Bhawan Kumari Oct 13, 2020, 12.20 PM IST
We have to examine that the data security which is paramount in today’s connected world starts from the very crucial smart device, the end point and travels all the way to the connected server farms which are hosting them.
In our billion plus Bharat, consumers have started acquiring the smart mobile devices at a rapid pace even in rural villages. When choosing devices, their motivation gets swayed at the new and improved functions, features, disruptive innovative designs, memory, multiple high resolution cameras, better touch screen, 5G readiness, streaming capabilities, contact less experience, etc. They often are heavily influenced by the marketing glitzes of celebrities and athletes pushing one device over the other. Sometimes just the fierce comparison of a device packing more features than its competitors at a marginal price is a game changer.
The most vital and important aspect of the smartphone is often ignored or overlooked; handling of data. Yes, the golden data which is an integral part of the smart device.
It is estimated that an average smartphone in Bharat generates data consisting of social interaction, posting, email, streaming, photos, home movies, messages, voice over IP, all personal and customized to that smartphone owner. This multitudes more than any part of the world in twenty-six regional languages, data all stacked behind in bits and bytes.
The most important vulnerable facts of handling customized data in today’s devices remain hidden and difficult to access. One must be a super geek working in a manufacturer’s forensic lab to get to it, using hard core proprietary third party tools to sniff out, that too very rarely with some luck. A layman citizen is far-far away from this geeky exercise and has no clue about it.
This brings few very critical and important questions to ponder below as it has vast national security implications:
- Where is the personal data generated for Bharat citizens being distributed to? How is it distributed?
- Which transporting channels are being used?
- Are they secure and encrypted?
- If encrypted how many third-parties hold the encrypted keys?
- Are these third-parties’ authorized to use them?
- Are the citizens explicitly aware of the third-party access to their personal data being generated in Bharat?
- Is the data locally warehoused in Bharat or are they being transported away briskly at the remote locations in far off remote country’s cloud server farms?
- Are these server farms ruthlessly analyzing, studying, profiling, exploiting, manipulating and ingesting the collective Bharat’s citizen’s data?
- Why are the use of modern AI algorithms used to give shape for future coursing transformation while keeping it live in-sync with the host device thousands of miles away without the citizen’s explicit knowledge?
- Why is the re-location or syncing of data pulled from the device’s storage or built in-device cloud and its open integrated distribution to various third party apps is often deliberately done or overlooked to satisfy the hunger for data dominance and commercial exploitation?
These open practices of today’s ruthless digital world result in compromised personal safety and security of an individual or a department even at times an organization, making it prone to oozing data which often ends up in dark webstore open for large scale exploits by bad actors.
At times it is meant for an even bigger part of the jigsaw puzzle of creating detailed profiling values of every citizen of Bharat, dividing, them in various categories of race, colour, creed, origin, gender, religion, age, disability, sexual orientation, marital and family status, political beliefs, biometric, income, active servicemen or veteran etc. the attribute list goes on and on these are just to name a few which is crafted meticulously by AI algorithms using big data platforms which are readily available today to process various data points to support complex navigation and modeling.
This deep data mining and its analysis does not stop here, it goes even farther to kick-start gene-mapping with more disease prone activities starting from our new born, loved ones, grown up children, parents, grandparents, the cluster of entire families. They are mapped to come up with predictable societal behaviors and controls for its manipulation.
Another practiced malicious intent behind segregation of data is to create classic propaganda, influence, fake news, hostile social manipulation using multiple social media channels where these kinds of news are open game without having any control or regulator control to censor while scrutinizing through millions of postings a day.
Todays modern AI driven tools have self-learned to create unique voices and videos and have even have created realistic voice and video profiles of prominent individual which then are used to create highly plausible audio and video feeds to reduce confidence in the reality or the absolute truth by mixing it with fake message to create and spread confusion at mass levels.
The role of creating zero trust is a highly prized sought after attack towards a government body or an eminent person, or institution, spreading of rumors backed by manipulated audio & video and being tweeted and retweeted , or shared across multiple platforms make it consistent with the primary objective of the bad actors who are highbred to create coups or to topple the government by interfering in the elections or simply creating border tensions by showing false footage to incite rebellion or create communal hate crimes against one another.
The customized buffet of data with news and current affairs are all surgically delivered based upon the input of the data preferences which has been secretly transported away at far labs to create customized vulnerable audience profiles.
In order to organize and control the ever-growing digital data chaos and mismanagement, we have to examine that the data security which is paramount in today’s connected world starts from the very crucial smart device, the end point and travels all the way to the connected server farms which are hosting them. Atmanirbhar Bharat’s network of wisdom server farms if all interconnected can significantly play an important role to the core principles of safe and approved transportation channels , approved data warehousing standards, re-location standards without the data ever leaving the country yet provide an aggressive network CDN grade versatility, empowering citizens to be in total control on the ownership of the data with very crisp and simple rules which distinguish marketing vis a vie exploiting.
The voices, images, favorite locations, home address, health, sleep time are being monitored, listened, analyzed, profiled to support the adoption of the next generation of analytics, even remotely listening in to the conversation to pick up key words and create customized flags to augment the enhancement of the profile in the database. This small yet powerful data collection activity gets bigger day by day minute by minute using the data snooping persistent algorithms built into our connected mobile devices which we have come to rely upon minute by minute for the ease of our day to day activities thanks by far to the abundant readily and cheaply available bandwidth which keeps us connected which in turn is exploited by the 24x7 customized integrated intelligence analytics.
Unless the ambitious new experience of Atmanirbhar Bharat’s network of wisdom server farms is rolled into play, and the warehousing, distribution, re-location, and importantly transportation is aligned as the standard constellation stars of Bharat’s new data age innovation zones, it will not be a game changer and we will be chasing the foreign established actors for the data created by the Bharat of the Bharat and for the Bharat and it shall perish away from Bharat.
DISCLAIMER: The views expressed are solely of the author and ETTelecom.com does not necessarily subscribe to it. ETTelecom.com shall not be responsible for any damage caused to any person/organisation directly or indirectly.