the appropriate bi directional rules of owners and providers. With neither star nor hub. It is here that all devices and things become entities that can enact Asimovs Four Laws. (A 4 Laws enabled heart beat sensor that can identify that the heart it is sensing is in trouble and knows how to act to save the life of the heart's owner.)

The capacity of things and devices to exist virtually under their own control. Stated differently can the digital state of a thing be stored in the cloud under the direct control of the thing.

Nature has invented the technique of creating things that attain and maintain their own Agency.

We are those things!

Our challenge is to architect and implement a means of attaining and maintaining Cyber Agency

For today we are architecting for subordination, we are collectively accepting not a "Man in the Middle", but "Legions of Corporations in the Middle!" We should not be at all surprised at the consequences. If only George Orwell, had been alive today, his novel 2084 would have been far scarier!

Governments are often enamoured by techniques that can be used to subordinate their citizens, in the name of security. They appear not to have yet spotted that in this new age of Cyber Feudalism, it is the Corporations that are gaining control over their individual citizens tapping directly into their innate value and governments are being disintermediated. The "offending" cyber corporations apparently hell bent on reducing human agency for their own fiscal benefit, come from three basic corners, firstly the bandwidth providers, secondly the device providers, and secondly the service providers. The cleverer of these are starting to use more than one of the corners.

The upcoming agency architectural decisions are perhaps some of the most important ethical choices humanity has to make in this century. Without the right choices we can never expect to develop or gain Cyber Human Rights!

Subordination is a problem, but the resulting security risks are also key.

Sadly, as in all things security, we seem to have to first experience the full horrors of the negative, before we put in place methods of safely achieving the potential positive outcomes.

  • Cars - Seatbelts & Airbags
  • Electricity - Fuses & Earth Leakage Protection
  • Sunshine - Sunscreen

The film The Matrix is a good metaphor for Cyber Feudalism, the well hidden identity of the film was the name of corporate entity that was behind all the human energy harvesting.

I am reminded of the first live crab I cooked; what will it take for us to get out of the nice warm water before we fall asleep and boil to death?


Tuesday, July 28, 2015

Do I have a right to be anti-monadic?

Having discovered the word that describes well the actions of the cyber giants that results in our being squeezed into one single identity, it struck me that perhaps my human rights are being eroded. Monadism, yet another term from philosophy, it effectively describes the GAFA activities that are driving us toward a single identity.

Being able to represent my self in one of my many web based personas has become increasingly difficult, as first one of the GAFAs and then another manage to fuse my different personas, their clear target is to know me as a single individual. (See my recent Apple Watch example)

My grandfather persona is one I am still trying to protect though at least two of the GAFAs have managed to attach that persona to their monadic view of me.

My Jericho Forum colleague Paul Simmonds is working towards protecting our ability to uniquely represent ourselves as multiple personas, while maintaining our ability to have agency over our identities. His Global Identity Foundation is unsurprisingly currently making little headway against the huge combined gravitational forces of the GAFAs.

Perhaps what is needed is public awareness of the implications giving control of our identities to third parties and the development of a clear desired identity state. The current issue is that the frustration with the difficulty of maintaining identity control, is actually resulting in individuals handing control to the GAFAs.

A recent purchase of an Amazon Fire TV device demonstrated to me just how attractive it is to pass control over. The device arrived with the identity of the purchaser pre-loaded, we had after all purchased it from Amazon so they already knew who the purchaser was. There was no effort involved in claiming ownership of the device as the device apparently already "knew" who it's owner was. The truth is that it is Amazon who knew the identity of the owner, and they had asserted their control over the device. The experience was far simpler and less weird than the Samsung TV Identity ownership ceremony. The underlying issue is that we have passed control to Amazon and they had chosen not to authenticate the Identity of the owner.

Amazon have not yet made the jump to combining monadic identities into family groups, that Apple have made. This action would further pass control to the provider of identities, this would not be an issue if that were all they provided, the issue comes from the fact that they also provide products and services.

Anti-Monadic Rights

So, should we give an individual the right to create separate identities and maintain them separately.

The difficulty comes when such separate personas are used to hide illegal or immoral activities.

The state will likely press for monadic identities, using terrorism, tax evasion and crime as their primary drivers.

So what are the key elements of a successful identity model in the 21st Century

Data Agency: Having control over the transparency, privacy and usage of our data.

Identity Agency: Having control over the creation, use and deletion of multiple separate personas

These two elements should apply equally to all entities, whether person or organisation.


So my conclusion is, yes, I should have the right to control multiple separate identities.

Clearly that does not give me the right to use any of these for illegal or immoral purposes.

