Archive

Posts Tagged ‘Privacy’

The failure of enterprise to prepare for cyberattacks

China-Cyber-Spying

Late last month, Zeitgeist went with friends to his local theatre to see “Teh [sic] Internet is a Serious Business”. The play, a story of the founding of the hacktivist group Anonymous, was the most well-publicised dawn of cyberattacks on businesses and governments. The organisation, at its best, set it sights on radical groups that promoted marginalisation of others, whether that was the Church of Scientology in the US or those trying to dampen the Arab Spring in Tunisia. This collective, run by people, some of whom were still in school, showed the world how vulnerable institutions were to being targeted online. We wrote about cybersecurity as recently as this summer, summarising the key points in a recent report from The Economist on what was needed to mitigate against future attacks and how to reduce the damage such attacks inflict. The issue is not going away (and in fact is likely to become worse before it gets better).

It was back in January that management consultancy McKinsey produced a report, ‘Risk and responsibility in a hyperconnected world: Implications for enterprises’, where they estimated the total aggregate impact of cyberattacks at $3 trillion. There is much to be done to avert such losses, but the current picture is far from rosy. Most tech executives gave their institutions “low scores in making the required changes”, the report states; nearly 80% of them said they cannot keep up with attackers’ – be they nation-states or individuals – increasing sophistication. Moreover, though more money is being directed at this area, “larger expenditures have not translated into an increased maturity” yet. And while the attacks themselves carry potentially devastating economic impact on a company, their prevention comes at a price too for the business, beyond the financial. McKinsey reports that security concerns are delaying mobile functionality in enterprises by an average of six months. If attacks continue, the consultancy posits this could result in “a world where a ‘cyberbacklash’ decelerates digitization [sic]”. Revelations about pervasive cyberspying by Western governments on their own citizens could well be a catalyst to this. Seven points are made in the report for enterprises to manage disruptions better:

  1. Prioritise the greatest business risks to defend and invest in.
  2. Provide a differentiated approach to defence of assets, based on their importance.
  3. Move from “simply bolting on security to training their entire staff to incorporate it from day one into technology projects”.
  4. Be proactive; develop capabilities “to aggregate relevant information” to attune defence systems
  5. Test. Test. Test again.
  6. Enlist CxOs to help them understand the value in protection.
  7. Integrate risk of attack with other corporate risk analysis

Given the amount of business and social issues that involve digital processes – “IP, regulatory compliance, privacy, customer experience, product development, business continuity, legal jurisdiction” – there is a huge amount of disagreement about how much state involvement there should be in the degree to which enterprises must take steps to protect themselves. This is an important point for discussion though, and we touched on it when we wrote about cyberattacks previously.

But that report was way back in January, things must have solved themselves since then, right? Last week, PwC reported that corporate cyber security budgets are being slashed, even while cyberattacks are becoming far more frequent. The FT reported that global security budgets fell 4% YoY in 2014, while the number of reported security incidents increased 48%. Bear in mind these are only reported incidents. This is potentially no bad thing, if we’re to go by McKinsey’s diagnosis of too much money being thrown at the problem in the first place. At the same time, it’s not exactly comforting.

Only a few days after PwC’s figures were published, JP Morgan revealed that personal data for 76 million households – about two-thirds of total US households – had been “compromised” by a cyberattack that had happened earlier in the year. Information stolen included names, phone numbers and email addresses of customers. It was also revealed that other financial institutions were probed too. Worryingly, the WSJ reports that investigators disagree on what exactly the hackers did. It was also unclear who was to blame; nation state or individual. Such disagreements over the ramifications of the attack, the identity of the attackers as well as the delayed revelation of the attack itself, illustrate just how necessary transparency is, if such attacks are to be better protected against and managed in the future.

For those in London at the end of the month, The Economist is hosting an event for those who apply, on October 21, examining “how businesses can and should respond to a data breach, whether it stem from a malicious insider, an external threat or simple carelessness”. Hope to see you there.

