The Threat Of Big Brother
Look before you Leap
Data aware companies of the present age are by nature of the market forces that create and polish the final production process. presently have businesses in the ruthless money making exploitative and competitive advantage takers of the present fish bowl of commerce. This does not speak very highly for trustworthiness, reliability or any other form of faith based inspirations or associations. They should not necessarily be trusted with personal information for these reasons. With all the recent and historic losses of data, whistle blowers and leaks the system is like a well holed rubber dingy in a torrent of converging streams. Doesnt exactly inspire confidence let alone faith.
The well reported and often badly credited central information centre, all the information on every person born and registered in a country is if nothing else a warning not to put all our eggs in one basket. It data is modelled on a region by region for each country (local Authority) and the system that they are all housed on, (birth hospital to working environment and GPS, transaction tracking and any DNA and physical characteristics) need to be housed on a system that is monitored by a central integrity system that only ever checks the local systems for anomalies and any attacks on integrity. A core buffer section on each with manual data transfers, an external data system that has a taker and a putter in place to keep any form of virus screened by the process. A data block of say two gigabyte of raw data, no special characters and no system level to pass any external virus or hacking device into the central core. Any business or bank transactions will have accessibility for checking on and external data block like the buffer to allow one way transactions only and each data block is unique and cannot be moved again as a solid block. The central system must have dedicated lines and will never be on a public network or allow public access without a level of predescribed access criteria.
This build is not a critical time line build and will require patients and will be active as a full companion to the existing system till it has 70% integrity in place. And that the final build and update for a world populace GPS ID system can show where people are at any given time, cant swipe a stolen card while in the library 200 miles away.
Each local authority has to house the local indigenous information and add any new residents via transfers and immigrants, migrant workers and transients should become easier to track by rote. The security of the national set can only then be accessed by personal information stolen from well meaning companies and is historically prone to abuse and failures due to the human condition. An attack at a local level will only reveal one set of information, the same attack on another area will raise some early warnings and the third strike should bring the attack to a halt in double quick time.
Time to think again. Lucky there is an emerging nation that can set up its own systems on this model and not buy into the leaking data model from the rest of the world.
Posted on October 28, 2015, in Daily Bugle, Philosophy, Political, Psychology and tagged Computers, Data, Data Analysis, Data Integrity, Data Protection, Security. Bookmark the permalink. Leave a comment.