Tech Power & Policy

Welcome back to the Bastion Brief newsletter. I hope you have had a wonderful week and enjoy the upcoming holiday.

Weeks ago in an edition, we touched on the E.U.’s decision to standardize USB-C type chargers across devices. In some positive news, it looks like the United States may follow this path as senators have brought up the issue to the Commerce Secretary. We are a far away from anything being set in stone, but it is great to see the conversation getting started about cutting down on electronic waste and making device management easier on users.

The past weeks have been turbulent in the United States as policy makers have exhibited a show of power when ruling on critical issues for citizens. Anyone interested in technology should keep a close eye on power and policy as major decisions could change the way we interact with tech as general users. Every time we connect to the internet, we give data to an information system that can identify the device type used, the location it’s in, and some of the activity being conducted. While some may insist encryption is the grand protector of their data, you should still be cautious. Advanced attackers may not need the whole picture to determine key details about the function a device serves for another user. So why does this matter for power and policy in technology?

As we have observed some challenges spreading through the political fabric of the nation, users should question what protections extend to their use of the internet. Who has access to your data while you are using an app? What can they learn about you? Can they discover the minute details? If you’re a user that is addicted to the new, best device to be offered on the marketplace, you may want to pause to reflect. When it comes to innovative technology, you must examine the policy and power surrounding it. Is there a policy in place to protect users from providers watching, recording, and documenting their every move? Do they have the power to determine who you are, where you go, and at what time?

Chances are some users are tracked from the moment they wake up, through their commute, workday, personal life, and again when scrolling through social media before bed. However unlikely, someone may be able to determine where you travel through devices and time stamps from this captured data. It’s a potential issue all users should consider when setting up their devices and applications. Paying attention to the terms of service that you agree to can be helpful. Most of these policies are filled with legal or tech jargon, so just do a search to see if the common applications you use have any terms of service red flags.

On a larger scale, we have seen the cracks in infrastructure and planning when it comes to power over devices. If a coordinated attack were pointed at electricity sources, many of your devices would be rather useless without a charge or internet connection. Consider possible back up plans for communicating, these can also be helpful when natural disaster strikes.

My tips for power and policy in the technology field:

1.   Turn off location services for non-essential devices and apps. Your smart devices have a unique address that can verify your signature. If you combine this information with a timestamp and location tracking, someone may be able to determine your routine. Be it an advanced tech robbery in the future or just the creepy stalking that is possible, it's best to prevent location tracking when not necessary.

2.   Be active in learning about the latest policies that protect internet and device use in the United States which may impact you. Be a part of the conversation and research that helps protect users. 

While technology offers great opportunities to users, it also creates unique new challenges. As we look forward to technology being woven into our lives, there is no doubt that new issues will arise for humanity to address. 

Thanks for joining me this week and as always consider supporting us @bastionbrief on social media. Send me a tip in the comments or via direct message!

Previous
Previous

Phishing, Scams, & Spam

Next
Next

Jumping Into IT