Cyberattacks and espionage – Risks and Prevention

Aston Martin - 2

It’s not quite as cool as Bond in his Tom Ford suit leaning on his wonderful Aston Martin while he plots his next move to unseat some despot. All the same, Germany’s recent apparent spate of typewriter purchases points to a renewed sense of fear of being overheard and compromised in an era of digitally pervasive content, vulnerable networks and indelible conversations. Spying and intelligence concerns coalesced with subject matter we’ve previously written about – including online privacy, governance, security and the internet of things – in a special report in last week’s The Economist, which produced eight articles on the subject of security in a digital landscape. Some highlights:

  • Cybercrime is costly. The Centre for Strategic and International Studies estimates the annual global cost of digital crime and intellectual-property theft at $445 billion – a sum “roughly equivalent to the GDP of a smallish rich European country such as Austria”.
  • Focus on prevention rather than reaction. As with many things, the best way to make sure cyberattacks aren’t too damaging to your business is to make sure they never happen in the first place. It’s more difficult (and costly) with digital security because the process can easily feel like a Sisyphean struggle; businesses invest in new technology only to see it circumvented by more hacking, perhaps exposing a different loophole or vulnerability. But an iterative approach is better than leaving the door open and spending more money after the fact.
  • Honesty is the best policy. After being hacked, a company can find it hard to admit it. This is understandable. Not only is it somewhat embarassing, it admits to customers and shareholders that the company is vulnerable, but it also suggests that their data is not safe with said company; perhaps they should shop elsewhere. However, transparency in such a situation is paramount if others are to learn how to combat such attacks. One suggestion is that the US government “create a cyber-equivalent of the National Transportation Safety Board, which investigates serious accidents and shares information about them”.
  • Who to complain to? The perpetrators of cybercrimes are no longer limited to the teenaged hackers of yesteryear. Though ideological groups like Anonymous serve as a disruptive influence, often the biggest problems are caused by the governments charged with protecting things like individual privacy, security and freedom of speech. From the US to China, authorities “do not hesitate to use the web for their own purposes, be it by exploiting vulnerabilities in software or launching cyber-weapons such as Stuxnet, without worrying too much about the collateral damage done to companies and individuals”.
  • External trends point to a worsening of the problem. The Internet of Things as a trend will have billions of devices connected to each other via the Internet over the next few years. With one of the fundamental ideas being that the user isn’t really aware of the connection, the likelihood of spotting a hacked device becomes all the smaller. This isn’t a huge problem in cases like a connected fridge receiving spam email, but it becomes more of a problem when hackers can gain remote control of your car. One of the barriers to improved security for everyday devices is that the margins are razor-thin, as are the chips to connected to the devices, in order to keep the product small. Any added security software or hardware and the cost and size of the product increases.

Zeitgeist believe the risk to IoT devices will be one of the key areas that businesses and regulators will need to focus their efforts in the future. Because it is still a relatively fledgling sector, the issue is not being discussed yet in many places. Deloitte, in association with the Wall Street Journal, recently reported on the nature of cyberrisks and how companies can help mitigate them. Well worth a read.

Tech’s impact on business and culture in 2014

Oscarselfie2014

It would be impossible to capture the disruptive influence the latest digital technologies are currently having on the world in a single blog post. But what Zeitgeist has collated here are some thoughts and happenings showing the different ways technology is changing our lives – from the way we do business to the way we interact with others.

Last night saw a highly enjoyable occurrence. No, not the Academy Awards in general, which as ever moved at a glacial pace as it ticked off a list of predicted favourites. Rather, it was a specific moment in the ceremony itself, when host Ellen DeGeneres took a (seemingly) impromptu picture of herself with a cornucopia of stars, tweeting it instantly. The host declared she wanted the picture (above) to be the most retweeted post ever. The previous holder was none other than the President of the United States, Barack Obama, whose re-election message saw over 500k retweets. It took Zeitgeist but a few minutes to realise that Ellen’s post would skyrocket past this. Right now it has been retweeted 2.7m times. Corporate tactic on the part of Samsung though it may have been, Zeitgeist felt himself feeling much closer to the action – being able to see on his phone a photo the host had taken moments ago several thousand miles away – and the incident helped inject a brief air of spontaneity into the show’s proceedings. Super fun, and easy to get definitive results in this case on how many people were really engaging with the content. But can we quantify how much Samsung and Twitter really benefited from the move, beyond fuzzy marketing metrics? Talking heads on CNBC saw room for improvement (see below).