The challenge will be to create the legal and digital ecosystems that will allow CyberAgency, while maintaining a civilised and moral society.

Thursday, July 02, 2015

Eliminating Passwords: The Latest #AgencyFail Fashion

The latest fashion amongst

hi tech service providers,

is eliminating passwords.

They understand that their customers hate passwords however they are taking shortcuts that are denying their customers the ability to control their devices or services. Worse these shortcuts are passing the risks onto their customers

Apple have added a new feature to their Personal Hotspot service on the iPhone. Basically once you've set it up you can no longer turn it off. Sliding the switch in the iphone settings panel to off does nothing. A device that you have allowed to use the Personal Hotspot service on your phone somehow knows that the phone is near, and advertises Personal Hotspot availability. But wait it's switched off right... nope! if the devices user just connects to your phones Personal Hotspot from the device. Your phone will switch the Personal Hotspot service to <ON> and allow the connection!

This is not good, an iphone owner that allowed someone to use their Personal Hotspot doesn't appear to be able to stop them having access.

Oh wait, all one needs to do is change the Personal Hotspot password right? Well actually no, Apple have thought of that too! If you change the password, the device that you have already allowed to access the Personal Hotspot has apparently been given a magical password.

To recap: Hotspot switched off on the iPhone, Personal Hotspot Password changed.

When a device that has previously been allowed to connect to your Personal Hotspot comes close to your iPhone, the device will be informed and offer the Personal Hotspot to it's user, who can request connection and "Open-ses-a-me" the device is connected, as if the password change never happened.

This is an issue Apple!

How Apple should have designed the new "Instant Personal Hotspot" feature, was to add it as a selectable option. An option that would allow the iPhone user to have control, ie have agency over their phone. By quietly adding the option and leaving the iPhone owners assuming they had the ability to switch off their iPhone's Personal Hotspot feature, they have demonstrated the worse sort of Password Elimination: #AgencyFail

Another example of Password Elimination: #AgencyFail has been perpetrated by Amazon. When a user is shipped a new Kindle, they ordered it from their Amazon account, with their password.

Amazon must have thought "So we know it's them right, and they won't want the hassle of a password, will they?"

Having ordered the Kindle for my wife, I handed her it to her boxed. Yes, I was very surprised that she could order e-books on her new Kindle from my account without needing my password. She had gone through the install process, which assumed that I was her, and at no time was she asked to authenticate.

This is an issue Amazon!

How Amazon should have designed the no password "One-Click" feature, was to add it as a selectable option. An option that would allow the Kindle user, once they had authenticated, to enable the "One-Click" Kindle purchase feature, ie have agency over their Kindle. By deciding to ship a Kindle that assumed it's user was it's owner and did not require authentication for purchases, they too have demonstrated the Password Elimination: #AgencyFail

I believe that these features are often driven by marketeers who like the idea of making users life so simple it will delight them. But they are missing the opportunity of delighting their users by informing them of and giving them control of new features.

In both instances my experience was far from delightful, in fact it diminished my trust in both companies.

In your own organisation's quest to make your customer's lives easier, be wary of losing their trust and loyalty by denying them the right to control or have Agency over the devices or services you provide them.

As the Internet of Things explodes into our lives, let's hope the growing Password Elimination Fashion is delivered in a manner that does not eliminate our Agency, but enhances our Agency. Though sadly hope has never been an effective strategy!



Why should CISOs get involved in mapping?

Sadly many CISOs have yet to discover the existence, or power, of mapping, as described by LEF's Simon Wardley. So what is mapping and what has it got to do with a CISO? Happily Simon has made gaining an understanding of mapping a trivial activity, as those who follow his Blog already know.

Firstly do not assume that trivial always equates to quick, for to fully grasp the intricacies and power of Simon Wardley's mapping tool is the work of a lifetime.

While attempting to describe Simon's Mapping Tool in a single paragraph brings the danger of over simplification and trivialization, I will attempt it in order to whet your appetites. After running companies and developing strategy for others, and much else besides, Simon saw the light. More correctly he derived the mapping tool after much research and data gathering and analysis. The tool helps map the flow of things business related through four phases shown in his graphic below. It allows the development of a unique awareness of your business and its competitive environment, allowing the development of strategic and defensive plays, that will strengthen any organisation. As Simon implies "No military commander would consider going into battle without a map, so why should business leaders attempt to do business without a map?"

Used under Creative Commons License with no changes made.

Mapping has many benefits but one that will appeal to CISOs is that it helps identify the changing flows of information across organizational boundaries, as well as identifying services that are candidates for outsourcing.

In truth, there are many valuable benefits of Mapping, to numerous to enumerate here.

