Tuesday, June 23, 2015

The Enemy's Flag Flies Over US Capitals



Why did the US Civil War happen? Simple: the power to make money; aka the right for the rich to stay rich despite the cost to humanity.

The institution of slavery created centuries of wealth for many of the world's governments. The practice is Biblical. But it becomes increasingly difficult to treat people as animals when they are increasing seen as human. The US was not the first nor the last to abolish this source of unethical labor. And like the Exodus, it came at a great cost to the nation resisting change. But unlike the ancient tale, the force facing the American Pharaoh named Jefferson Davis was a well-regulated army of soldiers supported by a diverse middle-class, not a mass of ragtag slaves lead by a psychic magician across the parted river into the empty desert under a watchful eye.

The American Civil War began over the establishment of California – a state free from slavery. The South felt boxed in. Without direct access to the Pacific, maximizing profits from their ill-gotten gains became untenable. With this irreplaceable export route blocked, they formed a new country and went to war for the right to exist; they had to protect the old-fashion way. Over the preceding decades of increasing restrictions to their business model and in light of the contemporary trend of world governments abandoning the practice altogether, the South saw the writing on the wall and like the Luddites raged against the machine of progress. 


The Confederate States of America was the attempt to create a foreign country within US boarders based on the institution of slavery. The Confederate Battle Flag symbolizes a foreign country's aggression upon this soil. What other enemy is favored with such an honor? Such logic requires zombie-like cognitive dissidence. How much longer will the enemy's flag fly over US capitals?

Wednesday, June 10, 2015

$ Strategies: A Worst Case Scenario


Identity theft is ugly. When it strikes, recovery takes a lot of work; but the injury never heals. Using a false identity for gain is not limited to the riches of bank accounts or credit cards. Criminals use our very online presence to create havoc. We all live with data-risk. We cannot protect ourselves one-hundred percent. It helps to accept this. It also helps if we know how to protect ourselves from the greatest risks. Then we can relax, knowing our exposure is limited.

As Sun-Tzu might say, 'a man who knows himself and his enemy may not win but cannot lose.' There are many avenues into our accounts. They exist for the benefit of our access. Being mindful of that process is important. Passwords, PINs, login names, security questions, smart phones, codes, and biometrics are just the beginning. The ability to separate the authentic from the usurper seems never ending. 3-D printed plastic fingers become keys to locks that cannot be reset – nature provides only one set of fingerprints. Even the complexity of biometrics are now in question. Though it may never be perfect and constantly struggles to keep up, security always improves. As it does, we are wise to take advantage of the technology to monitor and limit our exposure.

So, in this worse case scenario, what is the one thing we can do? The single most important behavior is involvement. Review statements. Check credit ratings. Intentionally limit the number of credit lines. Research an institution before opening a financially-related account. Follow best practices.

There are many things we must be aware of when we share our data online. Never open links in unsolicited emails (better yet, don't open them but report them as spam). Never send account numbers, PINs, or passwords via email or enter personal data into an unsecured site. Use only secure or encrypted sites. You'll know because the address line begins with https:// Limit the number of credit cards used online to one (if possible). For the most part, don't save credit card numbers in any digital format; enter them manually every time. And remember, managing each password is important.


The truly damaging identity theft happens when someone breaches the walls of our credit and is allowed to operate as if from within. From the importance of simple passwords to the ultimate tactic of impenetrable security, my next few post explore strategies to plug these holes.