Former WSJ.com Managing Editor Kevin Delaney leads discussions on Samsung and Twitter's presence at the Oscars last night

Former WSJ.com Managing Editor Kevin Delaney leads discussions on Samsung and Twitter’s presence at the Oscars last night (click to watch)

The big news of late in tech circles of course has been Facebook’s $19bn acquisition of messaging application Whatsapp. Many, many lines of editorial have been spilled on this deal already. In the mainstream media, many commentators have found the price of the deal staggering. So it’s worth reading more considered views such as Benedict Evans’, whose post on the deal Zeitgeist highly encourages you to read. Despite the seemingly large amount of money the company has been acquired for – especially considering Facebook’s purchase of Instagram for a ‘mere’ $1bn – Evans sagely points out that per user the deal is about the same as Google made in its valuation when it purchased YouTube. So perhaps not that crazy after all. The other key point that Evans makes is on Facebook’s dedicated pursuit to be the ‘next’ Facebook, or conversely to stop anyone else from becoming the next Facebook. With a meteoric rise in members (see image below, as it outstrips growth by both Facebook and Twitter), Whatsapp was certainly looking a little threatening.

WhatsappgrowthvsFacebookTwitter

Whatsapp’s number of active users skyrocketed to 450m in no time, outpacing both Facebook and Twitter (Source: The Economist)

The worry for investors is how Facebook will monetise this platform, when the founders have professed an aversion to advertising. Is merely ensuring that Facebook is the ‘next’ Facebook a good enough reason for such acquisitions? Barriers to entry and sustainable advantages will be few and far between going down this route. The Financial Times, in its analysis of the acquisition, points out that innovation is quickly nipping at the heels of Whatsapp. CalPal, for example, is one example of a mobile application that lets users message each other from within an app. In the markets, there has been a relatively sanguine response to the purchase, but only because of broader trends. As the FT points out,

“External forces have also helped to push the headline prices of deals such as WhatsApp into the stratosphere. A global excess of cheap money, along with a scarcity of alternatives for growth-hungry investors, has boosted the stock prices of companies such as Facebook and Google.”

One of the most visibly exciting developments in technology in recent years is the explosion of the wearable tech sector. But it is Google’s flagship product, Glass, that has met with much ire and distress. An excellent piece of analysis appearing in MIT Technology Review last month hit the nail on the head when it identified why Glass was having trouble winning people over. The article rightly identifies the significant shift in external appearance inherent in making the switch from a device that needs to be taken out of a pocket as makes it clear when it is being interacted with (you need to cover half your face with the product to talk to someone, for example). The article also details the savvy approach Google have taken to the distribution of their product. It’s always sensible to try and mobilise the part of your base likely to be evangelists anyway, so as to build advance buzz before a full-blown release. But to get them to pay for the privilege, as Google are doing with their excitable fans, dubbed Explorers, is a stroke of genius for them. However, the key issue, and what the article states is an “insurmountable problem”, is that “Google’s challenge in making the device a successful consumer product will be convincing the people around you to ignore it”. It is this fundamental aspect of social interaction that is worrying many, and now Google is worried too. As detailed in the FT, the company has acknowledged that the product can look “pretty weird”. Recognising it has a “long journey” to mainstream adoption, it published a list of Dos and Don’ts. Highlights include,

“Ask for permission. Standing alone in the corner of a room staring at people while recording them through Glass is not going to win you any friends… If you find yourself staring off into the prism for long periods of time you’re probably looking pretty weird to the people around you.”

It indicates that Google may have a significant ‘Glasshole‘ problem it needs to attend to. The case may be overstated though. One of the problems may just be that potential customers have yet to see any practical uses for it. This is beginning to change. Last week, Virgin Atlantic announced a six-week trial of both Glass and Sony smartwatches. The idea will be for check-in attendants to use the devices to scan limousine number plates so that passengers can be greeted by name and be instantly updated on their flight status.

nycb1

In the arts, digital technology has inspired much innovative work, as well as helped broaden its audience. David Hockney, one of England’s greatest living artists, recently exhibited a series of works produced entirely on his iPad at London’s Royal Academy of Arts. He is far from alone. Last week’s anniversary issue of The New Yorker featured work from Jorge Colombo on its front cover, again produced entirely on an iPad. Such digital innovation allows for increased productivity as well as new aesthetics. When done well, art can also involve the viewer, encouraging interaction. Digital technology helps with this too. Earlier in the year The New York Times covered how the New York City Ballet redesigned part of their floor in a new scheme to attract new visitors to the ballet. The result, roughly life-size pictures of dancers arranged on the floor, has seen great success, and an explosion of content on social media platforms like Instagram, where users have taken to posing on the floor as if interacting with the images (see above). It’s a simple tactic that now reaches a far greater audience thanks to new digital technologies.