So, find out if your organisation is Mapping and if they are; get involved. If they are not, start Mapping yourself and bring the tool and your findings to the attention of the strategy planners in your organisation.

In either case you win!


Sunday, June 28, 2015

Asimov's Laws of Robotics do not enable Human Agency

Reminding ourselves of Asimov's Laws:

A robot 
 - may not injure a human being or, through inaction,  allow a human being to come to harm. 
 - must obey orders given it by human beings except where such orders would conflict with the 1st Law. 
 - must protect its own existence as long as such protection does not conflict with the 1st and 2nd Law.

It seems that a robot following the above laws receives no admonishment to obey it's owner.

Or does it? There maybe some that argue that the action of not obeying its owner could be seen to cause some sort of injury to the owner in question. Is distress an injury? This is rather a complex equation for a robot or the law to establish.

For the sake of clarity and simplicity perhaps an additional Law is required, to enable Agency;
What should it be?  Perhaps....

A robot :- 
 - may not injure a human being or, through inaction, allow a human being to come to harm. 
 - must obey orders given by its master or master's agents, except where such orders would conflict with the 1st Law. 
 - must obey orders given it by human beings except where such orders would conflict with the 1st, or 2nd Laws.
 - must protect its own existence as long as such protection does not conflict with the 1st, 2nd or 3rd Laws.

Such a formulation would add the concept of Human Agency to the Laws of Robotics.
The definition of Master will need to be carefully developed in Law, as it is likely that producers of robots will attempt to retain ownership of them.

Now all we need are four things
0) A human right to Cyber Agency, or simply and more generally a Right of Human Agency
1) Cyber Agency Awareness and Skills, and the desire to attain and maintain Cyber Agency
2) Ceremonies that unequivocally connects persons and things conferring ownership and Agency
     (Such ceremonies would have both legal & technical components)
3) The Laws, Technology and Ecosystems to enable 1 and 2, thus enabling 0

If we had these constructs in place, our ability to achieve Privacy and/or Transparency would be greatly enhanced. Sadly we have yet to even get to the Cyber Agency rights or first part of thing 1, namely Cyber Agency Awareness. We currently prefer to assume that the individuals who run Cyber Space are totally benign and have our personal interests at heart.  Hmmmm!

(While I was aware of the existence of the Zeroth Law, at first glance I felt that it served no purpose in this debate, though on second thoughts perhaps it does? Could we use Hybrid AI to run the COW? I created the concept of Cyber Over Watch in an earlier post? )

Friday, June 26, 2015

Agency requires recording and authentication of Intent or Accord

Those nine words represent a need that is very poorly delivered in today's world. I fear that while it is being less well delivered in Cyber Space, Things are going to make it far worse. In the current world our accord is often recorded by our signing and dating a document, and more recently scribbling onto the small screen of proffered device. Authentication is rarely if ever attempted. Repudiation is thus, in most cases, a trivial activity; "That isn't my signature/scribble".

Intentification, a neologism, describes the act or process of determining someone or something's intent.

In Cyber Space this is going to become more important, for in the near future our identity and location will be known to a very high degree of confidence. Our mere presence at the location where an event was triggered will likely be misused as proof our intent to trigger the event.

A current example are the pocket calls that we all have made. We should all be aware that having an International Phone Number as the number most likely to be used by our phones in such pocket calls can be a costly experience. Mobile phone operators quite happily bill us for such pocket calls, they do not care if we intended to make them or not.

The Law has addressed our ability to regain control of contracts signed remotely, the Consumer Credit Act gives us a cooling off period, but the act does not appear to address transactions under a previously agreed contract. "I did not switch on the Under Floor Heating over the summer, my Smart Home did!"

In the future Things will be able to trigger many more costly and perhaps more dangerous events, this may be as a result of accident, duress, mistake or malicious remote attack. If our presence at the point of the event being triggered is assumed to prove our intent or accord, we will be in trouble or out of pocket much more frequently than the current issue Out of Pocket calls. We seem to have accepted the lack of Intentification in pocket calls, will we continue to accept the lack of these authentication process.

Our Things will need to get much better at determining our intent and accord, as the frequency, danger and cost, of mistakenly determining our intent and accord increases this will become more a more evident need.

Trust and Safety requires an effective combination of the Identification and Intentification processes, we should not allow the continued oversimplification resulting from assuming that authenticating identity and location is all that is needed to record and authenticate our intent or accord.

This is actually quite an important Cyber Right that we have yet to acquire, mostly because an effective capability of authenticating intent or accord in Cyber Space has yet to be developed. Just as it has yet to be developed in the old paper based world, but remember repudiation is much harder in Cyber Space.

How are we to take control of our cyber space without this right and capability?