A recently published book, ‘Now I know who my comrades are: Voices from the Internet Undergound’, by Emily Parker, seeks to demonstrate the ways in which digital technology has made helped to coalesce and support important activism in regions such as China and Latin America. But, as The Economist points out in its review, the disappointing situation in Egypt puts pay to some of the author’s claims; there are limits to how productive and transformative technology can be. In business, these hurdles are plain to see.  A poll taken by McKinsey published last month shows that “45% of companies admit they have limited to no understanding on how their customers interact with them digitally“. This is staggering. For all executives’ talk of the power of Big Data, such technology is useless without the proper structures in place to successfully analyse it. We also perhaps need to think more about repercussions of increased technological advances and how they influence our social interactions. In the recently opened film Her (starring Joaquin Phoenix, pictured below), set in the very near future, a new operating system is so pervasive and seamless that it leads to fraught, thought-provoking questions on the nature and productivity of relationships. When does conversation – and more – with a simulacrum detract from interactions with the physical world? These considerations may seem lofty, but as we illustrated earlier, the germination of such thoughts are being echoed in discussions over Google Glass.

So technology in 2014 heralds some promise for the future. Wearable tech as a trend is merely the initial stage of a journey where our interaction with computing systems becomes seamless. It is on this journey though that we need to make sure that businesses are making the most of every opportunity to streamline costs and enhance customer service, and that individual early adopters do not leave the rest of us behind to deal with a bewildering and alarming new way of living. One of our favourite quotations, from the author William Gibson, is apt to end on: “The future’s already here, it’s just not very evenly distributed“.

HerJonze

“Lots and lots of files” – Privacy, data and a new currency

December 28, 2013 1 comment

cap241

One of the seminal television shows of the 1990s, The X-Files played on myths, legends and government paranoia to worldwide critical and popular acclaim. One of the key episodes of the series found the lead characters, FBI agents Mulder and Scully, happening upon an abandoned mining facility. Contained inside were row upon row of filing cabinets. Inside, thousands of names spilled forth. The sheer number of file drawers is a visual feast for the viewer. But there is more; one of the agent’s names is in those files. Personal data on her (in the form of a tissue sample) has been taken without consent. Down the rabbit hole we go…

We have always operated under the assumption that governments must surveil in order to protect its citizens. The difference today, as Edward Snowden has so plainly shown, is firstly that you are the one being watched, and secondly that the sheer extent of the surveillance and the pervasive nature of its collection is staggering. The pervasiveness of all this is a key point. Not much in the way of policy has changed really in the past fifty years, it’s just that spying on swathes of the world’s population has become increasingly easier and cheaper. Back in 2006, the UK’s Information Commissioner’s Office warned that the country was moving “towards pervasive surveillance”. Such a prophecy seems to have turned into reality. It creates an uncomfortable feeling that those in charge do not have our best interests at heart, or at least that the ends do not justify the means.

Some of the finest publications in the world have been struggling to make sense of what all this means; Zeitgeist is using this post to highlight some of those key thoughts and issues covered. Back in September, The New York Times reported, paradoxically,

“Even agency programs ostensibly intended to guard American communications are sometimes used to weaken protections. The N.S.A.’s Commercial Solutions Center, for instance, invites the makers of encryption technologies to present their products to the agency with the goal of improving American cybersecurity. But a top-secret N.S.A. document suggests that the agency’s hacking division uses that same program to develop and ‘leverage sensitive, cooperative relationships with specific industry partners’ to insert vulnerabilities into Internet security products.”

Zeitgeist remembers dining alone in New York in September poring over the news. The NSA tried to ask for permission to legally insert a ‘backdoor’ into all digital encryption, but were denied. So they went ahead and did it anyway. They influenced government policy that led to fundamental weaknesses in encryption software. Last week, a federal judge considered the constitutionality of the US’s surveillance programmes. He called the technology used by the NSA “almost Orwellian” and ordered it to stop collecting the telephone records of two plaintiffs. It is one of several cases currently underway.

apidatafbk

Click to see The New Yorker’s infographic on what personal data is made available to social networks and their advertisers

Of course, such spying would have not have been possible without the consent – tacit or otherwise – of companies in the private sector. There is clamor in the US, UK, Brazil and other countries for more restrictive regulation that makes it harder to collect consumer data. Such policy could make data analysis and collection onerous and might have a significant impact for those businesses that make a living out of using such data. As The Economist puts it,

“Should all this make it harder and costlier for companies to gather information, that would hurt the likes of Facebook and Google, which depend on knowing enough about their customers to ping them with ads that match their tastes.”

The New Yorker recently featured a fascinating article complete with unnerving infographic (excerpted image above) showing just how much information we display on our various social networks is then shared with the platform and its advertisers. This month, a new film, Her, arrives in cinemas, from the director of Being John Malkovich. The heroine is a disembodied voice – acted by Scarlett Johansson – who serves as operating system. The line between her servitude and rapid consumption of all her user’s data quickly becomes blurred. As the reviewer Anthony Lane puts it, also for The New Yorker,

“Who would have guessed, after a year of headlines about the N.S.A. and about the porousness of life online, that our worries on that score—not so much the political unease as a basic ontological fear that our inmost self is possibly up for grabs—would be best enshrined in a weird little [film]?”

Unsurprisingly, the results of a recent YouGov poll in the UK showed consumers were now far less willing to part with their own data. Almost half would be less willing to share their personal data with companies in the next five years. A mere 2% said they would be more willing to do so. Part of the problem lies in a lack of transparency: who is using my data, which piece of information exactly, and how does it benefit them? More importantly, what am I getting in return for surrendering my data? Steve Wilkinson of Ernst & Young offered little in the way of cheering news, “Many customers have recognised that businesses are using their personal information to help increase revenues, and are starting to withdraw access to their private data… In spite of this, there is a reluctance to adopt incentives that encourage consumers to part with personal data”.

Writing in the FT yesterday, Evgeny Morozov penned an excellent article claiming the media was spending far too much time on the intricacies of government involvement rather than how the whole cocktail mixes together. The overreach, according to the author, is being treated as an aberration, that will disappear in the face of tighter controls and the harsh light of day. It should instead, Morozov argues, be treated as part of a worrying trend in which “personal information – rather than money – becomes the chief way in which we pay for services – and soon, perhaps, everyday objects”. The article continues,

“Now that every piece of data, no matter how trivial, is also an asset in disguise, they just need to find the right buyer. Or the buyer might find them, offering to create a convenient service paid for by their data – which seems to be Google’s model with Gmail, its email service… [W]e might be living through a transformation in how capitalism works, with personal data emerging as an alternative payment regime. The benefits to consumers are already obvious; the potential costs to citizens are not. As markets in personal information proliferate, so do the externalities – with democracy the main victim. This ongoing transition from money to data is unlikely to weaken the clout of the NSA; on the contrary, it might create more and stronger intermediaries that can indulge its data obsession.”
Morozov also questions the meaning behind such data, as Zeitgeist has done in a previous article. Such information risks becoming seen as an objective answer without providing a solution or insight.
“Should we not be more critical of the rationale, advanced by the NSA and other agencies, that they need this data to engage in pre-emptive problem-solving? We should not allow the falling costs of pre-emption to crowd out more systemic attempts to pinpoint the origins of the problems that we are trying to solve. Just because US intelligence agencies hope to one day rank all Yemeni kids based on their propensity to blow up aircraft does not obviate the need to address the sources of their discontent – one of which might be the excessive use of drones to target their fathers. Unfortunately, these issues are not on today’s agenda, in part because many of us have bought into the simplistic narrative – convenient to both Washington and Silicon Valley – that we just need more laws, more tools, more transparency.”
Touching on similar points and themes, the most enjoyable recent article on the subject was written by famed author Margaret Atwood for The New York Times earlier this month. It had recently emerged that intelligence agencies had been using MMO games like World of Warcraft in an attempt to discover terrorists and other less enjoyable parts of the internet. Atwood has predicted just such a thing in her books, written some twelve years ago. Atwood struggles to make sense of her thoughts coming to life, wondering whether to treat it as comedy or tragedy. She elaborates, crystallising all our fears about the empty truth behind data,

“I hope for the comedy… I suspect the horror. Possibly in the future you’ll no longer be permitted to be who you think you are, or even who you’re pretending to be: You will be who they say you are, based on your data-mined, snooped-upon online presence. You’ll be stuck with that definition of yourself. You won’t be able to take off the mask.”

Such disconcerting thoughts on having your own personality dictated to you might once have been the stuff of science-fiction, apt for an episode of The X-Files. Besides adages of truth being stranger than fiction, the clarion call of these publications appears to be that people should be sitting up and taking notice of what has been going on over the last ten years with extensive policy / data / consumerism creep. It is not just the NSA, but the way society intertwines information for monetisation that must be scrutinised if we are to avoid having to worry about trivial things like playing videogames in peace.

The New Normal of the Internet of Things

August 30, 2013 1 comment
30bits-offpocket-tmagArticle

The subtle alternative to the tin foil hat

In the wake of PRISM, New York Times takedowns and spying London rubbish bins, people on the Internet don’t feel that secure any more… at all. Business Insider published an article recently saying the days of truly private email conversations are over. A new trend in “countersurveillance fashion” has sprung up (see above image), and New York’s New Museum is opening a ‘privacy gift shop’ for September.

One of the clients Zeitgeist works for is about to get heavily involved in Machine to Machine (M2M) communication, otherwise known as the Internet of Things (IoT). Intel were making themselves heard last month at an event in London’s Spitalfields Market on the subject. And earlier this month, the exemplary blog GigaOm published an article entitled “How can we design an internet of things for everyone (not just alpha geeks)?”. This new development, which includes self-driving cars, fridges ordering milk for you when you run out without being asked, potentially brings with it ideas of a utopian world of interconnected devices that do your bidding.

But such potential is now seen in a different light, post-PRISM. The first two user comments, screengrabbed below, were a grim reminder of the new normal, where such a utopian future has already been tarnished by abuses before it even arrives.

newnormalPRISM

The likes of PRISM and xKeystroke have arguably completely reversed the libertarian premise of the Internet

Pucci’s eCRM Fail

November 8, 2010 1 comment

Pucci print ad shoes

In the world of luxury, discretion is paramount. Not only should there be a sense of exclusivity about a brand and its wares, but the customer’s relationship with the brand should be personal and – given their probable high net worth – confidential. Which is why fashion label Emilio Pucci, whose signature designer Matthew Williamson left last year, has unfortunately failed so epically with the email it sent out to its Sloane Street of London customers last week.

The eCRM emails that the fashion label sends out are never particularly well-designed, relying on quite brief text with simple fonts. The invitation to a trunk show was first sent listing a date that had already passed. It was then sent again, this time with the correct date, but with every single one of Pucci’s Sloane Street customers clearly CC’d on the email for all to see, well over 500 customers. The message contains contact details of those high up in the worlds of law, finance, music, film and fashion. The risks to privacy violations here (as well as this evidently being illegal), are obvious. A data collector’s dream, to suddenly be in possession of the addresses for such a sought-after group of people. For the person that sent out the email however, it’s a nightmare.

On Convergence

Today the problem lies not in acquiring information, but in how to apply it effectively and efficiently in order to solve the problem at hand. The impact of the increasingly easy access we have to information was scrutinised recently by President Obama at Hampton University, “With iPods and iPads and Xboxes [sic] and PlayStations—none of which I know how to work—information becomes a distraction, a diversion, a form of entertainment, rather than a tool of empowerment”. As Le Monde details, the speech as a whole was really geared toward warning people of the dangers of excessive use of technology; about making sure it is the parents rather than the X-box that tucks the child into bed at night.

The statement in of itself though, is strange, given the person saying it. It is generally agreed that Obama won the election with his revolutionary form of fundraising. It meant he raised more money than fellow Democratic nominee Hillary Clinton, who stuck to her old-school guns by going to uber donors in their sizable Upper East Side and Malibu residences. Not only that, but the way he went about it – a truly grassroots system of peer advocacy; viral awareness through social networks to encourage micropayment upon micropayment – showed he was intuitively in touch with the electorate, and with a new way of doing things. To hear these Luddite words from Obama, complaining about the X-box, is odd coming from someone whose campaign advertisements appeared on in-game billboards on the X-box’s Burnout Paradise, moreover from someone who is a self-confessed Blackberry addict. His self-deprecating manner is patronising and unnecessary; people elected him because he is elite, which should not be seen as a bad thing, as Jon Stewart points out, “The Navy Seals are an elite squad… why must the President be a dumbass?” Bill Maher has more: no longer has more because this content has been removed by HBO, sorry. It was pretty funny though.

The information we all now have access to over the Internet is truly staggering. YouTube now receives 2bn hits daily (though not without repercussions), which rivals that of this blog. However that is no reason for condemnation, as long as whatever it is (text, audio, video; i.e. content) can be accessed efficiently. The problem at the moment is that this is not the case. ‘Convergence’ has been a buzzword for what seems like a lifetime in the world of digital. It is happening, but only in fits and starts, and to some extent it is being hampered by conglomerates whose corporate interest (quite understandably) in the bottom line does not exactly dovetail with what convergence is really about – open source.

The constantly stimulating blog Only Dead Fish featured a very well-written and thought-provoking article on convergence. Having studied the matter as part of its Master’s degree, Zeitgeist thought it knew all there was to know about such matters. This article challenged any existing, simplistic preconceptions. The author quotes Grant McCracken, who says, of the iPad as a converged device,

“The iPad critics can’t see this third space because they work from a utilitarian point of view.  For them, iPad will create economic value only if it solves practical problems.  But Apple has always seen the economic proposition as a cultural one, as an opportunity to speak to the entire consumer in all of his or her complexity, not just the problem solver.”

The author goes on to reference Henry Jenkins’ ‘Black box’ fallacy, “sooner or later all media content will flow through a single black box”. This is indeed one interpretation of the idea of convergence, and it is not necessarily wrong. However, what Zeitgeist believes convergence means for the consumer is not about a black box; we enjoy being able to access content through our myriad devices. What it does mean then is seamless interaction between these devices, i.e. being able to watch my TV show on the commute from work, returning home to dock the device in my TV and have it immediately start playing there, etc.

Conversations over social networks will play an increasing role as these platforms converge (and privacy continues to erode). However, the question remains on everyone’s lips about how to monetise all these goings on. One colleague of Zeitgeist’s suggested a provider like Sky might end up providing an offering where consumers can pick a package that includes The Guardian, some music (Sky has a lacklustre service for this already) and the Cookery Channel, believing that people would be more willing to pay for content in packages rather than in small, one-off payments. Of course, News Corporation could, with little difficulty provide a similar service, whereby they provide access to The Times, The Sun, Sky Sports events, Sky Songs and new films released by 20th Century Fox as packages.

The American humourist Frank Clark wrote that “If you can find a path with no obstacles, it probably doesn’t lead anywhere”. Convergence as a term could easily turn out to be one of those unobtainable zeniths, along the lines of world peace; an abstract term. The possibilities though of seamless connectivity of content between platforms is an extremely attractive one, both for consumer and advertiser.

Spinning the wheel of anonymity

March 11, 2010 1 comment

Chatroulette is big. BIG. French Connection have recently leaped into the fray. It reminds Zeitgeist of the olden days of chatting with various random people on walled gardens like CompuServe with complete anonymity. However, as eConsultancy reports, that veil of anonymity is about to be lifted. Chatroulettemap.com was recently set up, displaying the location of the user and their images, using their IP address. As the article points out,

“The privacy and security implications of this are obvious. The fact that the average internet user probably doesn’t know what an IP address is or how it can be used only makes the situation worse, as individuals who may otherwise be inclined not to participate join the fun not knowing that they could be identified and tracked down.”

Zeitgeist – enduring various men doing disgusting things – has had the pleasure of using Chatroulette to chat with a photographer in New York who shoots for ad agencies that include the blessed Ogilvy, as well as inquisitive Frenchwomen and dancing Canadians. It all feels a bit weird though, and something not far removed from the masque sequence in “Eyes Wide Shut”.

Turning the Screw

Increasingly, there seems to be an Orwellian slant to the machinations of the Internet. Last summer, early adopters of the Kindle and fans of George Orwell would probably have been rather frustratingly struck by the irony of waking up to find their library somewhat diminished. As one blog writes,

“In George Orwell’s “1984,” government censors erase all traces of news articles embarrassing to Big Brother by sending them down an incineration chute called the “memory hole.” On Friday, it was “1984” and another Orwell book, “Animal Farm”, that were dropped down the memory hole – by Amazon.com.”

Another blog notes that the Kindle is “basically a device that Amazon controls that you just happen to have in your hands.” The novels were removed after being added by a company that did not have the sufficient rights to them. This may be sufficient reason to remove the product from the store; it does not, however, excuse the way in which Amazon went about systematically removing copies that were on owner’s devices, who had already paid them. The incident was noted in a more recent editorial in the FT, evincing a mounting ownership creep on behalf of major corporations. Now, more than ever, when products are not only files on your desktop but stored remotely in a cloud, a consumer’s rights to ownership have never felt less tangible.

Apple, specifically its App Store, has recently come under fire again, this time for the removal of adult apps. Some adult-themed apps, such as the Playboy app, will remain available. It is the thought of Apple acting not only as moral arbiter, but also in an ad hoc manner with that responsibility, which should give consumers cause for concern. If someone creates an app or wants to distribute a book online in the future, will they hesitate to share their innovation and creativity for fear it could be summarily deleted at will by a fickle corporation? TechCrunch has a fascinating and well-written article here on the removal by Google of many music blogs that were deemed under the DCMA to be infringing on intellectual property. Again, as in the Kindle case, it is less the justification of the action (although this can also be disputed), and more the way it was done that is inexcusable.

In the Communist nirvana that is China, things are worse. Le Monde reports that though the country is on the brink of launching IPv6, allowing people to create and type in URLs using Chinese characters, the government is also imposing draconian measures for those wishing to set up websites. The government already restricts access to sites such as BBC News, Facebook and Twitter. In the past two weeks, they have also asked that anyone wishing to open a web site must present themselves before the authorities with their identity card and photographs of themselves, ostensibly to combat pornography. Not only is this measure entirely unnecessary and completely antithetical to the libertarian principles of the Internet, but from a practical standpoint it is wildly inefficient and will certainly stifle innovation. The UK government’s initial plans for censuring those who share files illegally have been, for the moment, stayed.

Conversely, these same bodies are not operating with impunity, even in situations where arguably they are not to blame. Three Google executives were convicted in Italy at the end of last month. The charge, Reuters reported, was “violating the privacy of an Italian boy with autism by letting video of him be posted on the site in 2006.” Quite how it was decided that those hosting the video – on a site that apparently serves a billion videos every day – could possibly have responsibility for it is beyond Zeitgeist. The New York Times writes “It suggests that Google is not simply a tool for its users, as it contends, but is effectively no different from any other media company, like newspapers or television, that provides content and could be regulated”. One of the accused, global privacy counsel Peter Fleischer, commented that if employees were “criminally liable for any video on a hosting platform, when they had absolutely nothing to do with the video in question, then our liability is unlimited.” Despite corporate overreach in some areas, sometimes the judicial system can be just as harsh on those same corporations. The insight is that what goes around, comes around.

The Fearful Symmetry of Tiger Woods

December 1, 2009 3 comments

From the Winter 2009 Zeitgeist…

The Fearful Symmetry of Tiger Woods

Brand ambassadors are nothing new. Napoleon (seen above in a casual pose) has long been such an ambassador for the watchmaker Breguet, having worn one during his short (for he was short) life. But what happens when the real world conflicts with the manufactured artifice? Are all of Andre Agassiʼs triumphs now overshadowed by drug addiction? What of recent rumours that Tony the Tiger is diabetic?

Tiger Woodsʼ indiscretions have highlighted such concerns; what happens when an athlete who is not only a champion in his chosen field, but also seemingly the epitome of a gentleman in his private life, turns out to be less than perfect? Tigerʼs presence – a young man of mixed ethnicity in a sport dominated by old, rotund white guys obsessed with the faux exclusivity of country clubs – was a huge statement in of itself. It was for all these reasons though that some major blue-chip brands chose to invest in his good name. Who can forget the fantastic Nike spot of yesteryear?

While his namesake currently graces the Spirit Airlines website, Tiger can unfortunately no longer be found on the Accenture homepage. For a company to so abruptly end such a sponsorship is an enormous blow to both parties and both brands. Industry Standard wrote, “Tiger has literally become the sole face, the strategic embodiment, the business essence of Accenture, the $22 billion global IT, outsourcing and business consultancy proclaim[ing]: ʻWe know what it takes to be a Tiger.ʼ Everything about that slogan has now become a PR debacle, comedian’s punch line and perplexing psychological  examination…”.

Tiger is now on an “indefinite” leave from golf and the brands that rely on the sportsman solely for his golfing prowess are sure to be affected. Electronics Arts will have a hard time selling the umpteenth version of the Tiger Woods PGA Tour franchise if the eponymous player does not compete. TV ratings for golf tournaments will similarly suffer, according to the FT and New York Times. Nike, PepsiCo and AT&T are all of a ʻwait and seeʼ mindset. Gillette will “remove its Woods-related advertising for now” in order to respect his much sought-after privacy. Gilletteʼs triumvirate has suffered of late. Thierry Henry is also mired in scandal after denying Ireland a place in the World Cup by somewhat guiding a ball with his hand at a crucial point in the game. Gillette has denied the act will affect his contract. Roger Federer seems to be the only one currently untainted, though not wishing to jinx him, Zeitgeist will move swiftly on…

Ultimately, such crises can be fleeting. Michael Phelps, pictured with a bong and promptly dropped by Kelloggʼs, will not be forgotten for winning a Fort Knox-worth of gold medals in Beijing. NFL player Michael Vick organised brutal dogfights in his free time, but returned to the game to cheers from the fickle crowd. There may be lasting impact this time, however. As the Zeitgeist team have said before, if caught, the best practice is to immediately admit culpability, express sincere contriteness and take ownership of the situation, as Accenture have done.